Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.1/patches/2229899/?format=api
{ "id": 2229899, "url": "http://patchwork.ozlabs.org/api/1.1/patches/2229899/?format=api", "web_url": "http://patchwork.ozlabs.org/project/hostap/patch/20260428200639.40243-89-andrei.otcheretianski@intel.com/", "project": { "id": 22, "url": "http://patchwork.ozlabs.org/api/1.1/projects/22/?format=api", "name": "HostAP Development", "link_name": "hostap", "list_id": "hostap.lists.infradead.org", "list_email": "hostap@lists.infradead.org", "web_url": "", "scm_url": "", "webscm_url": "" }, "msgid": "<20260428200639.40243-89-andrei.otcheretianski@intel.com>", "date": "2026-04-28T20:06:29", "name": "[RFC,88/97] tests: Add testing coverage for protected multicast SDF", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "c9744a8f025179ef98e92b86b9dbce0a8485922a", "submitter": { "id": 62065, "url": "http://patchwork.ozlabs.org/api/1.1/people/62065/?format=api", "name": "Andrei Otcheretianski", "email": "andrei.otcheretianski@intel.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/hostap/patch/20260428200639.40243-89-andrei.otcheretianski@intel.com/mbox/", "series": [ { "id": 501927, "url": "http://patchwork.ozlabs.org/api/1.1/series/501927/?format=api", "web_url": "http://patchwork.ozlabs.org/project/hostap/list/?series=501927", "date": "2026-04-28T20:05:05", "name": "NAN: Group keys support, schedule update and more", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/501927/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2229899/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2229899/checks/", "tags": {}, "headers": { "Return-Path": "\n <hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=ZhgMXAnN;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n secure) header.d=infradead.org header.i=@infradead.org header.a=rsa-sha256\n header.s=casper.20170209 header.b=ZCtLRHwi;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=intel.com header.i=@intel.com header.a=rsa-sha256\n header.s=Intel header.b=LdXBe2av;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)" ], "Received": [ "from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g4sBg4c6hz1xvV\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 29 Apr 2026 06:15:55 +1000 (AEST)", "from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wHoq6-00000002MxL-0Aik;\n\tTue, 28 Apr 2026 20:15:26 +0000", "from casper.infradead.org ([2001:8b0:10b:1236::1])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wHol7-00000002G0E-1Uww\n\tfor hostap@bombadil.infradead.org;\n\tTue, 28 Apr 2026 20:10:17 +0000", "from mgamail.intel.com ([198.175.65.16])\n\tby casper.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wHol1-00000004NBq-34p2\n\tfor hostap@lists.infradead.org;\n\tTue, 28 Apr 2026 20:10:15 +0000", "from fmviesa001.fm.intel.com ([10.60.135.141])\n by orvoesa108.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 28 Apr 2026 13:09:31 -0700", "from iapp347.iil.intel.com (HELO 87c02287900a.iil.intel.com)\n ([10.167.28.6])\n by smtpauth.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 28 Apr 2026 13:09:30 -0700" ], "DKIM-Signature": [ "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To:\n\tMessage-ID:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description:\n\tResent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:\n\tList-Owner; bh=JC5foIDZlLwZnIAB9IfmqVHeDUl/A1soKrcXjxLdi88=; b=ZhgMXAnNaGVMVj\n\tSnv912EVJgAcDPyq0Kzvc8xwg1O5y2sfoGCfMwWLExOI+kZGrqo1xMWTd5bDA5gcryjVDLIbmfNC1\n\t9y+Oxn0HfqaF8JcKHh6wzmmmhVqt38tYSWGr1L+j/A+SNNhEVPLzJIbrbNQ3eI1zdtb6SgoTTPip4\n\tu6KNQYuNPRw1QlMTSVMW1cyfoOxP5t7IRCcRrd/MMbbkuyR3EpghN7Tz7j3+rinAJGL1Zdtkjl8s/\n\tM4DpdtG3TujMQEFfrS1sjCD3zQdvsAdp7TWyoN3zCfijx8S6w1nDIg9vwOpZ/AIj/HoJX9nsneRer\n\tSnCcFG178YbM8GEl6RkA==;", "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=infradead.org; s=casper.20170209; h=Content-Transfer-Encoding:MIME-Version:\n\tReferences:In-Reply-To:Message-ID:Date:Subject:Cc:To:From:Sender:Reply-To:\n\tContent-Type:Content-ID:Content-Description;\n\tbh=OEYnu/0/XZ7o8ReX64Mmsf7ExuL5IFlup0BwQxmS7UQ=; b=ZCtLRHwirPnlUoLTW4csffHhQx\n\tgCTe8Tn/YlezgElRbZbtxK6k6x3bNAqMAFZ/vsb7G5lNuk6ZwUMXZAoW+9Twv210/+uAV4oWbc4FQ\n\tUrrNj7b34JO3FL1zqv2OEru3E7tvAacXp1uip7wSVw7b4gQ0KQ6hZ/s1aPoSFQSqHvA6DBKkJXEHV\n\t9kJLtZPt5SdAUe3mZKXHK3h84Cqg07ft2uqcN7z/E7YtrSp3tf1BzXgN18GBwYezjr12dnd/c/btY\n\tLr6QNHP4eyATLqT8YY2ADBRnsH9d3ldf2YOydEISzcpycdElRUWzZgkCdUTc+xtkEbJnLXQIVnTH0\n\tewBJJsqQ==;", "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1777407011; x=1808943011;\n h=from:to:cc:subject:date:message-id:in-reply-to:\n references:mime-version:content-transfer-encoding;\n bh=rlfy7LeEt/UlLy7baQPvWE34ddEks/m967Dc5toLekk=;\n b=LdXBe2avhNMxwWHd4AhjsgaYhWCUebe5c5WqcHJYJPQJerr0vrzR3km0\n Xp+eLtGN0I8HfSL97yMI+UW/MTIIWdCoxt7yK6a7RRAT4F1GTiTjy1wC3\n kax0GfatwxgL3y58Of23PS/RsmKHtzYmpzZ3UrFmhYirPsOmrlRbbwWCI\n Uqkn8wkaYqz3Timn0LrT2ojXONRkeGX6YXLDM0mIuC7/8TH0CzMMUOhxC\n wbCeEITTVEB64STw+JZ2GyyCMO/M1qu0iByv1fh8nLDapMoJbyxhTEHmo\n tWKFTHgan2kbJWBHIVQsReHolUZmAHWanWlyhWd16hVdxtpgtpSBIGQGV\n w==;" ], "X-CSE-ConnectionGUID": [ "hPFRpdR0RveUBSAbOcdvfg==", "VChsZ63MRemzs7qplQapwQ==" ], "X-CSE-MsgGUID": [ "wRk29edPS8uExBEhxsd9VA==", "EafLJUiAQ229a/T1wbpHVQ==" ], "X-IronPort-AV": [ "E=McAfee;i=\"6800,10657,11770\"; a=\"78519619\"", "E=Sophos;i=\"6.23,204,1770624000\";\n d=\"scan'208\";a=\"78519619\"", "E=Sophos;i=\"6.23,204,1770624000\";\n d=\"scan'208\";a=\"257610918\"" ], "X-ExtLoop1": "1", "From": "Andrei Otcheretianski <andrei.otcheretianski@intel.com>", "To": "hostap@lists.infradead.org", "Cc": "vamsin@qti.qualcomm.com,\n\tmaheshkkv@google.com,\n\tIlan Peer <ilan.peer@intel.com>", "Subject": "[RFC 88/97] tests: Add testing coverage for protected multicast SDF", "Date": "Tue, 28 Apr 2026 23:06:29 +0300", "Message-ID": "<20260428200639.40243-89-andrei.otcheretianski@intel.com>", "X-Mailer": "git-send-email 2.53.0", "In-Reply-To": "<20260428200639.40243-1-andrei.otcheretianski@intel.com>", "References": "<20260428200639.40243-1-andrei.otcheretianski@intel.com>", "MIME-Version": "1.0", "X-CRM114-Version": "20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ", "X-CRM114-CacheID": "sfid-20260428_211012_106049_26D8E618 ", "X-CRM114-Status": "UNSURE ( 7.69 )", "X-CRM114-Notice": "Please train this message.", "X-Spam-Score": "-4.4 (----)", "X-Spam-Report": "SpamAssassin version 4.0.1 on casper.infradead.org summary:\n Content analysis details: (-4.4 points, 5.0 required)\n pts rule name description\n ---- ----------------------\n --------------------------------------------------\n -2.3 RCVD_IN_DNSWL_MED RBL: Sender listed at https://www.dnswl.org/,\n medium trust\n [198.175.65.16 listed in list.dnswl.org]\n 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record\n -0.0 SPF_PASS SPF: sender matches SPF record\n -0.1 DKIM_VALID Message has at least one valid DKIM or DK\n signature\n -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from\n envelope-from domain\n 0.1 DKIM_SIGNED Message has a DKIM or DK signature,\n not necessarily valid\n -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from\n author's\n domain\n -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1%\n [score: 0.0000]\n -0.0 DKIMWL_WL_HIGH DKIMwl.org - High trust sender", "X-BeenThere": "hostap@lists.infradead.org", "X-Mailman-Version": "2.1.34", "Precedence": "list", "List-Id": "<hostap.lists.infradead.org>", "List-Unsubscribe": "<http://lists.infradead.org/mailman/options/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=unsubscribe>", "List-Archive": "<http://lists.infradead.org/pipermail/hostap/>", "List-Post": "<mailto:hostap@lists.infradead.org>", "List-Help": "<mailto:hostap-request@lists.infradead.org?subject=help>", "List-Subscribe": "<http://lists.infradead.org/mailman/listinfo/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=subscribe>", "Content-Type": "text/plain; charset=\"us-ascii\"", "Content-Transfer-Encoding": "7bit", "Sender": "\"Hostap\" <hostap-bounces@lists.infradead.org>", "Errors-To": "hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org" }, "content": "From: Ilan Peer <ilan.peer@intel.com>\n\nAdd testing coverage for protected multicast SDF transmission:\n\n- Configure both devices with management frame protection\n- Setup an NDP. The setup should include exchange of IGTK and\n BIGTK.\n- Verify that multicast followup SDF is received by the peer.\n\nSigned-off-by: Ilan Peer <ilan.peer@intel.com>\n---\n tests/hwsim/test_nan.py | 54 +++++++++++++++++++++++++++++++++++++++++\n 1 file changed, 54 insertions(+)", "diff": "diff --git a/tests/hwsim/test_nan.py b/tests/hwsim/test_nan.py\nindex 93383f382c..56b0ce1466 100644\n--- a/tests/hwsim/test_nan.py\n+++ b/tests/hwsim/test_nan.py\n@@ -1896,3 +1896,57 @@ def test_nan_dp_sk_ccmp128_with_gtk(dev, apdev, params):\n def test_nan_dp_sk_gcmp256_with_gtk(dev, apdev, params):\n \"\"\"NAN DP - 2way NDL + SK GCMP-256 security with GTK\"\"\"\n run_nan_dp(csid=2, gtk_csid=6, mgmt_group_cipher=\"BIP-GMAC-256\")\n+\n+def _run_nan_prot_mcast_followup(dev, apdev, mgmt_group_cipher):\n+ with hwsim_nan_radios(count=2) as [wpas1, wpas2], \\\n+ NanDevice(wpas1, \"nan0\", \"ndi0\", mgmt_group_cipher=mgmt_group_cipher) as pub, \\\n+ NanDevice(wpas2, \"nan1\", \"ndi1\", mgmt_group_cipher=mgmt_group_cipher) as sub:\n+\n+ pid, sid, paddr, saddr = nan_sync_discovery(pub, sub, \"test_service\",\n+ pssi=\"aabbccdd\",\n+ sssi=\"ddbbccaa\",\n+ unsolicited=0)\n+\n+ ndp_id, init_ndi = _nan_ndp_request_and_accept(pub, sub, pid, sid, paddr, saddr,\n+ password=\"NAN\",\n+ req_ssi=\"aabbcc\", resp_ssi=\"ddeeff\",\n+ csid=1)\n+ _nan_test_connectivity(pub, sub)\n+\n+ # Configure the NAN DE to send multicast followup frames as dual protected and send a\n+ # multocast followup frame. The followup frame should be protected with the group key\n+ # and accepted by the peer.\n+ sub.set(\"tx_mcast_fu_dual_prot\", \"1\")\n+ pub.set(\"tx_mcast_fu_dual_prot\", \"1\")\n+ sub.transmit(handle=sid, req_instance_id=pid, address=\"ff:ff:ff:ff:ff:ff\",\n+ ssi=\"aabbccddeeff\")\n+\n+ ev = pub.wpas.wait_event([\"NAN-RECEIVE\"], timeout=2)\n+ if ev is None or f\"address={saddr}\" not in ev or \"ssi=aabbccddeeff\" not in ev :\n+ raise Exception(\"NAN-RECEIVE followup event not seen or invalid format\")\n+\n+ pub.transmit(handle=pid, req_instance_id=sid, address=\"ff:ff:ff:ff:ff:ff\",\n+ ssi=\"ffeeddccbbaa\")\n+\n+ ev = sub.wpas.wait_event([\"NAN-RECEIVE\"], timeout=2)\n+ if ev is None or f\"address={paddr}\" not in ev or \"ssi=ffeeddccbbaa\" not in ev:\n+ raise Exception(\"NAN-RECEIVE followup event not seen or invalid format\")\n+\n+ _nan_ndp_terminate(pub, sub, paddr, init_ndi, ndp_id)\n+\n+def test_nan_prot_mcast_followup_bip_cmac128(dev, apdev, params):\n+ \"\"\"NAN NDP with multicast management frame protection using BIP-CMAC-128\"\"\"\n+ set_country(\"US\")\n+ try:\n+ _run_nan_prot_mcast_followup(dev, apdev, mgmt_group_cipher=\"BIP-CMAC-128\")\n+ finally:\n+ set_country(\"00\")\n+\n+def test_nan_prot_mcast_followup_bip_gmac256(dev, apdev, params):\n+ \"\"\"NAN NDP with multicast management frame protection using BIP-GMAC-256\"\"\"\n+ set_country(\"US\")\n+ try:\n+ _run_nan_prot_mcast_followup(dev, apdev, mgmt_group_cipher=\"BIP-GMAC-256\")\n+ finally:\n+ set_country(\"00\")\n+\n", "prefixes": [ "RFC", "88/97" ] }