Show a cover letter.

GET /api/1.2/covers/2226354/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2226354,
    "url": "http://patchwork.ozlabs.org/api/1.2/covers/2226354/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/hostap/cover/20260422122424.43776-1-andrei.otcheretianski@intel.com/",
    "project": {
        "id": 22,
        "url": "http://patchwork.ozlabs.org/api/1.2/projects/22/?format=api",
        "name": "HostAP Development",
        "link_name": "hostap",
        "list_id": "hostap.lists.infradead.org",
        "list_email": "hostap@lists.infradead.org",
        "web_url": "",
        "scm_url": "",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260422122424.43776-1-andrei.otcheretianski@intel.com>",
    "list_archive_url": null,
    "date": "2026-04-22T12:22:51",
    "name": "[00/92] Add NAN PASN pairing support",
    "submitter": {
        "id": 62065,
        "url": "http://patchwork.ozlabs.org/api/1.2/people/62065/?format=api",
        "name": "Andrei Otcheretianski",
        "email": "andrei.otcheretianski@intel.com"
    },
    "mbox": "http://patchwork.ozlabs.org/project/hostap/cover/20260422122424.43776-1-andrei.otcheretianski@intel.com/mbox/",
    "series": [
        {
            "id": 501001,
            "url": "http://patchwork.ozlabs.org/api/1.2/series/501001/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/hostap/list/?series=501001",
            "date": "2026-04-22T12:23:05",
            "name": "Add NAN PASN pairing support",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/501001/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/covers/2226354/comments/",
    "headers": {
        "Return-Path": "\n <hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=neC3+un9;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=intel.com header.i=@intel.com header.a=rsa-sha256\n header.s=Intel header.b=YT7MZau5;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0z2h6RTWz23Zj\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 22:25:30 +1000 (AEST)",
            "from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wFWdE-0000000A2La-19Lo;\n\tWed, 22 Apr 2026 12:24:40 +0000",
            "from mgamail.intel.com ([192.198.163.17])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wFWdA-0000000A2KY-3F8T\n\tfor hostap@lists.infradead.org;\n\tWed, 22 Apr 2026 12:24:37 +0000",
            "from orviesa010.jf.intel.com ([10.64.159.150])\n  by fmvoesa111.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 22 Apr 2026 05:24:33 -0700",
            "from iapp347.iil.intel.com (HELO 87c02287900a.iil.intel.com)\n ([10.167.28.6])\n  by orviesa010-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 22 Apr 2026 05:24:32 -0700"
        ],
        "DKIM-Signature": [
            "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-ID:Date:Subject:Cc\n\t:To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From:\n\tResent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:\n\tList-Owner; bh=ogB8aNCPzGJulkQQSSi5EkpnR8Z7Uln6vH6DUIi9K6k=; b=neC3+un9hlVBle\n\tKGxb3lB2s8ca6HDggKlKXUKDl+vomgIBmfUpZCJR0HuuBhXHmVRi1Tq50uCfBgxKZQJqwxxUUAcMb\n\tj6XhcRBqx7OYs/4D5DcVcElARfnydchKGGaNJt0UxtU06O+6W9r8CqjLB4QcJtV73qL8BBYMvcuzq\n\tfmxfaK2WScgYhf79coUQnvCUXYkkE/Wfj3Sk6HlOgLOdRh0Cz5QLkppsv3jHlFZSE+WfX3MpogLEl\n\tBKlL4iLpEXh+0ZRwSpNlEkcJpcy/LV46U04+niRzOS14H/6KycR8lDJO991WOMVeEIihUlIZYnPSe\n\tdtKjmSwDAyOXG+9yTipg==;",
            "v=1; a=rsa-sha256; c=relaxed/simple;\n  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n  t=1776860676; x=1808396676;\n  h=from:to:cc:subject:date:message-id:mime-version:\n   content-transfer-encoding;\n  bh=zmcFzpAT2REmfEpNwcLNNNjK6rjuZGUoloj56GZQwPA=;\n  b=YT7MZau5DvdHz7viytH4V0ijPCGC+GP1+X346QVSWT6RniaPNdyPlq34\n   jZftJkLBMM8Rd/iocDBKlVBayTpWuM/rgpgfWsVhrZLijN08ugHpc1UIZ\n   9BhsXOh9tYaCNYPYZTUjCxvIDlykQPq6VsChW0z8rWIb+PHoQs/DLKPzk\n   ToQxb8i2TfcT0/jbXddUe03DE7RzmumfJLGTV5ABuFo4uMr9CSf/myGhV\n   K6KkAKdQRAJowiKnrIX44v4qMZIoAtUGG2eHf3WfAb2FTixMPNbnObNOZ\n   8gk4FSsI8jf8ibcoMLbG6bj0vXFEXrHSgBgLKz9Dbzyis/Kd89lNtDHVH\n   g==;"
        ],
        "X-CSE-ConnectionGUID": [
            "BkuGTVSTSMOcaxoPj9lBIw==",
            "BxF71ayMTBycMfVCj4/RuQ=="
        ],
        "X-CSE-MsgGUID": [
            "7uTR0OEgRiaLPBCpXV+grw==",
            "Nwzbj23TRCaYXGVn9ySU4w=="
        ],
        "X-IronPort-AV": [
            "E=McAfee;i=\"6800,10657,11764\"; a=\"77686992\"",
            "E=Sophos;i=\"6.23,192,1770624000\";\n   d=\"scan'208\";a=\"77686992\"",
            "E=Sophos;i=\"6.23,192,1770624000\";\n   d=\"scan'208\";a=\"231444801\""
        ],
        "X-ExtLoop1": "1",
        "From": "Andrei Otcheretianski <andrei.otcheretianski@intel.com>",
        "To": "hostap@lists.infradead.org",
        "Cc": "vamsin@qti.qualcomm.com,\n\tmaheshkkv@google.com,\n\tAndrei Otcheretianski <andrei.otcheretianski@intel.com>",
        "Subject": "[PATCH 00/92] Add NAN PASN pairing support",
        "Date": "Wed, 22 Apr 2026 15:22:51 +0300",
        "Message-ID": "<20260422122424.43776-1-andrei.otcheretianski@intel.com>",
        "X-Mailer": "git-send-email 2.53.0",
        "MIME-Version": "1.0",
        "X-CRM114-Version": "20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ",
        "X-CRM114-CacheID": "sfid-20260422_052436_851415_D1E12872 ",
        "X-CRM114-Status": "GOOD (  17.02  )",
        "X-Spam-Score": "-4.4 (----)",
        "X-Spam-Report": "Spam detection software,\n running on the system \"bombadil.infradead.org\",\n has NOT identified this incoming email as spam.  The original\n message has been attached to this so you can view it or label\n similar future email.  If you have any questions, see\n the administrator of that system for details.\n Content preview:  This series adds support for NAN PASN pairing. The pairing\n    can be performed using: - Opportunistic pairing (unauthenticated PASN) -\n   SAE-based authentication with password - NPK caching for pairing ver [...]    \n Content analysis details:   (-4.4 points, 5.0 required)\n  pts rule name              description\n ---- ----------------------\n --------------------------------------------------\n -2.3 RCVD_IN_DNSWL_MED      RBL: Sender listed at https://www.dnswl.org/,\n                             medium trust\n                             [192.198.163.17 listed in list.dnswl.org]\n  0.0 SPF_HELO_NONE          SPF: HELO does not publish an SPF Record\n -0.0 SPF_PASS               SPF: sender matches SPF record\n -0.1 DKIM_VALID             Message has at least one valid DKIM or DK\n signature\n -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from\n author's\n                             domain\n -0.1 DKIM_VALID_EF          Message has a valid DKIM or DK signature from\n                             envelope-from domain\n  0.1 DKIM_SIGNED            Message has a DKIM or DK signature,\n not necessarily valid\n -1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%\n                             [score: 0.0000]\n -0.0 DKIMWL_WL_HIGH         DKIMwl.org - High trust sender",
        "X-BeenThere": "hostap@lists.infradead.org",
        "X-Mailman-Version": "2.1.34",
        "Precedence": "list",
        "List-Id": "<hostap.lists.infradead.org>",
        "List-Unsubscribe": "<http://lists.infradead.org/mailman/options/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=unsubscribe>",
        "List-Archive": "<http://lists.infradead.org/pipermail/hostap/>",
        "List-Post": "<mailto:hostap@lists.infradead.org>",
        "List-Help": "<mailto:hostap-request@lists.infradead.org?subject=help>",
        "List-Subscribe": "<http://lists.infradead.org/mailman/listinfo/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=subscribe>",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Sender": "\"Hostap\" <hostap-bounces@lists.infradead.org>",
        "Errors-To": "hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org"
    },
    "content": "This series adds support for NAN PASN pairing.\nThe pairing can be performed using:\n- Opportunistic pairing (unauthenticated PASN)\n- SAE-based authentication with password\n- NPK caching for pairing verification\n\nThe series start with the previously submitted tests for bootstrapping\nand NAN data path and few more patches with enhancements and fixes.\n\nNote that test patches are still marked with RFC as the wireless-next\nkernel still doesn't have all the required support in mac80211_hwsim.\nFor testing purposes iwlwifi-next/mac80211_candidate kernel can be used.\n\nAndrei Otcheretianski (13):\n  tests: Add get_iface_addr() to wpasupplicant.py\n  tests: Add NAN data path tests\n  tests: Add NAN bootstrapping hwsim testing\n  NAN: Correctly configure SAE groups on responder\n  wpa_supplicant: Support NAN pairing abort\n  NAN: Add handle and requestor_instance_id parameters in BOOTSTRAP\n    events\n  NAN: Add NAN-PAIRING-REQUEST notification\n  wpa_supplicant: Move NAN notifications to notify.c\n  NAN: Add API to retrieve peer pairing configuration\n  NAN: Add key_mgmt and verify flag to NAN-PAIRING-REQUEST notification\n  NAN: Support NDP establishment with PASN cipher suites\n  NAN: Verify that only advertised CSIDs are used for NDP\n  NAN: Use pairing CSID in NDP establishment\n\nAvraham Stern (66):\n  PASN: Add support for PMK caching with PASN AKM\n  PASN: Remove an unused variable\n  NAN: Add pairing configuration\n  NAN: Add pairing capability indication attribute to NAN IE\n  NAN: Add a function for deriving NIRA's tag from NIK\n  NAN: Add NIK and NIK lifetime to NAN config\n  NAN: Add NIRA to NAN IE when pairing verification is enabled\n  wpa_supplicant: Indicate NAN pairing capabilities in publish/subscribe\n  wpa_supplicant: Set NAN Identity Key and its lifetime to NAN module\n  wpa_supplicant: Add PMKSA cache to NAN data\n  NAN: Save the NPBA from successful bootstrapping\n  NAN: Add a function for triggering NAN pairing\n  NAN: Keep NAN pairing data in one place\n  NAN: Handle PASN auth frame Tx status\n  wpa_supplicant: Add an API to trigger NAN pairing\n  NAN: Handle pairing PASN auth frame 1\n  NAN: Handle pairing PASN auth frame 2\n  NAN: Handle pairing PASN auth frame 3\n  NAN: Add control interface for triggering NAN pairing\n  wpa_supplicant: Implement NAN send_pasn() callback\n  wpa_supplicant: Redirect PASN auth Tx status to NAN module\n  wpa_supplicant: Pass Rx PASN auth frames to NAN module\n  wpa_supplicant: Implement the NAN pairing result callback\n  NAN: Add functions for deriving NPK and KEK from KDK\n  NAN: Derive KEK and NPK after pairing\n  NAN: Add NIK KDE and Key lifetime KDE definitions\n  NAN: Add a function for encrypting the key data using the KEK\n  NAN: Add function for decrypting the Key Data field\n  NAN: Send NIK after successful pairing\n  NAN: Add NAN KDE parsing to key data parsing\n  NAN: Handle followup frame after pairing is completed\n  wpa_supplicant: Store NIK received after pairing\n  NAN: Add NIRA to the list of parsed attributes\n  NAN: Parse NAN Identity Resolution attribute from SDFs\n  NAN: Set PASN data for pairing verification\n  NAN: Add NIRA to PASN frames for pairing verification\n  NAN: Add support for starting pairing verification\n  wpa_supplicant: Implement NAN get_npk_akmp() callback\n  NAN: Don't derive NPK and send NIK when pairing verification is\n    complete\n  nl80211: Register for PASN authentication frames for NAN interface\n  wpa_supplicant: Add NAN-NIK-RECEIVED notification\n  NAN: Add Cipher Suite Information attribute to publish messages\n  NAN: Add function for creating a list of PMKIDs for a given PMK\n  NAN: Add Security Context Information attribute to publish messages\n  wpa_supplicant: Add cipher_suites parameter to NAN_PUBLISH command\n  wpa_supplicant: Add nd_pmk parameter to NAN_PUBLISH command\n  NAN: Parse PMKIDs from the SCIA in publish messages\n  wpa_supplicant: Add PMKIDs list to NAN-DISCOVERY-RESULT event\n  NAN: Add supported cipher suite list to the discovery result callback\n  wpa_supplicant: Add supported cipher suites to NAN discovery result\n  NAN: Add set functions for NAN pairing configurations\n  NAN: Add an option to set NAN pairing config\n  NAN: Add an indication that a peer is paired\n  NAN: Pass protected SDFs to NAN module\n  nl80211: Register for dual protected SDF on NAN interface\n  nl80211: Support key operations (new/set/del) on non-netdev interfaces\n  NAN: Pass a schedule in pairing command\n  NAN: Set support for NAN pairing by default\n  NAN: Add the option to set the NIK and its lifetime\n  wpa_supplicant: Rename nan_config to nan_cluster_config\n  NAN: Send and receive only protected SDF frames if peer is paired\n  wpa_supplicant: Set MFP flag for NAN NMI station before pairing\n  NAN: Add a function for deriving ND-PMK from KDK\n  NAN: Derive and report ND-PMK after successful pairing\n  NAN: Send NAFs to paired peer as protected dual public action\n  tests: Add NAN hwsim pairing tests\n\nBenjamin Berg (1):\n  NAN: improve and fix NAN device type checking\n\nIlan Peer (12):\n  common: Set the operating class if it is known\n  nl80211: Track cookies for NAN Device action frames\n  nl80211: Register for NAFs and protected NAFs on NAN Data\n  nl80211: Extend the transmit cookie matching to NAN Data interface\n  wpa_supplicant: Do not enable Pairing and NDP if not supported by the\n    driver\n  NAN: Prepare module tests for NAF transmitted over NDIs\n  NAN: Support transmission and reception of NAFs in a secure manner\n  PASN: Allow verification with PASN base AKM\n  NAN: Unpair a peer before the NMI station is removed\n  NAN: Aggregate NAN discovery result information into a struct\n  NAN: Indicate if a service supports pairing and/or NPK/NIK caching\n  NAN: Indicate the service supported bootstrap and pairing methods\n\n src/ap/ieee802_11.c                |    3 +-\n src/ap/nan_usd_ap.c                |   21 +-\n src/common/ieee802_11_common.c     |   11 +-\n src/common/ieee802_11_common.h     |    2 +\n src/common/nan_de.c                |  371 ++++++-\n src/common/nan_de.h                |   36 +-\n src/common/nan_defs.h              |   46 +\n src/common/proximity_ranging.c     |    8 +-\n src/common/wpa_common.c            |   22 +\n src/common/wpa_common.h            |    4 +\n src/common/wpa_ctrl.h              |    9 +\n src/drivers/driver_nl80211.c       |  104 +-\n src/drivers/driver_nl80211_event.c |   38 +-\n src/nan/nan.c                      |  291 +++++-\n src/nan/nan.h                      |  178 +++-\n src/nan/nan_bootstrap.c            |   68 +-\n src/nan/nan_crypto.c               |  484 ++++++++-\n src/nan/nan_i.h                    |  138 ++-\n src/nan/nan_module_tests.c         |   41 +-\n src/nan/nan_module_tests.h         |    2 +\n src/nan/nan_pairing.c              | 1570 ++++++++++++++++++++++++++++\n src/nan/nan_sec.c                  |   33 +-\n src/nan/nan_util.c                 |   60 +-\n src/p2p/p2p.c                      |    6 +-\n src/pasn/pasn_common.c             |    8 -\n src/pasn/pasn_common.h             |    6 +-\n src/pasn/pasn_initiator.c          |   17 +-\n src/pasn/pasn_responder.c          |   31 +-\n tests/hwsim/test_nan.py            |  793 +++++++++++++-\n tests/hwsim/wpasupplicant.py       |   18 +\n wpa_supplicant/Makefile            |    3 +\n wpa_supplicant/config.h            |    5 +\n wpa_supplicant/ctrl_iface.c        |   45 +\n wpa_supplicant/events.c            |   29 +-\n wpa_supplicant/nan_supplicant.c    |  843 +++++++++++++--\n wpa_supplicant/nan_supplicant.h    |   19 +\n wpa_supplicant/notify.c            |  281 ++++-\n wpa_supplicant/notify.h            |   50 +-\n wpa_supplicant/wpa_cli.c           |   21 +\n wpa_supplicant/wpa_supplicant.c    |    2 +-\n wpa_supplicant/wpa_supplicant_i.h  |   11 +-\n 41 files changed, 5379 insertions(+), 349 deletions(-)\n create mode 100644 src/nan/nan_pairing.c"
}