get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/1.2/patches/2226356/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2226356,
    "url": "http://patchwork.ozlabs.org/api/1.2/patches/2226356/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/hostap/patch/20260422122424.43776-4-andrei.otcheretianski@intel.com/",
    "project": {
        "id": 22,
        "url": "http://patchwork.ozlabs.org/api/1.2/projects/22/?format=api",
        "name": "HostAP Development",
        "link_name": "hostap",
        "list_id": "hostap.lists.infradead.org",
        "list_email": "hostap@lists.infradead.org",
        "web_url": "",
        "scm_url": "",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260422122424.43776-4-andrei.otcheretianski@intel.com>",
    "list_archive_url": null,
    "date": "2026-04-22T12:22:54",
    "name": "[RFC,03/92] tests: Add NAN bootstrapping hwsim testing",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "1eb1ba872f7e6f58fdde3f5ca5f41c9632a02b5e",
    "submitter": {
        "id": 62065,
        "url": "http://patchwork.ozlabs.org/api/1.2/people/62065/?format=api",
        "name": "Andrei Otcheretianski",
        "email": "andrei.otcheretianski@intel.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/hostap/patch/20260422122424.43776-4-andrei.otcheretianski@intel.com/mbox/",
    "series": [
        {
            "id": 501001,
            "url": "http://patchwork.ozlabs.org/api/1.2/series/501001/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/hostap/list/?series=501001",
            "date": "2026-04-22T12:23:05",
            "name": "Add NAN PASN pairing support",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/501001/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2226356/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2226356/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "\n <hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=NDWGootT;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=intel.com header.i=@intel.com header.a=rsa-sha256\n header.s=Intel header.b=gPXZkVAv;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0z2h6PJBz23Zh\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 22:25:30 +1000 (AEST)",
            "from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wFWdF-0000000A2N6-3oYQ;\n\tWed, 22 Apr 2026 12:24:41 +0000",
            "from mgamail.intel.com ([192.198.163.17])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wFWdD-0000000A2Kt-01Ms\n\tfor hostap@lists.infradead.org;\n\tWed, 22 Apr 2026 12:24:40 +0000",
            "from orviesa010.jf.intel.com ([10.64.159.150])\n  by fmvoesa111.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 22 Apr 2026 05:24:38 -0700",
            "from iapp347.iil.intel.com (HELO 87c02287900a.iil.intel.com)\n ([10.167.28.6])\n  by orviesa010-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 22 Apr 2026 05:24:38 -0700"
        ],
        "DKIM-Signature": [
            "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To:\n\tMessage-ID:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description:\n\tResent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:\n\tList-Owner; bh=OKsXx6JD1iLkTTWXLugOgM5UDIXo4tUc8PeQv/IWSW8=; b=NDWGootTCgkW9+\n\tlAP6dhHvoO5e1NJIO5S++2D7qJ6TRknk5zTX7C812NiY7UWIyx1zOfccrgLvrDSOpB6Z/mf6NXtfn\n\t3sW5MaqEeV29/E5aGVb6hAy5GG8WEXwO5YmDvSA0vQkNasjCVyrdH+WWWbrILmAEgoJy55bJ0Qacq\n\to3ZvRuS/dt5A2hATXWimVR8CdBhaYl6SAgJQXNY8A7x6rBBgaDftGvuL4JjqomamSMLfQ8LmvKVIJ\n\tvDSG1aKGkybhyn6xLyUL1SivLTuM8ve90U8vaOh5AEf3Oe1LcPtbLJMy+NUU543YWMbdzHe/6ZvuY\n\tlVnXJqC7pexSNdmsP0AQ==;",
            "v=1; a=rsa-sha256; c=relaxed/simple;\n  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n  t=1776860679; x=1808396679;\n  h=from:to:cc:subject:date:message-id:in-reply-to:\n   references:mime-version:content-transfer-encoding;\n  bh=6v4NCoELwtKEjngBYVn1RUFx+4uALqBQ/TtXx90VIYM=;\n  b=gPXZkVAvdKsNxIQH+QIB3ICyP42OGdrdVuWL1T4m5eAoLpEnecVRX30t\n   DUJn3uRSAHgA+tDxvRel7N/IzJXWMpgqD6iV17NnjK0q/FqR8W9BRV8PR\n   9+WG1QfgLNXKJA4yWz3twqmYNVBftkPoj/yE8Ia5zrCuRBAzEW705l4vH\n   J2pEhH/eF7C0G6K3oMeauYk/jEwpCC1qAxQ1dliE04P/1xoUTwqlF1zoa\n   qKBGxQBPghXexYZIobpJ54G8I+ZQlM0KJQFXS2cWUieMvMTF8cSA+njGZ\n   OhguZzeU7gtU/qaI9VqgNkXOqz30u3UgXwlATaCKewLDv8JCWeZKUGqrP\n   g==;"
        ],
        "X-CSE-ConnectionGUID": [
            "MSCcHZr0SXaobhD3oVHneg==",
            "TBKrs6GMTAmB+WHvxWkctQ=="
        ],
        "X-CSE-MsgGUID": [
            "p8dGqYEgS/Ghh96vg7WBlA==",
            "Y0s3IashThSObJuB0ulWlQ=="
        ],
        "X-IronPort-AV": [
            "E=McAfee;i=\"6800,10657,11764\"; a=\"77687082\"",
            "E=Sophos;i=\"6.23,192,1770624000\";\n   d=\"scan'208\";a=\"77687082\"",
            "E=Sophos;i=\"6.23,192,1770624000\";\n   d=\"scan'208\";a=\"231444814\""
        ],
        "X-ExtLoop1": "1",
        "From": "Andrei Otcheretianski <andrei.otcheretianski@intel.com>",
        "To": "hostap@lists.infradead.org",
        "Cc": "vamsin@qti.qualcomm.com,\n\tmaheshkkv@google.com,\n\tAndrei Otcheretianski <andrei.otcheretianski@intel.com>,\n\tIlan Peer <ilan.peer@intel.com>",
        "Subject": "[RFC 03/92] tests: Add NAN bootstrapping hwsim testing",
        "Date": "Wed, 22 Apr 2026 15:22:54 +0300",
        "Message-ID": "<20260422122424.43776-4-andrei.otcheretianski@intel.com>",
        "X-Mailer": "git-send-email 2.53.0",
        "In-Reply-To": "<20260422122424.43776-1-andrei.otcheretianski@intel.com>",
        "References": "<20260422122424.43776-1-andrei.otcheretianski@intel.com>",
        "MIME-Version": "1.0",
        "X-CRM114-Version": "20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ",
        "X-CRM114-CacheID": "sfid-20260422_052439_054445_0524CBB0 ",
        "X-CRM114-Status": "GOOD (  12.23  )",
        "X-Spam-Score": "-4.4 (----)",
        "X-Spam-Report": "Spam detection software,\n running on the system \"bombadil.infradead.org\",\n has NOT identified this incoming email as spam.  The original\n message has been attached to this so you can view it or label\n similar future email.  If you have any questions, see\n the administrator of that system for details.\n Content preview:  Add the following NAN bootstrap tests: - Opportunistic NAN\n    bootstrap with auto accept. - NAN bootstrap using passphrase with\n comeback.\n    - NAN bootstrap using passphrase with delays and misconfiguration on the\n   publisher. - NAN bootstrap requ [...]\n Content analysis details:   (-4.4 points, 5.0 required)\n  pts rule name              description\n ---- ----------------------\n --------------------------------------------------\n -2.3 RCVD_IN_DNSWL_MED      RBL: Sender listed at https://www.dnswl.org/,\n                             medium trust\n                             [192.198.163.17 listed in list.dnswl.org]\n  0.0 SPF_HELO_NONE          SPF: HELO does not publish an SPF Record\n -0.0 SPF_PASS               SPF: sender matches SPF record\n -0.1 DKIM_VALID             Message has at least one valid DKIM or DK\n signature\n -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from\n author's\n                             domain\n -0.1 DKIM_VALID_EF          Message has a valid DKIM or DK signature from\n                             envelope-from domain\n  0.1 DKIM_SIGNED            Message has a DKIM or DK signature,\n not necessarily valid\n -1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%\n                             [score: 0.0000]\n -0.0 DKIMWL_WL_HIGH         DKIMwl.org - High trust sender",
        "X-BeenThere": "hostap@lists.infradead.org",
        "X-Mailman-Version": "2.1.34",
        "Precedence": "list",
        "List-Id": "<hostap.lists.infradead.org>",
        "List-Unsubscribe": "<http://lists.infradead.org/mailman/options/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=unsubscribe>",
        "List-Archive": "<http://lists.infradead.org/pipermail/hostap/>",
        "List-Post": "<mailto:hostap@lists.infradead.org>",
        "List-Help": "<mailto:hostap-request@lists.infradead.org?subject=help>",
        "List-Subscribe": "<http://lists.infradead.org/mailman/listinfo/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=subscribe>",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Sender": "\"Hostap\" <hostap-bounces@lists.infradead.org>",
        "Errors-To": "hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org"
    },
    "content": "Add the following NAN bootstrap tests:\n\n- Opportunistic NAN bootstrap with auto accept.\n- NAN bootstrap using passphrase with comeback.\n- NAN bootstrap using passphrase with delays and misconfiguration\n  on the publisher.\n- NAN bootstrap request without a response from the peer.\n\nSigned-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com>\nSigned-off-by: Ilan Peer <ilan.peer@intel.com>\n---\n tests/hwsim/test_nan.py | 139 +++++++++++++++++++++++++++++++++++++++-\n 1 file changed, 138 insertions(+), 1 deletion(-)",
    "diff": "diff --git a/tests/hwsim/test_nan.py b/tests/hwsim/test_nan.py\nindex d0c8c184df..7278b4d79a 100644\n--- a/tests/hwsim/test_nan.py\n+++ b/tests/hwsim/test_nan.py\n@@ -94,7 +94,7 @@ class NanDevice:\n \n     def publish(self, service_name, ssi=None, unsolicited=1, solicited=1,\n                 sync=1, match_filter_rx=None, match_filter_tx=None,\n-                close_proximity=0):\n+                close_proximity=0, pbm=0):\n \n         cmd = f\"NAN_PUBLISH service_name={service_name} sync={sync} srv_proto_type=2 fsd=0\"\n \n@@ -113,6 +113,9 @@ class NanDevice:\n         if match_filter_tx:\n             cmd += f\" match_filter_tx={match_filter_tx}\"\n \n+        if pbm:\n+            cmd += f\" pbm={pbm}\"\n+\n         return self.wpas.request(cmd)\n \n     def schedule_config(self, *chans, map_id=1):\n@@ -210,6 +213,20 @@ class NanDevice:\n \n         return self.wpas.request(cmd)\n \n+    def bootstrap(self, peer, handle, peer_instance_id, pbm, auth=False):\n+        logger.info(f\"Bootstrapping NAN with peer {peer} pbm={pbm} auth={auth} on {self.ifname}\")\n+        auth_param = \" auth\" if auth else \"\"\n+\n+        if \"OK\" not in self.wpas.request(f\"NAN_BOOTSTRAP {peer} handle={handle} \"\n+                         f\"req_instance_id={peer_instance_id} method={pbm}\" + auth_param):\n+            raise Exception(f\"{self.ifname}: failed to bootstrap with {peer}\")\n+\n+    def bootstrap_reset(self, peer):\n+        logger.info(f\"Reset Bootstrapping NAN with peer {peer}\")\n+\n+        if \"OK\" not in self.wpas.request(f\"NAN_BOOTSTRAP_RESET {peer}\"):\n+            raise Exception(f\"{self.ifname}: failed to reset bootstrap with {peer}\")\n+\n     def cancel_publish(self, publish_id):\n         logger.info(f\"Cancelling publish with ID {publish_id} on {self.ifname}\")\n         if \"OK\" not in self.wpas.request(f\"NAN_CANCEL_PUBLISH publish_id={publish_id}\"):\n@@ -1152,3 +1169,123 @@ def test_nan_dp_wrong_pwd(dev, apdev, params):\n def test_nan_dp_pmk(dev, apdev, params):\n     \"\"\"NAN DP - 3way NDL + SK CCMP security with PMK\"\"\"\n     run_nan_dp(counter=True, csid=1, use_pmk=True)\n+\n+def nan_pre_bootstrap(pub, sub, pmb=0x1):\n+    paddr = pub.wpas.own_addr()\n+    saddr = sub.wpas.own_addr()\n+\n+    pssi = \"aabbccdd\"\n+    sssi = \"ddbbccaa\"\n+\n+    pid = pub.publish(\"test_service\", ssi=pssi, unsolicited=0, pbm=pmb)\n+    sid = sub.subscribe(\"test_service\", ssi=sssi)\n+\n+    logger.info(f\"Publish ID: {pid}, Subscribe ID: {sid}\")\n+\n+    ev = sub.wpas.wait_event([\"NAN-DISCOVERY-RESULT\"], timeout=2)\n+    if ev is None:\n+        raise Exception(\"NAN-DISCOVERY-RESULT event not seen\")\n+\n+    nan_sync_verify_event(ev, paddr, pid, sid, pssi)\n+\n+    ev = pub.wpas.wait_event([\"NAN-REPLIED\"], timeout=2)\n+    if ev is None:\n+        raise Exception(\"NAN-REPLIED event not seen\")\n+\n+    nan_sync_verify_event(ev, saddr, pid, sid, sssi)\n+\n+    return pid, sid, paddr, saddr\n+\n+def test_nan_bootstrap_opportunistic(dev, apdev, params):\n+    \"\"\"NAN opportunistic bootstrap with auto accept\"\"\"\n+    with hwsim_nan_radios(count=2) as [wpas1, wpas2], \\\n+        NanDevice(wpas1, \"nan0\") as pub, NanDevice(wpas2, \"nan1\") as sub:\n+        pid, sid, paddr, saddr = nan_pre_bootstrap(pub, sub)\n+\n+        sub.bootstrap(paddr, sid, pid, 0x1)\n+\n+        ev = sub.wpas.wait_event([\"NAN-BOOTSTRAP-SUCCESS\"], timeout=2)\n+        if ev is None:\n+            raise Exception(\"NAN-BOOTSTRAP-SUCCESS event not seen\")\n+\n+        ev = pub.wpas.wait_event([\"NAN-BOOTSTRAP-SUCCESS\"], timeout=2)\n+        if ev is None:\n+            raise Exception(\"NAN-BOOTSTRAP-SUCCESS event not seen\")\n+\n+def test_nan_bootstrap_password(dev, apdev, params):\n+    \"\"\"NAN bootstrap with password\"\"\"\n+    with hwsim_nan_radios(count=2) as [wpas1, wpas2], \\\n+        NanDevice(wpas1, \"nan0\") as pub, NanDevice(wpas2, \"nan1\") as sub:\n+        pid, sid, paddr, saddr = nan_pre_bootstrap(pub, sub, pmb=0x4)\n+\n+        # request bootstrap with passphrase using passpharse keypad method (BIT 6)\n+        sub.bootstrap(paddr, sid, pid, 0x40)\n+\n+        ev = pub.wpas.wait_event([\"NAN-BOOTSTRAP-REQUEST\"], timeout=2)\n+        if ev is None or \"peer_nmi=\" + saddr not in ev or \"pbm=0x0004\" not in ev:\n+            raise Exception(\"NAN-BOOTSTRAP-REQUEST event not seen\")\n+\n+        pub.bootstrap(saddr, pid, sid, 0x4, auth=True)\n+        ev = sub.wpas.wait_event([\"NAN-BOOTSTRAP-SUCCESS\"], timeout=2)\n+        if ev is None or \"pbm=0x0040\" not in ev:\n+            raise Exception(\"NAN-BOOTSTRAP-SUCCESS event not seen (subscriber)\")\n+\n+        ev = pub.wpas.wait_event([\"NAN-BOOTSTRAP-SUCCESS\"], timeout=2)\n+        if ev is None or \"pbm=0x0004\" not in ev:\n+            raise Exception(\"NAN-BOOTSTRAP-SUCCESS event not seen (publisher)\")\n+\n+def test_nan_bootstrap_password_with_delays(dev, apdev, params):\n+    \"\"\"NAN bootstrap with password with delay and wrong method\"\"\"\n+    with hwsim_nan_radios(count=2) as [wpas1, wpas2], \\\n+        NanDevice(wpas1, \"nan0\") as pub, NanDevice(wpas2, \"nan1\") as sub:\n+        pid, sid, paddr, saddr = nan_pre_bootstrap(pub, sub, pmb=0x4)\n+\n+        # request bootstrap with passphrase using passpharse keypad method (BIT 6)\n+        sub.bootstrap(paddr, sid, pid, 0x40)\n+\n+        ev = pub.wpas.wait_event([\"NAN-BOOTSTRAP-REQUEST\"], timeout=2)\n+        if ev is None or \"peer_nmi=\" + saddr not in ev or \"pbm=0x0004\" not in ev:\n+            raise Exception(\"NAN-BOOTSTRAP-REQUEST event not seen\")\n+\n+        # To not authenticate the peer for 10 seconds and verify that no success event is sent\n+        ev = sub.wpas.wait_event([\"NAN-BOOTSTRAP-SUCCESS\"], timeout=10)\n+        if ev is not None:\n+            raise Exception(\"Got unexpected NAN-BOOTSTRAP-SUCCESS event seen (subscriber)\")\n+\n+        # now try with wrong method (QR code display, BIT 3)\n+        pub.bootstrap(saddr, pid, sid, 0x8, auth=True)\n+        ev = sub.wpas.wait_event([\"NAN-BOOTSTRAP-SUCCESS\"], timeout=5)\n+        if ev is not None:\n+            raise Exception(\"Got unexpected NAN-BOOTSTRAP-SUCCESS event seen (subscriber)\")\n+\n+        # now authenticate properly\n+        pub.bootstrap(saddr, pid, sid, 0x4, auth=True)\n+        ev = sub.wpas.wait_event([\"NAN-BOOTSTRAP-SUCCESS\"], timeout=2)\n+        if ev is None or \"pbm=0x0040\" not in ev:\n+            raise Exception(\"NAN-BOOTSTRAP-SUCCESS event not seen (subscriber)\")\n+\n+        ev = pub.wpas.wait_event([\"NAN-BOOTSTRAP-SUCCESS\"], timeout=2)\n+        if ev is None or \"pbm=0x0004\" not in ev:\n+            raise Exception(\"NAN-BOOTSTRAP-SUCCESS event not seen (publisher)\")\n+\n+        pub.bootstrap_reset(saddr)\n+        sub.bootstrap_reset(paddr)\n+\n+def test_nan_bootstrap_password_no_response(dev, apdev, params):\n+    \"\"\"NAN bootstrap with password with no response from publisher\"\"\"\n+    with hwsim_nan_radios(count=2) as [wpas1, wpas2], \\\n+        NanDevice(wpas1, \"nan0\") as pub, NanDevice(wpas2, \"nan1\") as sub:\n+        pid, sid, paddr, saddr = nan_pre_bootstrap(pub, sub, pmb=0x4)\n+\n+        # cancel the publish to simulate no response\n+        pub.cancel_publish(pid)\n+\n+        # request bootstrap with passphrase using passpharse keypad method (BIT 6)\n+        sub.bootstrap(paddr, sid, pid, 0x40)\n+\n+        ev = sub.wpas.wait_event([\"NAN-BOOTSTRAP-SUCCESS\"], timeout=10)\n+        if ev is not None:\n+            raise Exception(\"Got unexpected NAN-BOOTSTRAP-SUCCESS event seen (subscriber)\")\n+\n+        sub.bootstrap_reset(paddr)\n+        sub.cancel_subscribe(sid)\n",
    "prefixes": [
        "RFC",
        "03/92"
    ]
}