get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/1.2/patches/2226378/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2226378,
    "url": "http://patchwork.ozlabs.org/api/1.2/patches/2226378/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/hostap/patch/20260422122424.43776-32-andrei.otcheretianski@intel.com/",
    "project": {
        "id": 22,
        "url": "http://patchwork.ozlabs.org/api/1.2/projects/22/?format=api",
        "name": "HostAP Development",
        "link_name": "hostap",
        "list_id": "hostap.lists.infradead.org",
        "list_email": "hostap@lists.infradead.org",
        "web_url": "",
        "scm_url": "",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260422122424.43776-32-andrei.otcheretianski@intel.com>",
    "list_archive_url": null,
    "date": "2026-04-22T12:23:22",
    "name": "[31/92] NAN: Derive KEK and NPK after pairing",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "8eed98385ef06becf63e3ad10f308cf0d100f1cf",
    "submitter": {
        "id": 62065,
        "url": "http://patchwork.ozlabs.org/api/1.2/people/62065/?format=api",
        "name": "Andrei Otcheretianski",
        "email": "andrei.otcheretianski@intel.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/hostap/patch/20260422122424.43776-32-andrei.otcheretianski@intel.com/mbox/",
    "series": [
        {
            "id": 501001,
            "url": "http://patchwork.ozlabs.org/api/1.2/series/501001/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/hostap/list/?series=501001",
            "date": "2026-04-22T12:23:05",
            "name": "Add NAN PASN pairing support",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/501001/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2226378/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2226378/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "\n <hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=I88paJYD;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=intel.com header.i=@intel.com header.a=rsa-sha256\n header.s=Intel header.b=FKKGco1c;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0z4Q0bK4z1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 22:27:02 +1000 (AEST)",
            "from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wFWet-0000000A4d1-3BCI;\n\tWed, 22 Apr 2026 12:26:23 +0000",
            "from mgamail.intel.com ([192.198.163.17])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wFWdx-0000000A34C-30mi\n\tfor hostap@lists.infradead.org;\n\tWed, 22 Apr 2026 12:25:33 +0000",
            "from orviesa010.jf.intel.com ([10.64.159.150])\n  by fmvoesa111.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 22 Apr 2026 05:25:25 -0700",
            "from iapp347.iil.intel.com (HELO 87c02287900a.iil.intel.com)\n ([10.167.28.6])\n  by orviesa010-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 22 Apr 2026 05:25:24 -0700"
        ],
        "DKIM-Signature": [
            "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To:\n\tMessage-ID:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description:\n\tResent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:\n\tList-Owner; bh=5Qa7qEbyEng1pOAQfIeU4KbXVQSzVMTXD5LA4ZtZTYo=; b=I88paJYDdTRzXi\n\tL+f/Duov/Vy0KCVclkueN5ZqndP3MBPLo/oYOE31ROOrHEyOrl6CANwn6WElZBdt8zK32nvLFrNKb\n\tonujLhleT83QhjdSQSv7cQxo0mgjC5bN3EhfJRM6ZdVH+cesFcUkecr6I8RbPlaePsn+MasGBfLrV\n\trsMagA5oDToAyu8xd6+/948Gu4ING02eJbZJePx4rvT8I7MXiiPWCMDNYyr7sLkslV27OuBhooXaC\n\tnSuCq44c8s4rvlw2EU3FKjcw/yMAXjlnJv021tztB59OjLl/wo3BkoEss/Vi/mz0xAeQkbAGYtZ3L\n\tLpri30yxc8FvE2oucatw==;",
            "v=1; a=rsa-sha256; c=relaxed/simple;\n  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n  t=1776860725; x=1808396725;\n  h=from:to:cc:subject:date:message-id:in-reply-to:\n   references:mime-version:content-transfer-encoding;\n  bh=90cB1H6aYFzJetuw7lPabbLUHDCz8sm/Nc8uI/R6U+E=;\n  b=FKKGco1cn2Exwr4Fos2qUzl07b2im3EpLO8GeLcnSNRYvczb8eDBrh5g\n   PetCXMu6d0mF6pUSdBNS2JbRK6FLT1OJFgUhRcYrS/OpBElry34n1+uyC\n   O7P1n+b3N0gHfSraLh/UJAR9FpXgAU6LSWp2LOjayNg4Oc3zZCPnuvyrR\n   HjLPHtbKewS1AaLfBnydVn1T43B5FwWTKBAKUzyBJLfSbUi3SCLRBiiw5\n   HoI2N5Rh+RmmR1LqZZSzoRM5zsjLmA7eseWNL0F6uA0ywHxX+gq1uBfZ8\n   wKkmJy1w/O9l6ZOERvn78e8B/0/fiz82X7PLezJ+vns2ZdfW4o5+IPBI0\n   Q==;"
        ],
        "X-CSE-ConnectionGUID": [
            "t3crwF4ETsmqykZMvtpuYQ==",
            "a/J3oGIuSsCUWj7NpFsioA=="
        ],
        "X-CSE-MsgGUID": [
            "ua2O4iwIR4Wu998qG8rZBA==",
            "jhkJ4knGS7abMDkjapzKLA=="
        ],
        "X-IronPort-AV": [
            "E=McAfee;i=\"6800,10657,11764\"; a=\"77687291\"",
            "E=Sophos;i=\"6.23,192,1770624000\";\n   d=\"scan'208\";a=\"77687291\"",
            "E=Sophos;i=\"6.23,192,1770624000\";\n   d=\"scan'208\";a=\"231444978\""
        ],
        "X-ExtLoop1": "1",
        "From": "Andrei Otcheretianski <andrei.otcheretianski@intel.com>",
        "To": "hostap@lists.infradead.org",
        "Cc": "vamsin@qti.qualcomm.com,\n\tmaheshkkv@google.com,\n\tAvraham Stern <avraham.stern@intel.com>",
        "Subject": "[PATCH 31/92] NAN: Derive KEK and NPK after pairing",
        "Date": "Wed, 22 Apr 2026 15:23:22 +0300",
        "Message-ID": "<20260422122424.43776-32-andrei.otcheretianski@intel.com>",
        "X-Mailer": "git-send-email 2.53.0",
        "In-Reply-To": "<20260422122424.43776-1-andrei.otcheretianski@intel.com>",
        "References": "<20260422122424.43776-1-andrei.otcheretianski@intel.com>",
        "MIME-Version": "1.0",
        "X-CRM114-Version": "20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ",
        "X-CRM114-CacheID": "sfid-20260422_052525_879756_C4E9294D ",
        "X-CRM114-Status": "GOOD (  14.65  )",
        "X-Spam-Score": "-4.4 (----)",
        "X-Spam-Report": "Spam detection software,\n running on the system \"bombadil.infradead.org\",\n has NOT identified this incoming email as spam.  The original\n message has been attached to this so you can view it or label\n similar future email.  If you have any questions, see\n the administrator of that system for details.\n Content preview:  From: Avraham Stern <avraham.stern@intel.com> After a\n successful\n    pairing, derive the KEK that will be used to encrypt the Key Data field of\n    the NAN Shared Key Descriptor attribute in the upcoming followup messages\n    for the NIK exchange. In additio [...]\n Content analysis details:   (-4.4 points, 5.0 required)\n  pts rule name              description\n ---- ----------------------\n --------------------------------------------------\n -2.3 RCVD_IN_DNSWL_MED      RBL: Sender listed at https://www.dnswl.org/,\n                             medium trust\n                             [192.198.163.17 listed in list.dnswl.org]\n  0.0 SPF_HELO_NONE          SPF: HELO does not publish an SPF Record\n -0.0 SPF_PASS               SPF: sender matches SPF record\n -0.1 DKIM_VALID             Message has at least one valid DKIM or DK\n signature\n -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from\n author's\n                             domain\n -0.1 DKIM_VALID_EF          Message has a valid DKIM or DK signature from\n                             envelope-from domain\n  0.1 DKIM_SIGNED            Message has a DKIM or DK signature,\n not necessarily valid\n -1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%\n                             [score: 0.0000]\n -0.0 DKIMWL_WL_HIGH         DKIMwl.org - High trust sender",
        "X-BeenThere": "hostap@lists.infradead.org",
        "X-Mailman-Version": "2.1.34",
        "Precedence": "list",
        "List-Id": "<hostap.lists.infradead.org>",
        "List-Unsubscribe": "<http://lists.infradead.org/mailman/options/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=unsubscribe>",
        "List-Archive": "<http://lists.infradead.org/pipermail/hostap/>",
        "List-Post": "<mailto:hostap@lists.infradead.org>",
        "List-Help": "<mailto:hostap-request@lists.infradead.org?subject=help>",
        "List-Subscribe": "<http://lists.infradead.org/mailman/listinfo/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=subscribe>",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Sender": "\"Hostap\" <hostap-bounces@lists.infradead.org>",
        "Errors-To": "hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org"
    },
    "content": "From: Avraham Stern <avraham.stern@intel.com>\n\nAfter a successful pairing, derive the KEK that will be used to\nencrypt the Key Data field of the NAN Shared Key Descriptor attribute\nin the upcoming followup messages for the NIK exchange.\nIn addition, if NPK caching is enabled and pairing was performed via\nopportunistic bootstarpping, derive the NPK for NPK caching and store\nit in the PASN data.\n\nSigned-off-by: Avraham Stern <avraham.stern@intel.com>\n---\n src/nan/nan_pairing.c | 71 +++++++++++++++++++++++++++++++++++++++++++\n 1 file changed, 71 insertions(+)",
    "diff": "diff --git a/src/nan/nan_pairing.c b/src/nan/nan_pairing.c\nindex e5115e13dc..9a60743117 100644\n--- a/src/nan/nan_pairing.c\n+++ b/src/nan/nan_pairing.c\n@@ -439,6 +439,73 @@ int nan_pairing_initiate_pasn_auth(struct nan_data *nan_data, const u8 *addr,\n }\n \n \n+/*\n+ * nan_pairing_done - Derive NPK caching related keys after successful pairing\n+ *\n+ * @nan_data: NAN interface data\n+ * @peer: NAN peer with which pairing is being completed\n+ *\n+ * This function completes the NAN pairing process by deriving the necessary\n+ * cryptographic keys (KEK and NPK for opportunistic pairing) when NPK caching\n+ * is enabled.\n+ */\n+static void nan_pairing_done(struct nan_data *nan_data, struct nan_peer *peer)\n+{\n+\tu8 npk[NAN_NPK_LEN];\n+\tstruct pasn_data *pasn = peer->pairing.pasn;\n+\tint cipher = pasn_get_cipher(pasn);\n+\tenum nan_cipher_suite_id csid;\n+\tu8 *initiator_nmi, *responder_nmi;\n+\tint ret;\n+\n+\tif (!nan_data->cfg->pairing_cfg.npk_caching ||\n+\t    !peer->pairing.pairing_cfg.npk_caching)\n+\t\treturn;\n+\n+\twpa_printf(MSG_DEBUG, \"NAN: Pairing: Derive KEK after PASN pairing\");\n+\n+\tif (peer->pairing.self_pairing_role == NAN_PAIRING_ROLE_INITIATOR) {\n+\t\tinitiator_nmi = nan_data->cfg->nmi_addr;\n+\t\tresponder_nmi = peer->nmi_addr;\n+\t} else {\n+\t\tinitiator_nmi = peer->nmi_addr;\n+\t\tresponder_nmi = nan_data->cfg->nmi_addr;\n+\t}\n+\n+\tcsid = cipher == WPA_CIPHER_GCMP_256 ? NAN_CS_PK_PASN_256 :\n+\t\t\t\t\t       NAN_CS_PK_PASN_128;\n+\n+\tret = nan_crypto_derive_kek(pasn->ptk.kdk, pasn->ptk.kdk_len, csid,\n+\t\t\t\t    initiator_nmi, responder_nmi,\n+\t\t\t\t    &pasn->ptk);\n+\tif (ret) {\n+\t\twpa_printf(MSG_DEBUG, \"NAN: Pairing: Failed to derive KEK\");\n+\t\treturn;\n+\t}\n+\n+\t/* For SAE AKMP, NPK was already derived inside the PASN module and\n+\t * stored in pasn->pmk.\n+\t * For PASN AKMP, derive NPK here and configure it to the PASN module.\n+\t * The NPK will be stored alongside the peer's NIK when the NIK is\n+\t * received from the peer.\n+\t */\n+\tif (pasn_get_akmp(pasn) != WPA_KEY_MGMT_PASN)\n+\t\treturn;\n+\n+\twpa_printf(MSG_DEBUG, \"NAN: Pairing: Derive NPK after PASN pairing\");\n+\n+\tret = nan_crypto_derive_npk(pasn->ptk.kdk, pasn->ptk.kdk_len, csid,\n+\t\t\t\t    initiator_nmi, responder_nmi, npk,\n+\t\t\t\t    sizeof(npk));\n+\tif (ret) {\n+\t\twpa_printf(MSG_DEBUG, \"NAN: Pairing: Failed to derive NPK\");\n+\t} else {\n+\t\tos_memcpy(pasn->pmk, npk, NAN_NPK_LEN);\n+\t\tpasn->pmk_len = NAN_NPK_LEN;\n+\t}\n+}\n+\n+\n /*\n  * nan_pairing_pasn_auth_tx_status - Handle PASN authentication frame TX status\n  *\n@@ -485,6 +552,8 @@ int nan_pairing_pasn_auth_tx_status(struct nan_data *nan, const u8 *data,\n \t\t\tnan_pairing_deinit_peer(peer);\n \t\t\treturn -1;\n \t\t}\n+\n+\t\tnan_pairing_done(nan, peer);\n \t}\n \n \twpabuf_free(pasn->frame);\n@@ -706,6 +775,8 @@ static int nan_pairing_handle_auth_3(struct nan_data *nan_data,\n \t\t\t\t\t       &pasn->ptk);\n \tif (ret < 0 || status != WLAN_STATUS_SUCCESS)\n \t\tnan_pairing_deinit_peer(peer);\n+\telse if (status == WLAN_STATUS_SUCCESS)\n+\t\tnan_pairing_done(nan_data, peer);\n \n \t/* Don't clear PASN data if pairing is successful. If caching is\n \t * enabled, it will still be needed when the NIK is received from\n",
    "prefixes": [
        "31/92"
    ]
}