get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/1.2/patches/2226391/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2226391,
    "url": "http://patchwork.ozlabs.org/api/1.2/patches/2226391/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/hostap/patch/20260422122424.43776-45-andrei.otcheretianski@intel.com/",
    "project": {
        "id": 22,
        "url": "http://patchwork.ozlabs.org/api/1.2/projects/22/?format=api",
        "name": "HostAP Development",
        "link_name": "hostap",
        "list_id": "hostap.lists.infradead.org",
        "list_email": "hostap@lists.infradead.org",
        "web_url": "",
        "scm_url": "",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260422122424.43776-45-andrei.otcheretianski@intel.com>",
    "list_archive_url": null,
    "date": "2026-04-22T12:23:35",
    "name": "[44/92] wpa_supplicant: Implement NAN get_npk_akmp() callback",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "1e7cab03e2b686fed02efdc01271352764e5b217",
    "submitter": {
        "id": 62065,
        "url": "http://patchwork.ozlabs.org/api/1.2/people/62065/?format=api",
        "name": "Andrei Otcheretianski",
        "email": "andrei.otcheretianski@intel.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/hostap/patch/20260422122424.43776-45-andrei.otcheretianski@intel.com/mbox/",
    "series": [
        {
            "id": 501001,
            "url": "http://patchwork.ozlabs.org/api/1.2/series/501001/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/hostap/list/?series=501001",
            "date": "2026-04-22T12:23:05",
            "name": "Add NAN PASN pairing support",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/501001/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2226391/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2226391/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "\n <hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=ceuuZFE/;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=intel.com header.i=@intel.com header.a=rsa-sha256\n header.s=Intel header.b=P5UIla6T;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0z5w3ctQz1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 22:28:20 +1000 (AEST)",
            "from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wFWgC-0000000A6Sk-2B3h;\n\tWed, 22 Apr 2026 12:27:44 +0000",
            "from mgamail.intel.com ([192.198.163.17])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wFWef-0000000A34B-0jlQ\n\tfor hostap@lists.infradead.org;\n\tWed, 22 Apr 2026 12:26:29 +0000",
            "from orviesa010.jf.intel.com ([10.64.159.150])\n  by fmvoesa111.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 22 Apr 2026 05:25:46 -0700",
            "from iapp347.iil.intel.com (HELO 87c02287900a.iil.intel.com)\n ([10.167.28.6])\n  by orviesa010-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 22 Apr 2026 05:25:45 -0700"
        ],
        "DKIM-Signature": [
            "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To:\n\tMessage-ID:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description:\n\tResent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:\n\tList-Owner; bh=ibq62/09GnqoTDTTf7e/Ibpf2bzfK7qp9Iv5rnTsAyc=; b=ceuuZFE/gu/goI\n\t9BtbMSIUQ3oJBk4dYZ9UUrchzCFL/kSSy+4R/ZIg26eLJyNZLlJlblgQQPM86JebA7gX2sNM5v4XT\n\tu+qG0zKcT5y86usRdDGhBGXNop3f39bLMGfjAZQ4h9FiPdw0leBk3LSL9BG0bp+GCg2km4CyLSCFh\n\t+8//GALQiF8kOrMZVEUQeXK8JeACWZ+TafkRf9PQ9fYSEslxQSybk/maFnwGkCwkWsLPmIPjOlAe6\n\tZLeDcFsM9LL+q8kjyRQwVgsVL2S0ngllHB2BSTQmT4gCw/M6MQs+ssXJcXa22l0PdqjYh0115p4+X\n\tCbJn9MnbGrEu4PLxSgbg==;",
            "v=1; a=rsa-sha256; c=relaxed/simple;\n  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n  t=1776860769; x=1808396769;\n  h=from:to:cc:subject:date:message-id:in-reply-to:\n   references:mime-version:content-transfer-encoding;\n  bh=ji5kkHxiSAZ7zQ36kuRiBYAoz/N+MEpvLsAPRPPgYG0=;\n  b=P5UIla6T1aq6j16ToGWJDLugIZG2jKIbdY4p9nOFLK/fJ4qWtblYy+f4\n   V+dAyoQ2mXeMrpd2CTtwIt4sTEv6E3WaZeVW3dXcTNP8NdMTlivw7yyV8\n   ls30fkvbY2kzp9f7uA+bWkyBwwD1JeOD3SnfZ1kxOYMfClva1vgsUvZL3\n   YsgJhIuiCuCs04ZL60is8UN3As7rhNKBAR5Oh9W4y1C+IF93uR9hn4eVT\n   fJh39H0kJ6WK/zpgJoD17GWckhjBRUiAzHHtveQieWvgI3XwPvmT3vH6C\n   gWruT/awLrDgMGP6aWwxyCWy1f4e0J/XfjU+3rhwVaYW/08C1N5jQfcpw\n   Q==;"
        ],
        "X-CSE-ConnectionGUID": [
            "jRQPU/P3Rx2lqcQviziWJA==",
            "Op2rrr6qRk6G21OSu6PBIg=="
        ],
        "X-CSE-MsgGUID": [
            "RZ/VAvbCRgym2HQiTb0amg==",
            "JlfXuxBUTrKBJkA7gQuOyQ=="
        ],
        "X-IronPort-AV": [
            "E=McAfee;i=\"6800,10657,11764\"; a=\"77687366\"",
            "E=Sophos;i=\"6.23,192,1770624000\";\n   d=\"scan'208\";a=\"77687366\"",
            "E=Sophos;i=\"6.23,192,1770624000\";\n   d=\"scan'208\";a=\"231445037\""
        ],
        "X-ExtLoop1": "1",
        "From": "Andrei Otcheretianski <andrei.otcheretianski@intel.com>",
        "To": "hostap@lists.infradead.org",
        "Cc": "vamsin@qti.qualcomm.com,\n\tmaheshkkv@google.com,\n\tAvraham Stern <avraham.stern@intel.com>",
        "Subject": "[PATCH 44/92] wpa_supplicant: Implement NAN get_npk_akmp() callback",
        "Date": "Wed, 22 Apr 2026 15:23:35 +0300",
        "Message-ID": "<20260422122424.43776-45-andrei.otcheretianski@intel.com>",
        "X-Mailer": "git-send-email 2.53.0",
        "In-Reply-To": "<20260422122424.43776-1-andrei.otcheretianski@intel.com>",
        "References": "<20260422122424.43776-1-andrei.otcheretianski@intel.com>",
        "MIME-Version": "1.0",
        "X-CRM114-Version": "20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ",
        "X-CRM114-CacheID": "sfid-20260422_052609_432771_FA846DBC ",
        "X-CRM114-Status": "GOOD (  12.47  )",
        "X-Spam-Score": "-4.4 (----)",
        "X-Spam-Report": "Spam detection software,\n running on the system \"bombadil.infradead.org\",\n has NOT identified this incoming email as spam.  The original\n message has been attached to this so you can view it or label\n similar future email.  If you have any questions, see\n the administrator of that system for details.\n Content preview:  From: Avraham Stern <avraham.stern@intel.com> Iterate over\n    the saved identities and return the NIK and AKMP of the identity that\n matches\n    the given nonce and tag. Signed-off-by: Avraham Stern\n <avraham.stern@intel.com>\n    --- wpa_supplicant/nan_supplicant.c | 71 +++++++++++++++++++++++++++++++++\n    1 file changed, 71 insertions(+)\n Content analysis details:   (-4.4 points, 5.0 required)\n  pts rule name              description\n ---- ----------------------\n --------------------------------------------------\n -2.3 RCVD_IN_DNSWL_MED      RBL: Sender listed at https://www.dnswl.org/,\n                             medium trust\n                             [192.198.163.17 listed in list.dnswl.org]\n  0.0 SPF_HELO_NONE          SPF: HELO does not publish an SPF Record\n -0.0 SPF_PASS               SPF: sender matches SPF record\n -0.1 DKIM_VALID             Message has at least one valid DKIM or DK\n signature\n -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from\n author's\n                             domain\n -0.1 DKIM_VALID_EF          Message has a valid DKIM or DK signature from\n                             envelope-from domain\n  0.1 DKIM_SIGNED            Message has a DKIM or DK signature,\n not necessarily valid\n -1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%\n                             [score: 0.0000]\n -0.0 DKIMWL_WL_HIGH         DKIMwl.org - High trust sender",
        "X-BeenThere": "hostap@lists.infradead.org",
        "X-Mailman-Version": "2.1.34",
        "Precedence": "list",
        "List-Id": "<hostap.lists.infradead.org>",
        "List-Unsubscribe": "<http://lists.infradead.org/mailman/options/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=unsubscribe>",
        "List-Archive": "<http://lists.infradead.org/pipermail/hostap/>",
        "List-Post": "<mailto:hostap@lists.infradead.org>",
        "List-Help": "<mailto:hostap-request@lists.infradead.org?subject=help>",
        "List-Subscribe": "<http://lists.infradead.org/mailman/listinfo/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=subscribe>",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Sender": "\"Hostap\" <hostap-bounces@lists.infradead.org>",
        "Errors-To": "hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org"
    },
    "content": "From: Avraham Stern <avraham.stern@intel.com>\n\nIterate over the saved identities and return the NIK and AKMP\nof the identity that matches the given nonce and tag.\n\nSigned-off-by: Avraham Stern <avraham.stern@intel.com>\n---\n wpa_supplicant/nan_supplicant.c | 71 +++++++++++++++++++++++++++++++++\n 1 file changed, 71 insertions(+)",
    "diff": "diff --git a/wpa_supplicant/nan_supplicant.c b/wpa_supplicant/nan_supplicant.c\nindex 748c2ccdae..29c1a2163e 100644\n--- a/wpa_supplicant/nan_supplicant.c\n+++ b/wpa_supplicant/nan_supplicant.c\n@@ -956,6 +956,76 @@ fail:\n \twpa_config_remove_identity(wpa_s->conf, ik->id);\n \treturn -1;\n }\n+\n+\n+static const struct wpabuf *wpas_nan_get_npk_akmp_cb(void *ctx,\n+\t\t\t\t\t\t     const u8 *peer_nmi,\n+\t\t\t\t\t\t     const u8 *nonce,\n+\t\t\t\t\t\t     const u8 *tag, int *akmp)\n+{\n+\tstruct wpa_supplicant *wpa_s = ctx;\n+\tstruct wpa_dev_ik *ik;\n+\tstruct wpabuf *derived_tag;\n+\n+\tif (!akmp) {\n+\t\twpa_printf(MSG_DEBUG, \"NAN: Invalid akmp pointer\");\n+\t\treturn NULL;\n+\t}\n+\n+\tif (!nonce || !tag) {\n+\t\twpa_printf(MSG_DEBUG, \"NAN: Invalid nonce or tag\");\n+\t\treturn NULL;\n+\t}\n+\n+\twpa_hexdump(MSG_DEBUG, \"NAN: Looking up NPK and AKMP for nonce\",\n+\t\t    nonce, NAN_NIRA_NONCE_LEN);\n+\twpa_hexdump(MSG_DEBUG, \"NAN: Looking up NPK and AKMP for tag\",\n+\t\t    tag, NAN_NIRA_TAG_LEN);\n+\n+\t/* Iterate over all saved NIKs (stored as device identities) */\n+\tfor (ik = wpa_s->conf->identity; ik; ik = ik->next) {\n+\t\t/* The device identities saved in the interface configuration\n+\t\t * are not checked to match NIK length and to have a PMK.\n+\t\t * Although other identities are not expected since this is the\n+\t\t * NAN management interface, verify that the DIK matches NIK\n+\t\t * length, that a PMK is stored and the stored AKMP is valid\n+\t\t * for NAN pairing.\n+\t\t */\n+\t\tif (!ik->dik || wpabuf_len(ik->dik) != NAN_NIK_LEN ||\n+\t\t    !ik->pmk ||\n+\t\t    (ik->akmp != WPA_KEY_MGMT_SAE &&\n+\t\t     ik->akmp != WPA_KEY_MGMT_PASN))\n+\t\t\tcontinue;\n+\n+\t\t/* Derive tag from this NIK */\n+\t\tderived_tag =\n+\t\t\tnan_crypto_derive_nira_tag(wpabuf_head_u8(ik->dik),\n+\t\t\t\t\t\t   NAN_NIK_LEN, peer_nmi,\n+\t\t\t\t\t\t   nonce);\n+\t\tif (!derived_tag)\n+\t\t\tcontinue;\n+\n+\t\t/* Compare derived tag with received tag */\n+\t\tif (os_memcmp(wpabuf_head(derived_tag), tag,\n+\t\t\t      NAN_NIRA_TAG_LEN) != 0) {\n+\t\t\twpabuf_free(derived_tag);\n+\t\t\tcontinue;\n+\t\t}\n+\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t   \"NAN: NIRA validation succeeded with NIK id=%d\",\n+\t\t\t   ik->id);\n+\t\twpabuf_free(derived_tag);\n+\n+\t\t*akmp = ik->akmp;\n+\t\twpa_printf(MSG_DEBUG, \"NAN: Found NPK for NIK id=%d, akmp=%d\",\n+\t\t\t   ik->id, *akmp);\n+\t\treturn ik->pmk;\n+\t}\n+\n+\twpa_printf(MSG_DEBUG, \"NAN: No matching NIK found\");\n+\treturn NULL;\n+}\n #endif /* CONFIG_PASN */\n \n \n@@ -981,6 +1051,7 @@ int wpas_nan_init(struct wpa_supplicant *wpa_s)\n \tnan.send_pasn = wpas_nan_pasn_send_cb;\n \tnan.pairing_result_cb = wpas_nan_pasn_auth_status_cb;\n \tnan.update_pairing_credentials = wpas_nan_update_pairing_credentials_cb;\n+\tnan.get_npk_akmp = wpas_nan_get_npk_akmp_cb;\n #endif /* CONFIG_PASN */\n \n \t/* NDP */\n",
    "prefixes": [
        "44/92"
    ]
}