get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/1.2/patches/2226415/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2226415,
    "url": "http://patchwork.ozlabs.org/api/1.2/patches/2226415/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/hostap/patch/20260422122424.43776-68-andrei.otcheretianski@intel.com/",
    "project": {
        "id": 22,
        "url": "http://patchwork.ozlabs.org/api/1.2/projects/22/?format=api",
        "name": "HostAP Development",
        "link_name": "hostap",
        "list_id": "hostap.lists.infradead.org",
        "list_email": "hostap@lists.infradead.org",
        "web_url": "",
        "scm_url": "",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260422122424.43776-68-andrei.otcheretianski@intel.com>",
    "list_archive_url": null,
    "date": "2026-04-22T12:23:58",
    "name": "[67/92] NAN: Send and receive only protected SDF frames if peer is paired",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "40b3c4276b37430882df734d0f6d7254520673ea",
    "submitter": {
        "id": 62065,
        "url": "http://patchwork.ozlabs.org/api/1.2/people/62065/?format=api",
        "name": "Andrei Otcheretianski",
        "email": "andrei.otcheretianski@intel.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/hostap/patch/20260422122424.43776-68-andrei.otcheretianski@intel.com/mbox/",
    "series": [
        {
            "id": 501001,
            "url": "http://patchwork.ozlabs.org/api/1.2/series/501001/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/hostap/list/?series=501001",
            "date": "2026-04-22T12:23:05",
            "name": "Add NAN PASN pairing support",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/501001/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2226415/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2226415/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "\n <hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=UQsmPNEg;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=intel.com header.i=@intel.com header.a=rsa-sha256\n header.s=Intel header.b=k49ZJO1o;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0z8L0ZM8z1y2d\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 22:30:26 +1000 (AEST)",
            "from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wFWiG-0000000A9N1-2rlR;\n\tWed, 22 Apr 2026 12:29:52 +0000",
            "from mgamail.intel.com ([192.198.163.17])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wFWfV-0000000A3P1-3uBG\n\tfor hostap@lists.infradead.org;\n\tWed, 22 Apr 2026 12:27:09 +0000",
            "from orviesa010.jf.intel.com ([10.64.159.150])\n  by fmvoesa111.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 22 Apr 2026 05:26:23 -0700",
            "from iapp347.iil.intel.com (HELO 87c02287900a.iil.intel.com)\n ([10.167.28.6])\n  by orviesa010-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 22 Apr 2026 05:26:23 -0700"
        ],
        "DKIM-Signature": [
            "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To:\n\tMessage-ID:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description:\n\tResent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:\n\tList-Owner; bh=VMbHzzE2NXIgrKfEoekCOkSoCUMlQDT0bK9owHYzlto=; b=UQsmPNEgdodNRw\n\tx2Y1IAsjbAxATD6MIV7+XWiIloZ3Tpw23xxtY0MeiSlEVYB92tJT0Y8gZaUHNl65spcIk9aWt1SM/\n\tT2QZh3iEnF4hVfqftZ3+okDl5RRR+TFeohm+TtIDd7Jy2WaRnlCF+BbxkDCnsgu6kihGMqR1TJD7a\n\t0x4/Fh4l2Vn7fxAGxtTOcgDWnIZVN9fxAOgvNMbmLXSXscB5rM+w5CuQBHtRZRbQ+HDv7pMdCB6GH\n\tl5sFZbH16Kq2ccEVM7bgygkGsySVoq/+gQGDPVjqO9dbvx3DMI9itB+98pmghoXEXqqCXUcHrGkkj\n\t1A5VuGFSNlDbqqfz2MfA==;",
            "v=1; a=rsa-sha256; c=relaxed/simple;\n  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n  t=1776860822; x=1808396822;\n  h=from:to:cc:subject:date:message-id:in-reply-to:\n   references:mime-version:content-transfer-encoding;\n  bh=hJhs3wBbo5FSVQNNne2v9qAXIQZemYSCqc9YifStoro=;\n  b=k49ZJO1o7NCV4ak5ZOzsf5LfNNyjQItPEzkVbE0xIO3IGc+RfbYHX0Q9\n   +veSrJX7CbdvhFsIXryfXbr2iShW6xlfN32xz2xHXDhrXe9l/YAc//IQK\n   2BlG+zewhF1J57tjBEG5jQheZvswr9ylkv11+eFSfycBxjEXuvRj02HvR\n   CQvNTTpc7zlkabJChrL6qdB2yeLFeGLLrHQg0Mb+Bdva348p8fDl8h6eO\n   +Oj+QhrDR8gSv/dFFuMkGMbjRCSjEvYz5bMK/NenIvHjdgDOppAM55kmi\n   e8alZVWZGVXPDwjwS/9o+PuXt+GqDcfieAYGs8nrIf6+C0Q36FWfijJNO\n   Q==;"
        ],
        "X-CSE-ConnectionGUID": [
            "qEqqKdD3RLKUfAWCMHiDiA==",
            "oCbYaTyuRiCSlnTjA5jDmw=="
        ],
        "X-CSE-MsgGUID": [
            "yeMQ8bR9Riq3McedqU9E6A==",
            "hI3pGyP7Qbif4bwTuRBGKw=="
        ],
        "X-IronPort-AV": [
            "E=McAfee;i=\"6800,10657,11764\"; a=\"77687501\"",
            "E=Sophos;i=\"6.23,192,1770624000\";\n   d=\"scan'208\";a=\"77687501\"",
            "E=Sophos;i=\"6.23,192,1770624000\";\n   d=\"scan'208\";a=\"231445218\""
        ],
        "X-ExtLoop1": "1",
        "From": "Andrei Otcheretianski <andrei.otcheretianski@intel.com>",
        "To": "hostap@lists.infradead.org",
        "Cc": "vamsin@qti.qualcomm.com,\n\tmaheshkkv@google.com,\n\tAvraham Stern <avraham.stern@intel.com>",
        "Subject": "[PATCH 67/92] NAN: Send and receive only protected SDF frames if peer\n is paired",
        "Date": "Wed, 22 Apr 2026 15:23:58 +0300",
        "Message-ID": "<20260422122424.43776-68-andrei.otcheretianski@intel.com>",
        "X-Mailer": "git-send-email 2.53.0",
        "In-Reply-To": "<20260422122424.43776-1-andrei.otcheretianski@intel.com>",
        "References": "<20260422122424.43776-1-andrei.otcheretianski@intel.com>",
        "MIME-Version": "1.0",
        "X-CRM114-Version": "20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ",
        "X-CRM114-CacheID": "sfid-20260422_052702_123246_F852C1E9 ",
        "X-CRM114-Status": "GOOD (  15.50  )",
        "X-Spam-Score": "-4.4 (----)",
        "X-Spam-Report": "Spam detection software,\n running on the system \"bombadil.infradead.org\",\n has NOT identified this incoming email as spam.  The original\n message has been attached to this so you can view it or label\n similar future email.  If you have any questions, see\n the administrator of that system for details.\n Content preview:  From: Avraham Stern <avraham.stern@intel.com> All SDF\n frames\n    to a paired peer should be protected. Change the category of SDF frames\n from\n    public action to dual protected public action when sending them to a\n paired\n    peer. In addition, drop unicast [...]\n Content analysis details:   (-4.4 points, 5.0 required)\n  pts rule name              description\n ---- ----------------------\n --------------------------------------------------\n -2.3 RCVD_IN_DNSWL_MED      RBL: Sender listed at https://www.dnswl.org/,\n                             medium trust\n                             [192.198.163.17 listed in list.dnswl.org]\n  0.0 SPF_HELO_NONE          SPF: HELO does not publish an SPF Record\n -0.0 SPF_PASS               SPF: sender matches SPF record\n -0.1 DKIM_VALID             Message has at least one valid DKIM or DK\n signature\n -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from\n author's\n                             domain\n -0.1 DKIM_VALID_EF          Message has a valid DKIM or DK signature from\n                             envelope-from domain\n  0.1 DKIM_SIGNED            Message has a DKIM or DK signature,\n not necessarily valid\n -1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%\n                             [score: 0.0000]\n -0.0 DKIMWL_WL_HIGH         DKIMwl.org - High trust sender",
        "X-BeenThere": "hostap@lists.infradead.org",
        "X-Mailman-Version": "2.1.34",
        "Precedence": "list",
        "List-Id": "<hostap.lists.infradead.org>",
        "List-Unsubscribe": "<http://lists.infradead.org/mailman/options/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=unsubscribe>",
        "List-Archive": "<http://lists.infradead.org/pipermail/hostap/>",
        "List-Post": "<mailto:hostap@lists.infradead.org>",
        "List-Help": "<mailto:hostap-request@lists.infradead.org?subject=help>",
        "List-Subscribe": "<http://lists.infradead.org/mailman/listinfo/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=subscribe>",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Sender": "\"Hostap\" <hostap-bounces@lists.infradead.org>",
        "Errors-To": "hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org"
    },
    "content": "From: Avraham Stern <avraham.stern@intel.com>\n\nAll SDF frames to a paired peer should be protected. Change the\ncategory of SDF frames from public action to dual protected public\naction when sending them to a paired peer.\nIn addition, drop unicast unprotected public action frames from a\npaired peer.\n\nSigned-off-by: Avraham Stern <avraham.stern@intel.com>\n---\n src/common/nan_de.c             | 12 ++++++++----\n src/common/nan_de.h             |  1 +\n wpa_supplicant/events.c         |  6 ++++++\n wpa_supplicant/nan_supplicant.c | 22 ++++++++++++++++++++++\n wpa_supplicant/nan_supplicant.h |  7 +++++++\n 5 files changed, 44 insertions(+), 4 deletions(-)",
    "diff": "diff --git a/src/common/nan_de.c b/src/common/nan_de.c\nindex 4959ccd7fb..f3a28b6e28 100644\n--- a/src/common/nan_de.c\n+++ b/src/common/nan_de.c\n@@ -247,14 +247,18 @@ static void nan_de_unpause_state(struct nan_de_service *srv)\n \tsrv->sel_peer_id = 0;\n }\n \n-\n-static struct wpabuf * nan_de_alloc_sdf(size_t len)\n+static struct wpabuf *nan_de_alloc_sdf(struct nan_de *de, const u8 *dst,\n+\t\t\t\t       size_t len)\n {\n \tstruct wpabuf *buf;\n+\tu8 category = WLAN_ACTION_PUBLIC;\n+\n+\tif (de->cb.is_peer_paired && de->cb.is_peer_paired(de->cb.ctx, dst))\n+\t\tcategory = WLAN_ACTION_PROTECTED_DUAL;\n \n \tbuf = wpabuf_alloc(2 + 4 + len);\n \tif (buf) {\n-\t\twpabuf_put_u8(buf, WLAN_ACTION_PUBLIC);\n+\t\twpabuf_put_u8(buf, category);\n \t\twpabuf_put_u8(buf, WLAN_PA_VENDOR_SPECIFIC);\n \t\twpabuf_put_be32(buf, NAN_SDF_VENDOR_TYPE);\n \t}\n@@ -372,7 +376,7 @@ static void nan_de_tx_sdf(struct nan_de *de, struct nan_de_service *srv,\n \t\t       list_len * (sizeof(struct nan_sec_ctxt) + PMKID_LEN);\n \t}\n \n-\tbuf = nan_de_alloc_sdf(len);\n+\tbuf = nan_de_alloc_sdf(de, dst, len);\n \tif (!buf)\n \t\treturn;\n \ndiff --git a/src/common/nan_de.h b/src/common/nan_de.h\nindex b9801c2536..705ddc1836 100644\n--- a/src/common/nan_de.h\n+++ b/src/common/nan_de.h\n@@ -69,6 +69,7 @@ struct nan_callbacks {\n \t\t\t\t     u16 buf_len, const u8 *peer_addr,\n \t\t\t\t     unsigned int freq);\n \tvoid (*add_extra_attrs)(void *ctx, struct wpabuf *buf);\n+\tbool (*is_peer_paired)(void *ctx, const u8 *addr);\n };\n \n bool nan_de_is_nan_network_id(const u8 *addr);\ndiff --git a/wpa_supplicant/events.c b/wpa_supplicant/events.c\nindex 8ee53ae9aa..ad7f72b8cd 100644\n--- a/wpa_supplicant/events.c\n+++ b/wpa_supplicant/events.c\n@@ -5952,6 +5952,12 @@ static void wpas_event_rx_mgmt_action(struct wpa_supplicant *wpa_s,\n \tif ((category == WLAN_ACTION_PUBLIC ||\n \t     category == WLAN_ACTION_PROTECTED_DUAL) &&\n \t    plen >= 5 && payload[0] == WLAN_PA_VENDOR_SPECIFIC) {\n+\t\t/* Drop unprotected unicast frames from paired peers */\n+\t\tif (category == WLAN_ACTION_PUBLIC &&\n+\t\t    !is_multicast_ether_addr(mgmt->da) &&\n+\t\t    wpas_nan_is_peer_paired(wpa_s, mgmt->sa))\n+\t\t\treturn;\n+\n \t\tif  (WPA_GET_BE32(&payload[1]) == NAN_SDF_VENDOR_TYPE) {\n \t\t\tpayload += 5;\n \t\t\tplen -= 5;\ndiff --git a/wpa_supplicant/nan_supplicant.c b/wpa_supplicant/nan_supplicant.c\nindex 43c7a9c1ae..49eca9e2c4 100644\n--- a/wpa_supplicant/nan_supplicant.c\n+++ b/wpa_supplicant/nan_supplicant.c\n@@ -2947,6 +2947,15 @@ int wpas_nan_pasn_auth_rx(struct wpa_supplicant *wpa_s,\n \treturn nan_pairing_auth_rx(nan, mgmt, len);\n }\n #endif /* CONFIG_PASN */\n+\n+\n+bool wpas_nan_is_peer_paired(struct wpa_supplicant *wpa_s, const u8 *peer_addr)\n+{\n+\tif (!wpa_s->nan)\n+\t\treturn false;\n+\n+\treturn nan_pairing_is_peer_paired(wpa_s->nan, peer_addr);\n+}\n #endif /* CONFIG_NAN */\n \n \n@@ -3310,6 +3319,16 @@ static void wpas_nan_process_pr_usd_elems(void *ctx, const u8 *buf, u16 buf_len,\n #endif /* CONFIG_PR */\n \n \n+#if defined(CONFIG_NAN) && defined(CONFIG_PASN)\n+static bool wpas_nan_is_peer_paired_cb(void *ctx, const u8 *peer_addr)\n+{\n+\tstruct wpa_supplicant *wpa_s = ctx;\n+\n+\treturn wpas_nan_is_peer_paired(wpa_s, peer_addr);\n+}\n+#endif /* CONFIG_NAN && CONFIG_PASN */\n+\n+\n int wpas_nan_de_init(struct wpa_supplicant *wpa_s)\n {\n \tstruct nan_callbacks cb;\n@@ -3335,6 +3354,9 @@ int wpas_nan_de_init(struct wpa_supplicant *wpa_s)\n #endif /* CONFIG_PR */\n #ifdef CONFIG_NAN\n \tcb.add_extra_attrs = wpas_nan_de_add_extra_attrs;\n+#ifdef CONFIG_PASN\n+\tcb.is_peer_paired = wpas_nan_is_peer_paired_cb;\n+#endif /* CONFIG_PASN */\n #endif /* CONFIG_NAN */\n \n \twpa_s->nan_de = nan_de_init(wpa_s->own_addr, offload, false,\ndiff --git a/wpa_supplicant/nan_supplicant.h b/wpa_supplicant/nan_supplicant.h\nindex 794515bcfb..1e5196bca0 100644\n--- a/wpa_supplicant/nan_supplicant.h\n+++ b/wpa_supplicant/nan_supplicant.h\n@@ -34,6 +34,7 @@ int wpas_nan_peer_info(struct wpa_supplicant *wpa_s, const char *cmd,\n \t\t       char *reply, size_t reply_size);\n int wpas_nan_bootstrap_request(struct wpa_supplicant *wpa_s, char *cmd);\n int wpas_nan_bootstrap_reset(struct wpa_supplicant *wpa_s, char *cmd);\n+bool wpas_nan_is_peer_paired(struct wpa_supplicant *wpa_s, const u8 *peer_addr);\n \n #ifdef CONFIG_PASN\n int wpas_nan_pair(struct wpa_supplicant *wpa_s, const u8 *peer_addr,\n@@ -91,6 +92,12 @@ static inline void wpas_nan_rx_naf(struct wpa_supplicant *wpa_s,\n \t\t\t\t   const struct ieee80211_mgmt *mgmt,\n \t\t\t\t   size_t len)\n {}\n+\n+static inline bool wpas_nan_is_peer_paired(struct wpa_supplicant *wpa_s,\n+\t\t\t\t\t  const u8 *peer_addr)\n+{\n+\treturn false;\n+}\n #endif /* CONFIG_NAN */\n \n struct nan_subscribe_params;\n",
    "prefixes": [
        "67/92"
    ]
}