get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/1.2/patches/2226418/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2226418,
    "url": "http://patchwork.ozlabs.org/api/1.2/patches/2226418/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/hostap/patch/20260422122424.43776-71-andrei.otcheretianski@intel.com/",
    "project": {
        "id": 22,
        "url": "http://patchwork.ozlabs.org/api/1.2/projects/22/?format=api",
        "name": "HostAP Development",
        "link_name": "hostap",
        "list_id": "hostap.lists.infradead.org",
        "list_email": "hostap@lists.infradead.org",
        "web_url": "",
        "scm_url": "",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260422122424.43776-71-andrei.otcheretianski@intel.com>",
    "list_archive_url": null,
    "date": "2026-04-22T12:24:01",
    "name": "[70/92] NAN: Derive and report ND-PMK after successful pairing",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "985899dbc9faab571bb8c524e30f80da32512850",
    "submitter": {
        "id": 62065,
        "url": "http://patchwork.ozlabs.org/api/1.2/people/62065/?format=api",
        "name": "Andrei Otcheretianski",
        "email": "andrei.otcheretianski@intel.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/hostap/patch/20260422122424.43776-71-andrei.otcheretianski@intel.com/mbox/",
    "series": [
        {
            "id": 501001,
            "url": "http://patchwork.ozlabs.org/api/1.2/series/501001/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/hostap/list/?series=501001",
            "date": "2026-04-22T12:23:05",
            "name": "Add NAN PASN pairing support",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/501001/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2226418/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2226418/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "\n <hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=Wk20RiHG;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n secure) header.d=infradead.org header.i=@infradead.org header.a=rsa-sha256\n header.s=desiato.20200630 header.b=FRqV5ECO;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=intel.com header.i=@intel.com header.a=rsa-sha256\n header.s=Intel header.b=BKGD9lT6;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0z8j2qtjz1y2d\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 22:30:45 +1000 (AEST)",
            "from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wFWia-0000000A9ka-1UdW;\n\tWed, 22 Apr 2026 12:30:12 +0000",
            "from desiato.infradead.org ([2001:8b0:10b:1:d65d:64ff:fe57:4e05])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wFWfg-0000000A5hV-2wh5\n\tfor hostap@bombadil.infradead.org;\n\tWed, 22 Apr 2026 12:27:12 +0000",
            "from mgamail.intel.com ([192.198.163.17])\n\tby desiato.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wFWfb-0000000BKYa-1Q8w\n\tfor hostap@lists.infradead.org;\n\tWed, 22 Apr 2026 12:27:10 +0000",
            "from orviesa010.jf.intel.com ([10.64.159.150])\n  by fmvoesa111.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 22 Apr 2026 05:26:28 -0700",
            "from iapp347.iil.intel.com (HELO 87c02287900a.iil.intel.com)\n ([10.167.28.6])\n  by orviesa010-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 22 Apr 2026 05:26:27 -0700"
        ],
        "DKIM-Signature": [
            "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To:\n\tMessage-ID:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description:\n\tResent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:\n\tList-Owner; bh=pTM7aFF6+rqFgoJwHgWJZec7LBP2vxTK+WqYIoLPjEs=; b=Wk20RiHGpt4I/H\n\t0lJLFFgZTkrFB5mx5INHc0GDSfQiu8T6vqj05WNZcUpXXWMc7iijexqrRPVZ4tGJUP1sGzPD/JPJ7\n\t2lgni9ngVrVAq8Q3L/ZaLdURvbQFwOStUS4cZjREA9avGL8lxDS0/6Xr5AAMG7jqWEkWWi7yURzjg\n\t4IrY5HJCrcdqpRXa5TiuJ1yimd5lX3VHdc7b0f7YL1Q+dOvGqFydnfZWUDW6lZAajWHQsSjbptBct\n\t7tU+vdqPh7aFQdPbGHJXWA4rdET1wKOVrS9AC1Ooxzgr/kkj+Akk1TD14bWXovPXuQQWpzlGX0wrD\n\tN2+RkF+T7mVxYJwnQCHA==;",
            "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=infradead.org; s=desiato.20200630; h=Content-Transfer-Encoding:MIME-Version\n\t:References:In-Reply-To:Message-ID:Date:Subject:Cc:To:From:Sender:Reply-To:\n\tContent-Type:Content-ID:Content-Description;\n\tbh=6H+UD860RlLQEu7D5n6DpLd6bxYi3gXAD1QR2iv6+qI=; b=FRqV5ECOCMyvmGjXKT1PuNiB0D\n\tIGHpSO1cOb8RW9sQe+Dh5AOW/sW872kWCTiG1acxR63kzfhqJunaYwEyEGwy8FeGTZlKPHnvJNclD\n\t4jkVA2RFtwBdw7+oSEhmMiFRWc0/qFbLqKLyj5O6QaPgCR3rFreX7MZSwyO3QelDJYNAz+in92H4j\n\tRgH374RA2TKxjOnRSyXibiQlgmunIHeooCoXGvIbgPrxhudHOIFqDRD5bq15AEsfexFJ7N4YD8Ybs\n\t+wCWIOsvk5qfNnSdOmcwEGFexKkGBfSFJfOmtck69t0+duSKJLN7y3U4knVqzDHD+ayKhh+6/WD9I\n\tQRnJzY6A==;",
            "v=1; a=rsa-sha256; c=relaxed/simple;\n  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n  t=1776860827; x=1808396827;\n  h=from:to:cc:subject:date:message-id:in-reply-to:\n   references:mime-version:content-transfer-encoding;\n  bh=GV7obccUL3zG7kpgkaK/yN0DHw2CjtIgbm/NvP9rRd0=;\n  b=BKGD9lT64YGamOlVvjZAvI8BkAatskf1y+CLl9vb6Wi7gmapfiiJsP8O\n   bNwV+7ZzSBDpGfsUogL9TDG0ebeetAKk0PtAH93NbkutMSEcF9WlK7VRY\n   9AMBWh8KLmFYXlGWBWPdz/HF1775LapUPUx6u7nd4pjwfc1/ouKJ+jOQU\n   jyrFyo2uZv3OYtjxqg0I8RZjDrv1Ebw+pW5Av6LhWlco0Xjjxzuw2NU/N\n   ckCcsRw/p4fSTX+LSdZvih7Qn4OdUdzBRljf11x9LIePr3HP2nzBA7YpV\n   erNksd7IRUq5MF0KJePV05dBxBYZAIh8fa9w5iP9WQA/ixIVhNB52Nukg\n   A==;"
        ],
        "X-CSE-ConnectionGUID": [
            "suy1rGZySBKftmN0TpFYyw==",
            "4+3ac0LWRdKR9dOi06apMA=="
        ],
        "X-CSE-MsgGUID": [
            "3REDIwvpSaqF5w8eUljngQ==",
            "ozolHJJJSgOYj2BRyMTaVA=="
        ],
        "X-IronPort-AV": [
            "E=McAfee;i=\"6800,10657,11764\"; a=\"77687517\"",
            "E=Sophos;i=\"6.23,192,1770624000\";\n   d=\"scan'208\";a=\"77687517\"",
            "E=Sophos;i=\"6.23,192,1770624000\";\n   d=\"scan'208\";a=\"231445249\""
        ],
        "X-ExtLoop1": "1",
        "From": "Andrei Otcheretianski <andrei.otcheretianski@intel.com>",
        "To": "hostap@lists.infradead.org",
        "Cc": "vamsin@qti.qualcomm.com,\n\tmaheshkkv@google.com,\n\tAvraham Stern <avraham.stern@intel.com>",
        "Subject": "[PATCH 70/92] NAN: Derive and report ND-PMK after successful pairing",
        "Date": "Wed, 22 Apr 2026 15:24:01 +0300",
        "Message-ID": "<20260422122424.43776-71-andrei.otcheretianski@intel.com>",
        "X-Mailer": "git-send-email 2.53.0",
        "In-Reply-To": "<20260422122424.43776-1-andrei.otcheretianski@intel.com>",
        "References": "<20260422122424.43776-1-andrei.otcheretianski@intel.com>",
        "MIME-Version": "1.0",
        "X-CRM114-Version": "20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ",
        "X-CRM114-CacheID": "sfid-20260422_132707_869022_BFE23444 ",
        "X-CRM114-Status": "GOOD (  16.04  )",
        "X-Spam-Score": "-2.5 (--)",
        "X-Spam-Report": "Spam detection software,\n running on the system \"desiato.infradead.org\",\n has NOT identified this incoming email as spam.  The original\n message has been attached to this so you can view it or label\n similar future email.  If you have any questions, see\n the administrator of that system for details.\n Content preview:  From: Avraham Stern <avraham.stern@intel.com> After a\n successful\n    pairing,\n derive the ND-PMK and report it in the NAN-PAIRING_STATUS message.\n    Signed-off-by: Avraham Stern <avraham.stern@intel.com> ---\n src/common/wpa_ctrl.h\n    | 2 +- src/nan/nan.h | 4 +- src/nan/nan_pairing.c | 66\n ++++++++++++++++++++++++++++++---\n    wpa_supplicant/nan_supplicant. [...]\n Content analysis details:   (-2.5 points, 5.0 required)\n  pts rule name              description\n ---- ----------------------\n --------------------------------------------------\n -2.3 RCVD_IN_DNSWL_MED      RBL: Sender listed at https://www.dnswl.org/,\n                             medium trust\n                             [192.198.163.17 listed in list.dnswl.org]\n -0.0 SPF_PASS               SPF: sender matches SPF record\n  0.0 SPF_HELO_NONE          SPF: HELO does not publish an SPF Record\n -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from\n author's\n                             domain\n -0.1 DKIM_VALID             Message has at least one valid DKIM or DK\n signature\n  0.1 DKIM_SIGNED            Message has a DKIM or DK signature,\n not necessarily valid\n -0.1 DKIM_VALID_EF          Message has a valid DKIM or DK signature from\n                             envelope-from domain\n -0.0 DKIMWL_WL_HIGH         DKIMwl.org - High trust sender",
        "X-BeenThere": "hostap@lists.infradead.org",
        "X-Mailman-Version": "2.1.34",
        "Precedence": "list",
        "List-Id": "<hostap.lists.infradead.org>",
        "List-Unsubscribe": "<http://lists.infradead.org/mailman/options/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=unsubscribe>",
        "List-Archive": "<http://lists.infradead.org/pipermail/hostap/>",
        "List-Post": "<mailto:hostap@lists.infradead.org>",
        "List-Help": "<mailto:hostap-request@lists.infradead.org?subject=help>",
        "List-Subscribe": "<http://lists.infradead.org/mailman/listinfo/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=subscribe>",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Sender": "\"Hostap\" <hostap-bounces@lists.infradead.org>",
        "Errors-To": "hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org"
    },
    "content": "From: Avraham Stern <avraham.stern@intel.com>\n\nAfter a successful pairing, derive the ND-PMK and report it in the\nNAN-PAIRING_STATUS message.\n\nSigned-off-by: Avraham Stern <avraham.stern@intel.com>\n---\n src/common/wpa_ctrl.h           |  2 +-\n src/nan/nan.h                   |  4 +-\n src/nan/nan_pairing.c           | 66 ++++++++++++++++++++++++++++++---\n wpa_supplicant/nan_supplicant.c | 15 ++++++--\n 4 files changed, 76 insertions(+), 11 deletions(-)",
    "diff": "diff --git a/src/common/wpa_ctrl.h b/src/common/wpa_ctrl.h\nindex 31ca1529cc..afb207b509 100644\n--- a/src/common/wpa_ctrl.h\n+++ b/src/common/wpa_ctrl.h\n@@ -257,7 +257,7 @@ extern \"C\" {\n #define NAN_NIK_RECEIVED \"NAN-NIK-RECEIVED \"\n \n /* NAN Pairing status\n- * <peer address> akmp=<SAE|PASN> cipher=<CCMP|GCMP-256> status=<success|failure>\n+ * addr=<peer address> akmp=<SAE|PASN> cipher=<CCMP|GCMP-256> status=<success|failure> [nd_pmk=<hex>]\n  */\n #define NAN_PAIRING_STATUS \"NAN-PAIRING-STATUS \"\n \ndiff --git a/src/nan/nan.h b/src/nan/nan.h\nindex ab50545732..c1fe905b03 100644\n--- a/src/nan/nan.h\n+++ b/src/nan/nan.h\n@@ -616,12 +616,14 @@ struct nan_config {\n \t * @cipher: Cipher used in the pairing\n \t * @status: Status of the pairing (WLAN_STATUS_* )\n \t * @ptk: Derived PTK for the pairing (valid only if status is success)\n+\t * @nd_pmk: ND-PMK from the pairing (valid only if status is success)\n \t * Returns: 0 if status is WLAN_STATUS_SUCCESS and the key was\n \t *\tinstalled successfully or status is\n \t *\tWLAN_STATUS_UNSPECIFIED_FAILURE, -1 otherwise\n \t */\n \tint (*pairing_result_cb)(void *ctx, const u8 *peer_addr, int akmp,\n-\t\t\t\t int cipher, u8 status, struct wpa_ptk *ptk);\n+\t\t\t\t int cipher, u8 status, struct wpa_ptk *ptk,\n+\t\t\t\t const u8 *nd_pmk);\n \n \t/**\n \t * update_pairing_credentials - Report received NIK and NPK for a peer\ndiff --git a/src/nan/nan_pairing.c b/src/nan/nan_pairing.c\nindex 0e2e87d039..8cdef0d727 100644\n--- a/src/nan/nan_pairing.c\n+++ b/src/nan/nan_pairing.c\n@@ -786,6 +786,39 @@ static int nan_send_nik(struct nan_data *nan_data, struct nan_peer *peer)\n \treturn ret;\n }\n \n+static int nan_pairing_derive_nd_pmk(struct nan_data *nan_data,\n+\t\t\t\t     struct nan_peer *peer, u8 *nd_pmk)\n+{\n+\tstruct pasn_data *pasn = peer->pairing.pasn;\n+\tint cipher = pasn_get_cipher(pasn);\n+\tenum nan_cipher_suite_id csid;\n+\tu8 *initiator_nmi, *responder_nmi;\n+\tint ret;\n+\n+\twpa_printf(MSG_DEBUG,\n+\t\t   \"NAN: Pairing: Derive ND-PMK after PASN pairing\");\n+\n+\tif (peer->pairing.self_pairing_role == NAN_PAIRING_ROLE_INITIATOR) {\n+\t\tinitiator_nmi = nan_data->cfg->nmi_addr;\n+\t\tresponder_nmi = peer->nmi_addr;\n+\t} else {\n+\t\tinitiator_nmi = peer->nmi_addr;\n+\t\tresponder_nmi = nan_data->cfg->nmi_addr;\n+\t}\n+\n+\tcsid = cipher == WPA_CIPHER_GCMP_256 ? NAN_CS_PK_PASN_256 :\n+\t\t\t\t\t       NAN_CS_PK_PASN_128;\n+\n+\tret = nan_crypto_derive_nd_pmk_from_kdk(pasn->ptk.kdk,\n+\t\t\t\t\t\tpasn->ptk.kdk_len, csid,\n+\t\t\t\t\t\tinitiator_nmi, responder_nmi,\n+\t\t\t\t\t\tnd_pmk);\n+\tif (ret)\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t   \"NAN: Pairing: Failed to derive ND PMK\");\n+\treturn ret;\n+}\n+\n \n /*\n  * nan_pairing_pasn_auth_tx_status - Handle PASN authentication frame TX status\n@@ -825,10 +858,22 @@ int nan_pairing_pasn_auth_tx_status(struct nan_data *nan, const u8 *data,\n \n \tret = wpa_pasn_auth_tx_status(pasn, data, data_len, acked);\n \tif (ret == 1) {\n+\t\tu8 nd_pmk[PMK_LEN];\n+\n+\t\tif (pasn->status == WLAN_STATUS_SUCCESS &&\n+\t\t    nan_pairing_derive_nd_pmk(nan, peer, nd_pmk)) {\n+\t\t\tpasn->status = WLAN_STATUS_UNSPECIFIED_FAILURE;\n+\t\t\twpa_printf(MSG_DEBUG,\n+\t\t\t\t   \"NAN: Pairing: Failed to derive ND PMK\");\n+\t\t}\n+\n \t\tret = nan->cfg->pairing_result_cb(nan->cfg->cb_ctx,\n-\t\t\t\t\t\t  peer->nmi_addr,\n-\t\t\t\t\t\t  pasn->akmp, pasn->cipher,\n-\t\t\t\t\t\t  pasn->status, &pasn->ptk);\n+\t\t\t\t\t\t  peer->nmi_addr, pasn->akmp,\n+\t\t\t\t\t\t  pasn->cipher, pasn->status,\n+\t\t\t\t\t\t  &pasn->ptk,\n+\t\t\t\t\t\t  pasn->status ==\n+\t\t\t\t\t\t  WLAN_STATUS_SUCCESS ? nd_pmk :\n+\t\t\t\t\t\t  NULL);\n \t\tif (pasn->status != WLAN_STATUS_SUCCESS || ret < 0) {\n \t\t\tnan_pairing_deinit_peer(peer);\n \t\t\treturn -1;\n@@ -1038,7 +1083,7 @@ static int nan_pairing_handle_auth_2(struct nan_data *nan_data,\n \t\t\t\t\t\t peer->nmi_addr, pasn->akmp,\n \t\t\t\t\t\t pasn->cipher,\n \t\t\t\t\t\t WLAN_STATUS_UNSPECIFIED_FAILURE,\n-\t\t\t\t\t\t NULL);\n+\t\t\t\t\t\t NULL, NULL);\n \t\tnan_pairing_deinit_peer(peer);\n \t\treturn -1;\n \t}\n@@ -1055,18 +1100,27 @@ static int nan_pairing_handle_auth_3(struct nan_data *nan_data,\n \tstruct pasn_data *pasn = peer->pairing.pasn;\n \tint ret;\n \tu8 status = WLAN_STATUS_SUCCESS;\n+\tu8 nd_pmk[PMK_LEN];\n \n \tret = handle_auth_pasn_3(pasn, nan_data->cfg->nmi_addr, peer->nmi_addr,\n \t\t\t\t mgmt, len);\n \tif (ret < 0) {\n \t\tstatus = WLAN_STATUS_UNSPECIFIED_FAILURE;\n \t\twpa_printf(MSG_DEBUG, \"NAN: Pairing: Handle Auth3 failed\");\n+\t} else {\n+\t\tif (nan_pairing_derive_nd_pmk(nan_data, peer, nd_pmk)) {\n+\t\t\tstatus = WLAN_STATUS_UNSPECIFIED_FAILURE;\n+\t\t\twpa_printf(MSG_DEBUG,\n+\t\t\t\t   \"NAN: Pairing: Failed to derive ND PMK\");\n+\t\t}\n \t}\n \n \tret = nan_data->cfg->pairing_result_cb(nan_data->cfg->cb_ctx,\n \t\t\t\t\t       peer->nmi_addr, pasn->akmp,\n \t\t\t\t\t       pasn->cipher, status,\n-\t\t\t\t\t       &pasn->ptk);\n+\t\t\t\t\t       &pasn->ptk,\n+\t\t\t\t\t       status == WLAN_STATUS_SUCCESS ?\n+\t\t\t\t\t       nd_pmk : NULL);\n \tif (ret < 0 || status != WLAN_STATUS_SUCCESS)\n \t\tnan_pairing_deinit_peer(peer);\n \telse if (status == WLAN_STATUS_SUCCESS)\n@@ -1161,7 +1215,7 @@ int nan_pairing_auth_rx(struct nan_data *nan_data,\n \t\tnan_data->cfg->pairing_result_cb(nan_data->cfg->cb_ctx,\n \t\t\t\t\t\t peer->nmi_addr, pasn->akmp,\n \t\t\t\t\t\t pasn->cipher, status_code,\n-\t\t\t\t\t\t NULL);\n+\t\t\t\t\t\t NULL, NULL);\n \t\tnan_pairing_deinit_peer(peer);\n \t\twpa_printf(MSG_DEBUG,\n \t\t\t   \"NAN: Pairing: Authentication rejected - status=%u\",\ndiff --git a/wpa_supplicant/nan_supplicant.c b/wpa_supplicant/nan_supplicant.c\nindex d7e71c1457..072ce8229f 100644\n--- a/wpa_supplicant/nan_supplicant.c\n+++ b/wpa_supplicant/nan_supplicant.c\n@@ -857,18 +857,27 @@ static int wpas_nan_pasn_send_cb(void *ctx, const u8 *data, size_t data_len)\n \n static int wpas_nan_pasn_auth_status_cb(void *ctx, const u8 *peer_addr,\n \t\t\t\t\tint akmp, int cipher, u8 status,\n-\t\t\t\t\tstruct wpa_ptk *ptk)\n+\t\t\t\t\tstruct wpa_ptk *ptk, const u8 *nd_pmk)\n {\n \tstruct wpa_supplicant *wpa_s = ctx;\n \tenum wpa_alg alg;\n \tu8 seq[6];\n+\tchar nd_pmk_hex[2 * PMK_LEN + 1];\n+\n+\tif (nd_pmk)\n+\t\twpa_snprintf_hex(nd_pmk_hex, sizeof(nd_pmk_hex), nd_pmk,\n+\t\t\t\t PMK_LEN);\n+\telse\n+\t\tnd_pmk_hex[0] = '\\0';\n \n \twpa_msg_global(wpa_s, MSG_INFO,\n-\t\t       NAN_PAIRING_STATUS MACSTR \" akmp=%s cipher=%s status=%s\",\n+\t\t       NAN_PAIRING_STATUS \"addr=\" MACSTR \" akmp=%s cipher=%s status=%s%s%s\",\n \t\t       MAC2STR(peer_addr),\n \t\t       wpa_key_mgmt_txt(akmp, WPA_PROTO_RSN),\n \t\t       wpa_cipher_txt(cipher),\n-\t\t       status == WLAN_STATUS_SUCCESS ? \"success\" : \"failure\");\n+\t\t       status == WLAN_STATUS_SUCCESS ? \"success\" : \"failure\",\n+\t\t       nd_pmk ? \" nd_pmk=\" : \"\",\n+\t\t       nd_pmk ? nd_pmk_hex : \"\");\n \n \tif (status != WLAN_STATUS_SUCCESS)\n \t\treturn 0;\n",
    "prefixes": [
        "70/92"
    ]
}