get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2218363/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2218363,
    "url": "http://patchwork.ozlabs.org/api/patches/2218363/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/hostap/patch/20260401054901.3780435-18-peddolla.reddy@oss.qualcomm.com/",
    "project": {
        "id": 22,
        "url": "http://patchwork.ozlabs.org/api/projects/22/?format=api",
        "name": "HostAP Development",
        "link_name": "hostap",
        "list_id": "hostap.lists.infradead.org",
        "list_email": "hostap@lists.infradead.org",
        "web_url": "",
        "scm_url": "",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260401054901.3780435-18-peddolla.reddy@oss.qualcomm.com>",
    "list_archive_url": null,
    "date": "2026-04-01T05:48:55",
    "name": "[RFC,17/23] PR: Add interface to trigger PASN authentication for ranging",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "490d4f9d9b8929fc7aefe8e0cde5a1e240812a36",
    "submitter": {
        "id": 93026,
        "url": "http://patchwork.ozlabs.org/api/people/93026/?format=api",
        "name": "Peddolla Harshavardhan Reddy",
        "email": "peddolla.reddy@oss.qualcomm.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/hostap/patch/20260401054901.3780435-18-peddolla.reddy@oss.qualcomm.com/mbox/",
    "series": [
        {
            "id": 498276,
            "url": "http://patchwork.ozlabs.org/api/series/498276/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/hostap/list/?series=498276",
            "date": "2026-04-01T05:48:44",
            "name": "PR: Add nl80211 support and ranging for Proximity Detection",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/498276/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2218363/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2218363/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "\n <hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=Zt9E2i5y;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=qualcomm.com header.i=@qualcomm.com header.a=rsa-sha256\n header.s=qcppdkim1 header.b=aqka0R/g;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=oss.qualcomm.com header.i=@oss.qualcomm.com\n header.a=rsa-sha256 header.s=google header.b=RVJRKXle;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4flvH06f8fz1yGH\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 01 Apr 2026 16:50:52 +1100 (AEDT)",
            "from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1w7oT4-0000000E1EG-1dUt;\n\tWed, 01 Apr 2026 05:50:18 +0000",
            "from mx0a-0031df01.pphosted.com ([205.220.168.131])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1w7oSu-0000000E0xJ-0DST\n\tfor hostap@lists.infradead.org;\n\tWed, 01 Apr 2026 05:50:11 +0000",
            "from pps.filterd (m0279866.ppops.net [127.0.0.1])\n\tby mx0a-0031df01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 6315lUbU1831867\n\tfor <hostap@lists.infradead.org>; Wed, 1 Apr 2026 05:50:07 GMT",
            "from mail-pl1-f200.google.com (mail-pl1-f200.google.com\n [209.85.214.200])\n\tby mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 4d8equc55h-1\n\t(version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NOT)\n\tfor <hostap@lists.infradead.org>; Wed, 01 Apr 2026 05:50:07 +0000 (GMT)",
            "by mail-pl1-f200.google.com with SMTP id\n d9443c01a7336-2b24a00d12cso40253315ad.1\n        for <hostap@lists.infradead.org>;\n Tue, 31 Mar 2026 22:50:07 -0700 (PDT)",
            "from hu-peddolla-hyd.qualcomm.com ([202.46.23.25])\n        by smtp.gmail.com with ESMTPSA id\n d9443c01a7336-2b24268aa4fsm129919665ad.36.2026.03.31.22.50.04\n        (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n        Tue, 31 Mar 2026 22:50:05 -0700 (PDT)"
        ],
        "DKIM-Signature": [
            "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To:\n\tMessage-Id:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description:\n\tResent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:\n\tList-Owner; bh=AOml2DIhaF4WMhEYFD97aUZDhUg5/YLMqc0o3gmegvU=; b=Zt9E2i5yBkFlQk\n\tV4uem8ve9jfZPdiP8my1Hv/tXeDarxDKAVZt9RyNbYzEwz7cZfQWA4L9JSNHWxxaj8fc3e3jEJzQ9\n\tWQHlDwjt6jDYLk7aq70sG0ceV0KmcOC9g5ZnItFHAK99l4wykGNtJ6k0MZiE3IvZ9eo7TruNAbYmi\n\tAh1iLYzuAkWDn+yof/j3mn0J6eKndtKaUE2d9CF1arVr1FB191+8Xhi6R+4xacjtGpL2dUggDXk2k\n\tt6//B5Hr2oxkgcpFsvuUx4GQcc6h2k6QfBKqQ1jCOAW/ii0s//Wwx81ETIR1yVMkwQwOyTwc2m425\n\tyvKtLY40eJq/xPu8ZEDQ==;",
            "v=1; a=rsa-sha256; c=relaxed/relaxed; d=qualcomm.com; h=\n\tcc:content-transfer-encoding:date:from:in-reply-to:message-id\n\t:mime-version:references:subject:to; s=qcppdkim1; bh=btWXlY0xnA4\n\t6mD6sAFCNqM+oKybx8E83crk+MrOtSWI=; b=aqka0R/gCEwfBmYN+lBrjGiTcAv\n\ts/zlFG8rRXqSLNdjJtedO5WyNWdX+XBvPE9LLMrfMyNwyuvJRJMeNgC+tIpz426Y\n\tmymgYFOC8luZqIPKrT4e+LHSomJhmBlR4z9U+NTPnZ6QqQ0HfGntWI02p3rd0HqF\n\teUmPDRVmLEf05IaMz0aiCNKzJMEQaKghnyWP8l5z3rdJseusfBKRRz9PEPSkj0rl\n\tDc52vaowLgzKfTy8QJGj0oj1Xej2gse/28KxXAJu+QLSmcWUy+DVcz1M9BkdWOT0\n\t5V/hA94tENdwPyiRbEZn0l0R1ygqBPcjUMkGlYaSHzunZrJMSwaBuVkZWfw==",
            "v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=oss.qualcomm.com; s=google; t=1775022606; x=1775627406;\n darn=lists.infradead.org;\n        h=content-transfer-encoding:mime-version:references:in-reply-to\n         :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n         :message-id:reply-to;\n        bh=btWXlY0xnA46mD6sAFCNqM+oKybx8E83crk+MrOtSWI=;\n        b=RVJRKXlegK1uyejrH9acpDQXIt/PNUTNJ+D6JyR6AsyPFgr7imx5+hN+0QJ6bhMkPF\n         GnamNkvZRriAjxZ5ylCsbf4v7SatBGBuHX4O5Q49tK/3DDV+b7GFf85ncrd1jnZikzUi\n         xmIHGSiCHG3ed4b2VACkB15duxtF3VvLSLnpQfiAc5P6NoXX533BkBnH6FgTuRXJ/RRh\n         leUS9BB2/+84Bv6jfuXNFs2maSw2SuItmOX/14niGDq4CSKJE+g6A0b6oraAdZRMfEZm\n         aUp+1EZ17GnUsWFwBfV/nYr5FnU3ySSke5rIhr0HFWQH6bT3+hrp1lsnNyWSMAcQ+rG8\n         0w1A=="
        ],
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=1e100.net; s=20251104; t=1775022606; x=1775627406;\n        h=content-transfer-encoding:mime-version:references:in-reply-to\n         :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n         :to:cc:subject:date:message-id:reply-to;\n        bh=btWXlY0xnA46mD6sAFCNqM+oKybx8E83crk+MrOtSWI=;\n        b=CvoJJAa+DEUb1jjGGd3vbnEqQmIRijVWpyLUP+YqNoqmRetAiTd+KXS5y2hM1C9uEj\n         D2108nL8Ngj6JAQ0x8ZAkgGWfEDthh/kYKEXaoMPxPiPNNcq/81BjdWMnh/KNGaAz5j5\n         ezapXlZUeOZLOmBjzv/D0cikmkqUliuRnzhRvIVt5Pdh5IGdLt4ndk2428Khaof+81jr\n         LWUFyYKZOLIfBDmUgOwLJfRoCsi5FuB55sejZdNetSWxvozNqbaakutGeJ2GkDuYy9Zv\n         NXsYmGV0GaDW8o2O7gp+vkipKKNULCWtyFGO9aLxCDohtmW3fM8TKSWerziWFaoW37k4\n         NNgQ==",
        "X-Gm-Message-State": "AOJu0Yy4Prgfu4qKftjtaQLIfs7Q1PEtVGbZMzqcKqS+vz/tqqgndhEr\n\t53I7xJJT91djIjE7kC0b4/IpD7r2qVPTttB1jGn+xPtqltEUIXJYtUDMl6RNPiYIcI0HpPyfLcS\n\tkECxW34nm1yWFqyn1Of6feWd1sV1Q6DHm2MCw00oPRxkRpzfw0j2x19iBE+0pHSEo4QCNzPw=",
        "X-Gm-Gg": "ATEYQzwK3gbcFG1SlrIQZQFrutqXzwF0GrH982IIu5LUNjnF3UhzkKp/s0bhIY8GiE3\n\tlHTPFdISR1LqmOYV+1o+jIdlp43iJoaM0OjH0TZgkePaDhnBwrJ5LwLDIK+AWn/l8+Jmhr82JNG\n\tEzfqQEl5a5zEDfTKZGTvSgLZviD3q3FIdQ083mi0+6EQC4g/Zl1Zn/lbFnm8oOsaDcnct5ZWEyu\n\tkghkFKPBe35boRMUWQPa9tRQ7EFGapMqUHN4W/sYu1O7vpNT7RHk7FtofpdVSeg3JCTBRLMGaDb\n\twnPkU4jnvBsMWDtXC0JSEOKswk0Bh6IOvcC5Tyycs2Try1DvWB+QT0I+xaIgYvmQJ8rP1xE24L3\n\trXZuX7EaJb9yGkbN384+DaYXCuVeppkA8WGLJUsnI91HuYcG99M2luEo=",
        "X-Received": [
            "by 2002:a17:902:e78c:b0:2b0:7d3d:756a with SMTP id\n d9443c01a7336-2b269cbe6aamr21025645ad.35.1775022606424;\n        Tue, 31 Mar 2026 22:50:06 -0700 (PDT)",
            "by 2002:a17:902:e78c:b0:2b0:7d3d:756a with SMTP id\n d9443c01a7336-2b269cbe6aamr21025445ad.35.1775022605820;\n        Tue, 31 Mar 2026 22:50:05 -0700 (PDT)"
        ],
        "From": "Peddolla Harshavardhan Reddy <peddolla.reddy@oss.qualcomm.com>",
        "To": "hostap@lists.infradead.org",
        "Cc": "vjakkam@qti.qualcomm.com",
        "Subject": "[RFC PATCH 17/23] PR: Add interface to trigger PASN authentication\n for ranging",
        "Date": "Wed,  1 Apr 2026 11:18:55 +0530",
        "Message-Id": "<20260401054901.3780435-18-peddolla.reddy@oss.qualcomm.com>",
        "X-Mailer": "git-send-email 2.34.1",
        "In-Reply-To": "<20260401054901.3780435-1-peddolla.reddy@oss.qualcomm.com>",
        "References": "<20260401054901.3780435-1-peddolla.reddy@oss.qualcomm.com>",
        "MIME-Version": "1.0",
        "X-Proofpoint-Spam-Details-Enc": "AW1haW4tMjYwNDAxMDA0NyBTYWx0ZWRfX5LagjiVBNMAx\n MAAL0ZSdj0oatbttbd5O68a2SpHtO0vMm10Z/lQMOyOLowWRxYF0x6bBMPNh7+SFWwHfP5z//Yn\n ab2QSWlwqjadmHNCiw+D+xPhw9VR2lI0u8JYgSrO3BYx74jkQvTXOPygfnYjmJrp2NpX341TfVg\n uq6b1fdesSPHtZ+4LLTnvo28VUkzLZfDMzf458JOA345gewdZT5gA6BF5sqjRYz4ZuYSexk70G6\n kz5bYQGdLDwsvI7NxythpxnYJO1xisLYrnxsaoWM8e2ho47uxlIad7UY5+OFVv+VdcqjLPdwDTx\n LWgUyG/RH6wOgFeYX27zDHvGp5y2tTg0aL8DJ5Zr80yYS8HrZN/g3K/x7+RwZK39dtydjnGp7VA\n 2ih9zQQB3aAL9N/Xyp8fZq8ABvztBT9O2tZhfzuTo7KOkKdO1yFkBCvZhiTZrrHs/9YvcjD0nGw\n qvBkFS2VIP4dQUi+xDA==",
        "X-Proofpoint-GUID": "PJu0ndX_QAE4kfIdBxshmyWyc08jQ1lt",
        "X-Proofpoint-ORIG-GUID": "PJu0ndX_QAE4kfIdBxshmyWyc08jQ1lt",
        "X-Authority-Analysis": "v=2.4 cv=YMOSCBGx c=1 sm=1 tr=0 ts=69ccb20f cx=c_pps\n a=IZJwPbhc+fLeJZngyXXI0A==:117 a=ZePRamnt/+rB5gQjfz0u9A==:17\n a=A5OVakUREuEA:10 a=s4-Qcg_JpJYA:10 a=VkNPw1HP01LnGYTKEx00:22\n a=u7WPNUs3qKkmUXheDGA7:22 a=YMgV9FUhrdKAYTUUvYB2:22 a=EUspDBNiAAAA:8\n a=zQH8U5pUUgrdRfhNYjMA:9 a=uG9DUKGECoFWVXl0Dc02:22",
        "X-Proofpoint-Virus-Version": "vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-04-01_02,2026-03-31_02,2025-10-01_01",
        "X-Proofpoint-Spam-Details": "rule=outbound_notspam policy=outbound score=0\n priorityscore=1501 clxscore=1015 spamscore=0 impostorscore=0 adultscore=0\n lowpriorityscore=0 bulkscore=0 phishscore=0 malwarescore=0 suspectscore=0\n classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0\n reason=mlx scancount=1 engine=8.22.0-2603050001 definitions=main-2604010047",
        "X-CRM114-Version": "20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ",
        "X-CRM114-CacheID": "sfid-20260331_225008_199290_55D25B35 ",
        "X-CRM114-Status": "GOOD (  22.37  )",
        "X-Spam-Score": "0.2 (/)",
        "X-Spam-Report": "Spam detection software,\n running on the system \"bombadil.infradead.org\",\n has NOT identified this incoming email as spam.  The original\n message has been attached to this so you can view it or label\n similar future email.  If you have any questions, see\n the administrator of that system for details.\n Content preview:  Add a new interface wpas_pr_pasn_trigger() that allows\n triggering\n    PASN authentication for a single peer as part of the proximity ranging\n workflow.\n    This function serves as the entry point for initiatin [...]\n Content analysis details:   (0.2 points, 5.0 required)\n  pts rule name              description\n ---- ----------------------\n --------------------------------------------------\n -0.7 RCVD_IN_DNSWL_LOW      RBL: Sender listed at https://www.dnswl.org/, low\n                             trust\n                             [205.220.168.131 listed in list.dnswl.org]\n  1.0 RCVD_IN_VALIDITY_RPBL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to\n                              Validity was blocked.  See\n                             https://knowledge.validity.com/hc/en-us/articles/20961730681243\n                              for more information.\n                           [205.220.168.131 listed in\n bl.score.senderscore.com]\n  1.0 RCVD_IN_VALIDITY_CERTIFIED_BLOCKED RBL: ADMINISTRATOR NOTICE: The\n                             query to Validity was blocked.  See\n                             https://knowledge.validity.com/hc/en-us/articles/20961730681243\n                              for more information.\n                        [205.220.168.131 listed in\n sa-trusted.bondedsender.org]\n  1.0 RCVD_IN_VALIDITY_SAFE_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to\n                              Validity was blocked.  See\n                             https://knowledge.validity.com/hc/en-us/articles/20961730681243\n                              for more information.\n                             [205.220.168.131 listed in\n sa-accredit.habeas.com]\n  0.0 SPF_HELO_NONE          SPF: HELO does not publish an SPF Record\n -0.0 SPF_PASS               SPF: sender matches SPF record\n  0.1 DKIM_SIGNED            Message has a DKIM or DK signature,\n not necessarily valid\n -0.1 DKIM_VALID_EF          Message has a valid DKIM or DK signature from\n                             envelope-from domain\n -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from\n author's\n                             domain\n -0.1 DKIM_VALID             Message has at least one valid DKIM or DK\n signature\n -1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%\n                             [score: 0.0000]",
        "X-BeenThere": "hostap@lists.infradead.org",
        "X-Mailman-Version": "2.1.34",
        "Precedence": "list",
        "List-Id": "<hostap.lists.infradead.org>",
        "List-Unsubscribe": "<http://lists.infradead.org/mailman/options/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=unsubscribe>",
        "List-Archive": "<http://lists.infradead.org/pipermail/hostap/>",
        "List-Post": "<mailto:hostap@lists.infradead.org>",
        "List-Help": "<mailto:hostap-request@lists.infradead.org?subject=help>",
        "List-Subscribe": "<http://lists.infradead.org/mailman/listinfo/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=subscribe>",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Sender": "\"Hostap\" <hostap-bounces@lists.infradead.org>",
        "Errors-To": "hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org"
    },
    "content": "Add a new interface wpas_pr_pasn_trigger() that allows triggering\nPASN authentication for a single peer as part of the proximity\nranging workflow. This function serves as the entry point for\ninitiating PASN authentication when ranging operations require\nsecure peer authentication.\n\nThe interface integrates with the existing PASN authentication\nframework and prepares for subsequent ranging operations upon\nsuccessful authentication.\n\nSigned-off-by: Peddolla Harshavardhan Reddy <peddolla.reddy@oss.qualcomm.com>\n---\n src/common/proximity_ranging.c |  3 ++\n src/common/proximity_ranging.h | 22 ++++++++\n wpa_supplicant/pr_supplicant.c | 96 ++++++++++++++++++++++++++++++++++\n wpa_supplicant/pr_supplicant.h |  7 +++\n 4 files changed, 128 insertions(+)",
    "diff": "diff --git a/src/common/proximity_ranging.c b/src/common/proximity_ranging.c\nindex 449d8f3bb..616bd9f1e 100644\n--- a/src/common/proximity_ranging.c\n+++ b/src/common/proximity_ranging.c\n@@ -146,6 +146,9 @@ void pr_deinit(struct pr_data *pr)\n \t\tpr_device_free(pr, dev);\n \t}\n \n+\tos_free(pr->pr_pasn_params);\n+\tpr->pr_pasn_params = NULL;\n+\n \tpr_deinit_dev_iks(pr);\n \n #ifdef CONFIG_PASN\ndiff --git a/src/common/proximity_ranging.h b/src/common/proximity_ranging.h\nindex 57481fe4c..b7e9da303 100644\n--- a/src/common/proximity_ranging.h\n+++ b/src/common/proximity_ranging.h\n@@ -258,6 +258,25 @@ enum pr_attr_id {\n #define PR_PASN_AUTH_MODE_SAE    1\n #define PR_PASN_AUTH_MODE_PMK    2\n \n+/**\n+ * struct pr_pasn_ranging_params - peer parameters to be used in PASN\n+ * then to trigger ranging in case where PR PASN is successful.\n+ */\n+struct pr_pasn_ranging_params {\n+\tenum {\n+\t\tPR_PASN_AND_RANGING,\n+\t\tPR_STOP_RANGING,\n+\t} action;\n+\tu8 peer_addr[ETH_ALEN];\n+\tu8 ranging_type;\n+\tu8 ranging_role;\n+\tu8 pr_pasn_status;\n+\tu8 auth_mode;\n+\tint freq;\n+\tu8 src_addr[ETH_ALEN];\n+\tenum pr_pasn_role pasn_role;\n+};\n+\n struct pr_dev_ik {\n \tstruct dl_list list;\n \tu8 dik[DEVICE_IDENTITY_KEY_LEN];\n@@ -477,6 +496,9 @@ struct pr_data {\n \t/* PMKSA cache for PASN-PMK authentication */\n \tstruct rsn_pmksa_cache *initiator_pmksa;\n \tstruct rsn_pmksa_cache *responder_pmksa;\n+\n+\t/* PR PASN request tracking - similar to pasn_params in wpa_supplicant */\n+\tstruct pr_pasn_ranging_params *pr_pasn_params;\n };\n \n /* PR Device Identity Resolution Attribute parameters */\ndiff --git a/wpa_supplicant/pr_supplicant.c b/wpa_supplicant/pr_supplicant.c\nindex f265966e2..f820a0466 100644\n--- a/wpa_supplicant/pr_supplicant.c\n+++ b/wpa_supplicant/pr_supplicant.c\n@@ -512,6 +512,8 @@ void wpas_pr_deinit(struct wpa_supplicant *wpa_s)\n \n void wpas_pr_pd_stop(struct wpa_supplicant *wpa_s)\n {\n+\tstruct pr_data *pr = wpa_s->global->pr;\n+\n \tif (is_zero_ether_addr(wpa_s->pd_addr)) {\n \t\twpa_printf(MSG_DEBUG, \"PR: pd_stop: no active PD wdev\");\n \t\treturn;\n@@ -520,6 +522,11 @@ void wpas_pr_pd_stop(struct wpa_supplicant *wpa_s)\n \twpa_printf(MSG_DEBUG, \"PR: Stopping PD wdev addr=\" MACSTR,\n \t\t   MAC2STR(wpa_s->pd_addr));\n \n+\tif (pr && pr->pr_pasn_params) {\n+\t\tos_free(pr->pr_pasn_params);\n+\t\tpr->pr_pasn_params = NULL;\n+\t}\n+\n \twpa_drv_pd_stop(wpa_s);\n \tos_memset(wpa_s->pd_addr, 0, ETH_ALEN);\n \twpa_printf(MSG_DEBUG, \"PR: PD wdev stopped\");\n@@ -913,6 +920,95 @@ int wpas_pr_initiate_pasn_auth(struct wpa_supplicant *wpa_s,\n }\n \n \n+/**\n+ * wpas_pr_pasn_trigger - Trigger PASN authentication for a single peer\n+ * @wpa_s: Pointer to wpa_supplicant data\n+ * @pr_pasn_params: Pointer to PR PASN ranging parameters (single peer)\n+ *\n+ * This function is the entry point for initiating PASN authentication with\n+ * a single peer for proximity ranging. It extracts the peer information\n+ * from the structure and initiates PASN authentication.\n+ */\n+void wpas_pr_pasn_trigger(struct wpa_supplicant *wpa_s,\n+\t\t\t  struct pr_pasn_ranging_params *pr_pasn_params)\n+{\n+\tstruct pr_data *pr = wpa_s->global->pr;\n+\tstruct pr_pasn_ranging_params *dst;\n+\n+\tif (!pr_pasn_params) {\n+\t\twpa_printf(MSG_DEBUG, \"PR PASN: trigger: NULL params\");\n+\t\treturn;\n+\t}\n+\n+\tif (!pr) {\n+\t\twpa_printf(MSG_DEBUG, \"PR PASN: trigger: PR not initialized\");\n+\t\treturn;\n+\t}\n+\n+\tif (pr->pr_pasn_params) {\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t   \"PR PASN: auth_trigger: Already in progress\");\n+\t\tpr_pasn_params->pr_pasn_status = PASN_STATUS_FAILURE;\n+\t\treturn;\n+\t}\n+\n+\tif (pr_pasn_params->action == PR_PASN_AND_RANGING) {\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t   \"PR PASN: Triggering PASN authentication for \" MACSTR\n+\t\t\t   \" type=%u role=%u mode=%u freq=%d\",\n+\t\t\t   MAC2STR(pr_pasn_params->peer_addr),\n+\t\t\t   pr_pasn_params->ranging_type,\n+\t\t\t   pr_pasn_params->ranging_role,\n+\t\t\t   pr_pasn_params->auth_mode,\n+\t\t\t   pr_pasn_params->freq);\n+\n+\t\t/* Allocate and store the params to track the request */\n+\t\tpr->pr_pasn_params = os_zalloc(sizeof(*pr->pr_pasn_params));\n+\t\tif (!pr->pr_pasn_params) {\n+\t\t\twpa_printf(MSG_DEBUG,\n+\t\t\t\t   \"PR PASN: Failed to allocate params\");\n+\t\t\tpr_pasn_params->pr_pasn_status = PASN_STATUS_FAILURE;\n+\t\t\treturn;\n+\t\t}\n+\n+\t\t/* Copy params field by field, similar to wpas_pasn_auth_trigger */\n+\t\tdst = pr->pr_pasn_params;\n+\t\tdst->action = pr_pasn_params->action;\n+\t\tos_memcpy(dst->peer_addr, pr_pasn_params->peer_addr, ETH_ALEN);\n+\t\tdst->ranging_type = pr_pasn_params->ranging_type;\n+\t\tdst->ranging_role = pr_pasn_params->ranging_role;\n+\t\tdst->pr_pasn_status = pr_pasn_params->pr_pasn_status;\n+\t\tdst->auth_mode = pr_pasn_params->auth_mode;\n+\t\tdst->freq = pr_pasn_params->freq;\n+\t\tos_memcpy(dst->src_addr, pr_pasn_params->src_addr, ETH_ALEN);\n+\t\tdst->pasn_role = pr_pasn_params->pasn_role;\n+\n+\t\t/* Initiate PASN authentication for the peer */\n+\t\tif (wpas_pr_initiate_pasn_auth(wpa_s, pr_pasn_params->peer_addr,\n+\t\t\t\t\t       pr_pasn_params->freq,\n+\t\t\t\t\t       pr_pasn_params->auth_mode,\n+\t\t\t\t\t       pr_pasn_params->ranging_role,\n+\t\t\t\t\t       pr_pasn_params->ranging_type, 0,\n+\t\t\t\t\t       pr_pasn_params->src_addr,\n+\t\t\t\t\t       pr_pasn_params->pasn_role)) {\n+\t\t\twpa_printf(MSG_DEBUG,\n+\t\t\t\t   \"PR PASN: Failed to initiate PASN for \" MACSTR,\n+\t\t\t\t   MAC2STR(pr_pasn_params->peer_addr));\n+\t\t\tpr_pasn_params->pr_pasn_status = PASN_STATUS_FAILURE;\n+\t\t\tos_free(pr->pr_pasn_params);\n+\t\t\tpr->pr_pasn_params = NULL;\n+\t\t\twpas_pr_pd_stop(wpa_s);\n+\t\t\treturn;\n+\t\t}\n+\t} else {\n+\t\twpa_printf(MSG_WARNING,\n+\t\t\t   \"PR PASN: Unsupported action %u, ignoring request\",\n+\t\t\t   pr_pasn_params->action);\n+\t\tpr_pasn_params->pr_pasn_status = PASN_STATUS_FAILURE;\n+\t}\n+}\n+\n+\n int wpas_pr_pasn_auth_tx_status(struct wpa_supplicant *wpa_s, const u8 *data,\n \t\t\t\tsize_t data_len, bool acked)\n {\ndiff --git a/wpa_supplicant/pr_supplicant.h b/wpa_supplicant/pr_supplicant.h\nindex 254924aac..6972ecacb 100644\n--- a/wpa_supplicant/pr_supplicant.h\n+++ b/wpa_supplicant/pr_supplicant.h\n@@ -40,6 +40,8 @@ int wpas_pr_pasn_auth_rx(struct wpa_supplicant *wpa_s,\n \t\t\t int freq);\n void wpas_pr_cancel_remain_on_channel_cb(struct wpa_supplicant *wpa_s,\n \t\t\t\t\t unsigned int freq);\n+void wpas_pr_pasn_trigger(struct wpa_supplicant *wpa_s,\n+\t\t\t  struct pr_pasn_ranging_params *pr_pasn_params);\n \n #else /* CONFIG_PR */\n \n@@ -108,6 +110,11 @@ wpas_pr_cancel_remain_on_channel_cb(struct wpa_supplicant *wpa_s,\n {\n }\n \n+static inline void wpas_pr_pasn_trigger(struct wpa_supplicant *wpa_s,\n+\t\t\t\t\tstruct pr_pasn_ranging_params *pr_pasn_params)\n+{\n+}\n+\n #endif /* CONFIG_PR */\n \n #endif /* PR_SUPPLICANT_H */\n",
    "prefixes": [
        "RFC",
        "17/23"
    ]
}