Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2218587/?format=api
{ "id": 2218587, "url": "http://patchwork.ozlabs.org/api/patches/2218587/?format=api", "web_url": "http://patchwork.ozlabs.org/project/hostap/patch/20260401052713.3761478-11-peddolla.reddy@oss.qualcomm.com/", "project": { "id": 22, "url": "http://patchwork.ozlabs.org/api/projects/22/?format=api", "name": "HostAP Development", "link_name": "hostap", "list_id": "hostap.lists.infradead.org", "list_email": "hostap@lists.infradead.org", "web_url": "", "scm_url": "", "webscm_url": "", "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260401052713.3761478-11-peddolla.reddy@oss.qualcomm.com>", "list_archive_url": null, "date": "2026-04-01T05:27:00", "name": "[RFC,10/23] PR: Use set_key to configure secure ranging context for PASN", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "a24c263fff72cbc78d517d6e371390b5ffd7fe9b", "submitter": { "id": 93026, "url": "http://patchwork.ozlabs.org/api/people/93026/?format=api", "name": "Peddolla Harshavardhan Reddy", "email": "peddolla.reddy@oss.qualcomm.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/hostap/patch/20260401052713.3761478-11-peddolla.reddy@oss.qualcomm.com/mbox/", "series": [ { "id": 498338, "url": "http://patchwork.ozlabs.org/api/series/498338/?format=api", "web_url": "http://patchwork.ozlabs.org/project/hostap/list/?series=498338", "date": "2026-04-01T05:26:59", "name": "[RFC,01/23] nl80211_copy.h changes related to Proximity Ranging", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/498338/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2218587/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2218587/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "\n <hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=u3b/urmy;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=qualcomm.com header.i=@qualcomm.com header.a=rsa-sha256\n header.s=qcppdkim1 header.b=lJydf2rJ;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=oss.qualcomm.com header.i=@oss.qualcomm.com\n header.a=rsa-sha256 header.s=google header.b=iSywVX/k;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)" ], "Received": [ "from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fm6KQ0jJvz1yGw\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 02 Apr 2026 01:08:42 +1100 (AEDT)", "from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1w7wEn-0000000FNub-07FB;\n\tWed, 01 Apr 2026 14:08:05 +0000", "from mx0a-0031df01.pphosted.com ([205.220.168.131])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1w7oEJ-0000000E0Di-088k\n\tfor hostap@lists.infradead.org;\n\tWed, 01 Apr 2026 05:35:04 +0000", "from pps.filterd (m0279867.ppops.net [127.0.0.1])\n\tby mx0a-0031df01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 6311oXAU3081559\n\tfor <hostap@lists.infradead.org>; Wed, 1 Apr 2026 05:35:02 GMT", "from mail-qt1-f198.google.com (mail-qt1-f198.google.com\n [209.85.160.198])\n\tby mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 4d8kdktcuc-1\n\t(version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NOT)\n\tfor <hostap@lists.infradead.org>; Wed, 01 Apr 2026 05:35:02 +0000 (GMT)", "by mail-qt1-f198.google.com with SMTP id\n d75a77b69052e-50b34223670so92526351cf.0\n for <hostap@lists.infradead.org>;\n Tue, 31 Mar 2026 22:35:02 -0700 (PDT)", "from hu-peddolla-hyd.qualcomm.com ([202.46.23.25])\n by smtp.gmail.com with ESMTPSA id\n d2e1a72fcca58-82ca843e1desm15021223b3a.4.2026.03.31.22.28.23\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Tue, 31 Mar 2026 22:28:24 -0700 (PDT)" ], "DKIM-Signature": [ "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To:\n\tMessage-Id:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description:\n\tResent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:\n\tList-Owner; bh=J8JcrJVSUOr1FSldwLpodrLgqV39Aw/Ivv9u5F8WpQc=; b=u3b/urmyWlvb2A\n\tdpxt00dMFCxY00ujM18jPDYjjKV3VbYWlxp+FqmWBa//gVWrwSkiHM2deGEnTixtQE7hjEgouvD1B\n\tUxYoT9aUJPtxkh6nowAtRzK0k+AyO9VsPakJI198FFot6ar5hRwJPtT+RIcJ6/b+eliyo3BLBLfrx\n\tgLKgwa2GUv/E7RoHVvCzS2JbwGesYYY83MnRmh2FA5eWCe1Q0cSHgRVrkykHxVaymC9wGVGYRuhJe\n\tVMVYp9LvleRPIKL5Fmjszd3k7wfGjh0Mdch8WoOjjGnH7UWz2EoVtgR0Zk+rYWYkyGSbY/50y5K0M\n\tQJq8u5Pgq1DB7fLp58Gg==;", "v=1; a=rsa-sha256; c=relaxed/relaxed; d=qualcomm.com; h=\n\tcc:content-transfer-encoding:date:from:in-reply-to:message-id\n\t:mime-version:references:subject:to; s=qcppdkim1; bh=Dww910fSfbz\n\tqyzdxUB6YJnUeRBOj65XW2y6QR+HSg6U=; b=lJydf2rJQXpC+UZuxP5ixTJH6KK\n\t8moTaivgZGzReRoA6gEMJ5PHHFrqUNbIPwBOkaN02QOkXamUvuwTwfRoDJ0hX6oy\n\tB6IJ6yVbewxEp5867UZHYeda7+BXkadCzs4wohbC1nCHGeFgoVpnzas69+9djRCn\n\tcrHkEu4VHgSvx92SElKMasdbhbiIn4xa8O11Ad5h2mnKzO6NbCmbvpHeXJPbGR2m\n\tpKMV1uMPsz3xsPE2ddaiC0AGYIBMQdlvI1PrPEUhESmGqOLfty/5sq5CXMwUgIcl\n\tYfCF/rqWRY9YCL3Cs4xTjgYDF6Nq0s0VKmV+YCNaC8odc5TkVYGMyz1BP7w==", "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=oss.qualcomm.com; s=google; t=1775021701; x=1775626501;\n darn=lists.infradead.org;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=Dww910fSfbzqyzdxUB6YJnUeRBOj65XW2y6QR+HSg6U=;\n b=iSywVX/kc785RHGKpcMjc6jfWe2nyvhXKMxBqZxEQ0i6IT33ubsoiz0+d3E5rULvyH\n 6DFafWoyp1e26fPi1PPuqPrDIi67q9VnXjSUGckUdMIDTMzzMk3YsNjF6cJufy8Lj3Ey\n rSaY9fgOqzWX0umsdMZ8V5WFw84RMRdagU0qFxp97nTCJ+QgSeABjaBDumrvQyUvTD23\n IUtn1ppfqQi7wR7ld3P6DcQshDFKN5a3lWfunTV9BL9CojwHoWr8eURxXxL+IeSmrB1H\n lFQ4/2l3IGKH7sXI61YHICj4J/Eo92gfeGWxxthoG6E+YMWTcaTukgBvhUFoIxaD4uJW\n WhUQ==" ], "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1775021701; x=1775626501;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=Dww910fSfbzqyzdxUB6YJnUeRBOj65XW2y6QR+HSg6U=;\n b=oEbnmWxfZNnwZOECWGj459QwNSNgX0z7JmKf3ZRkSQzFhKNFhKN6J3C5x8bYIBfgHI\n k4ytqH1oavBHU3rR54uR6UPMhD7MMRVvhh2PVE58Bj2w9puNXj7hLGl74v/UEGCEO1Yj\n cTkMxZXreYjF1GAGlRqpOrkTWbiWHc5jXZJ17wWK2bz6J8F52hUaQpiiscYWB6OKuBB6\n Ilq4veok71DnUtiRWW0XW/u2Yc7syx0RsSv25/1E2B2vUFA31VNuZJPX+ZMZLQYImsTq\n CaKUOJR2frNbp82DTjvB3yKmjtPvknSbnQyXMbqwrcCtHmeFBPlSOm8yfd4PySC2DLyS\n aPyA==", "X-Gm-Message-State": "AOJu0YyW+LbRrQeXB+b4ZgxVc7FsuLSLCp0i3KCdls06dn2LS2Hb06pY\n\toOi8eHIjmfxhIlVIuSHP8DOQGTZB1RBeUNlTf6A8xXRcj60YkiZgGf/gNL3KC+lUbHQq1xTF4kg\n\t5+V0rwCohevPmZkkG0Ney7DG1yGVlHyabkzffwtRGxgiDn94IIlmBqeWq155j6AuNGWQpef0=", "X-Gm-Gg": "ATEYQzxKMQTrVsEFAju9OhT1rsLElXI4kXv5bWZVeR4aZdYZzx/aQdfKuR3+uYy8bg9\n\taFKu93m+Va9zSm71omFQA5gwFYSMSBbbxCfqHuKo30UuJyY1pD2pflAPVWH4Jzg5pvtpe9n+hmr\n\tctjpXVISmLYwl+/yHBTSDrugsm/cp3aoFUHdsZaD/sBZD48gtzsiDBkbQubGGemAFYJgLsWfXeW\n\tu1uU/RiU/4u4R8LiJAXdP5dwFIfiWjuBD+RSDpTZW8r/JgOJ3cVo+j5mLa3rxF7Zip52Y8UArTE\n\tXmNqZek/iZZv6q3NAlIjrbr49JPIISHqT++R3EganCTxCvM/l0btjQJgxq+nULx2YMBzQ0ZYxtS\n\tDydtIYYRyrrLdYff0LlTcYF+FEM2qBHvKegAMY7PLKRdwuIR93BPzBio=", "X-Received": [ "by 2002:ac8:5d8a:0:b0:509:1045:efd0 with SMTP id\n d75a77b69052e-50d3bce1c5fmr31812171cf.33.1775021701349;\n Tue, 31 Mar 2026 22:35:01 -0700 (PDT)", "by 2002:a05:6a00:14c5:b0:81f:3cac:38a1 with SMTP id\n d2e1a72fcca58-82ce88f55a7mr2515006b3a.6.1775021305021;\n Tue, 31 Mar 2026 22:28:25 -0700 (PDT)" ], "From": "Peddolla Harshavardhan Reddy <peddolla.reddy@oss.qualcomm.com>", "To": "hostap@lists.infradead.org", "Cc": "vjakkam@qti.qualcomm.com", "Subject": "[RFC PATCH 10/23] PR: Use set_key to configure secure ranging context\n for PASN", "Date": "Wed, 1 Apr 2026 10:57:00 +0530", "Message-Id": "<20260401052713.3761478-11-peddolla.reddy@oss.qualcomm.com>", "X-Mailer": "git-send-email 2.34.1", "In-Reply-To": "<20260401052713.3761478-1-peddolla.reddy@oss.qualcomm.com>", "References": "<20260401052713.3761478-1-peddolla.reddy@oss.qualcomm.com>", "MIME-Version": "1.0", "X-Proofpoint-Spam-Details-Enc": "AW1haW4tMjYwNDAxMDA0NSBTYWx0ZWRfX9hD2ebGM177v\n 4cyQgND8VHFHofszVhGUnVu+NXUNy67KeId0gBYdoS6hvmlbSZS+505G3qcJfjLXs043kTevKkk\n bff5VnAc0R8Z//VzB22dsyKwmnvl6/O+x/V7AqvDRGhtuPIg+f+Hg8oeaUoickG3hKVI3t5gJQr\n 2ofkLwoPaqN7IhMyr7lf1jHnK9jhu5WlhEbWoSZ5uZWJawsKhloPJVDNNLmseUtcA8Wk+v4fSgx\n Y/eQWnYIR63BRizmfOzCw47XmVTrOzgDd5xR/gRQtH/cvqW0+uw/qW7PDPIFvB1kLTVPrcz4MkK\n b1y3g+If6nTqU4MytPEjlT0nWAE4sW2T4oddGNEYIc4rcSXar8ifuSV9hl14QUlVaE3nXe9UBCM\n +e01phcOMQvA1cQWuJ3UpI9Ezan3OavR7ZoGkApwpvusNcfsED5AZUM94X/wmBo+CmBbgbNEPE3\n AqgRXxcKlskkHWgqTSA==", "X-Proofpoint-GUID": "qs61PkRE9hcrzLoh6W77ugLRNbep2-un", "X-Authority-Analysis": "v=2.4 cv=YsQChoYX c=1 sm=1 tr=0 ts=69ccae86 cx=c_pps\n a=mPf7EqFMSY9/WdsSgAYMbA==:117 a=ZePRamnt/+rB5gQjfz0u9A==:17\n a=A5OVakUREuEA:10 a=s4-Qcg_JpJYA:10 a=VkNPw1HP01LnGYTKEx00:22\n a=u7WPNUs3qKkmUXheDGA7:22 a=eoimf2acIAo5FJnRuUoq:22 a=EUspDBNiAAAA:8\n a=g7FLfmINn09JJxtsDPoA:9 a=dawVfQjAaf238kedN5IG:22", "X-Proofpoint-ORIG-GUID": "qs61PkRE9hcrzLoh6W77ugLRNbep2-un", "X-Proofpoint-Virus-Version": "vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-04-01_02,2026-03-31_02,2025-10-01_01", "X-Proofpoint-Spam-Details": "rule=outbound_notspam policy=outbound score=0\n suspectscore=0 spamscore=0 bulkscore=0 clxscore=1015 impostorscore=0\n phishscore=0 lowpriorityscore=0 adultscore=0 priorityscore=1501\n malwarescore=0 classifier=typeunknown authscore=0 authtc= authcc=\n route=outbound adjust=0 reason=mlx scancount=1 engine=8.22.0-2603050001\n definitions=main-2604010045", "X-CRM114-Version": "20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ", "X-CRM114-CacheID": "sfid-20260331_223503_079002_6F58E45F ", "X-CRM114-Status": "GOOD ( 19.09 )", "X-Spam-Score": "0.2 (/)", "X-Spam-Report": "Spam detection software,\n running on the system \"bombadil.infradead.org\",\n has NOT identified this incoming email as spam. The original\n message has been attached to this so you can view it or label\n similar future email. If you have any questions, see\n the administrator of that system for details.\n Content preview: The PR PASN implementation uses\n wpa_drv_set_secure_ranging_ctx()\n to install and clear the pairwise key and LTF keyseed after PASN\n authentication.\n Replace this with the standard set_key driver operatio [...]\n Content analysis details: (0.2 points, 5.0 required)\n pts rule name description\n ---- ----------------------\n --------------------------------------------------\n -0.7 RCVD_IN_DNSWL_LOW RBL: Sender listed at https://www.dnswl.org/, low\n trust\n [205.220.168.131 listed in list.dnswl.org]\n 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record\n -0.0 SPF_PASS SPF: sender matches SPF record\n 0.1 DKIM_SIGNED Message has a DKIM or DK signature,\n not necessarily valid\n -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from\n envelope-from domain\n -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from\n author's\n domain\n -0.1 DKIM_VALID Message has at least one valid DKIM or DK\n signature\n -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1%\n [score: 0.0000]\n 1.0 RCVD_IN_VALIDITY_SAFE_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to\n Validity was blocked. See\n https://knowledge.validity.com/hc/en-us/articles/20961730681243\n for more information.\n [205.220.168.131 listed in\n sa-accredit.habeas.com]\n 1.0 RCVD_IN_VALIDITY_CERTIFIED_BLOCKED RBL: ADMINISTRATOR NOTICE: The\n query to Validity was blocked. See\n https://knowledge.validity.com/hc/en-us/articles/20961730681243\n for more information.\n [205.220.168.131 listed in\n sa-trusted.bondedsender.org]\n 1.0 RCVD_IN_VALIDITY_RPBL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to\n Validity was blocked. See\n https://knowledge.validity.com/hc/en-us/articles/20961730681243\n for more information.\n [205.220.168.131 listed in\n bl.score.senderscore.com]", "X-Mailman-Approved-At": "Wed, 01 Apr 2026 07:07:49 -0700", "X-BeenThere": "hostap@lists.infradead.org", "X-Mailman-Version": "2.1.34", "Precedence": "list", "List-Id": "<hostap.lists.infradead.org>", "List-Unsubscribe": "<http://lists.infradead.org/mailman/options/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=unsubscribe>", "List-Archive": "<http://lists.infradead.org/pipermail/hostap/>", "List-Post": "<mailto:hostap@lists.infradead.org>", "List-Help": "<mailto:hostap-request@lists.infradead.org?subject=help>", "List-Subscribe": "<http://lists.infradead.org/mailman/listinfo/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=subscribe>", "Content-Type": "text/plain; charset=\"us-ascii\"", "Content-Transfer-Encoding": "7bit", "Sender": "\"Hostap\" <hostap-bounces@lists.infradead.org>", "Errors-To": "hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org" }, "content": "The PR PASN implementation uses wpa_drv_set_secure_ranging_ctx()\nto install and clear the pairwise key and LTF keyseed after PASN\nauthentication. Replace this with the standard set_key driver\noperation by extending wpa_driver_set_key_params with ltf_keyseed\nand ltf_keyseed_len fields and adding NL80211_KEY_LTF_SEED support\nto the nl80211 set_key implementation.\n\nSigned-off-by: Peddolla Harshavardhan Reddy <peddolla.reddy@oss.qualcomm.com>\n---\n src/drivers/driver.h | 15 +++++++++++++\n src/drivers/driver_nl80211.c | 10 +++++++++\n wpa_supplicant/pr_supplicant.c | 40 +++++++++++++++++++++++++++++-----\n 3 files changed, 59 insertions(+), 6 deletions(-)", "diff": "diff --git a/src/drivers/driver.h b/src/drivers/driver.h\nindex 2fd8e896a..79e3230da 100644\n--- a/src/drivers/driver.h\n+++ b/src/drivers/driver.h\n@@ -2094,6 +2094,21 @@ struct wpa_driver_set_key_params {\n \t *\n \t * Set to a valid Link ID (0-14) when applicable, otherwise -1. */\n \tint link_id;\n+\n+\t/**\n+\t * ltf_keyseed_len - Length of the LTF keyseed in octets.\n+\t *\n+\t * Set to 0 if no LTF keyseed is provided.\n+\t */\n+\tu8 ltf_keyseed_len;\n+\n+\t/**\n+\t * ltf_keyseed - LTF keyseed for secure ranging (802.11az).\n+\t *\n+\t * Used to configure the secure LTF key seed for a peer measurement\n+\t * session. Set to NULL if not applicable.\n+\t */\n+\tconst u8 *ltf_keyseed;\n };\n \n enum wpa_driver_if_type {\ndiff --git a/src/drivers/driver_nl80211.c b/src/drivers/driver_nl80211.c\nindex 2e7e5ee3e..8acf0243d 100644\n--- a/src/drivers/driver_nl80211.c\n+++ b/src/drivers/driver_nl80211.c\n@@ -3994,6 +3994,16 @@ static int wpa_driver_nl80211_set_key(struct i802_bss *bss,\n \t\t\twpa_hexdump(MSG_DEBUG, \"nl80211: KEY_SEQ\",\n \t\t\t\t seq, seq_len);\n \t\t}\n+\n+\t\tif (params->ltf_keyseed_len && params->ltf_keyseed) {\n+\t\t\tif (nla_put(key_msg, NL80211_KEY_LTF_SEED,\n+\t\t\t\t params->ltf_keyseed_len,\n+\t\t\t\t params->ltf_keyseed))\n+\t\t\t\tgoto fail;\n+\t\t\twpa_hexdump_key(MSG_DEBUG, \"nl80211: KEY_LTF_SEED\",\n+\t\t\t\t\tparams->ltf_keyseed,\n+\t\t\t\t\tparams->ltf_keyseed_len);\n+\t\t}\n \t}\n \n \tif (addr && !is_broadcast_ether_addr(addr)) {\ndiff --git a/wpa_supplicant/pr_supplicant.c b/wpa_supplicant/pr_supplicant.c\nindex aa21ff9d2..fef1e278b 100644\n--- a/wpa_supplicant/pr_supplicant.c\n+++ b/wpa_supplicant/pr_supplicant.c\n@@ -296,13 +296,29 @@ static void wpas_pr_pasn_set_keys(void *ctx, const u8 *own_addr,\n \t\t\t\t struct wpa_ptk *ptk)\n {\n \tstruct wpa_supplicant *wpa_s = ctx;\n+\tstruct wpa_driver_set_key_params params;\n \n \twpa_printf(MSG_DEBUG, \"PR PASN: Set secure ranging context for \" MACSTR,\n \t\t MAC2STR(peer_addr));\n-\twpa_drv_set_secure_ranging_ctx(wpa_s, own_addr, peer_addr, cipher,\n-\t\t\t\t ptk->tk_len, ptk->tk,\n-\t\t\t\t ptk->ltf_keyseed_len,\n-\t\t\t\t ptk->ltf_keyseed, 0);\n+\n+\tif (!wpa_s->driver->set_key)\n+\t\treturn;\n+\n+\tos_memset(¶ms, 0, sizeof(params));\n+\tparams.ifname = wpa_s->ifname;\n+\tparams.alg = wpa_cipher_to_alg(cipher);\n+\tparams.addr = peer_addr;\n+\tparams.key_idx = 0;\n+\tparams.set_tx = 1;\n+\tparams.key = ptk->tk;\n+\tparams.key_len = ptk->tk_len;\n+\tparams.key_flag = KEY_FLAG_PAIRWISE_RX_TX;\n+\tparams.link_id = -1;\n+\tparams.ltf_keyseed = ptk->ltf_keyseed;\n+\tparams.ltf_keyseed_len = ptk->ltf_keyseed_len;\n+\n+\tif (wpa_s->driver->set_key(wpa_s->drv_priv, ¶ms) < 0)\n+\t\twpa_printf(MSG_ERROR, \"nl80211: Failed to set PTK for PASN\");\n }\n \n \n@@ -310,11 +326,23 @@ static void wpas_pr_pasn_clear_keys(void *ctx, const u8 *own_addr,\n \t\t\t\t const u8 *peer_addr)\n {\n \tstruct wpa_supplicant *wpa_s = ctx;\n+\tstruct wpa_driver_set_key_params params;\n \n \twpa_printf(MSG_DEBUG, \"PR PASN: Clear secure ranging context for \"\n \t\t MACSTR, MAC2STR(peer_addr));\n-\twpa_drv_set_secure_ranging_ctx(wpa_s, own_addr, peer_addr, 0, 0, NULL,\n-\t\t\t\t 0, NULL, 1);\n+\n+\tif (!wpa_s->driver->set_key)\n+\t\treturn;\n+\n+\tos_memset(¶ms, 0, sizeof(params));\n+\tparams.ifname = wpa_s->ifname;\n+\tparams.alg = WPA_ALG_NONE;\n+\tparams.addr = peer_addr;\n+\tparams.key_idx = 0;\n+\tparams.link_id = -1;\n+\n+\tif (wpa_s->driver->set_key(wpa_s->drv_priv, ¶ms) < 0)\n+\t\twpa_printf(MSG_ERROR, \"nl80211: Failed to clear PTK for PASN\");\n }\n \n \n", "prefixes": [ "RFC", "10/23" ] }