get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2219095/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2219095,
    "url": "http://patchwork.ozlabs.org/api/patches/2219095/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/hostap/patch/20260402122428.4058436-11-peddolla.reddy@oss.qualcomm.com/",
    "project": {
        "id": 22,
        "url": "http://patchwork.ozlabs.org/api/projects/22/?format=api",
        "name": "HostAP Development",
        "link_name": "hostap",
        "list_id": "hostap.lists.infradead.org",
        "list_email": "hostap@lists.infradead.org",
        "web_url": "",
        "scm_url": "",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260402122428.4058436-11-peddolla.reddy@oss.qualcomm.com>",
    "list_archive_url": null,
    "date": "2026-04-02T12:24:15",
    "name": "[RFC,v2,10/23] PR: Use set_key to configure secure ranging context for PASN",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "a24c263fff72cbc78d517d6e371390b5ffd7fe9b",
    "submitter": {
        "id": 93026,
        "url": "http://patchwork.ozlabs.org/api/people/93026/?format=api",
        "name": "Peddolla Harshavardhan Reddy",
        "email": "peddolla.reddy@oss.qualcomm.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/hostap/patch/20260402122428.4058436-11-peddolla.reddy@oss.qualcomm.com/mbox/",
    "series": [
        {
            "id": 498475,
            "url": "http://patchwork.ozlabs.org/api/series/498475/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/hostap/list/?series=498475",
            "date": "2026-04-02T12:24:08",
            "name": "PR: Add nl80211 support and ranging for Proximity Detection",
            "version": 2,
            "mbox": "http://patchwork.ozlabs.org/series/498475/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2219095/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2219095/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "\n <hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=3JPM1Nlo;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n secure) header.d=infradead.org header.i=@infradead.org header.a=rsa-sha256\n header.s=desiato.20200630 header.b=a/97AAuX;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=qualcomm.com header.i=@qualcomm.com header.a=rsa-sha256\n header.s=qcppdkim1 header.b=HVGNrPbR;\n\tdkim=neutral header.d=oss.qualcomm.com header.i=@oss.qualcomm.com\n header.a=rsa-sha256 header.s=google header.b=MBSoyF6J;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fmh0Q5lMZz1yGJ\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 02 Apr 2026 23:25:58 +1100 (AEDT)",
            "from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1w8H7C-0000000HaY6-1Gnf;\n\tThu, 02 Apr 2026 12:25:38 +0000",
            "from desiato.infradead.org ([2001:8b0:10b:1:d65d:64ff:fe57:4e05])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1w8H7A-0000000HaUP-0Vek\n\tfor hostap@bombadil.infradead.org;\n\tThu, 02 Apr 2026 12:25:36 +0000",
            "from mx0b-0031df01.pphosted.com ([205.220.180.131])\n\tby desiato.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1w8H76-00000002PhJ-1a9p\n\tfor hostap@lists.infradead.org;\n\tThu, 02 Apr 2026 12:25:34 +0000",
            "from pps.filterd (m0279871.ppops.net [127.0.0.1])\n\tby mx0a-0031df01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 632BEahw091011\n\tfor <hostap@lists.infradead.org>; Thu, 2 Apr 2026 12:25:31 GMT",
            "from mail-pg1-f200.google.com (mail-pg1-f200.google.com\n [209.85.215.200])\n\tby mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 4d9jcu9nj8-1\n\t(version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NOT)\n\tfor <hostap@lists.infradead.org>; Thu, 02 Apr 2026 12:25:30 +0000 (GMT)",
            "by mail-pg1-f200.google.com with SMTP id\n 41be03b00d2f7-b630753cc38so1400739a12.1\n        for <hostap@lists.infradead.org>;\n Thu, 02 Apr 2026 05:25:30 -0700 (PDT)",
            "from hu-peddolla-hyd.qualcomm.com ([202.46.23.25])\n        by smtp.gmail.com with ESMTPSA id\n 41be03b00d2f7-c76c6475b56sm2714236a12.1.2026.04.02.05.25.23\n        (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n        Thu, 02 Apr 2026 05:25:23 -0700 (PDT)"
        ],
        "DKIM-Signature": [
            "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To:\n\tMessage-Id:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description:\n\tResent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:\n\tList-Owner; bh=J8JcrJVSUOr1FSldwLpodrLgqV39Aw/Ivv9u5F8WpQc=; b=3JPM1Nlo9v2OQx\n\tq+QXp3nZ09VOuqP2q6Wc22uiE1sg64hZd6kqg4YvEezUAQsH6Khr3T5TT9gVFT9DOBDrx6BIpRelW\n\tcnO8XnXuIaK2LXqYTGxiMvrvZDU4iuFPdbn8n4hYaH1D1EZJEzolDLiUHCRF5lulxKd14iXPj+DKU\n\t6sz2M1AlfX3mqgkQMRKFm2e7xDtTa1049EP2Y3y1gGyuXhTq6M/e3Tw4q7Ff4ys9u8nqoy0WxV/VS\n\tQnV6hK5Xp+8HNl15ApnHxJMDfryA1l2JU/dBI+ZLLhvdUStDT3RVwYjKgC3Zqd1yL7Mg8o5RdLIN4\n\tdLXrUNrAKNMHkj2DWRrA==;",
            "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=infradead.org; s=desiato.20200630; h=Content-Transfer-Encoding:MIME-Version\n\t:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender:Reply-To:\n\tContent-Type:Content-ID:Content-Description;\n\tbh=Dww910fSfbzqyzdxUB6YJnUeRBOj65XW2y6QR+HSg6U=; b=a/97AAuXxZEDlE/lYyyQVbmVBN\n\tXI3h0QAbz+0YrUoBEfTNEU3Bp7jdTpjkM7FYdfHroGkfyzMHEqET4A1VhOPq3xnzmdOtq9BtttGcO\n\tctvXEkD/mckmcTGHJm02keh6HCUqtV5K9zJsuJH/wqpgn3B6pv0NXldqPeXOiG4vRMSFOP9HZtVHI\n\tMIz7HHwfkF+bj6yb/pefFSiMgaS53eWuPZ0xGYx4DOxK5tg6YTbFV6NAdI3B4UxAha5kuozzPAWd8\n\tJ7fLlDAwBVSVqLgalUQpBK9pL6/WflZ/WujEk2PDbqHJwcntJle+2hoQZoMNbju9iJXGQFeQluOhE\n\tNNccLBKQ==;",
            "v=1; a=rsa-sha256; c=relaxed/relaxed; d=qualcomm.com; h=\n\tcc:content-transfer-encoding:date:from:in-reply-to:message-id\n\t:mime-version:references:subject:to; s=qcppdkim1; bh=Dww910fSfbz\n\tqyzdxUB6YJnUeRBOj65XW2y6QR+HSg6U=; b=HVGNrPbRdyNj4l1U/3pRZKhtvPt\n\tu5o0GLiuWeKM2m1Wlw8yr4ZAW6G2CX9IQsOepRFVqFiPm/Nrslq7jjWwaoyHJiUf\n\t+aMPNxQEkS/0vfw9HLFFQJjAn7Mlxwu761gMHoZeZStVMXRY3p4IuCZNulNgDVD3\n\tNC+pQceEc/V6Bn7uZxHtUKmuuYYnZpXviUr7kVIprowNnCgNSbM3tvVsgoQBpWyl\n\tcVtGcH9ta5b6hYWIC6E7TbJRFRpaHXgElvXy5kFz7m8Em6kYpP8QLw9zwnydfisK\n\tHKvQqODGvD7ZKUXBCh37DLiTmfLpwTd0t+CbSxZ7/J8bDtPCTrACD3CEChw==",
            "v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=oss.qualcomm.com; s=google; t=1775132730; x=1775737530;\n darn=lists.infradead.org;\n        h=content-transfer-encoding:mime-version:references:in-reply-to\n         :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n         :message-id:reply-to;\n        bh=Dww910fSfbzqyzdxUB6YJnUeRBOj65XW2y6QR+HSg6U=;\n        b=MBSoyF6JR915IUdPIERqb2lPN0NHKPCXGihVxk38hfGKMMgEwPMPWLvORMPMStuJjh\n         HlEJjKEmAcH2Mjq7bvJJP0ii+f8Zv2iHCVcagFJVkskOZ6ZP9WCnzWW0hNxbFq2Yx84f\n         P5aWYW2nl5xHAcbFy8tXOskMbUK5oJ9Q7BeqnO2H8K1hPtbA37sIfms+owToNVtkU9mt\n         PsnB7mOAw5MC2pQl1JrjLPEeK9pfPbQu3+Ft5zRlgq3k+W7Kgo6MwIjz0d/SEi6ZGbPw\n         gYBEtcrIf2HwVzJMyti36FgxrbRT7lT5v0oKSyDd+Y2rk+8+UY0F8ExxhuCITPdiG4ri\n         g3Lw=="
        ],
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=1e100.net; s=20251104; t=1775132730; x=1775737530;\n        h=content-transfer-encoding:mime-version:references:in-reply-to\n         :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n         :to:cc:subject:date:message-id:reply-to;\n        bh=Dww910fSfbzqyzdxUB6YJnUeRBOj65XW2y6QR+HSg6U=;\n        b=jCWYIbBiA40Gg5LZ/XdKz+cn+ISfkHKf7cDd2rz96Jun5kH7aySu66z/WBWV2eejsb\n         ZC89V1jSWbUR+SediEoYprLYKM/fpiCMqfEw4egtdVLGmwuDTHfqVuPai9lIfQSh/RDW\n         rIisBtnb5d3gJsfRjaYomOhdP+TjRvJrtMa58BnOzgW7Bw6kY5FA4wJln3eAWBvUnt6y\n         fYjgk5T3nbZksIJmECmez6WDCMrX4wnm9/QhdChevDDS3zhgf2dWoPrRNq/y7G3SEGXR\n         5ngwsrXHs4xJPmR01UWAWHOTRYaIINuAHxfBjCEyQJIgdHaQGunCtDWw1E6rszqnEoTM\n         mwNw==",
        "X-Gm-Message-State": "AOJu0Yy53WQ4ryW2TGUeguWlvuEZmGyyHJfbXElFRQczUOKhw2hc3rGc\n\tJ8TL8EAbfG1teie/ioub99eIUUd1mvAtu9mv6tFNUms29rU6tbUDVOexqidwQLzILEkdJwK3RNv\n\tWv2roHOr6bn4miPQu44APY+TBT+IDrXQkMFgw4NSfvuXH3Nydaw+L31XcCEybxslqtAp3XNw=",
        "X-Gm-Gg": "ATEYQzzJxVsYWssc0/zDNied8asOBB5ePMNXpocrH41w/mAqL6pQmH56Xx2IZt+JOqD\n\tNPMUFVV+DgMprXTS5ds4aBdyCZqVeknHEMU0sx90dcbtxEKd32MeMubyqwYrvF10U0PDt4zT9l6\n\t6L/tcoPa0t0QJ6HHePInpT1SNJzceRNR/y+tbIFapCUlGGKGGfc0ZaxaAS2CyLBMR/IQumy6xCd\n\tvP+HwGZ4JxLeWtWb2IpPvGlE/mEu+kuSt/WiUGno/h37J+yR6pS2X9+m+XXg/SQUyAuBDfnFTkd\n\tUdCMEjcavqVTckBBMnrrYxPnCVlW7nFr/4undz0XHW3tbQWKV2KE2/DrBzyL8rHUfR4+XSNKHSC\n\tflLT99u6SYD+412F6Ux7rKunSi59EkEQaAK2jCKAeU0uUi9nKdrLP6l8=",
        "X-Received": [
            "by 2002:a05:6a20:94c9:b0:39b:f12e:d51 with SMTP id\n adf61e73a8af0-39f10e2e75emr3179498637.57.1775132729837;\n        Thu, 02 Apr 2026 05:25:29 -0700 (PDT)",
            "by 2002:a05:6a20:94c9:b0:39b:f12e:d51 with SMTP id\n adf61e73a8af0-39f10e2e75emr3179477637.57.1775132729379;\n        Thu, 02 Apr 2026 05:25:29 -0700 (PDT)"
        ],
        "From": "Peddolla Harshavardhan Reddy <peddolla.reddy@oss.qualcomm.com>",
        "To": "hostap@lists.infradead.org",
        "Cc": "vjakkam@qti.qualcomm.com",
        "Subject": "[RFC PATCH v2 10/23] PR: Use set_key to configure secure ranging\n context for PASN",
        "Date": "Thu,  2 Apr 2026 17:54:15 +0530",
        "Message-Id": "<20260402122428.4058436-11-peddolla.reddy@oss.qualcomm.com>",
        "X-Mailer": "git-send-email 2.34.1",
        "In-Reply-To": "<20260402122428.4058436-1-peddolla.reddy@oss.qualcomm.com>",
        "References": "<20260402122428.4058436-1-peddolla.reddy@oss.qualcomm.com>",
        "MIME-Version": "1.0",
        "X-Proofpoint-Spam-Details-Enc": "AW1haW4tMjYwNDAyMDExMSBTYWx0ZWRfX+7WjliYEKFkt\n CjiSDBJDgByOIBC4+0CrvEJ7ULAeQc6YBdH3O2flaGFSxuuWi1utiZDmRJBc1iTYpxPoKF/HQLG\n JJ7CCunWm4xNa3n3q4d/CLAeoEgrfq//YMgp9p1XIr505PXG4JRyAtXTK4M1c3RF2koE42OXPGh\n u6AUxCpi+mbxS64a8I0WjDVl/5rWpSzWdzlUjaGk6jVP1gaIDPPcrVCTxq+002Mj3UBxzKKLSaZ\n HciKZHIaA975LkB7t31jAMD0YurjxDIFijbKEGY3jzjy65dkhRScqf0WrPGJ3I6x4c/mREFeHYf\n ttH+lrOeUA2j2jFuBiF4vbFRLynMB1QDSr59xHepvV+uZy8huQ3rWltChl1JNxYZG6ZAlohIPZ0\n oh1zRD8Jsyg6eRU0TsdSMXhwfjAz1OkgmV44CNJJcfjOG2aiXs7ky9UUpPvXxkXeo1yi6o7gnqt\n mTdQJPF/wECgZGaaXAQ==",
        "X-Proofpoint-GUID": "rw2pN6CdtFQ0LOshG4G0Y52lPET1jkB-",
        "X-Authority-Analysis": "v=2.4 cv=eYYwvrEH c=1 sm=1 tr=0 ts=69ce603a cx=c_pps\n a=oF/VQ+ItUULfLr/lQ2/icg==:117 a=ZePRamnt/+rB5gQjfz0u9A==:17\n a=A5OVakUREuEA:10 a=s4-Qcg_JpJYA:10 a=VkNPw1HP01LnGYTKEx00:22\n a=u7WPNUs3qKkmUXheDGA7:22 a=3WHJM1ZQz_JShphwDgj5:22 a=EUspDBNiAAAA:8\n a=g7FLfmINn09JJxtsDPoA:9 a=3WC7DwWrALyhR5TkjVHa:22",
        "X-Proofpoint-ORIG-GUID": "rw2pN6CdtFQ0LOshG4G0Y52lPET1jkB-",
        "X-Proofpoint-Virus-Version": "vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-04-02_01,2026-04-02_01,2025-10-01_01",
        "X-Proofpoint-Spam-Details": "rule=outbound_notspam policy=outbound score=0\n suspectscore=0 priorityscore=1501 lowpriorityscore=0 phishscore=0\n impostorscore=0 malwarescore=0 bulkscore=0 adultscore=0 clxscore=1015\n spamscore=0 classifier=typeunknown authscore=0 authtc= authcc= route=outbound\n adjust=0 reason=mlx scancount=1 engine=8.22.0-2603050001\n definitions=main-2604020111",
        "X-CRM114-Version": "20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ",
        "X-CRM114-CacheID": "sfid-20260402_132532_780090_96733113 ",
        "X-CRM114-Status": "GOOD (  19.18  )",
        "X-Spam-Score": "2.1 (++)",
        "X-Spam-Report": "Spam detection software,\n running on the system \"desiato.infradead.org\",\n has NOT identified this incoming email as spam.  The original\n message has been attached to this so you can view it or label\n similar future email.  If you have any questions, see\n the administrator of that system for details.\n Content preview:  The PR PASN implementation uses\n wpa_drv_set_secure_ranging_ctx()\n    to install and clear the pairwise key and LTF keyseed after PASN\n authentication.\n    Replace this with the standard set_key driver operatio [...]\n Content analysis details:   (2.1 points, 5.0 required)\n  pts rule name              description\n ---- ----------------------\n --------------------------------------------------\n -0.7 RCVD_IN_DNSWL_LOW      RBL: Sender listed at https://www.dnswl.org/, low\n                             trust\n                             [205.220.180.131 listed in list.dnswl.org]\n  1.0 RCVD_IN_VALIDITY_RPBL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to\n                              Validity was blocked.  See\n                             https://knowledge.validity.com/hc/en-us/articles/20961730681243\n                              for more information.\n                           [205.220.180.131 listed in\n bl.score.senderscore.com]\n  1.0 RCVD_IN_VALIDITY_SAFE_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to\n                              Validity was blocked.  See\n                             https://knowledge.validity.com/hc/en-us/articles/20961730681243\n                              for more information.\n                             [205.220.180.131 listed in\n sa-accredit.habeas.com]\n  1.0 RCVD_IN_VALIDITY_CERTIFIED_BLOCKED RBL: ADMINISTRATOR NOTICE: The\n                             query to Validity was blocked.  See\n                             https://knowledge.validity.com/hc/en-us/articles/20961730681243\n                              for more information.\n                        [205.220.180.131 listed in\n sa-trusted.bondedsender.org]\n -0.0 SPF_PASS               SPF: sender matches SPF record\n  0.0 SPF_HELO_NONE          SPF: HELO does not publish an SPF Record\n  0.1 DKIM_SIGNED            Message has a DKIM or DK signature,\n not necessarily valid\n -0.1 DKIM_VALID_EF          Message has a valid DKIM or DK signature from\n                             envelope-from domain\n -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from\n author's\n                             domain\n -0.1 DKIM_VALID             Message has at least one valid DKIM or DK\n signature",
        "X-BeenThere": "hostap@lists.infradead.org",
        "X-Mailman-Version": "2.1.34",
        "Precedence": "list",
        "List-Id": "<hostap.lists.infradead.org>",
        "List-Unsubscribe": "<http://lists.infradead.org/mailman/options/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=unsubscribe>",
        "List-Archive": "<http://lists.infradead.org/pipermail/hostap/>",
        "List-Post": "<mailto:hostap@lists.infradead.org>",
        "List-Help": "<mailto:hostap-request@lists.infradead.org?subject=help>",
        "List-Subscribe": "<http://lists.infradead.org/mailman/listinfo/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=subscribe>",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Sender": "\"Hostap\" <hostap-bounces@lists.infradead.org>",
        "Errors-To": "hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org"
    },
    "content": "The PR PASN implementation uses wpa_drv_set_secure_ranging_ctx()\nto install and clear the pairwise key and LTF keyseed after PASN\nauthentication. Replace this with the standard set_key driver\noperation by extending wpa_driver_set_key_params with ltf_keyseed\nand ltf_keyseed_len fields and adding NL80211_KEY_LTF_SEED support\nto the nl80211 set_key implementation.\n\nSigned-off-by: Peddolla Harshavardhan Reddy <peddolla.reddy@oss.qualcomm.com>\n---\n src/drivers/driver.h           | 15 +++++++++++++\n src/drivers/driver_nl80211.c   | 10 +++++++++\n wpa_supplicant/pr_supplicant.c | 40 +++++++++++++++++++++++++++++-----\n 3 files changed, 59 insertions(+), 6 deletions(-)",
    "diff": "diff --git a/src/drivers/driver.h b/src/drivers/driver.h\nindex 2fd8e896a..79e3230da 100644\n--- a/src/drivers/driver.h\n+++ b/src/drivers/driver.h\n@@ -2094,6 +2094,21 @@ struct wpa_driver_set_key_params {\n \t *\n \t * Set to a valid Link ID (0-14) when applicable, otherwise -1. */\n \tint link_id;\n+\n+\t/**\n+\t * ltf_keyseed_len - Length of the LTF keyseed in octets.\n+\t *\n+\t * Set to 0 if no LTF keyseed is provided.\n+\t */\n+\tu8 ltf_keyseed_len;\n+\n+\t/**\n+\t * ltf_keyseed - LTF keyseed for secure ranging (802.11az).\n+\t *\n+\t * Used to configure the secure LTF key seed for a peer measurement\n+\t * session. Set to NULL if not applicable.\n+\t */\n+\tconst u8 *ltf_keyseed;\n };\n \n enum wpa_driver_if_type {\ndiff --git a/src/drivers/driver_nl80211.c b/src/drivers/driver_nl80211.c\nindex 2e7e5ee3e..8acf0243d 100644\n--- a/src/drivers/driver_nl80211.c\n+++ b/src/drivers/driver_nl80211.c\n@@ -3994,6 +3994,16 @@ static int wpa_driver_nl80211_set_key(struct i802_bss *bss,\n \t\t\twpa_hexdump(MSG_DEBUG, \"nl80211: KEY_SEQ\",\n \t\t\t\t    seq, seq_len);\n \t\t}\n+\n+\t\tif (params->ltf_keyseed_len && params->ltf_keyseed) {\n+\t\t\tif (nla_put(key_msg, NL80211_KEY_LTF_SEED,\n+\t\t\t\t    params->ltf_keyseed_len,\n+\t\t\t\t    params->ltf_keyseed))\n+\t\t\t\tgoto fail;\n+\t\t\twpa_hexdump_key(MSG_DEBUG, \"nl80211: KEY_LTF_SEED\",\n+\t\t\t\t\tparams->ltf_keyseed,\n+\t\t\t\t\tparams->ltf_keyseed_len);\n+\t\t}\n \t}\n \n \tif (addr && !is_broadcast_ether_addr(addr)) {\ndiff --git a/wpa_supplicant/pr_supplicant.c b/wpa_supplicant/pr_supplicant.c\nindex aa21ff9d2..fef1e278b 100644\n--- a/wpa_supplicant/pr_supplicant.c\n+++ b/wpa_supplicant/pr_supplicant.c\n@@ -296,13 +296,29 @@ static void wpas_pr_pasn_set_keys(void *ctx, const u8 *own_addr,\n \t\t\t\t  struct wpa_ptk *ptk)\n {\n \tstruct wpa_supplicant *wpa_s = ctx;\n+\tstruct wpa_driver_set_key_params params;\n \n \twpa_printf(MSG_DEBUG, \"PR PASN: Set secure ranging context for \" MACSTR,\n \t\t   MAC2STR(peer_addr));\n-\twpa_drv_set_secure_ranging_ctx(wpa_s, own_addr, peer_addr, cipher,\n-\t\t\t\t       ptk->tk_len, ptk->tk,\n-\t\t\t\t       ptk->ltf_keyseed_len,\n-\t\t\t\t       ptk->ltf_keyseed, 0);\n+\n+\tif (!wpa_s->driver->set_key)\n+\t\treturn;\n+\n+\tos_memset(&params, 0, sizeof(params));\n+\tparams.ifname = wpa_s->ifname;\n+\tparams.alg = wpa_cipher_to_alg(cipher);\n+\tparams.addr = peer_addr;\n+\tparams.key_idx = 0;\n+\tparams.set_tx = 1;\n+\tparams.key = ptk->tk;\n+\tparams.key_len = ptk->tk_len;\n+\tparams.key_flag = KEY_FLAG_PAIRWISE_RX_TX;\n+\tparams.link_id = -1;\n+\tparams.ltf_keyseed = ptk->ltf_keyseed;\n+\tparams.ltf_keyseed_len = ptk->ltf_keyseed_len;\n+\n+\tif (wpa_s->driver->set_key(wpa_s->drv_priv, &params) < 0)\n+\t\twpa_printf(MSG_ERROR, \"nl80211: Failed to set PTK for PASN\");\n }\n \n \n@@ -310,11 +326,23 @@ static void wpas_pr_pasn_clear_keys(void *ctx, const u8 *own_addr,\n \t\t\t\t    const u8 *peer_addr)\n {\n \tstruct wpa_supplicant *wpa_s = ctx;\n+\tstruct wpa_driver_set_key_params params;\n \n \twpa_printf(MSG_DEBUG, \"PR PASN: Clear secure ranging context for \"\n \t\t   MACSTR, MAC2STR(peer_addr));\n-\twpa_drv_set_secure_ranging_ctx(wpa_s, own_addr, peer_addr, 0, 0, NULL,\n-\t\t\t\t       0, NULL, 1);\n+\n+\tif (!wpa_s->driver->set_key)\n+\t\treturn;\n+\n+\tos_memset(&params, 0, sizeof(params));\n+\tparams.ifname = wpa_s->ifname;\n+\tparams.alg = WPA_ALG_NONE;\n+\tparams.addr = peer_addr;\n+\tparams.key_idx = 0;\n+\tparams.link_id = -1;\n+\n+\tif (wpa_s->driver->set_key(wpa_s->drv_priv, &params) < 0)\n+\t\twpa_printf(MSG_ERROR, \"nl80211: Failed to clear PTK for PASN\");\n }\n \n \n",
    "prefixes": [
        "RFC",
        "v2",
        "10/23"
    ]
}