{"id":2229900,"url":"http://patchwork.ozlabs.org/api/1.1/patches/2229900/?format=json","web_url":"http://patchwork.ozlabs.org/project/hostap/patch/20260428200639.40243-93-andrei.otcheretianski@intel.com/","project":{"id":22,"url":"http://patchwork.ozlabs.org/api/1.1/projects/22/?format=json","name":"HostAP Development","link_name":"hostap","list_id":"hostap.lists.infradead.org","list_email":"hostap@lists.infradead.org","web_url":"","scm_url":"","webscm_url":""},"msgid":"<20260428200639.40243-93-andrei.otcheretianski@intel.com>","date":"2026-04-28T20:06:33","name":"[92/97] wpa_supplicant: Add support for password hex in pairing request","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"907d7e147b99070ae6d9be06be6cc67d04b60a75","submitter":{"id":62065,"url":"http://patchwork.ozlabs.org/api/1.1/people/62065/?format=json","name":"Andrei Otcheretianski","email":"andrei.otcheretianski@intel.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/hostap/patch/20260428200639.40243-93-andrei.otcheretianski@intel.com/mbox/","series":[{"id":501927,"url":"http://patchwork.ozlabs.org/api/1.1/series/501927/?format=json","web_url":"http://patchwork.ozlabs.org/project/hostap/list/?series=501927","date":"2026-04-28T20:05:05","name":"NAN: Group keys support, schedule update and more","version":1,"mbox":"http://patchwork.ozlabs.org/series/501927/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/2229900/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2229900/checks/","tags":{},"headers":{"Return-Path":"\n <hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=innwIcfz;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=intel.com header.i=@intel.com header.a=rsa-sha256\n header.s=Intel header.b=b/2XlpOE;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g4sBz74Jlz1xvV\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 29 Apr 2026 06:16:11 +1000 (AEST)","from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wHoqM-00000002NKO-0wWk;\n\tTue, 28 Apr 2026 20:15:42 +0000","from mgamail.intel.com ([198.175.65.16])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wHol5-00000002Cfh-35CQ\n\tfor hostap@lists.infradead.org;\n\tTue, 28 Apr 2026 20:10:19 +0000","from fmviesa001.fm.intel.com ([10.60.135.141])\n  by orvoesa108.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 28 Apr 2026 13:09:38 -0700","from iapp347.iil.intel.com (HELO 87c02287900a.iil.intel.com)\n ([10.167.28.6])\n  by smtpauth.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 28 Apr 2026 13:09:36 -0700"],"DKIM-Signature":["v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To:\n\tMessage-ID:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description:\n\tResent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:\n\tList-Owner; bh=PU5Oidp4EdyqBgkcYHn3Cok+gki7I3/583DpC1FnWNI=; b=innwIcfzgON9XY\n\tzf3Z5Fo/NjxTufwoXCsrxGLy9F9nsD5vzls9tAPauwgsnIxkW/Lvz9OCXJ+UYFIsO2uWI2lsg6n2Y\n\tMinsMC/Rt3MMk0PKyhW/Zxyom7VdL7AXhgGf1yc/8Zvb86eq2VoZMfEo0ul7axcANC5cZH+uw0s8M\n\tClRgPaMiijHxnW7dj1CH4X2xoP936S5Z7Mn6AmjYXkH2vnspk7NOL76UeFvRy7EZJZ9v8u4xbCYpj\n\tJBwi/Ctb3tuPhfyBoZtvHQTk7jb7IAq1Jf2Xaaj+64hCyyErlhOlNYIqXfOtahCKn1l71xwVzxJkk\n\t3Ro5AWhB58fDo3Z3BpyA==;","v=1; a=rsa-sha256; c=relaxed/simple;\n  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n  t=1777407015; x=1808943015;\n  h=from:to:cc:subject:date:message-id:in-reply-to:\n   references:mime-version:content-transfer-encoding;\n  bh=LWOl14C4kJPzpzo0dIOMtrxuKbBCST3WZMohxCxH2GI=;\n  b=b/2XlpOE7GclCCI33ZpttvE2MJUPcb6TNV8M5jPqwKuFVFmWUpzm4fgk\n   Cva4IdQ6xvnzFtEiOgU0y/HNA5VheSs1jjlm6Dq+Efe0CbgceKB0+WIut\n   dUV3NfIsN5o3FteH+niAvLAoap3f9UX6SsUDNLpOclMGG1nIfz1cL/8X+\n   ExFVCbs12DddM9Dr7nOSFibxP+ff988eVoljbC9IOqb4qwPxw02jii65Z\n   XOBdxpFmsM2Y3p2Uin8obsxiXfl0wny7ot7WS/rXXNPeKw5ZKUUgG973I\n   9Nd1e6zK3BD3DckaOMukMm2MUZADbrQl5U+V/jCS2gmRxo3O8ohyuAQZp\n   Q==;"],"X-CSE-ConnectionGUID":["8/dUsrrcR/qzYgqve/5eWg==","YpxGmDWhQTePJt7ZUKJqmA=="],"X-CSE-MsgGUID":["zMNX/ionQB2wxX6x9EddeA==","9s0tORAzSzOPb6sKnNCIZA=="],"X-IronPort-AV":["E=McAfee;i=\"6800,10657,11770\"; a=\"78519753\"","E=Sophos;i=\"6.23,204,1770624000\";\n   d=\"scan'208\";a=\"78519753\"","E=Sophos;i=\"6.23,204,1770624000\";\n   d=\"scan'208\";a=\"257610983\""],"X-ExtLoop1":"1","From":"Andrei Otcheretianski <andrei.otcheretianski@intel.com>","To":"hostap@lists.infradead.org","Cc":"vamsin@qti.qualcomm.com,\n\tmaheshkkv@google.com,\n\tAvraham Stern <avraham.stern@intel.com>","Subject":"[PATCH 92/97] wpa_supplicant: Add support for password hex in pairing\n request","Date":"Tue, 28 Apr 2026 23:06:33 +0300","Message-ID":"<20260428200639.40243-93-andrei.otcheretianski@intel.com>","X-Mailer":"git-send-email 2.53.0","In-Reply-To":"<20260428200639.40243-1-andrei.otcheretianski@intel.com>","References":"<20260428200639.40243-1-andrei.otcheretianski@intel.com>","MIME-Version":"1.0","X-CRM114-Version":"20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ","X-CRM114-CacheID":"sfid-20260428_131015_903625_3C97B486 ","X-CRM114-Status":"GOOD (  12.82  )","X-Spam-Score":"-4.5 (----)","X-Spam-Report":"Spam detection software,\n running on the system \"bombadil.infradead.org\",\n has NOT identified this incoming email as spam.  The original\n message has been attached to this so you can view it or label\n similar future email.  If you have any questions, see\n the administrator of that system for details.\n Content preview:  From: Avraham Stern <avraham.stern@intel.com> Add support\n   for specifying the password as hex in pairing request. Signed-off-by:\n Avraham\n    Stern <avraham.stern@intel.com> --- wpa_supplicant/nan_supplicant.c | 25\n   ++++++++++++++++++++++--- 1 file changed, 22 insertions(+), 3 deletions(-)    \n Content analysis details:   (-4.5 points, 5.0 required)\n  pts rule name              description\n ---- ----------------------\n --------------------------------------------------\n -2.3 RCVD_IN_DNSWL_MED      RBL: Sender listed at https://www.dnswl.org/,\n                             medium trust\n                             [198.175.65.16 listed in list.dnswl.org]\n  0.0 SPF_HELO_NONE          SPF: HELO does not publish an SPF Record\n -0.0 SPF_PASS               SPF: sender matches SPF record\n -0.1 DKIM_VALID_EF          Message has a valid DKIM or DK signature from\n                             envelope-from domain\n  0.1 DKIM_SIGNED            Message has a DKIM or DK signature,\n not necessarily valid\n -0.1 DKIM_VALID             Message has at least one valid DKIM or DK\n signature\n -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from\n author's\n                             domain\n -1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%\n                             [score: 0.0000]\n -0.1 DKIMWL_WL_HIGH         DKIMwl.org - High trust sender","X-BeenThere":"hostap@lists.infradead.org","X-Mailman-Version":"2.1.34","Precedence":"list","List-Id":"<hostap.lists.infradead.org>","List-Unsubscribe":"<http://lists.infradead.org/mailman/options/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=unsubscribe>","List-Archive":"<http://lists.infradead.org/pipermail/hostap/>","List-Post":"<mailto:hostap@lists.infradead.org>","List-Help":"<mailto:hostap-request@lists.infradead.org?subject=help>","List-Subscribe":"<http://lists.infradead.org/mailman/listinfo/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=subscribe>","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"7bit","Sender":"\"Hostap\" <hostap-bounces@lists.infradead.org>","Errors-To":"hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org"},"content":"From: Avraham Stern <avraham.stern@intel.com>\n\nAdd support for specifying the password as hex in pairing request.\n\nSigned-off-by: Avraham Stern <avraham.stern@intel.com>\n---\n wpa_supplicant/nan_supplicant.c | 25 ++++++++++++++++++++++---\n 1 file changed, 22 insertions(+), 3 deletions(-)","diff":"diff --git a/wpa_supplicant/nan_supplicant.c b/wpa_supplicant/nan_supplicant.c\nindex 6f2292a1ba..d53cc206db 100644\n--- a/wpa_supplicant/nan_supplicant.c\n+++ b/wpa_supplicant/nan_supplicant.c\n@@ -3646,7 +3646,7 @@ int wpas_nan_pair(struct wpa_supplicant *wpa_s, const u8 *peer_addr,\n /*\n  * Format: NAN_PAIR <peer_nmi> <handle=<id>>\n  *\t<peer_instance_id=<id>> <auth=<0|1|2>> <cipher=<CCMP|GCMP-256>>\n- *\t[responder] [password=<password>]\n+ *\t[responder] [password=<password>|pwd_hex=<hex>]\n  */\n int wpas_nan_pairing_start(struct wpa_supplicant *wpa_s, char *cmd)\n {\n@@ -3656,7 +3656,8 @@ int wpas_nan_pairing_start(struct wpa_supplicant *wpa_s, char *cmd)\n \tu8 peer_instance_id = 0;\n \tint handle = 0;\n \tint cipher = WPA_CIPHER_NONE;\n-\tchar *password = NULL;\n+\tchar *password = NULL, *password_hex = NULL;\n+\tchar *password_decoded = NULL;\n \tbool responder = false;\n \tchar *pos;\n \n@@ -3698,6 +3699,8 @@ int wpas_nan_pairing_start(struct wpa_supplicant *wpa_s, char *cmd)\n \t\t\tresponder = true;\n \t\t} else if (os_strncmp(token, \"password=\", 9) == 0) {\n \t\t\tpassword = token + 9;\n+\t\t} else if (os_strncmp(token, \"pwd_hex=\", 8) == 0) {\n+\t\t\tpassword_hex = token + 8;\n \t\t} else {\n \t\t\twpa_printf(MSG_INFO,\n \t\t\t\t   \"NAN_PAIR: Invalid parameter: '%s'\",\n@@ -3722,12 +3725,28 @@ int wpas_nan_pairing_start(struct wpa_supplicant *wpa_s, char *cmd)\n \t\treturn -1;\n \t}\n \n+\tif (password && password_hex) {\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t   \"NAN_PAIR: Specify only one of password or pwd_hex\");\n+\t\treturn -1;\n+\t}\n+\n+\tif (password_hex) {\n+\t\tpassword_decoded = wpas_nan_parse_password_hex(password_hex);\n+\t\tif (!password_decoded)\n+\t\t\treturn -1;\n+\t}\n+\n \tif (wpas_nan_pair(wpa_s, addr, auth_mode, cipher, handle,\n-\t\t\t  peer_instance_id, responder, password) < 0) {\n+\t\t\t  peer_instance_id, responder,\n+\t\t\t  password_decoded ? password_decoded : password) < 0) {\n+\t\tos_free(password_decoded);\n \t\twpa_printf(MSG_INFO, \"NAN_PAIR: Pairing initiation failed\");\n \t\treturn -1;\n \t}\n \n+\tos_free(password_decoded);\n+\n \treturn 0;\n }\n \n","prefixes":["92/97"]}