{"id":2226369,"url":"http://patchwork.ozlabs.org/api/1.2/patches/2226369/?format=json","web_url":"http://patchwork.ozlabs.org/project/hostap/patch/20260422122424.43776-23-andrei.otcheretianski@intel.com/","project":{"id":22,"url":"http://patchwork.ozlabs.org/api/1.2/projects/22/?format=json","name":"HostAP Development","link_name":"hostap","list_id":"hostap.lists.infradead.org","list_email":"hostap@lists.infradead.org","web_url":"","scm_url":"","webscm_url":"","list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<20260422122424.43776-23-andrei.otcheretianski@intel.com>","list_archive_url":null,"date":"2026-04-22T12:23:13","name":"[22/92] NAN: Handle pairing PASN auth frame 1","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"5ea4d9f465875e59528bc958b886fe43ba12289f","submitter":{"id":62065,"url":"http://patchwork.ozlabs.org/api/1.2/people/62065/?format=json","name":"Andrei Otcheretianski","email":"andrei.otcheretianski@intel.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/hostap/patch/20260422122424.43776-23-andrei.otcheretianski@intel.com/mbox/","series":[{"id":501001,"url":"http://patchwork.ozlabs.org/api/1.2/series/501001/?format=json","web_url":"http://patchwork.ozlabs.org/project/hostap/list/?series=501001","date":"2026-04-22T12:23:05","name":"Add NAN PASN pairing support","version":1,"mbox":"http://patchwork.ozlabs.org/series/501001/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/2226369/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2226369/checks/","tags":{},"related":[],"headers":{"Return-Path":"\n <hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=HNM8YF5A;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=intel.com header.i=@intel.com header.a=rsa-sha256\n header.s=Intel header.b=e2wKmTa3;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0z3F3Y7Vz1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 22:26:01 +1000 (AEST)","from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wFWdq-0000000A38z-1j3f;\n\tWed, 22 Apr 2026 12:25:18 +0000","from mgamail.intel.com ([192.198.163.17])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wFWdi-0000000A2qL-3ZNu\n\tfor hostap@lists.infradead.org;\n\tWed, 22 Apr 2026 12:25:12 +0000","from orviesa010.jf.intel.com ([10.64.159.150])\n  by fmvoesa111.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 22 Apr 2026 05:25:10 -0700","from iapp347.iil.intel.com (HELO 87c02287900a.iil.intel.com)\n ([10.167.28.6])\n  by orviesa010-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 22 Apr 2026 05:25:10 -0700"],"DKIM-Signature":["v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To:\n\tMessage-ID:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description:\n\tResent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:\n\tList-Owner; bh=gD14nDdMtkSf7mmcyGOZNLuRo5uShilKIzfM+LsP3ec=; b=HNM8YF5ALYhDiL\n\t9HFW3Lm3Jq1WGF8J5ueqa/gTj+HXUWB6TU1ff21I+7S55D7FSqraNUwVLlfkNk0QG6XRxn/Rz4wf0\n\tVeTk4sS+XkpMMHQ7c6m7+88oPusbg0iwLjfIC62D/vNTuNcMCtUGStEAWzg9zFBCfGFeUDKLrEdPd\n\tEgAuzGtDzB4sS3xMCF/SYoWRNKNYhOdSM/Wd7DOmO/T11Xy3m8X2YL+HHCeXclT1kzGGbVDSZaAjA\n\t3Wz+hX1TIcM+tK7SIKE96nGGN8UoGu8hTFmSgHjq/910ibfQekXsg8ROrOvRjEVkBYFT6HHt4NRzM\n\t1Pud7ys+Y+Ift51Gkq8g==;","v=1; a=rsa-sha256; c=relaxed/simple;\n  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n  t=1776860710; x=1808396710;\n  h=from:to:cc:subject:date:message-id:in-reply-to:\n   references:mime-version:content-transfer-encoding;\n  bh=WWki6csedGkrrD1KbTAUCLN+mhBeq608Qqv3ulzcUlk=;\n  b=e2wKmTa36y6zN1GkqbEg+a6vw8GbVy1Nq1c3VxBbhVENHwXgAWdf2ARW\n   aK4tR7psAF2xsQjq6vL+HpNr2shus+JE1eT4DH79ZROmhtJ6uPcSmX6Hd\n   XvNeyQhckXUWp93Ialy56i6IhJRJq8QoaFmtvHpmsSjuWMPQuSbGkB7dq\n   NweL72CA89YqZ00kt7bVHdK4Gv1+U/opWZGuICwkmPm4B6OHA59lhLj8J\n   nNsXuNdTRJipPSLFeoTGJ5OculnB/fBp7pxnhqW7uC3MmcLPIntkUsKU8\n   Gnhb3MQcsTDnCvC6MvJb+GXgKUJI4xxrxW5oD/ZppNFAXjsW2h6boWWcX\n   w==;"],"X-CSE-ConnectionGUID":["fjH5DUZjTbmD9U81z/Woeg==","h1Lm0K9aS1qpsCiE7/Y3XQ=="],"X-CSE-MsgGUID":["CCqC+5LEQMi+ZCoE7cPc6g==","ooN8eirKRd+Kt8ryec/u0g=="],"X-IronPort-AV":["E=McAfee;i=\"6800,10657,11764\"; a=\"77687232\"","E=Sophos;i=\"6.23,192,1770624000\";\n   d=\"scan'208\";a=\"77687232\"","E=Sophos;i=\"6.23,192,1770624000\";\n   d=\"scan'208\";a=\"231444930\""],"X-ExtLoop1":"1","From":"Andrei Otcheretianski <andrei.otcheretianski@intel.com>","To":"hostap@lists.infradead.org","Cc":"vamsin@qti.qualcomm.com,\n\tmaheshkkv@google.com,\n\tAvraham Stern <avraham.stern@intel.com>","Subject":"[PATCH 22/92] NAN: Handle pairing PASN auth frame 1","Date":"Wed, 22 Apr 2026 15:23:13 +0300","Message-ID":"<20260422122424.43776-23-andrei.otcheretianski@intel.com>","X-Mailer":"git-send-email 2.53.0","In-Reply-To":"<20260422122424.43776-1-andrei.otcheretianski@intel.com>","References":"<20260422122424.43776-1-andrei.otcheretianski@intel.com>","MIME-Version":"1.0","X-CRM114-Version":"20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ","X-CRM114-CacheID":"sfid-20260422_052511_005676_51927419 ","X-CRM114-Status":"GOOD (  20.33  )","X-Spam-Score":"-4.4 (----)","X-Spam-Report":"Spam detection software,\n running on the system \"bombadil.infradead.org\",\n has NOT identified this incoming email as spam.  The original\n message has been attached to this so you can view it or label\n similar future email.  If you have any questions, see\n the administrator of that system for details.\n Content preview:  From: Avraham Stern <avraham.stern@intel.com> Add handling\n    for NAN pairing PASN auth frame 1. Signed-off-by: Avraham Stern\n <avraham.stern@intel.com>\n    --- src/nan/nan.c | 6 +- src/nan/nan.h | 9 ++ src/nan/nan_i.h | 2 +\n src/nan/nan_pairing.c\n    | 264 ++++++++++++++++++++++++++++++++++++++++++ 4 file [...]\n Content analysis details:   (-4.4 points, 5.0 required)\n  pts rule name              description\n ---- ----------------------\n --------------------------------------------------\n -2.3 RCVD_IN_DNSWL_MED      RBL: Sender listed at https://www.dnswl.org/,\n                             medium trust\n                             [192.198.163.17 listed in list.dnswl.org]\n  0.0 SPF_HELO_NONE          SPF: HELO does not publish an SPF Record\n -0.0 SPF_PASS               SPF: sender matches SPF record\n -0.1 DKIM_VALID             Message has at least one valid DKIM or DK\n signature\n -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from\n author's\n                             domain\n -0.1 DKIM_VALID_EF          Message has a valid DKIM or DK signature from\n                             envelope-from domain\n  0.1 DKIM_SIGNED            Message has a DKIM or DK signature,\n not necessarily valid\n -1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%\n                             [score: 0.0000]\n -0.0 DKIMWL_WL_HIGH         DKIMwl.org - High trust sender","X-BeenThere":"hostap@lists.infradead.org","X-Mailman-Version":"2.1.34","Precedence":"list","List-Id":"<hostap.lists.infradead.org>","List-Unsubscribe":"<http://lists.infradead.org/mailman/options/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=unsubscribe>","List-Archive":"<http://lists.infradead.org/pipermail/hostap/>","List-Post":"<mailto:hostap@lists.infradead.org>","List-Help":"<mailto:hostap-request@lists.infradead.org?subject=help>","List-Subscribe":"<http://lists.infradead.org/mailman/listinfo/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=subscribe>","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"7bit","Sender":"\"Hostap\" <hostap-bounces@lists.infradead.org>","Errors-To":"hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org"},"content":"From: Avraham Stern <avraham.stern@intel.com>\n\nAdd handling for NAN pairing PASN auth frame 1.\n\nSigned-off-by: Avraham Stern <avraham.stern@intel.com>\n---\n src/nan/nan.c         |   6 +-\n src/nan/nan.h         |   9 ++\n src/nan/nan_i.h       |   2 +\n src/nan/nan_pairing.c | 264 ++++++++++++++++++++++++++++++++++++++++++\n 4 files changed, 277 insertions(+), 4 deletions(-)","diff":"diff --git a/src/nan/nan.c b/src/nan/nan.c\nindex 6904b12815..30dcf6a614 100644\n--- a/src/nan/nan.c\n+++ b/src/nan/nan.c\n@@ -975,10 +975,8 @@ static void nan_parse_peer_elem_container(struct nan_data *nan,\n \t\tnan_parse_peer_elem_container_attr(nan, peer, attr);\n }\n \n-\n-static void nan_parse_peer_dev_capa_ext(struct nan_data *nan,\n-\t\t\t\t\tstruct nan_peer *peer,\n-\t\t\t\t\tstruct nan_attrs *attrs)\n+void nan_parse_peer_dev_capa_ext(struct nan_data *nan, struct nan_peer *peer,\n+\t\t\t\t struct nan_attrs *attrs)\n {\n \tif (!attrs->dev_capa_ext || attrs->dev_capa_ext_len <= 1)\n \t\treturn;\ndiff --git a/src/nan/nan.h b/src/nan/nan.h\nindex 90ada88959..65075c1508 100644\n--- a/src/nan/nan.h\n+++ b/src/nan/nan.h\n@@ -700,6 +700,8 @@ int nan_pairing_initiate_pasn_auth(struct nan_data *nan_data, const u8 *addr,\n \t\t\t\t   const char *password);\n int nan_pairing_pasn_auth_tx_status(struct nan_data *nan, const u8 *data,\n \t\t\t\t    size_t data_len, bool acked);\n+int nan_pairing_auth_rx(struct nan_data *nan_data,\n+\t\t\tconst struct ieee80211_mgmt *mgmt, size_t len);\n #else\n static inline int nan_pairing_add_attrs(struct nan_data *nan_data,\n \t\t\t\t\tstruct wpabuf *buf)\n@@ -722,6 +724,13 @@ static inline int nan_pairing_pasn_auth_tx_status(struct nan_data *nan,\n {\n \treturn -1;\n }\n+\n+static inline int nan_pairing_auth_rx(struct nan_data *nan_data,\n+\t\t\t\t      const struct ieee80211_mgmt *mgmt,\n+\t\t\t\t      size_t len)\n+{\n+\treturn -1;\n+}\n #endif /* CONFIG_PASN */\n \n #endif /* NAN_H */\ndiff --git a/src/nan/nan_i.h b/src/nan/nan_i.h\nindex d0bf37a290..e48f4136da 100644\n--- a/src/nan/nan_i.h\n+++ b/src/nan/nan_i.h\n@@ -742,6 +742,8 @@ bool nan_bootstrap_handle_rx(struct nan_data *nan, const u8 *peer_nmi,\n \t\t\t     int handle, u8 req_instance_id);\n int nan_add_nira_attr(struct wpabuf *buf, const u8 *nira_tag,\n \t\t      const u8 *nira_nonce);\n+void nan_parse_peer_dev_capa_ext(struct nan_data *nan, struct nan_peer *peer,\n+\t\t\t\t struct nan_attrs *attrs);\n #ifdef CONFIG_PASN\n int nan_nira_get_tag_nonce(const struct nan_config *nan, u8 *nira_nonce,\n \t\t\t   u8 *nira_tag);\ndiff --git a/src/nan/nan_pairing.c b/src/nan/nan_pairing.c\nindex c3a7d44245..bb2c5ec51a 100644\n--- a/src/nan/nan_pairing.c\n+++ b/src/nan/nan_pairing.c\n@@ -10,6 +10,7 @@\n #include \"common.h\"\n #include \"nan/nan_i.h\"\n #include \"pasn/pasn_common.h\"\n+#include \"common/ieee802_11_common.h\"\n \n /*\n  * nan_nira_get_tag_nonce - Generate NIRA nonce and compute NIRA tag\n@@ -491,3 +492,266 @@ int nan_pairing_pasn_auth_tx_status(struct nan_data *nan, const u8 *data,\n \n \treturn 0;\n }\n+\n+\n+/*\n+ * nan_parse_csia - Parse NAN Cipher Suite Info Attribute\n+ *\n+ * @csia: Pointer to the CSIA data buffer\n+ * @len: Length of the CSIA data buffer\n+ * @cs: Pointer to nan_cipher_suite structure to store parsed information\n+ *\n+ * Parses the NAN Cipher Suite Info Attribute (CSIA) and extracts the cipher\n+ * suite ID (csid) and instance ID from the attribute. It is assumed that only\n+ * one cipher suite is present in the attribute (which is the case for NAN\n+ * pairing).\n+ *\n+ * Returns: 0 on success, -1 on failure\n+ */\n+static int nan_parse_csia(const u8 *csia, size_t len,\n+\t\t\t  struct nan_cipher_suite *cs)\n+{\n+\t/* Capabilities (1) + Cipher Suite list (2) */\n+\tif (len != sizeof(struct nan_cipher_suite_info) +\n+\t\t   sizeof(struct nan_cipher_suite)) {\n+\t\twpa_printf(MSG_DEBUG, \"NAN: Pairing: CSIA too short\");\n+\t\treturn -1;\n+\t}\n+\n+\tcs->csid = csia[1];\n+\tcs->instance_id = csia[2];\n+\n+\tif (cs->csid != NAN_CS_PK_PASN_128 && cs->csid != NAN_CS_PK_PASN_256) {\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t   \"NAN: Pairing: Unsupported cipher suite in CSIA: %u\",\n+\t\t\t   cs->csid);\n+\t\treturn -1;\n+\t}\n+\n+\treturn 0;\n+}\n+\n+\n+/*\n+ * nan_pairing_process_elems - Process NAN pairing information elements\n+ *\n+ * @nan_data: NAN state data\n+ * @peer: NAN peer information structure\n+ * @mgmt: PASN authentication frame\n+ * @len: Length of the PASN authentication frame\n+ * @cs: Output cipher suite structure to be filled\n+ *\n+ * This function processes NAN pairing information elements from a PASN\n+ * authentication frame. It extracts the selected cipher suite and intance ID.\n+ *\n+ * Returns: 0 on success, -1 on failure\n+ */\n+static int nan_pairing_process_elems(struct nan_data *nan_data,\n+\t\t\t\t     struct nan_peer *peer,\n+\t\t\t\t     const struct ieee80211_mgmt *mgmt,\n+\t\t\t\t     size_t len, struct nan_cipher_suite *cs)\n+{\n+\tconst u8 *ies;\n+\tsize_t ies_len;\n+\tconst u8 *buf;\n+\tstruct wpabuf *ie_buf;\n+\tstruct nan_attrs attrs;\n+\tint ret = -1;\n+\n+\tif (len < offsetof(struct ieee80211_mgmt, u.auth.variable)) {\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t   \"NAN: Pairing: PASN frame too short for NAN IEs\");\n+\t\treturn -1;\n+\t}\n+\n+\ties = mgmt->u.auth.variable;\n+\ties_len = len - offsetof(struct ieee80211_mgmt, u.auth.variable);\n+\n+\tbuf = get_vendor_ie(ies, ies_len, NAN_IE_VENDOR_TYPE);\n+\tif (!buf)\n+\t\treturn -1;\n+\n+\tie_buf = ieee802_11_defrag(buf + 2, buf[1], false);\n+\tif (!ie_buf)\n+\t\treturn -1;\n+\n+\tbuf = wpabuf_head(ie_buf);\n+\tret = nan_parse_attrs(nan_data, &buf[4], wpabuf_len(ie_buf) - 4,\n+\t\t\t      &attrs);\n+\tif (ret)\n+\t\tgoto fail;\n+\n+\tnan_parse_peer_dev_capa_ext(nan_data, peer, &attrs);\n+\n+\tif (!attrs.cipher_suite_info || !attrs.cipher_suite_info_len ||\n+\t    nan_parse_csia(attrs.cipher_suite_info, attrs.cipher_suite_info_len,\n+\t\t\t   cs) < 0) {\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t   \"NAN: Pairing: CSIA attribute missing or invalid\");\n+\t\tret = -1;\n+\t}\n+\n+\n+\tnan_attrs_clear(nan_data, &attrs);\n+fail:\n+\twpabuf_free(ie_buf);\n+\treturn ret;\n+}\n+\n+\n+/*\n+ * nan_pairing_handle_auth_1 - Handle the first PASN frame in NAN pairing\n+ *\n+ * @nan_data: Pointer to NAN data structure\n+ * @own_addr: Own MAC address\n+ * @peer: Pointer to NAN peer structure\n+ * @mgmt: Pointer to the received PASN frame\n+ * @len: Length of the PASN frame\n+ *\n+ * This function processes the first PASN authentication frame during NAN\n+ * pairing as a responder. It initializes the PASN data structure, prepares\n+ * the necessary information elements, and delegates to the PASN module to\n+ * handle the authentication.\n+ *\n+ * Returns: 0 on success, -1 on failure\n+ */\n+static int nan_pairing_handle_auth_1(struct nan_data *nan_data, u8 *own_addr,\n+\t\t\t\t     struct nan_peer *peer,\n+\t\t\t\t     const struct ieee80211_mgmt *mgmt,\n+\t\t\t\t     size_t len)\n+{\n+\tstruct nan_cipher_suite cs;\n+\tstruct pasn_data *pasn;\n+\tint cipher;\n+\n+\tif (peer->pairing.self_pairing_role != NAN_PAIRING_ROLE_RESPONDER) {\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t   \"NAN: Pairing: Unexpected Auth1 frame\");\n+\t\treturn -1;\n+\t}\n+\n+\tpasn = peer->pairing.pasn;\n+\n+\tif (nan_pairing_process_elems(nan_data, peer, mgmt, len, &cs)) {\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t   \"NAN: Pairing: Handle Auth1 NAN attributes failed\");\n+\t\treturn -1;\n+\t}\n+\n+\tcipher = cs.csid == NAN_CS_PK_PASN_256 ? WPA_CIPHER_GCMP_256 :\n+\t\t\t\t\t\t WPA_CIPHER_CCMP;\n+\n+\tif (cipher != pasn->cipher) {\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t   \"NAN: Pairing: Cipher suite mismatch (CSIA: %s, PASN: %s)\",\n+\t\t\t   wpa_cipher_txt(cipher),\n+\t\t\t   wpa_cipher_txt(pasn->cipher));\n+\t\treturn -1;\n+\t}\n+\n+\tif (handle_auth_pasn_1(pasn, own_addr, peer->nmi_addr, mgmt, len,\n+\t\t\t       false) < 0) {\n+\t\twpa_printf(MSG_DEBUG, \"NAN: Pairing: Handle Auth1 failed\");\n+\t\treturn -1;\n+\t}\n+\n+\treturn 0;\n+}\n+\n+\n+/*\n+ * nan_pairing_auth_rx - Handle received NAN pairing authentication frames\n+ *\n+ * @nan_data: Pointer to NAN data structure\n+ * @mgmt: Pointer to the PASN authentication frame\n+ * @len: Length of the PASN authentication frame in bytes\n+ *\n+ * Returns: 0 on success, -1 on failure\n+ */\n+int nan_pairing_auth_rx(struct nan_data *nan_data,\n+\t\t\tconst struct ieee80211_mgmt *mgmt, size_t len)\n+{\n+\tstruct nan_peer *peer;\n+\tu16 auth_alg, auth_transaction, status_code;\n+\tint ret;\n+\tstruct wpabuf *nan_ie;\n+\tconst u8 *buf;\n+\n+\tif (len < offsetof(struct ieee80211_mgmt, u.auth.variable))\n+\t\treturn -1;\n+\n+\tif (os_memcmp(mgmt->da, nan_data->cfg->nmi_addr, ETH_ALEN) != 0) {\n+\t\twpa_printf(MSG_DEBUG, \"NAN: Pairing: Not our frame\");\n+\t\treturn -1;\n+\t}\n+\n+\tauth_alg = le_to_host16(mgmt->u.auth.auth_alg);\n+\tauth_transaction = le_to_host16(mgmt->u.auth.auth_transaction);\n+\tstatus_code = le_to_host16(mgmt->u.auth.status_code);\n+\n+\tif (auth_alg != WLAN_AUTH_PASN) {\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t   \"NAN: Pairing: Not a PASN frame, auth_alg=%d\",\n+\t\t\t   auth_alg);\n+\t\treturn -1;\n+\t}\n+\n+\tbuf = get_vendor_ie(mgmt->u.auth.variable,\n+\t\t\t    len - offsetof(struct ieee80211_mgmt,\n+\t\t\t\t\t   u.auth.variable),\n+\t\t\t    NAN_IE_VENDOR_TYPE);\n+\tif (!buf)\n+\t\treturn -1;\n+\n+\tnan_ie = ieee802_11_defrag(buf + 2, buf[1], false);\n+\tif (!nan_ie) {\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t   \"NAN: Pairing: No NAN IE in PASN authentication frame\");\n+\t\treturn -1;\n+\t}\n+\n+\tret = nan_add_peer(nan_data, mgmt->sa, wpabuf_head_u8(nan_ie) + 4,\n+\t\t\t   wpabuf_len(nan_ie) - 4);\n+\tif (ret) {\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t   \"NAN: Pairing: Failed to add peer from PASN\");\n+\t\twpabuf_free(nan_ie);\n+\t\treturn -1;\n+\t}\n+\n+\twpabuf_free(nan_ie);\n+\n+\tpeer = nan_get_peer(nan_data, mgmt->sa);\n+\tif (!peer) {\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t   \"NAN: Pairing: Failed to get a peer that was just added\");\n+\t\treturn -1;\n+\t}\n+\n+\tif (!peer->pairing.pasn) {\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t   \"NAN: Pairing: PASN data not initialized for peer\");\n+\t\treturn -1;\n+\t}\n+\n+\tif (status_code != WLAN_STATUS_SUCCESS) {\n+\t\tstruct pasn_data *pasn = peer->pairing.pasn;\n+\n+\t\tnan_data->cfg->pairing_result_cb(nan_data->cfg->cb_ctx,\n+\t\t\t\t\t\t peer->nmi_addr, pasn->akmp,\n+\t\t\t\t\t\t pasn->cipher, status_code,\n+\t\t\t\t\t\t NULL);\n+\t\tnan_pairing_deinit_peer(peer);\n+\t\twpa_printf(MSG_DEBUG,\n+\t\t\t   \"NAN: Pairing: Authentication rejected - status=%u\",\n+\t\t\t   status_code);\n+\t\treturn -1;\n+\t}\n+\n+\tif (auth_transaction == 1)\n+\t\treturn nan_pairing_handle_auth_1(nan_data,\n+\t\t\t\t\t\t nan_data->cfg->nmi_addr, peer,\n+\t\t\t\t\t\t mgmt, len);\n+\n+\treturn -1;\n+}\n","prefixes":["22/92"]}