{"id":2226408,"url":"http://patchwork.ozlabs.org/api/1.2/patches/2226408/?format=json","web_url":"http://patchwork.ozlabs.org/project/hostap/patch/20260422122424.43776-60-andrei.otcheretianski@intel.com/","project":{"id":22,"url":"http://patchwork.ozlabs.org/api/1.2/projects/22/?format=json","name":"HostAP Development","link_name":"hostap","list_id":"hostap.lists.infradead.org","list_email":"hostap@lists.infradead.org","web_url":"","scm_url":"","webscm_url":"","list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<20260422122424.43776-60-andrei.otcheretianski@intel.com>","list_archive_url":null,"date":"2026-04-22T12:23:50","name":"[59/92] NAN: Add an indication that a peer is paired","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"1ed7132b947e777eb180f2706278a910efeb3ecb","submitter":{"id":62065,"url":"http://patchwork.ozlabs.org/api/1.2/people/62065/?format=json","name":"Andrei Otcheretianski","email":"andrei.otcheretianski@intel.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/hostap/patch/20260422122424.43776-60-andrei.otcheretianski@intel.com/mbox/","series":[{"id":501001,"url":"http://patchwork.ozlabs.org/api/1.2/series/501001/?format=json","web_url":"http://patchwork.ozlabs.org/project/hostap/list/?series=501001","date":"2026-04-22T12:23:05","name":"Add NAN PASN pairing support","version":1,"mbox":"http://patchwork.ozlabs.org/series/501001/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/2226408/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2226408/checks/","tags":{},"related":[],"headers":{"Return-Path":"\n <hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>","X-Original-To":"incoming@patchwork.ozlabs.org","Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=ChDOwNcB;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=intel.com header.i=@intel.com header.a=rsa-sha256\n header.s=Intel header.b=MGShJ74D;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)"],"Received":["from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0z7c3gdzz1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 22:29:48 +1000 (AEST)","from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wFWhd-0000000A8VA-3vTN;\n\tWed, 22 Apr 2026 12:29:13 +0000","from mgamail.intel.com ([192.198.163.17])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wFWfL-0000000A34B-1ScD\n\tfor hostap@lists.infradead.org;\n\tWed, 22 Apr 2026 12:26:59 +0000","from orviesa010.jf.intel.com ([10.64.159.150])\n  by fmvoesa111.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 22 Apr 2026 05:26:10 -0700","from iapp347.iil.intel.com (HELO 87c02287900a.iil.intel.com)\n ([10.167.28.6])\n  by orviesa010-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 22 Apr 2026 05:26:10 -0700"],"DKIM-Signature":["v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To:\n\tMessage-ID:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description:\n\tResent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:\n\tList-Owner; bh=ZTbTVjulWqj+XrVxhzl/aObeoMgEZnGrUBiJxDhOSlU=; b=ChDOwNcBvsrDML\n\tlRR1MyBJvuPWOia4aeggwwgjrhWlzxVWbm+cgwOel6kEm0YkxCHDQd/Oo5ohUOKL4lUTqld4iV0+k\n\twQU6yzmgVifEa8aHR1eZGCVQgL5JiIGkGrI0XYR7J7dEBhLv4eT9ZLJLBEg9B+00ImIswGXYI/Zq+\n\tEt4GrTxf92C3q9UFiYJyN2jJclXFlb4Rv1/7mWVsd8hlF9i5DMjSvuDENxS0sv/T6JDKyMibk5c8t\n\tk7bIljCiKzKma+wAphYJvW/aoa0gLG8yfiRVautUXz8rPxyuwQxNdhld5f+L+CH/fJ2E8YuSnhm3l\n\typ6WPts+3CzDH/lCvb7g==;","v=1; a=rsa-sha256; c=relaxed/simple;\n  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n  t=1776860811; x=1808396811;\n  h=from:to:cc:subject:date:message-id:in-reply-to:\n   references:mime-version:content-transfer-encoding;\n  bh=zaRAC/LxH6WCoFhNUzKb/YFtsX3TLceLAZIv9Rewxns=;\n  b=MGShJ74D7gFkdvoI2fKaUPIyMVKaxGd1XZCijg92GaK/x1cSqDoI3ooA\n   4KlsmKq8Xv+ISqsq389HNtNMn3L8AI6TKsEt/gB+Ha9Dog0Ohth7KW2Qc\n   JbmssXRm+/aYi78XLgR+dj7emhdKn7qOfx8EV1PMhGJUm9f63L76aQXZI\n   vsV+aDr/u1G2Fh8y4NP0SQcWBo+we6k6YqS+FagwKNz0r3sY3MORUg0C7\n   pLDXKmUWi2jYc/v/6Yl3kNQsPCxgi9clokK5/+0QGSesa9R2o9uOZUmHu\n   DLvX23MCqTnWIJdP2FkUlRu0XK8ALepmq3pUDcMbxfhOuDT1uPuSap1Og\n   Q==;"],"X-CSE-ConnectionGUID":["RawDkkv1SwSeRycL2KxCsw==","d/y+euVhSAGsOLH/hP8pQA=="],"X-CSE-MsgGUID":["RnP+6fawQSu+o2uLAox4NQ==","f+pTIWgFTneArrI0NtjERg=="],"X-IronPort-AV":["E=McAfee;i=\"6800,10657,11764\"; a=\"77687450\"","E=Sophos;i=\"6.23,192,1770624000\";\n   d=\"scan'208\";a=\"77687450\"","E=Sophos;i=\"6.23,192,1770624000\";\n   d=\"scan'208\";a=\"231445154\""],"X-ExtLoop1":"1","From":"Andrei Otcheretianski <andrei.otcheretianski@intel.com>","To":"hostap@lists.infradead.org","Cc":"vamsin@qti.qualcomm.com,\n\tmaheshkkv@google.com,\n\tAvraham Stern <avraham.stern@intel.com>","Subject":"[PATCH 59/92] NAN: Add an indication that a peer is paired","Date":"Wed, 22 Apr 2026 15:23:50 +0300","Message-ID":"<20260422122424.43776-60-andrei.otcheretianski@intel.com>","X-Mailer":"git-send-email 2.53.0","In-Reply-To":"<20260422122424.43776-1-andrei.otcheretianski@intel.com>","References":"<20260422122424.43776-1-andrei.otcheretianski@intel.com>","MIME-Version":"1.0","X-CRM114-Version":"20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ","X-CRM114-CacheID":"sfid-20260422_052651_575082_E2028900 ","X-CRM114-Status":"GOOD (  11.92  )","X-Spam-Score":"-4.4 (----)","X-Spam-Report":"Spam detection software,\n running on the system \"bombadil.infradead.org\",\n has NOT identified this incoming email as spam.  The original\n message has been attached to this so you can view it or label\n similar future email.  If you have any questions, see\n the administrator of that system for details.\n Content preview:  From: Avraham Stern <avraham.stern@intel.com> Add a\n function\n    for other modules to check if the peer is paired. This can be used to\n decide\n    whether frames sent to the peer should be protected. Signed-off-by:\n Avraham\n    Stern <avraham.stern@intel.com> --- src/nan/nan.h | 7 +++++++\n src/nan/nan_i.h\n    | 2 ++ src/nan/nan_pairing.c | 14 ++++++++++++++ 3 files changed,\n 23 insertions(+)    \n Content analysis details:   (-4.4 points, 5.0 required)\n  pts rule name              description\n ---- ----------------------\n --------------------------------------------------\n -2.3 RCVD_IN_DNSWL_MED      RBL: Sender listed at https://www.dnswl.org/,\n                             medium trust\n                             [192.198.163.17 listed in list.dnswl.org]\n  0.0 SPF_HELO_NONE          SPF: HELO does not publish an SPF Record\n -0.0 SPF_PASS               SPF: sender matches SPF record\n -0.1 DKIM_VALID             Message has at least one valid DKIM or DK\n signature\n -0.1 DKIM_VALID_AU          Message has a valid DKIM or DK signature from\n author's\n                             domain\n -0.1 DKIM_VALID_EF          Message has a valid DKIM or DK signature from\n                             envelope-from domain\n  0.1 DKIM_SIGNED            Message has a DKIM or DK signature,\n not necessarily valid\n -1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%\n                             [score: 0.0000]\n -0.0 DKIMWL_WL_HIGH         DKIMwl.org - High trust sender","X-BeenThere":"hostap@lists.infradead.org","X-Mailman-Version":"2.1.34","Precedence":"list","List-Id":"<hostap.lists.infradead.org>","List-Unsubscribe":"<http://lists.infradead.org/mailman/options/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=unsubscribe>","List-Archive":"<http://lists.infradead.org/pipermail/hostap/>","List-Post":"<mailto:hostap@lists.infradead.org>","List-Help":"<mailto:hostap-request@lists.infradead.org?subject=help>","List-Subscribe":"<http://lists.infradead.org/mailman/listinfo/hostap>,\n <mailto:hostap-request@lists.infradead.org?subject=subscribe>","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"7bit","Sender":"\"Hostap\" <hostap-bounces@lists.infradead.org>","Errors-To":"hostap-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org"},"content":"From: Avraham Stern <avraham.stern@intel.com>\n\nAdd a function for other modules to check if the peer is paired.\nThis can be used to decide whether frames sent to the peer\nshould be protected.\n\nSigned-off-by: Avraham Stern <avraham.stern@intel.com>\n---\n src/nan/nan.h         |  7 +++++++\n src/nan/nan_i.h       |  2 ++\n src/nan/nan_pairing.c | 14 ++++++++++++++\n 3 files changed, 23 insertions(+)","diff":"diff --git a/src/nan/nan.h b/src/nan/nan.h\nindex 4225b8fb78..a9bdcf9d67 100644\n--- a/src/nan/nan.h\n+++ b/src/nan/nan.h\n@@ -739,6 +739,7 @@ int nan_pairing_set_pairing_setup(struct nan_data *nan_data, bool value);\n int nan_pairing_set_npk_caching(struct nan_data *nan_data, bool value);\n int nan_pairing_set_pairing_verification(struct nan_data *nan_data, bool value);\n int nan_pairing_set_cipher_suites(struct nan_data *nan_data, u32 value);\n+bool nan_pairing_is_peer_paired(struct nan_data *nan_data, const u8 *peer_addr);\n #else\n static inline int nan_pairing_add_attrs(struct nan_data *nan_data,\n \t\t\t\t\tstruct wpabuf *buf)\n@@ -768,6 +769,12 @@ static inline int nan_pairing_auth_rx(struct nan_data *nan_data,\n {\n \treturn -1;\n }\n+\n+static inline\n+bool nan_pairing_is_peer_paired(struct nan_data *nan_data, const u8 *peer_addr)\n+{\n+\treturn false;\n+}\n #endif /* CONFIG_PASN */\n \n #endif /* NAN_H */\ndiff --git a/src/nan/nan_i.h b/src/nan/nan_i.h\nindex 9c6ff10cab..667bc3b480 100644\n--- a/src/nan/nan_i.h\n+++ b/src/nan/nan_i.h\n@@ -473,6 +473,8 @@ enum nan_pairing_role {\n \n /* Current pairing uses pairing verification */\n #define NAN_PAIRING_FLAG_NPK_VERIFICATION BIT(0)\n+/* Peer is paired */\n+#define NAN_PAIRING_FLAG_PAIRED BIT(1)\n \n /**\n  * struct nan_pairing_peer_data - NAN pairing peer information\ndiff --git a/src/nan/nan_pairing.c b/src/nan/nan_pairing.c\nindex 840044357f..185a9e92a1 100644\n--- a/src/nan/nan_pairing.c\n+++ b/src/nan/nan_pairing.c\n@@ -587,6 +587,8 @@ static void nan_pairing_done(struct nan_data *nan_data, struct nan_peer *peer)\n \tu8 *initiator_nmi, *responder_nmi;\n \tint ret;\n \n+\tpeer->pairing.flags |= NAN_PAIRING_FLAG_PAIRED;\n+\n \tif (!nan_data->cfg->pairing_cfg.npk_caching ||\n \t    !peer->pairing.pairing_cfg.npk_caching ||\n \t    peer->pairing.flags & NAN_PAIRING_FLAG_NPK_VERIFICATION)\n@@ -1375,3 +1377,15 @@ int nan_pairing_set_cipher_suites(struct nan_data *nan, u32 value)\n \tnan->cfg->pairing_cfg.cipher_suites = value;\n \treturn 0;\n }\n+\n+\n+bool nan_pairing_is_peer_paired(struct nan_data *nan_data, const u8 *peer_addr)\n+{\n+\tstruct nan_peer *peer;\n+\n+\tpeer = nan_get_peer(nan_data, peer_addr);\n+\tif (!peer)\n+\t\treturn 0;\n+\n+\treturn !!(peer->pairing.flags & NAN_PAIRING_FLAG_PAIRED);\n+}\n","prefixes":["59/92"]}