[RFC PATCH v2 17/23] PR: Add interface to trigger PASN authentication for ranging
Peddolla Harshavardhan Reddy
peddolla.reddy at oss.qualcomm.com
Thu Apr 2 05:24:22 PDT 2026
Add a new interface wpas_pr_pasn_trigger() that allows triggering
PASN authentication for a single peer as part of the proximity
ranging workflow. This function serves as the entry point for
initiating PASN authentication when ranging operations require
secure peer authentication.
The interface integrates with the existing PASN authentication
framework and prepares for subsequent ranging operations upon
successful authentication.
Signed-off-by: Peddolla Harshavardhan Reddy <peddolla.reddy at oss.qualcomm.com>
---
src/common/proximity_ranging.c | 3 ++
src/common/proximity_ranging.h | 22 ++++++++
wpa_supplicant/pr_supplicant.c | 96 ++++++++++++++++++++++++++++++++++
wpa_supplicant/pr_supplicant.h | 7 +++
4 files changed, 128 insertions(+)
diff --git a/src/common/proximity_ranging.c b/src/common/proximity_ranging.c
index 449d8f3bb..616bd9f1e 100644
--- a/src/common/proximity_ranging.c
+++ b/src/common/proximity_ranging.c
@@ -146,6 +146,9 @@ void pr_deinit(struct pr_data *pr)
pr_device_free(pr, dev);
}
+ os_free(pr->pr_pasn_params);
+ pr->pr_pasn_params = NULL;
+
pr_deinit_dev_iks(pr);
#ifdef CONFIG_PASN
diff --git a/src/common/proximity_ranging.h b/src/common/proximity_ranging.h
index 57481fe4c..b7e9da303 100644
--- a/src/common/proximity_ranging.h
+++ b/src/common/proximity_ranging.h
@@ -258,6 +258,25 @@ enum pr_attr_id {
#define PR_PASN_AUTH_MODE_SAE 1
#define PR_PASN_AUTH_MODE_PMK 2
+/**
+ * struct pr_pasn_ranging_params - peer parameters to be used in PASN
+ * then to trigger ranging in case where PR PASN is successful.
+ */
+struct pr_pasn_ranging_params {
+ enum {
+ PR_PASN_AND_RANGING,
+ PR_STOP_RANGING,
+ } action;
+ u8 peer_addr[ETH_ALEN];
+ u8 ranging_type;
+ u8 ranging_role;
+ u8 pr_pasn_status;
+ u8 auth_mode;
+ int freq;
+ u8 src_addr[ETH_ALEN];
+ enum pr_pasn_role pasn_role;
+};
+
struct pr_dev_ik {
struct dl_list list;
u8 dik[DEVICE_IDENTITY_KEY_LEN];
@@ -477,6 +496,9 @@ struct pr_data {
/* PMKSA cache for PASN-PMK authentication */
struct rsn_pmksa_cache *initiator_pmksa;
struct rsn_pmksa_cache *responder_pmksa;
+
+ /* PR PASN request tracking - similar to pasn_params in wpa_supplicant */
+ struct pr_pasn_ranging_params *pr_pasn_params;
};
/* PR Device Identity Resolution Attribute parameters */
diff --git a/wpa_supplicant/pr_supplicant.c b/wpa_supplicant/pr_supplicant.c
index 237fe9f95..496334021 100644
--- a/wpa_supplicant/pr_supplicant.c
+++ b/wpa_supplicant/pr_supplicant.c
@@ -512,6 +512,8 @@ void wpas_pr_deinit(struct wpa_supplicant *wpa_s)
void wpas_pr_pd_stop(struct wpa_supplicant *wpa_s)
{
+ struct pr_data *pr = wpa_s->global->pr;
+
if (is_zero_ether_addr(wpa_s->pd_addr)) {
wpa_printf(MSG_DEBUG, "PR: pd_stop: no active PD wdev");
return;
@@ -520,6 +522,11 @@ void wpas_pr_pd_stop(struct wpa_supplicant *wpa_s)
wpa_printf(MSG_DEBUG, "PR: Stopping PD wdev addr=" MACSTR,
MAC2STR(wpa_s->pd_addr));
+ if (pr && pr->pr_pasn_params) {
+ os_free(pr->pr_pasn_params);
+ pr->pr_pasn_params = NULL;
+ }
+
wpa_drv_pd_stop(wpa_s);
os_memset(wpa_s->pd_addr, 0, ETH_ALEN);
wpa_printf(MSG_DEBUG, "PR: PD wdev stopped");
@@ -913,6 +920,95 @@ int wpas_pr_initiate_pasn_auth(struct wpa_supplicant *wpa_s,
}
+/**
+ * wpas_pr_pasn_trigger - Trigger PASN authentication for a single peer
+ * @wpa_s: Pointer to wpa_supplicant data
+ * @pr_pasn_params: Pointer to PR PASN ranging parameters (single peer)
+ *
+ * This function is the entry point for initiating PASN authentication with
+ * a single peer for proximity ranging. It extracts the peer information
+ * from the structure and initiates PASN authentication.
+ */
+void wpas_pr_pasn_trigger(struct wpa_supplicant *wpa_s,
+ struct pr_pasn_ranging_params *pr_pasn_params)
+{
+ struct pr_data *pr = wpa_s->global->pr;
+ struct pr_pasn_ranging_params *dst;
+
+ if (!pr_pasn_params) {
+ wpa_printf(MSG_DEBUG, "PR PASN: trigger: NULL params");
+ return;
+ }
+
+ if (!pr) {
+ wpa_printf(MSG_DEBUG, "PR PASN: trigger: PR not initialized");
+ return;
+ }
+
+ if (pr->pr_pasn_params) {
+ wpa_printf(MSG_DEBUG,
+ "PR PASN: auth_trigger: Already in progress");
+ pr_pasn_params->pr_pasn_status = PASN_STATUS_FAILURE;
+ return;
+ }
+
+ if (pr_pasn_params->action == PR_PASN_AND_RANGING) {
+ wpa_printf(MSG_DEBUG,
+ "PR PASN: Triggering PASN authentication for " MACSTR
+ " type=%u role=%u mode=%u freq=%d",
+ MAC2STR(pr_pasn_params->peer_addr),
+ pr_pasn_params->ranging_type,
+ pr_pasn_params->ranging_role,
+ pr_pasn_params->auth_mode,
+ pr_pasn_params->freq);
+
+ /* Allocate and store the params to track the request */
+ pr->pr_pasn_params = os_zalloc(sizeof(*pr->pr_pasn_params));
+ if (!pr->pr_pasn_params) {
+ wpa_printf(MSG_DEBUG,
+ "PR PASN: Failed to allocate params");
+ pr_pasn_params->pr_pasn_status = PASN_STATUS_FAILURE;
+ return;
+ }
+
+ /* Copy params field by field, similar to wpas_pasn_auth_trigger */
+ dst = pr->pr_pasn_params;
+ dst->action = pr_pasn_params->action;
+ os_memcpy(dst->peer_addr, pr_pasn_params->peer_addr, ETH_ALEN);
+ dst->ranging_type = pr_pasn_params->ranging_type;
+ dst->ranging_role = pr_pasn_params->ranging_role;
+ dst->pr_pasn_status = pr_pasn_params->pr_pasn_status;
+ dst->auth_mode = pr_pasn_params->auth_mode;
+ dst->freq = pr_pasn_params->freq;
+ os_memcpy(dst->src_addr, pr_pasn_params->src_addr, ETH_ALEN);
+ dst->pasn_role = pr_pasn_params->pasn_role;
+
+ /* Initiate PASN authentication for the peer */
+ if (wpas_pr_initiate_pasn_auth(wpa_s, pr_pasn_params->peer_addr,
+ pr_pasn_params->freq,
+ pr_pasn_params->auth_mode,
+ pr_pasn_params->ranging_role,
+ pr_pasn_params->ranging_type, 0,
+ pr_pasn_params->src_addr,
+ pr_pasn_params->pasn_role)) {
+ wpa_printf(MSG_DEBUG,
+ "PR PASN: Failed to initiate PASN for " MACSTR,
+ MAC2STR(pr_pasn_params->peer_addr));
+ pr_pasn_params->pr_pasn_status = PASN_STATUS_FAILURE;
+ os_free(pr->pr_pasn_params);
+ pr->pr_pasn_params = NULL;
+ wpas_pr_pd_stop(wpa_s);
+ return;
+ }
+ } else {
+ wpa_printf(MSG_WARNING,
+ "PR PASN: Unsupported action %u, ignoring request",
+ pr_pasn_params->action);
+ pr_pasn_params->pr_pasn_status = PASN_STATUS_FAILURE;
+ }
+}
+
+
int wpas_pr_pasn_auth_tx_status(struct wpa_supplicant *wpa_s, const u8 *data,
size_t data_len, bool acked)
{
diff --git a/wpa_supplicant/pr_supplicant.h b/wpa_supplicant/pr_supplicant.h
index 254924aac..6972ecacb 100644
--- a/wpa_supplicant/pr_supplicant.h
+++ b/wpa_supplicant/pr_supplicant.h
@@ -40,6 +40,8 @@ int wpas_pr_pasn_auth_rx(struct wpa_supplicant *wpa_s,
int freq);
void wpas_pr_cancel_remain_on_channel_cb(struct wpa_supplicant *wpa_s,
unsigned int freq);
+void wpas_pr_pasn_trigger(struct wpa_supplicant *wpa_s,
+ struct pr_pasn_ranging_params *pr_pasn_params);
#else /* CONFIG_PR */
@@ -108,6 +110,11 @@ wpas_pr_cancel_remain_on_channel_cb(struct wpa_supplicant *wpa_s,
{
}
+static inline void wpas_pr_pasn_trigger(struct wpa_supplicant *wpa_s,
+ struct pr_pasn_ranging_params *pr_pasn_params)
+{
+}
+
#endif /* CONFIG_PR */
#endif /* PR_SUPPLICANT_H */
--
2.34.1
More information about the Hostap
mailing list