1
0
wpa_supplicant/wpa_supplicant-sigusr1-changes-debuglevel.patch
Clemens Famulla-Conrad a7a45f374a Accepting request 948384 from home:dirkmueller:Factory
- update to 2.10.0:
  * SAE changes
    - improved protection against side channel attacks
      [https://w1.fi/security/2022-1/]
    - added support for the hash-to-element mechanism (sae_pwe=1 or
      sae_pwe=2); this is currently disabled by default, but will likely
      get enabled by default in the future
    - fixed PMKSA caching with OKC
    - added support for SAE-PK
  * EAP-pwd changes
    - improved protection against side channel attacks
    [https://w1.fi/security/2022-1/]
  * fixed P2P provision discovery processing of a specially constructed
    invalid frame
    [https://w1.fi/security/2021-1/]
  * fixed P2P group information processing of a specially constructed
    invalid frame
    [https://w1.fi/security/2020-2/]
  * fixed PMF disconnection protection bypass in AP mode
    [https://w1.fi/security/2019-7/]
  * added support for using OpenSSL 3.0
  * increased the maximum number of EAP message exchanges (mainly to
    support cases with very large certificates)
  * fixed various issues in experimental support for EAP-TEAP peer
  * added support for DPP release 2 (Wi-Fi Device Provisioning Protocol)
  * a number of MKA/MACsec fixes and extensions
  * added support for SAE (WPA3-Personal) AP mode configuration
  * added P2P support for EDMG (IEEE 802.11ay) channels
  * fixed EAP-FAST peer with TLS GCM/CCM ciphers
  * improved throughput estimation and BSS selection

OBS-URL: https://build.opensuse.org/request/show/948384
OBS-URL: https://build.opensuse.org/package/show/hardware/wpa_supplicant?expand=0&rev=130
2022-01-24 14:43:51 +00:00

41 lines
1.4 KiB
Diff

---
wpa_supplicant/wpa_supplicant.c | 18 ++++++++++++++++++
1 file changed, 18 insertions(+)
Index: wpa_supplicant-2.10/wpa_supplicant/wpa_supplicant.c
===================================================================
--- wpa_supplicant-2.10.orig/wpa_supplicant/wpa_supplicant.c
+++ wpa_supplicant-2.10/wpa_supplicant/wpa_supplicant.c
@@ -121,6 +121,22 @@ const char *const wpa_supplicant_full_li
"\n";
#endif /* CONFIG_NO_STDOUT_DEBUG */
+static void wpa_supplicant_handle_sigusr1(int sig,
+ void *signal_ctx)
+{
+ /* Increase verbosity (by decreasing the debug level) and wrap back
+ * to MSG_INFO when needed.
+ */
+ if (wpa_debug_level)
+ wpa_debug_level--;
+ else
+ wpa_debug_level = MSG_INFO;
+
+ wpa_printf(MSG_INFO, "Signal %d received - changing debug level to %s", sig,
+ (wpa_debug_level == MSG_INFO) ? "INFO" :
+ ((wpa_debug_level == MSG_DEBUG) ? "DEBUG" :
+ ((wpa_debug_level == MSG_MSGDUMP) ? "MSGDUMP" : "UNKNOWN")));
+}
static void wpa_bss_tmp_disallow_timeout(void *eloop_ctx, void *timeout_ctx);
#if defined(CONFIG_FILS) && defined(IEEE8021X_EAPOL)
@@ -7474,6 +7490,8 @@ int wpa_supplicant_run(struct wpa_global
eloop_register_signal_terminate(wpa_supplicant_terminate, global);
eloop_register_signal_reconfig(wpa_supplicant_reconfig, global);
+ eloop_register_signal(SIGUSR1, wpa_supplicant_handle_sigusr1, NULL);
+
eloop_run();
return 0;