forked from pool/wpa_supplicant
- update to 2.10.0: * SAE changes - improved protection against side channel attacks [https://w1.fi/security/2022-1/] - added support for the hash-to-element mechanism (sae_pwe=1 or sae_pwe=2); this is currently disabled by default, but will likely get enabled by default in the future - fixed PMKSA caching with OKC - added support for SAE-PK * EAP-pwd changes - improved protection against side channel attacks [https://w1.fi/security/2022-1/] * fixed P2P provision discovery processing of a specially constructed invalid frame [https://w1.fi/security/2021-1/] * fixed P2P group information processing of a specially constructed invalid frame [https://w1.fi/security/2020-2/] * fixed PMF disconnection protection bypass in AP mode [https://w1.fi/security/2019-7/] * added support for using OpenSSL 3.0 * increased the maximum number of EAP message exchanges (mainly to support cases with very large certificates) * fixed various issues in experimental support for EAP-TEAP peer * added support for DPP release 2 (Wi-Fi Device Provisioning Protocol) * a number of MKA/MACsec fixes and extensions * added support for SAE (WPA3-Personal) AP mode configuration * added P2P support for EDMG (IEEE 802.11ay) channels * fixed EAP-FAST peer with TLS GCM/CCM ciphers * improved throughput estimation and BSS selection OBS-URL: https://build.opensuse.org/request/show/948384 OBS-URL: https://build.opensuse.org/package/show/hardware/wpa_supplicant?expand=0&rev=130
41 lines
1.4 KiB
Diff
41 lines
1.4 KiB
Diff
---
|
|
wpa_supplicant/wpa_supplicant.c | 18 ++++++++++++++++++
|
|
1 file changed, 18 insertions(+)
|
|
|
|
Index: wpa_supplicant-2.10/wpa_supplicant/wpa_supplicant.c
|
|
===================================================================
|
|
--- wpa_supplicant-2.10.orig/wpa_supplicant/wpa_supplicant.c
|
|
+++ wpa_supplicant-2.10/wpa_supplicant/wpa_supplicant.c
|
|
@@ -121,6 +121,22 @@ const char *const wpa_supplicant_full_li
|
|
"\n";
|
|
#endif /* CONFIG_NO_STDOUT_DEBUG */
|
|
|
|
+static void wpa_supplicant_handle_sigusr1(int sig,
|
|
+ void *signal_ctx)
|
|
+{
|
|
+ /* Increase verbosity (by decreasing the debug level) and wrap back
|
|
+ * to MSG_INFO when needed.
|
|
+ */
|
|
+ if (wpa_debug_level)
|
|
+ wpa_debug_level--;
|
|
+ else
|
|
+ wpa_debug_level = MSG_INFO;
|
|
+
|
|
+ wpa_printf(MSG_INFO, "Signal %d received - changing debug level to %s", sig,
|
|
+ (wpa_debug_level == MSG_INFO) ? "INFO" :
|
|
+ ((wpa_debug_level == MSG_DEBUG) ? "DEBUG" :
|
|
+ ((wpa_debug_level == MSG_MSGDUMP) ? "MSGDUMP" : "UNKNOWN")));
|
|
+}
|
|
|
|
static void wpa_bss_tmp_disallow_timeout(void *eloop_ctx, void *timeout_ctx);
|
|
#if defined(CONFIG_FILS) && defined(IEEE8021X_EAPOL)
|
|
@@ -7474,6 +7490,8 @@ int wpa_supplicant_run(struct wpa_global
|
|
eloop_register_signal_terminate(wpa_supplicant_terminate, global);
|
|
eloop_register_signal_reconfig(wpa_supplicant_reconfig, global);
|
|
|
|
+ eloop_register_signal(SIGUSR1, wpa_supplicant_handle_sigusr1, NULL);
|
|
+
|
|
eloop_run();
|
|
|
|
return 0;
|