forked from pool/wpa_supplicant
Clemens Famulla-Conrad
d3a95bf049
* Wi-Fi Easy Connect - add support for DPP release 3 - allow Configurator parameters to be provided during config exchange * HE/IEEE 802.11ax/Wi-Fi 6 - various fixes * EHT/IEEE 802.11be/Wi-Fi 7 - add preliminary support * SAE: add support for fetching the password from a RADIUS server * support OpenSSL 3.0 API changes * support background radar detection and CAC with some additional drivers * support RADIUS ACL/PSK check during 4-way handshake (wpa_psk_radius=3) * EAP-SIM/AKA: support IMSI privacy * improve 4-way handshake operations - use Secure=1 in message 3 during PTK rekeying * OCV: do not check Frequency Segment 1 Channel Number for 160 MHz cases to avoid interoperability issues * support new SAE AKM suites with variable length keys * support new AKM for 802.1X/EAP with SHA384 * extend PASN support for secure ranging * FT: Use SHA256 to derive PMKID for AKM 00-0F-AC:3 (FT-EAP) - this is based on additional details being added in the IEEE 802.11 standard - the new implementation is not backwards compatible * improved ACS to cover additional channel types/bandwidths * extended Multiple BSSID support * fix beacon protection with FT protocol (incorrect BIGTK was provided) * support unsynchronized service discovery (USD) * add preliminary support for RADIUS/TLS * add support for explicit SSID protection in 4-way handshake (a mitigation for CVE-2023-52424; disabled by default for now, can be enabled with ssid_protection=1) * fix SAE H2E rejected groups validation to avoid downgrade attacks * use stricter validation for some RADIUS messages * a large number of other fixes, cleanup, and extensions - refresh patches: wpa_supplicant-dump-certificate-as-PEM-in-debug-mode.diff wpa_supplicant-sigusr1-changes-debuglevel.patch - drop patches: CVE-2023-52160.patche dbus-Fix-property-DebugShowKeys-and-DebugTimestamp.patch OBS-URL: https://build.opensuse.org/package/show/hardware/wpa_supplicant?expand=0&rev=145
57 lines
1.7 KiB
Diff
57 lines
1.7 KiB
Diff
Index: wpa_supplicant-2.10/src/utils/wpa_debug.c
|
|
===================================================================
|
|
--- wpa_supplicant-2.10.orig/src/utils/wpa_debug.c
|
|
+++ wpa_supplicant-2.10/src/utils/wpa_debug.c
|
|
@@ -76,9 +76,11 @@ void wpa_debug_print_timestamp(void)
|
|
|
|
os_get_time(&tv);
|
|
#ifdef CONFIG_DEBUG_FILE
|
|
- if (out_file)
|
|
+ if (out_file) {
|
|
fprintf(out_file, "%ld.%06u: ", (long) tv.sec,
|
|
(unsigned int) tv.usec);
|
|
+ fflush(out_file);
|
|
+ }
|
|
#endif /* CONFIG_DEBUG_FILE */
|
|
if (!out_file && !wpa_debug_syslog)
|
|
printf("%ld.%06u: ", (long) tv.sec, (unsigned int) tv.usec);
|
|
@@ -231,6 +233,7 @@ void wpa_printf(int level, const char *f
|
|
vfprintf(out_file, fmt, ap);
|
|
fprintf(out_file, "\n");
|
|
va_end(ap);
|
|
+ fflush(out_file);
|
|
}
|
|
#endif /* CONFIG_DEBUG_FILE */
|
|
if (!wpa_debug_syslog && !out_file) {
|
|
@@ -365,6 +368,7 @@ static void _wpa_hexdump(int level, cons
|
|
fprintf(out_file, " [REMOVED]");
|
|
}
|
|
fprintf(out_file, "\n");
|
|
+ fflush(out_file);
|
|
}
|
|
#endif /* CONFIG_DEBUG_FILE */
|
|
if (!wpa_debug_syslog && !out_file) {
|
|
@@ -436,12 +440,14 @@ static void _wpa_hexdump_ascii(int level
|
|
fprintf(out_file,
|
|
"%s - hexdump_ascii(len=%lu): [REMOVED]\n",
|
|
title, (unsigned long) len);
|
|
+ fflush(out_file);
|
|
goto file_done;
|
|
}
|
|
if (buf == NULL) {
|
|
fprintf(out_file,
|
|
"%s - hexdump_ascii(len=%lu): [NULL]\n",
|
|
title, (unsigned long) len);
|
|
+ fflush(out_file);
|
|
goto file_done;
|
|
}
|
|
fprintf(out_file, "%s - hexdump_ascii(len=%lu):\n",
|
|
@@ -466,6 +472,7 @@ static void _wpa_hexdump_ascii(int level
|
|
pos += llen;
|
|
len -= llen;
|
|
}
|
|
+ fflush(out_file);
|
|
}
|
|
file_done:
|
|
#endif /* CONFIG_DEBUG_FILE */
|