Blame SOURCES/wpa_supplicant-dbus-Export-OWE-capability-and-OWE-BSS-key_mgmt.patch

149dd6
From 7800725afb27397f7d6033d4969e2aeb61af4737 Mon Sep 17 00:00:00 2001
149dd6
Message-Id: <7800725afb27397f7d6033d4969e2aeb61af4737.1602780273.git.davide.caratti@gmail.com>
149dd6
From: Beniamino Galvani <bgalvani@redhat.com>
149dd6
Date: Sun, 13 Oct 2019 15:18:54 +0200
149dd6
Subject: [PATCH] dbus: Export OWE capability and OWE BSS key_mgmt
149dd6
149dd6
Export a new 'owe' capability to indicate that wpa_supplicant was
149dd6
built with OWE support and accepts 'key_mgmt=OWE'. Also, support 'owe'
149dd6
in the array of BSS' available key managements.
149dd6
149dd6
Signed-off-by: Beniamino Galvani <bgalvani@redhat.com>
149dd6
---
149dd6
 wpa_supplicant/dbus/dbus_new_handlers.c | 12 +++++++++---
149dd6
 1 file changed, 9 insertions(+), 3 deletions(-)
149dd6
149dd6
diff --git a/wpa_supplicant/dbus/dbus_new_handlers.c b/wpa_supplicant/dbus/dbus_new_handlers.c
149dd6
index d2c84e5c5..1206c3cde 100644
149dd6
--- a/wpa_supplicant/dbus/dbus_new_handlers.c
149dd6
+++ b/wpa_supplicant/dbus/dbus_new_handlers.c
149dd6
@@ -984,8 +984,7 @@ dbus_bool_t wpas_dbus_getter_global_capabilities(
149dd6
 	const struct wpa_dbus_property_desc *property_desc,
149dd6
 	DBusMessageIter *iter, DBusError *error, void *user_data)
149dd6
 {
149dd6
-	const char *capabilities[10] = { NULL, NULL, NULL, NULL, NULL, NULL,
149dd6
-					NULL, NULL, NULL, NULL };
149dd6
+	const char *capabilities[11];
149dd6
 	size_t num_items = 0;
149dd6
 #ifdef CONFIG_FILS
149dd6
 	struct wpa_global *global = user_data;
149dd6
@@ -1028,6 +1027,9 @@ dbus_bool_t wpas_dbus_getter_global_capabilities(
149dd6
 #ifdef CONFIG_SHA384
149dd6
 	capabilities[num_items++] = "sha384";
149dd6
 #endif /* CONFIG_SHA384 */
149dd6
+#ifdef CONFIG_OWE
149dd6
+	capabilities[num_items++] = "owe";
149dd6
+#endif /* CONFIG_OWE */
149dd6
 
149dd6
 	return wpas_dbus_simple_array_property_getter(iter,
149dd6
 						      DBUS_TYPE_STRING,
149dd6
@@ -4491,7 +4493,7 @@ static dbus_bool_t wpas_dbus_get_bss_security_prop(
149dd6
 	DBusMessageIter iter_dict, variant_iter;
149dd6
 	const char *group;
149dd6
 	const char *pairwise[5]; /* max 5 pairwise ciphers is supported */
149dd6
-	const char *key_mgmt[15]; /* max 15 key managements may be supported */
149dd6
+	const char *key_mgmt[16]; /* max 16 key managements may be supported */
149dd6
 	int n;
149dd6
 
149dd6
 	if (!dbus_message_iter_open_container(iter, DBUS_TYPE_VARIANT,
149dd6
@@ -4544,6 +4546,10 @@ static dbus_bool_t wpas_dbus_get_bss_security_prop(
149dd6
 	if (ie_data->key_mgmt & WPA_KEY_MGMT_FT_SAE)
149dd6
 		key_mgmt[n++] = "ft-sae";
149dd6
 #endif /* CONFIG_SAE */
149dd6
+#ifdef CONFIG_OWE
149dd6
+	if (ie_data->key_mgmt & WPA_KEY_MGMT_OWE)
149dd6
+		key_mgmt[n++] = "owe";
149dd6
+#endif /* CONFIG_OWE */
149dd6
 	if (ie_data->key_mgmt & WPA_KEY_MGMT_NONE)
149dd6
 		key_mgmt[n++] = "wpa-none";
149dd6
 
149dd6
-- 
149dd6
2.26.2
149dd6