Blame SOURCES/wpa_supplicant-dbus-Export-OWE-capability-and-OWE-BSS-key_mgmt.patch

62e5cd
From 7800725afb27397f7d6033d4969e2aeb61af4737 Mon Sep 17 00:00:00 2001
62e5cd
Message-Id: <7800725afb27397f7d6033d4969e2aeb61af4737.1602780273.git.davide.caratti@gmail.com>
62e5cd
From: Beniamino Galvani <bgalvani@redhat.com>
62e5cd
Date: Sun, 13 Oct 2019 15:18:54 +0200
62e5cd
Subject: [PATCH] dbus: Export OWE capability and OWE BSS key_mgmt
62e5cd
62e5cd
Export a new 'owe' capability to indicate that wpa_supplicant was
62e5cd
built with OWE support and accepts 'key_mgmt=OWE'. Also, support 'owe'
62e5cd
in the array of BSS' available key managements.
62e5cd
62e5cd
Signed-off-by: Beniamino Galvani <bgalvani@redhat.com>
62e5cd
---
62e5cd
 wpa_supplicant/dbus/dbus_new_handlers.c | 12 +++++++++---
62e5cd
 1 file changed, 9 insertions(+), 3 deletions(-)
62e5cd
62e5cd
diff --git a/wpa_supplicant/dbus/dbus_new_handlers.c b/wpa_supplicant/dbus/dbus_new_handlers.c
62e5cd
index d2c84e5c5..1206c3cde 100644
62e5cd
--- a/wpa_supplicant/dbus/dbus_new_handlers.c
62e5cd
+++ b/wpa_supplicant/dbus/dbus_new_handlers.c
62e5cd
@@ -984,8 +984,7 @@ dbus_bool_t wpas_dbus_getter_global_capabilities(
62e5cd
 	const struct wpa_dbus_property_desc *property_desc,
62e5cd
 	DBusMessageIter *iter, DBusError *error, void *user_data)
62e5cd
 {
62e5cd
-	const char *capabilities[10] = { NULL, NULL, NULL, NULL, NULL, NULL,
62e5cd
-					NULL, NULL, NULL, NULL };
62e5cd
+	const char *capabilities[11];
62e5cd
 	size_t num_items = 0;
62e5cd
 #ifdef CONFIG_FILS
62e5cd
 	struct wpa_global *global = user_data;
62e5cd
@@ -1028,6 +1027,9 @@ dbus_bool_t wpas_dbus_getter_global_capabilities(
62e5cd
 #ifdef CONFIG_SHA384
62e5cd
 	capabilities[num_items++] = "sha384";
62e5cd
 #endif /* CONFIG_SHA384 */
62e5cd
+#ifdef CONFIG_OWE
62e5cd
+	capabilities[num_items++] = "owe";
62e5cd
+#endif /* CONFIG_OWE */
62e5cd
 
62e5cd
 	return wpas_dbus_simple_array_property_getter(iter,
62e5cd
 						      DBUS_TYPE_STRING,
62e5cd
@@ -4491,7 +4493,7 @@ static dbus_bool_t wpas_dbus_get_bss_security_prop(
62e5cd
 	DBusMessageIter iter_dict, variant_iter;
62e5cd
 	const char *group;
62e5cd
 	const char *pairwise[5]; /* max 5 pairwise ciphers is supported */
62e5cd
-	const char *key_mgmt[15]; /* max 15 key managements may be supported */
62e5cd
+	const char *key_mgmt[16]; /* max 16 key managements may be supported */
62e5cd
 	int n;
62e5cd
 
62e5cd
 	if (!dbus_message_iter_open_container(iter, DBUS_TYPE_VARIANT,
62e5cd
@@ -4544,6 +4546,10 @@ static dbus_bool_t wpas_dbus_get_bss_security_prop(
62e5cd
 	if (ie_data->key_mgmt & WPA_KEY_MGMT_FT_SAE)
62e5cd
 		key_mgmt[n++] = "ft-sae";
62e5cd
 #endif /* CONFIG_SAE */
62e5cd
+#ifdef CONFIG_OWE
62e5cd
+	if (ie_data->key_mgmt & WPA_KEY_MGMT_OWE)
62e5cd
+		key_mgmt[n++] = "owe";
62e5cd
+#endif /* CONFIG_OWE */
62e5cd
 	if (ie_data->key_mgmt & WPA_KEY_MGMT_NONE)
62e5cd
 		key_mgmt[n++] = "wpa-none";
62e5cd
 
62e5cd
-- 
62e5cd
2.26.2
62e5cd