-
-
Notifications
You must be signed in to change notification settings - Fork 15.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
wpa_supplicant: backport support for OWE #111498
Conversation
The wpa_supplicant upstream is slow to push out new releases and has been asked several times to do so. Support for Opportunistic Wireless Encryption has been on master since late 2019 and still hasn't made it into a release yet. This backports a rather simple patchset to enable OWE key management and exposes it also via DBus, so it can be used from Network-Manager.
62f857e
to
28f8b5f
Compare
This should probably have some real-world testing. There are basically two scenarios
Setting up OpenWrt with an open & OWE network and transition mode looks like this:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Note wrt. last message.
The OWE support seems to already be implemented in 2.9. This patch "only" advertises the OWE key support to the DBUS interface.
The patch has been applied upstream: https://www.spinics.net/lists/hostap/msg06661.html, LGTM.
For the giggles: /*
* KeyMgmt
*
* When adding a new entry here, please take care to extend key_mgmt[]
* and keep documentation in doc/dbus.doxygen up to date.
*/ Of course, the doc hasn't been updated here. |
Wait, WTF. On https://www.spinics.net/lists/hostap/msg06611.html, we can see the diff - const char *capabilities[10] = { NULL, NULL, NULL, NULL, NULL, NULL,
- NULL, NULL, NULL, NULL };
+ const char *capabilities[11] = { NULL }; while on the official mailing list https://w1.fi/cgit/hostap/patch/?id=7800725afb27397f7d6033d4969e2aeb61af4737, we end up with: - const char *capabilities[10] = { NULL, NULL, NULL, NULL, NULL, NULL,
- NULL, NULL, NULL, NULL };
+ const char *capabilities[11]; Same mailing list header for both emails:
Anybody know what's happening here!? I'm failing to understand the implications of this diff after reading that code section. This sounds definitely fishy to me. Note: we applied the patch coming from the |
Motivation for this change
The wpa_supplicant upstream is slow to push out new releases and has
been asked several times to do so. Support for Opportunistic Wireless
Encryption has been on master since late 2019 and still hasn't made it
into a release yet.
This backports a rather simple patchset to enable OWE key management
and exposes it also via DBus, so it can be used from Network-Manager.
I have been using this patch since august 2020 and it's been working fine.
Things done
sandbox
innix.conf
on non-NixOS linux)nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
./result/bin/
)nix path-info -S
before and after)