Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=5fbb51abb580558cbccc86c4af2cb44dc220d235

commit 5fbb51abb580558cbccc86c4af2cb44dc220d235
Author: bouleetbil <bouleet...@frogdev.info>
Date:   Sun May 29 22:14:34 2011 +0200

wpa_supplicant-0.7.3-4-i686
*added dbus fix

diff --git a/source/base/wpa_supplicant/FrugalBuild 
b/source/base/wpa_supplicant/FrugalBuild
index 752ac5c..4f77ba2 100644
--- a/source/base/wpa_supplicant/FrugalBuild
+++ b/source/base/wpa_supplicant/FrugalBuild
@@ -12,7 +12,7 @@ USE_DEBUG=${USE_DEBUG:-"y"}

pkgname=wpa_supplicant
pkgver=0.7.3
-pkgrel=3
+pkgrel=4
pkgdesc="Linux WPA/WPA2/IEEE 802.1X Supplicant"
url="http://hostap.epitest.fi/wpa_supplicant/";
depends=('openssl>=1.0.0' 'libnl')
@@ -25,10 +25,11 @@ groups=('base')
archs=('i686' 'x86_64' 'ppc')
up2date="lynx -dump $url |grep -1 stable|sed -n 's/.*-\(.*\)\.t.*/\1/;3 p'"
source=(http://hostap.epitest.fi/releases/wpa_supplicant-$pkgver.tar.gz \
-       config nm.diff)
+       config nm.diff dbus.diff)
sha1sums=('ca51db8931fabf386352c87422f3e62fb44c3fe3' \
'afde5abc911f18cf7871df8cbf21735b35af4a03' \
-          'f253705e39900dc6e65dd48f1a6fb23c465f8f0c')
+          'f253705e39900dc6e65dd48f1a6fb23c465f8f0c' \
+          '45980b4f69a65199c7c462595ed63d951095083c')
options=('scriptlet')

if Fuse $USE_GUI; then
diff --git a/source/base/wpa_supplicant/dbus.diff 
b/source/base/wpa_supplicant/dbus.diff
new file mode 100644
index 0000000..ede6006
--- /dev/null
+++ b/source/base/wpa_supplicant/dbus.diff
@@ -0,0 +1,47 @@
+commit 8ee69e06336d65b15364f4db82d91775d0fe47c6
+Author: Paul Stewart <ps...@google.com>
+Date:   Sat Oct 9 17:29:51 2010 +0300
+
+    dbus_new_handlers: Don't send NULL to dbus_message_new_error
+
+    The new DBus API helper function wpas_dbus_error_unknown_error
+    function can be called as a result of a failure within internal
+    getter calls, which will call this function with a NULL message
+    parameter.  However, dbus_message_new_error looks very unkindly
+    (i.e, abort()) on a NULL message, so in this case, we should not
+    call it.
+
+    I've observed this course of events during a call to
+    wpas_dbus_getter_bss_wpa with a faileld parse of the IE parameter.
+    We got here through a call to fill_dict_with_properties which
+    explicitly calls getters with a NULL message parameter.  Judging
+    from the way it is called, this could easily occur if an AP sends
+    out a malformed (or mis-received) probe response.  I usually run
+    into this problem while driving through San Francisco, so I'm
+    exposed to any number of base stations along this path.
+
+diff --git a/wpa_supplicant/dbus/dbus_new_handlers.c 
b/wpa_supplicant/dbus/dbus_new_handlers.c
+index 73f4e44..0ad51a0 100644
+--- a/wpa_supplicant/dbus/dbus_new_handlers.c
++++ b/wpa_supplicant/dbus/dbus_new_handlers.c
+@@ -117,6 +117,20 @@ static char * wpas_dbus_new_decompose_object_path(const 
char *path,
+ DBusMessage * wpas_dbus_error_unknown_error(DBusMessage *message,
+                                           const char *arg)
+ {
++      /*
++       * This function can be called as a result of a failure
++       * within internal getter calls, which will call this function
++       * with a NULL message parameter.  However, dbus_message_new_error
++       * looks very unkindly (i.e, abort()) on a NULL message, so
++       * in this case, we should not call it.
++       */
++      if (message == NULL) {
++              wpa_printf(MSG_INFO, "dbus: wpas_dbus_error_unknown_error "
++                         "called with NULL message (arg=%s)",
++                         arg ? arg : "N/A");
++              return NULL;
++      }
++
+       return dbus_message_new_error(message, WPAS_DBUS_ERROR_UNKNOWN_ERROR,
+                                     arg);
+ }
_______________________________________________
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to