59 Commits

Author SHA1 Message Date
sthen
4b267c05cb adjust wpa_supplicant rcscript; instead of hardcoding athn0 in the
default daemon_flags, use the interface groups set by the OS to figure
out a likely default. it can of course be overridden as normal.
2021-07-08 11:49:14 +00:00
naddy
b7d56abd86 security/wpa_supplicant: fix build with LLVM11
This uses a roundtrip cast int -> void * -> int.  LLVM11 objects
to the last step.  Pacify with int -> void * -> intptr_t -> int.
2021-03-12 20:24:51 +00:00
tobhe
2905953696 Add security patch 2020-2 from upstream. The vulnerable code is
currently disabled because we don't enable CONFIG_P2P.

ok sthen@ bluhm@
2021-02-05 19:57:54 +00:00
sthen
33cb62354b update to wpa_supplicant 2.9, tests/ok phessler@ kn@ 2019-12-28 18:58:36 +00:00
sthen
276848c429 ap_scan is not supported in wpa_supplicant on OpenBSD and breaks things if
used but maybe present in some sample configs - disable the option if set
to avoid one possible source of errors
2019-12-28 17:50:11 +00:00
sthen
718517b82d improve wpa_supplicant pkg-readme, enable syslog in default flags 2019-12-28 17:45:52 +00:00
sthen
ff6546371a wpa_supplicant port tweaks,
- build eapol_test, it's a useful way to test RADIUS servers + EAP

- rather than using a whole new build config file, copy and patch the
upstream default, making it easier to incorporate upstream changes in new
versions, and see what we have/haven't enabled

- replace /dev/urandom with arc4random_buf
2019-11-19 14:35:59 +00:00
sthen
77f7cc9c61 replace simple PERMIT_PACKAGE_CDROM=Yes with PERMIT_PACKAGE=Yes 2019-07-12 20:49:33 +00:00
sthen
0aecafabc4 update to wpa_supplicant-2.8 2019-04-26 13:32:36 +00:00
sthen
86852bcf6e reset unresponsive maintainers, various porters have spent a bunch of
time waiting for timeouts over the last year or more for many of these
ports.  ok danj@ jca@ kmos@
2019-04-24 16:26:54 +00:00
sthen
ab9f4ccb21 update to wpa_supplicant-2.7, ok kn@, maintainer timeout 2019-04-23 11:50:10 +00:00
phessler
9f0753d67c Handle changes in the associated AP. This lets wpa_supplicant re-connect to
a dot1x SSID after a suspend/resume cycle, or when roaming between access
points.

Tested in the wild at the 35C3 CCC Congress.

Hard work done by Gregor Best (gbe -bei- unobtanium -punkt- de), thanks!

OK sthen@
2018-12-29 09:22:55 +00:00
jsing
eb9f847d2c Get the MAC secret size from the TLS cipher, rather than reaching into
libssl internals. While here also take more of the OpenSSL 1.1 API code
paths.

ok tb@
2018-10-24 17:16:19 +00:00
espie
f4b7f81318 convert to PKGSTEM 2018-09-04 12:46:09 +00:00
sthen
7d82229a11 various fixes for libressl api update; with jsing 2018-02-19 18:24:21 +00:00
rpe
9a8b5ccd06 Change the shebang line from /bin/sh to /bin/ksh in all ports rc.d
daemon scripts and bump subpackages that contain the *.rc scripts.

discussed with and OK aja@
OK tb
2018-01-11 19:27:01 +00:00
dcoppa
0c5449b791 Security fixes for KRACK Attacks, from upstream
(https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt):

- Prevent reinstallation of an already in-use group key

- Extend protection of GTK/IGTK reinstallation of WNM-Sleep Mode cases

- Prevent installation of an all-zero TK

- FT: Do not allow multiple Reassociation Response frames
2017-10-16 21:27:36 +00:00
sthen
16c0e1246e Patch wpa-supplicant to set DEFAULT_AP_SCAN 0, the scan code doesn't handle
OpenBSD. Remove ap_scan=0 from default config as suggested by / ok dcoppa.

README still mentions ap_scan=0; as discussed with tb@ some institutions
provide sample config files which do include other ap_scan settings so
I think it's still helpful there.
2017-02-08 12:53:46 +00:00
dcoppa
89ae065d97 Update to wpa_supplicant-2.6
Tested by pascal@ and Laurence Tratt
feedback by sthen@
2016-10-07 14:44:03 +00:00
dcoppa
7c17673123 Apply upstream fixes for CVE-2016-4476 and CVE-2016-4477 2016-05-17 08:29:27 +00:00
espie
511c5d230a a few minor pkg_subst fixes, for the coming patch (disallow -c without -m
outside of WRKDIR)
2015-11-02 11:56:54 +00:00
sthen
691c83f9b2 Bump some ports which reference if_msghdr in their source, so that package
updates are triggered. This is following the struct if_data ABI change a few
days ago; if_msghdr has an embedded if_data.  Some may be unnecessary, but
some are definitely needed and bumps are cheaper than debugging.
Problem reported with wpa_supplicant by Mikolaj Kucharski.
2015-10-08 21:19:21 +00:00
dcoppa
310baa0355 Update to wpa_supplicant-2.5
Tested by me, Gregor Best, and sthen@

Help and ok sthen@
2015-09-29 11:57:54 +00:00
sthen
90ae20526a bump; ifmedia64 2015-09-11 16:38:04 +00:00
jasper
8370029792 use install -D and drop ginstall dependency where applicable 2015-07-19 21:44:07 +00:00
dcoppa
53e70bdc34 /etc/wpa_supplicant.conf may also contain passwords, so enforce the
right permissions here too.

From Tim van der Molen
2015-05-18 04:56:33 +00:00
dcoppa
6966afa280 HOMEPAGE/MASTER_SITES changed some time ago 2015-05-15 13:11:32 +00:00
schwarze
1409dcb551 Drop USE_GROFF (identical output). No bump needed. 2015-04-06 16:03:45 +00:00
sthen
62699ad891 add a commented-out config line to help out with people who have auth servers
that don't like attempts to connect with TLSv1.1/1.2 (recent update moved from
using TLSv1.0 only).  ok dcoppa@
2015-04-02 17:32:24 +00:00
dcoppa
fa31b7d6b0 Update to wpa_supplicant-2.4
Tested by pascal@ and Fabian Raetz

OK pascal@
2015-03-18 15:35:43 +00:00
dcoppa
849996751d Use the patch from upstream
(git commit 2d4e9c2eb811978a4097b7d249eca3c7e9c510e5)
2014-10-13 07:32:11 +00:00
dcoppa
2dc398aa7e Update to wpa_supplicant-2.3
tested by myself (wired 802.1x) and pascal@ (eduroam)

ok pascal@
2014-10-11 17:55:49 +00:00
dcoppa
3ac19bbde3 util: Don't use "\e"
'\e' representing ESC (0x1b) is not C standard, it's a GNU extension.
https://gcc.gnu.org/onlinedocs/gcc/Character-Escapes.html#Character-Escapes

upstream git commit a8833b84f46626b6fb9e9f277137f26acc72c64e
2014-09-30 07:18:48 +00:00
dcoppa
9e715e5bc8 Zap Linuxisms from usage() 2014-09-08 08:28:23 +00:00
dcoppa
3bef63c4a0 Fix validation of EAPOL-Key length with AES key wrap
(upstream git commit b7c61c9d4e968e7254112631a9f6a1a1f8ef6f7f)

pkg/README: avoid confusion, we were talking about so many interfaces...
2014-09-05 13:18:41 +00:00
dcoppa
f2af671cce Update to wpa_supplicant-2.2
Tested by pascal@ and myself.
I also take maintainership, as per sthen's request.
2014-09-02 13:04:34 +00:00
ajacoutot
9d087a11f1 Tweak documentation according to recent rc changes.
ok jasper@
2014-07-22 10:55:40 +00:00
sthen
4badb3163a don't use "echo 'pkg_scripts="${pkg_scripts} icinga' >> /etc/rc.conf.local"
examples
2014-07-12 11:25:00 +00:00
sthen
52c24aaed1 Update license marker; as of Feb 2012 this is no longer dual GPL/BSD, it is
just plain 3-clause BSD. No pkg change.
2014-06-02 20:12:53 +00:00
sthen
dc617c1689 off-by-one in length checking in printf_encode, crash reported by jirib at
devio dot us
2014-06-02 11:26:21 +00:00
kili
eb17bd6c23 Don't try to link against librt.
ok dcoppa@
2014-03-23 20:02:14 +00:00
dcoppa
0c9ddb5974 Update to wpa_supplicant-2.1.
Tested by pascal@ and Gregor Best

OK sthen@ (maintainer)
2014-03-18 05:57:22 +00:00
sthen
c4b331405d no point patching a file that is already in ${FILESDIR} 2013-11-26 19:46:52 +00:00
sthen
ed380335ee include if_var.h to unbreak 2013-11-25 22:23:18 +00:00
sthen
27f03b1c52 bump REVISION for any ports using route messages. regen some distinfos and
remove unnecessary USE_GROFFs while there.
2013-10-31 21:12:12 +00:00
espie
eae66e4a7b PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:35:43 +00:00
sthen
8979f7fde1 take MAINTAINER, suggested by reyk@ 2013-02-07 12:32:08 +00:00
sthen
b013715fc5 - enable reading PKCS12 certificates from files; from Gregor Best who
wants this for use with Eduroam.

- add an rc script and README.

- remove non-useful wpa_priv patch.

README tweak from ajacoutot, ok gsoares dcoppa
2013-02-06 17:27:13 +00:00
sthen
e3e6f35472 don't try to access list members to free them unless already initialised;
fixes a crash with wpa_priv usage(); wpa_priv not yet enabled
2013-02-04 10:04:44 +00:00
sthen
c162d4f3bf update DESCR, pointed out by stsp 2013-01-28 11:56:55 +00:00