FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

Port details
hostapd IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator
2.5 net on this many watch lists=1 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port
Maintainer: leres@ee.lbl.gov search for ports maintained by this maintainer
Port Added: 12 Feb 2011 04:53:00
License: BSD3CLAUSE
hostapd is a user space daemon for access point and authentication
servers. It implements IEEE 802.11 access point management, IEEE
802.1X/WPA/WPA2/EAP Authenticators, RADIUS client, EAP server, and
RADIUS authentication server. The current version supports Linux
(Host AP, madwifi, mac80211-based drivers) and FreeBSD (net80211).

To use the ports version instead of the base, add:

    hostapd_program="/usr/local/sbin/hostapd"

to /etc/rc.conf

WWW: http://w1.fi/hostapd/
SVNWeb : Homepage : PortsMon

To install the port: cd /usr/ports/net/hostapd/ && make install clean
To add the package: pkg install hostapd

PKGNAME: hostapd

distinfo:

TIMESTAMP = 1467776602
SHA256 (hostapd-2.5.tar.gz) = 8e272d954dc0d7026c264b79b15389ec2b2c555b32970de39f506b9f463ec74a
SIZE (hostapd-2.5.tar.gz) = 1720783


NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Build dependencies:
  1. gmake : devel/gmake
There are no ports dependent upon this port

Configuration Options
     No options to configure

USES:
cpe gmake ssl

Master Sites:
  1. http://w1.fi/releases/

Number of commits found: 22

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
23 Sep 2016 18:20:11
Original commit files touched by this commit  2.5
Revision:422688
madpilot search for other commits by this committer
Update to 2.5

PR:		212779
Submitted by:	leres at ee.lbl.gov (maintainer)
13 Sep 2016 05:01:26
Original commit files touched by this commit  2.4_2
Revision:421977
marino search for other commits by this committer
net/hostapd: Remove PORTS_SSL option and use SSL_DEFAULT

The port is now configured depending on the SSL base specified by the
SSL_DEFAULT variable.  Before it would break by default if SSL_DEFAULT
was set to non-base.  This changes puts hostapd in line with the rest
of the ports tree.

Approved by:	SSL blanket
16 Jun 2016 13:23:13
Original commit files touched by this commit  2.4_1
Revision:416966
mat search for other commits by this committer
Fix usage of WITH_OPENSSL_BASE, WITH_OPENSSL_PORT and OPENSSL_PORT.

WITH_OPENSSL_* can't be set after bsd.port.pre.mk.
Fold all other usage into using SSL_DEFAULT == foo

PR:		210149
Submitted by:	mat
Exp-run by:	antoine
Sponsored by:	The FreeBSD Foundation, Absolight
Differential Revision:	https://reviews.freebsd.org/D6577
06 Sep 2015 17:15:42
Original commit files touched by this commit  2.4_1
Revision:396228
danfe search for other commits by this committer
Remove BROKEN_* statements, the port builds fine everywhere.
02 Jun 2015 09:52:01
Original commit files touched by this commit  2.4_1
Revision:388314
marino search for other commits by this committer
net/hostapd: Address 3 latest security advisories

These are combined upstream patches 2015-2, 2015-3, 2015-4
They address the following security advisories:

  * CVE-2015-4141
  * CVE-2015-4142
  * CVE-2015-4143
  * CVE-2015-4144
  * CVE-2015-4145
  * CVE-2015-4146

These advisories also apply to security/wpa_supplicant

PR:		200567
Submitted by:	Jason Unovitch
Approved by:	maintainer (Craig Leres)
03 May 2015 15:12:06
Original commit files touched by this commit  2.4
Revision:385279 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Add CPE info

Approved by:	portmgr blanket
01 Apr 2015 18:57:32
Original commit files touched by this commit  2.4
Revision:382939 This port version is marked as vulnerable.
marino search for other commits by this committer
net/hostapd: Unbreak new version on DragonFly
29 Mar 2015 12:15:41
Original commit files touched by this commit  2.4
Revision:382595 This port version is marked as vulnerable.
marino search for other commits by this committer
net/hostapd: Upgrade version 2.3 => 2.4, add PORTS_SSL option

PR:		198889
Submitted by:	maintainer (leres - ee.lbl.gov)
15 Jan 2015 09:05:38
Original commit files touched by this commit  2.3_1
Revision:377064 This port version is marked as vulnerable.
tijl search for other commits by this committer
Add missing USE_OPENSSL=yes

PR:		195796
16 Oct 2014 07:19:53
Original commit files touched by this commit  2.3
Revision:370974 This port version is marked as vulnerable.
marino search for other commits by this committer
net/hostapd: Upgrade version 2.2 => 2.3

While upgrading to the latest version released last week:
  * Rebase .config file on latest sample versoin
  * Support non-default prefixes
  * Merge new contents of do-configure target into post-patch target

PR:		194315
Approved by:	maintainer: (Craig Leres)
12 Oct 2014 10:46:35
Original commit files touched by this commit  2.2
Revision:370693 This port version is marked as vulnerable.
marino search for other commits by this committer
net/hostapd: Update WWW + MASTER_SITES and support DragonFly

The domain for hostapd has changed from hostap.epitest.fi to w1.fi
although the former still redirects.  Update WWW and MASTER_SITES to
reflect the new name.

Regenerate the l2 packet patch so that hostapd also builds on DragonFly
(no-op for FreeBSD).

While here, rearrange makefile to remove need for <pre> and <post> and
use of $PORTNAME in $WRKSRC which would break if PORTNAME changes.
07 Jun 2014 05:26:52
Original commit files touched by this commit  2.2
Revision:356881 This port version is marked as vulnerable.
danilo search for other commits by this committer
- Update from 2.1 to 2.2 [1]
- Use just BSD3CLAUSE as LICENSE (according to README)

PR:		ports/190726
Submitted by:	leres@ee.lbl.gov [1]
04 Apr 2014 13:56:36
Original commit files touched by this commit  2.1
Revision:350124 This port version is marked as vulnerable.
bapt search for other commits by this committer
s/-script://
13 Mar 2014 10:06:42
Original commit files touched by this commit  2.1
Revision:348049 This port version is marked as vulnerable.
pawel search for other commits by this committer
Update to version 2.1

PR:		ports/187459
Submitted by:	maintainer
28 Feb 2014 08:42:58
Original commit files touched by this commit  2.0
Revision:346465 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Support staging
20 Sep 2013 22:10:25
Original commit files touched by this commit  2.0
Revision:327755 This port version is marked as vulnerable.
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
net)
14 Aug 2013 22:35:54
Original commit files touched by this commit  2.0
Revision:324744  Sanity Test Failure
ak search for other commits by this committer
- Remove MAKE_JOBS_SAFE variable

Approved by:	portmgr (bdrewery)
02 Feb 2013 11:44:41
Original commit files touched by this commit  2.0
Revision:311422 This port version is marked as vulnerable.
pawel search for other commits by this committer
Update to version 2.0

PR:		ports/175438
Submitted by:	Craig Leres <leres@ee.lbl.gov> (maintainer)
18 Jun 2012 22:27:36
Original commit files touched by this commit  1.0
 This port version is marked as vulnerable.
jgh search for other commits by this committer
- Update to 1.0
- Use ports framework for build:
  - Bonus: Now honours CC/CFLAGS/LDFLAGS
- Remove DISTNAME override
- Update LICENSE (GPLv2 not GPLv1)
- Mark MAKE_JOBS_SAFE
- Patch Makefile to see $(CC) not "CC" when not verbose
- Pet portlint (LICENSE order)

- while here shift where arch is tested, and use MAN{1,8}PREFIX

PR:     ports/169154 (based on)
Submitted by:   koobs.freebsd@gmail.com
Approved by:    maintainer, leres@ee.lbl.gov
10 Nov 2011 05:38:32
Original commit files touched by this commit  0.7.3
 This port version is marked as vulnerable.
linimon search for other commits by this committer
Mark broken on powerpc as well as sparc64.  (In fact, on all the tier-2s.)

Hat:            portmgr
10 Aug 2011 09:13:47
Original commit files touched by this commit  0.7.3
 This port version is marked as vulnerable.
linimon search for other commits by this committer
Mark as broken on sparc64: does not compile.
12 Feb 2011 04:52:47
Original commit files touched by this commit  0.7.3
 This port version is marked as vulnerable.
miwi search for other commits by this committer
hostapd is a user space daemon for access point and authentication
servers. It implements IEEE 802.11 access point management, IEEE
802.1X/WPA/WPA2/EAP Authenticators, RADIUS client, EAP server, and
RADIUS authentication server. The current version supports Linux
(Host AP, madwifi, mac80211-based drivers) and FreeBSD (net80211).

WWW: http://hostap.epitest.fi/hostapd/

PR:             ports/154621
Submitted by:   leres at ee.lbl.gov

Number of commits found: 22

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
openssl*Sep 23
openssl-devel*Sep 23
irssi*Sep 22
irssi*Sep 22
firefoxSep 20
firefox*Sep 20
firefox-esrSep 20
firefox-esr*Sep 20
libxulSep 20
libxul*Sep 20
linux-firefoxSep 20
linux-firefox*Sep 20
linux-seamonkeySep 20
linux-seamonkey*Sep 20
linux-thunderbirdSep 20

13 vulnerabilities affecting 38 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 26270
Broken 376
Deprecated 218
Ignore 640
Forbidden 0
Restricted 199
No CDROM 83
Vulnerable 61
Expired 14
Set to expire 204
Interactive 0
new 24 hours 5
new 48 hours8
new 7 days31
new fortnight58
new month112

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.