FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

Please give me your LTO-4 or better tape library and I'll put it to good use.
Port details
hostapd IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator
2.4_1 net on this many watch lists=1 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port
Maintainer: leres@ee.lbl.gov search for ports maintained by this maintainer
Port Added: 12 Feb 2011 04:53:00
License: BSD3CLAUSE
hostapd is a user space daemon for access point and authentication
servers. It implements IEEE 802.11 access point management, IEEE
802.1X/WPA/WPA2/EAP Authenticators, RADIUS client, EAP server, and
RADIUS authentication server. The current version supports Linux
(Host AP, madwifi, mac80211-based drivers) and FreeBSD (net80211).

To use the ports version instead of the base, add:

    hostapd_program="/usr/local/sbin/hostapd"

to /etc/rc.conf

WWW: http://w1.fi/hostapd/
SVNWeb : Homepage : Distfiles Availability : PortsMon

NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Build dependencies:
  1. libcrypto.so.8 : security/openssl
  2. gmake : devel/gmake
Runtime dependencies:
  1. libcrypto.so.8 : security/openssl
There are no ports dependent upon this port

To install the port: cd /usr/ports/net/hostapd/ && make install clean
To add the package: pkg install net/hostapd


Configuration Options
===> The following configuration options are available for hostapd-2.4_1:
     PORTS_SSL=off: Build with OpenSSL from ports (instead of base system)
===> Use 'make config' to modify these settings

USES:
cpe gmake

Master Sites:
  1. http://distcache.FreeBSD.org/ports-distfiles/
  2. http://w1.fi/releases/

Number of commits found: 18

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
02 Jun 2015 09:52:01
Original commit files touched by this commit  2.4_1
Revision:388314
marino search for other commits by this committer
net/hostapd: Address 3 latest security advisories

These are combined upstream patches 2015-2, 2015-3, 2015-4
They address the following security advisories:

  * CVE-2015-4141
  * CVE-2015-4142
  * CVE-2015-4143
  * CVE-2015-4144
  * CVE-2015-4145
  * CVE-2015-4146

These advisories also apply to security/wpa_supplicant

PR:		200567
Submitted by:	Jason Unovitch
Approved by:	maintainer (Craig Leres)
03 May 2015 15:12:06
Original commit files touched by this commit  2.4
Revision:385279 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Add CPE info

Approved by:	portmgr blanket
01 Apr 2015 18:57:32
Original commit files touched by this commit  2.4
Revision:382939 This port version is marked as vulnerable.
marino search for other commits by this committer
net/hostapd: Unbreak new version on DragonFly
29 Mar 2015 12:15:41
Original commit files touched by this commit  2.4
Revision:382595 This port version is marked as vulnerable.
marino search for other commits by this committer
net/hostapd: Upgrade version 2.3 => 2.4, add PORTS_SSL option

PR:		198889
Submitted by:	maintainer (leres - ee.lbl.gov)
15 Jan 2015 09:05:38
Original commit files touched by this commit  2.3_1
Revision:377064 This port version is marked as vulnerable.
tijl search for other commits by this committer
Add missing USE_OPENSSL=yes

PR:		195796
16 Oct 2014 07:19:53
Original commit files touched by this commit  2.3
Revision:370974 This port version is marked as vulnerable.
marino search for other commits by this committer
net/hostapd: Upgrade version 2.2 => 2.3

While upgrading to the latest version released last week:
  * Rebase .config file on latest sample versoin
  * Support non-default prefixes
  * Merge new contents of do-configure target into post-patch target

PR:		194315
Approved by:	maintainer: (Craig Leres)
12 Oct 2014 10:46:35
Original commit files touched by this commit  2.2
Revision:370693 This port version is marked as vulnerable.
marino search for other commits by this committer
net/hostapd: Update WWW + MASTER_SITES and support DragonFly

The domain for hostapd has changed from hostap.epitest.fi to w1.fi
although the former still redirects.  Update WWW and MASTER_SITES to
reflect the new name.

Regenerate the l2 packet patch so that hostapd also builds on DragonFly
(no-op for FreeBSD).

While here, rearrange makefile to remove need for <pre> and <post> and
use of $PORTNAME in $WRKSRC which would break if PORTNAME changes.
07 Jun 2014 05:26:52
Original commit files touched by this commit  2.2
Revision:356881 This port version is marked as vulnerable.
danilo search for other commits by this committer
- Update from 2.1 to 2.2 [1]
- Use just BSD3CLAUSE as LICENSE (according to README)

PR:		ports/190726
Submitted by:	leres@ee.lbl.gov [1]
04 Apr 2014 13:56:36
Original commit files touched by this commit  2.1
Revision:350124 This port version is marked as vulnerable.
bapt search for other commits by this committer
s/-script://
13 Mar 2014 10:06:42
Original commit files touched by this commit  2.1
Revision:348049 This port version is marked as vulnerable.
pawel search for other commits by this committer
Update to version 2.1

PR:		ports/187459
Submitted by:	maintainer
28 Feb 2014 08:42:58
Original commit files touched by this commit  2.0
Revision:346465 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Support staging
20 Sep 2013 22:10:25
Original commit files touched by this commit  2.0
Revision:327755 This port version is marked as vulnerable.
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
net)
14 Aug 2013 22:35:54
Original commit files touched by this commit  2.0
Revision:324744  Sanity Test Failure
ak search for other commits by this committer
- Remove MAKE_JOBS_SAFE variable

Approved by:	portmgr (bdrewery)
02 Feb 2013 11:44:41
Original commit files touched by this commit  2.0
Revision:311422 This port version is marked as vulnerable.
pawel search for other commits by this committer
Update to version 2.0

PR:		ports/175438
Submitted by:	Craig Leres <leres@ee.lbl.gov> (maintainer)
18 Jun 2012 22:27:36
Original commit files touched by this commit  1.0
 This port version is marked as vulnerable.
jgh search for other commits by this committer
- Update to 1.0
- Use ports framework for build:
  - Bonus: Now honours CC/CFLAGS/LDFLAGS
- Remove DISTNAME override
- Update LICENSE (GPLv2 not GPLv1)
- Mark MAKE_JOBS_SAFE
- Patch Makefile to see $(CC) not "CC" when not verbose
- Pet portlint (LICENSE order)

- while here shift where arch is tested, and use MAN{1,8}PREFIX

PR:     ports/169154 (based on)
Submitted by:   koobs.freebsd@gmail.com
Approved by:    maintainer, leres@ee.lbl.gov
10 Nov 2011 05:38:32
Original commit files touched by this commit  0.7.3
 This port version is marked as vulnerable.
linimon search for other commits by this committer
Mark broken on powerpc as well as sparc64.  (In fact, on all the tier-2s.)

Hat:            portmgr
10 Aug 2011 09:13:47
Original commit files touched by this commit  0.7.3
 This port version is marked as vulnerable.
linimon search for other commits by this committer
Mark as broken on sparc64: does not compile.
12 Feb 2011 04:52:47
Original commit files touched by this commit  0.7.3
 This port version is marked as vulnerable.
miwi search for other commits by this committer
hostapd is a user space daemon for access point and authentication
servers. It implements IEEE 802.11 access point management, IEEE
802.1X/WPA/WPA2/EAP Authenticators, RADIUS client, EAP server, and
RADIUS authentication server. The current version supports Linux
(Host AP, madwifi, mac80211-based drivers) and FreeBSD (net80211).

WWW: http://hostap.epitest.fi/hostapd/

PR:             ports/154621
Submitted by:   leres at ee.lbl.gov

Number of commits found: 18

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
firefoxAug 28
firefox*Aug 28
firefox-esrAug 28
firefox-esr*Aug 28
libxul*Aug 28
linux-firefoxAug 28
linux-firefox*Aug 28
linux-seamonkey*Aug 28
linux-thunderbird*Aug 28
seamonkey*Aug 28
thunderbird*Aug 28
libpgf*Aug 26
goAug 25
go14Aug 25
libtremor*Aug 25

30 vulnerabilities affecting 67 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 25179
Broken 195
Deprecated 42
Ignore 499
Forbidden 1
Restricted 204
No CDROM 94
Vulnerable 41
Expired 2
Set to expire 26
Interactive 0
new 24 hours 4
new 48 hours4
new 7 days26
new fortnight90
new month204

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.