notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine
This referral link gives you 10% off a Fastmail.com account and gives me a discount on my Fastmail account.

Get notified when packages are built

A new feature has been added. FreshPorts already tracks package built by the FreeBSD project. This information is displayed on each port page. You can now get an email when FreshPorts notices a new package is available for something on one of your watch lists. However, you must opt into that. Click on Report Subscriptions on the right, and New Package Notification box, and click on Update.

Finally, under Watch Lists, click on ABI Package Subscriptions to select your ABI (e.g. FreeBSD:14:amd64) & package set (latest/quarterly) combination for a given watch list. This is what FreshPorts will look for.

Port details
wpa_supplicant Supplicant (client) for WPA/802.1x protocols
2.10_10 security on this many watch lists=4 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout 2.10_10Version of this port present on the latest quarterly branch.
Maintainer: cy@FreeBSD.org search for ports maintained by this maintainer
Port Added: 2004-12-12 22:27:18
Last Update: 2023-11-29 16:18:11
Commit Hash: 60c99d3
People watching this port, also watch:: firefox, freetype2, sudo
Also Listed In: net
License: BSD3CLAUSE
WWW:
https://w1.fi/wpa_supplicant/
Description:
wpa_supplicant is a client (supplicant) with support for WPA and WPA2 (IEEE 802.11i / RSN). It is suitable for both desktop/laptop computers and embedded systems. Supplicant is the IEEE 802.1X/WPA component that is used in the client stations. It implements key negotiation with a WPA Authenticator and it controls the roaming and IEEE 802.11 authentication/ association of the wlan driver. wpa_supplicant is designed to be a "daemon" program that runs in the background and acts as the backend component controlling the wireless connection. wpa_supplicant supports separate frontend programs and a text-based frontend (wpa_cli) and a GUI (wpa_gui) are included with wpa_supplicant.
Homepage    cgit ¦ Codeberg ¦ GitHub ¦ GitLab ¦ SVNWeb

Manual pages:
FreshPorts has no man page information for this port.
pkg-plist: as obtained via: make generate-plist
Expand this list (13 items)
Collapse this list.
  1. share/dbus-1/system-services/fi.w1.wpa_supplicant1.service
  2. etc/dbus-1/system.d/dbus-wpa_supplicant.conf
  3. /usr/local/share/licenses/wpa_supplicant-2.10_10/catalog.mk
  4. /usr/local/share/licenses/wpa_supplicant-2.10_10/LICENSE
  5. /usr/local/share/licenses/wpa_supplicant-2.10_10/BSD3CLAUSE
  6. @comment sbin/eapol_test
  7. sbin/wpa_supplicant
  8. sbin/wpa_passphrase
  9. sbin/wpa_cli
  10. @sample etc/wpa_supplicant.conf.sample
  11. @owner
  12. @group
  13. @mode
Collapse this list.
Dependency lines:
  • wpa_supplicant>0:security/wpa_supplicant
To install the port:
cd /usr/ports/security/wpa_supplicant/ && make install clean
To add the package, run one of these commands:
  • pkg install security/wpa_supplicant
  • pkg install wpa_supplicant
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.
PKGNAME: wpa_supplicant
Flavors: there is no flavor information for this port.
distinfo:
TIMESTAMP = 1642435837 SHA256 (wpa_supplicant-2.10.tar.gz) = 20df7ae5154b3830355f8ab4269123a87affdea59fe74fe9292a91d0d7e17b2f SIZE (wpa_supplicant-2.10.tar.gz) = 3511622

Packages (timestamps in pop-ups are UTC):
wpa_supplicant
ABIaarch64amd64armv6armv7i386powerpcpowerpc64powerpc64le
FreeBSD:13:latest2.10_102.10_102.9_82.10_102.10_10-2.9_7-
FreeBSD:13:quarterly2.10_102.10_102.10_62.10_102.10_102.10_102.10_102.10_10
FreeBSD:14:latest2.10_102.10_102.10_62.10_102.10_102.10_6-2.10_6
FreeBSD:14:quarterly2.10_102.10_10-2.10_102.10_102.10_102.10_102.10_10
FreeBSD:15:latest2.10_102.10_10n/a2.10_10n/a2.10_102.10_102.10_10
FreeBSD:15:quarterly--n/a-n/a---
Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Build dependencies:
  1. gmake>=4.3 : devel/gmake
  2. pkgconf>=1.3.0_1 : devel/pkgconf
Library dependencies:
  1. libreadline.so.8 : devel/readline
  2. libdbus-1.so : devel/dbus
There are no ports dependent upon this port

Configuration Options:
===> The following configuration options are available for wpa_supplicant-2.10_10: DBUS=on: D-Bus IPC system support DEBUG_FILE=off: Support for writing debug log to a file DEBUG_SYSLOG=on: Send debug messages to syslog instead of stdout DELAYED_MIC=off: Mitigate TKIP attack, random delay on MIC errors DOCS=on: Build and/or install documentation EAPOL_TEST=off: Development testing HS20=on: Hotspot 2.0 HT_OVERRIDES=off: Disable HT/HT40, mask MCS rates, etc IEEE80211AC=off: Very High Throughput, AP mode (IEEE 802.11ac) IEEE80211N=off: High Throughput, AP mode (IEEE 802.11n) IEEE80211R=on: Fast BSS Transition (IEEE 802.11r-2008) IEEE80211W=on: Management Frame Protection (IEEE 802.11w) IEEE8021X_EAPOL=on: EAP over LAN support INTERWORKING=on: Improve ext. network interworking (IEEE 802.11u) MATCH=on: Interface match mode NO_ROAMING=off: Disable roaming P2P=off: Peer-to-Peer support PKCS12=on: PKCS#12 (PFS) support PRIVSEP=off: Privilege separation SIM_SIMULATOR=off: SIM simulator (Milenage) for EAP-SIM SMARTCARD=on: Private key on smartcard support TDLS=off: Tunneled Direct Link Setup TLSV12=off: Build with TLS v1.2 instead of TLS v1.0 USIM_SIMULATOR=off: SIM simulator (Milenage) for EAP-AKA VHT_OVERRIDES=off: Disable VHT, mask MCS rates, etc WEP=on: WEP support WPS=on: Wi-Fi Protected Setup WPS_ER=on: Enable WPS External Registrar WPS_NFC=on: Near Field Communication (NFC) configuration WPS_NOREG=off: Disable open network credentials when registrar WPS_UPNP=on: Universal Plug and Play support ====> Driver options: you have to choose at least one of them BSD=on: BSD net80211 interface WIRED=on: Wired ethernet interface NDIS=off: Windows NDIS interface TEST=off: Development testing interface NONE=off: The 'no driver' interface, e.g. WPS ER only ====> Extensible Authentication Protocols: you have to choose at least one of them TLS=on: Transport Layer Security PEAP=on: Protected Extensible Authentication Protocol TTLS=on: Tunneled Transport Layer Security MD5=on: MD5 hash (deprecated, no key generation) MSCHAPV2=on: Microsoft CHAP version 2 (RFC 2759) GTC=on: Generic Token Card LEAP=on: Lightweight Extensible Authentication Protocol OTP=on: One-Time Password PSK=on: Pre-Shared key FAST=on: Flexible Authentication via Secure Tunneling SIM=off: Subscriber Identity Module PWD=on: Shared password (RFC 5931) PAX=on: Password Authenticated Exchange AKA=off: Autentication and Key Agreement (UMTS) AKA_PRIME=off: AKA Prime variant (RFC 5448) SAKE=on: Shared-Secret Authentication & Key Establishment GPSK=on: Generalized Pre-Shared Key TNC=on: Trusted Network Connect IKEV2=on: Internet Key Exchange version 2 EKE=on: Encrypted Key Exchange ===> Use 'make config' to modify these settings
Options name:
security_wpa_supplicant
USES:
cpe gmake pkgconfig:build readline ssl
pkg-message:
For install:
To use the ports version of WPA Supplicant instead of the base, add: wpa_supplicant_program="/usr/local/sbin/wpa_supplicant" to /etc/rc.conf
Master Sites:
Expand this list (1 items)
Collapse this list.
  1. https://w1.fi/releases/
Collapse this list.

Number of commits found: 93

Commit History - (may be incomplete: for full details, see links to repositories near top of page)
CommitCreditsLog message
2.10_10
29 Nov 2023 16:18:11
commit hash: 60c99d3a93081cc603e104c0e6c9fe389e774657commit hash: 60c99d3a93081cc603e104c0e6c9fe389e774657commit hash: 60c99d3a93081cc603e104c0e6c9fe389e774657commit hash: 60c99d3a93081cc603e104c0e6c9fe389e774657 files touched by this commit
Cy Schubert (cy) search for other commits by this committer
security/wpa_supplicant*: ctrl_iface set sendbuf size

In order to avoid running into the default net.local.dgram.maxdgram
of 2K currently when calling sendto(2) try to set the sndbuf size to
the maximum ctrl message size.
The problem occured, e.g., when the scan_list result had enough BSSIDs
so the text output would exceed 2048 bytes.

Written by:	bz
PR:		274990
Obtained from:	https://reviews.freebsd.org/D42558
2.10_9
12 Sep 2023 05:51:23
commit hash: 3a88706af1e87ff0bd2857398137194da462c85ccommit hash: 3a88706af1e87ff0bd2857398137194da462c85ccommit hash: 3a88706af1e87ff0bd2857398137194da462c85ccommit hash: 3a88706af1e87ff0bd2857398137194da462c85c files touched by this commit
Cy Schubert (cy) search for other commits by this committer
Author: R. Christian McDonald
security/wpa_supplicant: wpa: Enable receiving priority tagged (VID 0) frames

Certain internet service providers transmit vlan 0 priority tagged
EAPOL frames from the ONT towards the residential gateway. VID 0
should be ignored, and the frame processed according to the priority
set in the 802.1P bits and the encapsulated EtherType (i.e. EAPOL).

The pcap filter utilized by l2_packet is inadquate for this use case.

Here we modify the pcap filter to accept both unencapsulated and
encapsulated (with VLAN 0) EAPOL EtherTypes. This preserves the
original filter behavior while also matching on encapsulated EAPOL.

Sponsored by:   Rubicon Communications, LLC ("Netgate")
Reviewed by:    cy
Obtained from:	src bb5d6d14d81b
PR:		273696
MFH:		2023Q3
2.10_8
12 Sep 2023 05:51:10
commit hash: 89484a70b0d26f483df30e43945b22a0df1be941commit hash: 89484a70b0d26f483df30e43945b22a0df1be941commit hash: 89484a70b0d26f483df30e43945b22a0df1be941commit hash: 89484a70b0d26f483df30e43945b22a0df1be941 files touched by this commit
Cy Schubert (cy) search for other commits by this committer
security/wpa_supplicant: Fix uninitialized packet pointer on error

The packet pointer (called packet) will remain uninitialized when
pcap_next_ex() returns an error. This occurs when the wlan
interface is shut down using ifconfig destroy. Adding a NULL
assignment to packet duplicates what pcap_next() does.

The reason we use pcap_next_ex() in this instance is because with
pacp_next() when we receive a null pointer if there was an error
or if no packets were read. With pcap_next_ex() we can differentiate
between an error and legitimately no packets were received.

PR:             270649, 273696
Obtained from:	src 953efa5b200f
Reported by:    Robert Morris <rtm@lcs.mit.edu>
MFH:		2023Q3
2.10_7
12 Sep 2023 05:50:43
commit hash: bf01744fb255852b2aed16b80e50cb76c35f19d4commit hash: bf01744fb255852b2aed16b80e50cb76c35f19d4commit hash: bf01744fb255852b2aed16b80e50cb76c35f19d4commit hash: bf01744fb255852b2aed16b80e50cb76c35f19d4 files touched by this commit
Cy Schubert (cy) search for other commits by this committer
security/wpa_supplicant: driver_bsd.c: backout upstream IFF_ change and add
logging

This reverts the state to our old supplicant logic setting or clearing
IFF_UP if needed.  In addition this adds logging for the cases in which
we do (not) change the interface state.

Depending on testing this seems to help bringing WiFi up or not log
any needed changes (which would be the expected wpa_supplicant logic
now).  People should look out for ``(changed)`` log entries (at least
if debugging the issue; this way we will at least have data points).

There is a hypothesis still pondered that the entire IFF_UP toggling
only exploits a race in net80211 (see further discssussions for more
debugging and alternative solutions see D38508 and D38753).
That may also explain why the changes to the rc startup script [1]
(Only the first 15 lines of the commit message are shown above View all of this commit message)
2.10_6
28 Jun 2023 02:31:10
commit hash: 2a8cee7837ab1a35168eb37cf5a95501b770047fcommit hash: 2a8cee7837ab1a35168eb37cf5a95501b770047fcommit hash: 2a8cee7837ab1a35168eb37cf5a95501b770047fcommit hash: 2a8cee7837ab1a35168eb37cf5a95501b770047f files touched by this commit
Cy Schubert (cy) search for other commits by this committer
security/wpa_supplicant: Fix for OpenSSL 3.0
07 Sep 2022 21:58:51
commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4 files touched by this commit
Stefan Eßer (se) search for other commits by this committer
Remove WWW entries moved into port Makefiles

Commit b7f05445c00f has added WWW entries to port Makefiles based on
WWW: lines in pkg-descr files.

This commit removes the WWW: lines of moved-over URLs from these
pkg-descr files.

Approved by:		portmgr (tcberner)
2.10_6
07 Sep 2022 21:10:59
commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52 files touched by this commit
Stefan Eßer (se) search for other commits by this committer
Add WWW entries to port Makefiles

It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.

Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.

There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
2.10_6
03 Jul 2022 21:33:18
commit hash: fb0e9b4ce90da94c2943639f3588d25c76778a31commit hash: fb0e9b4ce90da94c2943639f3588d25c76778a31commit hash: fb0e9b4ce90da94c2943639f3588d25c76778a31commit hash: fb0e9b4ce90da94c2943639f3588d25c76778a31 files touched by this commit
Cy Schubert (cy) search for other commits by this committer
security/wpa_supplicant-devel: Enable WEP by default

As of hostap 2.10, WEP is disabled by default. This of course is not a
bad thing but requires some planning and an announcment to remove WEP
support by default. At some point this option will default to off, to
coincide with the removal of WEP support from FreeBSD base.

MFH:		2022Q3
2.10_5
03 Jul 2022 21:33:18
commit hash: b3916c7a8d2599e99fabdc1735b095ff5a9f9381commit hash: b3916c7a8d2599e99fabdc1735b095ff5a9f9381commit hash: b3916c7a8d2599e99fabdc1735b095ff5a9f9381commit hash: b3916c7a8d2599e99fabdc1735b095ff5a9f9381 files touched by this commit
Cy Schubert (cy) search for other commits by this committer
Author: J.R. Oldroyd
wpa_supplicant* hostapd*: Resolve secondary VAP association issue

Association will fail on a secondary open unprotected VAP when the
primary VAP is configured for WPA. Examples of secondary VAPs are,
hotels, universities, and commodity routers' guest networks.

A broadly similar bug was discussed on Red Hat's bugzilla affecting
association to a D-Link DIR-842.

This suggests that as IEs were added to the 802.11 protocol the old code
was increasingly inadaquate to handle the additional IEs, not only a
secondary VAP.

This duplcates src commit 775611ea11db here in ports.

PR:             264238
Reported by:    Jaskie <jiangjun12321@gmail.com>
                "J.R. Oldroyd" <fbsd@opal.com>
Submitted by:   "J.R. Oldroyd" <fbsd@opal.com>
MFH:      	2022Q3
2.10_4
20 Jun 2022 14:29:09
commit hash: 05a849eec9d949b3de32e464570cefbabcd64702commit hash: 05a849eec9d949b3de32e464570cefbabcd64702commit hash: 05a849eec9d949b3de32e464570cefbabcd64702commit hash: 05a849eec9d949b3de32e464570cefbabcd64702 files touched by this commit
Cy Schubert (cy) search for other commits by this committer
*/*: Restore a missing wpa BSD driver patch

These patches were removed to sync with base where in fact base was
missing these patches and base should have been synced with the ports.

PR:		264238
Fixes:		b8477825c2dc42f6c595697a36f593c71f39fbad
		c86f32d652eb9dd023049122d8ca37cb13ed07b6
MFH:		2022Q2
2.10_3
09 Jun 2022 21:58:23
commit hash: c86f32d652eb9dd023049122d8ca37cb13ed07b6commit hash: c86f32d652eb9dd023049122d8ca37cb13ed07b6commit hash: c86f32d652eb9dd023049122d8ca37cb13ed07b6commit hash: c86f32d652eb9dd023049122d8ca37cb13ed07b6 files touched by this commit
Cy Schubert (cy) search for other commits by this committer
*/*: Restore non-IBSS part of wpa patches

b8477825c2dc42f6c595697a36f593c71f39fbad removed some non-IBSS patches.
Restore them. We only want to remove the patches that make IBSS use
ADHOC mode.

Fixes:		b8477825c2dc42f6c595697a36f593c71f39fbad
2.10_2
09 Jun 2022 20:41:39
commit hash: b8477825c2dc42f6c595697a36f593c71f39fbadcommit hash: b8477825c2dc42f6c595697a36f593c71f39fbadcommit hash: b8477825c2dc42f6c595697a36f593c71f39fbadcommit hash: b8477825c2dc42f6c595697a36f593c71f39fbad files touched by this commit
Cy Schubert (cy) search for other commits by this committer
*/*: FreeBSD's WPA does support IBSS mode

FreeBSD's WPA does support IBSS mode. Remove the hack that forces ADHOC
mode when IBSS is requested.
2.10_1
16 Apr 2022 15:55:56
commit hash: c586ac04eb662dea00ab81b226fa3e41a5110b21commit hash: c586ac04eb662dea00ab81b226fa3e41a5110b21commit hash: c586ac04eb662dea00ab81b226fa3e41a5110b21commit hash: c586ac04eb662dea00ab81b226fa3e41a5110b21 files touched by this commit
Cy Schubert (cy) search for other commits by this committer
*/{wpa_supplicant*,hostapd*}: Fix wpa 100% CPU when USB wlan NIC removed

hostapd calls pcap_next(3) to read the next packet off the wlan interface.
pcap_next() returns a pointer to the packet header but does not indicate
success or failure. Unfortunately this results in an infinite loop (100%
CPU) when the wlan device disappears, i.e. when a USB wlan device is
manually removed or a USB error results in the device removal. However
pcap_next_ex(3) does return success or failure. To resolve this we use
pcap_next_ex(), forcing hostapd to exit when the error is encountered.

An error message is printed to syslog or stderr when debugging (-d flag)
is enabled. Unfortunately wpa_printf() only works when debugging is enabled.

PR:		253608
Reported by:	Damjan Jovanovic <damjan.jov@gmail.com>,
		bz (privately)
MFH:		2022Q2
2.10
31 Jan 2022 21:44:16
commit hash: 74e181d200eeb192160951934cd3b16014682d8ccommit hash: 74e181d200eeb192160951934cd3b16014682d8ccommit hash: 74e181d200eeb192160951934cd3b16014682d8ccommit hash: 74e181d200eeb192160951934cd3b16014682d8c files touched by this commit
Cy Schubert (cy) search for other commits by this committer
*/*: Fix wpa_supplicant* and hostapd* EAPOL_TEST build

Fix EAPOL_TEST build. Local funcion os_fdatasync() is valid under
FreeBSD as fdatasync(2) is supported.

PR:		261636
Reported by:	David Siebörger <drs-freebsd@sieborger.nom.za>
MFH:		2022Q1
2.10
17 Jan 2022 17:00:45
commit hash: d3564c5610c4d94d97971a6b7e45a7c3e45454eecommit hash: d3564c5610c4d94d97971a6b7e45a7c3e45454eecommit hash: d3564c5610c4d94d97971a6b7e45a7c3e45454eecommit hash: d3564c5610c4d94d97971a6b7e45a7c3e45454ee files touched by this commit
Cy Schubert (cy) search for other commits by this committer
security/wpa_supplicant: Update to 2.10

The long awaited hostapd 2.10 is finally here.
2.9_11
14 Jun 2021 16:04:00
commit hash: ed47e1ecc5db5576f6a2d4a47e083b2366bd65cccommit hash: ed47e1ecc5db5576f6a2d4a47e083b2366bd65cccommit hash: ed47e1ecc5db5576f6a2d4a47e083b2366bd65cccommit hash: ed47e1ecc5db5576f6a2d4a47e083b2366bd65cc files touched by this commit
Cy Schubert (cy) search for other commits by this committer
*/*: Sync hostapd* and wpa_supplicant* with base ce276fe26d92010776

Use IFM_IEEE80211_ADHOC for now on FreeBSD for IBSS operation.

Base commit by adrian@ on Nov 26, 2015.

This commit syncs ports with base.

PR:		203086
Submitted by:	avos
MFH:		2020Q2
2.9_10
07 Apr 2021 08:09:01
commit hash: cf118ccf875508b9a1c570044c93cfcc82bd455ccommit hash: cf118ccf875508b9a1c570044c93cfcc82bd455ccommit hash: cf118ccf875508b9a1c570044c93cfcc82bd455ccommit hash: cf118ccf875508b9a1c570044c93cfcc82bd455c files touched by this commit
Mathieu Arnold (mat) search for other commits by this committer
One more small cleanup, forgotten yesterday.
Reported by:	lwhsu
2.9_10
06 Apr 2021 14:31:13
commit hash: 135fdeebb99c3569e42d8162b265e15d29bd937dcommit hash: 135fdeebb99c3569e42d8162b265e15d29bd937dcommit hash: 135fdeebb99c3569e42d8162b265e15d29bd937dcommit hash: 135fdeebb99c3569e42d8162b265e15d29bd937d files touched by this commit
Mathieu Arnold (mat) search for other commits by this committer
all: Remove all other $FreeBSD keywords.
2.9_10
06 Apr 2021 14:31:07
commit hash: 305f148f482daf30dcf728039d03d019f88344ebcommit hash: 305f148f482daf30dcf728039d03d019f88344ebcommit hash: 305f148f482daf30dcf728039d03d019f88344ebcommit hash: 305f148f482daf30dcf728039d03d019f88344eb files touched by this commit
Mathieu Arnold (mat) search for other commits by this committer
Remove # $FreeBSD$ from Makefiles.
2.9_10
17 Mar 2021 02:32:50
Revision:568629Original commit files touched by this commit
cy search for other commits by this committer
security/wpa_supplicant: fix for P2P provision vulnerability

Latest version available from: https://w1.fi/security/2021-1/

Vulnerability

A vulnerability was discovered in how wpa_supplicant processes P2P
(Wi-Fi Direct) provision discovery requests. Under a corner case
condition, an invalid Provision Discovery Request frame could end up
reaching a state where the oldest peer entry needs to be removed. With
a suitably constructed invalid frame, this could result in use
(read+write) of freed memory. This can result in an attacker within
radio range of the device running P2P discovery being able to cause
unexpected behavior, including termination of the wpa_supplicant process
and potentially code execution.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
2.9_9
26 Jan 2021 20:15:28
Revision:562996Original commit files touched by this commit
cy search for other commits by this committer
Disable NDIS by default.

From src/bfc99943b04b46a6c1c885ce7bcc6f235b7422aa (brooks):

    nids(4) was a clever idea in the early 2000's when the market was
    flooded with 10/100 NICs with Windows-only drivers, but that hasn't
    been the case for ages and the driver has had no meaningful maintenance
    in ages. It only supports Windows-XP era drivers.

Therefore NDIS has been removed from 14-CURRENT. Those who still want or
need NDIS on older supported versions of FreeBSD can still enable the
options and rebuild the port.
2.9_8
20 Jan 2021 17:14:16
Revision:562150Original commit files touched by this commit
cy search for other commits by this committer
This is the ports version of src commit
d70886d063166786ded0007af8cdcbf57b7b4827.

wpa_supplicant uses PF_ROUTE to return the routing table in order to
determine the length of the routing table buffer. As of 81728a538d24
wpa_supplicant is started before the routing table has been populated
resulting in the length of zero to be returned. This causes
wpa_supplicant to loop endlessly. (The workaround is to kill and restart
wpa_supplicant as by the time it is restarted the routing table is
populated.)

(Personally, I was not able to reproduce this unless wlan0 was a member of
lagg0. However, others experienced this problem on standalone wlan0.)

PR:		252844
Submitted by:	shu <ankohuu _ outlook.com>
Reported by:	shu <ankohuu _ outlook.com>
Reviewed by:	cy
Differential Revision:	https://reviews.freebsd.org/D28249
2.9_7
12 Jan 2021 04:27:16
Revision:561297Original commit files touched by this commit
cy search for other commits by this committer
Fix build on llvm10 and gcc.

PR:		252577
Reported by:	David Sieborger <drs-freebsd _ sieborger.nom.za>
MFH:		2021Q1
2.9_7
30 Dec 2020 05:38:19
Revision:559640Original commit files touched by this commit
cy search for other commits by this committer
Add SIM_SIMULATOR and USIM_SIMULATOR options.

SIM_SIMULATOR and USIM_SIMULATOR options enable features that are used for
testing EAP-AKA and EAP-SIM authentication.

PR:		252276
Submitted by:	Terry Burton <tez _ terryburton.co.uk>
2.9_7
30 Dec 2020 05:38:16
Revision:559639Original commit files touched by this commit
cy search for other commits by this committer
Fix LLVM11 build.

According to https://reviews.llvm.org/D75758, some software may require
a pragma.
2.9_7
26 Jun 2020 01:33:19
Revision:540412Original commit files touched by this commit
cy search for other commits by this committer
add MATCH option for CONFIG_MATCH_IFACE.

PR:		247177
Submitted by:	greg@unrelenting.technology
Reported by:	greg@unrelenting.technology
Tested by:	swills
2.9_6
09 Jun 2020 05:48:26
Revision:538281Original commit files touched by this commit
cy search for other commits by this committer
UPnP SUBSCRIBE misbehavior in hostapd WPS AP

As published by our hostapd  upstream

Vulnerability

General security vulnerability in the way the callback URLs in the UPnP
SUBSCRIBE command are used were reported (VU#339275, CVE-2020-12695).
Some of the described issues may be applicable to the use of UPnP in WPS
AP mode functionality for supporting external registrars.

Such issues could allow a device connected to the local network (i.e., a
device that has been authorized to transmit packets in the network in
which the AP is located) could trigger the AP to initiate a HTTP
(TCP/IP) connection to an arbitrary URL, including connections to
(Only the first 15 lines of the commit message are shown above View all of this commit message)
2.9_5
20 May 2020 04:20:02
Revision:535967Original commit files touched by this commit
cy search for other commits by this committer
Chase src r361272:

Silence the once per second CTRL-EVENT-SCAN-FAILED errors when the WiFi
radio is disabled through the communication device toggle key (also known
as the RF raidio kill button). Only the CTRL-EVENT-DISCONNECTED will be
issued.

Submitted by:	avg
Reported by:	avg
MFH:		2020Q2
2.9_4
22 Apr 2020 19:54:39
Revision:532510Original commit files touched by this commit
leres search for other commits by this committer
security/wpa_supplicant: Simplify @comment logic by using OPTIONS_SUB

PR:		245809
Approved by:	cy (maintainer)
2.9_4
22 Apr 2020 03:37:45
Revision:532442Original commit files touched by this commit
leres search for other commits by this committer
security/wpa_supplicant: Add EAPOL_TEST option

Add an option option to builds and installs the eapol_test program.
Update/patch to solve new compilation errors that result with the
option enabled.

Note: Leaving the changes to Packet32.c out of the PR patch set as
it is not needed.

PR:		245809
Approved by:	cy (maintainer)
2.9_3
01 Apr 2020 01:02:12
Revision:530188Original commit files touched by this commit
cy search for other commits by this committer
Fix poudriere builds.
2.9_2
30 Mar 2020 02:29:10
Revision:529854Original commit files touched by this commit
cy search for other commits by this committer
All other non-exclusive options should be default.

PR:		245099
Reported by:	koobs
2.9_1
30 Mar 2020 02:29:04
Revision:529853Original commit files touched by this commit
cy search for other commits by this committer
Add DBUS option.

PR:		245099
Submitted by:	greg at unrelenting.technology
2.9
22 Jan 2020 05:11:38
Revision:523762Original commit files touched by this commit
cy search for other commits by this committer
Add two new selectable options which allow the user to build
wpa_supplicant to parity with the same in base. The new options,
which are enabled in base are:

WPS_UPNP_DESC:		Universal Plug and Play
IEEE8021X_EAPOL_DESC:	EAP over LAN support
2.9
22 Aug 2019 03:33:52
Revision:509576Original commit files touched by this commit
cy search for other commits by this committer
Update 2.8 --> 2.9
2.8
14 Aug 2019 12:16:13
Revision:508909Original commit files touched by this commit
mat search for other commits by this committer
Convert to UCL & cleanup pkg-message (categories s)
2.8
17 Jun 2019 20:15:41
Revision:504433Original commit files touched by this commit
cy search for other commits by this committer
For users who build and install FreeBSD using WITHOUT_WIRELESS
simply altering /etc/rc.conf isn't enough to make use of the ports
versions of hostapd and wpa_supplicant. This is because the rc.d
scripts are not installed when WITHOUT_WIRELESS is specified as a
build option. This patch checks for the rc scripts existence and
if they do not exist, installs the ports versions of the same
scripts, which are added by this revision.

This patch does not change the package in any way and there is no way
to enable this outside of removal of hostapd or wpa_supplicant
(depending on the port). Users who build their own world using the
WITHOUT_WIRELESS flag will almost always not use binary packages. Hence
the automatic detection and install of the rc scripts. Making this an
option would IMO increase the number of bug reports due to people
inadvertently setting or not setting an option.

To enable this a person must:

1. buildworld and installworld -DWITHOUT_WIRELESS
2. Build and install the desired wpa_supplicant and/or hostapd port
   on servers one wishes to install them on.

PR:		238571
2.8
16 May 2019 02:54:56
Revision:501765Original commit files touched by this commit
cy search for other commits by this committer
Completely remove a "nullfied" ifdef rather than making the code
unreachable. Though this is only a cosmetic change it syncs the port
with base commit r347642, making it easier to compare the two when
diagnosing problems in one or the other.

This was discovered tonight while reviewing some code following my
discussion regarding an issue lwhsu@ was having earlier today.
2.8
16 May 2019 02:41:29
Revision:501764Original commit files touched by this commit
cy search for other commits by this committer
Remove the gratuitous redefinition of MIN to MINAB. This brings the
port in greater sync with base.
2.8
16 May 2019 02:41:27
Revision:501763Original commit files touched by this commit
cy search for other commits by this committer
Resolve the following error discovered in DEVELOPER mode.

These options name have characters outside of [-_A-Z0-9]:

IKEv2 MSCHAPv2
2.8
16 May 2019 02:41:24
Revision:501762Original commit files touched by this commit
cy search for other commits by this committer
Remove the pleonastic initialization and test for eloop_initialized.
This change has no functional effect on the resulting package therefore
a PORTREVISION bump is not necessary.

Discovered while discussing wpa_supplicant with lwhsu@ today.
2.8
22 Apr 2019 15:56:59
Revision:499654Original commit files touched by this commit
cy search for other commits by this committer
Update wpa_supplicant/hostapd 2.7 --> 2.8
2.7_1
09 Apr 2019 14:04:50
Revision:498476Original commit files touched by this commit This port version is marked as vulnerable.
sunpoet search for other commits by this committer
Update devel/readline to 8.0

- Bump PORTREVISION of dependent ports for shlib change

Changes:	https://tiswww.case.edu/php/chet/readline/CHANGES
PR:		236156
Exp-run by:	antoine
2.7
06 Dec 2018 20:33:31
Revision:486801Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
Add missing file that should have been in r486779.
2.7
06 Dec 2018 20:11:21
Revision:486779Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
Update 2.6 --> 2.7
2.6_3
17 Aug 2018 02:18:42
Revision:477405Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
Pet portlint.
2.6_3
17 Aug 2018 02:12:01
Revision:477401Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
Switch to grouping of patches per site as suggested by mat@ in D16718.

Reported by:	mat@
2.6_3
14 Aug 2018 20:21:58
Revision:477202Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
WPA: Ignore unauthenticated encrypted EAPOL-Key data

Ignore unauthenticated encrypted EAPOL-Key data in supplicant
processing. When using WPA2, these are frames that have the Encrypted
flag set, but not the MIC flag.

When using WPA2, EAPOL-Key frames that had the Encrypted flag set but
not the MIC flag, had their data field decrypted without first verifying
the MIC. In case the data field was encrypted using RC4 (i.e., when
negotiating TKIP as the pairwise cipher), this meant that
unauthenticated but decrypted data would then be processed. An adversary
could abuse this as a decryption oracle to recover sensitive information
in the data field of EAPOL-Key messages (e.g., the group key).
(CVE-2018-14526)

Signed-off-by: Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>

Security:	CVE-2018-14526
Security:	VuXML: 6bedc863-9fbe-11e8-945f-206a8a720317
2.6_2
01 Apr 2018 13:36:57
Revision:466153Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
Fix build with LibreSSL 2.7

PR:		227173
Submitted by:	brnrd@
MFH:		2018Q3
2.6_2
17 Oct 2017 05:33:03
Revision:452263Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
Fix "make -s" by replacing ECHO with ECHO_CMD.

PR:		 223056
Submitted by:	Franco Fichtner <franco@opnsense.org>
2.6_2
17 Oct 2017 02:17:29
Revision:452258Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
This port is too important to be orphaned.
Take maintainership and provide a good home.
2.6_2
16 Oct 2017 20:08:11
Revision:452250Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
Add patch set 2017-1

A vulnerability was found in how a number of implementations can be
triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by
replaying a specific frame that is used to manage the keys. Such
reinstallation of the encryption key can result in two different types
of vulnerabilities: disabling replay protection and significantly
reducing the security of encryption to the point of allowing frames to
be decrypted or some parts of the keys to be determined by an attacker
depending on which cipher is used.

Security:	https://w1.fi/security/2017-1/ \
		wpa-packet-number-reuse-with-replayed-messages.txt
Security:	https://www.krackattacks.com/
MFH:		2017Q4
2.6_1
16 Oct 2017 20:05:41
Revision:452249Original commit files touched by this commit This port version is marked as vulnerable.
cy search for other commits by this committer
Use https site.

MFH:		2017Q4
2.6_1
27 Jun 2017 13:46:53
Revision:444463Original commit files touched by this commit This port version is marked as vulnerable.
sunpoet search for other commits by this committer
Update devel/readline to 7.0 patch 3

- Bump PORTREVISION for shlib change

Changes:	https://cnswww.cns.cwru.edu/php/chet/readline/CHANGES
		https://lists.gnu.org/archive/html/bug-bash/2016-09/msg00107.html
		https://lists.gnu.org/archive/html/bug-readline/2017-01/msg00002.html
Differential Revision:	https://reviews.freebsd.org/D11172
PR:		219947
Exp-run by:	antoine
2.6
01 Jan 2017 03:45:13
Revision:430235Original commit files touched by this commit This port version is marked as vulnerable.
sunpoet search for other commits by this committer
Remove BROKEN_FreeBSD_9

Approved by:	portmgr (blanket)
2.6
25 Dec 2016 03:15:14
Revision:429390Original commit files touched by this commit This port version is marked as vulnerable.
jrm search for other commits by this committer
security/wpa_supplicant: Allow users of FreeBSD 9 with libre- or openssl
from ports to build the port.

FreeBSD 9 is EOL in less than a week.  Now those stragglers still running
9.3 can get online to update in the next few days.

Approved by:	AMDmi3 (mentor) swills (mentor)
Differential Revision:	https://reviews.freebsd.org/D8875
2.6
20 Dec 2016 21:41:28
Revision:429033Original commit files touched by this commit This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Unbreak on 10.x+

Reported by:	marino
2.6
19 Dec 2016 14:26:48
Revision:428933Original commit files touched by this commit This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Mark BROKEN: does not build (undefined reference to `get_ie')
2.6
17 Nov 2016 17:43:33
Revision:426292Original commit files touched by this commit This port version is marked as vulnerable.
jrm search for other commits by this committer
security/wpa_supplicant: Update to version 2.6 and patch for LibreSSL support

Port changes:
- Remove patches that have been incorporated upstream
- Add patches for LibreSSL support

Approved by:	AMDmi3 (mentor)
Differential Revision:	https://reviews.freebsd.org/D8451
2.5_2
11 Nov 2016 17:26:49
Revision:425896Original commit files touched by this commit This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Add LICENSE
- Verbosify build
- Switch to options helpers
2.5_2
15 Sep 2016 01:29:41
Revision:422173Original commit files touched by this commit This port version is marked as vulnerable.
marino search for other commits by this committer
Release some of my ports back to the heap
2.5_2
11 Sep 2016 17:05:34
Revision:421843Original commit files touched by this commit This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Add support for LibreSSL
2.5_2
19 May 2016 21:12:08
Revision:415527Original commit files touched by this commit This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Add security patch set 2016-1

A vulnerability was found in how hostapd and wpa_supplicant writes the
configuration file update for the WPA/WPA2 passphrase parameter. If this
parameter has been updated to include control characters either through
a WPS operation (CVE-2016-4476) or through local configuration change
over the wpa_supplicant control interface (CVE-2016-4477), the resulting
configuration file may prevent the hostapd and wpa_supplicant from
starting when the updated file is used. In addition for wpa_supplicant,
it may be possible to load a local library file and execute code from
there with the same privileges under which the wpa_supplicant process
runs.

These patches were developed upstream and published as a response
to the security advisories CVE-2016-4476 and CVE-2016-4477.

PR:		209564
Requested by:	Sevan Janiyan
2.5_1
18 Apr 2016 21:05:28
Revision:413609Original commit files touched by this commit This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: patch 4 CVE security advisories

These patches address the following:
  CVE-2015-5310
  CVE-2015-5314
  CVE-2015-5315
  CVE-2015-5316

These patches were developed upstream and published as a response
to the security advisories.

PR:		208482
Requested by:	Jason Unovitch
2.5
01 Apr 2016 14:25:18
Revision:412349Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Remove ${PORTSDIR}/ from dependencies, categories r, s, t, and u.

With hat:	portmgr
Sponsored by:	Absolight
2.5
11 Oct 2015 22:52:59
Revision:399108Original commit files touched by this commit This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Upgrade version 2.4 => 2.5
2.4_4
12 Jul 2015 11:22:11
Revision:391779Original commit files touched by this commit This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Address security issue (2015-5)

There was a vulnerability to the WPS_NFC option which is off by default.
The port is being bumped anyway since people using that option will want
the latest version.

PR:		201432
Submitted by:	Jason Unovitch
2.4_3
02 Jun 2015 09:35:24
Revision:388312Original commit files touched by this commit This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Address 3 latest security advisories

These are combined upstream patches 2015-2, 2015-3, 2015-4
They address the following security advisories:

  * CVE-2015-4141
  * CVE-2015-4142
  * CVE-2015-4143
  * CVE-2015-4144
  * CVE-2015-4145
  * CVE-2015-4146

These advisories also apply to net/hostapd

PR:		200568
Submitted by:	Jason Unovitch
2.4_2
25 Apr 2015 14:02:13
Revision:384729Original commit files touched by this commit This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Add USES=CPE

I just released that I fixed a CVE bug but WPA Supllicant was never
provided any CPE information.  Fix, bump, and reference previous PR.

PR:		199678
2.4_1
25 Apr 2015 06:19:17
Revision:384705Original commit files touched by this commit This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Fix CVE-2015-1863

PR:		199678
Submitted by:	Jason Unovitch
Approved by:	maintainer (marino)
2.4
16 Mar 2015 20:45:17
Revision:381444Original commit files touched by this commit This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Upgrade version 2.3 => 2.4

See http://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog for list
of changes since version 2.3.
2.3_3
19 Oct 2014 09:33:05
Revision:371174Original commit files touched by this commit This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Fix build on FreeBSD 11

On FreeBSD 11, the wpa_supplicant couldn't find the readline headers.
It turns out that Mk/Uses/readline.mk only augments LDFLAGS and CPPFLAGS,
but wpa_supplicant needs -I${LOCALBASE}/include add to CFLAGS.  To fix
FreeBSD build, augment CFLAGS with value of CPPFLAGS in the makefile.

This wasn't an issue on DragonFly.  Apparently wpa_supplicant found the
readline compatibility headers of libedit and used those instead.

reported by:	pkg-fallout
2.3_3
13 Oct 2014 19:34:48
Revision:370817Original commit files touched by this commit This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Fix mis-information in pkg-message
2.3_3
13 Oct 2014 13:49:56
Revision:370776Original commit files touched by this commit This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Bring in BSD driver fix from DragonFly BSD

DragonFly adopted it's "new" IEEE 802.11 infrastructure from FreeBSD.
This introduced an additional isr_meshid_len field in the
ieee80211req_scan_result structure.  It is necessary to include this
additional offset when calculating the address of the IE data buffer.

Imre Vadasz introduced this fix to DragonFly on 01 Sept 2014, but a
similar fix doesn't appear to be present in FreeBSD's base wpa_supplicant.
2.3_2
13 Oct 2014 12:56:05
Revision:370769Original commit files touched by this commit This port version is marked as vulnerable.
marino search for other commits by this committer
wpa/supplicant: Fix driver list with NDIS, take 2

It turns out the driver list was only showing "null" for NDIS when -h
(help) or an unknown switch was passed to wpa_supplicant.  The cause is
that the NDIS driver is the only that that has to be initialized, and
the initialization wasn't occurring in the above case.

The fix is the move the NDIS driver initialization before the command
switches are examined in case wpa_supplicant aborts to usage early.
2.3_1
13 Oct 2014 09:33:08
Revision:370760Original commit files touched by this commit This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Fix NDIS driver, privsep no longer default

The NDIS driver didn't build when privsep option was turned off.  Moveover,
it didn't display the driver name correctly, so I figured out a patch
based on base's ndis driver code.  Thirdly, when privsep option is turned
off, wpa_priv is not built, so let's handle that condition.

Finally, remove privsep from default options because it removes the
standard list of drivers and replaces it with privsep driver.
2.3
12 Oct 2014 21:20:25
Revision:370742Original commit files touched by this commit This port version is marked as vulnerable.
marino search for other commits by this committer
Revive security/wpa_supplicant after 6.5 years => version 2.3

This port was retired at version 0.3.8 because wpa_supplicant is
part of FreeBSD base.  However, the last few releases have had a period
of only a few months, so the base is always going to be behind.  DragonFly
is also affected, so I'm bringing the port back at the latest version.

It features the same patches as FreeBSD including the conversion to use
libutil's pidfile routines.  There are some additional patches for
DragonFly support and to fix some bugs from the 9 Oct 2014 release.

The WPA Supplicant build system has been converted to ports options, and
there are dozens of them.  I've set the defaults to match the
configuration in base and verified that it builds with all options
selected at once.
0.3.8_2
25 Apr 2008 23:21:09
Original commit files touched by this commit This port version is marked as vulnerable.
pav search for other commits by this committer
- Remove, it's ancient and newer version is included in base of all supported
  releases

Suggested by:   sam
0.3.8_2
03 Feb 2007 01:55:47
Original commit files touched by this commit This port version is marked as vulnerable.
markus search for other commits by this committer
Utilize PORTDOCS
0.3.8_2
14 Sep 2006 17:37:55
Original commit files touched by this commit This port version is marked as vulnerable.
brooks search for other commits by this committer
Drop maintainership.  I'm not really interested in this now that we've
got it in the base.
0.3.8_2
14 Sep 2006 17:37:05
Original commit files touched by this commit This port version is marked as vulnerable.
brooks search for other commits by this committer
Fix build with openssl 0.9.8b.

PR:             ports/102822
Submitted by:   simon
0.3.8_2
10 Sep 2006 23:32:56
Original commit files touched by this commit This port version is marked as vulnerable.
kris search for other commits by this committer
Change IGNORE to BROKEN in previous
0.3.8_2
10 Sep 2006 23:31:58
Original commit files touched by this commit This port version is marked as vulnerable.
kris search for other commits by this committer
BROKEN on 7.x: Does not compile
0.3.8_2
13 May 2006 04:15:53
Original commit files touched by this commit This port version is marked as vulnerable.
edwin search for other commits by this committer
Remove USE_REINPLACE from all categories starting with S
0.3.8_2
11 Nov 2005 19:03:22
Original commit files touched by this commit This port version is marked as vulnerable.
brooks search for other commits by this committer
add SHA256
0.3.8_2
27 May 2005 01:10:30
Original commit files touched by this commit This port version is marked as vulnerable.
brooks search for other commits by this committer
Add a new variable WITH_STATIC_SUPPLICANT to cause wpa_supplicant to be
linked staticly.  This allows it to be used from devd at startup. [1]

Use LIB_DEPENDS instead of BUILD_DEPENDS for the libdnet depend since we
need it to run too. [2]

My changes differ from the submitted fixes.

Submitted by:   Darren Pilgrim <dmp at bitfreak dot org> [1]
                Pawel Worach <pawel dot worach at gmail dot com> [2]
0.3.8_1
23 Apr 2005 03:29:45
Original commit files touched by this commit This port version is marked as vulnerable.
brooks search for other commits by this committer
Fix wpa_cli.  You need to pass all of the sockaddr, not just part of it.
Also be sure to keep the path null terminated as Stevens does.

While I'm here, take maintainership since I use this and seem to be
making most of the recent commits.
0.3.8
16 Feb 2005 07:03:32
Original commit files touched by this commit This port version is marked as vulnerable.
brooks search for other commits by this committer
- Update to 0.3.8.  See ChangeLog for details.
- Install sample config file in etc/wpa_supplication.conf.sample instead
  of DOCSDIR.
- Obey PREFIX.
- Follow move of binaries from bin to sbin.

Committed from a laptop running this version against an AP with WPA-PSK
and AES encription.

Submitted by:   Yamamoto Shigeru <shigeru at iij dot ad dot jp>
PR:             75609 (by Rong-En Fan <rafan at infor dot org>)
0.3.0_1
08 Jan 2005 19:06:48
Original commit files touched by this commit This port version is marked as vulnerable.
brooks search for other commits by this committer
- Spell wpa_supplicant with two 'p's in PORTNAME
- Remove now unnecessicary DISTNAME
- Add net to CATEGORIES
- Ditch the pkg-plist file in favor of PLIST_FILES, there were only
  three lines in the plist
- Make the patch files relative to WRKSRC so we can drop PATCH_ARGS
- Install some documentation
- Bump PORTREVISION for new docs
0.3.0
13 Dec 2004 00:19:20
Original commit files touched by this commit This port version is marked as vulnerable.
imp search for other commits by this committer
Add support for EAP.  It might not work only in 802.1x mode, but should
work in WPA+802.1x.

Submitted by: sam
0.3.0
12 Dec 2004 22:59:36
Original commit files touched by this commit This port version is marked as vulnerable.
imp search for other commits by this committer
Fix grammatical error Kris pointed out.

Submitted by: kris
0.3.0
12 Dec 2004 22:41:06
Original commit files touched by this commit This port version is marked as vulnerable.
imp search for other commits by this committer
wpa_supplicant is only for current.
0.3.0
12 Dec 2004 22:23:07
Original commit files touched by this commit This port version is marked as vulnerable.
imp search for other commits by this committer
WPA supplicant daemon for 802.11 networks.

Submitted by: sam

Number of commits found: 93