notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine

Bot filter coming soon

To deter bots pegging the database CPU to 100%, a bot testing filter to be added to the website. This should not affect newsfeeds etc. Anubis seems light-weight - it is already in use within the FreeBSD Project. This notice is just a heads up in case you see something odd. This notice will be updated after Anubis is installed.

non port: net/hostapd/files/patch-src-l2_packet-l2_packet_freebsd.c

Number of commits found: 6

Tuesday, 12 Sep 2023
05:51 Cy Schubert (cy) search for other commits by this committer
net/hostapd: Rename patch to current patch naming standard
commit hash: 4ef06a46019c5369bef49faf3dd81d2ed7670192 commit hash: 4ef06a46019c5369bef49faf3dd81d2ed7670192 commit hash: 4ef06a46019c5369bef49faf3dd81d2ed7670192 commit hash: 4ef06a46019c5369bef49faf3dd81d2ed7670192 4ef06a4
Saturday, 16 Apr 2022
15:55 Cy Schubert (cy) search for other commits by this committer
*/{wpa_supplicant*,hostapd*}: Fix wpa 100% CPU when USB wlan NIC removed

hostapd calls pcap_next(3) to read the next packet off the wlan interface.
pcap_next() returns a pointer to the packet header but does not indicate
success or failure. Unfortunately this results in an infinite loop (100%
CPU) when the wlan device disappears, i.e. when a USB wlan device is
manually removed or a USB error results in the device removal. However
pcap_next_ex(3) does return success or failure. To resolve this we use
pcap_next_ex(), forcing hostapd to exit when the error is encountered.

An error message is printed to syslog or stderr when debugging (-d flag)
is enabled. Unfortunately wpa_printf() only works when debugging is enabled.

PR:		253608
Reported by:	Damjan Jovanovic <damjan.jov@gmail.com>,
		bz (privately)
MFH:		2022Q2
commit hash: c586ac04eb662dea00ab81b226fa3e41a5110b21 commit hash: c586ac04eb662dea00ab81b226fa3e41a5110b21 commit hash: c586ac04eb662dea00ab81b226fa3e41a5110b21 commit hash: c586ac04eb662dea00ab81b226fa3e41a5110b21 c586ac0
Wednesday, 29 Mar 2017
01:49 cy search for other commits by this committer
Fix build broken by r436625.

PR:		218036
Original commitRevision:437179 
Tuesday, 21 Mar 2017
17:50 krion search for other commits by this committer
Update net/hostapd to 2.6 and fix multiple vulnerabilities

PR:		217907
Submitted by:	maintainer
Approved by:	mat (mentor)
Differential Revision: https://reviews.freebsd.org/D10051
Original commitRevision:436625 
Sunday, 12 Oct 2014
10:46 marino search for other commits by this committer
net/hostapd: Update WWW + MASTER_SITES and support DragonFly

The domain for hostapd has changed from hostap.epitest.fi to w1.fi
although the former still redirects.  Update WWW and MASTER_SITES to
reflect the new name.

Regenerate the l2 packet patch so that hostapd also builds on DragonFly
(no-op for FreeBSD).

While here, rearrange makefile to remove need for <pre> and <post> and
use of $PORTNAME in $WRKSRC which would break if PORTNAME changes.
Original commitRevision:370693 
Saturday, 12 Feb 2011
04:52 miwi search for other commits by this committer
hostapd is a user space daemon for access point and authentication
servers. It implements IEEE 802.11 access point management, IEEE
802.1X/WPA/WPA2/EAP Authenticators, RADIUS client, EAP server, and
RADIUS authentication server. The current version supports Linux
(Host AP, madwifi, mac80211-based drivers) and FreeBSD (net80211).

WWW: http://hostap.epitest.fi/hostapd/

PR:             ports/154621
Submitted by:   leres at ee.lbl.gov
Original commit

Number of commits found: 6