Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
2024.08.19 04 Sep 2024 16:03:51 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2024.07.20_1 22 Jul 2024 15:23:06 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Bump PORTREVISION for 4939276f5cf5
Fixes: 4939276f5cf5 |
2024.07.20 22 Jul 2024 15:08:31 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Enable PASN by default
PASN is enabled in the base FreeBSD wpa_supplicant. Enable it here
as well. |
2024.07.20 22 Jul 2024 15:08:30 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Spell out PASN option in DESC |
2024.07.20 21 Jul 2024 13:06:31 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2024.07.13 18 Jul 2024 21:01:43 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2024.06.20 26 Jun 2024 16:33:39 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2024.05.29 03 Jun 2024 14:51:49 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2024.05.06 02 Jun 2024 05:31:51 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Fix 15-CURRENT 108de784513d build
On FreeBSD systems without 108de784513d the old definition will be used
while on 108de784513d and newer the duplicate case will be removed.
Obtained from: src 676041c41ba5
Discussed with: imp |
2024.05.06 13 May 2024 15:50:35 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2024.04.06 11 Apr 2024 16:37:04 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2024.03.27 28 Mar 2024 20:54:02 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2024.02.18_1 23 Feb 2024 04:02:45 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2024.02.03_1 07 Feb 2024 00:41:20 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2023.12.23_1 03 Jan 2024 16:41:10 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2023.12.05_1 06 Dec 2023 05:54:09 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2023.11.11_1 29 Nov 2023 16:18:11 |
Cy Schubert (cy) |
security/wpa_supplicant*: ctrl_iface set sendbuf size
In order to avoid running into the default net.local.dgram.maxdgram
of 2K currently when calling sendto(2) try to set the sndbuf size to
the maximum ctrl message size.
The problem occured, e.g., when the scan_list result had enough BSSIDs
so the text output would exceed 2048 bytes.
Written by: bz
PR: 274990
Obtained from: https://reviews.freebsd.org/D42558 |
2023.11.11 14 Nov 2023 20:08:13 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2023.10.30 30 Oct 2023 21:22:39 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2023.10.05_4 11 Oct 2023 02:50:51 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2023.09.26_4 26 Sep 2023 21:45:15 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2023.09.05_4 12 Sep 2023 05:51:26 |
Cy Schubert (cy) Author: R. Christian McDonald |
security/wpa_supplicant-devel: wpa: Enable receiving priority tagged (VID 0)
frames
Certain internet service providers transmit vlan 0 priority tagged
EAPOL frames from the ONT towards the residential gateway. VID 0
should be ignored, and the frame processed according to the priority
set in the 802.1P bits and the encapsulated EtherType (i.e. EAPOL).
The pcap filter utilized by l2_packet is inadquate for this use case.
Here we modify the pcap filter to accept both unencapsulated and
encapsulated (with VLAN 0) EAPOL EtherTypes. This preserves the
original filter behavior while also matching on encapsulated EAPOL.
Sponsored by: Rubicon Communications, LLC ("Netgate")
Reviewed by: cy
Obtained from: src bb5d6d14d81b
PR: 273696
MFH: 2023Q3 |
2023.09.05_3 12 Sep 2023 05:51:13 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Fix uninitialized packet pointer on error
The packet pointer (called packet) will remain uninitialized when
pcap_next_ex() returns an error. This occurs when the wlan
interface is shut down using ifconfig destroy. Adding a NULL
assignment to packet duplicates what pcap_next() does.
The reason we use pcap_next_ex() in this instance is because with
pacp_next() when we receive a null pointer if there was an error
or if no packets were read. With pcap_next_ex() we can differentiate
between an error and legitimately no packets were received.
PR: 270649, 273696
Obtained from: src 953efa5b200f
Reported by: Robert Morris <rtm@lcs.mit.edu>
MFH: 2023Q3 |
2023.09.05_2 12 Sep 2023 05:51:07 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Reapply c586ac04eb66
Reapply "Fix 100% CPU when USB wlan NIC removed."
hostapd calls pcap_next(3) to read the next packet off the wlan interface.
pcap_next() returns a pointer to the packet header but does not indicate
success or failure. Unfortunately this results in an infinite loop (100%
CPU) when the wlan device disappears, i.e. when a USB wlan device is
manually removed or a USB error results in the device removal. However
pcap_next_ex(3) does return success or failure. To resolve this we use
pcap_next_ex(), forcing hostapd to exit when the error is encountered.
An error message is printed to syslog or stderr when debugging (-d flag)
is enabled. Unfortunately wpa_printf() only works when debugging is enabled.
PR: 253608, 273696
Obtained from: src 6e5d01124fd4
Reported by: Damjan Jovanovic <damjan.jov@gmail.com>,
bz (privately)
MFH: 2023Q3 |
2023.09.05_1 12 Sep 2023 05:50:50 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: driver_bsd.c: backout upstream IFF_ change and
add logging
This reverts the state to our old supplicant logic setting or clearing
IFF_UP if needed. In addition this adds logging for the cases in which
we do (not) change the interface state.
Depending on testing this seems to help bringing WiFi up or not log
any needed changes (which would be the expected wpa_supplicant logic
now). People should look out for ``(changed)`` log entries (at least
if debugging the issue; this way we will at least have data points).
There is a hypothesis still pondered that the entire IFF_UP toggling
only exploits a race in net80211 (see further discssussions for more
debugging and alternative solutions see D38508 and D38753).
That may also explain why the changes to the rc startup script [1] (Only the first 15 lines of the commit message are shown above ) |
2023.09.05 05 Sep 2023 18:30:19 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2023.08.28 28 Aug 2023 16:35:28 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2023.08.23 31 Jul 2023 16:38:09 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2023.08.22 28 Jun 2023 02:31:10 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2023.06.05 28 Jun 2023 02:31:09 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Fix for OpenSSL 3.0 |
2023.06.05 06 Jun 2023 18:35:42 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2023.05.25 31 May 2023 02:54:10 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2023.05.04 08 May 2023 20:43:18 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2023.04.28 02 May 2023 14:40:03 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2023.04.03 17 Apr 2023 21:28:45 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2023.03.29 01 Apr 2023 00:04:16 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2023.03.17 18 Mar 2023 03:16:56 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2023.02.21 21 Feb 2023 16:08:48 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2023.02.14 15 Feb 2023 19:29:13 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2023.01.13 17 Jan 2023 21:12:15 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2022.12.20 03 Jan 2023 16:56:28 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2022.12.19 19 Dec 2022 19:23:30 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2022.11.10 18 Nov 2022 02:33:45 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2022.10.17 17 Oct 2022 18:20:14 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2022.10.10 11 Oct 2022 14:30:23 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2022.09.29 02 Oct 2022 23:32:07 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2022.09.05 11 Sep 2022 14:41:42 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
07 Sep 2022 21:58:51 |
Stefan EĂźer (se) |
Remove WWW entries moved into port Makefiles
Commit b7f05445c00f has added WWW entries to port Makefiles based on
WWW: lines in pkg-descr files.
This commit removes the WWW: lines of moved-over URLs from these
pkg-descr files.
Approved by: portmgr (tcberner) |
2022.07.26 07 Sep 2022 21:10:59 |
Stefan EĂźer (se) |
Add WWW entries to port Makefiles
It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.
Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.
There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above ) |
2022.07.26 28 Aug 2022 21:16:42 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2022.07.16 18 Jul 2022 15:00:08 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2022.06.30 03 Jul 2022 21:35:56 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account.
MFH: 2022Q3 |
2022.06.20_2 03 Jul 2022 21:33:18 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Enable WEP by default
As of hostap 2.10, WEP is disabled by default. This of course is not a
bad thing but requires some planning and an announcment to remove WEP
support by default. At some point this option will default to off, to
coincide with the removal of WEP support from FreeBSD base.
MFH: 2022Q3 |
2022.06.20_1 03 Jul 2022 21:33:18 |
Cy Schubert (cy) Author: J.R. Oldroyd |
wpa_supplicant* hostapd*: Resolve secondary VAP association issue
Association will fail on a secondary open unprotected VAP when the
primary VAP is configured for WPA. Examples of secondary VAPs are,
hotels, universities, and commodity routers' guest networks.
A broadly similar bug was discussed on Red Hat's bugzilla affecting
association to a D-Link DIR-842.
This suggests that as IEs were added to the 802.11 protocol the old code
was increasingly inadaquate to handle the additional IEs, not only a
secondary VAP.
This duplcates src commit 775611ea11db here in ports.
PR: 264238
Reported by: Jaskie <jiangjun12321@gmail.com>
"J.R. Oldroyd" <fbsd@opal.com>
Submitted by: "J.R. Oldroyd" <fbsd@opal.com>
MFH: 2022Q3 |
2022.06.20 21 Jun 2022 18:31:08 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2022.05.24_3 20 Jun 2022 14:29:09 |
Cy Schubert (cy) |
*/*: Restore a missing wpa BSD driver patch
These patches were removed to sync with base where in fact base was
missing these patches and base should have been synced with the ports.
PR: 264238
Fixes: b8477825c2dc42f6c595697a36f593c71f39fbad
c86f32d652eb9dd023049122d8ca37cb13ed07b6
MFH: 2022Q2 |
2022.05.24_2 09 Jun 2022 21:58:23 |
Cy Schubert (cy) |
*/*: Restore non-IBSS part of wpa patches
b8477825c2dc42f6c595697a36f593c71f39fbad removed some non-IBSS patches.
Restore them. We only want to remove the patches that make IBSS use
ADHOC mode.
Fixes: b8477825c2dc42f6c595697a36f593c71f39fbad |
2022.05.24_1 09 Jun 2022 20:41:39 |
Cy Schubert (cy) |
*/*: FreeBSD's WPA does support IBSS mode
FreeBSD's WPA does support IBSS mode. Remove the hack that forces ADHOC
mode when IBSS is requested. |
2022.05.24 27 May 2022 13:45:08 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2022.05.19 19 May 2022 22:30:07 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2022.05.08 09 May 2022 18:08:34 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2022.04.24 25 Apr 2022 15:50:04 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2022.03.14_1 16 Apr 2022 15:55:56 |
Cy Schubert (cy) |
*/{wpa_supplicant*,hostapd*}: Fix wpa 100% CPU when USB wlan NIC removed
hostapd calls pcap_next(3) to read the next packet off the wlan interface.
pcap_next() returns a pointer to the packet header but does not indicate
success or failure. Unfortunately this results in an infinite loop (100%
CPU) when the wlan device disappears, i.e. when a USB wlan device is
manually removed or a USB error results in the device removal. However
pcap_next_ex(3) does return success or failure. To resolve this we use
pcap_next_ex(), forcing hostapd to exit when the error is encountered.
An error message is printed to syslog or stderr when debugging (-d flag)
is enabled. Unfortunately wpa_printf() only works when debugging is enabled.
PR: 253608
Reported by: Damjan Jovanovic <damjan.jov@gmail.com>,
bz (privately)
MFH: 2022Q2 |
2022.03.14 14 Mar 2022 16:59:13 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2022.03.04 07 Mar 2022 15:43:38 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2022.01.16 31 Jan 2022 21:44:16 |
Cy Schubert (cy) |
*/*: Fix wpa_supplicant* and hostapd* EAPOL_TEST build
Fix EAPOL_TEST build. Local funcion os_fdatasync() is valid under
FreeBSD as fdatasync(2) is supported.
PR: 261636
Reported by: David Siebörger <drs-freebsd@sieborger.nom.za>
MFH: 2022Q1 |
2022.01.16 17 Jan 2022 17:00:44 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2021.12.13 04 Jan 2022 01:16:19 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2021.11.26_1 29 Nov 2021 20:55:21 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2021.07.14_1 30 Sep 2021 21:23:30 |
Rene Ladan (rene) |
cleanup: drop support for EOL FreeBSD 11.X
Search criteria used:
- 11.4
- OSREL*
- OSVER*
- *_FreeBSD_11
Input from:
- adridg: devel/qca-legacy
- jbeich: _WITH_DPRINTF, _WITH_GETLINE, GNU bfd workarounds
- sunpoet: security/p5-*OpenSSL*
Reviewed by: doceng, kde, multimedia, perl, python, ruby, rust
Differential Revision: https://reviews.freebsd.org/D32008
Test Plan: make index |
2021.07.14_1 13 Sep 2021 15:52:54 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Add WNM, MBO, and RSN_PREAUTH options
The following options have been added and are default.
- Enable WiFi 6 MBO (Multi Band Operation). MBO is a prereq to 802.11ax.
- WNM (Wireless Network Monitoring)
- RSN Preauthentication
This brings wpa-supplicant-devel in line with FreeBSD 14-CURRENT. |
2021.07.14 21 Jul 2021 21:17:31 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2021.06.14_1 21 Jul 2021 21:17:29 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: sync up with base
Add a patch already in base. |
2021.06.14 21 Jun 2021 14:17:34 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2021.06.09 14 Jun 2021 16:04:00 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2021.06.03_1 14 Jun 2021 16:04:00 |
Cy Schubert (cy) |
*/*: Sync hostapd* and wpa_supplicant* with base ce276fe26d92010776
Use IFM_IEEE80211_ADHOC for now on FreeBSD for IBSS operation.
Base commit by adrian@ on Nov 26, 2015.
This commit syncs ports with base.
PR: 203086
Submitted by: avos
MFH: 2020Q2 |
2021.06.03 14 Jun 2021 16:03:59 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Make use of fdatasync(2)
FreeBSD has supported fdatasync(2) since FreeBSD 11.1. Prepare for
future use when syncing to planned updates to base. |
2021.06.03 03 Jun 2021 15:01:44 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2021.05.11 17 May 2021 16:54:18 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2021.04.13 19 Apr 2021 16:52:38 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2021.04.07 12 Apr 2021 18:23:49 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Add PASN option
PASN (Pre association Security Negotiation), defined in 802.11az_D1.5,
is the mechanism that allows for security association and allow
Management Frame Protection (MFP) prior to association.
See https://www.spinics.net/lists/hostap/msg06752.html. |
2021.04.07 12 Apr 2021 18:23:49 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2021.03.28 07 Apr 2021 08:09:01 |
Mathieu Arnold (mat) |
One more small cleanup, forgotten yesterday.
Reported by: lwhsu |
2021.03.28 07 Apr 2021 06:50:39 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account. |
2021.03.25 06 Apr 2021 14:31:13 |
Mathieu Arnold (mat) |
all: Remove all other $FreeBSD keywords. |
2021.03.25 06 Apr 2021 14:31:07 |
Mathieu Arnold (mat) |
Remove # $FreeBSD$ from Makefiles. |
2021.03.25 29 Mar 2021 18:14:41 |
cy |
Update to the latest w1.fi commit, proxied through my GH account. |
2021.03.21 24 Mar 2021 08:59:21 |
cy |
hostapd-devel, wpa_supplicant-devel do not support openssl 1.0.2. |
2021.03.21 22 Mar 2021 18:40:22 |
cy |
Update to the latest w1.fi commit, proxied through my GH account. |
2021.03.19 20 Mar 2021 03:05:35 |
cy |
Update to the latest w1.fi commit, proxied through my GH account.
This includes:
EAP-SIM/AKA peer: Support decorated anonymous identity prefix |
2021.03.16 19 Mar 2021 00:18:22 |
cy |
net/hostapd-devel, security/wpa_supplicant-devel
Add two new development ports tracking the latest w1.fi development.
WPA developement is hosted at git://w1.fi/hostap.git however ports
plumbing provides API access to github. Therefore I cloned/forked
hostap, renaming "origin" to "upstream," with a brand-new "origin"
located on github. In theory this will allow me to git pull from
git://w1.fi/hostap.git and push to my github repo.
This will coincide with base tracking more recent developent at w1.fi,
supporting WPA3.
Discussed with: phillip@ |