notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Port details
wpa_supplicant Supplicant (client) for WPA/802.1x protocols
2.8 security on this many watch lists=4 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port
2.8Version of this port present on the latest quarterly branch.
Maintainer: cy@FreeBSD.org search for ports maintained by this maintainer
Port Added: 2004-12-12 22:27:18
Last Update: 2019-06-17 21:15:41
SVN Revision: 504433
Also Listed In: net
License: BSD3CLAUSE
wpa_supplicant is a client (supplicant) with support for WPA and WPA2
(IEEE 802.11i / RSN). It is suitable for both desktop/laptop computers and
embedded systems. Supplicant is the IEEE 802.1X/WPA component that is used
in the client stations. It implements key negotiation with a WPA
Authenticator and it controls the roaming and IEEE 802.11 authentication/
association of the wlan driver.

wpa_supplicant is designed to be a "daemon" program that runs in the
background and acts as the backend component controlling the wireless
connection. wpa_supplicant supports separate frontend programs and a
text-based frontend (wpa_cli) and a GUI (wpa_gui) are included with
wpa_supplicant.

WWW: http://w1.fi/wpa_supplicant/
SVNWeb : Homepage
    Pseudo-pkg-plist information, but much better, from make generate-plist
    Expand this list (7 items)
  1. /usr/local/share/licenses/wpa_supplicant-2.8/catalog.mk
  2. /usr/local/share/licenses/wpa_supplicant-2.8/LICENSE
  3. /usr/local/share/licenses/wpa_supplicant-2.8/BSD3CLAUSE
  4. sbin/wpa_supplicant
  5. sbin/wpa_passphrase
  6. sbin/wpa_cli
  7. @sample etc/wpa_supplicant.conf.sample
  8. Collapse this list.
Dependency lines:
  • wpa_supplicant>0:security/wpa_supplicant

To install the port: cd /usr/ports/security/wpa_supplicant/ && make install clean
To add the package: pkg install wpa_supplicant

PKGNAME: wpa_supplicant

There is no flavor information for this port.

distinfo:

TIMESTAMP = 1555947152
SHA256 (wpa_supplicant-2.8.tar.gz) = a689336a12a99151b9de5e25bfccadb88438f4f4438eb8db331cd94346fd3d96
SIZE (wpa_supplicant-2.8.tar.gz) = 3155904


NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Build dependencies:
  1. gmake : devel/gmake
Library dependencies:
  1. libreadline.so.8 : devel/readline
There are no ports dependent upon this port

Configuration Options
===> The following configuration options are available for wpa_supplicant-2.8:
     DEBUG_FILE=off: Support for writing debug log to a file
     DEBUG_SYSLOG=on: Send debug messages to syslog instead of stdout
     DELAYED_MIC=off: Mitigate TKIP attack, random delay on MIC errors
     DOCS=on: Build and/or install documentation
     HS20=on: Hotspot 2.0
     HT_OVERRIDES=off: Disable HT/HT40, mask MCS rates, etc
     IEEE80211AC=off: Very High Throughput, AP mode (IEEE 802.11ac)
     IEEE80211N=off: High Throughput, AP mode (IEEE 802.11n)
     IEEE80211R=on: Fast BSS Transition (IEEE 802.11r-2008)
     IEEE80211W=off: Management Frame Protection (IEEE 802.11w)
     INTERWORKING=on: Improve ext. network interworking (IEEE 802.11u)
     NO_ROAMING=off: Disable roaming
     P2P=off: Peer-to-Peer support
     PKCS12=on: PKCS#12 (PFS) support
     PRIVSEP=off: Privilege separation
     SMARTCARD=on: Private key on smartcard support
     TDLS=off: Tunneled Direct Link Setup
     TLSV12=off: Build with TLS v1.2 instead of TLS v1.0
     VHT_OVERRIDES=off: Disable VHT, mask MCS rates, etc
     WPS=on: Wi-Fi Protected Setup
     WPS_ER=off: Enable WPS External Registrar
     WPS_NFC=off: Near Field Communication (NFC) configuration
     WPS_NOREG=off: Disable open network credentials when registrar
====> Driver options: you have to choose at least one of them
     BSD=on: BSD net80211 interface
     WIRED=on: Wired ethernet interface
     NDIS=on: Windows NDIS interface
     TEST=off: Development testing interface
     NONE=off: The 'no driver' interface, e.g. WPS ER only
====> Extensible Authentication Protocols: you have to choose at least one of them
     TLS=on: Transport Layer Security
     PEAP=on: Protected Extensible Authentication Protocol
     TTLS=on: Tunneled Transport Layer Security
     MD5=on: MD5 hash (deprecated, no key generation)
     MSCHAPV2=on: Microsoft CHAP version 2 (RFC 2759)
     GTC=on: Generic Token Card
     LEAP=on: Lightweight Extensible Authentication Protocol
     OTP=on: One-Time Password
     PSK=on: Pre-Shared key
     FAST=off: Flexible Authentication via Secure Tunneling
     SIM=off: Subscriber Identity Module
     PWD=off: Shared password (RFC 5931)
     PAX=off: Password Authenticated Exchange
     AKA=off: Autentication and Key Agreement (UMTS)
     AKA_PRIME=off: AKA Prime variant (RFC 5448)
     SAKE=off: Shared-Secret Authentication & Key Establishment
     GPSK=off: Generalized Pre-Shared Key
     TNC=off: Trusted Network Connect
     IKEV2=off: Internet Key Exchange version 2
     EKE=off: Encrypted Key Exchange
===> Use 'make config' to modify these settings

USES:
cpe gmake readline ssl

Master Sites:
  1. https://w1.fi/releases/

Number of commits found: 57

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
17 Jun 2019 20:15:41
Original commit files touched by this commit  2.8
Revision:504433
cy search for other commits by this committer
For users who build and install FreeBSD using WITHOUT_WIRELESS
simply altering /etc/rc.conf isn't enough to make use of the ports
versions of hostapd and wpa_supplicant. This is because the rc.d
scripts are not installed when WITHOUT_WIRELESS is specified as a
build option. This patch checks for the rc scripts existence and
if they do not exist, installs the ports versions of the same
scripts, which are added by this revision.

This patch does not change the package in any way and there is no way
to enable this outside of removal of hostapd or wpa_supplicant
(depending on the port). Users who build their own world using the
WITHOUT_WIRELESS flag will almost always not use binary packages. Hence
the automatic detection and install of the rc scripts. Making this an
option would IMO increase the number of bug reports due to people
inadvertently setting or not setting an option.

To enable this a person must:

1. buildworld and installworld -DWITHOUT_WIRELESS
2. Build and install the desired wpa_supplicant and/or hostapd port
   on servers one wishes to install them on.

PR:		238571
16 May 2019 02:54:56
Original commit files touched by this commit  2.8
Revision:501765
cy search for other commits by this committer
Completely remove a "nullfied" ifdef rather than making the code
unreachable. Though this is only a cosmetic change it syncs the port
with base commit r347642, making it easier to compare the two when
diagnosing problems in one or the other.

This was discovered tonight while reviewing some code following my
discussion regarding an issue lwhsu@ was having earlier today.
16 May 2019 02:41:29
Original commit files touched by this commit  2.8
Revision:501764
cy search for other commits by this committer
Remove the gratuitous redefinition of MIN to MINAB. This brings the
port in greater sync with base.
16 May 2019 02:41:27
Original commit files touched by this commit  2.8
Revision:501763
cy search for other commits by this committer
Resolve the following error discovered in DEVELOPER mode.

These options name have characters outside of [-_A-Z0-9]:

IKEv2 MSCHAPv2
16 May 2019 02:41:24
Original commit files touched by this commit  2.8
Revision:501762
cy search for other commits by this committer
Remove the pleonastic initialization and test for eloop_initialized.
This change has no functional effect on the resulting package therefore
a PORTREVISION bump is not necessary.

Discovered while discussing wpa_supplicant with lwhsu@ today.
22 Apr 2019 15:56:59
Original commit files touched by this commit  2.8
Revision:499654
cy search for other commits by this committer
Update wpa_supplicant/hostapd 2.7 --> 2.8
09 Apr 2019 14:04:50
Original commit files touched by this commit  2.7_1
Revision:498476 This port version is marked as vulnerable.
sunpoet search for other commits by this committer
Update devel/readline to 8.0

- Bump PORTREVISION of dependent ports for shlib change

Changes:	https://tiswww.case.edu/php/chet/readline/CHANGES
PR:		236156
Exp-run by:	antoine
06 Dec 2018 20:33:31
Original commit files touched by this commit  2.7
Revision:486801 This port version is marked as vulnerable.
cy search for other commits by this committer
Add missing file that should have been in r486779.
06 Dec 2018 20:11:21
Original commit files touched by this commit  2.7
Revision:486779 This port version is marked as vulnerable.
cy search for other commits by this committer
Update 2.6 --> 2.7
17 Aug 2018 02:18:42
Original commit files touched by this commit  2.6_3
Revision:477405 This port version is marked as vulnerable.
cy search for other commits by this committer
Pet portlint.
17 Aug 2018 02:12:01
Original commit files touched by this commit  2.6_3
Revision:477401 This port version is marked as vulnerable.
cy search for other commits by this committer
Switch to grouping of patches per site as suggested by mat@ in D16718.

Reported by:	mat@
14 Aug 2018 20:21:58
Original commit files touched by this commit  2.6_3
Revision:477202 This port version is marked as vulnerable.
cy search for other commits by this committer
WPA: Ignore unauthenticated encrypted EAPOL-Key data

Ignore unauthenticated encrypted EAPOL-Key data in supplicant
processing. When using WPA2, these are frames that have the Encrypted
flag set, but not the MIC flag.

When using WPA2, EAPOL-Key frames that had the Encrypted flag set but
not the MIC flag, had their data field decrypted without first verifying
the MIC. In case the data field was encrypted using RC4 (i.e., when
negotiating TKIP as the pairwise cipher), this meant that
unauthenticated but decrypted data would then be processed. An adversary
could abuse this as a decryption oracle to recover sensitive information
in the data field of EAPOL-Key messages (e.g., the group key).
(CVE-2018-14526)

Signed-off-by: Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>

Security:	CVE-2018-14526
Security:	VuXML: 6bedc863-9fbe-11e8-945f-206a8a720317
01 Apr 2018 13:36:57
Original commit files touched by this commit  2.6_2
Revision:466153 This port version is marked as vulnerable.
cy search for other commits by this committer
Fix build with LibreSSL 2.7

PR:		227173
Submitted by:	brnrd@
MFH:		2018Q3
17 Oct 2017 05:33:03
Original commit files touched by this commit  2.6_2
Revision:452263 This port version is marked as vulnerable.
cy search for other commits by this committer
Fix "make -s" by replacing ECHO with ECHO_CMD.

PR:		 223056
Submitted by:	Franco Fichtner <franco@opnsense.org>
17 Oct 2017 02:17:29
Original commit files touched by this commit  2.6_2
Revision:452258 This port version is marked as vulnerable.
cy search for other commits by this committer
This port is too important to be orphaned.
Take maintainership and provide a good home.
16 Oct 2017 20:08:11
Original commit files touched by this commit  2.6_2
Revision:452250 This port version is marked as vulnerable.
cy search for other commits by this committer
Add patch set 2017-1

A vulnerability was found in how a number of implementations can be
triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by
replaying a specific frame that is used to manage the keys. Such
reinstallation of the encryption key can result in two different types
of vulnerabilities: disabling replay protection and significantly
reducing the security of encryption to the point of allowing frames to
be decrypted or some parts of the keys to be determined by an attacker
depending on which cipher is used.

Security:	https://w1.fi/security/2017-1/ \
		wpa-packet-number-reuse-with-replayed-messages.txt
Security:	https://www.krackattacks.com/
MFH:		2017Q4
16 Oct 2017 20:05:41
Original commit files touched by this commit  2.6_1
Revision:452249 This port version is marked as vulnerable.
cy search for other commits by this committer
Use https site.

MFH:		2017Q4
27 Jun 2017 13:46:53
Original commit files touched by this commit  2.6_1
Revision:444463 This port version is marked as vulnerable.
sunpoet search for other commits by this committer
Update devel/readline to 7.0 patch 3

- Bump PORTREVISION for shlib change

Changes:	https://cnswww.cns.cwru.edu/php/chet/readline/CHANGES
		https://lists.gnu.org/archive/html/bug-bash/2016-09/msg00107.html
		https://lists.gnu.org/archive/html/bug-readline/2017-01/msg00002.html
Differential Revision:	https://reviews.freebsd.org/D11172
PR:		219947
Exp-run by:	antoine
01 Jan 2017 03:45:13
Original commit files touched by this commit  2.6
Revision:430235 This port version is marked as vulnerable.
sunpoet search for other commits by this committer
Remove BROKEN_FreeBSD_9

Approved by:	portmgr (blanket)
25 Dec 2016 03:15:14
Original commit files touched by this commit  2.6
Revision:429390 This port version is marked as vulnerable.
jrm search for other commits by this committer
security/wpa_supplicant: Allow users of FreeBSD 9 with libre- or openssl
from ports to build the port.

FreeBSD 9 is EOL in less than a week.  Now those stragglers still running
9.3 can get online to update in the next few days.

Approved by:	AMDmi3 (mentor) swills (mentor)
Differential Revision:	https://reviews.freebsd.org/D8875
20 Dec 2016 21:41:28
Original commit files touched by this commit  2.6
Revision:429033 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Unbreak on 10.x+

Reported by:	marino
19 Dec 2016 14:26:48
Original commit files touched by this commit  2.6
Revision:428933 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Mark BROKEN: does not build (undefined reference to `get_ie')
17 Nov 2016 17:43:33
Original commit files touched by this commit  2.6
Revision:426292 This port version is marked as vulnerable.
jrm search for other commits by this committer
security/wpa_supplicant: Update to version 2.6 and patch for LibreSSL support

Port changes:
- Remove patches that have been incorporated upstream
- Add patches for LibreSSL support

Approved by:	AMDmi3 (mentor)
Differential Revision:	https://reviews.freebsd.org/D8451
11 Nov 2016 17:26:49
Original commit files touched by this commit  2.5_2
Revision:425896 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Add LICENSE
- Verbosify build
- Switch to options helpers
15 Sep 2016 01:29:41
Original commit files touched by this commit  2.5_2
Revision:422173 This port version is marked as vulnerable.
marino search for other commits by this committer
Release some of my ports back to the heap
11 Sep 2016 17:05:34
Original commit files touched by this commit  2.5_2
Revision:421843 This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Add support for LibreSSL
19 May 2016 21:12:08
Original commit files touched by this commit  2.5_2
Revision:415527 This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Add security patch set 2016-1

A vulnerability was found in how hostapd and wpa_supplicant writes the
configuration file update for the WPA/WPA2 passphrase parameter. If this
parameter has been updated to include control characters either through
a WPS operation (CVE-2016-4476) or through local configuration change
over the wpa_supplicant control interface (CVE-2016-4477), the resulting
configuration file may prevent the hostapd and wpa_supplicant from
starting when the updated file is used. In addition for wpa_supplicant,
it may be possible to load a local library file and execute code from
there with the same privileges under which the wpa_supplicant process
runs.

These patches were developed upstream and published as a response
to the security advisories CVE-2016-4476 and CVE-2016-4477.

PR:		209564
Requested by:	Sevan Janiyan
18 Apr 2016 21:05:28
Original commit files touched by this commit  2.5_1
Revision:413609 This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: patch 4 CVE security advisories

These patches address the following:
  CVE-2015-5310
  CVE-2015-5314
  CVE-2015-5315
  CVE-2015-5316

These patches were developed upstream and published as a response
to the security advisories.

PR:		208482
Requested by:	Jason Unovitch
01 Apr 2016 14:25:18
Original commit files touched by this commit  2.5
Revision:412349 This port version is marked as vulnerable.
mat search for other commits by this committer
Remove ${PORTSDIR}/ from dependencies, categories r, s, t, and u.

With hat:	portmgr
Sponsored by:	Absolight
11 Oct 2015 22:52:59
Original commit files touched by this commit  2.5
Revision:399108 This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Upgrade version 2.4 => 2.5
12 Jul 2015 11:22:11
Original commit files touched by this commit  2.4_4
Revision:391779 This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Address security issue (2015-5)

There was a vulnerability to the WPS_NFC option which is off by default.
The port is being bumped anyway since people using that option will want
the latest version.

PR:		201432
Submitted by:	Jason Unovitch
02 Jun 2015 09:35:24
Original commit files touched by this commit  2.4_3
Revision:388312 This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Address 3 latest security advisories

These are combined upstream patches 2015-2, 2015-3, 2015-4
They address the following security advisories:

  * CVE-2015-4141
  * CVE-2015-4142
  * CVE-2015-4143
  * CVE-2015-4144
  * CVE-2015-4145
  * CVE-2015-4146

These advisories also apply to net/hostapd

PR:		200568
Submitted by:	Jason Unovitch
25 Apr 2015 14:02:13
Original commit files touched by this commit  2.4_2
Revision:384729 This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Add USES=CPE

I just released that I fixed a CVE bug but WPA Supllicant was never
provided any CPE information.  Fix, bump, and reference previous PR.

PR:		199678
25 Apr 2015 06:19:17
Original commit files touched by this commit  2.4_1
Revision:384705 This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Fix CVE-2015-1863

PR:		199678
Submitted by:	Jason Unovitch
Approved by:	maintainer (marino)
16 Mar 2015 20:45:17
Original commit files touched by this commit  2.4
Revision:381444 This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Upgrade version 2.3 => 2.4

See http://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog for list
of changes since version 2.3.
19 Oct 2014 09:33:05
Original commit files touched by this commit  2.3_3
Revision:371174 This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Fix build on FreeBSD 11

On FreeBSD 11, the wpa_supplicant couldn't find the readline headers.
It turns out that Mk/Uses/readline.mk only augments LDFLAGS and CPPFLAGS,
but wpa_supplicant needs -I${LOCALBASE}/include add to CFLAGS.  To fix
FreeBSD build, augment CFLAGS with value of CPPFLAGS in the makefile.

This wasn't an issue on DragonFly.  Apparently wpa_supplicant found the
readline compatibility headers of libedit and used those instead.

reported by:	pkg-fallout
13 Oct 2014 19:34:48
Original commit files touched by this commit  2.3_3
Revision:370817 This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Fix mis-information in pkg-message
13 Oct 2014 13:49:56
Original commit files touched by this commit  2.3_3
Revision:370776 This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Bring in BSD driver fix from DragonFly BSD

DragonFly adopted it's "new" IEEE 802.11 infrastructure from FreeBSD.
This introduced an additional isr_meshid_len field in the
ieee80211req_scan_result structure.  It is necessary to include this
additional offset when calculating the address of the IE data buffer.

Imre Vadasz introduced this fix to DragonFly on 01 Sept 2014, but a
similar fix doesn't appear to be present in FreeBSD's base wpa_supplicant.
13 Oct 2014 12:56:05
Original commit files touched by this commit  2.3_2
Revision:370769 This port version is marked as vulnerable.
marino search for other commits by this committer
wpa/supplicant: Fix driver list with NDIS, take 2

It turns out the driver list was only showing "null" for NDIS when -h
(help) or an unknown switch was passed to wpa_supplicant.  The cause is
that the NDIS driver is the only that that has to be initialized, and
the initialization wasn't occurring in the above case.

The fix is the move the NDIS driver initialization before the command
switches are examined in case wpa_supplicant aborts to usage early.
13 Oct 2014 09:33:08
Original commit files touched by this commit  2.3_1
Revision:370760 This port version is marked as vulnerable.
marino search for other commits by this committer
security/wpa_supplicant: Fix NDIS driver, privsep no longer default

The NDIS driver didn't build when privsep option was turned off.  Moveover,
it didn't display the driver name correctly, so I figured out a patch
based on base's ndis driver code.  Thirdly, when privsep option is turned
off, wpa_priv is not built, so let's handle that condition.

Finally, remove privsep from default options because it removes the
standard list of drivers and replaces it with privsep driver.
12 Oct 2014 21:20:25
Original commit files touched by this commit  2.3
Revision:370742 This port version is marked as vulnerable.
marino search for other commits by this committer
Revive security/wpa_supplicant after 6.5 years => version 2.3

This port was retired at version 0.3.8 because wpa_supplicant is
part of FreeBSD base.  However, the last few releases have had a period
of only a few months, so the base is always going to be behind.  DragonFly
is also affected, so I'm bringing the port back at the latest version.

It features the same patches as FreeBSD including the conversion to use
libutil's pidfile routines.  There are some additional patches for
DragonFly support and to fix some bugs from the 9 Oct 2014 release.

The WPA Supplicant build system has been converted to ports options, and
there are dozens of them.  I've set the defaults to match the
configuration in base and verified that it builds with all options
selected at once.
25 Apr 2008 23:21:09
Original commit files touched by this commit  0.3.8_2
 This port version is marked as vulnerable.
pav search for other commits by this committer
- Remove, it's ancient and newer version is included in base of all supported
  releases

Suggested by:   sam
03 Feb 2007 01:55:47
Original commit files touched by this commit  0.3.8_2
 This port version is marked as vulnerable.
markus search for other commits by this committer
Utilize PORTDOCS
14 Sep 2006 17:37:55
Original commit files touched by this commit  0.3.8_2
 This port version is marked as vulnerable.
brooks search for other commits by this committer
Drop maintainership.  I'm not really interested in this now that we've
got it in the base.
14 Sep 2006 17:37:05
Original commit files touched by this commit  0.3.8_2
 This port version is marked as vulnerable.
brooks search for other commits by this committer
Fix build with openssl 0.9.8b.

PR:             ports/102822
Submitted by:   simon
10 Sep 2006 23:32:56
Original commit files touched by this commit  0.3.8_2
 This port version is marked as vulnerable.
kris search for other commits by this committer
Change IGNORE to BROKEN in previous
10 Sep 2006 23:31:58
Original commit files touched by this commit  0.3.8_2
 This port version is marked as vulnerable.
kris search for other commits by this committer
BROKEN on 7.x: Does not compile
13 May 2006 04:15:53
Original commit files touched by this commit  0.3.8_2
 This port version is marked as vulnerable.
edwin search for other commits by this committer
Remove USE_REINPLACE from all categories starting with S
11 Nov 2005 19:03:22
Original commit files touched by this commit  0.3.8_2
 This port version is marked as vulnerable.
brooks search for other commits by this committer
add SHA256
27 May 2005 01:10:30
Original commit files touched by this commit  0.3.8_2
 This port version is marked as vulnerable.
brooks search for other commits by this committer
Add a new variable WITH_STATIC_SUPPLICANT to cause wpa_supplicant to be
linked staticly.  This allows it to be used from devd at startup. [1]

Use LIB_DEPENDS instead of BUILD_DEPENDS for the libdnet depend since we
need it to run too. [2]

My changes differ from the submitted fixes.

Submitted by:   Darren Pilgrim <dmp at bitfreak dot org> [1]
                Pawel Worach <pawel dot worach at gmail dot com> [2]
23 Apr 2005 03:29:45
Original commit files touched by this commit  0.3.8_1
 This port version is marked as vulnerable.
brooks search for other commits by this committer
Fix wpa_cli.  You need to pass all of the sockaddr, not just part of it.
Also be sure to keep the path null terminated as Stevens does.

While I'm here, take maintainership since I use this and seem to be
making most of the recent commits.
16 Feb 2005 07:03:32
Original commit files touched by this commit  0.3.8
 This port version is marked as vulnerable.
brooks search for other commits by this committer
- Update to 0.3.8.  See ChangeLog for details.
- Install sample config file in etc/wpa_supplication.conf.sample instead
  of DOCSDIR.
- Obey PREFIX.
- Follow move of binaries from bin to sbin.

Committed from a laptop running this version against an AP with WPA-PSK
and AES encription.

Submitted by:   Yamamoto Shigeru <shigeru at iij dot ad dot jp>
PR:             75609 (by Rong-En Fan <rafan at infor dot org>)
08 Jan 2005 19:06:48
Original commit files touched by this commit  0.3.0_1
 This port version is marked as vulnerable.
brooks search for other commits by this committer
- Spell wpa_supplicant with two 'p's in PORTNAME
- Remove now unnecessicary DISTNAME
- Add net to CATEGORIES
- Ditch the pkg-plist file in favor of PLIST_FILES, there were only
  three lines in the plist
- Make the patch files relative to WRKSRC so we can drop PATCH_ARGS
- Install some documentation
- Bump PORTREVISION for new docs
13 Dec 2004 00:19:20
Original commit files touched by this commit  0.3.0
 This port version is marked as vulnerable.
imp search for other commits by this committer
Add support for EAP.  It might not work only in 802.1x mode, but should
work in WPA+802.1x.

Submitted by: sam
12 Dec 2004 22:59:36
Original commit files touched by this commit  0.3.0
 This port version is marked as vulnerable.
imp search for other commits by this committer
Fix grammatical error Kris pointed out.

Submitted by: kris
12 Dec 2004 22:41:06
Original commit files touched by this commit  0.3.0
 This port version is marked as vulnerable.
imp search for other commits by this committer
wpa_supplicant is only for current.
12 Dec 2004 22:23:07
Original commit files touched by this commit  0.3.0
 This port version is marked as vulnerable.
imp search for other commits by this committer
WPA supplicant daemon for 802.11 networks.

Submitted by: sam

Number of commits found: 57

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
firefoxJun 19
firefox-esrJun 19
ImageMagick6*Jun 17
ImageMagick6-nox11*Jun 17
ImageMagick7*Jun 17
ImageMagick7-nox11*Jun 17
GraphicsMagickJun 16
netatalk3Jun 16
chromiumJun 15
neovimJun 13
phpmyadminJun 13
vimJun 13
vim-consoleJun 13
vim-tinyJun 13
mybbJun 12

12 vulnerabilities affecting 106 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2019-06-19 06:36:10


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 36700
Broken 82
Deprecated 118
Ignore 304
Forbidden 3
Restricted 162
No CDROM 74
Vulnerable 33
Expired 14
Set to expire 89
Interactive 0
new 24 hours 0
new 48 hours4
new 7 days34
new fortnight67
new month183

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2019 Dan Langille. All rights reserved.