notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)

Why was the website so slow for so long?

The cause of the slowdown was a change to the ZFS dataset. In conjunction with the database server, very little caching was being done. This combination resulted in increased disk I/O as the system churned through the database. Details in the blog post which outlines the various things which changed. Many graphs.

non port: security/wpa_supplicant/Makefile
SVNWeb

Number of commits found: 54

Mon, 30 Mar 2020
[ 02:29 cy ] Original commit   Revision:529854
529854 security/wpa_supplicant/Makefile
All other non-exclusive options should be default.

PR:		245099
Reported by:	koobs
[ 02:29 cy ] Original commit   Revision:529853
529853 security/wpa_supplicant/Makefile
Add DBUS option.

PR:		245099
Submitted by:	greg at unrelenting.technology
Wed, 22 Jan 2020
[ 05:11 cy ] Original commit   Revision:523762
523762 security/wpa_supplicant/Makefile
Add two new selectable options which allow the user to build
wpa_supplicant to parity with the same in base. The new options,
which are enabled in base are:

WPS_UPNP_DESC:		Universal Plug and Play
IEEE8021X_EAPOL_DESC:	EAP over LAN support
Thu, 22 Aug 2019
[ 03:33 cy ] Original commit   Revision:509576
509576 security/wpa_supplicant/Makefile
509576 security/wpa_supplicant/distinfo
Update 2.8 --> 2.9
Mon, 17 Jun 2019
[ 20:15 cy ] Original commit   Revision:504433
504433 net/hostapd/Makefile
504433 net/hostapd/files/hostapd.in
504433 security/wpa_supplicant/Makefile
504433 security/wpa_supplicant/files/wpa_supplicant.in
For users who build and install FreeBSD using WITHOUT_WIRELESS
simply altering /etc/rc.conf isn't enough to make use of the ports
versions of hostapd and wpa_supplicant. This is because the rc.d
scripts are not installed when WITHOUT_WIRELESS is specified as a
build option. This patch checks for the rc scripts existence and
if they do not exist, installs the ports versions of the same
scripts, which are added by this revision.

This patch does not change the package in any way and there is no way
to enable this outside of removal of hostapd or wpa_supplicant
(depending on the port). Users who build their own world using the
WITHOUT_WIRELESS flag will almost always not use binary packages. Hence
the automatic detection and install of the rc scripts. Making this an
option would IMO increase the number of bug reports due to people
inadvertently setting or not setting an option.

To enable this a person must:

1. buildworld and installworld -DWITHOUT_WIRELESS
2. Build and install the desired wpa_supplicant and/or hostapd port
   on servers one wishes to install them on.

PR:		238571
Thu, 16 May 2019
[ 02:41 cy ] Original commit   Revision:501763
501763 security/wpa_supplicant/Makefile
Resolve the following error discovered in DEVELOPER mode.

These options name have characters outside of [-_A-Z0-9]:

IKEv2 MSCHAPv2
Mon, 22 Apr 2019
[ 15:56 cy ] Original commit   Revision:499654
499654 net/hostapd/Makefile
499654 net/hostapd/distinfo
499654 security/wpa_supplicant/Makefile
499654 security/wpa_supplicant/distinfo
Update wpa_supplicant/hostapd 2.7 --> 2.8
Tue, 9 Apr 2019
[ 14:04 sunpoet ] Original commit   Revision:498476
498476 Mk/Uses/readline.mk
498476 Mk/bsd.ruby.mk
498476 audio/ardour5/Makefile
498476 audio/cutmp3/Makefile
498476 audio/ecasound/Makefile
498476 audio/fluidsynth/Makefile
498476 audio/guitarix-lv2/Makefile
498476 audio/jack/Makefile
498476 audio/kid3-qt5/Makefile
498476 audio/lash/Makefile

(Only the first 10 of 289 ports in this commit are shown above. View all ports for this commit)
Update devel/readline to 8.0

- Bump PORTREVISION of dependent ports for shlib change

Changes:	https://tiswww.case.edu/php/chet/readline/CHANGES
PR:		236156
Exp-run by:	antoine
Thu, 6 Dec 2018
[ 20:11 cy ] Original commit   Revision:486779
486779 security/wpa_supplicant/Makefile
486779 security/wpa_supplicant/distinfo
486779 security/wpa_supplicant/files/patch-src-l2_packet-l2_packet_freebsd.c
486779 security/wpa_supplicant/files/patch-src_crypto_crypto__openssl.c
486779 security/wpa_supplicant/files/patch-src_crypto_tls__openssl.c
486779 security/wpa_supplicant/files/patch-src_l2__packet_l2__packet__freebsd.c
Update 2.6 --> 2.7
Fri, 17 Aug 2018
[ 02:18 cy ] Original commit   Revision:477405
477405 net/hostapd/Makefile
477405 security/wpa_supplicant/Makefile
Pet portlint.
[ 02:12 cy ] Original commit   Revision:477401
477401 security/wpa_supplicant/Makefile
Switch to grouping of patches per site as suggested by mat@ in D16718.

Reported by:	mat@
Tue, 14 Aug 2018
[ 20:21 cy ] Original commit   Revision:477202
477202 security/wpa_supplicant/Makefile
477202 security/wpa_supplicant/distinfo
WPA: Ignore unauthenticated encrypted EAPOL-Key data

Ignore unauthenticated encrypted EAPOL-Key data in supplicant
processing. When using WPA2, these are frames that have the Encrypted
flag set, but not the MIC flag.

When using WPA2, EAPOL-Key frames that had the Encrypted flag set but
not the MIC flag, had their data field decrypted without first verifying
the MIC. In case the data field was encrypted using RC4 (i.e., when
negotiating TKIP as the pairwise cipher), this meant that
unauthenticated but decrypted data would then be processed. An adversary
could abuse this as a decryption oracle to recover sensitive information
in the data field of EAPOL-Key messages (e.g., the group key).
(CVE-2018-14526)

Signed-off-by: Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>

Security:	CVE-2018-14526
Security:	VuXML: 6bedc863-9fbe-11e8-945f-206a8a720317
Tue, 17 Oct 2017
[ 05:33 cy ] Original commit   Revision:452263
452263 security/wpa_supplicant/Makefile
Fix "make -s" by replacing ECHO with ECHO_CMD.

PR:		 223056
Submitted by:	Franco Fichtner <franco@opnsense.org>
[ 02:17 cy ] Original commit   Revision:452258
452258 security/wpa_supplicant/Makefile
This port is too important to be orphaned.
Take maintainership and provide a good home.
Mon, 16 Oct 2017
[ 20:08 cy ] Original commit   Revision:452250
452250 security/wpa_supplicant/Makefile
452250 security/wpa_supplicant/distinfo
Add patch set 2017-1

A vulnerability was found in how a number of implementations can be
triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by
replaying a specific frame that is used to manage the keys. Such
reinstallation of the encryption key can result in two different types
of vulnerabilities: disabling replay protection and significantly
reducing the security of encryption to the point of allowing frames to
be decrypted or some parts of the keys to be determined by an attacker
depending on which cipher is used.

Security:	https://w1.fi/security/2017-1/ \
		wpa-packet-number-reuse-with-replayed-messages.txt
Security:	https://www.krackattacks.com/
MFH:		2017Q4
[ 20:05 cy ] Original commit   Revision:452249
452249 security/wpa_supplicant/Makefile
Use https site.

MFH:		2017Q4
Tue, 27 Jun 2017
[ 13:46 sunpoet ] Original commit   Revision:444463
444463 Mk/Uses/readline.mk
444463 Mk/bsd.ruby.mk
444463 audio/ardour5/Makefile
444463 audio/cutmp3/Makefile
444463 audio/ecasound/Makefile
444463 audio/fluidsynth/Makefile
444463 audio/jack/Makefile
444463 audio/kid3-kde4/Makefile
444463 audio/lash/Makefile
444463 audio/libsmf/Makefile

(Only the first 10 of 252 ports in this commit are shown above. View all ports for this commit)
Update devel/readline to 7.0 patch 3

- Bump PORTREVISION for shlib change

Changes:	https://cnswww.cns.cwru.edu/php/chet/readline/CHANGES
		https://lists.gnu.org/archive/html/bug-bash/2016-09/msg00107.html
		https://lists.gnu.org/archive/html/bug-readline/2017-01/msg00002.html
Differential Revision:	https://reviews.freebsd.org/D11172
PR:		219947
Exp-run by:	antoine
Sun, 1 Jan 2017
[ 03:45 sunpoet ] Original commit   Revision:430235
430235 archivers/zstd/Makefile
430235 astro/libosmium/Makefile
430235 audio/gnuspeechsa/Makefile
430235 audio/lastfm-desktop/Makefile
430235 audio/sooperlooper/Makefile
430235 audio/teamspeak3-server/Makefile
430235 benchmarks/clpeak/Makefile
430235 biology/jellyfish/Makefile
430235 biology/seqtools/Makefile
430235 cad/freecad/Makefile

(Only the first 10 of 161 ports in this commit are shown above. View all ports for this commit)
Remove BROKEN_FreeBSD_9

Approved by:	portmgr (blanket)
Sun, 25 Dec 2016
[ 03:15 jrm ] Original commit   Revision:429390
429390 security/wpa_supplicant/Makefile
security/wpa_supplicant: Allow users of FreeBSD 9 with libre- or openssl
from ports to build the port.

FreeBSD 9 is EOL in less than a week.  Now those stragglers still running
9.3 can get online to update in the next few days.

Approved by:	AMDmi3 (mentor) swills (mentor)
Differential Revision:	https://reviews.freebsd.org/D8875
Tue, 20 Dec 2016
[ 21:41 amdmi3 ] Original commit   Revision:429033
429033 security/wpa_supplicant/Makefile
- Unbreak on 10.x+

Reported by:	marino
Mon, 19 Dec 2016
[ 14:26 amdmi3 ] Original commit   Revision:428933
428933 security/wpa_supplicant/Makefile
- Mark BROKEN: does not build (undefined reference to `get_ie')
Thu, 17 Nov 2016
[ 17:43 jrm ] Original commit   Revision:426292
426292 security/wpa_supplicant/Makefile
426292 security/wpa_supplicant/distinfo
426292 security/wpa_supplicant/files/patch-2015-6-backported-WNM-Ignore-Key-Data-in-WNM-Sleep-Mode-Response-frame
426292 security/wpa_supplicant/files/patch-2015-7-EAP-pwd-peer-Fix-last-fragment-length-validation
426292 security/wpa_supplicant/files/patch-2015-7-EAP-pwd-server-Fix-last-fragment-length-validation
426292 security/wpa_supplicant/files/patch-2015-8-EAP-pwd-peer-Fix-error-path-for-unexpected-Confirm-m
426292 security/wpa_supplicant/files/patch-2016_1_1-WPS-Reject-a-Credential-with-invalid-passphrase
426292 security/wpa_supplicant/files/patch-2016_1_2-Reject-psk-parameter-set-with-invalid-passphrase-cha
426292 security/wpa_supplicant/files/patch-2016_1_3-Remove-newlines-from-wpa_supplicant-config-network-o
426292 security/wpa_supplicant/files/patch-2016_1_4-Reject-SET_CRED-commands-with-newline-characters-in

(Only the first 10 of 15 ports in this commit are shown above. View all ports for this commit)
security/wpa_supplicant: Update to version 2.6 and patch for LibreSSL support

Port changes:
- Remove patches that have been incorporated upstream
- Add patches for LibreSSL support

Approved by:	AMDmi3 (mentor)
Differential Revision:	https://reviews.freebsd.org/D8451
Fri, 11 Nov 2016
[ 17:26 amdmi3 ] Original commit   Revision:425896
425896 security/wpa_supplicant/Makefile
- Add LICENSE
- Verbosify build
- Switch to options helpers
Thu, 15 Sep 2016
[ 01:29 marino ] Original commit   Revision:422173
422173 cad/ghdl/Makefile
422173 databases/libnvpair/Makefile
422173 devel/afay/Makefile
422173 devel/libuutil/Makefile
422173 lang/modula3/Makefile
422173 math/ocaml-zarith/Makefile
422173 security/wpa_supplicant/Makefile
422173 textproc/words/Makefile
Release some of my ports back to the heap
Sun, 11 Sep 2016
[ 17:05 marino ] Original commit   Revision:421843
421843 security/wpa_supplicant/Makefile
421843 security/wpa_supplicant/files/patch-src_crypto_tls__openssl.c
security/wpa_supplicant: Add support for LibreSSL
Thu, 19 May 2016
[ 21:12 marino ] Original commit   Revision:415527
415527 security/wpa_supplicant/Makefile
415527 security/wpa_supplicant/files/patch-2016_1_1-WPS-Reject-a-Credential-with-invalid-passphrase
415527 security/wpa_supplicant/files/patch-2016_1_2-Reject-psk-parameter-set-with-invalid-passphrase-cha
415527 security/wpa_supplicant/files/patch-2016_1_3-Remove-newlines-from-wpa_supplicant-config-network-o
415527 security/wpa_supplicant/files/patch-2016_1_4-Reject-SET_CRED-commands-with-newline-characters-in
415527 security/wpa_supplicant/files/patch-2016_1_5-Reject-SET-commands-with-newline-characters-in-the-s
security/wpa_supplicant: Add security patch set 2016-1

A vulnerability was found in how hostapd and wpa_supplicant writes the
configuration file update for the WPA/WPA2 passphrase parameter. If this
parameter has been updated to include control characters either through
a WPS operation (CVE-2016-4476) or through local configuration change
over the wpa_supplicant control interface (CVE-2016-4477), the resulting
configuration file may prevent the hostapd and wpa_supplicant from
starting when the updated file is used. In addition for wpa_supplicant,
it may be possible to load a local library file and execute code from
there with the same privileges under which the wpa_supplicant process
runs.

These patches were developed upstream and published as a response
to the security advisories CVE-2016-4476 and CVE-2016-4477.

PR:		209564
Requested by:	Sevan Janiyan
Mon, 18 Apr 2016
[ 21:05 marino ] Original commit   Revision:413609
413609 security/wpa_supplicant/Makefile
413609 security/wpa_supplicant/files/patch-2015-6-backported-WNM-Ignore-Key-Data-in-WNM-Sleep-Mode-Response-frame
413609 security/wpa_supplicant/files/patch-2015-7-EAP-pwd-peer-Fix-last-fragment-length-validation
413609 security/wpa_supplicant/files/patch-2015-7-EAP-pwd-server-Fix-last-fragment-length-validation
413609 security/wpa_supplicant/files/patch-2015-8-EAP-pwd-peer-Fix-error-path-for-unexpected-Confirm-m
security/wpa_supplicant: patch 4 CVE security advisories

These patches address the following:
  CVE-2015-5310
  CVE-2015-5314
  CVE-2015-5315
  CVE-2015-5316

These patches were developed upstream and published as a response
to the security advisories.

PR:		208482
Requested by:	Jason Unovitch
Fri, 1 Apr 2016
[ 14:25 mat ] Original commit   Revision:412349
412349 russian/bugzilla44/Makefile
412349 russian/emkatic/Makefile
412349 russian/gd/Makefile
412349 russian/p5-Convert-Cyrillic/Makefile
412349 russian/p5-Lingua-DetectCyrillic/Makefile
412349 russian/p5-Text-Hyphen-RU/Makefile
412349 russian/p5-XML-Parser-encodings/Makefile
412349 russian/rubygem-russian/Makefile
412349 science/InsightToolkit/Makefile
412349 science/R-cran-DCluster/Makefile

(Only the first 10 of 2099 ports in this commit are shown above. View all ports for this commit)
Remove ${PORTSDIR}/ from dependencies, categories r, s, t, and u.

With hat:	portmgr
Sponsored by:	Absolight
Sun, 11 Oct 2015
[ 22:52 marino ] Original commit   Revision:399108
399108 security/wpa_supplicant/Makefile
399108 security/wpa_supplicant/distinfo
399108 security/wpa_supplicant/files/patch-src_ap_wmm.c
399108 security/wpa_supplicant/files/patch-src_eap__peer_eap__pwd.c
399108 security/wpa_supplicant/files/patch-src_eap__server_eap__server__pwd.c
399108 security/wpa_supplicant/files/patch-src_p2p_p2p.c
399108 security/wpa_supplicant/files/patch-src_utils_os__unix.c
399108 security/wpa_supplicant/files/patch-src_wps_httpread.c
399108 security/wpa_supplicant/files/patch-src_wps_ndef.c
399108 security/wpa_supplicant/files/patch-wpa__supplicant_scan.c
security/wpa_supplicant: Upgrade version 2.4 => 2.5
Sun, 12 Jul 2015
[ 11:22 marino ] Original commit   Revision:391779
391779 security/wpa_supplicant/Makefile
391779 security/wpa_supplicant/files/patch-src_wps_ndef.c
security/wpa_supplicant: Address security issue (2015-5)

There was a vulnerability to the WPS_NFC option which is off by default.
The port is being bumped anyway since people using that option will want
the latest version.

PR:		201432
Submitted by:	Jason Unovitch
Tue, 2 Jun 2015
[ 09:35 marino ] Original commit   Revision:388312
388312 security/wpa_supplicant/Makefile
388312 security/wpa_supplicant/files/patch-src_ap_wmm.c
388312 security/wpa_supplicant/files/patch-src_eap__peer_eap__pwd.c
388312 security/wpa_supplicant/files/patch-src_eap__server_eap__server__pwd.c
388312 security/wpa_supplicant/files/patch-src_wps_httpread.c
security/wpa_supplicant: Address 3 latest security advisories

These are combined upstream patches 2015-2, 2015-3, 2015-4
They address the following security advisories:

  * CVE-2015-4141
  * CVE-2015-4142
  * CVE-2015-4143
  * CVE-2015-4144
  * CVE-2015-4145
  * CVE-2015-4146

These advisories also apply to net/hostapd

PR:		200568
Submitted by:	Jason Unovitch
Sat, 25 Apr 2015
[ 14:02 marino ] Original commit   Revision:384729
384729 security/wpa_supplicant/Makefile
security/wpa_supplicant: Add USES=CPE

I just released that I fixed a CVE bug but WPA Supllicant was never
provided any CPE information.  Fix, bump, and reference previous PR.

PR:		199678
[ 06:19 marino ] Original commit   Revision:384705
384705 security/wpa_supplicant/Makefile
384705 security/wpa_supplicant/files/patch-src_p2p_p2p.c
security/wpa_supplicant: Fix CVE-2015-1863

PR:		199678
Submitted by:	Jason Unovitch
Approved by:	maintainer (marino)
Mon, 16 Mar 2015
[ 20:45 marino ] Original commit   Revision:381444
381444 security/wpa_supplicant/Makefile
381444 security/wpa_supplicant/distinfo
381444 security/wpa_supplicant/files/patch-src-l2_packet-l2_packet_freebsd.c
381444 security/wpa_supplicant/files/patch-src_drivers_driver__bsd.c
381444 security/wpa_supplicant/files/patch-src_drivers_driver__ndis.c
381444 security/wpa_supplicant/files/patch-src_drivers_driver__privsep.c
381444 security/wpa_supplicant/files/patch-src_utils_os__unix.c
381444 security/wpa_supplicant/files/patch-src_wps_wps__upnp.c
381444 security/wpa_supplicant/files/patch-wpa__supplicant_Makefile
381444 security/wpa_supplicant/files/patch-wpa__supplicant_main.c

(Only the first 10 of 14 ports in this commit are shown above. View all ports for this commit)
security/wpa_supplicant: Upgrade version 2.3 => 2.4

See http://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog for list
of changes since version 2.3.
Sun, 19 Oct 2014
[ 09:33 marino ] Original commit   Revision:371174
371174 security/wpa_supplicant/Makefile
security/wpa_supplicant: Fix build on FreeBSD 11

On FreeBSD 11, the wpa_supplicant couldn't find the readline headers.
It turns out that Mk/Uses/readline.mk only augments LDFLAGS and CPPFLAGS,
but wpa_supplicant needs -I${LOCALBASE}/include add to CFLAGS.  To fix
FreeBSD build, augment CFLAGS with value of CPPFLAGS in the makefile.

This wasn't an issue on DragonFly.  Apparently wpa_supplicant found the
readline compatibility headers of libedit and used those instead.

reported by:	pkg-fallout
Mon, 13 Oct 2014
[ 13:49 marino ] Original commit   Revision:370776
370776 security/wpa_supplicant/Makefile
370776 security/wpa_supplicant/files/patch-src_drivers_driver__bsd.c
security/wpa_supplicant: Bring in BSD driver fix from DragonFly BSD

DragonFly adopted it's "new" IEEE 802.11 infrastructure from FreeBSD.
This introduced an additional isr_meshid_len field in the
ieee80211req_scan_result structure.  It is necessary to include this
additional offset when calculating the address of the IE data buffer.

Imre Vadasz introduced this fix to DragonFly on 01 Sept 2014, but a
similar fix doesn't appear to be present in FreeBSD's base wpa_supplicant.
[ 12:56 marino ] Original commit   Revision:370769
370769 security/wpa_supplicant/Makefile
370769 security/wpa_supplicant/files/patch-wpa__supplicant_main.c
370769 security/wpa_supplicant/files/patch-wpa__supplicant_wpa__supplicant.c
wpa/supplicant: Fix driver list with NDIS, take 2

It turns out the driver list was only showing "null" for NDIS when -h
(help) or an unknown switch was passed to wpa_supplicant.  The cause is
that the NDIS driver is the only that that has to be initialized, and
the initialization wasn't occurring in the above case.

The fix is the move the NDIS driver initialization before the command
switches are examined in case wpa_supplicant aborts to usage early.
[ 09:33 marino ] Original commit   Revision:370760
370760 security/wpa_supplicant/Makefile
370760 security/wpa_supplicant/files/patch-src_drivers_driver__ndis.c
370760 security/wpa_supplicant/files/patch-wpa__supplicant_Makefile
security/wpa_supplicant: Fix NDIS driver, privsep no longer default

The NDIS driver didn't build when privsep option was turned off.  Moveover,
it didn't display the driver name correctly, so I figured out a patch
based on base's ndis driver code.  Thirdly, when privsep option is turned
off, wpa_priv is not built, so let's handle that condition.

Finally, remove privsep from default options because it removes the
standard list of drivers and replaces it with privsep driver.
Sun, 12 Oct 2014
[ 21:20 marino ] Original commit   Revision:370742
370742 MOVED
370742 security/Makefile
370742 security/wpa_supplicant
370742 security/wpa_supplicant/Makefile
370742 security/wpa_supplicant/distinfo
370742 security/wpa_supplicant/files/Packet32.c
370742 security/wpa_supplicant/files/Packet32.h
370742 security/wpa_supplicant/files/config.bsd
370742 security/wpa_supplicant/files/ntddndis.h
370742 security/wpa_supplicant/files/patch-Makefile

(Only the first 10 of 22 ports in this commit are shown above. View all ports for this commit)
Revive security/wpa_supplicant after 6.5 years => version 2.3

This port was retired at version 0.3.8 because wpa_supplicant is
part of FreeBSD base.  However, the last few releases have had a period
of only a few months, so the base is always going to be behind.  DragonFly
is also affected, so I'm bringing the port back at the latest version.

It features the same patches as FreeBSD including the conversion to use
libutil's pidfile routines.  There are some additional patches for
DragonFly support and to fix some bugs from the 9 Oct 2014 release.

The WPA Supplicant build system has been converted to ports options, and
there are dozens of them.  I've set the defaults to match the
configuration in base and verified that it builds with all options
selected at once.
Fri, 25 Apr 2008
[ 23:21 pav ] Original commit 
1.1579 MOVED
1.955 security/Makefile
1.15 security/wpa_supplicant/Makefile
1.4 security/wpa_supplicant/distinfo
1.4 security/wpa_supplicant/files/config.bsd
1.2 security/wpa_supplicant/files/patch-Makefile
1.2 security/wpa_supplicant/files/patch-crypto.c
1.2 security/wpa_supplicant/files/patch-pidfile
1.2 security/wpa_supplicant/files/patch-wpa__ctrl.c
1.2 security/wpa_supplicant/pkg-descr
- Remove, it's ancient and newer version is included in base of all supported
  releases

Suggested by:   sam
Sat, 3 Feb 2007
[ 01:55 markus ] Original commit 
1.14 security/wpa_supplicant/Makefile
Utilize PORTDOCS
Thu, 14 Sep 2006
[ 17:37 brooks ] Original commit 
1.13 security/wpa_supplicant/Makefile
Drop maintainership.  I'm not really interested in this now that we've
got it in the base.
[ 17:37 brooks ] Original commit 
1.12 security/wpa_supplicant/Makefile
1.1 security/wpa_supplicant/files/patch-crypto.c
Fix build with openssl 0.9.8b.

PR:             ports/102822
Submitted by:   simon
Sun, 10 Sep 2006
[ 23:32 kris ] Original commit 
1.11 security/wpa_supplicant/Makefile
Change IGNORE to BROKEN in previous
[ 23:31 kris ] Original commit 
1.10 security/wpa_supplicant/Makefile
BROKEN on 7.x: Does not compile
Sat, 13 May 2006
[ 04:15 edwin ] Original commit 
1.10 science/2dhf/Makefile
1.5 science/abinit/Makefile
1.8 science/bblimage/Makefile
1.7 science/cdcl/Makefile
1.11 science/chemtool-devel/Makefile
1.3 science/dcl/Makefile
1.5 science/dft++/Makefile
1.11 science/euler/Makefile
1.37 science/felt/Makefile
1.20 science/gdis/Makefile

(Only the first 10 of 275 ports in this commit are shown above. View all ports for this commit)
Remove USE_REINPLACE from all categories starting with S
Fri, 27 May 2005
[ 01:10 brooks ] Original commit 
1.8 security/wpa_supplicant/Makefile
1.1 security/wpa_supplicant/files/patch-Makefile
Add a new variable WITH_STATIC_SUPPLICANT to cause wpa_supplicant to be
linked staticly.  This allows it to be used from devd at startup. [1]

Use LIB_DEPENDS instead of BUILD_DEPENDS for the libdnet depend since we
need it to run too. [2]

My changes differ from the submitted fixes.

Submitted by:   Darren Pilgrim <dmp at bitfreak dot org> [1]
                Pawel Worach <pawel dot worach at gmail dot com> [2]
Sat, 23 Apr 2005
[ 03:29 brooks ] Original commit 
1.7 security/wpa_supplicant/Makefile
1.1 security/wpa_supplicant/files/patch-wpa__ctrl.c
Fix wpa_cli.  You need to pass all of the sockaddr, not just part of it.
Also be sure to keep the path null terminated as Stevens does.

While I'm here, take maintainership since I use this and seem to be
making most of the recent commits.
Wed, 16 Feb 2005
[ 07:03 brooks ] Original commit 
1.6 security/wpa_supplicant/Makefile
1.2 security/wpa_supplicant/distinfo
1.3 security/wpa_supplicant/files/config.bsd
1.3 security/wpa_supplicant/files/patch-grp.h
1.1 security/wpa_supplicant/files/patch-pidfile
1.3 security/wpa_supplicant/files/patch-type
- Update to 0.3.8.  See ChangeLog for details.
- Install sample config file in etc/wpa_supplication.conf.sample instead
  of DOCSDIR.
- Obey PREFIX.
- Follow move of binaries from bin to sbin.

Committed from a laptop running this version against an AP with WPA-PSK
and AES encription.

Submitted by:   Yamamoto Shigeru <shigeru at iij dot ad dot jp>
PR:             75609 (by Rong-En Fan <rafan at infor dot org>)
Sat, 8 Jan 2005
[ 19:06 brooks ] Original commit 
1.5 security/wpa_supplicant/Makefile
1.2 security/wpa_supplicant/files/patch-grp.h
1.2 security/wpa_supplicant/files/patch-type
1.2 security/wpa_supplicant/pkg-plist
- Spell wpa_supplicant with two 'p's in PORTNAME
- Remove now unnecessicary DISTNAME
- Add net to CATEGORIES
- Ditch the pkg-plist file in favor of PLIST_FILES, there were only
  three lines in the plist
- Make the patch files relative to WRKSRC so we can drop PATCH_ARGS
- Install some documentation
- Bump PORTREVISION for new docs
Mon, 13 Dec 2004
[ 00:19 imp ] Original commit 
1.4 security/wpa_supplicant/Makefile
1.2 security/wpa_supplicant/files/config.bsd
1.1 security/wpa_supplicant/files/patch-grp.h
1.1 security/wpa_supplicant/files/patch-type
Add support for EAP.  It might not work only in 802.1x mode, but should
work in WPA+802.1x.

Submitted by: sam
Sun, 12 Dec 2004
[ 22:59 imp ] Original commit 
1.3 security/wpa_supplicant/Makefile
Fix grammatical error Kris pointed out.

Submitted by: kris
[ 22:41 imp ] Original commit 
1.2 security/wpa_supplicant/Makefile
wpa_supplicant is only for current.
[ 22:23 imp ] Original commit 
1.561 security/Makefile
1.1 security/wpa_supplicant/Makefile
1.1 security/wpa_supplicant/distinfo
1.1 security/wpa_supplicant/files/config.bsd
1.1 security/wpa_supplicant/pkg-descr
1.1 security/wpa_supplicant/pkg-plist
WPA supplicant daemon for 802.11 networks.

Submitted by: sam

Number of commits found: 54

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
gnutlsMar 31
postgresql10-serverMar 29
postgresql11-serverMar 29
postgresql12-serverMar 29
postgresql96-serverMar 29
gitlab-ceMar 26
rubygem-jsonMar 26
jenkinsMar 25
jenkins-ltsMar 25
phpmyadminMar 25
phpmyadmin5Mar 25
puppet6Mar 23
puppetdb5Mar 23
puppetdb6Mar 23
puppetserver5Mar 23

9 vulnerabilities affecting 78 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2020-03-31 16:53:36


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 38964
Broken 594
Deprecated 527
Ignore 865
Forbidden 5
Restricted 150
No CDROM 72
Vulnerable 23
Expired 2
Set to expire 501
Interactive 0
new 24 hours 11
new 48 hours15
new 7 days61
new fortnight86
new month164

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2020 Dan Langille. All rights reserved.