Commit graph

22 commits

Author SHA1 Message Date
Joseph Mingrone
f453d7ba20 security/wpa_supplicant: Update to version 2.6 and patch for LibreSSL support
Port changes:
- Remove patches that have been incorporated upstream
- Add patches for LibreSSL support

Approved by:	AMDmi3 (mentor)
Differential Revision:	https://reviews.freebsd.org/D8451
2016-11-17 17:43:32 +00:00
John Marino
0c787a6633 security/wpa_supplicant: Add support for LibreSSL 2016-09-11 17:05:34 +00:00
John Marino
5c93ecbe9e security/wpa_supplicant: Add security patch set 2016-1
A vulnerability was found in how hostapd and wpa_supplicant writes the
configuration file update for the WPA/WPA2 passphrase parameter. If this
parameter has been updated to include control characters either through
a WPS operation (CVE-2016-4476) or through local configuration change
over the wpa_supplicant control interface (CVE-2016-4477), the resulting
configuration file may prevent the hostapd and wpa_supplicant from
starting when the updated file is used. In addition for wpa_supplicant,
it may be possible to load a local library file and execute code from
there with the same privileges under which the wpa_supplicant process
runs.

These patches were developed upstream and published as a response
to the security advisories CVE-2016-4476 and CVE-2016-4477.

PR:		209564
Requested by:	Sevan Janiyan
2016-05-19 21:12:07 +00:00
John Marino
1eb3369d7f security/wpa_supplicant: patch 4 CVE security advisories
These patches address the following:
  CVE-2015-5310
  CVE-2015-5314
  CVE-2015-5315
  CVE-2015-5316

These patches were developed upstream and published as a response
to the security advisories.

PR:		208482
Requested by:	Jason Unovitch
2016-04-18 21:05:28 +00:00
John Marino
16f7d87a0d security/wpa_supplicant: Upgrade version 2.4 => 2.5 2015-10-11 22:52:59 +00:00
John Marino
d856fd137b security/wpa_supplicant: Address security issue (2015-5)
There was a vulnerability to the WPS_NFC option which is off by default.
The port is being bumped anyway since people using that option will want
the latest version.

PR:		201432
Submitted by:	Jason Unovitch
2015-07-12 11:22:10 +00:00
John Marino
05d3374ae0 security/wpa_supplicant: Address 3 latest security advisories
These are combined upstream patches 2015-2, 2015-3, 2015-4
They address the following security advisories:

  * CVE-2015-4141
  * CVE-2015-4142
  * CVE-2015-4143
  * CVE-2015-4144
  * CVE-2015-4145
  * CVE-2015-4146

These advisories also apply to net/hostapd

PR:		200568
Submitted by:	Jason Unovitch
2015-06-02 09:35:23 +00:00
John Marino
87391ede60 security/wpa_supplicant: Fix CVE-2015-1863
PR:		199678
Submitted by:	Jason Unovitch
Approved by:	maintainer (marino)
2015-04-25 06:19:16 +00:00
John Marino
248bca32f4 security/wpa_supplicant: Upgrade version 2.3 => 2.4
See http://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog for list
of changes since version 2.3.
2015-03-16 20:45:16 +00:00
John Marino
30c09442dd security/wpa_supplicant: Fix mis-information in pkg-message 2014-10-13 19:34:48 +00:00
John Marino
61f267d59a security/wpa_supplicant: Bring in BSD driver fix from DragonFly BSD
DragonFly adopted it's "new" IEEE 802.11 infrastructure from FreeBSD.
This introduced an additional isr_meshid_len field in the
ieee80211req_scan_result structure.  It is necessary to include this
additional offset when calculating the address of the IE data buffer.

Imre Vadasz introduced this fix to DragonFly on 01 Sept 2014, but a
similar fix doesn't appear to be present in FreeBSD's base wpa_supplicant.
2014-10-13 13:49:55 +00:00
John Marino
51b8291f38 wpa/supplicant: Fix driver list with NDIS, take 2
It turns out the driver list was only showing "null" for NDIS when -h
(help) or an unknown switch was passed to wpa_supplicant.  The cause is
that the NDIS driver is the only that that has to be initialized, and
the initialization wasn't occurring in the above case.

The fix is the move the NDIS driver initialization before the command
switches are examined in case wpa_supplicant aborts to usage early.
2014-10-13 12:56:04 +00:00
John Marino
ae5f2c59ae security/wpa_supplicant: Fix NDIS driver, privsep no longer default
The NDIS driver didn't build when privsep option was turned off.  Moveover,
it didn't display the driver name correctly, so I figured out a patch
based on base's ndis driver code.  Thirdly, when privsep option is turned
off, wpa_priv is not built, so let's handle that condition.

Finally, remove privsep from default options because it removes the
standard list of drivers and replaces it with privsep driver.
2014-10-13 09:33:07 +00:00
John Marino
0d6daefa09 Revive security/wpa_supplicant after 6.5 years => version 2.3
This port was retired at version 0.3.8 because wpa_supplicant is
part of FreeBSD base.  However, the last few releases have had a period
of only a few months, so the base is always going to be behind.  DragonFly
is also affected, so I'm bringing the port back at the latest version.

It features the same patches as FreeBSD including the conversion to use
libutil's pidfile routines.  There are some additional patches for
DragonFly support and to fix some bugs from the 9 Oct 2014 release.

The WPA Supplicant build system has been converted to ports options, and
there are dozens of them.  I've set the defaults to match the
configuration in base and verified that it builds with all options
selected at once.
2014-10-12 21:20:25 +00:00
Pav Lucistnik
caab36701d - Remove, it's ancient and newer version is included in base of all supported
releases

Suggested by:	sam
2008-04-25 23:21:09 +00:00
Brooks Davis
6c9ac20960 Fix build with openssl 0.9.8b.
PR:		ports/102822
Submitted by:	simon
2006-09-14 17:37:05 +00:00
Brooks Davis
2ebcb8acaa Add a new variable WITH_STATIC_SUPPLICANT to cause wpa_supplicant to be
linked staticly.  This allows it to be used from devd at startup. [1]

Use LIB_DEPENDS instead of BUILD_DEPENDS for the libdnet depend since we
need it to run too. [2]

My changes differ from the submitted fixes.

Submitted by:	Darren Pilgrim <dmp at bitfreak dot org> [1]
		Pawel Worach <pawel dot worach at gmail dot com> [2]
2005-05-27 01:10:30 +00:00
Brooks Davis
ed96a0df08 Fix wpa_cli. You need to pass all of the sockaddr, not just part of it.
Also be sure to keep the path null terminated as Stevens does.

While I'm here, take maintainership since I use this and seem to be
making most of the recent commits.
2005-04-23 03:29:45 +00:00
Brooks Davis
b5da416890 - Update to 0.3.8. See ChangeLog for details.
- Install sample config file in etc/wpa_supplication.conf.sample instead
  of DOCSDIR.
- Obey PREFIX.
- Follow move of binaries from bin to sbin.

Committed from a laptop running this version against an AP with WPA-PSK
and AES encription.

Submitted by:	Yamamoto Shigeru <shigeru at iij dot ad dot jp>
PR:		75609 (by Rong-En Fan <rafan at infor dot org>)
2005-02-16 07:03:32 +00:00
Brooks Davis
e6d51c6e46 - Spell wpa_supplicant with two 'p's in PORTNAME
- Remove now unnecessicary DISTNAME
- Add net to CATEGORIES
- Ditch the pkg-plist file in favor of PLIST_FILES, there were only
  three lines in the plist
- Make the patch files relative to WRKSRC so we can drop PATCH_ARGS
- Install some documentation
- Bump PORTREVISION for new docs
2005-01-08 19:06:48 +00:00
Warner Losh
9b7bf58ffa Add support for EAP. It might not work only in 802.1x mode, but should
work in WPA+802.1x.

Submitted by: sam
2004-12-13 00:19:20 +00:00
Warner Losh
ab14a52078 WPA supplicant daemon for 802.11 networks.
Submitted by: sam
2004-12-12 22:23:07 +00:00