Port details on branch 2022Q2 |
- wpa_supplicant-devel Supplicant (client) for WPA/802.1x protocols
- 2022.05.24_3 security =0 2022.05.24_3Version of this port present on the latest quarterly branch.
- Maintainer: cy@FreeBSD.org
- Port Added: 2022-06-20 15:15:54
- Last Update: 2022-06-20 15:12:01
- Commit Hash: 52efc76
- Also Listed In: net
- License: BSD3CLAUSE
- WWW:
- http://w1.fi/wpa_supplicant/
- Description:
- wpa_supplicant is a client (supplicant) with support for WPA and WPA2
(IEEE 802.11i / RSN). It is suitable for both desktop/laptop computers and
embedded systems. Supplicant is the IEEE 802.1X/WPA component that is used
in the client stations. It implements key negotiation with a WPA
Authenticator and it controls the roaming and IEEE 802.11 authentication/
association of the wlan driver.
wpa_supplicant is designed to be a "daemon" program that runs in the
background and acts as the backend component controlling the wireless
connection. wpa_supplicant supports separate frontend programs and a
text-based frontend (wpa_cli) and a GUI (wpa_gui) are included with
wpa_supplicant.
WWW: http://w1.fi/wpa_supplicant/
- ¦ ¦ ¦ ¦
- Manual pages:
- FreshPorts has no man page information for this port.
- pkg-plist: as obtained via:
make generate-plist - Dependency lines:
-
- wpa_supplicant-devel>0:security/wpa_supplicant-devel
- To install the port:
- cd /usr/ports/security/wpa_supplicant-devel/ && make install clean
- To add the package, run one of these commands:
- pkg install security/wpa_supplicant-devel
- pkg install wpa_supplicant-devel
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.- PKGNAME: wpa_supplicant-devel
- Flavors: there is no flavor information for this port.
- distinfo:
- TIMESTAMP = 1653658990
SHA256 (cschuber-hostap-2022.05.24-1004fb7ee_GH0.tar.gz) = 7339ce4eecbe425f13a2de78b7e1f1bc86ea141f1c3f538ededb4484c8392902
SIZE (cschuber-hostap-2022.05.24-1004fb7ee_GH0.tar.gz) = 4901428
Packages (timestamps in pop-ups are UTC):
- Dependencies
- NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
- Build dependencies:
-
- gmake>=4.3 : devel/gmake
- pkgconf>=1.3.0_1 : devel/pkgconf
- Library dependencies:
-
- libreadline.so.8 : devel/readline
- libdbus-1.so : devel/dbus
- There are no ports dependent upon this port
Configuration Options:
- ===> The following configuration options are available for wpa_supplicant-devel-2022.05.24_3:
DBUS=on: D-Bus IPC system support
DEBUG_FILE=off: Support for writing debug log to a file
DEBUG_SYSLOG=on: Send debug messages to syslog instead of stdout
DELAYED_MIC=off: Mitigate TKIP attack, random delay on MIC errors
DOCS=on: Build and/or install documentation
EAPOL_TEST=off: Development testing
HS20=on: Hotspot 2.0
HT_OVERRIDES=off: Disable HT/HT40, mask MCS rates, etc
IEEE80211AC=off: Very High Throughput, AP mode (IEEE 802.11ac)
IEEE80211N=off: High Throughput, AP mode (IEEE 802.11n)
IEEE80211R=on: Fast BSS Transition (IEEE 802.11r-2008)
IEEE80211W=on: Management Frame Protection (IEEE 802.11w)
IEEE8021X_EAPOL=on: EAP over LAN support
INTERWORKING=on: Improve ext. network interworking (IEEE 802.11u)
MATCH=on: Interface match mode
MBO=on: Multi Band Operation (Enables WNM)
NO_ROAMING=off: Disable roaming
P2P=off: Peer-to-Peer support
PASN=off: PASN support
PKCS12=on: PKCS#12 (PFS) support
PRIVSEP=off: Privilege separation
RSN_PREAUTH=on
SIM_SIMULATOR=off: SIM simulator (Milenage) for EAP-SIM
SMARTCARD=on: Private key on smartcard support
TDLS=off: Tunneled Direct Link Setup
TLSV12=off: Build with TLS v1.2 instead of TLS v1.0
USIM_SIMULATOR=off: SIM simulator (Milenage) for EAP-AKA
VHT_OVERRIDES=off: Disable VHT, mask MCS rates, etc
WNM=on: Wireless Network Monitoring
WPS=on: Wi-Fi Protected Setup
WPS_ER=on: Enable WPS External Registrar
WPS_NFC=on: Near Field Communication (NFC) configuration
WPS_NOREG=off: Disable open network credentials when registrar
WPS_UPNP=on: Universal Plug and Play support
====> Driver options: you have to choose at least one of them
BSD=on: BSD net80211 interface
WIRED=on: Wired ethernet interface
NDIS=off: Windows NDIS interface
TEST=off: Development testing interface
NONE=off: The 'no driver' interface, e.g. WPS ER only
====> Extensible Authentication Protocols: you have to choose at least one of them
TLS=on: Transport Layer Security
PEAP=on: Protected Extensible Authentication Protocol
TTLS=on: Tunneled Transport Layer Security
MD5=on: MD5 hash (deprecated, no key generation)
MSCHAPV2=on: Microsoft CHAP version 2 (RFC 2759)
GTC=on: Generic Token Card
LEAP=on: Lightweight Extensible Authentication Protocol
OTP=on: One-Time Password
PSK=on: Pre-Shared key
FAST=on: Flexible Authentication via Secure Tunneling
SIM=off: Subscriber Identity Module
PWD=on: Shared password (RFC 5931)
PAX=on: Password Authenticated Exchange
AKA=off: Autentication and Key Agreement (UMTS)
AKA_PRIME=off: AKA Prime variant (RFC 5448)
SAKE=on: Shared-Secret Authentication & Key Establishment
GPSK=on: Generalized Pre-Shared Key
TNC=on: Trusted Network Connect
IKEV2=on: Internet Key Exchange version 2
EKE=on: Encrypted Key Exchange
===> Use 'make config' to modify these settings
- Options name:
- security_wpa_supplicant-devel
- USES:
- cpe gmake pkgconfig:build readline ssl
- pkg-message:
- For install:
- To use the ports version of WPA Supplicant instead of the base, add:
wpa_supplicant_program="/usr/local/sbin/wpa_supplicant"
to /etc/rc.conf
- Master Sites:
|
Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
2022.05.24_3 20 Jun 2022 15:12:01 |
Cy Schubert (cy) |
*/*: Restore a missing wpa BSD driver patch
These patches were removed to sync with base where in fact base was
missing these patches and base should have been synced with the ports.
PR: 264238
Fixes: b8477825c2dc42f6c595697a36f593c71f39fbad
c86f32d652eb9dd023049122d8ca37cb13ed07b6
MFH: 2022Q2
(cherry picked from commit 05a849eec9d949b3de32e464570cefbabcd64702) |
2022.05.24_2 20 Jun 2022 15:12:00 |
Cy Schubert (cy) |
*/*: Restore non-IBSS part of wpa patches
b8477825c2dc42f6c595697a36f593c71f39fbad removed some non-IBSS patches.
Restore them. We only want to remove the patches that make IBSS use
ADHOC mode.
Fixes: b8477825c2dc42f6c595697a36f593c71f39fbad
(cherry picked from commit c86f32d652eb9dd023049122d8ca37cb13ed07b6) |
2022.05.24_1 20 Jun 2022 15:12:00 |
Cy Schubert (cy) |
*/*: FreeBSD's WPA does support IBSS mode
FreeBSD's WPA does support IBSS mode. Remove the hack that forces ADHOC
mode when IBSS is requested.
(cherry picked from commit b8477825c2dc42f6c595697a36f593c71f39fbad) |
2022.05.24 20 Jun 2022 15:12:00 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account.
(cherry picked from commit 9f3f41a2d27b2018068b9d4c54502a55a8cd343a) |
2022.05.19 20 Jun 2022 15:11:58 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account.
(cherry picked from commit 033186cbc065e7a4d2a0d685af288090aa9d9e5d) |
2022.05.08 20 Jun 2022 15:11:58 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account.
(cherry picked from commit e22465db8b6a49e1e0c2754645a036e3cc7de4bc) |
2022.04.24 20 Jun 2022 15:11:57 |
Cy Schubert (cy) |
security/wpa_supplicant-devel: Update to latest GH commit
Update to the latest w1.fi commit, proxied through my GH account.
(cherry picked from commit 023d2c907b347af4d4a3f58b9428ed333c9a2474) |
2022.03.14_1 20 Jun 2022 15:11:56 |
Cy Schubert (cy) |
*/{wpa_supplicant*,hostapd*}: Fix wpa 100% CPU when USB wlan NIC removed
hostapd calls pcap_next(3) to read the next packet off the wlan interface.
pcap_next() returns a pointer to the packet header but does not indicate
success or failure. Unfortunately this results in an infinite loop (100%
CPU) when the wlan device disappears, i.e. when a USB wlan device is
manually removed or a USB error results in the device removal. However
pcap_next_ex(3) does return success or failure. To resolve this we use
pcap_next_ex(), forcing hostapd to exit when the error is encountered.
An error message is printed to syslog or stderr when debugging (-d flag)
is enabled. Unfortunately wpa_printf() only works when debugging is enabled.
PR: 253608
Reported by: Damjan Jovanovic <damjan.jov@gmail.com>,
bz (privately)
MFH: 2022Q2
(cherry picked from commit c586ac04eb662dea00ab81b226fa3e41a5110b21) |