aboutsummaryrefslogtreecommitdiff
path: root/security/wpa_supplicant-devel
Commit message (Collapse)AuthorAgeFilesLines
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2023-09-262-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: wpa: Enable receiving priority tagged (VID 0) ↵R. Christian McDonald2023-09-122-3/+29
| | | | | | | | | | | | | | | | | | | | | frames Certain internet service providers transmit vlan 0 priority tagged EAPOL frames from the ONT towards the residential gateway. VID 0 should be ignored, and the frame processed according to the priority set in the 802.1P bits and the encapsulated EtherType (i.e. EAPOL). The pcap filter utilized by l2_packet is inadquate for this use case. Here we modify the pcap filter to accept both unencapsulated and encapsulated (with VLAN 0) EAPOL EtherTypes. This preserves the original filter behavior while also matching on encapsulated EAPOL. Sponsored by: Rubicon Communications, LLC ("Netgate") Reviewed by: cy Obtained from: src bb5d6d14d81b PR: 273696 MFH: 2023Q3
* security/wpa_supplicant-devel: Fix uninitialized packet pointer on errorCy Schubert2023-09-122-4/+26
| | | | | | | | | | | | | | | | | The packet pointer (called packet) will remain uninitialized when pcap_next_ex() returns an error. This occurs when the wlan interface is shut down using ifconfig destroy. Adding a NULL assignment to packet duplicates what pcap_next() does. The reason we use pcap_next_ex() in this instance is because with pacp_next() when we receive a null pointer if there was an error or if no packets were read. With pcap_next_ex() we can differentiate between an error and legitimately no packets were received. PR: 270649, 273696 Obtained from: src 953efa5b200f Reported by: Robert Morris <rtm@lcs.mit.edu> MFH: 2023Q3
* security/wpa_supplicant-devel: Reapply c586ac04eb66Cy Schubert2023-09-122-3/+15
| | | | | | | | | | | | | | | | | | | | | Reapply "Fix 100% CPU when USB wlan NIC removed." hostapd calls pcap_next(3) to read the next packet off the wlan interface. pcap_next() returns a pointer to the packet header but does not indicate success or failure. Unfortunately this results in an infinite loop (100% CPU) when the wlan device disappears, i.e. when a USB wlan device is manually removed or a USB error results in the device removal. However pcap_next_ex(3) does return success or failure. To resolve this we use pcap_next_ex(), forcing hostapd to exit when the error is encountered. An error message is printed to syslog or stderr when debugging (-d flag) is enabled. Unfortunately wpa_printf() only works when debugging is enabled. PR: 253608, 273696 Obtained from: src 6e5d01124fd4 Reported by: Damjan Jovanovic <damjan.jov@gmail.com>, bz (privately) MFH: 2023Q3
* security/wpa_supplicant-devel: driver_bsd.c: backout upstream IFF_ change ↵Cy Schubert2023-09-122-10/+123
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | and add logging This reverts the state to our old supplicant logic setting or clearing IFF_UP if needed. In addition this adds logging for the cases in which we do (not) change the interface state. Depending on testing this seems to help bringing WiFi up or not log any needed changes (which would be the expected wpa_supplicant logic now). People should look out for ``(changed)`` log entries (at least if debugging the issue; this way we will at least have data points). There is a hypothesis still pondered that the entire IFF_UP toggling only exploits a race in net80211 (see further discssussions for more debugging and alternative solutions see D38508 and D38753). That may also explain why the changes to the rc startup script [1] only helped partially for some people to no longer see the continuous CTRL-EVENT-SCAN-FAILED. It is highly likely that we will want further changes and until we know for sure that people are seeing ''(changed)'' events this should stay local. Should we need to upstream this we'll likely need #ifdef __FreeBSD__ around this code. PR: 273696 Obtained from: src bfb202c4554a MFH: 2023Q3
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2023-09-052-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2023-08-282-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2023-07-312-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2023-06-282-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Fix for OpenSSL 3.0Cy Schubert2023-06-281-0/+1
|
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2023-06-062-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2023-05-312-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2023-05-082-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2023-05-022-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2023-04-172-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2023-04-012-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2023-03-182-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2023-02-212-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2023-02-152-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2023-01-172-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2023-01-032-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2022-12-192-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2022-11-182-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2022-10-172-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2022-10-112-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2022-10-022-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2022-09-112-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* Remove WWW entries moved into port MakefilesStefan Eßer2022-09-071-2/+0
| | | | | | | | | | Commit b7f05445c00f has added WWW entries to port Makefiles based on WWW: lines in pkg-descr files. This commit removes the WWW: lines of moved-over URLs from these pkg-descr files. Approved by: portmgr (tcberner)
* Add WWW entries to port MakefilesStefan Eßer2022-09-071-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | It has been common practice to have one or more URLs at the end of the ports' pkg-descr files, one per line and prefixed with "WWW:". These URLs should point at a project website or other relevant resources. Access to these URLs required processing of the pkg-descr files, and they have often become stale over time. If more than one such URL was present in a pkg-descr file, only the first one was tarnsfered into the port INDEX, but for many ports only the last line did contain the port specific URL to further information. There have been several proposals to make a project URL available as a macro in the ports' Makefiles, over time. This commit implements such a proposal and moves one of the WWW: entries of each pkg-descr file into the respective port's Makefile. A heuristic attempts to identify the most relevant URL in case there is more than one WWW: entry in some pkg-descr file. URLs that are not moved into the Makefile are prefixed with "See also:" instead of "WWW:" in the pkg-descr files in order to preserve them. There are 1256 ports that had no WWW: entries in pkg-descr files. These ports will not be touched in this commit. The portlint port has been adjusted to expect a WWW entry in each port Makefile, and to flag any remaining "WWW:" lines in pkg-descr files as deprecated. Approved by: portmgr (tcberner)
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2022-08-282-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2022-07-182-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2022-07-032-6/+5
| | | | | | Update to the latest w1.fi commit, proxied through my GH account. MFH: 2022Q3
* security/wpa_supplicant-devel: Enable WEP by defaultCy Schubert2022-07-031-4/+5
| | | | | | | | | As of hostap 2.10, WEP is disabled by default. This of course is not a bad thing but requires some planning and an announcment to remove WEP support by default. At some point this option will default to off, to coincide with the removal of WEP support from FreeBSD base. MFH: 2022Q3
* wpa_supplicant* hostapd*: Resolve secondary VAP association issueJ.R. Oldroyd2022-07-032-12/+98
| | | | | | | | | | | | | | | | | | | | | Association will fail on a secondary open unprotected VAP when the primary VAP is configured for WPA. Examples of secondary VAPs are, hotels, universities, and commodity routers' guest networks. A broadly similar bug was discussed on Red Hat's bugzilla affecting association to a D-Link DIR-842. This suggests that as IEs were added to the 802.11 protocol the old code was increasingly inadaquate to handle the additional IEs, not only a secondary VAP. This duplcates src commit 775611ea11db here in ports. PR: 264238 Reported by: Jaskie <jiangjun12321@gmail.com> "J.R. Oldroyd" <fbsd@opal.com> Submitted by: "J.R. Oldroyd" <fbsd@opal.com> MFH: 2022Q3
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2022-06-212-6/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* */*: Restore a missing wpa BSD driver patchCy Schubert2022-06-202-3/+64
| | | | | | | | | | These patches were removed to sync with base where in fact base was missing these patches and base should have been synced with the ports. PR: 264238 Fixes: b8477825c2dc42f6c595697a36f593c71f39fbad c86f32d652eb9dd023049122d8ca37cb13ed07b6 MFH: 2022Q2
* */*: Restore non-IBSS part of wpa patchesCy Schubert2022-06-092-1/+24
| | | | | | | | b8477825c2dc42f6c595697a36f593c71f39fbad removed some non-IBSS patches. Restore them. We only want to remove the patches that make IBSS use ADHOC mode. Fixes: b8477825c2dc42f6c595697a36f593c71f39fbad
* */*: FreeBSD's WPA does support IBSS modeCy Schubert2022-06-092-39/+1
| | | | | FreeBSD's WPA does support IBSS mode. Remove the hack that forces ADHOC mode when IBSS is requested.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2022-05-272-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2022-05-192-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2022-05-092-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2022-04-253-20/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* */{wpa_supplicant*,hostapd*}: Fix wpa 100% CPU when USB wlan NIC removedCy Schubert2022-04-162-5/+8
| | | | | | | | | | | | | | | | | | hostapd calls pcap_next(3) to read the next packet off the wlan interface. pcap_next() returns a pointer to the packet header but does not indicate success or failure. Unfortunately this results in an infinite loop (100% CPU) when the wlan device disappears, i.e. when a USB wlan device is manually removed or a USB error results in the device removal. However pcap_next_ex(3) does return success or failure. To resolve this we use pcap_next_ex(), forcing hostapd to exit when the error is encountered. An error message is printed to syslog or stderr when debugging (-d flag) is enabled. Unfortunately wpa_printf() only works when debugging is enabled. PR: 253608 Reported by: Damjan Jovanovic <damjan.jov@gmail.com>, bz (privately) MFH: 2022Q2
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2022-03-142-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2022-03-072-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* */*: Fix wpa_supplicant* and hostapd* EAPOL_TEST buildCy Schubert2022-01-311-17/+0
| | | | | | | | | Fix EAPOL_TEST build. Local funcion os_fdatasync() is valid under FreeBSD as fdatasync(2) is supported. PR: 261636 Reported by: David Siebörger <drs-freebsd@sieborger.nom.za> MFH: 2022Q1
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2022-01-172-5/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2022-01-042-6/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* security/wpa_supplicant-devel: Update to latest GH commitCy Schubert2021-11-294-31/+5
| | | | Update to the latest w1.fi commit, proxied through my GH account.
* cleanup: drop support for EOL FreeBSD 11.XRene Ladan2021-09-301-2/+0
| | | | | | | | | | | | | | | | | Search criteria used: - 11.4 - OSREL* - OSVER* - *_FreeBSD_11 Input from: - adridg: devel/qca-legacy - jbeich: _WITH_DPRINTF, _WITH_GETLINE, GNU bfd workarounds - sunpoet: security/p5-*OpenSSL* Reviewed by: doceng, kde, multimedia, perl, python, ruby, rust Differential Revision: https://reviews.freebsd.org/D32008 Test Plan: make index