On 2023/10/03 21:48, Stuart Henderson wrote:
> oops, rpath also needed, new diff

you'll also need this in the network={ ... } section of your config
(openssl rejects TLSv1.0 by default but allows it to be reenabled)

        openssl_ciphers="DEFAULT@SECLEVEL=0"

I was able to run eapol_test against a server reconfigured to permit
1.0 with the above, plus the following to disable newer TLS

        phase1="tls_disable_tlsv1_1=1 tls_disable_tlsv1_2=1 
tls_disable_tlsv1_3=1"

> Index: Makefile
> ===================================================================
> RCS file: /cvs/ports/security/wpa_supplicant/Makefile,v
> retrieving revision 1.53
> diff -u -p -r1.53 Makefile
> --- Makefile  27 Sep 2023 16:34:38 -0000      1.53
> +++ Makefile  3 Oct 2023 20:48:14 -0000
> @@ -1,7 +1,7 @@
>  COMMENT=     IEEE 802.1X supplicant
>  
>  DISTNAME=    wpa_supplicant-2.9
> -REVISION=    2
> +REVISION=    3
>  CATEGORIES=  security net
>  
>  HOMEPAGE=    https://w1.fi/wpa_supplicant/
> @@ -9,7 +9,7 @@ HOMEPAGE=     https://w1.fi/wpa_supplicant/
>  # BSD
>  PERMIT_PACKAGE=      Yes
>  
> -WANTLIB += c ssl crypto pcap pcsclite pthread
> +WANTLIB += c pcap pcsclite pthread
>  
>  LIB_DEPENDS= security/pcsc-lite
>  
> @@ -18,7 +18,24 @@ SITES=             https://w1.fi/releases/
>  USE_GMAKE=   Yes
>  NO_TEST=     Yes
>  MAKE_FLAGS=  V=1
> -MAKE_ENV=    CFLAGS="${CFLAGS}" CC="${CC}"
> +MAKE_ENV=    CC="${CC}" \
> +             CFLAGS="${CFLAGS}" \
> +             LIBS="-L${LOCALBASE}/lib ${LIBS}"
> +
> +FLAVORS=     openssl
> +FLAVOR?=
> +
> +CFLAGS+=     -I${LOCALBASE}/include/PCSC
> +
> +.if ${FLAVOR:Mopenssl}
> +LIB_DEPENDS +=       security/openssl/3.1
> +CFLAGS +=    -Wno-deprecated-declarations -I${LOCALBASE}/include/eopenssl31
> +LIBS +=              -Wl,-rpath ${LOCALBASE}/lib/eopenssl31 
> -L${LOCALBASE}/lib/eopenssl31
> +# -lssl -lcrypto
> +WANTLIB +=   lib/eopenssl31/crypto lib/eopenssl31/ssl
> +.else
> +WANTLIB +=   crypto ssl
> +.endif
>  
>  WRKSRC=              ${WRKDIST}/wpa_supplicant
>  
> 

Reply via email to