On 2023/10/03 21:48, Stuart Henderson wrote: > oops, rpath also needed, new diff
you'll also need this in the network={ ... } section of your config (openssl rejects TLSv1.0 by default but allows it to be reenabled) openssl_ciphers="DEFAULT@SECLEVEL=0" I was able to run eapol_test against a server reconfigured to permit 1.0 with the above, plus the following to disable newer TLS phase1="tls_disable_tlsv1_1=1 tls_disable_tlsv1_2=1 tls_disable_tlsv1_3=1" > Index: Makefile > =================================================================== > RCS file: /cvs/ports/security/wpa_supplicant/Makefile,v > retrieving revision 1.53 > diff -u -p -r1.53 Makefile > --- Makefile 27 Sep 2023 16:34:38 -0000 1.53 > +++ Makefile 3 Oct 2023 20:48:14 -0000 > @@ -1,7 +1,7 @@ > COMMENT= IEEE 802.1X supplicant > > DISTNAME= wpa_supplicant-2.9 > -REVISION= 2 > +REVISION= 3 > CATEGORIES= security net > > HOMEPAGE= https://w1.fi/wpa_supplicant/ > @@ -9,7 +9,7 @@ HOMEPAGE= https://w1.fi/wpa_supplicant/ > # BSD > PERMIT_PACKAGE= Yes > > -WANTLIB += c ssl crypto pcap pcsclite pthread > +WANTLIB += c pcap pcsclite pthread > > LIB_DEPENDS= security/pcsc-lite > > @@ -18,7 +18,24 @@ SITES= https://w1.fi/releases/ > USE_GMAKE= Yes > NO_TEST= Yes > MAKE_FLAGS= V=1 > -MAKE_ENV= CFLAGS="${CFLAGS}" CC="${CC}" > +MAKE_ENV= CC="${CC}" \ > + CFLAGS="${CFLAGS}" \ > + LIBS="-L${LOCALBASE}/lib ${LIBS}" > + > +FLAVORS= openssl > +FLAVOR?= > + > +CFLAGS+= -I${LOCALBASE}/include/PCSC > + > +.if ${FLAVOR:Mopenssl} > +LIB_DEPENDS += security/openssl/3.1 > +CFLAGS += -Wno-deprecated-declarations -I${LOCALBASE}/include/eopenssl31 > +LIBS += -Wl,-rpath ${LOCALBASE}/lib/eopenssl31 > -L${LOCALBASE}/lib/eopenssl31 > +# -lssl -lcrypto > +WANTLIB += lib/eopenssl31/crypto lib/eopenssl31/ssl > +.else > +WANTLIB += crypto ssl > +.endif > > WRKSRC= ${WRKDIST}/wpa_supplicant > >