Hi!

Here's an update to wpa_supplicant-2.3.

Please test as usual (eduroam, etc.)

Works for me with wired 802.1x

Cheers,
David

Index: Makefile
===================================================================
RCS file: /cvs/ports/security/wpa_supplicant/Makefile,v
retrieving revision 1.22
diff -u -p -u -p -r1.22 Makefile
--- Makefile    30 Sep 2014 07:18:48 -0000      1.22
+++ Makefile    10 Oct 2014 09:05:54 -0000
@@ -2,8 +2,7 @@
 
 COMMENT=       IEEE 802.1X supplicant
 
-DISTNAME=      wpa_supplicant-2.2
-REVISION=      2
+DISTNAME=      wpa_supplicant-2.3
 CATEGORIES=    security net
 
 HOMEPAGE=      http://hostap.epitest.fi/wpa_supplicant/
Index: distinfo
===================================================================
RCS file: /cvs/ports/security/wpa_supplicant/distinfo,v
retrieving revision 1.5
diff -u -p -u -p -r1.5 distinfo
--- distinfo    2 Sep 2014 13:04:34 -0000       1.5
+++ distinfo    10 Oct 2014 09:05:54 -0000
@@ -1,2 +1,2 @@
-SHA256 (wpa_supplicant-2.2.tar.gz) = 
4Ni4/WimWWNuq6JGuyyqy/U9ItU7K2uQ60tP7wmTyO0=
-SIZE (wpa_supplicant-2.2.tar.gz) = 2382570
+SHA256 (wpa_supplicant-2.3.tar.gz) = 
6qpb8wVScOUhst/2Ty0gPsgED3GVi4WIJpqCwAyde2o=
+SIZE (wpa_supplicant-2.3.tar.gz) = 2398722
Index: patches/patch-src_rsn_supp_wpa_c
===================================================================
RCS file: patches/patch-src_rsn_supp_wpa_c
diff -N patches/patch-src_rsn_supp_wpa_c
--- patches/patch-src_rsn_supp_wpa_c    5 Sep 2014 13:18:41 -0000       1.1
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,29 +0,0 @@
-$OpenBSD: patch-src_rsn_supp_wpa_c,v 1.1 2014/09/05 13:18:41 dcoppa Exp $
-
-commit b7c61c9d4e968e7254112631a9f6a1a1f8ef6f7f
-Author: Jouni Malinen <j...@w1.fi>
-Date:   Sat Jun 14 00:20:04 2014 +0300
-
-Fix validation of EAPOL-Key length with AES key wrap
-
-The additional eight octet field was removed from keydatalen without
-proper validation of the Key Data Length field. It would have been
-possible for an invalid EAPOL-Key frame to be processed in a way that
-ends up reading beyond the buffer. In theory, this could have also
-resulted in writing beyond the EAPOL-Key frame buffer, but that is
-unlikely to be feasible due to the AES key wrap validation step on
-arbitrary memory contents.
-
-Signed-off-by: Jouni Malinen <j...@w1.fi>
-
---- src/rsn_supp/wpa.c.orig    Wed Jun  4 15:26:14 2014
-+++ src/rsn_supp/wpa.c Fri Sep  5 14:33:27 2014
-@@ -1501,7 +1501,7 @@ static int wpa_supplicant_decrypt_key_data(struct wpa_
-                  ver == WPA_KEY_INFO_TYPE_AES_128_CMAC ||
-                  sm->key_mgmt == WPA_KEY_MGMT_OSEN) {
-               u8 *buf;
--              if (keydatalen % 8) {
-+              if (keydatalen < 8 || keydatalen % 8) {
-                       wpa_msg(sm->ctx->msg_ctx, MSG_WARNING,
-                               "WPA: Unsupported AES-WRAP len %d",
-                               keydatalen);
Index: patches/patch-src_utils_common_c
===================================================================
RCS file: patches/patch-src_utils_common_c
diff -N patches/patch-src_utils_common_c
--- patches/patch-src_utils_common_c    30 Sep 2014 07:18:48 -0000      1.3
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,31 +0,0 @@
-$OpenBSD: patch-src_utils_common_c,v 1.3 2014/09/30 07:18:48 dcoppa Exp $
-
-commit a8833b84f46626b6fb9e9f277137f26acc72c64e
-Author: Bernhard Walle <bernh...@bwalle.de>
-Date:   Tue Sep 16 21:20:47 2014 +0200
-
-util: Don't use "\e"
-
-'\e' representing ESC (0x1b) is not C standard, it's an GNU extension.
-https://gcc.gnu.org/onlinedocs/gcc/Character-Escapes.html#Character-Escapes
-
---- src/utils/common.c.orig    Wed Jun  4 15:26:14 2014
-+++ src/utils/common.c Mon Sep 29 16:58:59 2014
-@@ -362,7 +362,7 @@ void printf_encode(char *txt, size_t maxlen, const u8 
-                       *txt++ = '\\';
-                       *txt++ = '\\';
-                       break;
--              case '\e':
-+              case '\033':
-                       *txt++ = '\\';
-                       *txt++ = 'e';
-                       break;
-@@ -427,7 +427,7 @@ size_t printf_decode(u8 *buf, size_t maxlen, const cha
-                               pos++;
-                               break;
-                       case 'e':
--                              buf[len++] = '\e';
-+                              buf[len++] = '\033';
-                               pos++;
-                               break;
-                       case 'x':
Index: patches/patch-wpa_supplicant_Makefile
===================================================================
RCS file: 
/cvs/ports/security/wpa_supplicant/patches/patch-wpa_supplicant_Makefile,v
retrieving revision 1.3
diff -u -p -u -p -r1.3 patch-wpa_supplicant_Makefile
--- patches/patch-wpa_supplicant_Makefile       23 Mar 2014 20:02:14 -0000      
1.3
+++ patches/patch-wpa_supplicant_Makefile       10 Oct 2014 09:05:54 -0000
@@ -1,6 +1,6 @@
 $OpenBSD: patch-wpa_supplicant_Makefile,v 1.3 2014/03/23 20:02:14 kili Exp $
---- wpa_supplicant/Makefile.orig       Tue Feb  4 12:23:35 2014
-+++ wpa_supplicant/Makefile    Sun Mar 23 19:45:14 2014
+--- wpa_supplicant/Makefile.orig       Thu Oct  9 16:41:31 2014
++++ wpa_supplicant/Makefile    Fri Oct 10 11:02:04 2014
 @@ -56,7 +56,7 @@ mkconfig:
        echo CONFIG_DRIVER_WEXT=y >> .config
  
@@ -10,17 +10,27 @@ $OpenBSD: patch-wpa_supplicant_Makefile,
  
  install: $(addprefix $(DESTDIR)$(BINDIR)/,$(BINALL))
        $(MAKE) -C ../src install
-@@ -118,13 +118,6 @@ CONFIG_ELOOP=eloop
- endif
+@@ -119,13 +119,6 @@ endif
  OBJS += ../src/utils/$(CONFIG_ELOOP).o
  OBJS_c += ../src/utils/$(CONFIG_ELOOP).o
--
+ 
 -ifeq ($(CONFIG_ELOOP), eloop)
 -# Using glibc < 2.17 requires -lrt for clock_gettime()
 -LIBS += -lrt
 -LIBS_c += -lrt
 -LIBS_p += -lrt
 -endif
- 
+-
  ifdef CONFIG_ELOOP_POLL
  CFLAGS += -DCONFIG_ELOOP_POLL
+ endif
+@@ -1391,9 +1384,7 @@ OBJS += sme.o
+ CFLAGS += -DCONFIG_SME
+ endif
+ 
+-ifdef NEED_80211_COMMON
+ OBJS += ../src/common/ieee802_11_common.o
+-endif
+ 
+ ifdef NEED_EAP_COMMON
+ OBJS += ../src/eap_common/eap_common.o

Reply via email to