Re-apply r190640.- Restore local change to include <net/bpf.h> inside pcap.h.This fixes ports build problems.- Update local copy of dlt.h with new DLT types.- Revert no longer needed <net/bpf.h>
Re-apply r190640.- Restore local change to include <net/bpf.h> inside pcap.h.This fixes ports build problems.- Update local copy of dlt.h with new DLT types.- Revert no longer needed <net/bpf.h> includes which were addedas part of r334277.Suggested by: antoine@, delphij@, np@MFC after: 3 weeksSponsored by: Mellanox Technologies
show more ...
MFV r333789: libpcap 1.9.0 (pre-release)MFC after: 1 monthSponsored by: Mellanox Technologies
Update wpa_supplicant/hostapd for 2017-01 vulnerability release.hostapd: Avoid key reinstallation in FT handshakePrevent reinstallation of an already in-use group keyExtend protection of GTK/IGTK
Update wpa_supplicant/hostapd for 2017-01 vulnerability release.hostapd: Avoid key reinstallation in FT handshakePrevent reinstallation of an already in-use group keyExtend protection of GTK/IGTK reinstallation of WNM-Sleep Mode casesFix TK configuration to the driver in EAPOL-Key 3/4 retry casePrevent installation of an all-zero TKFix PTK rekeying to generate a new ANonceTDLS: Reject TPK-TK reconfigurationWNM: Ignore Key Data in WNM Sleep Mode Response frame if no PMF in useWNM: Ignore WNM-Sleep Mode Response if WNM-Sleep Mode has not been usedWNM: Ignore WNM-Sleep Mode Response without pending requestFT: Do not allow multiple Reassociation Response framesTDLS: Ignore incoming TDLS Setup Response retriesSubmitted by: jhbObtained from: https://w1.fi/security/2017-01/ (against later version)Security: FreeBSD-SA-17:07Security: CERT VU#228519Security: CVE-2017-13077Security: CVE-2017-13078Security: CVE-2017-13079Security: CVE-2017-13080Security: CVE-2017-13081Security: CVE-2017-13082Security: CVE-2017-13086Security: CVE-2017-13087Security: CVE-2017-13088Differential Revision: https://reviews.freebsd.org/D12693
[wpa] use IFM_IEEE80211_ADHOC for now on FreeBSD for IBSS operation.PR: bin/203086Submitted by: avos
[wpa] bring up interface in ap_mode=2This is required for WPA-NONE operation.PR: bin/203086Submitted by: avos@
[wpa] handle IBSS mediatype.same as the previous commit to ifconfig - handle a mediatype of IBSSwithout failing/complaining.Internally inside wpa_s things treat IBSS/ADHOC as equivalent.
Update hostapd/wpa_supplicant to version 2.5.Tested by several people on current@/wireless@.Relnotes: yes
Merge wpa_supplicant/hostapd 2.4.Major changes are: SAE, Suite B, RFC 7268, EAP-PKE, ACS, and tons ofbug fixes.Relnotes: yes
convert to using pidfile... This prevents multiple wpa_supplicantsrunning at the same time causing problems w/ wifi not working..the patch will be submitted upstream... The next step if someone
convert to using pidfile... This prevents multiple wpa_supplicantsrunning at the same time causing problems w/ wifi not working..the patch will be submitted upstream... The next step if someone wantsto push it upstream is to break os_unix.c up so that all these otherutilities don't need libutil..Reviewed by: rpaulo
Enable all cryptocaps because net80211 can do software encryption.MFC after: 1 week
Revert to upstream literal $FreeBSD tagradiotap.h in upstream wpa originally came from the FreeBSD CVSrepository. The copy in vendor/ matched the upstream one; with thischange the contrib copy n
Revert to upstream literal $FreeBSD tagradiotap.h in upstream wpa originally came from the FreeBSD CVSrepository. The copy in vendor/ matched the upstream one; with thischange the contrib copy now matches too.Discussed with: jhb@
Fix previous commit: both flags must be set.
Make sure IFM_AVALID is also set when checking ifm_status.Submitted by: yongari
Fix a timing issue with the wired driver.After configuring the interface, wait for the link to become active.Many ethernet drivers reset the chip when we set multicast filters(causing significant
Fix a timing issue with the wired driver.After configuring the interface, wait for the link to become active.Many ethernet drivers reset the chip when we set multicast filters(causing significant delays due to link re-negotiation) and, by the timewe start sending packets, they are discared instead of going to the ether.Tested by: dumbbell
Move to MSG_DEBUG to print it via syslog only when requested.Reviewed by: rpaulo, adrianApproved by: sbruno (mentor)
Delete .gitignore files.
Restore the dbus directory that was not meant to be deleted in r252729.
Remove unused files / directories.
Merge hostapd / wpa_supplicant 2.0.Reviewed by: adrian (driver_bsd + usr.sbin/wpa)
Import change e4ac6417c7504e1c55ec556ce908974c04e29e3c from upstream wpa: From: Guy Eilam <guy@wizery.com> Date: Mon, 21 Feb 2011 20:44:46 +0000 (+0200) Subject: utils: Corrected a typo in hea
Import change e4ac6417c7504e1c55ec556ce908974c04e29e3c from upstream wpa: From: Guy Eilam <guy@wizery.com> Date: Mon, 21 Feb 2011 20:44:46 +0000 (+0200) Subject: utils: Corrected a typo in header's name definition utils: Corrected a typo in header's name definition Corrected a typo in the BASE64_H definition that might cause the header file to be included more than once. Signed-off-by: Guy Eilam <guy@wizery.com>Submitted by: <dt71@gmx.com>MFC after: 3 days
Import change 40eebf235370b6fe6353784ccf01ab92eed062a5 from upstream wpa: From: Jouni Malinen <j@w1.fi> Date: Fri, 15 Jul 2011 13:42:06 +0300 Subject: [PATCH] MD5: Fix clearing of temporary st
Import change 40eebf235370b6fe6353784ccf01ab92eed062a5 from upstream wpa: From: Jouni Malinen <j@w1.fi> Date: Fri, 15 Jul 2011 13:42:06 +0300 Subject: [PATCH] MD5: Fix clearing of temporary stack memory to use correct length sizeof of the structure instead of the pointer was supposed to be used here. Fix this to clear the full structure at the end of MD5Final().Found by: clang ToTReviewed by: rpauloMFC after: 3 days
MFS security patches which seem to have accidentally not reached HEAD:Fix insufficient message length validation for EAP-TLS messages.Fix Linux compatibility layer input validation error.Securi
MFS security patches which seem to have accidentally not reached HEAD:Fix insufficient message length validation for EAP-TLS messages.Fix Linux compatibility layer input validation error.Security: FreeBSD-SA-12:07.hostapdSecurity: FreeBSD-SA-12:08.linuxSecurity: CVE-2012-4445, CVE-2012-4576With hat: so@
Remove unused files.
Merge wpa_supplicant and hostapd 0.7.3.
1234