summary refs log tree commit diff
path: root/pkgs/os-specific/linux/wpa_supplicant
Commit message (Collapse)AuthorAge
* wpa_supplicant: allow disabling pcsclite dependency (#128182)misuzu2021-06-27
| | | Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
* wpa_supplicant: review fixesMaximilian Bosch2021-04-16
|
* nixos/wpa_supplicant: make new behavior opt-inMaximilian Bosch2021-04-16
|
* wpa_supplicant: allow both imperative and declarative networksMaximilian Bosch2021-04-16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | For a while now it's possible to specify an additional config file in `wpa_supplicant`[1]. In contrast to the file specified via `-c` this was supposed to be used for immutable settings and not e.g. additional networks. However I'm a little bit unhappy about the fact that one has to choose between a fully imperative setup and a fully declarative one where the one would have to write credentials for e.g. WPA2-enterprise networks into the store. The primary problem with the current state of `wpa_supplicant` is that if the `SAVE_CONFIG` command is invoked (e.g. via `wpa_cli`), all known networks will be written to `/etc/wpa_supplicant.conf` and thus all declarative networks would get out of sync with the declarative settings. To work around this, I had to change the following things: * The `networking.wireless`-module now uses `-I` for declarative config, so the user-controlled mode can be used along with the `networks`-option. * I added an `ro`-field to the `ssid`-struct in the `wpa_supplicant`-sources. This will be set to `1` for each network specified in the config passed via `-I`. Whenever config is written to the disk, those networks will be skipped, so changes to declarative networks are only temporary. [1] https://w1.fi/cgit/hostap/commit/wpa_supplicant?id=e6304cad47251e88d073553042f1ea7805a858d1
* wpa_supplicant: add patch for CVE-2021-30004Martin Weinelt2021-04-13
| | | | | | | | In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c. Fixes: CVE-2021-30004
* wpa_supplicant: Enable bgscan 'learn' moduleTim Steinbach2021-04-04
|
* wpa_supplicant: add CVE-ID for P2P provision discovery proccessing vuln.Martin Weinelt2021-02-27
|
* wpa_supplicant: update homepageMartin Weinelt2021-02-25
| | | | The old one still exists but is not getting updated anymore.
* wpa_supplicant: fix for security advisory 2021-1Martin Weinelt2021-02-25
| | | | | | | | | | | | | | A vulnerability was discovered in how wpa_supplicant processes P2P (Wi-Fi Direct) provision discovery requests. Under a corner case condition, an invalid Provision Discovery Request frame could end up reaching a state where the oldest peer entry needs to be removed. With a suitably constructed invalid frame, this could result in use (read+write) of freed memory. This can result in an attacker within radio range of the device running P2P discovery being able to cause unexpected behavior, including termination of the wpa_supplicant process and potentially code execution. https://w1.fi/security/2021-1/
* wpa_supplicant: fix for security advisory 2020-2Martin Weinelt2021-02-04
| | | | | | | | | | | | | | | | | | A vulnerability was discovered in how wpa_supplicant processing P2P (Wi-Fi Direct) group information from active group owners. The actual parsing of that information validates field lengths appropriately, but processing of the parsed information misses a length check when storing a copy of the secondary device types. This can result in writing attacker controlled data into the peer entry after the area assigned for the secondary device type. The overflow can result in corrupting pointers for heap allocations. This can result in an attacker within radio range of the device running P2P discovery being able to cause unexpected behavior, including termination of the wpa_supplicant process and potentially arbitrary code execution. https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt Fixes: CVE-2021-0326
* wpa_supplicant: backport support for OWEMartin Weinelt2021-02-01
| | | | | | | | | | The wpa_supplicant upstream is slow to push out new releases and has been asked several times to do so. Support for Opportunistic Wireless Encryption has been on master since late 2019 and still hasn't made it into a release yet. This backports a rather simple patchset to enable OWE key management and exposes it also via DBus, so it can be used from Network-Manager.
* treewide: remove stdenv where not neededPavol Rusnak2021-01-25
|
* treewide: pkgs.pkgconfig -> pkgs.pkg-config, move pkgconfig to alias.nixJonathan Ringer2021-01-19
| | | | | | | | | | | | | continuation of #109595 pkgconfig was aliased in 2018, however, it remained in all-packages.nix due to its wide usage. This cleans up the remaining references to pkgs.pkgsconfig and moves the entry to aliases.nix. python3Packages.pkgconfig remained unchanged because it's the canonical name of the upstream package on pypi.
* pkgs/os-specific: stdenv.lib -> libBen Siraphob2021-01-17
|
* treewide: with stdenv.lib; in meta -> with lib;Profpatsch2021-01-11
| | | | | | | | | | | | | | | | | | | Part of: https://github.com/NixOS/nixpkgs/issues/108938 meta = with stdenv.lib; is a widely used pattern. We want to slowly remove the `stdenv.lib` indirection and encourage people to use `lib` directly. Thus let’s start with the meta field. This used a rewriting script to mostly automatically replace all occurances of this pattern, and add the `lib` argument to the package header if it doesn’t exist yet. The script in its current form is available at https://cs.tvl.fyi/depot@2f807d7f141068d2d60676a89213eaa5353ca6e0/-/blob/users/Profpatsch/nixpkgs-rewriter/default.nix
* treewide: replace base64 encoded hashesDaiderd Jordan2020-06-03
|
* wpa_supplicant_gui: fix build with Inkscape 1.0Jan Tojnar2020-05-17
|
* treewide: Per RFC45, remove all unquoted URLsMichael Reilly2020-04-10
|
* Treewide: fix URL permanent redirectsc0bw3b2019-11-16
| | | | | Permanent redirects on homepages and/or source URLs as reported by Repology
* wpa_supplicant: apply patch for CVE-2019-16275 (#70266)Florian Klink2019-10-14
|\ | | | | wpa_supplicant: apply patch for CVE-2019-16275
| * wpa_supplicant: apply patch for CVE-2019-16275Pierre Bourdon2019-10-02
| |
* | wpa_supplicant: install d-bus conf correctly to share/dbus/system.dTor Hedin Brønner2019-10-14
| | | | | | | | | | | | Fixes 40dda7383b4a2fe7d0012f90bd653f83d6b88737 which inadvertently installed to a file as the directory didn't exist. Also blocked up the postInstall script for readability.
* | wpa_supplicant: Move D-Bus conf file to share/dbus-1/system.dworldofpeace2019-09-16
|/ | | | | Since D-Bus 1.9.18 configuration files installed by third-party should go in share/dbus-1/system.d. The old location is for sysadmin overrides.
* Merge branch 'master' into staging-nextVladimír Čunát2019-08-24
|\ | | | | | | | | | | | | | | | | | | There ver very many conflicts, basically all due to name -> pname+version. Fortunately, almost everything was auto-resolved by kdiff3, and for now I just fixed up a couple evaluation problems, as verified by the tarball job. There might be some fallback to these conflicts, but I believe it should be minimal. Hydra nixpkgs: ?compare=1538299
| * wpa_supplicant: 2.8 -> 2.9R. RyanTM2019-08-20
| | | | | | | | | | | | | | Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools. This update was made based on information from https://repology.org/metapackage/wpa_supplicant/versions
* | treewide: name -> pname (easy cases) (#66585)volth2019-08-15
|/ | | | | | | | | treewide replacement of stdenv.mkDerivation rec { name = "*-${version}"; version = "*"; to pname
* wpa_supplicant/gui: fix qt wrappingDominik Xaver Hörl2019-08-07
| | | | | Import mkDerivation explicitly instead of using stdenv.mkDerivation, to allow proper wrapping.
* treewide: remove unused variables (#63177)volth2019-06-16
| | | | | | * treewide: remove unused variables * making ofborg happy
* wpa_supplicant: patch already applied :)Will Dietz2019-04-22
|
* wpa_supplicant: 2.7 -> 2.8Will Dietz2019-04-22
|
* wpa_supplicant: 2.6 -> 2.7 (#55926)Pierre Bourdon2019-02-24
|
* treewide: remove wkennington as maintainerJörg Thalheim2019-01-26
| | | | | | He prefers to contribute to his own nixpkgs fork triton. Since he is still marked as maintainer in many packages this leaves the wrong impression he still maintains those.
* wpa_supplicant: improve manpageLinus Heckemann2018-11-23
| | | | | Now points to the store path of the sample config rather than /usr/share/doc.
* wpa_supplicant: copy sample config into outputLinus Heckemann2018-11-23
|
* wpa_gui: add license + homepageMarkus Kowalewski2018-08-30
|
* wpa_supplicant: add patch to fix CVE-2018-14526Franz Pletz2018-08-08
| | | | Fixes #44724.
* pkgs/*: remove unreferenced function argumentsvolth2018-07-21
|
* treewide: remove aliases in nixpkgsMatthew Bauer2018-07-18
| | | | | | | | | | | | | | | | | | This makes the command ‘nix-env -qa -f. --arg config '{skipAliases = true;}'’ work in Nixpkgs. Misc... - qtikz: use libsForQt5.callPackage This ensures we get the right poppler. - rewrites: docbook5_xsl -> docbook_xsl_ns docbook_xml_xslt -> docbook_xsl diffpdf: fixup
* pcsclite: split packageJan Tojnar2018-06-29
|
* wpa_supplicant: patch for KRACKAttackGraham Christensen2017-10-16
| | | | | | | | | | | | | CVE-2017-13077: Reinstallation of the pairwise encryption key (PTK-TK) in the 4-way handshake. CVE-2017-13078: Reinstallation of the group key (GTK) in the 4-way handshake. CVE-2017-13079: Reinstallation of the integrity group key (IGTK) in the 4-way handshake. CVE-2017-13080: Reinstallation of the group key (GTK) in the group key handshake. CVE-2017-13081: Reinstallation of the integrity group key (IGTK) in the group key handshake. CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT) Reassociation Request and reinstalling the pairwise encryption key (PTK-TK) while processing it. CVE-2017-13084: Reinstallation of the STK key in the PeerKey handshake. CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake. CVE-2017-13087: reinstallation of the group key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame. CVE-2017-13088: reinstallation of the integrity group key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame.
* hostapd/wpa_supplicant: update urlsMaximilian Güntner2017-09-17
|
* wpa_supplicant: Enable BGSCAN moduleCarl Sverre2017-08-03
| | | | | | | | | Compile wpa_supplicant with the BGSCAN module enabled. This allows the user to configure an SSID to use the bgscan module. This module causes wpa_supplicant to periodically perform a background scan for additional access points and switch to the one with the highest signal. This scan can be kicked off when the current connection drops below a target threshold signal strength.
* qt5: rename qmakeHook to qmakeThomas Tuegel2017-06-18
|
* wpa_supplicant: upgrade to qt5Jörg Thalheim2017-05-01
| | | | | also inkscape removal patch, as it introduced a bug: #25320 fixes #25320 #25325
* treewide: purge maintainers.urkudVladimír Čunát2017-03-27
| | | | | It's sad, but he's been inactive for the last five years. Keeping such people in meta.maintainers is counter-productive.
* wpa_supplicant_gui: Add forgotten patch.Moritz Ulrich2016-10-30
|
* wpa_supplicant_gui: Replace inkscape with imagemagick in build process.Moritz Ulrich2016-10-30
|
* wpa_supplicant: 2.5 -> 2.6 (#19913)Tim Steinbach2016-10-27
|
* treewide: Make explicit that 'dev' output of libnl is usedTuomas Tynkkynen2016-05-19
|
* wpa_supplicant_gui: move to qmake4HookNikolay Amiantov2016-04-20
|