Commit Graph

108 Commits

Author SHA1 Message Date
rnhmjoj
a065b80b90
wpa_supplicant: add patch to fix ext_passwords_file bug
This fixes inconsistent behaviour in ext_passwords_file that makes
impossible to input passphrases containing certain characters.

Closes #342140
2024-09-18 16:06:17 +02:00
Felix Buehler
1de6841a25 wpa_supplicant: remove 'with lib;' 2024-08-16 16:09:03 +02:00
Thomas Gerbet
af5b477ad8 wpa_supplicant: revert commit breaking authentication when brcmfmac is used
See https://bugzilla.redhat.com/show_bug.cgi?id=2302577 for more context.
2024-08-07 23:13:27 +02:00
Markus Theil
238488db8a wpa_supplicant: 2.10 -> 2.11
Upstream Changes:
	* Wi-Fi Easy Connect
	  - add support for DPP release 3
	  - allow Configurator parameters to be provided during config exchange
	* MACsec
	  - add support for GCM-AES-256 cipher suite
	  - remove incorrect EAP Session-Id length constraint
	  - add hardware offload support for additional drivers
	* HE/IEEE 802.11ax/Wi-Fi 6
	  - support BSS color updates
	  - various fixes
	* EHT/IEEE 802.11be/Wi-Fi 7
	  - add preliminary support
	* support OpenSSL 3.0 API changes
	* improve EAP-TLS support for TLSv1.3
	* EAP-SIM/AKA: support IMSI privacy
	* improve mitigation against DoS attacks when PMF is used
	* improve 4-way handshake operations
	  - discard unencrypted EAPOL frames in additional cases
	  - use Secure=1 in message 2 during PTK rekeying
	* OCV: do not check Frequency Segment 1 Channel Number for 160 MHz cases
	  to avoid interoperability issues
	* support new SAE AKM suites with variable length keys
	* support new AKM for 802.1X/EAP with SHA384
	* improve cross-AKM roaming with driver-based SME/BSS selection
	* PASN
	  - extend support for secure ranging
	  - allow PASN implementation to be used with external programs for
	    Wi-Fi Aware
	* FT: Use SHA256 to derive PMKID for AKM 00-0F-AC:3 (FT-EAP)
	  - this is based on additional details being added in the IEEE 802.11
	    standard
	  - the new implementation is not backwards compatible, but PMKSA
	    caching with FT-EAP was, and still is, disabled by default
	* support a pregenerated MAC (mac_addr=3) as an alternative mechanism
	  for using per-network random MAC addresses
	* EAP-PEAP: require Phase 2 authentication by default (phase2_auth=1)
	  to improve security for still unfortunately common invalid
	  configurations that do not set ca_cert
	* extend SCS support for QoS Characteristics
	* extend MSCS support
	* support unsynchronized service discovery (USD)
	* add support for explicit SSID protection in 4-way handshake
	  (a mitigation for CVE-2023-52424; disabled by default for now, can be
	  enabled with ssid_protection=1)
	  - in addition, verify SSID after key setup when beacon protection is
	    used
	* fix SAE H2E rejected groups validation to avoid downgrade attacks
	* a large number of other fixes, cleanup, and extensions

Changelog:
http://w1.fi/cgit/hostap/tree/wpa_supplicant/ChangeLog?id=d945ddd368085f255e68328f2d3b020ceea359af

Signed-off-by: Markus Theil <theil.markus@gmail.com>
2024-07-28 18:40:54 +02:00
Michele Guerini Rocco
2a229e7bf2
Merge pull request #242998 from duament/wpa_supplicant-wpa3-enterprise
wpa_supplicant: enable WPA3-Enterprise
2024-07-18 09:34:55 +02:00
Alexis Hildebrandt
755b915a15 treewide: Remove indefinite article from meta.description
nix run nixpkgs#silver-searcher -- -G '\.nix$' -0l 'description.*"[Aa]n?' pkgs \
  | xargs -0 nix run nixpkgs#gnused -- -i '' -Ee 's/(description.*")[Aa]n? (.)/\1\U\2/'
2024-06-09 23:07:45 +02:00
Colin
95749cd782 wpa_supplicant: fix broken dbus .service file
previous to this patch, the output has a service file like:
```
[D-BUS Service]
Name=fi.w1.wpa_supplicant1
Exec=/nix/store/<hash>/nix/store/<hash>/sbin/wpa_supplicant -u
User=root
SystemdService=wpa_supplicant.service
```

the `Exec` line was invalid but likely didn't lead to observable errors in
systemd setups where the `SystemdService` line is consumed instead.
2024-05-28 12:00:51 +00:00
Andrew Brooks
a56f7e234b wpa_supplicant: enable 802.11s mesh networking
Enables CONFIG_MESH, allowing the use of mode=5 in wpa_supplicant's
configuration to bring the device up in mesh-point mode.
2024-02-23 21:59:45 -06:00
Rvfg
3b3b6dcbd5
wpa_supplicant: enable WPA3-Enterprise 2023-07-12 13:37:06 +08:00
oddlama
0a85190a97
wpa_supplicant: enable WPA3-SAE-PK 2023-07-02 13:31:36 +02:00
Marco Rebhan
166b95a536
wpa_supplicant: Enable 802.11ax (Wi-Fi 6) support 2023-06-11 15:10:42 +02:00
Dmitry Bogatov
249a3ba53b pkgsStatic.wpa_supplicant: fix build
Static build has less features enabled, since full set pulls dependency
on system which does not support static build by design.
2023-01-07 17:16:41 +01:00
Ben Wolsieffer
8cbb72ff79 wpa_supplicant: enable external password file support
This allows passwords to be specified in a separate file from the main config.
2022-06-19 18:30:06 -04:00
lassulus
7e69870247 Revert "wpa_supplicant: fix withDbus=false build"
This reverts commit e357ea6b01.
2022-04-21 00:22:47 +02:00
Lassulus
a50861d1d6
Merge pull request #148811 from KAction/fix/wpa_supplicant
wpa_supplicant: fix withDbus=false build
2022-04-20 23:18:53 +01:00
Adam Joseph
a6a823834b wpa_supplicant: rename withDbus to dbusSupport
wpa_supplicant/default.nix currently uses the option "withDbus" to
decide whether or not to compile with dbus support.  It is the only
nix package that uses this choice of name.  Most other packages use
dbusSupport instead.

Let's rename this option to dbusSupport, so that users desiring to
compile without dbus can set the option once in nixpkgs.conf and have
all packages understand that directive.
2022-03-12 07:27:20 -08:00
Lassulus
8d5bd4f345
Merge pull request #158174 from mweinelt/hostap-wnm
wpa_supplicant: enable 802.11v
2022-02-23 23:50:11 +01:00
Naïm Favier
ffdcd39c0b
wpa_supplicant: use unique IDs for networks and credentials
Fixes the bug described at https://github.com/NixOS/nixpkgs/pull/155266#issuecomment-1031711094
2022-02-07 20:45:08 +01:00
Martin Weinelt
4fbcc67dc9
wpa_supplicant: enable WNM (802.11v)
Provides better roaming support.
2022-02-04 23:52:39 +01:00
Martin Weinelt
ed521d40f6
wpa_supplicant: sort config options 2022-02-04 23:52:21 +01:00
Vladimír Čunát
9e07c1de65
wpa_supplicant_gui: fixup build after update in PR #155266 2022-01-20 18:12:47 +01:00
Martin Weinelt
738ff6b30c
wpa_supplicant: 2.9 -> 2.10 2022-01-17 13:42:09 +01:00
Dmitry Bogatov
e357ea6b01 wpa_supplicant: fix withDbus=false build 2021-12-05 21:48:46 -04:00
rnhmjoj
62126f8c15
nixos/tests/wpa_supplicant: init 2021-09-29 09:10:39 +02:00
misuzu
edba976506
wpa_supplicant: allow disabling pcsclite dependency (#128182)
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2021-06-27 18:36:16 +02:00
Maximilian Bosch
08ced9d67f
nixos/wpa_supplicant: make new behavior opt-in 2021-04-16 13:18:46 +02:00
Maximilian Bosch
de0a39166b
wpa_supplicant: allow both imperative and declarative networks
For a while now it's possible to specify an additional config file in
`wpa_supplicant`[1]. In contrast to the file specified via `-c` this was
supposed to be used for immutable settings and not e.g. additional
networks.

However I'm a little bit unhappy about the fact that one has to choose
between a fully imperative setup and a fully declarative one where the
one would have to write credentials for e.g. WPA2-enterprise networks
into the store.

The primary problem with the current state of `wpa_supplicant` is that
if the `SAVE_CONFIG` command is invoked (e.g. via `wpa_cli`), all known
networks will be written to `/etc/wpa_supplicant.conf` and thus all
declarative networks would get out of sync with the declarative
settings.

To work around this, I had to change the following things:

* The `networking.wireless`-module now uses `-I` for declarative config,
  so the user-controlled mode can be used along with the
  `networks`-option.

* I added an `ro`-field to the `ssid`-struct in the
  `wpa_supplicant`-sources. This will be set to `1` for each network
  specified in the config passed via `-I`.

  Whenever config is written to the disk, those networks will be
  skipped, so changes to declarative networks are only temporary.

[1] https://w1.fi/cgit/hostap/commit/wpa_supplicant?id=e6304cad47251e88d073553042f1ea7805a858d1
2021-04-16 13:18:25 +02:00
Martin Weinelt
9f9ab6fffc wpa_supplicant: add patch for CVE-2021-30004
In wpa_supplicant and hostapd 2.9, forging attacks may occur because
AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and
tls/x509v3.c.

Fixes: CVE-2021-30004
2021-04-13 18:45:44 +02:00
Tim Steinbach
67f3319fb7
wpa_supplicant: Enable bgscan 'learn' module 2021-04-04 12:41:14 -04:00
Martin Weinelt
6a0b4ab7be
wpa_supplicant: add CVE-ID for P2P provision discovery proccessing vuln. 2021-02-27 13:11:35 +01:00
Martin Weinelt
a77380a689
wpa_supplicant: update homepage
The old one still exists but is not getting updated anymore.
2021-02-25 21:26:56 +01:00
Martin Weinelt
0dd3c094ee
wpa_supplicant: fix for security advisory 2021-1
A vulnerability was discovered in how wpa_supplicant processes P2P
(Wi-Fi Direct) provision discovery requests. Under a corner case
condition, an invalid Provision Discovery Request frame could end up
reaching a state where the oldest peer entry needs to be removed. With
a suitably constructed invalid frame, this could result in use
(read+write) of freed memory. This can result in an attacker within
radio range of the device running P2P discovery being able to cause
unexpected behavior, including termination of the wpa_supplicant process
and potentially code execution.

https://w1.fi/security/2021-1/
2021-02-25 20:57:49 +01:00
Martin Weinelt
95164dc11b
wpa_supplicant: fix for security advisory 2020-2
A vulnerability was discovered in how wpa_supplicant processing P2P
(Wi-Fi Direct) group information from active group owners. The actual
parsing of that information validates field lengths appropriately, but
processing of the parsed information misses a length check when storing
a copy of the secondary device types. This can result in writing
attacker controlled data into the peer entry after the area assigned for
the secondary device type. The overflow can result in corrupting
pointers for heap allocations. This can result in an attacker within
radio range of the device running P2P discovery being able to cause
unexpected behavior, including termination of the wpa_supplicant process
and potentially arbitrary code execution.

https://w1.fi/security/2020-2/wpa_supplicant-p2p-group-info-processing-vulnerability.txt

Fixes: CVE-2021-0326
2021-02-04 00:31:38 +01:00
Martin Weinelt
28f8b5f5f3 wpa_supplicant: backport support for OWE
The wpa_supplicant upstream is slow to push out new releases and has
been asked several times to do so. Support for Opportunistic Wireless
Encryption has been on master since late 2019 and still hasn't made it
into a release yet.

This backports a rather simple patchset to enable OWE key management
and exposes it also via DBus, so it can be used from Network-Manager.
2021-02-01 00:20:07 +01:00
Jonathan Ringer
9bb3fccb5b treewide: pkgs.pkgconfig -> pkgs.pkg-config, move pkgconfig to alias.nix
continuation of #109595

pkgconfig was aliased in 2018, however, it remained in
all-packages.nix due to its wide usage. This cleans
up the remaining references to pkgs.pkgsconfig and
moves the entry to aliases.nix.

python3Packages.pkgconfig remained unchanged because
it's the canonical name of the upstream package
on pypi.
2021-01-19 01:16:25 -08:00
Ben Siraphob
16d91ee628 pkgs/os-specific: stdenv.lib -> lib 2021-01-17 23:26:08 +07:00
Profpatsch
4a7f99d55d treewide: with stdenv.lib; in meta -> with lib;
Part of: https://github.com/NixOS/nixpkgs/issues/108938

meta = with stdenv.lib;

is a widely used pattern. We want to slowly remove
the `stdenv.lib` indirection and encourage people
to use `lib` directly. Thus let’s start with the meta
field.

This used a rewriting script to mostly automatically
replace all occurances of this pattern, and add the
`lib` argument to the package header if it doesn’t
exist yet.

The script in its current form is available at
https://cs.tvl.fyi/depot@2f807d7f141068d2d60676a89213eaa5353ca6e0/-/blob/users/Profpatsch/nixpkgs-rewriter/default.nix
2021-01-11 10:38:22 +01:00
Michael Reilly
84cf00f980
treewide: Per RFC45, remove all unquoted URLs 2020-04-10 17:54:53 +01:00
c0bw3b
9367367dfd Treewide: fix URL permanent redirects
Permanent redirects on homepages and/or source URLs
as reported by Repology
2019-11-16 01:41:23 +01:00
Florian Klink
ac1aeb4fbb
wpa_supplicant: apply patch for CVE-2019-16275 (#70266)
wpa_supplicant: apply patch for CVE-2019-16275
2019-10-14 23:00:05 +02:00
Tor Hedin Brønner
67effde499
wpa_supplicant: install d-bus conf correctly to share/dbus/system.d
Fixes 40dda7383b which inadvertently installed to
a file as the directory didn't exist.

Also blocked up the postInstall script for readability.
2019-10-14 18:57:44 +02:00
Pierre Bourdon
559687498b
wpa_supplicant: apply patch for CVE-2019-16275 2019-10-02 21:24:23 +02:00
worldofpeace
40dda7383b wpa_supplicant: Move D-Bus conf file to share/dbus-1/system.d
Since D-Bus 1.9.18 configuration files installed by third-party should
go in share/dbus-1/system.d. The old location is for sysadmin overrides.
2019-09-16 13:59:46 -04:00
Vladimír Čunát
2e6bf42a22
Merge branch 'master' into staging-next
There ver very many conflicts, basically all due to
name -> pname+version.  Fortunately, almost everything was auto-resolved
by kdiff3, and for now I just fixed up a couple evaluation problems,
as verified by the tarball job.  There might be some fallback to these
conflicts, but I believe it should be minimal.

Hydra nixpkgs: ?compare=1538299
2019-08-24 08:55:37 +02:00
R. RyanTM
a5f2040b0d wpa_supplicant: 2.8 -> 2.9
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/wpa_supplicant/versions
2019-08-20 23:30:06 -07:00
volth
46420bbaa3 treewide: name -> pname (easy cases) (#66585)
treewide replacement of

stdenv.mkDerivation rec {
  name = "*-${version}";
  version = "*";

to pname
2019-08-15 13:41:18 +01:00
volth
f3282c8d1e treewide: remove unused variables (#63177)
* treewide: remove unused variables

* making ofborg happy
2019-06-16 19:59:05 +00:00
Will Dietz
10dde5a1cc wpa_supplicant: patch already applied :) 2019-04-22 15:39:47 -05:00
Will Dietz
1448b0583b wpa_supplicant: 2.7 -> 2.8 2019-04-22 15:34:26 -05:00
Pierre Bourdon
3f0a59314c wpa_supplicant: 2.6 -> 2.7 (#55926) 2019-02-24 00:47:11 +01:00