blob: 3e847f863fbd43b7f9025d752c093cb3dac3608e (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
|
pkgbase = hostapd-noscan
pkgdesc = IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator (with "noscan" patch)
pkgver = 2.9
pkgrel = 5
url = https://w1.fi/hostapd/
arch = x86_64
arch = i686
arch = armv6h
arch = armv7h
arch = aarch64
license = BSD
depends = glibc
depends = libnl
depends = openssl
depends = sqlite
provides = hostapd
conflicts = hostapd
backup = etc/hostapd/hostapd.accept
backup = etc/hostapd/hostapd.conf
backup = etc/hostapd/hostapd.deny
backup = etc/hostapd/hostapd.eap_user
backup = etc/hostapd/hostapd.radius_clients
backup = etc/hostapd/hostapd.vlan
backup = etc/hostapd/hostapd.wpa_psk
source = https://w1.fi/releases/hostapd-2.9.tar.gz
source = https://w1.fi/security/2020-1/0001-WPS-UPnP-Do-not-allow-event-subscriptions-with-URLs-.patch
source = https://w1.fi/security/2020-1/0002-WPS-UPnP-Fix-event-message-generation-using-a-long-U.patch
source = https://w1.fi/security/2020-1/0003-WPS-UPnP-Handle-HTTP-initiation-failures-for-events-.patch
source = hostapd-2.9-CVE-2021-30004.patch::https://w1.fi/cgit/hostap/patch/?id=a0541334a6394f8237a4393b7372693cd7e96f15
source = config
source = hostapd.service
source = hostapd-noscan.patch
sha256sums = 881d7d6a90b2428479288d64233151448f8990ab4958e0ecaca7eeb3c9db2bd7
sha256sums = 2d9a5b9d616f1b4aa4a22b967cee866e2f69b798b0b46803a7928c8559842bd7
sha256sums = 49feb35a5276279b465f6836d6fa2c6b34d94dc979e8b840d1918865c04260de
sha256sums = a8212a2d89a5bab2824d22b6047e7740553df163114fcec94832bfa9c5c5d78a
sha256sums = a726eec646a4c6bbff380fbc4a4797d9b2d0f1e45fb79411bbc26859e3213557
sha256sums = 87445203a518864e704b85fa970d90940e9a5d9b401ceb802d11caab6c07a495
sha256sums = 989bc6855f44c0b360e3d4cd4a146c35b7c12f8a0ced627b4b033f58edcade8e
sha256sums = f2a57f118d5884bdc5eaba3828545742775e763eade4837668f8cd3dec8bb812
pkgname = hostapd-noscan
|