Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#61067 - [wpa_supplicant] Version 2.7 is still built against OpenSSL 1.0
Attached to Project:
Arch Linux
Opened by Daniel Kamil Kozar (XAVeRY) - Thursday, 13 December 2018, 22:24 GMT
Last edited by Eli Schwartz (eschwartz) - Thursday, 13 December 2018, 22:27 GMT
Opened by Daniel Kamil Kozar (XAVeRY) - Thursday, 13 December 2018, 22:24 GMT
Last edited by Eli Schwartz (eschwartz) - Thursday, 13 December 2018, 22:27 GMT
|
DetailsVersion 2.7 of wpa_supplicant has been modified to support OpenSSL 1.1.1, as the changelog at http://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog says.
However, the PKGBUILD still requires openssl-1.0 and uses custom CFLAGS and LDFLAGS (actually, LIBS) to ensure that the package is built against the 1.0 version of OpenSSL. I've built the supplicant with the newest OpenSSL and have been running it for a few days now without any issues. This may be a good time to switch to 1.1.1 in the PKGBUILD as well, especially since it was the last package on my system that depended on OpenSSL 1.0. |
This task depends upon