IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator
aeb7fa69dd
Remove obsolete patches for NL80211_ATTR_SMPS_MODE encoding and KRACK Fix CVE-2019-9494 (cache attack against SAE) Fix CVE-2019-9495 (cache attack against EAP-pwd) Fix CVE-2019-9496 (SAE confirm missing state validation in hostapd/AP) Fix CVE-2019-9497 (EAP-pwd server not checking for reflection attack) Fix CVE-2019-9498 (EAP-pwd server missing commit validation for scalar/element) Fix CVE-2019-9499 (EAP-pwd peer missing commit validation for scalar/element) |
||
---|---|---|
.gitignore | ||
0001-OpenSSL-Use-constant-time-operations-for-private-big.patch | ||
0002-Add-helper-functions-for-constant-time-operations.patch | ||
0003-OpenSSL-Use-constant-time-selection-for-crypto_bignu.patch | ||
0004-EAP-pwd-Use-constant-time-and-memory-access-for-find.patch | ||
0005-SAE-Minimize-timing-differences-in-PWE-derivation.patch | ||
0006-SAE-Avoid-branches-in-is_quadratic_residue_blind.patch | ||
0007-SAE-Mask-timing-of-MODP-groups-22-23-24.patch | ||
0008-SAE-Use-const_time-selection-for-PWE-in-FFC.patch | ||
0009-SAE-Use-constant-time-operations-in-sae_test_pwd_see.patch | ||
0010-SAE-Fix-confirm-message-validation-in-error-cases.patch | ||
0011-EAP-pwd-server-Verify-received-scalar-and-element.patch | ||
0012-EAP-pwd-server-Detect-reflection-attacks.patch | ||
0013-EAP-pwd-client-Verify-received-scalar-and-element.patch | ||
0014-EAP-pwd-Check-element-x-y-coordinates-explicitly.patch | ||
hostapd.conf | ||
hostapd.init | ||
hostapd.service | ||
hostapd.spec | ||
hostapd.sysconfig | ||
sources |