hostapd: SAE/EAP-pwd side-channel attack update
authorHauke Mehrtens <hauke@hauke-m.de>
Sun, 8 Sep 2019 21:53:18 +0000 (23:53 +0200)
committerHauke Mehrtens <hauke@hauke-m.de>
Sat, 21 Sep 2019 19:16:07 +0000 (21:16 +0200)
commite289a4133cdd424876aae8a8a9947bee6d1b5230
tree68ea2af26049d7d491108ac5a08b6906f686ec15
parenta63edb469128aeee7d5fbc93709a25716e982e28
hostapd: SAE/EAP-pwd side-channel attack update

Fixes this security problem:
* SAE/EAP-pwd side-channel attack update
https://w1.fi/security/2019-6/sae-eap-pwd-side-channel-attack-update.txt

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
(cherry picked from commit 7bed9bf10fc8d05df34c7efc66e8b4ade37a1a0c)
package/network/services/hostapd/Makefile
package/network/services/hostapd/patches/066-0000-EAP-pwd-Disallow-ECC-groups-with-a-prime-under-256-b.patch [new file with mode: 0644]
package/network/services/hostapd/patches/066-0000-SAE-Reject-unsuitable-groups-based-on-REVmd-changes.patch [new file with mode: 0644]
package/network/services/hostapd/patches/066-0001-SAE-Use-const_time_memcmp-for-pwd_value-prime-compar.patch [new file with mode: 0644]
package/network/services/hostapd/patches/066-0002-EAP-pwd-Use-const_time_memcmp-for-pwd_value-prime-co.patch [new file with mode: 0644]
package/network/services/hostapd/patches/066-0003-OpenSSL-Use-BN_bn2binpad-or-BN_bn2bin_padded-if-avai.patch [new file with mode: 0644]
package/network/services/hostapd/patches/066-0004-SAE-Run-through-prf-result-processing-even-if-it-pri.patch [new file with mode: 0644]
package/network/services/hostapd/patches/066-0005-EAP-pwd-Run-through-prf-result-processing-even-if-it.patch [new file with mode: 0644]
package/network/services/hostapd/patches/066-0006-dragonfly-Disable-use-of-groups-using-Brainpool-curv.patch [new file with mode: 0644]