hostapd: SAE/EAP-pwd side-channel attack update
authorHauke Mehrtens <hauke@hauke-m.de>
Sun, 8 Sep 2019 21:53:18 +0000 (23:53 +0200)
committerHauke Mehrtens <hauke@hauke-m.de>
Tue, 10 Sep 2019 19:55:02 +0000 (21:55 +0200)
commite8c5e6177d39c7db7eb90534edc5b259628aca98
tree2b535de18f13c0e475f29caac7e3ab723875df5b
parenta0c84947043db72f9e1078b009ac039ed2246f2c
hostapd: SAE/EAP-pwd side-channel attack update

Fixes this security problem:
* SAE/EAP-pwd side-channel attack update
https://w1.fi/security/2019-6/sae-eap-pwd-side-channel-attack-update.txt

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
(cherry picked from commit 7bed9bf10fc8d05df34c7efc66e8b4ade37a1a0c)
package/network/services/hostapd/Makefile
package/network/services/hostapd/patches/066-0000-EAP-pwd-Disallow-ECC-groups-with-a-prime-under-256-b.patch [new file with mode: 0644]
package/network/services/hostapd/patches/066-0000-SAE-Reject-unsuitable-groups-based-on-REVmd-changes.patch [new file with mode: 0644]
package/network/services/hostapd/patches/066-0001-SAE-Use-const_time_memcmp-for-pwd_value-prime-compar.patch [new file with mode: 0644]
package/network/services/hostapd/patches/066-0002-EAP-pwd-Use-const_time_memcmp-for-pwd_value-prime-co.patch [new file with mode: 0644]
package/network/services/hostapd/patches/066-0003-OpenSSL-Use-BN_bn2binpad-or-BN_bn2bin_padded-if-avai.patch [new file with mode: 0644]
package/network/services/hostapd/patches/066-0004-SAE-Run-through-prf-result-processing-even-if-it-pri.patch [new file with mode: 0644]
package/network/services/hostapd/patches/066-0005-EAP-pwd-Run-through-prf-result-processing-even-if-it.patch [new file with mode: 0644]
package/network/services/hostapd/patches/066-0006-dragonfly-Disable-use-of-groups-using-Brainpool-curv.patch [new file with mode: 0644]