diff options
author | Wang Mingyu <wangmy@fujitsu.com> | 2024-08-07 09:22:04 +0800 |
---|---|---|
committer | Khem Raj <raj.khem@gmail.com> | 2024-08-09 14:25:21 -0700 |
commit | 38a1dba331cf68d6ecd6636bcea9f73fd5fe2596 (patch) | |
tree | 748bddb12d8335716631a622073c52ad80a32bee /meta-python/recipes-devtools/python/python3-google-auth-oauthlib | |
parent | 1b19abbcf37af468586b7e3f3210d4b7d13fa0b6 (diff) | |
download | meta-openembedded-38a1dba331cf68d6ecd6636bcea9f73fd5fe2596.tar.gz |
hostapd: upgrade 2.10 -> 2.11
License-Update: Copyright updated to 2024.
Changelog:
===========
* Wi-Fi Easy Connect
- add support for DPP release 3
- allow Configurator parameters to be provided during config exchange
* HE/IEEE 802.11ax/Wi-Fi 6
- various fixes
* EHT/IEEE 802.11be/Wi-Fi 7
- add preliminary support
* SAE: add support for fetching the password from a RADIUS server
* support OpenSSL 3.0 API changes
* support background radar detection and CAC with some additional
drivers
* support RADIUS ACL/PSK check during 4-way handshake (wpa_psk_radius=3)
* EAP-SIM/AKA: support IMSI privacy
* improve 4-way handshake operations
- use Secure=1 in message 3 during PTK rekeying
* OCV: do not check Frequency Segment 1 Channel Number for 160 MHz cases
to avoid interoperability issues
* support new SAE AKM suites with variable length keys
* support new AKM for 802.1X/EAP with SHA384
* extend PASN support for secure ranging
* FT: Use SHA256 to derive PMKID for AKM 00-0F-AC:3 (FT-EAP)
- this is based on additional details being added in the IEEE 802.11
standard
- the new implementation is not backwards compatible
* improved ACS to cover additional channel types/bandwidths
* extended Multiple BSSID support
* fix beacon protection with FT protocol (incorrect BIGTK was provided)
* support unsynchronized service discovery (USD)
* add preliminary support for RADIUS/TLS
* add support for explicit SSID protection in 4-way handshake
(a mitigation for CVE-2023-52424; disabled by default for now, can be
enabled with ssid_protection=1)
* fix SAE H2E rejected groups validation to avoid downgrade attacks
* use stricter validation for some RADIUS messages
* a large number of other fixes, cleanup, and extensions
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-google-auth-oauthlib')
0 files changed, 0 insertions, 0 deletions