hostapd: Apply SAE/EAP-pwd side-channel attack update 2
authorHauke Mehrtens <hauke@hauke-m.de>
Sat, 12 Feb 2022 19:37:12 +0000 (20:37 +0100)
committerRISCi_ATOM <bob@bobcall.me>
Mon, 28 Mar 2022 17:01:33 +0000 (13:01 -0400)
commit8fd3789c1fb533f24ceb58eaf47a82483a20c370
treece245167e8c13b897b6048fa82e7249e6ce63524
parent57fcc22cae65c28002a2c4ff26c09e9619a1965a
hostapd: Apply SAE/EAP-pwd side-channel attack update 2

This fixes some recent security problems in hostapd.
See here for details: https://w1.fi/security/2022-1
* CVE-2022-23303
* CVE-2022-23304

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
package/network/services/hostapd/Makefile
package/network/services/hostapd/patches/081-crypto-Add-more-bignum-EC-helper-functions.patch [new file with mode: 0644]
package/network/services/hostapd/patches/082-dragonfly-Add-sqrt-helper-function.patch [new file with mode: 0644]
package/network/services/hostapd/patches/083-SAE-Derive-the-y-coordinate-for-PWE-with-own-impleme.patch [new file with mode: 0644]
package/network/services/hostapd/patches/084-EAP-pwd-Derive-the-y-coordinate-for-PWE-with-own-imp.patch [new file with mode: 0644]