wpa_supplicant and hostapd
--------------------------
-Copyright (c) 2002-2022, Jouni Malinen <j@w1.fi> and contributors
+Copyright (c) 2002-2024, Jouni Malinen <j@w1.fi> and contributors
All Rights Reserved.
These programs are licensed under the BSD license (the one with
# This could be handy for archiving the generated documentation or
# if some version control system is used.
-PROJECT_NUMBER = 2.10
+PROJECT_NUMBER = 2.11
# The OUTPUT_DIRECTORY tag is used to specify the (relative or absolute)
# base path where the generated documentation will be put.
ChangeLog for hostapd
+2024-07-20 - v2.11
+ * Wi-Fi Easy Connect
+ - add support for DPP release 3
+ - allow Configurator parameters to be provided during config exchange
+ * HE/IEEE 802.11ax/Wi-Fi 6
+ - various fixes
+ * EHT/IEEE 802.11be/Wi-Fi 7
+ - add preliminary support
+ * SAE: add support for fetching the password from a RADIUS server
+ * support OpenSSL 3.0 API changes
+ * support background radar detection and CAC with some additional
+ drivers
+ * support RADIUS ACL/PSK check during 4-way handshake (wpa_psk_radius=3)
+ * EAP-SIM/AKA: support IMSI privacy
+ * improve 4-way handshake operations
+ - use Secure=1 in message 3 during PTK rekeying
+ * OCV: do not check Frequency Segment 1 Channel Number for 160 MHz cases
+ to avoid interoperability issues
+ * support new SAE AKM suites with variable length keys
+ * support new AKM for 802.1X/EAP with SHA384
+ * extend PASN support for secure ranging
+ * FT: Use SHA256 to derive PMKID for AKM 00-0F-AC:3 (FT-EAP)
+ - this is based on additional details being added in the IEEE 802.11
+ standard
+ - the new implementation is not backwards compatible
+ * improved ACS to cover additional channel types/bandwidths
+ * extended Multiple BSSID support
+ * fix beacon protection with FT protocol (incorrect BIGTK was provided)
+ * support unsynchronized service discovery (USD)
+ * add preliminary support for RADIUS/TLS
+ * add support for explicit SSID protection in 4-way handshake
+ (a mitigation for CVE-2023-52424; disabled by default for now, can be
+ enabled with ssid_protection=1)
+ * fix SAE H2E rejected groups validation to avoid downgrade attacks
+ * use stricter validation for some RADIUS messages
+ * a large number of other fixes, cleanup, and extensions
+
2022-01-16 - v2.10
* SAE changes
- improved protection against side channel attacks
Authenticator and RADIUS authentication server
================================================================
-Copyright (c) 2002-2022, Jouni Malinen <j@w1.fi> and contributors
+Copyright (c) 2002-2024, Jouni Malinen <j@w1.fi> and contributors
All Rights Reserved.
This program is licensed under the BSD license (the one with
static const char *const hostapd_cli_version =
"hostapd_cli v" VERSION_STR "\n"
-"Copyright (c) 2004-2022, Jouni Malinen <j@w1.fi> and contributors";
+"Copyright (c) 2004-2024, Jouni Malinen <j@w1.fi> and contributors";
static struct wpa_ctrl *ctrl_conn;
static int hostapd_cli_quit = 0;
"hostapd v%s\n"
"User space daemon for IEEE 802.11 AP management,\n"
"IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator\n"
- "Copyright (c) 2002-2022, Jouni Malinen <j@w1.fi> "
+ "Copyright (c) 2002-2024, Jouni Malinen <j@w1.fi> "
"and contributors\n",
VERSION_STR);
}
#define GIT_VERSION_STR_POSTFIX ""
#endif /* GIT_VERSION_STR_POSTFIX */
-#define VERSION_STR "2.11-devel" VERSION_STR_POSTFIX GIT_VERSION_STR_POSTFIX
+#define VERSION_STR "2.11" VERSION_STR_POSTFIX GIT_VERSION_STR_POSTFIX
#endif /* VERSION_H */
ChangeLog for wpa_supplicant
+2024-07-20 - v2.11
+ * Wi-Fi Easy Connect
+ - add support for DPP release 3
+ - allow Configurator parameters to be provided during config exchange
+ * MACsec
+ - add support for GCM-AES-256 cipher suite
+ - remove incorrect EAP Session-Id length constraint
+ - add hardware offload support for additional drivers
+ * HE/IEEE 802.11ax/Wi-Fi 6
+ - support BSS color updates
+ - various fixes
+ * EHT/IEEE 802.11be/Wi-Fi 7
+ - add preliminary support
+ * support OpenSSL 3.0 API changes
+ * improve EAP-TLS support for TLSv1.3
+ * EAP-SIM/AKA: support IMSI privacy
+ * improve mitigation against DoS attacks when PMF is used
+ * improve 4-way handshake operations
+ - discard unencrypted EAPOL frames in additional cases
+ - use Secure=1 in message 2 during PTK rekeying
+ * OCV: do not check Frequency Segment 1 Channel Number for 160 MHz cases
+ to avoid interoperability issues
+ * support new SAE AKM suites with variable length keys
+ * support new AKM for 802.1X/EAP with SHA384
+ * improve cross-AKM roaming with driver-based SME/BSS selection
+ * PASN
+ - extend support for secure ranging
+ - allow PASN implementation to be used with external programs for
+ Wi-Fi Aware
+ * FT: Use SHA256 to derive PMKID for AKM 00-0F-AC:3 (FT-EAP)
+ - this is based on additional details being added in the IEEE 802.11
+ standard
+ - the new implementation is not backwards compatible, but PMKSA
+ caching with FT-EAP was, and still is, disabled by default
+ * support a pregenerated MAC (mac_addr=3) as an alternative mechanism
+ for using per-network random MAC addresses
+ * EAP-PEAP: require Phase 2 authentication by default (phase2_auth=1)
+ to improve security for still unfortunately common invalid
+ configurations that do not set ca_cert
+ * extend SCS support for QoS Characteristics
+ * extend MSCS support
+ * support unsynchronized service discovery (USD)
+ * add support for explicit SSID protection in 4-way handshake
+ (a mitigation for CVE-2023-52424; disabled by default for now, can be
+ enabled with ssid_protection=1)
+ - in addition, verify SSID after key setup when beacon protection is
+ used
+ * fix SAE H2E rejected groups validation to avoid downgrade attacks
+ * a large number of other fixes, cleanup, and extensions
+
2022-01-16 - v2.10
* SAE changes
- improved protection against side channel attacks
wpa_supplicant
==============
-Copyright (c) 2003-2022, Jouni Malinen <j@w1.fi> and contributors
+Copyright (c) 2003-2024, Jouni Malinen <j@w1.fi> and contributors
All Rights Reserved.
This program is licensed under the BSD license (the one with
static const char *const wpa_cli_version =
"wpa_cli v" VERSION_STR "\n"
-"Copyright (c) 2004-2022, Jouni Malinen <j@w1.fi> and contributors";
+"Copyright (c) 2004-2024, Jouni Malinen <j@w1.fi> and contributors";
#define VENDOR_ELEM_FRAME_ID \
" 0: Probe Req (P2P), 1: Probe Resp (P2P) , 2: Probe Resp (GO), " \
const char *const wpa_supplicant_version =
"wpa_supplicant v" VERSION_STR "\n"
-"Copyright (c) 2003-2022, Jouni Malinen <j@w1.fi> and contributors";
+"Copyright (c) 2003-2024, Jouni Malinen <j@w1.fi> and contributors";
const char *const wpa_supplicant_license =
"This software may be distributed under the terms of the BSD license.\n"