Preparations for v2.11 release

Update the version number for the build and also add the ChangeLog
entries for both hostapd and wpa_supplicant to describe main changes
between v2.10 and v2.11. Update the copyright years for the main
programs.

Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
Jouni Malinen 2024-07-20 20:50:21 +03:00
parent aa2dfae5eb
commit d945ddd368
11 changed files with 96 additions and 9 deletions

2
README
View file

@ -1,7 +1,7 @@
wpa_supplicant and hostapd wpa_supplicant and hostapd
-------------------------- --------------------------
Copyright (c) 2002-2022, Jouni Malinen <j@w1.fi> and contributors Copyright (c) 2002-2024, Jouni Malinen <j@w1.fi> and contributors
All Rights Reserved. All Rights Reserved.
These programs are licensed under the BSD license (the one with These programs are licensed under the BSD license (the one with

View file

@ -31,7 +31,7 @@ PROJECT_NAME = "wpa_supplicant / hostapd"
# This could be handy for archiving the generated documentation or # This could be handy for archiving the generated documentation or
# if some version control system is used. # if some version control system is used.
PROJECT_NUMBER = 2.10 PROJECT_NUMBER = 2.11
# The OUTPUT_DIRECTORY tag is used to specify the (relative or absolute) # The OUTPUT_DIRECTORY tag is used to specify the (relative or absolute)
# base path where the generated documentation will be put. # base path where the generated documentation will be put.

View file

@ -1,5 +1,42 @@
ChangeLog for hostapd ChangeLog for hostapd
2024-07-20 - v2.11
* Wi-Fi Easy Connect
- add support for DPP release 3
- allow Configurator parameters to be provided during config exchange
* HE/IEEE 802.11ax/Wi-Fi 6
- various fixes
* EHT/IEEE 802.11be/Wi-Fi 7
- add preliminary support
* SAE: add support for fetching the password from a RADIUS server
* support OpenSSL 3.0 API changes
* support background radar detection and CAC with some additional
drivers
* support RADIUS ACL/PSK check during 4-way handshake (wpa_psk_radius=3)
* EAP-SIM/AKA: support IMSI privacy
* improve 4-way handshake operations
- use Secure=1 in message 3 during PTK rekeying
* OCV: do not check Frequency Segment 1 Channel Number for 160 MHz cases
to avoid interoperability issues
* support new SAE AKM suites with variable length keys
* support new AKM for 802.1X/EAP with SHA384
* extend PASN support for secure ranging
* FT: Use SHA256 to derive PMKID for AKM 00-0F-AC:3 (FT-EAP)
- this is based on additional details being added in the IEEE 802.11
standard
- the new implementation is not backwards compatible
* improved ACS to cover additional channel types/bandwidths
* extended Multiple BSSID support
* fix beacon protection with FT protocol (incorrect BIGTK was provided)
* support unsynchronized service discovery (USD)
* add preliminary support for RADIUS/TLS
* add support for explicit SSID protection in 4-way handshake
(a mitigation for CVE-2023-52424; disabled by default for now, can be
enabled with ssid_protection=1)
* fix SAE H2E rejected groups validation to avoid downgrade attacks
* use stricter validation for some RADIUS messages
* a large number of other fixes, cleanup, and extensions
2022-01-16 - v2.10 2022-01-16 - v2.10
* SAE changes * SAE changes
- improved protection against side channel attacks - improved protection against side channel attacks

View file

@ -2,7 +2,7 @@ hostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP
Authenticator and RADIUS authentication server Authenticator and RADIUS authentication server
================================================================ ================================================================
Copyright (c) 2002-2022, Jouni Malinen <j@w1.fi> and contributors Copyright (c) 2002-2024, Jouni Malinen <j@w1.fi> and contributors
All Rights Reserved. All Rights Reserved.
This program is licensed under the BSD license (the one with This program is licensed under the BSD license (the one with

View file

@ -21,7 +21,7 @@
static const char *const hostapd_cli_version = static const char *const hostapd_cli_version =
"hostapd_cli v" VERSION_STR "\n" "hostapd_cli v" VERSION_STR "\n"
"Copyright (c) 2004-2022, Jouni Malinen <j@w1.fi> and contributors"; "Copyright (c) 2004-2024, Jouni Malinen <j@w1.fi> and contributors";
static struct wpa_ctrl *ctrl_conn; static struct wpa_ctrl *ctrl_conn;
static int hostapd_cli_quit = 0; static int hostapd_cli_quit = 0;

View file

@ -555,7 +555,7 @@ static void show_version(void)
"hostapd v%s\n" "hostapd v%s\n"
"User space daemon for IEEE 802.11 AP management,\n" "User space daemon for IEEE 802.11 AP management,\n"
"IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator\n" "IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator\n"
"Copyright (c) 2002-2022, Jouni Malinen <j@w1.fi> " "Copyright (c) 2002-2024, Jouni Malinen <j@w1.fi> "
"and contributors\n", "and contributors\n",
VERSION_STR); VERSION_STR);
} }

View file

@ -9,6 +9,6 @@
#define GIT_VERSION_STR_POSTFIX "" #define GIT_VERSION_STR_POSTFIX ""
#endif /* GIT_VERSION_STR_POSTFIX */ #endif /* GIT_VERSION_STR_POSTFIX */
#define VERSION_STR "2.11-devel" VERSION_STR_POSTFIX GIT_VERSION_STR_POSTFIX #define VERSION_STR "2.11" VERSION_STR_POSTFIX GIT_VERSION_STR_POSTFIX
#endif /* VERSION_H */ #endif /* VERSION_H */

View file

@ -1,5 +1,55 @@
ChangeLog for wpa_supplicant ChangeLog for wpa_supplicant
2024-07-20 - v2.11
* Wi-Fi Easy Connect
- add support for DPP release 3
- allow Configurator parameters to be provided during config exchange
* MACsec
- add support for GCM-AES-256 cipher suite
- remove incorrect EAP Session-Id length constraint
- add hardware offload support for additional drivers
* HE/IEEE 802.11ax/Wi-Fi 6
- support BSS color updates
- various fixes
* EHT/IEEE 802.11be/Wi-Fi 7
- add preliminary support
* support OpenSSL 3.0 API changes
* improve EAP-TLS support for TLSv1.3
* EAP-SIM/AKA: support IMSI privacy
* improve mitigation against DoS attacks when PMF is used
* improve 4-way handshake operations
- discard unencrypted EAPOL frames in additional cases
- use Secure=1 in message 2 during PTK rekeying
* OCV: do not check Frequency Segment 1 Channel Number for 160 MHz cases
to avoid interoperability issues
* support new SAE AKM suites with variable length keys
* support new AKM for 802.1X/EAP with SHA384
* improve cross-AKM roaming with driver-based SME/BSS selection
* PASN
- extend support for secure ranging
- allow PASN implementation to be used with external programs for
Wi-Fi Aware
* FT: Use SHA256 to derive PMKID for AKM 00-0F-AC:3 (FT-EAP)
- this is based on additional details being added in the IEEE 802.11
standard
- the new implementation is not backwards compatible, but PMKSA
caching with FT-EAP was, and still is, disabled by default
* support a pregenerated MAC (mac_addr=3) as an alternative mechanism
for using per-network random MAC addresses
* EAP-PEAP: require Phase 2 authentication by default (phase2_auth=1)
to improve security for still unfortunately common invalid
configurations that do not set ca_cert
* extend SCS support for QoS Characteristics
* extend MSCS support
* support unsynchronized service discovery (USD)
* add support for explicit SSID protection in 4-way handshake
(a mitigation for CVE-2023-52424; disabled by default for now, can be
enabled with ssid_protection=1)
- in addition, verify SSID after key setup when beacon protection is
used
* fix SAE H2E rejected groups validation to avoid downgrade attacks
* a large number of other fixes, cleanup, and extensions
2022-01-16 - v2.10 2022-01-16 - v2.10
* SAE changes * SAE changes
- improved protection against side channel attacks - improved protection against side channel attacks

View file

@ -1,7 +1,7 @@
wpa_supplicant wpa_supplicant
============== ==============
Copyright (c) 2003-2022, Jouni Malinen <j@w1.fi> and contributors Copyright (c) 2003-2024, Jouni Malinen <j@w1.fi> and contributors
All Rights Reserved. All Rights Reserved.
This program is licensed under the BSD license (the one with This program is licensed under the BSD license (the one with

View file

@ -29,7 +29,7 @@
static const char *const wpa_cli_version = static const char *const wpa_cli_version =
"wpa_cli v" VERSION_STR "\n" "wpa_cli v" VERSION_STR "\n"
"Copyright (c) 2004-2022, Jouni Malinen <j@w1.fi> and contributors"; "Copyright (c) 2004-2024, Jouni Malinen <j@w1.fi> and contributors";
#define VENDOR_ELEM_FRAME_ID \ #define VENDOR_ELEM_FRAME_ID \
" 0: Probe Req (P2P), 1: Probe Resp (P2P) , 2: Probe Resp (GO), " \ " 0: Probe Req (P2P), 1: Probe Resp (P2P) , 2: Probe Resp (GO), " \

View file

@ -73,7 +73,7 @@
const char *const wpa_supplicant_version = const char *const wpa_supplicant_version =
"wpa_supplicant v" VERSION_STR "\n" "wpa_supplicant v" VERSION_STR "\n"
"Copyright (c) 2003-2022, Jouni Malinen <j@w1.fi> and contributors"; "Copyright (c) 2003-2024, Jouni Malinen <j@w1.fi> and contributors";
const char *const wpa_supplicant_license = const char *const wpa_supplicant_license =
"This software may be distributed under the terms of the BSD license.\n" "This software may be distributed under the terms of the BSD license.\n"