Lines Matching full:support

5 	  - add support for DPP release 3
10 - add preliminary support
11 * SAE: add support for fetching the password from a RADIUS server
12 * support OpenSSL 3.0 API changes
13 * support background radar detection and CAC with some additional
15 * support RADIUS ACL/PSK check during 4-way handshake (wpa_psk_radius=3)
16 * EAP-SIM/AKA: support IMSI privacy
21 * support new SAE AKM suites with variable length keys
22 * support new AKM for 802.1X/EAP with SHA384
23 * extend PASN support for secure ranging
29 * extended Multiple BSSID support
31 * support unsynchronized service discovery (USD)
32 * add preliminary support for RADIUS/TLS
33 * add support for explicit SSID protection in 4-way handshake
46 - added support for the hash-to-element mechanism (sae_pwe=1 or
49 - added support for SAE-PK
57 * added support for using OpenSSL 3.0
58 * fixed various issues in experimental support for EAP-TEAP server
61 support cases with very large certificates) for the EAP server
62 * added support for DPP release 2 (Wi-Fi Device Provisioning Protocol)
63 * extended HE (IEEE 802.11ax) support, including 6 GHz support
66 * dropped support for libnl 1.1
67 * added support for nl80211 control port for EAPOL frame TX/RX
72 * added support for Beacon protection
73 * added support for Extended Key ID for pairwise keys
74 * removed WEP support from the default build (CONFIG_WEP=y can be used
76 * added a build option to remove TKIP support (CONFIG_NO_TKIP=y)
77 * added support for Transition Disable mechanism to allow the AP to
79 * added support for PASN
80 * added EAP-TLS server support for TLS 1.3 (disabled by default for now)
96 * added support for regulatory WMM limitation (for ETSI)
97 * added support for MACsec Key Agreement using IEEE 802.1X/PSK
98 * added experimental support for EAP-TEAP server (RFC 7170)
99 * added experimental support for EAP-TLS server with TLS v1.3
100 * added support for two server certificates/keys (RSA/ECC)
109 - added support for SAE Password Identifier
137 - added support for release number 3
139 * added support for RSN operating channel validation
141 * added Multi-AP protocol support
166 * added support for FILS (IEEE 802.11ai) shared key authentication
167 * added support for OWE (Opportunistic Wireless Encryption, RFC 8110;
169 * added support for DPP (Wi-Fi Device Provisioning Protocol)
177 - added support for wildcard R0KH/R1KH
183 - added IEEE VLAN support (including tagged VLANs)
184 - added support for SHA384 based AKM
187 - added support for configuring SAE password separately of the
196 - added support for Password Identifier
197 * hostapd_cli: added support for command history and completion
198 * added support for requesting beacon report
205 * added support for using wolfSSL cryptographic library
209 - added support for setting Venue URL ANQP-element (venue_url)
210 - added support for advertising Hotspot 2.0 operator icons
211 - added support for Roaming Consortium Selection element
212 - added support for Terms and Conditions
213 - added support for OSEN connection in a shared RSN BSS
214 * added support for using OpenSSL 1.1.1
215 * added EAP-pwd server support for salted passwords
222 * extended channel switch support for VHT bandwidth changes
223 * added support for configuring new ANQP-elements with
234 * EAP-pwd: added support for Brainpool Elliptic Curves
240 - support SHA384 and SHA512 hashes
241 - support TLS v1.2 signature algorithm with SHA384 and SHA512
242 - support PKCS #5 v2.0 PBES2
243 - support PKCS #5 with PKCS #12 style key decryption
244 - minimal support for PKCS #12
245 - support OCSP stapling (including ocsp_multi)
246 * added support for OpenSSL 1.1 API changes
247 - drop support for OpenSSL 0.9.8
248 - drop support for OpenSSL 1.0.0
249 * EAP-PEAP: support fast-connect crypto binding
266 * extended VLAN support (per-STA vif, etc.)
269 - added support for full station state operations
272 * added initial MBO support; number of extensions to WNM BSS Transition
285 * added command completion support to hostapd_cli
304 * disable HT for a station that does not support WMM/QoS
305 * added support for hashed password (NtHash) in EAP-pwd server
307 * added EAP-EKE server support for deriving Session-Id
313 * added support for Brainpool Elliptic Curves with SAE
315 * added support for CCMP-256 and GCMP-256 as group ciphers with FT
319 * added EAP server support for TLS session resumption
332 * add support for Acct-Multi-Session-Id in RADIUS Accounting messages
333 * add support for PMKSA caching with SAE
334 * add support for generating BSS Load element (bss_load_update_period)
337 * add support for learning STA IPv4/IPv6 addresses and configuring
338 ProxyARP support
339 * dropped support for the madwifi driver interface
340 * add support for Suite B (128-bit and 192-bit level) key management and
347 * add support for EAP Re-Authentication Protocol (ERP)
351 * add support for vendor specific VHT extension to enable 256 QAM rates
356 - support Acct-Multi-Session-Id as an identifier
378 * added support for number of new RADIUS attributes from RFC 7268
393 * extended VHT support
401 * extended HT40 co-ex support to allow dynamic channel width changes
403 * fixed HT40 co-ex support to check for overlapping 20 MHz BSS
415 * added support for NAS-IP-Address, NAS-identifier, and NAS-IPv6-Address
420 - support Hotspot 2.0 Release 2
434 - support vendor specific driver command
443 - add minimal RADIUS accounting server support (hostapd-as-server);
448 - MAC ACL support for testing purposes
450 * extended WPS per-station PSK to support ER case
456 * added support for postponing FT response in case PMK-R1 needs to be
460 * remove WPS 1.0 only support, i.e., WSC 2.0 support is now enabled
477 * added support for simultaneous authentication of equals (SAE) for
481 - support split wiphy dump
491 * added support for DFS (processing radar detection events, CAC, channel
500 * added support for sending debug info to Linux tracing (-T on command
504 * added support for using Protected Dual of Public Action frames for
506 * added support for WPS+NFC updates
527 - added support for fragmentation
531 * added preliminary support for using TLS v1.2 (CONFIG_TLSV12=y)
535 * added support for getting per-device PSK from RADIUS Tunnel-Password
536 * added support for libnl 3.2 and newer
547 * added support for WFA Hotspot 2.0
555 * EAP-AKA: added support for AT_COUNTER_TOO_SMALL
562 * added support for canceling WPS operations with hostapd_cli wps_cancel
572 * added support for Chargeable-User-Identity (RFC 4372)
576 * added support for RADIUS dynamic authorization server (RFC 5176)
577 * added initial support for WNM operations
581 - removed obsoleted WPS_OOB command (including support for deprecated
583 * added FT support for drivers that implement MLME internally
584 * added SA Query support for drivers that implement MLME internally
590 * added support for configuring GCMP cipher for IEEE 802.11ad
591 * added support for 256-bit AES with internal TLS implementation
601 * added support for using SQLite for the eap_user database
608 * Add channel selection support in hostapd. See hostapd.conf.
609 * Add support for IEEE 802.11v Time Advertisement mechanism with UTC
618 * atheros: Add support for IEEE 802.11w configuration.
619 * bsd: Add support for setting HT values in IFM_MMASK.
626 hostapd to reject association with any station that does not support
628 * Add support for writing debug log to a file using "-f" option. Also
666 runtime and support dynamic AP PIN management.
683 * WPS 2.0: Add support for WPS 2.0 (CONFIG_WPS2)
688 - Add support for AuthorizedMACs attribute.
693 * EAP server: Add support for configuring fragment size (see
698 * Interworking: Support added for 802.11u. Enable in .config with
701 * Android: Add build and runtime support for Android hostapd.
704 * TLS: Add support for tls_disable_time_checks=1 in client mode.
706 - Add support for TLS v1.1 (RFC 4346). Enable with build parameter
735 * hostapd_cli: add support for action script operations (run a script
752 * added internal debugging mechanism with backtrace support and memory
755 * WPS: add support for dynamically selecting whether to provision the
757 * added support for WDS (4-address frame) mode with per-station virtual
772 * added support for external Registrars with WPS (UPnP transport)
776 * added support for WPS USBA out-of-band mechanism with USB Flash
791 * driver_nl80211: multiple updates to provide support for new Linux
799 * added support for NFC out-of-band mechanism with WPS
800 * added preliminary support for IEEE 802.11r RIC processing
803 * added support for Wi-Fi Protected Setup (WPS)
807 external WLAN Manager Registrars are not supported); WPS support can
814 * added support for generating Country IE based on nl80211 regulatory
818 * added support for EAP-AKA' (draft-arkko-eap-aka-kdf)
819 * added support for using driver_test over UDP socket
844 * added support for SHA-256 as X.509 certificate digest when using the
850 * added support for setting VLAN ID for STAs based on local MAC ACL
856 * added support for using SHA256-based stronger key derivation for WPA2
873 * added support for EAP Sequences in EAP-FAST Phase 2
874 * added support for EAP-TNC (Trusted Network Connect)
878 * added support for optional cryptobinding with PEAPv0
879 * added fragmentation support for EAP-TNC
880 * added support for fragmenting EAP-TTLS/PEAP/FAST Phase 2 (tunneled)
882 * added support for opportunistic key caching (OKC)
887 * updated FT support to use the latest draft, IEEE 802.11r/D9.0
902 * added support for pending EAP processing in EAP-{PEAP,TTLS,FAST}
912 * added support for protecting EAP-AKA/Identity messages with
914 * added support for protected result indication with AT_RESULT_IND for
916 * added support for configuring EAP-TTLS phase 2 non-EAP methods in
924 * added support for EAP-IKEv2 (draft-tschofenig-eap-ikev2-15.txt);
933 * added support for EAP-FAST server method to the integrated EAP
940 either need to support this or will have to use the WPA/RSN IEs from
942 not have support for this)
943 * updated FT support to use the latest draft, IEEE 802.11r/D8.0
946 * added experimental IEEE 802.11r/D6.0 support
964 * added support for sending EAP-AKA Notifications in error cases
967 * RADIUS server: added support for processing duplicate messages
972 * added support for configuring and controlling multiple BSSes per
977 * added support for dynamic VLAN configuration (i.e., selecting VLAN-ID
979 VLAN support from the kernel driver/802.11 stack and this is
989 (Note: this requires driver support to work properly.)
991 * hlr_auc_gw: added support for GSM-Milenage (for EAP-SIM)
992 * hlr_auc_gw: added support for reading per-IMSI Milenage keys and
1007 * added support for RADIUS Authentication Server MIB (RFC 2619)
1013 * added support for EAP Generalized Pre-Shared Key (EAP-GPSK,
1026 * added support for EAP-SAKE (no EAP method number allocated yet, so
1047 * driver_madwifi: added support for getting station RSN IE from
1057 * driver_test: added better support for multiple APs and STAs by using
1060 * added support for EAP expanded type (vendor specific EAP methods)
1067 * added support for EAP methods to use callbacks to external programs
1072 * added support for using EAP-SIM pseudonyms and fast re-authentication
1073 * added support for EAP-AKA in the integrated EAP authenticator
1074 * added support for matching EAP identity prefixes (e.g., "1"*) in EAP
1077 * added support for storing EAP user password as NtPasswordHash instead
1091 * driver_madwifi: added support for madwifi-ng
1094 * added support for replacing user identity from EAP with RADIUS
1098 does not support better way of doing this with Class attribute)
1110 * added experimental support for EAP-PSK
1111 * added support for WE-19 (hostap, madwifi)
1131 * driver_test: added support for testing hostapd with wpa_supplicant
1138 * driver_madwifi: added support for RADIUS accounting
1139 * driver_madwifi: added preliminary support for compiling against 'BSD'
1143 * added support for reading additional certificates from PKCS#12 files
1148 * added support for more than one Class attribute in RADIUS packets
1149 * added support for verifying certificate revocation list (CRL) when
1154 * added support for including network information into
1160 * added support for sending TLS alerts and aborting authentication
1166 * added support for RADIUS over IPv6; own_ip_addr, auth_server_addr,
1168 to be added to .config to include IPv6 support); for RADIUS server,
1171 * added experimental support for EAP-PAX
1178 * added support for configuring a forced PEAP version based on the
1199 * added support for configuring multiple allowed EAP types for Phase 2
1205 * added support for EAP-PEAP in the integrated EAP authenticator
1206 * added support for EAP-GTC in the integrated EAP authenticator
1207 * added support for configuring list of EAP methods for Phase 1 so that
1210 * added support for EAP-TTLS in the integrated EAP authenticator
1211 * added support for EAP-SIM in the integrated EAP authenticator
1212 * added support for using hostapd as a RADIUS authentication server
1222 * added support for EAP-MSCHAPv2 in the integrated EAP authenticator
1225 * added support for integrated EAP-TLS authentication (new hostapd.conf
1229 * added support for reading PKCS#12 (PFX) files (as a replacement for
1233 * added support for Acct-{Input,Output}-Gigawords
1234 * added support for Event-Timestamp (in RADIUS Accounting-Requests)
1235 * added support for RADIUS Authentication Client MIB (RFC2618)
1236 * added support for RADIUS Accounting Client MIB (RFC2620)
1242 * added support for multiple WPA pre-shared keys (e.g., one for each
1246 * added support for multiple driver interfaces to allow hostapd to be
1266 * added support for strict GTK rekeying (wpa_strict_rekey in
1289 * added support for FreeBSD and driver interface for the BSD net80211
1311 * added support for copying RADIUS Attribute 'Class' from
1332 * added support for Acct-Interim-Interval:
1346 * added support for Accounting-On and Accounting-Off messages