Signed-off-by: Chuanhong Guo
---
target/linux/ramips/image/Makefile | 18 +-
1 file changed, 17 insertions(+), 1 deletion(-)
diff --git a/target/linux/ramips/image/Makefile
b/target/linux/ramips/image/Makefile
index f5166f8ae1..10e9edd3bb 100644
--- a/target/linux/ramips/image/M
This is an example of using OKLI loader and will not be part of final
commits.
First uImage header covers loader + kernel so that the original firmware
mtdsplit can be used.
---
target/linux/ramips/image/Makefile | 10 ++
target/linux/ramips/image/mt7620.mk | 1 +
target/linux/ramips/ima
OKLI mode of our lzma-loader in ramips still contains
left-over bits from ar71xx and isn't used before.
This patchset fixes it so that it can be used in
future devices.
(e.g. https://github.com/openwrt/openwrt/pull/2645)
Chuanhong Guo (3):
ramips: lzma-loader: make FLASH_START configurable
ram
FLASH_START is supposed to point at the memory area where NOR flash are
mapped. We currently have an incorrect FLASH_START copied from ar71xx
back then and the loader doesn't work under OKLI mode.
On ramips, mt7621 has it's flash mapped to 0x1fc0 and other SoCs
uses 0x1c00. This commit make
The LSM (Linux security mechanism) list is the successor of the now
legacy *major LSM*. Instead of defining a single security mechanism the
LSM symbol is a comma separated list of mechanisms to load.
Until recently OpenWrt would only support DAC (Unix discretionary access
controls) which don't req
And since we are using mac80211 5.8, let's also switch the ath10k-ct
driver to the new 5.8 version.
Signed-off-by: Stijn Tintel
---
package/kernel/ath10k-ct/Makefile | 10 +-
.../164-ath10k-commit-rates-from-mac80211.patch| 6 +++---
...GPIO-controlling-supp
Signed-off-by: Rosen Penev
---
package/utils/util-linux/Makefile | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/package/utils/util-linux/Makefile
b/package/utils/util-linux/Makefile
index 0fc9819c58..05ceaa413e 100644
--- a/package/utils/util-linux/Makefile
+++ b/package/u
kdump was removed in 7acd257ae67b4ca94f8c23cb8bda0ee0709b9216
gdb can be used as an alternative.
Backported patch to fix compilation with GCC10.
Backported several openembedded patches, some of which are upstream
backports.
Signed-off-by: Rosen Penev
---
package/boot/kexec-tools/Makefile
Fixes compilation with GCC 10.
Signed-off-by: Rosen Penev
---
package/devel/trace-cmd/Makefile | 25 +++
.../patches/110-mac80211_tracepoint.patch | 10
.../devel/trace-cmd/patches/120-limits.patch | 24 --
.../devel/trace-cmd/patches/12
As sys/cdefs.h is no longer available, a __P definition is needed.
Fixes compilation with rp-pppoe-server.
Signed-off-by: Rosen Penev
---
package/network/services/ppp/Makefile | 2 +-
package/network/services/ppp/patches/610-__P.patch | 14 ++
2 files changed, 15 inser
GCC 10 defaults to fno-common, which demands unique defenitions.
Patch taken from buildroot.
Signed-off-by: Rosen Penev
---
package/network/utils/iftop/Makefile | 2 +-
.../utils/iftop/patches/010-gcc10.patch | 57 +++
2 files changed, 58 insertions(+), 1 deletio
This release of Mbed TLS provides bug fixes and minor enhancements. This
release includes fixes for security issues and the most notable of them
are described in more detail in the security advisories.
* Local side channel attack on RSA and static Diffie-Hellman
* Local side channel attack on clas
The Ed25519 key pairs are much shorter than RSA pairs and are supported
by default in OpenSSH. Looking at websites explaining how to create new
SSH keys, many suggest using Ed25519 rather than RSA, however consider
the former as not yet widely established. OpenWrt likely has a positive
influence on
On 9/1/20 12:45 AM, Yousong Zhou wrote:
> It's worth mentioning that recent versions of macos since 10.15 have a
> restriction on certificate validity period, self-signed or not. It's
> a strong restriction that the browser ui will have no buttons or knobs
> to bypass the certificate validation, r
On Tue, Sep 01, 2020 at 06:13:53PM +0300, Hannu Nyman wrote:
> Heads up, the usage of the new fakeroot package has failed in a major way in
> buildbot, and the phase2 packages buildbot has failed to build any package
> for 1-2 days.
Yes, it has been a busy night once I had realized what was going
Heads up, the usage of the new fakeroot package has failed in a major way in
buildbot, and the phase2 packages buildbot has failed to build any package
for 1-2 days.
That has caused ALL master snapshot downloadable packages to be removed from
the download server for most package archs. The dow
Besides the "project management" concerns expressed in my earlier note, I also
share Karl Palsson's worries...
> On Sep 1, 2020, at 9:04 AM, Karl Palsson wrote:
>
> With this change, the very first thing users see is a browser
> warning telling the user very very very bad things about what
> th
Forgive me for chiming in now, for I have not been following the discussion
closely.
Is this change (specifically, using these certs for "ordinary operation" of
OpenWrt) being considered for the 20.0x release? Would it delay the RC1 release
in any way?
If so, I believe we should move it off th
Yousong Zhou wrote:
> It's worth mentioning that recent versions of macos since 10.15
> have a restriction on certificate validity period, self-signed
> or not. It's a strong restriction that the browser ui will have
> no buttons or knobs to bypass the certificate validation,
> rendering such sit
Paul Spooren wrote:
> Hi team,
>
> I recently rewrote px5g[1] to use WolfSSL instead of MbedTLS,
> as the former will be included in OpenWrt 20.x per default.
Cool, more options for ssl libraries is always good.
>
> If px5g is added to the next release, certificates are
> generated on first b
This also sets the ABI_VERSION as this is a versioned shared library.
The ipk sizes for mips_24Kc change like this:
old:
jansson_2.12-1_mips_24kc.ipk18.692
new:
jansson4_2.13.1-1_mips_24kc.ipk 19.171
Signed-off-by: Hauke Mehrtens
---
package/libs/jansson/Makefile | 5 +++--
1 file changed,
The ipk sizes for mips_24Kc change like this:
old:
libnftnl12_1.1.7-1_mips_24kc.ipk47.459
new:
libnftnl12_1.1.7-2_mips_24kc.ipk45.742
Signed-off-by: Hauke Mehrtens
---
package/libs/libnftnl/Makefile | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/package
The ipk sizes for mips_24Kc change like this:
old:
libnftnl12_1.1.5-1_mips_24kc.ipk46.252
new:
libnftnl12_1.1.7-1_mips_24kc.ipk47.459
Signed-off-by: Hauke Mehrtens
---
package/libs/libnftnl/Makefile | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/package/
The ipk sizes for mips_24Kc change like this:
old:
nftables-json_0.9.6-1_mips_24kc.ipk 231.968
nftables-nojson_0.9.6-1_mips_24kc.ipk 204.731
new:
nftables-json_0.9.6-2_mips_24kc.ipk 221.894
nftables-nojson_0.9.6-2_mips_24kc.ipk 193.932
Signed-off-by: Hauke Mehrtens
---
package/netwo
The ipk sizes for mips_24Kc change like this:
old:
nftables-json_0.9.3-1_mips_24kc.ipk 220.262
nftables-nojson_0.9.3-1_mips_24kc.ipk 192.937
new:
nftables-json_0.9.6-1_mips_24kc.ipk 231.968
nftables-nojson_0.9.6-1_mips_24kc.ipk 204.731
Signed-off-by: Hauke Mehrtens
---
package/netwo
The ipk sizes for mips_24Kc change like this:
old:
jansson4_2.13.1-1_mips_24kc.ipk 19.171
new:
jansson4_2.13.1-2_mips_24kc.ipk 18.936
Signed-off-by: Hauke Mehrtens
---
package/libs/jansson/Makefile | 5 -
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a/package/libs/jansson/Make
The ipk sizes for mips_24Kc change like this:
old:
libwolfssl24_4.5.0-stable-1_mips_24kc.ipk 391.545
new:
libwolfssl24_4.5.0-stable-2_mips_24kc.ipk 387.439
Signed-off-by: Hauke Mehrtens
---
package/libs/wolfssl/Makefile | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
dif
The ipk sizes for mips_24Kc change like this:
old:
iw_5.4-1_mips_24kc.ipk 35.767
iw-full_5.4-1_mips_24kc.ipk 68.423
new:
iw_5.8-1_mips_24kc.ipk 36.883
iw-full_5.8-1_mips_24kc.ipk 71.992
Signed-off-by: Hauke Mehrtens
---
package/network/utils/iw/Makefile |
> Op 1 sep. 2020, om 01:21 heeft Daniel Golle het
> volgende geschreven:
>
> On Tue, Sep 01, 2020 at 06:45:02AM +0800, Yousong Zhou wrote:
>> It's worth mentioning that recent versions of macos since 10.15 have a
>> restriction on certificate validity period, self-signed or not. It's
>> a st
Henrique de Moraes Holschuh writes:
> It would be *nice* if we could easily deploy extremely restricted
> self-signed CAs that can only sign a numeric pattern hostname under
> .iot... That extremely restricted CA would get
> "approved" by something from . that the browser would
> use to stop pes
30 matches
Mail list logo