On Fri, 24 Jul 2020 at 09:53, Jason A. Donenfeld wrote:
>
> Testing the process once like that isn't a good testing methodology
> representative of anything at all.
I completely agree, this wasn't an objective test at all. I was merely
illustrating what a normal user will do, generate a key pair
Hi again, Jason,
On Fri, 24 Jul 2020 at 10:12, Jason A. Donenfeld wrote:
>
> This might be a typical use case for you, but some people are running
> scripts that generate lots of keys. There may be a good argument that
> if you're doing that kind of thing, a tiny MIPS router isn't the right
> har
Hi, Petr,
On Fri, 24 Jul 2020 at 11:08, Petr Štetiar wrote:
>
> perhaps you should send such dependencies as patch series next time.
Will do, for sure. At the time I was still working on my git workflow
and didn't know how to reorder patches in my tree, sorry about that.
> Using /sbin/swapon se
Signed-off-by: Rui Salvaterra
---
package/system/zram-swap/files/zram.init | 18 +-
1 file changed, 9 insertions(+), 9 deletions(-)
diff --git a/package/system/zram-swap/files/zram.init
b/package/system/zram-swap/files/zram.init
index a6126e578f..9df38d2288 100755
--- a/package
Signed-off-by: Rui Salvaterra
---
package/system/zram-swap/files/zram.init | 18 +-
1 file changed, 9 insertions(+), 9 deletions(-)
diff --git a/package/system/zram-swap/files/zram.init
b/package/system/zram-swap/files/zram.init
index a6126e578f..f31a87438c 100755
--- a/package
Hi, Henrique,
On Fri, 24 Jul 2020 at 16:51, Henrique de Moraes Holschuh
wrote:
>
> Hmm, why not fix this for *good* and not depend on they being enabled in
> busybox "by default"?
>
> I'd just depend on the required busybox features and applets explicitly
> (or select them) *on top of what your p
build time.
Fixes: 0bd7dfa3ed60588ec83a8f60f48b6991ebb16940
Signed-off-by: Rui Salvaterra
---
package/system/zram-swap/Makefile| 2 +-
package/system/zram-swap/files/zram.init | 18 +-
2 files changed, 10 insertions(+), 10 deletions(-)
diff --git a/package/system/zram-swap
Tested on an AirGrid M2 (AG‑HP‑2G16).
Signed-off-by: Rui Salvaterra
---
package/boot/uboot-envtools/files/ath79 | 1 +
1 file changed, 1 insertion(+)
diff --git a/package/boot/uboot-envtools/files/ath79
b/package/boot/uboot-envtools/files/ath79
index 5cd64f4ffd..0442e9e485 100644
--- a
image.
Signed-off-by: Rui Salvaterra
---
package/network/utils/wireguard-tools/Makefile | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/package/network/utils/wireguard-tools/Makefile
b/package/network/utils/wireguard-tools/Makefile
index 2137a8b4a1..e7696bb234 100644
--- a
zram_reset: enforcing defaults via /sys/block/zram0/reset
sh: write error: Out of memory
mkswap: image is too small
swapon: /dev/zram0: Invalid argument
root@airgrid:/etc/config#
Fix this by defaulting to traditional lzo, which works fine and is always
available.
Signed-off-by: Rui Salvaterra
--
, strongswan and vpn-policy-routing.
[1] http://lists.busybox.net/pipermail/busybox/2020-July/088164.html
Signed-off-by: Rui Salvaterra
---
.../302-ip-rule-add-support-for-fwmask.patch | 90 +++
1 file changed, 90 insertions(+)
create mode 100644
package/utils/busybox/patches
, strongswan and vpn-policy-routing.
[1] http://lists.busybox.net/pipermail/busybox/2020-July/088164.html
Signed-off-by: Rui Salvaterra
---
package/utils/busybox/Makefile| 2 +-
.../302-ip-rule-add-support-for-fwmask.patch | 90 +++
2 files changed, 91 insertions
Signed-off-by: Rui Salvaterra
---
package/system/zram-swap/Makefile| 2 +-
package/system/zram-swap/files/zram.init | 18 +-
2 files changed, 10 insertions(+), 10 deletions(-)
diff --git a/package/system/zram-swap/Makefile
b/package/system/zram-swap/Makefile
index 5c132c9062
scard")
v5: addressed Adrian Schmutzler's comments
Signed-off-by: Rui Salvaterra
---
package/system/zram-swap/Makefile| 4 ++--
package/system/zram-swap/files/zram.init | 18 +-
2 files changed, 11 insertions(+), 11 deletions(-)
diff --git a/package/system/zra
scard")
v5: addressed Adrian Schmutzler's comments
Signed-off-by: Rui Salvaterra
---
package/system/zram-swap/Makefile| 4 ++--
package/system/zram-swap/files/zram.init | 18 +-
2 files changed, 11 insertions(+), 11 deletions(-)
diff --git a/package/system/zra
If not needed, disabling scp allows for a nice size reduction.
Dropbear executable size comparison:
153621 bytes (baseline)
133077 bytes (without scp)
In other words, we trim a total of 20544 bytes.
Signed-off-by: Rui Salvaterra
---
package/network/services/dropbear/Config.in | 4
On Thu, 17 Sep 2020 at 10:38, e9hack wrote:
>
> Hi,
>
> I think commit 419f149e482641ddc520f80a7ab2038f7e2ebc8a is not the proper fix
> for the described issue.
>
> The kernel module lzo-rle is still missing. To solve this, it must be
> installed on the root-fs:
>
> diff --git a/package/kernel/l
The vDSO is used to accelerate some syscalls. It's working fine on other ARM
targets (e.g. sunxi), let's also enable it on mvebu.
Signed-off-by: Rui Salvaterra
---
target/linux/mvebu/config-5.4 | 1 +
1 file changed, 1 insertion(+)
diff --git a/target/linux/mvebu/config-5.4 b/ta
Hi, Hauke,
On Sat, 10 Oct 2020 at 19:56, Hauke Mehrtens wrote:
>
> Hi,
>
> I would prefer if we activate CONFIG_VDSO on all (arm) targets.
>
> Could you please add change CONFIG_VDSO to y in these files:
> target/linux/generic/config-4.19
> target/linux/generic/config-5.4
>
> And then remove it f
The vDSO is used to accelerate some syscalls. It should work fine wherever it's
available, so enable it globally for all targets.
Signed-off-by: Rui Salvaterra
---
target/linux/generic/config-4.19 | 2 +-
target/linux/generic/config-5.4 | 2 +-
target/linux/ipq40xx/config
.
Signed-off-by: Rui Salvaterra
---
package/network/services/dropbear/Config.in | 21 +
package/network/services/dropbear/Makefile | 12 +---
2 files changed, 30 insertions(+), 3 deletions(-)
diff --git a/package/network/services/dropbear/Config.in
b/package/network
executable sizes (ath79, -O2):
RSA + Ed25519: 210101 bytes
RSA only: 197765 bytes
Ed25519 only: 189637 bytes
Signed-off-by: Rui Salvaterra
---
package/network/services/dropbear/Config.in | 27 ++-
package/network/services/dropbear/Makefile| 23
would fail.
Signed-off-by: Rui Salvaterra
---
package/network/services/dropbear/Config.in | 12
package/network/services/dropbear/Makefile | 13 ++---
2 files changed, 22 insertions(+), 3 deletions(-)
diff --git a/package/network/services/dropbear/Config.in
b/package/network
This patch series enables a much more fine-grained configuration of the public
key, encryption and key exchange algorithms in Dropbear.
Rui Salvaterra (3):
dropbear: create a submenu for public key algorithms
dropbear: create a submenu for encryption algorithms
dropbear: create a submenu
Hi, Adrian,
On Tue, 13 Oct 2020 at 16:52, Adrian Schmutzler
wrote:
>
> > package/network/services/dropbear/files/dropbear.failsafe.ecc
> > create mode 100755
> > package/network/services/dropbear/files/dropbear.failsafe.ed25519
> > rename package/network/services/dropbear/files/{dropbear.failsa
Hi, Adrian,
On Wed, 14 Oct 2020 at 01:22, Adrian Schmutzler
wrote:
>
> I don't care so terribly, so do it as it's most convenient for you.
>
Alright, I'll respin, then. I'd rather get everything right in one go. :)
Thanks,
Rui
___
openwrt-devel maili
executable sizes (ath79, -O2):
RSA + Ed25519: 210101 bytes
RSA only: 197765 bytes
Ed25519 only: 189637 bytes
Signed-off-by: Rui Salvaterra
---
package/network/services/dropbear/Config.in | 27 ++-
package/network/services/dropbear/Makefile| 23
would fail.
Signed-off-by: Rui Salvaterra
---
package/network/services/dropbear/Config.in | 12
package/network/services/dropbear/Makefile | 13 ++---
2 files changed, 22 insertions(+), 3 deletions(-)
diff --git a/package/network/services/dropbear/Config.in
b/package/network
This patch series enables a much more fine-grained configuration of the public
key, encryption and key exchange algorithms in Dropbear.
v2: correct file permissions
Rui Salvaterra (3):
dropbear: create a submenu for public key algorithms
dropbear: create a submenu for encryption algorithms
.
Signed-off-by: Rui Salvaterra
---
package/network/services/dropbear/Config.in | 21 +
package/network/services/dropbear/Makefile | 12 +---
2 files changed, 30 insertions(+), 3 deletions(-)
diff --git a/package/network/services/dropbear/Config.in
b/package/network
MIZE_SPEED, OPENSSL_WITH_ASM
1716068 libcrypto.so.1.1
398788 libssl.so.1.1
Os, 74kc, OPENSSL_OPTIMIZE_SPEED, mips16
1560268 libcrypto.so.1.1
329228 libssl.so.1.1
Os, 74kc, mips16
1343144 libcrypto.so.1.1
308684 libssl.so.1.1
Signed-off-by: Rui Salvaterra
---
package/libs/openssl/Makefile | 4
1 file
SPEED
2019956 libcrypto.so.1.1
443848 libssl.so.1.1
O3, 74kc, OPENSSL_OPTIMIZE_SPEED, OPENSSL_WITH_ASM
2010840 libcrypto.so.1.1
443848 libssl.so.1.1
O3, 74kc
1824148 libcrypto.so.1.1
428384 libssl.so.1.1
Signed-off-by: Rui Salvaterra
---
package/libs/openssl/Config.in | 3 +--
1 file chang
libssl.so.1.1
Signed-off-by: Rui Salvaterra
---
package/libs/openssl/Config.in | 7 +++
package/libs/openssl/Makefile | 7 +--
2 files changed, 12 insertions(+), 2 deletions(-)
diff --git a/package/libs/openssl/Config.in b/package/libs/openssl/Config.in
index 8be6ee732a..fb46676314
This series allows for a more fine-grained control of the library optimisation
settings, opening the opportunity for significant size reduction. More details
in each specific patch.
Rui Salvaterra (3):
openssl: reorganise the config dependencies
openssl: allow the user to choose the
The flag was initialised and tested, but actually never set when a duplicate
section was found.
Signed-off-by: Rui Salvaterra
---
defaults.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/defaults.c b/defaults.c
index 0580bfc..bd48958 100644
--- a/defaults.c
+++ b/defaults.c
@@ -151,6
Zram switched to per-cpu compression streams since Linux 4.7 [1]. Drop the
irrelevant configuration (no-op).
[1]
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/block/zram?h=v4.7&id=43209ea2d17aae1540d4e28274e36404f72702f2
Signed-off-by: Rui Salvat
Hi,
On Tue, 20 Oct 2020 at 08:59, xinglp wrote:
>
> Seems not merged yet. I got the patches from
> https://patchwork.ozlabs.org/project/openwrt/list/ ,
> but failed to apply to package/network/services/dropbear/Makefile
That's strange, but I'm going to check if the series needs to be
rebased,
Hi,
On Tue, 20 Oct 2020 at 09:41, xinglp wrote:
>
>
>> Seems not merged yet. I got the patches from
>> https://patchwork.ozlabs.org/project/openwrt/list/ ,
>> but failed to apply to package/network/services/dropbear/Makefile
>
> I manully edited this file, then I can login to my router with ss
Hi again,
On Tue, 20 Oct 2020 at 11:32, xinglp wrote:
>
> On Tue, Oct 20, 2020 at 5:05 PM Rui Salvaterra wrote:
>>
>> Have you applied the whole series in the correct sequence? I just
>> tested and It applied cleanly against the current master.
>
> Sorry, my bad, i
Zstd is supported by the crypto API since Linux 4.18. Enable this feature and
reveal the package in the configuration section, so the user can select it.
This allows zstd to be used as a compression algorithm in zram, for example.
Signed-off-by: Rui Salvaterra
---
v2: drop conditionals for older
bytes (hostapd-basic-openssl)
Signed-off-by: Rui Salvaterra
---
package/network/services/hostapd/Makefile | 13 +
1 file changed, 13 insertions(+)
diff --git a/package/network/services/hostapd/Makefile
b/package/network/services/hostapd/Makefile
index bb20b7bcd9..b42818fa95 100644
Hi, Daniel,
On Thu, 29 Oct 2020 at 16:16, Daniel Golle wrote:
>
> Please do the same for wpad-basic as well, just to be consistent.
Sure thing, I had even suggested it on IRC. :) Do you prefer a
follow-up patch, or a new series with both patches?
> > Sizes of hostapd on ath79 (74Kc -O2):
> >
Hi, again,
On Thu, 29 Oct 2020 at 17:40, Daniel Golle wrote:
>
> It can even be both in one patch (I'd prefer that).
Alright, will do!
> ...or just use hostapd's built-in crypto instead...
In that case, I'd have a much larger hostapd with full functionality,
even though I only required the bas
built-in crypto).
Signed-off-by: Rui Salvaterra
---
package/network/services/hostapd/Config.in | 2 ++
package/network/services/hostapd/Makefile | 26 ++
2 files changed, 28 insertions(+)
diff --git a/package/network/services/hostapd/Config.in
b/package/network/services/ho
This is required for interoperability with Wi-Fi Enhanced Open (unauthenticated
encryption).
Signed-off-by: Rui Salvaterra
---
package/network/services/hostapd/Makefile | 6 ++
1 file changed, 6 insertions(+)
diff --git a/package/network/services/hostapd/Makefile
b/package/network
Opportunistic Wireless Encryption is needed to create/access encrypted networks
which don't require authentication.
Signed-off-by: Rui Salvaterra
---
v2: reword the commit message.
package/network/services/hostapd/Makefile | 6 ++
1 file changed, 6 insertions(+)
diff --git a/pa
Hostapd supports epoll() since 2014. Let's enable it for better performance.
Signed-off-by: Rui Salvaterra
---
package/network/services/hostapd/files/hostapd-basic.config | 2 +-
package/network/services/hostapd/files/hostapd-full.config | 2 +-
package/network/services/hostapd/
)
Signed-off-by: Rui Salvaterra
---
package/network/services/hostapd/Makefile | 13 +
1 file changed, 13 insertions(+)
diff --git a/package/network/services/hostapd/Makefile
b/package/network/services/hostapd/Makefile
index f076eba88f..8c884386f2 100644
--- a/package/network/services
Hi, everyone!
On Fri, 31 Mar 2023 at 22:28, Daniel Golle wrote:
>
[snipped]
> The point here is not optimization, but finding a good compromise to
> not having to compile **all** packages for **all** CPU architectures.
> The same is btw also true for MIPS and ARM targets. We pick a good
> comp
Hi, everyone!
On Tue, 30 Jan 2024 at 18:16, Christian Marangi (Ansuel)
wrote:
>
> Robert is active in OpenWrt since 2017 and with some recent stats, he
> has more than 310 commits merged in OpenWrt.
> He also have uncounted Reviewed-by tag on various PR and merged commits
> and generally helps in
Keep only the rootdisk.c definition, where it's used.
Signed-off-by: Rui Salvaterra
---
libfstools/common.h | 2 --
1 file changed, 2 deletions(-)
diff --git a/libfstools/common.h b/libfstools/common.h
index 28b82d2..24504d6 100644
--- a/libfstools/common.h
+++ b/libfstools/common.h
@@
On Wed, 3 Apr 2024 at 09:30, Rui Salvaterra wrote:
>
> Keep only the rootdisk.c definition, where it's used.
>
> Signed-off-by: Rui Salvaterra
> ---
> libfstools/common.h | 2 --
> 1 file changed, 2 deletions(-)
>
> diff --git a/libfstools/common.h b/libfstools/c
It's defined in common.h, which rootdisk.c also includes. Remove the redundant
definition from the latter.
Signed-off-by: Rui Salvaterra
---
libfstools/rootdisk.c | 1 -
1 file changed, 1 deletion(-)
diff --git a/libfstools/rootdisk.c b/libfstools/rootdisk.c
index ba7d8c3..910899a 100644
[Replying to all this time]
Hi, John,
On Wed, 12 Feb 2025 at 18:46, John Crispin wrote:
>
> Hi,
>
> starting a [VOTE] to get approval allowing me to begin the development
> of OpenWrt "Two".
>
> "Two" will have all of the features that "One" has with the following
> upgrades.
>
> * MT7988
> * 10
--- Begin Message ---
Hi, Emil,
After pressing send, I realised my choice of words made my previous
email sound harsh, it wasn't my intention, I'm sorry about that. :)
On Thu, 25 Jun 2020 at 18:13, Emil Muratov wrote:
>
> Hi Rui,
> no offence, but I do not have direct commit right to openwrt's r
--- Begin Message ---
Zstd is supported by the crypto API since Linux 4.18. Enable this feature and
reveal the package in the configuration section, so the user can select it.
This allows zstd to be used as a compression algorithm in zram, for example.
Signed-off-by: Rui Salvaterra
---
package
--- Begin Message ---
Zstd is supported by the crypto API since Linux 4.18. Enable this feature and
reveal the package in the configuration section, so the user can select it.
This allows zstd to be used as a compression algorithm in zram, for example.
Signed-off-by: Rui Salvaterra
---
package
301 - 357 of 357 matches
Mail list logo