Skip to content
Snippets Groups Projects
  1. Feb 26, 2022
  2. Feb 25, 2022
  3. Feb 24, 2022
  4. Feb 22, 2022
    • Petr Štetiar's avatar
      wolfssl: fix API breakage of SSL_get_verify_result · b9251e3b
      Petr Štetiar authored
      Backport fix for API breakage of SSL_get_verify_result() introduced in
      v5.1.1-stable.  In v4.8.1-stable SSL_get_verify_result() used to return
      X509_V_OK when used on LE powered sites or other sites utilizing
      relaxed/alternative cert chain validation feature. After an update to
      v5.1.1-stable that API calls started returning X509_V_ERR_INVALID_CA
      error and thus rendered all such connection attempts imposible:
      
       $ docker run -it openwrt/rootfs:x86_64-21.02.2 sh -c "wget https://letsencrypt.org"
       Downloading 'https://letsencrypt.org'
       Connecting to 18.159.128.50:443
       Connection error: Invalid SSL certificate
      
      Fixes: #9283
      References: https://github.com/wolfSSL/wolfssl/issues/4879
      
      
      Signed-off-by: default avatarPetr Štetiar <ynezz@true.cz>
      b9251e3b
    • Daniel Golle's avatar
      mediatek: mt7623: drop RAMFS_COPY_BIN · 9e6a71e8
      Daniel Golle authored
      
      fwtool is now always part of the sysupgrade stage2 ramdisk, so drop
      the no longer needed RAMFS_COPY_BIN variable.
      
      Signed-off-by: default avatarDaniel Golle <daniel@makrotopia.org>
      Unverified
      9e6a71e8
    • Daniel Golle's avatar
      mediatek: mt7622: drop RAMFS_COPY_BIN and RAMFS_COPY_DATA · bb904303
      Daniel Golle authored
      
      Now that both, fw_printenv/fw_setenv and fwtool are always present
      during stage2 sysupgrade, we no longer need to list them in
      RAMFS_COPY_BIN and RAMFS_COPY_DATA in platform.sh.
      Drop both variables as they are now unneeded.
      
      Signed-off-by: default avatarDaniel Golle <daniel@makrotopia.org>
      Unverified
      bb904303
    • Daniel Golle's avatar
      base-files: make sure tools are present in sysupgrade ramdisk · 2baded9e
      Daniel Golle authored
      
      Not all targets create /var/lock or touch /var/lock/fw_printenv.lock in
      their platform.sh. This is problematic as fw_printenv then fails in
      case /var/lock/fw_printenv.lock has not been created by previous calls
      to fw_printenv/fw_setenv before sysupgrade is run.
      
      Targets using fw_printenv/fw_setenv during sysupgrade:
       * ath79/*
       * ipq40xx/*
       * ipq806x/*
       * kirkwood/*
       * layerscape/*
       * mediatek/mt7622
       * mvebu/*
       * ramips/*
       * realtek/*
      
      Targets currently using additional steps in /lib/upgrade/platform.sh
      to make sure /var/lock/fw_printenv.lock (or at least /var/lock)
      actually exists:
       * ath79/* (openmesh devices)
       * ipq40xx/* (linksys devices)
       * ipq806x/* (linksys devices)
       * kirkwood/* (linksys devices)
       * layerscape/*
       * mvebu/cortexa9 (linksys devices)
      
      Given that accessing the U-Boot environment during sysupgrade is not
      uncommon and the situation across targets is currently quite diverse,
      just make sure both tools as well fw_env.config are always copied to
      the ramdisk used for sysupgrade. Also make sure /var/lock always
      exists.
      
      This now allows to remove copying of fw_printenv/fw_setenv as well as
      fw_env.config, creation of /var/lock or even /var/lock/fw_printenv.lock
      from lib/upgrade/platform.sh or files included there.
      
      As the same applies also to 'fwtool' which is used by generic eMMC
      sysupgrade, also always copy that to ramdisk.
      
      Signed-off-by: default avatarDaniel Golle <daniel@makrotopia.org>
      Unverified
      2baded9e
    • Eneas U de Queiroz's avatar
      scripts/diffconfig.sh: ensure config/conf is built · c0849c1d
      Eneas U de Queiroz authored
      
      diffconfig.sh runs ./scripts/config/conf, but it does not get built
      with 'make {menu,x,n}config.  Call 'make ./scripts/config/conf' to
      ensure it's been built befpre running it.
      
      Signed-off-by: default avatarEneas U de Queiroz <cotequeiroz@gmail.com>
      c0849c1d
    • Petr Štetiar's avatar
      build: toplevel.mk: fix missing kconfig dependency tracking · 418dc049
      Petr Štetiar authored
      
      Toplevel Make is not aware about changes in the `scripts/config/*conf`
      targets and this is causing issues for during update to that part of
      build tree, where one needs to handle this manually by either force
      rebuilding the targets or running `make config-clean`. Fix this by
      forcing the rebuild if necessary.
      
      Fixes: #9297
      Signed-off-by: default avatarPetr Štetiar <ynezz@true.cz>
      418dc049
    • Eneas U de Queiroz's avatar
      openssl: configure engines with uci · 0134f845
      Eneas U de Queiroz authored
      
      This uses uci to configure engines, by generating a list of enabled
      engines in /var/etc/ssl/engines.cnf from engines configured in
      /etc/config/openssl:
      
          config engine 'devcrypto'
                  option enabled '1'
      
      Currently the only options implemented are 'enabled', which defaults to
      true and enables the named engine, and the 'force' option, that enables
      the engine even if the init script thinks the engine does not exist.
      
      The existence test is to check for either a configuration file
      /etc/ssl/engines.cnf.d/%ENGINE%.cnf, or a shared object file
      /usr/lib/engines-1.1/%ENGINE%.so.
      
      The engine list is generated by an init script which is set to run after
      'log' because it informs the engines being enabled or skipped.  It
      should run before any service using OpenSSL as the crypto library,
      otherwise the service will not use any engine.
      
      Signed-off-by: default avatarEneas U de Queiroz <cotequeiroz@gmail.com>
      0134f845
    • Eneas U de Queiroz's avatar
      openssl: configure engine packages during install · 30b03510
      Eneas U de Queiroz authored
      
      This enables an engine during its package's installation, by adding it
      to the engines list in /etc/ssl/engines.cnf.d/engines.cnf.
      
      The engine build system was reworked, with the addition of an engine.mk
      file that groups some of the engine packages' definitions, and could be
      used by out of tree engines as well.
      
      Signed-off-by: default avatarEneas U de Queiroz <cotequeiroz@gmail.com>
      30b03510
    • Eneas U de Queiroz's avatar
      openssl: config engines in /etc/ssl/engines.cnf.d · 17a6ca12
      Eneas U de Queiroz authored
      
      This changes the configuration of engines from the global openssl.cnf to
      files in the /etc/ssl/engines.cnf.d directory.  The engines.cnf file has
      the list of enabled engines, while each engine has its own configuration
      file installed under /etc/ssl/engines.cnf.d.
      
      Patches were refreshed with --zero-commit.
      
      Signed-off-by: default avatarEneas U de Queiroz <cotequeiroz@gmail.com>
      17a6ca12
  5. Feb 21, 2022
  6. Feb 20, 2022
Loading