summaryrefslogtreecommitdiffstats
path: root/meta/recipes-core/dropbear
Commit message (Collapse)AuthorAgeFilesLines
* dropbear: add xauth runtime recommends dependency on x11 DISTRO_FEATUREAndrej Valek2025-06-191-3/+3
| | | | | | | | | | | | Change enable-x11-forwarding PACKAGECONFIG to x11, while we can rely directly on X11 DISTRO_FEATURE. Previously when enable-x11-forwarding was used, the XAUTH_COMMAND failed due to missing xauth. So add xauth to runtime recommends dependency and enable this behavior as default. (From OE-Core rev: f0d2374b94a0e5d60ceed17998cd97f85b0486f6) Signed-off-by: Andrej Valek <andrej.v@skyrain.eu> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: upgrade 2024.86 -> dropbear_2025.88Peter Marko2025-05-154-33/+78
| | | | | | | | | | | | | | | | | | Handles CVE-2025-47203 SHA1 algorithms were removed by default, so patch for disabling it was removed together with its package option. Doing it with conditional patch was anyway a bad design. If someone still needs it, it should be done via sed command on the config file. Refreshed remaining patches. Added patch to fix regression of the CVE fix. (From OE-Core rev: c01205e7a4816d78e99d01f86a396ab23d9bde34) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: add mirrorPeter Marko2025-05-151-0/+1
| | | | | | | | | | Main download page is currently unavailable, switch to mirror listed in README file of the dropbear repository and release tarballs. (From OE-Core rev: 49e1947dfcb24afe6ffca129ce38602d3d6a6a64) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear/dropbearkey.service: Allow extra arguments for key generationMike Looijmans2025-04-081-1/+1
| | | | | | | | | | | | | | | | Just like the "init" version this script, pass $DROPBEAR_RSAKEY_ARGS to the 'dropbearkey' program when generating a host key. This allows to speed up SSH connections on read-only root systems by adding the line DROPBEAR_RSAKEY_ARGS="-s 1024" into /etc/default/dropbear. See also: c0efbcb47ab3 ("dropbear/init: Allow extra arguments for key generation") (From OE-Core rev: 3ae2c70fe83bc242b7a13655bc38431c81033c66) Signed-off-by: Mike Looijmans <mike.looijmans@topic.nl> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: add dropbearkey.service to FILESAdrian Freihofer2024-12-171-0/+2
| | | | | | | | | | | | | | | dropbear.socket file contains: Also=dropbearkey.service That's why dropbearkey.service got automatically added to FILES. Since this incorrect auto adding feature gets dropped from systemd.bbclass this needs to be added explicitly. (From OE-Core rev: 4455e207a1ced3fb1d92b2f5e9335632bea08d15) Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: upgrade 2024.85 -> 2024.86Wang Mingyu2024-11-181-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Changelog: ========= - Fix failure on concurrent channel open/close. - Print remote host after "Login attempt for nonexistent user" log entry to assist fail2ban. - Dropbear now exits with exit status 0 on SIGINT/SIGTERM. This is a more graceful behaviour for "systemctl stop dropbear". - New IDENT_VERSION_PART config allows customising some of the SSH version string. - Fix building SK_KEYS with just one of ECDSA or ED25519 - Fix dbclient "-m help" and "-c help" without a hostname. - Remove fprintf/gettimeofday from sigchld handler when running with verbose trace enabled. - Improved configure help output - Compile fix for GNU Hurd - Support running test_aslr without venv - Compilation fixes for older compilers, and better build tests - Update some test infrastructure versions of python packages, github actions, and github runner OSes (From OE-Core rev: 86d99c7c9ace24bff035d38e33f184e2a2f7c4a6) Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: upgrade 2024.84 -> 2024.85Yi Zhao2024-05-285-26/+17
| | | | | | | | | | | | | | | | Changelog: https://matt.ucc.asn.au/dropbear/CHANGES This release fixes build regressions in 2024.84: - Fix build failure when SHA1 is disabled - Fix build failure when DROPBEAR_CLI_PUBKEY_AUTH disabled - Update debian/ directory with changed paths (From OE-Core rev: 62ad8e8217548d7f9aab506a3611ef41f4881cf3) Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* recipes: Update WORKDIR references to UNPACKDIRRichard Purdie2024-05-021-6/+6
| | | | | | | | | | Since we want to be able to stop unpacking to WORKDIR, correct the WORKDIR references in recipe do_compile/do_install tasks to use UNPACKDIR in the appropraite places instead. (From OE-Core rev: d73595df69667fe9d12ecd407b77a0b8dae2109c) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: upgrade 2022.83 -> 2024.84Wang Mingyu2024-04-236-165/+20
| | | | | | | | | | | | | | | | | 0001-urandom-xauth-changes-to-options.h.patch dropbear-disable-weak-ciphers.patch 0005-dropbear-enable-pam.patch 0006-dropbear-configuration-file.patch refreshed for 2024.84 CVE-2023-36328.patch removed since it's included in 2024.84 (From OE-Core rev: c50a0d013137338ac1dec60f6aed32ff3a185839) Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: remove unnecessary lineEtienne Cordonnier2024-02-021-2/+0
| | | | | | | | | | | | This line was added in 703e3faaec8c5a22, however the default value of FILES:${PN} contains "${bindir}/*", so this directory does not need to be explicitly added. (From OE-Core rev: 53f9fa7b7913f4d8a480e85a7b6a943f1125bb19) Signed-off-by: Etienne Cordonnier <ecordonnier@snap.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: fix CVE-2023-36328Yogita Urade2023-09-092-0/+145
| | | | | | | | | | | | | | | Integer Overflow vulnerability in mp_grow in libtom libtommath before commit beba892bc0d4e4ded4d667ab1d2a94f4d75109a9, allows attackers to execute arbitrary code and cause a denial of service (DoS). References: https://nvd.nist.gov/vuln/detail/CVE-2023-36328 https://github.com/libtom/libtommath/pull/546 (From OE-Core rev: aa392840d625f5c45832e7ddf60c4dfaba3c4287) Signed-off-by: Yogita Urade <yogita.urade@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: upgrade 2022.82 -> 2022.83Wang Mingyu2022-12-062-30/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 0007-Fix-X11-build-failure-use-DROPBEAR_PRIO_LOWDELAY.patch removed since it's included in 2022.83 Changelog: ========== - Disable DROPBEAR_DSS by default - Added DROPBEAR_RSA_SHA1 option to allow disabling sha1 rsa signatures. - Add option for requiring both password and pubkey (-t) - Add 'no-touch-required' and 'verify-required' options for sk keys DROPBEAR_SK_KEYS config option now replaces separate DROPBEAR_SK_ECDSA and DROPBEAR_SK_ED25519 options. - Add 'permitopen' option for authorized_keys to restrict forwarded ports - Added LTM_CFLAGS configure argument to set flags for building bundled libtommath. This also restores the previous arguments used in 2020.81 (-O3 -funroll-loops). That gives a big speedup for RSA key generation, which regressed in 2022.82. There is a tradeoff with code size, so -Os can be used if required. - Add '-z' flag to disable setting QoS traffic class. This may be necessary to work with broken networks or network drivers, exposed after changes to use AF21 in 2022.82 - Allow overriding user shells with COMPAT_USER_SHELLS - Improve permission error message - Remove HMAC_MD5 entirely (From OE-Core rev: 99759005f18f0533717696729978d8dc5bf4ad16) Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: add pam to PACKAGECONFIGMing Liu2022-10-251-8/+2
| | | | | | | | | | Add pam to PACKAGECONFIG to make the code cleaner. (From OE-Core rev: 4d0c566a79cf7c0b7c86eaa7c99aa185fcf37bb5) Signed-off-by: Ming Liu <liu.ming50@gmail.com> Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: Add enable-x11-forwarding PACKAGECONFIG optionDaniel Gomez2022-09-292-1/+38
| | | | | | | | | | | | | | Add the option to enable X11 forwarding in dropbear with a new PACKAGECONFIG option ('enable-x11-forwarding'). Method uses localoption.h file for dropbear feature selection. Add backport patch to fix X11 forwarding in the current 2022.82 version. (From OE-Core rev: f09d94979fd98f160ef7157b517489a43086333f) Signed-off-by: Daniel Gomez <daniel@qtec.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: merge .inc into .bbAlexander Kanavin2022-08-142-129/+128
| | | | | | | | (From OE-Core rev: e4e21f272a897bd89ffbc9d057db56eae944c70b) Signed-off-by: Alexander Kanavin <alex@linutronix.de> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: Add configuration file to CONFFILESDaniel Gomez2022-07-231-0/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Avoid overwriting the dropbear configuration when the package gets updated by adding it to the CONFFILES list. Before: root@qt5222:~# dpkg -i dropbear_2022.82-r0.26_amd64.deb (Reading database ... 32509 files and directories currently installed.) Preparing to unpack dropbear_2022.82-r0.26_amd64.deb ... Unpacking dropbear (2022.82-r0.26) over (2022.82-r0.25) ... Setting up dropbear (2022.82-r0.26) ... update-alternatives: Linking /usr/bin/scp to /usr/sbin/dropbearmulti update-alternatives: Linking /usr/bin/ssh to /usr/sbin/dropbearmulti After: root@qt5222:~# dpkg -i dropbear_2022.82-r0.27_amd64.deb (Reading database ... 32509 files and directories currently installed.) Preparing to unpack dropbear_2022.82-r0.27_amd64.deb ... Unpacking dropbear (2022.82-r0.27) over (2022.82-r0.26) ... Setting up dropbear (2022.82-r0.27) ... Configuration file '/etc/default/dropbear' ==> File on system created by you or by a script. ==> File also in package provided by package maintainer. What would you like to do about it ? Your options are: Y or I : install the package maintainer's version N or O : keep your currently-installed version D : show the differences between the versions Z : start a shell to examine the situation The default action is to keep your current version. *** dropbear (Y/I/N/O/D/Z) [default=N] ? (From OE-Core rev: e8809c00d7414faeb601970faa3e9caf5deb39cf) Signed-off-by: Daniel Gomez <daniel@qtec.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: upgrade 2020.81 -> 2022.82wangmy2022-04-205-26/+21
| | | | | | | | | | | | | | | | refresh the following patches for new version: 0001-urandom-xauth-changes-to-options.h.patch 0005-dropbear-enable-pam.patch dropbear-disable-weak-ciphers.patch Changelog: https://github.com/mkj/dropbear/releases/tag/DROPBEAR_2022.82 (From OE-Core rev: d5f9c44ede9babd0f48306cfefe4a16065e8ea30) Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Luca Ceresoli <luca.ceresoli@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* systemd: '${systemd_unitdir}/system' => '${systemd_system_unitdir}'Robert P. J. Day2021-09-071-5/+5
| | | | | | | | | | | Repo-wide replacement to use newer variable to represent systemd system unitdir directory. (From OE-Core rev: 5ace3ada5c54500c71becc8e0c6eddeb8bc053e3) Signed-off-by: Robert P. J. Day <rpjday@crashcourse.ca> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: Fix incorrect package override for postrmRichard Purdie2021-08-021-1/+1
| | | | | | | | | | This bug has been around for a long time (2011) but fix it to do what was intended originally. The postrm is changed by classes but those should append to existing entries. (From OE-Core rev: 7762b07bf3b0c77b91ad91963ab39d3c73770ebf) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* Convert to new override syntaxRichard Purdie2021-08-021-8/+8
| | | | | | | | | | | | This is the result of automated script conversion: scripts/contrib/convert-overrides.py <oe-core directory> converting the metadata to use ":" as the override character instead of "_". (From OE-Core rev: 42344347be29f0997cc2f7636d9603b1fe1875ae) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* meta/recipes-core: Add HOMEPAGE / DESCRIPTIONDorinda2021-02-261-0/+1
| | | | | | | | | | | Added HOMEPAGE and DESCRIPTION for recipes with missing decriptions or homepage [YOCTO #13471] (From OE-Core rev: be8d3d0fa6bbc2924ffbdbaa66e9ffaef2b96de6) Signed-off-by: Dorinda Bassey <dorindabassey@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: Disable lastlog and wtmp on muslKhem Raj2021-01-031-0/+3
| | | | | | | | | Not provided by musl library (From OE-Core rev: 97dc1a2844d1f954fc0c86fe406ffbacc88a2133) Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: upgrade 2020.80 -> 2020.81Alexander Kanavin2020-11-032-3/+3
| | | | | | | (From OE-Core rev: 92a6ab079fdbf7166073eb23df0269bc437ba7a4) Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear/openssh: Lower priority of key generationRichard Purdie2020-09-201-0/+1
| | | | | | | | | | | | | | | Where we have images with PAM+systemd, serial login can be extremely slow. The load generated by key generation does slow down the rest of the boot process. Lower the priority level of these systemd services, since we'd prefer to have the rest of the system boot more effectively. This doesn't "solve" the slow systemd boot issues but does help. (From OE-Core rev: 087700665284c08ba846e52b6b86276629f5f1cd) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: update to 2020.80Andrej Valek2020-07-033-4/+4
| | | | | | | | | License-Update: changed date and added info about existence LICENSE files in libtomcrypt and libtommath folders (From OE-Core rev: 0954933a7cc61307df1a840318c9a553050ecdb6) Signed-off-by: Andrej Valek <andrej.valek@siemens.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: update 2019.78 -> 2020.79Alexander Kanavin2020-06-284-29/+19
| | | | | | | | | | | Refresh dropbear-disable-weak-ciphers.patch as some weak items have been dropped upstream. License-Update: curve25519 changed to public domain (From OE-Core rev: 1620a815f6fbe20e5b570ed254187856bb37c184) Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: don't create invalid symlinks if ssh, scp, etc are disabledAndre McCurdy2019-09-071-2/+9
| | | | | | | (From OE-Core rev: 703e3faaec8c5a22fe3bc9a2a040c960862136c7) Signed-off-by: Andre McCurdy <armccurdy@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: new feature: disable-weak-ciphersJoseph Reynolds2019-06-212-2/+48
| | | | | | | | | | | | | | | | | | Enhances dropbear with a new feature "disable-weak-ciphers", on by default. This feature disables all CBC, SHA1, and diffie-hellman group1 ciphers in the dropbear ssh server and client. Disable this feature if you need to connect to the ssh server from older clients. Additional customization can be done with local_options.h as usual. Tested: On dropbear_2019.78. Upstream-Status: Inappropriate [configuration] (From OE-Core rev: b11521ce1b1d1f8b4dddf830b41f5ea809730d22) Signed-off-by: Joseph Reynolds <joseph.reynolds1@ibm.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: add openssh/openssh-sshd as rconflictChangqing Li2019-05-301-0/+1
| | | | | | | (From OE-Core rev: 0aa21ae925d81cd10d5c44d4d98c9f06df87139d) Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: set CVE_PRODUCTChen Qi2019-04-301-0/+2
| | | | | | | (From OE-Core rev: 3c247a4a166cabf7ddfea403cf272b3fb4e00872) Signed-off-by: Chen Qi <Qi.Chen@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: update to 2019.78Andrej Valek2019-04-122-4/+4
| | | | | | | (From OE-Core rev: 4a5e607dac5f0d4ccd220f022002661b66681112) Signed-off-by: Andrej Valek <andrej.valek@siemens.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: update to 2019.77Andrej Valek2019-03-254-242/+4
| | | | | | | | | | - update dropbear to version 2019.77 - drop obsolete patch (From OE-Core rev: c0f2e6f74119538a33095c27a8d9e92084741672) Signed-off-by: Andrej Valek <andrej.valek@siemens.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: remove localoptions.h in source searchingAndrej Valek2018-09-212-52/+0
| | | | | | | | | | - localoptions.h is automatically searched in build directory (From OE-Core rev: 40fe89027e1b9ed63c65ff026bc6cce5de1b814a) Signed-off-by: Andrej Valek <andrej.valek@siemens.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: Fix CVE-2018-15599Mingli Yu2018-09-103-6/+254
| | | | | | | | | | | | | Wait to fail invalid usernames to fix CVE-2018-15599 Rework 0006-dropbear-configuration-file.patch to fix fuzz warnings (From OE-Core rev: f017715120b67ff02f56ed5db131436ee62aeffb) Signed-off-by: Mingli Yu <Mingli.Yu@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear.inc: add dependency on virtual/crypt to fix build with glibc-2.28Martin Jansa2018-08-151-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | configure tests crypt() existence with: dnl We test for crypt() specially. On Linux (and others?) it resides in libcrypt dnl but we don't want link all binaries to -lcrypt, just dropbear server. dnl OS X doesn't need -lcrypt AC_CHECK_FUNC(crypt, found_crypt_func=here) AC_CHECK_LIB(crypt, crypt, [ CRYPTLIB="-lcrypt" found_crypt_func=here ]) AC_SUBST(CRYPTLIB) if test "t$found_crypt_func" = there; then AC_DEFINE(HAVE_CRYPT, 1, [crypt() function]) fi but that silently fails with glibc-2.28 and a bit later do_compile fails with; http://errors.yoctoproject.org/Errors/Details/185895/ ../dropbear-2018.76/sysoptions.h:237:3: error: #error "DROPBEAR_SVR_PASSWORD_AUTH requires `crypt()'." #error "DROPBEAR_SVR_PASSWORD_AUTH requires `crypt()'." ^~~~~ Add dependency on virtual/crypt so that do_configure detects it correctly. (From OE-Core rev: d04703aef55e01c59329fc54660724e053f3f66c) Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: add default config file to disable root loginJackie Huang2018-07-092-0/+5
| | | | | | | | | | | | root login is disabled by default for openssh and we can enable it through IMAGE_FEATURES 'debug-tweaks' or 'allow-empty-password', so change to the same default behavior for dropbear. (From OE-Core rev: d3e69fa2fef83015658aa5fa1442bab5a8c3edaa) Signed-off-by: Jackie Huang <jackie.huang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: drop obsolete patch 0004-fix-2kb-keys.patchAndre McCurdy2018-06-072-20/+0
| | | | | | | | | | | | | | | | | | | | | The origins of the patch date back to early 2005 (prior to the start of git history in oe-core) to fix a hardcoded limit on the maximum size of remote host keys: http://familiar.handhelds.narkive.com/b1VGg2bI/problem-w-dropbear-ssh The hardcoded limit was fixed upstream in dropbear 0.47: https://github.com/mkj/dropbear/commit/736f370dce614b717193f45d084e9e009de723ce The patch has therefore been obsolete since then. It went unnoticed until now as the patch has continued to apply - it modifies a value which is not used. (From OE-Core rev: 17072ffc1e765edd45bc1174378fb666185e5643) Signed-off-by: Andre McCurdy <armccurdy@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: drop run time detection of read-only rootfsAndre McCurdy2018-06-041-18/+8
| | | | | | | | | | | | | | | | Previously, when dropbear was started via its init script, relocation of DROPBEAR_RSAKEY_DIR to support read-only rootfs was handled at run time from within the init script. Update the init script to take advantage of the read-only rootfs config setup by read_only_rootfs_hook() and therefore be consistent with startup under systemd (where relocation of DROPBEAR_RSAKEY_DIR is handled by the read_only_rootfs_hook() at build time). (From OE-Core rev: 4990f87b2f6a8b30c8d1c767636e7f5527f595ba) Signed-off-by: Andre McCurdy <armccurdy@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: update to 2018.76Andrej Valek2018-05-049-265/+92
| | | | | | | | | | | | | - update dropbear to version 2018.76 - refresh and drop obsolete patches - add option to use localoptions.h header file - do not use harden stuff, which leads to QA warning (From OE-Core rev: ec050b666ec3684918fd9dc564d2dce9a8d6a8ef) Signed-off-by: Andrej Valek <andrej.valek@siemens.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: refresh patchesRoss Burton2018-03-071-10/+7
| | | | | | | | | | | | | | | | | | | The patch tool will apply patches by default with "fuzz", which is where if the hunk context isn't present but what is there is close enough, it will force the patch in. Whilst this is useful when there's just whitespace changes, when applied to source it is possible for a patch applied with fuzz to produce broken code which still compiles (see #10450). This is obviously bad. We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For that to be realistic the existing patches with fuzz need to be rebased and reviewed. (From OE-Core rev: 18300f8faa5050178efcd22f2db843f9b3f3bb0f) Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: reduce local pending patchesDengke Du2017-07-172-11/+13
| | | | | | | | (From OE-Core rev: 9b2e3b8235ee545b0eb666266c5db2ec7cb9e21f) Signed-off-by: Dengke Du <dengke.du@windriver.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: upgrade 2016.74 -> 2017.75Dengke Du2017-06-033-50/+5
| | | | | | | | | | | | Drop patch support-out-of-tree-builds.patch: Because the upstream has already contain it. (From OE-Core rev: 2fd0757ae7fd63bc93a4ce8579c6ba0cdbb4c1cd) Signed-off-by: Dengke Du <dengke.du@windriver.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: drop support for DSA host keys in dropbear init scriptAndre McCurdy2017-03-101-30/+6
| | | | | | | | | | | | | | Bring the dropbear init script into sync with the systemd service file (dropbearkey.service supports RSA host keys only) and with recent versions of openssh which deprecate DSA host keys. https://www.gentoo.org/support/news-items/2015-08-13-openssh-weak-keys.html (From OE-Core rev: 6bd7341a38a8bb5387ea81dbccfed327370569f3) Signed-off-by: Andre McCurdy <armccurdy@gmail.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* recipes: Make use of the new bb.utils.filter() functionPeter Kjellerstedt2017-03-011-3/+3
| | | | | | | (From OE-Core rev: 0a1427bf9aeeda6bee2cc0af8da4ea5fd90aef6f) Signed-off-by: Peter Kjellerstedt <peter.kjellerstedt@axis.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: deterministic selection of system -vs- bundled libtom libsAndre McCurdy2016-09-201-0/+4
| | | | | | | | | | | | | | Dropbear will use system versions of libtommath and libtomcrypt if available. To make builds deterministic, add a PACKAGECONFIG option to choose system libs or force use of the bundled versions. Note that currently there are no libtommath or libtomcrypt recipes in oe-core, so default to using the bundled versions. (From OE-Core rev: b7c2edd2d6ded287d8b34dd047ae84d3fd69d4c6) Signed-off-by: Andre McCurdy <armccurdy@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: fix -ltomcrypt -ltommath order when using system libtom libsAndre McCurdy2016-09-202-0/+49
| | | | | | | | | | | | | | | To prevent build failures when using system libtom libraries and linking with --as-needed, LIBTOM_LIBS should be in the order -ltomcrypt -ltommath, not the other way around, ie libs should be prepended to LIBTOM_LIBS as they are found, not appended. Note that LIBTOM_LIBS is not used when linking with the bundled libtom libs. (From OE-Core rev: 62e96283fe77469e24e8df86c6c037c92009b00a) Signed-off-by: Andre McCurdy <armccurdy@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear/init: Allow extra arguments for key generationMike Looijmans2016-08-171-2/+2
| | | | | | | | | | | | | | | | | | | | | This patch adds DROPBEAR_RSAKEY_ARGS and DROPBEAR_DSSKEY_ARGS optional parameters to /etc/default/dropbear. The contents are simply passed to the 'dropbearkey' program when generating a host key. The default keysize for RSA is currently 2048 bits. It takes a CortexA9 running at 700MHz between 4 and 10 seconds to calculate a keypair. The board boots Linux in about a second, but you have to wait for several seconds because of the keypair generation. This patch allows one to put the line DROPBEAR_RSAKEY_ARGS="-s 1024" into /etc/default/dropbear, and have a host key generated in about 0.2 seconds on the same CPU. This is particulary useful for read-only rootfs systems which generate a key on each boot. (From OE-Core rev: c0efbcb47ab37c2d9c298fcd40ecaadd3ca050a7) Signed-off-by: Mike Looijmans <mike.looijmans@topic.nl> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: upgrade to 2016.74Maxin B. John2016-08-012-7/+7
| | | | | | | | | | 2016.73 -> 2016.74 (From OE-Core rev: 1513e77d3f7ea9910d6ac8aab7a2f38dd6c7cd24) Signed-off-by: Maxin B. John <maxin.john@intel.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* meta: update patch metadataRoss Burton2016-07-081-1/+1
| | | | | | | | | Enforce the correct tag names across all of oe-core for consistency. (From OE-Core rev: 606a43dc38a00cc243f933722db657aea4129f8e) Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: Remove incorrect SFTPSERVER_PATH from CFLAGSDominic Sacré2016-05-301-1/+0
| | | | | | | | | | | | | | | Openssh now installs the sftp-server binary as /usr/libexec/sftp-server, whereas the dropbear recipe assumes a different path. Dropbear uses the correct path by default, so it's no longer necessary to override SFTPSERVER_PATH via CFLAGS. This fixes SFTP access to systems using dropbear as the SSH server. (From OE-Core rev: df798bca330583103b2301678236cc841cc861dd) Signed-off-by: Dominic Sacré <dominic.sacre@gmx.de> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>