summaryrefslogtreecommitdiffstats
path: root/meta/recipes-core/dropbear/dropbear/dropbear-disable-weak-ciphers.patch
Commit message (Collapse)AuthorAgeFilesLines
* dropbear: upgrade 2024.84 -> 2024.85Yi Zhao2024-05-281-6/+3
| | | | | | | | | | | | | | | | Changelog: https://matt.ucc.asn.au/dropbear/CHANGES This release fixes build regressions in 2024.84: - Fix build failure when SHA1 is disabled - Fix build failure when DROPBEAR_CLI_PUBKEY_AUTH disabled - Update debian/ directory with changed paths (From OE-Core rev: 62ad8e8217548d7f9aab506a3611ef41f4881cf3) Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: upgrade 2022.83 -> 2024.84Wang Mingyu2024-04-231-4/+4
| | | | | | | | | | | | | | | | | 0001-urandom-xauth-changes-to-options.h.patch dropbear-disable-weak-ciphers.patch 0005-dropbear-enable-pam.patch 0006-dropbear-configuration-file.patch refreshed for 2024.84 CVE-2023-36328.patch removed since it's included in 2024.84 (From OE-Core rev: c50a0d013137338ac1dec60f6aed32ff3a185839) Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: upgrade 2020.81 -> 2022.82wangmy2022-04-201-12/+8
| | | | | | | | | | | | | | | | refresh the following patches for new version: 0001-urandom-xauth-changes-to-options.h.patch 0005-dropbear-enable-pam.patch dropbear-disable-weak-ciphers.patch Changelog: https://github.com/mkj/dropbear/releases/tag/DROPBEAR_2022.82 (From OE-Core rev: d5f9c44ede9babd0f48306cfefe4a16065e8ea30) Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Luca Ceresoli <luca.ceresoli@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: update 2019.78 -> 2020.79Alexander Kanavin2020-06-281-24/+15
| | | | | | | | | | | Refresh dropbear-disable-weak-ciphers.patch as some weak items have been dropped upstream. License-Update: curve25519 changed to public domain (From OE-Core rev: 1620a815f6fbe20e5b570ed254187856bb37c184) Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* dropbear: new feature: disable-weak-ciphersJoseph Reynolds2019-06-211-0/+44
Enhances dropbear with a new feature "disable-weak-ciphers", on by default. This feature disables all CBC, SHA1, and diffie-hellman group1 ciphers in the dropbear ssh server and client. Disable this feature if you need to connect to the ssh server from older clients. Additional customization can be done with local_options.h as usual. Tested: On dropbear_2019.78. Upstream-Status: Inappropriate [configuration] (From OE-Core rev: b11521ce1b1d1f8b4dddf830b41f5ea809730d22) Signed-off-by: Joseph Reynolds <joseph.reynolds1@ibm.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>