Skip to content
Snippets Groups Projects
  1. Apr 09, 2020
  2. Apr 07, 2020
  3. Apr 06, 2020
    • David Bauer's avatar
      x86-geode: add target class · 95b133d4
      David Bauer authored
      x86-geode does not include the common x86 target-settings. Thus we need
      to specify the device class in order to build images with all necessary
      packages included.
      95b133d4
  4. Apr 05, 2020
  5. Apr 04, 2020
  6. Mar 31, 2020
  7. Mar 27, 2020
    • David Bauer's avatar
      build: add class-packages for targets without devices · c9f90c3e
      David Bauer authored
      When adding device classes, targets without devices such as x86 were not
      handled. As site and feature packages are included on such a per-device
      decision, x86 images ended up without most packages.
      
      Include a class setting for a target and include the class-packages
      target-wide when this setting is configured.
      
      Fixes 9c523650 ("build: introduce device classes")
      c9f90c3e
  8. Mar 26, 2020
  9. Mar 25, 2020
    • Martin Weinelt's avatar
      modules: update OpenWrt · 9fb4be61
      Martin Weinelt authored
      39405644d5 dnsmasq: add 'scriptarp' option
      d5b1f4430f openssl: update to 1.1.1e
      798ff37aaa openssl: add configuration example for afalg-sync
      168acbb36d oxnas: yet another irqchip related patch
      cf4520d15e oxnas: backport another fix for irqchip
      456e1c60d6 ath79: add support for TP-Link WDR3500 v1
      e7fae8fc97 ath79: add support for TP-Link Archer C60 v3
      2bd9d2e08b oxnas: backport patch fixing hang after reboot
      74a8e36975 layerscape: add kmod-i2c-mux to DEVICE_PACKAGES for traverse-ls1043
      7ae345ecb7 ath79: add support for TP-Link TL-WR740N v5
      76c1c1daea ar71xx: fix port order on TP-Link Archer C60 v1/v2
      f1a3a6b79c ath79: fix port order on TP-Link Archer C60 v1/v2
      e4107e30a7 ar71xx: remove wrong MAC address adjustment for Archer C60 v2
      83f1015a6c ar71xx: fix swapped LAN/WAN MAC address for Archer C60 v1/v2
      9f024d3587 ath79: fix swapped LAN/WAN MAC address for Archer C60 v1/v2
      b32129d30b rssileds: add dependencies based on LDFLAGS
      9da31d0fb4 mt76: update to the latest version
      68351990dc ar71xx/ath79: ew-dorin, fix the trigger level for WPS button
      6e4453aecc kernel: backport out-of-memory fix for non-Ethernet devices
      06f5a8d3e9 kernel: bump 4.14 to 4.14.172
      e7f1313bbb rpcd: add respawn param
      f6f0cd54a2 rpcd: update to latest Git HEAD
      
      Compile-tested: ipq40xx-generic, ramips-mt7621
      9fb4be61
    • David Bauer's avatar
      build: add class specific GLUON_SITE_PACKAGES · 051b2750
      David Bauer authored
      This allows to define a list of packages, which are only installed
      for a specific device-class.
      051b2750
    • David Bauer's avatar
      docs: private-wlan: add WPA3 documentation · a9c5b83c
      David Bauer authored
      a9c5b83c
    • David Bauer's avatar
      gluon-web-private-wifi: enable WPA3 configuration · c7fa1927
      David Bauer authored
      This allows a user to enable WPA3-Personal and WPA2-WPA3-MM for the
      private WiFi in case it is supported by the platform.
      c7fa1927
    • David Bauer's avatar
      gluon-core: add WPA3 platorm helper · 86b51047
      David Bauer authored
      This adds a helper method, which determines if the current platform
      supports WPA3 or not.
      
      WPA3 is supported if
       - the device is not in the featureset category "tiny"
       - the WiFi driver supports 802.11w management frame protection
      86b51047
    • David Bauer's avatar
      build: remove hostapd from default packages · 88bed046
      David Bauer authored
      88bed046
    • David Bauer's avatar
      features: add hostapd-mini by default · 00e02950
      David Bauer authored
      If WPA3 is not selected as a feature, autmatically include
      hostapd-mini.
      00e02950
    • David Bauer's avatar
      gluon-wireless-encryption: add package · b0570154
      David Bauer authored
      The gluon-wireless-encryption package selects a WPA3 supporting
      hostapd package as a dependency and stores the information, which
      encryption method is supported to the device.
      b0570154
    • David Bauer's avatar
      build: add class specific GLUON_FEATURES · 1df243d1
      David Bauer authored
      1df243d1
    • David Bauer's avatar
      docs: add device-classes · 7903d9eb
      David Bauer authored
      7903d9eb
    • David Bauer's avatar
      targets: add device-class flags · 7fd7116e
      David Bauer authored
      This commit assigns class-flags to devices. The following scheme is
      used:
      
       - ath9k & ath10k: tiny if RAM <128M
       - ath10k & ath10k: tiny if RAM <256M
       - all: tiny if RAM <64M
       - all: tiny if flash <8M
      
      All other devices automatically have the default device-class selected.
      7fd7116e
    • David Bauer's avatar
      build: introduce device classes · 9c523650
      David Bauer authored
      This commit allows to define a device-class flag in the target
      definitions. This way, it is possible to distinguish between groups
      of devices in the build-process in terms of package or feature
      selection.
      9c523650
  10. Mar 23, 2020
    • David Bauer's avatar
      x86: add common wireless packages (#1947) · 3d5a6930
      David Bauer authored
      3d5a6930
    • Martin Weinelt's avatar
      Add gluon-mesh-wireless-sae package · 461d9040
      Martin Weinelt authored
      This package adds support for SAE on 802.11s mesh connections.
      
      Enabling this package will require all 802.11s mesh connections
      to be encrypted using the SAE key agreement scheme. The security
      of SAE relies upon the authentication through a shared secret.
      
      In the context of public mesh networks a shared secret is an
      obvious oxymoron. Still this functionality provides an improvement
      over unencrypted mesh connections in that it protects against a
      passive attacker who did not observe the key agreement. In addition
      Management Frame Protection (802.11w) gets automatically enabled on
      mesh interfaces to prevent protocol-level deauthentication attacks.
      
      If `wifi.mesh.sae` is enabled a shared secret will automatically be
      derived from the `prefix6` variable. This is as secure as it gets
      for a public mesh network.
      
      For *private* mesh networks `wifi.mesh.sae_passphrase` should be
      set to your shared secret.
      
      Fixes #1636
      461d9040
  11. Mar 19, 2020
  12. Mar 14, 2020
Loading