* Update buildroot-patches for 2020.11-rc1 buildroot * Update buildroot to 2020.11-rc1 Signed-off-by: Stefan Agner <stefan@agner.ch> * Don't rely on sfdisk --list-free output The --list-free (-F) argument does not allow machine readable mode. And it seems that the output format changes over time (different spacing, using size postfixes instead of raw blocks). Use sfdisk json output and calculate free partition space ourselfs. This works for 2.35 and 2.36 and is more robust since we rely on output which is meant for scripts to parse. * Migrate defconfigs for Buildroot 2020.11-rc1 In particular, rename BR2_TARGET_UBOOT_BOOT_SCRIPT(_SOURCE) to BR2_PACKAGE_HOST_UBOOT_TOOLS_BOOT_SCRIPT(_SOURCE). * Rebase/remove systemd patches for systemd 246 * Drop apparmor/libapparmor from buildroot-external * hassos-persists: use /run as directory for lockfiles The U-Boot tools use /var/lock by default which is not created any more by systemd by default (it is under tmpfiles legacy.conf, which we no longer install). * Disable systemd-update-done.service The service is not suited for pure read-only systems. In particular the service needs to be able to write a file in /etc and /var. Remove the service. Note: This is a static service and cannot be removed using systemd-preset. * Disable apparmor.service for now The service loads all default profiles. Some might actually cause problems. E.g. the profile for ping seems not to match our setup for /etc/resolv.conf: [85503.634653] audit: type=1400 audit(1605286002.684:236): apparmor="DENIED" operation="open" profile="ping" name="/run/resolv.conf" pid=27585 comm="ping" requested_mask="r" denied_mask="r" fsuid=0 ouid=0
51 lines
1.8 KiB
Diff
51 lines
1.8 KiB
Diff
From 7c5475187d1bdf861360ffd8bc1aaea84a341db3 Mon Sep 17 00:00:00 2001
|
|
From: Dagg Stompler <daggs@gmx.com>
|
|
Date: Fri, 11 Sep 2020 12:28:52 +0300
|
|
Subject: [PATCH] amlbootenc-gxl: remove non std C convention in for
|
|
|
|
not all compilers have c99 or gnu99 enabled, so try not to use a
|
|
non std C convention in for call loops
|
|
|
|
Signed-off-by: Dagg Stompler <daggs@gmx.com>
|
|
---
|
|
amlbootenc-gxl.c | 7 ++++---
|
|
1 file changed, 4 insertions(+), 3 deletions(-)
|
|
|
|
diff --git a/amlbootenc-gxl.c b/amlbootenc-gxl.c
|
|
index 3695e13..233563d 100644
|
|
--- a/amlbootenc-gxl.c
|
|
+++ b/amlbootenc-gxl.c
|
|
@@ -51,6 +51,7 @@ static int boot_enc(const char *input, const char *output)
|
|
._unknown3 = 0x02000000,
|
|
.sig2 = AMLOGIC_C_SIGNATURE,
|
|
};
|
|
+ int i;
|
|
|
|
assert(sizeof(hdr) == 0x100);
|
|
|
|
@@ -130,10 +131,10 @@ static int boot_enc(const char *input, const char *output)
|
|
memcpy(hdr.iv, (uint8_t[]){ 0x14, 0x82, 0x5b, 0x1b, 0x10, 0xc1, 0x49, 0x0d, 0x8f, 0x13, 0x0a, 0x99, 0x15, 0x50, 0x1d, 0x37 }, 16);
|
|
}
|
|
#else
|
|
- for (int i = 0; i < sizeof(hdr.key); i++) {
|
|
+ for (i = 0; i < sizeof(hdr.key); i++) {
|
|
hdr.key[i] = rand();
|
|
}
|
|
- for (int i = 0; i < sizeof(hdr.iv); i++) {
|
|
+ for (i = 0; i < sizeof(hdr.iv); i++) {
|
|
hdr.iv[i] = rand();
|
|
}
|
|
#endif
|
|
@@ -151,7 +152,7 @@ static int boot_enc(const char *input, const char *output)
|
|
AES_cbc_encrypt(src_buf, buf + hdr.first_offset, hdr.block_size, &aes_key, iv, AES_ENCRYPT);
|
|
SHA256_Update(&sha256_ctx, buf + hdr.first_offset, hdr.block_size);
|
|
|
|
- for (int i = 1; i < hdr.payload_size / hdr.block_size; i++) {
|
|
+ for (i = 1; i < hdr.payload_size / hdr.block_size; i++) {
|
|
memset(src_buf, 0, hdr.block_size);
|
|
fread(src_buf, 1, hdr.block_size, fin);
|
|
AES_cbc_encrypt(src_buf, buf + hdr.data_offset + (i - 1) * hdr.block_size, hdr.block_size, &aes_key, iv, AES_ENCRYPT);
|
|
--
|
|
2.28.0
|
|
|