Commit Graph

139 Commits

Author SHA1 Message Date
Peter Kjellerstedt
fc57827421 cryptsetup: Add support for building without SSH tokens
Cryptsetup SSH tokens is the only feature that has a dependency on
libssh. Add a packageconfig to control this dependency.

Change-Id: Iac4f91e099ad2e3a79aab183734108f8bfbff57f
Signed-off-by: Peter Kjellerstedt <peter.kjellerstedt@axis.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-06-30 07:01:38 -04:00
Wang Mingyu
1711600fc5 botan: upgrade 2.19.1 -> 2.19.2
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-06-06 13:58:43 -07:00
Samuli Piippo
c8541a3482 libtomcrypt: add recipe
LibTomCrypt is a fairly comprehensive, modular and portable cryptographic
toolkit that provides developers with a vast array of well known published
block ciphers, one-way hash functions, chaining modes, pseudo-random number
generators, public key cryptography and a plethora of other routines.

Signed-off-by: Samuli Piippo <samuli.piippo@qt.io>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-05-31 08:26:23 -07:00
wangmy
ad5a17d3c7 pkcs11-helper: upgrade 1.28.0 -> 1.29.0
2020-04-21 - Version 1.29.0

    build: do not fail if slot evnets are disabled, thanks to Fabrice Fontaine.
    core: do not assume standard objects supported by provider.
    openssl: set back key into EVP for openssl-3 to work, thanks to apollo13.

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-05-09 08:59:46 -07:00
Alejandro Enedino Hernandez Samaniego
f850d140d7 cryptsetup: Add luks2 configure options defaults
Cryptsetup allows for certain luks2 related defaults to be
set for libcryptsetup, these include the default PBKDF
algorithm, memory limit for Argon2, parallel threads and
iteration time.

Set default variables defined to the same values currently
coming from cryptsetup upstream, making this change transparent
for the user but allow these values to be customized.

Signed-off-by: Alejandro Enedino Hernandez Samaniego <alejandro@enedino.org>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-05-04 07:57:13 -07:00
Oleksandr Kravchuk
139cc11605 pkcs11-helper: fix PV
Signed-off-by: Oleksandr Kravchuk <open.source@oleksandr-kravchuk.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-04-13 19:21:41 -07:00
Khem Raj
a0aaf7a23a libkcapi: Upgrade to 1.4.0
Drop upstreamed patch
Disable new warnings seen with gcc 12

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-04-13 19:21:41 -07:00
Khem Raj
4b46afe54e fsverity-utils: Define LIBDIR
This helps make it platform independent since some platforms e.g. ppc64
uses lib64 for system libpaths

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-03-21 08:25:11 -07:00
Khem Raj
14c7d8a0d7 recipes: Update LICENSE variable to use SPDX license identifiers
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-03-04 17:41:45 -08:00
Wang Mingyu
e67a4dcf96 fsverity-utils: upgrade 1.4 -> 1.5
Changelog:
=========
* Made the 'fsverity sign' command and the 'libfsverity_sign_digest()' function
  support PKCS#11 tokens.
* Avoided a compiler error when building with musl libc.
* Avoided compiler warnings when building with OpenSSL 3.0.
* Improved documentation and test scripts.

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-02-16 08:26:02 -08:00
Ross Burton
b3a2b1e1d1 pkcs11-helper: set precise BSD license
This package is BSD-3-Clause.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-02-03 08:44:32 -08:00
Ross Burton
2f18574ffe pkcs11-helper: update homepage
www.opensc-project.org expired, so point at the GitHub project page.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-02-03 08:44:32 -08:00
wangmy
ac3bf04b28 botan: upgrade 2.18.2 -> 2.19.1
License-Update: year updated to 2022.

Changelog:
=========
Fix a compilation problem affecting macOS XCode (GH #2880)
Fix a build problem preventing amalgamation builds in 2.19.0 (GH #2879)

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-01-25 10:56:04 -08:00
wangmy
9f4d806758 cryptsetup: upgrade 2.4.2 -> 2.4.3
Changelog:
=========
Stable security bug-fix release that fixes CVE-2021-4122.

All users of cryptsetup 2.4.x must upgrade to this version.

Changes since version 2.4.2
~~~~~~~~~~~~~~~~~~~~~~~~~~~

* Fix possible attacks against data confidentiality through LUKS2 online
  reencryption extension crash recovery (CVE-2021-4122).

  An attacker can modify on-disk metadata to simulate decryption in
  progress with crashed (unfinished) reencryption step and persistently
  decrypt part of the LUKS device.

  This attack requires repeated physical access to the LUKS device but
  no knowledge of user passphrases.

  The decryption step is performed after a valid user activates
  the device with a correct passphrase and modified metadata.
  There are no visible warnings for the user that such recovery happened
  (except using the luksDump command). The attack can also be reversed
  afterward (simulating crashed encryption from a plaintext) with
  possible modification of revealed plaintext.

  The size of possible decrypted data depends on configured LUKS2 header
  size (metadata size is configurable for LUKS2).
  With the default parameters (16 MiB LUKS2 header) and only one
  allocated keyslot (512 bit key for AES-XTS), simulated decryption with
  checksum resilience SHA1 (20 bytes checksum for 4096-byte blocks),
  the maximal decrypted size can be over 3GiB.

  The attack is not applicable to LUKS1 format, but the attacker can
  update metadata in place to LUKS2 format as an additional step.
  For such a converted LUKS2 header, the keyslot area is limited to
  decrypted size (with SHA1 checksums) over 300 MiB.

  The issue is present in all cryptsetup releases since 2.2.0.
  Versions 1.x, 2.0.x, and 2.1.x are not affected, as these do not
  contain LUKS2 reencryption extension.

  The problem was caused by reusing a mechanism designed for actual
  reencryption operation without reassessing the security impact for new
  encryption and decryption operations. While the reencryption requires
  calculating and verifying both key digests, no digest was needed to
  initiate decryption recovery if the destination is plaintext (no
  encryption key). Also, some metadata (like encryption cipher) is not
  protected, and an attacker could change it. Note that LUKS2 protects
  visible metadata only when a random change occurs. It does not protect
  against intentional modification but such modification must not cause
  a violation of data confidentiality.

  The fix introduces additional digest protection of reencryption
  metadata. The digest is calculated from known keys and critical
  reencryption metadata. Now an attacker cannot create correct metadata
  digest without knowledge of a passphrase for used keyslots.
  For more details, see LUKS2 On-Disk Format Specification version 1.1.0.

  The former reencryption operation (without the additional digest) is no
  longer supported (reencryption with the digest is not backward
  compatible). You need to finish in-progress reencryption before
  updating to new packages. The alternative approach is to perform
  a repair command from the updated package to recalculate reencryption
  digest and fix metadata.
  The reencryption repair operation always require a user passphrase.

  WARNING: Devices with older reencryption in progress can be no longer
  activated without performing the action mentioned above.

  Encryption in progress can be detected by running the luksDump command
  (output includes reencrypt keyslot with reencryption parameters). Also,
  during the active reencryption, no keyslot operations are available
  (change of passphrases, etc.).

  The issue was found by Milan Broz as cryptsetup maintainer.

Other changes
~~~~~~~~~~~~~
* Add configure option --disable-luks2-reencryption to completely disable
  LUKS2 reencryption code.

  When used, the libcryptsetup library can read metadata with
  reencryption code, but all reencryption API calls and cryptsetup
  reencrypt commands are disabled.

  Devices with online reencryption in progress cannot be activated.
  This option can cause some incompatibilities. Please use with care.

* Improve internal metadata validation code for reencryption metadata.

* Add updated documentation for LUKS2 On-Disk Format Specification
  version 1.1.0 (with reencryption extension description and updated
  metadata description). See docs/on-disk-format-luks2.pdf or online
  version in https://gitlab.com/cryptsetup/LUKS2-docs repository.

* Fix support for bitlk (BitLocker compatible) startup key with new
  metadata entry introduced in Windows 11.

* Fix space restriction for LUKS2 reencryption with data shift.
  The code required more space than was needed.

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-01-19 09:01:04 -08:00
wangmy
466ffb8414 pkcs11-helper: upgrade 1.27 -> 1.28
0001-build-openssl-remove-RSA_SSLV23_PADDING-constant-usa.patch
0001-nss-use-nss-pkcs11-h.patch
removed since they're included in 1.28.

Changelog:
=========
 * build: openssl: remove RSA_SSLV23_PADDING constant usage due to openssl-3
   compatibility.
 * build: nss: use nss pkcs11.h
 * build: windows: checksum in PE
 * build: windows: support openssl-1.1.1
 * mbed: require >=mbedtls-2, mbed dropped polarssl compatibility,
 * certificate: add methods accept full mechanism
 * core: load provider library as private.
 * core: add pkcs11h_getProperty, pkcs11h_setProperty to support adding
   properties without breaking API.
 * core: add pkcs11h_initializeProvider, pkcs11h_registerProvider,
   pkcs11h_setProviderProperty, pkcs11h_setProviderPropertyByName to
   support adding properties without breaking API
 * core: add initialization arguments property
 * core: add PKCS11H_PROVIDER_PROPERTY_PROVIDER_DESTRUCT_HOOK.
 * session: respect login required token flag.
 * certificate: respect always authenticate flag.

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2022-01-05 11:10:02 -08:00
Khem Raj
d7a91f13c4 pkcs11-helper: Fix build with nss >= 3.73.1
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2021-12-25 13:30:13 -08:00
Khem Raj
b6eb9036eb libkcapi: Fix build with musl
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Cc: Oleksandr Kravchuk <open.source@oleksandr-kravchuk.com>
2021-12-21 18:49:37 -08:00
Oleksandr Kravchuk
e95b6af4c8 libkcapi: update to 1.3.1
Dropped upstreamed patch.

License-Update: copyright years updated.

Signed-off-by: Oleksandr Kravchuk <open.source@oleksandr-kravchuk.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2021-12-15 19:11:18 -08:00
wangmy
830666b54d cryptsetup: upgrade 2.4.1 -> 2.4.2
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2021-11-22 10:15:00 -08:00
Ross Burton
c8384c874f libkcapi: set precise BSD license
"BSD" is ambiguous, use the precise license BSD-3-Clause.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2021-11-18 11:07:10 -08:00
Ross Burton
95eec99419 libkcapi: remove DEPENDS on target libtool
There is no need to build depend on the target libtool.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2021-11-18 11:07:10 -08:00
Richard Purdie
b402a3076f recipes: Update SRC_URI branch and protocols
This patch updates SRC_URIs using git to include branch=master if no branch is set
and also to use protocol=https for github urls as generated by the conversion script
in OE-Core.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2021-11-03 06:57:49 -07:00
wangmy
b8a5f0740b botan: upgrade 2.18.1 -> 2.18.2
Version 2.18.2, 2021-10-25
Avoid using short exponents when encrypting in ElGamal,
as some PGP implementations generate keys with parameters
that are weak when short exponents are used (GH #2794)

Fix a low risk OAEP decryption side channel (GH #2797)

Work around a miscompilation of SHA-3 caused by a bug in Clang 12
and XCode 13. (GH #2826)

Remove support in OpenSSL provider for algorithms which are disabled
by default in OpenSSL 3.0 (GH #2823, #2814)

Add CI based on GitHub actions to replace Travis CI (GH #2632)

Fix the online OCSP test, as the certificate involved had expired.
(GH #2799)

Fix some test failures induced by the expiration of the trust root
"DST Root CA X3" (GH #2820)

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2021-11-03 06:57:48 -07:00
wangmy
6e9d281889 cryptsetup: upgrade 2.3.6 -> 2.4.1
Cryptsetup 2.4.1 Release Notes
==============================
Stable bug-fix release with minor extensions.

All users of cryptsetup 2.4.0 should upgrade to this version.

Changes since version 2.4.0
~~~~~~~~~~~~~~~~~~~~~~~~~~~

* Fix compilation for libc implementations without dlvsym().

  Some alternative libc implementations (like musl) do not provide
  versioned symbols dlvsym function. Code now fallbacks to dlsym
  operation for dynamic LUKS2 token load.
  It is up to maintainers to ensure that LUKS2 token plugins are
  compiled for the supported version.

* Fix compilation and tests on systems with non-standard libraries
  (standalone argp library, external gettext library, BusyBox
  implementations of standard tools).

* Try to workaround some issues on systems without udev support.
  NOTE: non-udev systems cannot provide all functionality for kernel
  device-mapper, and some operations can fail.

* Fixes for OpenSSL3 crypto backend (including FIPS mode).
  Because cryptsetup still requires some hash functions implemented
  in OpenSSL3 legacy provider, crypto backend now uses its library
  context and tries to load both default and legacy OpenSSL3 providers.

  If FIPS mode is detected, no library context is used, and it is up
  to the OpenSSL system-wide policy to load proper providers.

  NOTE: We still use some deprecated API in the OpenSSL3 backend,
  and there are some known problems in OpenSSL 3.0.0.

* Print error message when assigning a token to an inactive keyslot.

* Fix offset bug in LUKS2 encryption code if --offset option was used.

* Do not allow LUKS2 decryption for devices with data offset.
  Such devices cannot be used after decryption.

* Fix LUKS1 cryptsetup repair command for some specific problems.
  Repair code can now fix wrongly used initialization vector
  specification in ECB mode (that is insecure anyway!) and repair
  the upper-case hash specification in the LUKS1 header.

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2021-10-25 10:40:50 -07:00
Alexander Kanavin
e8f84f7803 pkcs11-helper: backport a openssl 3.x patch
Signed-off-by: Alexander Kanavin <alex@linutronix.de>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2021-10-14 07:16:58 -07:00
Kristian Klausen
9b02aa1220 cryptsetup: Add runtime dependency on lvm2-udevrules for udev
Without the udevrules cryptsetup luksOpen will be hanging with "Udev
cookie 0xd4de0f6 (semid 5) waiting for zero".

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2021-09-07 10:03:49 -07:00
Sinan Kaya
479d0d7f3b libkcapi: allow an option to build natively
Signed-off-by: Sinan Kaya <okaya@kernel.org>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2021-08-25 08:17:04 -07:00
Sinan Kaya
989ca68136 libkcapi: add a hash only packageconfig
Signed-off-by: Sinan Kaya <okaya@kernel.org>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2021-08-25 08:17:04 -07:00
Martin Jansa
c61dc077bb Convert to new override syntax
This is the result of automated script (0.9.1) conversion:

oe-core/scripts/contrib/convert-overrides.py .

converting the metadata to use ":" as the override character instead of "_".

Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
2021-08-03 10:21:25 -07:00
Peter Kjellerstedt
497602b484 cryptsetup: Only recommend kernel modules when building for target
Otherwise cryptsetup-native depends on the target kernel and thus the
target compiler, as can be seen by:

  $ bitbake -g cryptsetup-native
  $ grep 'cryptsetup.*linux-yocto' task-depends.dot
  "cryptsetup-native.do_build" -> "linux-yocto.do_deploy"
  "cryptsetup-native.do_build" -> "linux-yocto.do_package_write_rpm"
  "cryptsetup-native.do_populate_sysroot" -> "linux-yocto.do_populate_sysroot"
  $ grep 'linux-yocto.*gcc-cross' task-depends.dot
  "linux-yocto.do_kernel_configme" -> "gcc-cross-x86_64.do_populate_sysroot"
  "linux-yocto.do_prepare_recipe_sysroot" -> "gcc-cross-x86_64.do_populate_sysroot"

This also moves the runtime dependencies to near the end of the recipe,
which is more customary.

Signed-off-by: Peter Kjellerstedt <peter.kjellerstedt@axis.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2021-06-28 09:03:34 -07:00
zangrc
1d842d4cca fsverity-utils: upgrade 1.3 -> 1.4
Signed-off-by: Zang Ruochen <zangrc.fnst@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2021-06-18 08:42:25 -07:00
zangrc
056d0892f0 cryptsetup: upgrade 2.3.5 -> 2.3.6
Signed-off-by: Zang Ruochen <zangrc.fnst@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2021-06-10 20:43:44 -07:00
Andreas Müller
ed03fea315 botan: upgrade 2.14.0 -> 2.18.1
Signed-off-by: Andreas Müller <schnitzeltony@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2021-05-24 07:39:35 -07:00
Khem Raj
6e99122ed8 cryptsetup: DEPEND on renamed util-linux-libuuid
OE-core recipe is called util-linux-libuuid now

Signed-off-by: Khem Raj <raj.khem@gmail.com>
Cc: Luca Boccassi <luca.boccassi@microsoft.com>
2021-03-26 10:34:21 -07:00
zhengruoqin
a8d0838fa7 cryptsetup: upgrade 2.3.4 -> 2.3.5
Signed-off-by: Zheng Ruoqin <zhengrq.fnst@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2021-03-19 01:19:14 -07:00
Luca Boccassi
2266a8a194 cryptsetup: depend on new util-linux-uuid to break cycle
The util-linux recipe in Poky has been split, and libuuid is separate now:

http://git.yoctoproject.org/cgit/cgit.cgi/poky/commit/?id=d42487bf52310d095178e480b7ddec2666471009

This allows to build util-linux with cryptsetup, for native dm-verity
support.
The main cryptsetup build needs libuuid and not the full util-linux, so
switch the build-dependency over, thus allowing users to enable the
cryptsetup util-linux's PACKAGECONFIG.
The libblkid dependency is handled individually by the crypsetup's
PACKAGECONFIG option.

Signed-off-by: Luca Boccassi <luca.boccassi@microsoft.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2021-03-12 15:55:07 -08:00
Khem Raj
0b8a8f8ca3 libmcrypt: Run autoreconf steps manually
This helps in re-running the configure generation with autotools 2.70+

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2021-02-08 10:17:17 -08:00
Luca Boccassi
8a29a7f9aa fsverity: fix MinGW build
Upstream supports building a binary with MinGW but not a shared library,
so remove the configure option for MinGW targets.

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2021-01-20 09:44:15 -08:00
Luca Boccassi
d960d152b9 fsverity: update to 1.3
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2021-01-20 09:44:15 -08:00
zangrc
416aa23c9e pkcs11-helper: upgrade 1.26 -> 1.27
Signed-off-by: Zang Ruochen <zangrc.fnst@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2020-11-27 11:54:04 -08:00
Khem Raj
7888dcefc6 libkcapi: Fix build on riscv32
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2020-11-16 12:34:51 -08:00
Khem Raj
68c431c2c2 botan: Mark incompatible with riscv32
CPU is not supported _yet_

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2020-11-15 12:25:53 -08:00
Zang Ruochen
c801ca3af0 libkcapi: upgrade 1.2.0 -> 1.2.1
Signed-off-by: Zang Ruochen <zangrc.fnst@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2020-11-02 09:00:52 -08:00
Luca Boccassi
993c8cfbc9 Add recipe for fsverity-utils
Library and command-line tool to manage the fs-verity
feature, introduced in Linux 5.4 and supported in ext4
and f2fs filesystems.

https://www.kernel.org/doc/html/latest/filesystems/fsverity.html

Signed-off-by: Luca Boccassi <luca.boccassi@microsoft.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2020-10-21 14:11:09 -07:00
Zang Ruochen
7a548bace1 cryptsetup: upgrade 2.3.3 -> 2.3.4
Signed-off-by: Zang Ruochen <zangrc.fnst@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2020-09-10 21:20:23 -07:00
Oleksandr Kravchuk
4fd8133bdb libkcapi: update to 1.2.0
Removed patches were upstreamed.

License checksum changed due to modified copyright years
(see @8397f0f7c45264a).

Signed-off-by: Oleksandr Kravchuk <open.source@oleksandr-kravchuk.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2020-07-28 12:23:16 -07:00
Changqing Li
e2d3ecaeb0 libmcrypt: set CLEANBROKEN
reproduce steps:
1. bitbake libmcrypt
2. add bb.note('hello') in do_fetch of base.bbclass
3. bitbake libmcrypt

do_configure failed:
Making clean in doc
make[1]: Entering directory 'build/tmp-glibc/work/cortexa72-wrs-linux/libmcrypt/2.5.8-r0/libmcrypt-2.5.8/doc'
make[1]: *** No rule to make target 'clean'.  Stop.
make[1]: Leaving directory 'build/tmp-glibc/work/cortexa72-wrs-linux/libmcrypt/2.5.8-r0/libmcrypt-2.5.8/doc'
Makefile:316: recipe for target 'clean-recursive' failed

error occurred in autotools_preconfigure, since we have build one time
in step1, we have CONFIGURESTAMPFILE, and also BB_TASKHASH changed after
step2, in step3, after do_fetch, ${S} is renewed, but with main Makefile
exist but no Makefile exist under sub folder, so above error occurred.

set CLEANBROKEN to fix this error

Signed-off-by: Changqing Li <changqing.li@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2020-06-27 22:49:54 -07:00
Zang Ruochen
b2dfc24fde cryptsetup: upgrade 2.3.2 -> 2.3.3
Signed-off-by: Zang Ruochen <zangrc.fnst@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2020-06-10 20:57:01 -07:00
Wang Mingyu
4dacdef41c cryptsetup: upgrade 2.3.1 -> 2.3.2
Signed-off-by: Wang Mingyu <wangmy@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2020-05-22 09:03:04 -07:00
Pierre-Jean Texier
44abef2c1d botan: upgrade 2.13.0 -> 2.14.0
See full changelog https://botan.randombit.net/news.html#version-2-14-0-2020-04-06

Signed-off-by: Pierre-Jean Texier <pjtexier@koncepto.io>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2020-04-08 18:15:54 -07:00
Khem Raj
c64b204a3a botan: Define --libdir to fix multilib build issues
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2020-03-17 19:46:35 -07:00
Pierre-Jean Texier
a76744d8ba cryptsetup: upgrade 2.3.0 -> 2.3.1
This is a bug-fix release, see full changelog:

 - https://mirrors.edge.kernel.org/pub/linux/utils/cryptsetup/v2.3/v2.3.1-ReleaseNotes

Signed-off-by: Pierre-Jean Texier <pjtexier@koncepto.io>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2020-03-12 16:49:59 -07:00
Pierre-Jean Texier
4d85c3a512 pkcs11-helper: add UPSTREAM_CHECK_GITTAGREGEX
Fixes:

INFO: pkcs11-helper, 1.26, 11, None, c7a0cfa08ddc75d963a835d3588170af0e5f1115

After this commit:

INFO: Skip package pkcs11-helper (status = MATCH, current version = 1.26, next version = 1.26)

Signed-off-by: Pierre-Jean Texier <pjtexier@koncepto.io>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2020-03-06 17:23:54 -08:00
Wang Mingyu
59ceb3f122 cryptsetup: upgrade 2.2.2 -> 2.3.0
Signed-off-by: Wang Mingyu <wangmy@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2020-02-14 17:11:40 -08:00
Pierre-Jean Texier
463f9a3ef0 pkcs11-helper: upgrade 1.25.1 -> 1.26
See full changelog https://github.com/OpenSC/pkcs11-helper/releases/tag/pkcs11-helper-1.26

Signed-off-by: Pierre-Jean Texier <pjtexier@koncepto.io>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2020-01-29 16:50:24 -08:00
Wang Mingyu
81f14485fc botan: upgrade 2.11.0 -> 2.13.0
-License-Update: Copyright year updated to 2020.

Signed-off-by: Wang Mingyu <wangmy@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2020-01-07 17:54:00 -08:00
Khem Raj
63a724ce40 libkcapi: Update patch to upstream submitted one
Use builtin_bswap32 with clang if available

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2019-11-20 22:17:28 -08:00
Khem Raj
bd4e75ac21 libkcapi: Move static inline functions where used
Clang warns about unused functions on some arches e.g. mips
unused function '_bswap32' [-Werror,-Wunused-function]

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2019-11-18 16:49:57 -08:00
Zheng Ruoqin
dc9caf5d1d cryptsetup: upgrade 2.2.1 -> 2.2.2
Signed-off-by: Zheng Ruoqin <zhengrq.fnst@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2019-11-06 19:58:01 -08:00
Yuan Chao
4f29ebd4ea cryptsetup: upgrade 2.2.0 -> 2.2.1
Signed-off-by: Yuan Chao <yuanc.fnst@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2019-09-19 00:09:43 -07:00
Oleksandr Kravchuk
6817c01328 botan: update to 2.11.0
Signed-off-by: Oleksandr Kravchuk <open.source@oleksandr-kravchuk.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2019-09-16 18:24:48 -07:00
Hongxu Jia
6a5d6bc9ad cryptsetup: add libdevmapper to RDEPENDS
Since commit [libdevmapper/lvm2: force recipe libdevmapper to populate
sysroot only] applied, if recipe DEPENDS on libdevmapper, we have to
add it to packages RDEPENDS to fix [file-rdeps] QA issue

Set PREFERRED_RPROVIDER_libdevmapper = "lvm2" in layer.conf to explicit
RDEPENDS on libdevmapper in cryptsetup

Suggested-by : peter.kjellerstedt@axis.com
Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2019-08-31 01:24:55 -07:00
Hongxu Jia
d8685320a4 cryptsetup: add libdevmapper to RDEPENDS
Since commit [libdevmapper/lvm2: force recipe libdevmapper to populate
sysroot only] applied, if recipe DEPENDS on libdevmapper, we have to
add it to packages RDEPENDS to fix [file-rdeps] QA issue

Skip [build-deps] and [file-rdeps] QA checking, add lvm2 to DEPENDS will
triger circular dependencies, use recipe libdevmapper to replace,
ignore the QA checking is fine.

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2019-08-29 09:07:34 -07:00
Zang Ruochen
4f9d5b97d6 cryptsetup: upgrade 2.1.0 -> 2.2.0.
Signed-off-by: Zang Ruochen <zangrc.fnst@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2019-08-19 18:20:38 -07:00
Zang Ruochen
80e0113f7a libkcapi: upgrade 1.1.4 -> 1.1.5
Signed-off-by: Zang Ruochen <zangrc.fnst@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2019-08-05 20:22:51 -07:00
Zang Ruochen
a58021bd40 libsodium: upgrade 1.0.17 -> 1.0.18
Signed-off-by: Zang Ruochen <zangrc.fnst@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2019-08-02 18:04:41 -07:00
Yi Zhao
11ff107a85 cryptsetup: set the default luks format to LUKS1
The cryptsetup 2.1 uses LUKS2 format as the default LUKS format. This
change introduced the following issues:

* LUKS2 requires kernel userspace crypto API to be available
  (CONFIG_CRYPTO_USER_API and CONFIG_CRYPTO_USER_API_SKCIPHER). But
  linux-yocto doesn't enable these options by default. If missing these
  kernel modules, the cryptsetup will fall back to using dmcrypt-device
  for keyslot processing.

  $ cryptsetup --debug --type luks luksFormat /dev/sda3
    [snip]
    Checking if cipher aes-xts-plain64 is usable.
    Userspace crypto wrapper cannot use aes-xts-plain64 (-95).
    Using dmcrypt to access keyslot area.
    [snip]

* The grub can not decrypt a LUKS2 encrypted boot partition because it
  doesn't support LUKS2 now.
  See grub bug: https://savannah.gnu.org/bugs/?55093

Add a PACKAGCONFIG for luks format and set the default LUKS format to
LUKS1. The users can specify '--type luks2' in cryptsetup command line
if they want to use LUKS2.

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2019-07-11 14:01:28 -07:00
Robert Joslyn
5aaaf8e972 cryptsetup: Don't enable udev for native build
When building cryptsetup-native, don't enable udev support since there
is not a udev-native recipe.

When udev is enabled, change the dependency from a DEPENDS to an
RDEPENDS. The --enable-udev option adds a runtime check for udev before
using udev features of libdevmapper. Because of this, udev isn't needed
at build time, just runtime.

Signed-off-by: Robert Joslyn <robert.joslyn@redrectangle.org>
Reviewed-by: Mikko Rapeli <mikko.rapeli@bmw.de>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2019-07-10 09:24:33 -07:00
Robert Joslyn
1ce71d6ec3 cryptsetup: Add PACKAGECONFIG options
Add various PACKAGECONFIG options, keeping the default options enabled.

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2019-06-15 16:45:33 -07:00
Oleksandr Kravchuk
d3bfe0a626 libsodium: update to 1.0.17
License checkusm has been changed due to the copiright year change in
the LICENSE file.

Signed-off-by: Oleksandr Kravchuk <open.source@oleksandr-kravchuk.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2019-03-15 13:57:47 -07:00
Mingli Yu
e9434ec4ce cryptsetup: Upgrade to 2.1.0
Instead of hardcoding the version in SRC_URI,
get the version for the folder of the source
dynamically in SRC_URI.

Signed-off-by: Mingli Yu <mingli.yu@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2019-02-15 06:58:55 -08:00
Khem Raj
f58ae7a64b botan: Upgrade to 2.9.0
License-Update: Update copyright years to 2019

d5edb39e96 (diff-98cd14c95bb22f9d397da0603a77d950)

Swith to tarball fetcher

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2019-01-30 17:17:54 -08:00
Krzysztof Kozlowski
7cf2f4996f libkcapi: Bump to v1.1.4
License file was updated with new dates ("2016" -> "2016 - 2019").

Signed-off-by: Krzysztof Kozlowski <krzk@kernel.org>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2019-01-26 11:00:07 -08:00
Krzysztof Kozlowski
7c52d8ab71 libkcapi: Fix missing bash (for apps) and unneeded checksums (for testapp) when building
Fix build failures:
1. with "apps" PACKAGECONFIG:

    ERROR: libkcapi-1.1.3+gitAUTOINC+1c736c43eb-r0 do_package:
    QA Issue: libkcapi: Files/directories were installed but not shipped in any package:
      /usr/bin/.sha1hmac.hmac
      /usr/lib/.libkcapi.so.1.1.3.hmac

2. with "testapp" PACKAGECONFIG:

    ERROR: libkcapi-1.1.3+gitAUTOINC+1c736c43eb-r0 do_package_qa:
    QA Issue: /usr/libexec/libkcapi/test.sh contained in package libkcapi requires /bin/bash,
    but no providers found in RDEPENDS_libkcapi? [file-rdeps]

Signed-off-by: Krzysztof Kozlowski <krzk@kernel.org>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2019-01-26 11:00:07 -08:00
Khem Raj
70a0692211 botan: Add recipe
botan is a common crypto library used by various infrastructures e.g.
qtcreator chromium etc. Its beneficial to build it once for the system
and let apps use it if possible

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-09-29 02:10:12 -07:00
Khem Raj
7b6c088b87 libkcapi: Disable Wsign-compare warning with clang/musl
clang 7.0 is grumpy and complains about cmsg structures and macros from
sys/socket.h

kcapi-kernel-if.c:25:11: error: comparison of integers of different signs: 'unsigned long' and 'long' [-Werror,-Wsign-compare] header = CMSG_NXTHDR(&msg, header);

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-09-09 12:08:46 -07:00
Khem Raj
0d69645f3b pkcs11-helper: Upgrade to 1.25.1
* Fixes build with OpenSSL 1.1.x

License-Update:

* update year to 2018
* remove 'All rights reserved'

Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-09-08 13:32:12 -07:00
Khem Raj
58062ba654 libkcapi: Upgrade to 1.1.3
Drop upstream patches

Signed-off-by: Khem Raj <raj.khem@gmail.com>
Cc: Krzysztof Kozlowski <krzk@kernel.org>
2018-08-30 23:54:38 -07:00
Mingli Yu
4fb7aa816c cryptsetup: Upgrade to 2.0.4
Signed-off-by: Mingli Yu <mingli.yu@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-08-29 18:18:14 -07:00
Mingli Yu
1507fa0aa2 cryptsetup: Upgrade to 2.0.3
* Update the homepage to https://gitlab.com/cryptsetup/cryptsetup
* Add json-c to DEPENDS as cryptsetup requires the
  json-c library for JSON data processing since cryptsetup
  2.0.0 per "The LUKS2 format and features" part of
  https://mirrors.edge.kernel.org/pub/linux/utils/cryptsetup/v2.0/v2.0.0-ReleaseNotes
* Add file /usr/lib/tmpfiles.d/cryptsetup.conf to
  FILES_${PN} when systemd enabled in DISTRO_FEATURES

Signed-off-by: Mingli Yu <mingli.yu@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-07-20 16:07:12 -07:00
Krzysztof Kozlowski
d6836356c4 libkcapi: Add new recipe for v1.1.1
Add new recipe with libkcapi v1.1.1, Linux Kernel Crypto API User Space
Interface Library.

Signed-off-by: Krzysztof Kozlowski <krzk@kernel.org>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-07-14 11:28:12 -07:00
leimaohui
a5ea75f516 engine-pkcs11: has been merged to libp11, so deleted.
Reference to https://github.com/OpenSC/engine_pkcs11,there is no need to maitain this recipe.

Signed-off-by: Lei Maohui <leimaohui@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-06-20 10:07:41 -07:00
Oleksandr Kravchuk
edf011c303 libsodium: update to 1.0.16
Added link to bug tracker and updated md5sum of LICENSE, which has been
updated with the copyright year.

Signed-off-by: Oleksandr Kravchuk <dev@sashko.rv.ua>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-06-14 09:01:12 -07:00
Yi Zhao
44ba923dc5 libmcrypt: add UPSTREAM_CHECK_URI
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
2018-05-29 12:56:19 -07:00
Armin Kuster
40877b1244 cryptsetup: move to crypto
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-03-01 16:10:37 -08:00
Armin Kuster
0df104e33d libcrypto: move to recipes-crypto
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-03-01 16:10:37 -08:00
Armin Kuster
74013bfa9a pkcs11-helper: move to recipes-crypto
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-03-01 16:10:37 -08:00
Armin Kuster
73a9895ed4 engine-pkcs11: move to recipes-crypto
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-03-01 16:10:37 -08:00
Armin Kuster
3d91c97e1d libmcryt: movre to recipes-crypto
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2018-03-01 16:10:36 -08:00