OpenWrt @ BattleMesh V14

2022-07-06 Thread Hauke Mehrtens
OpenWrt supports this year's "Wireless Battle of the Mesh - Building 
Community Networks for Fun and Non-Profit".


The event aims to bring together people from across the globe who are 
interested in community networks, including wireless mesh network 
technologies, fiber infrastructure, Do-It-Yourself Internet Access 
Providers, and more generally how to create and maintain a thriving 
community of people involved in building their own networks.


We envision 4 days of expert presentations, practical workshops, hacking 
sessions, and fruitful discussions: whether you are a mesh networking 
enthusiast, community networking activist, protocol developer, or have 
an interest in networking in general, come and join the event!


The Battlemesh is free of charge and open for all.

This year, the event will take place from Monday 19th to Wednesday 22nd 
of September, 2022 in Rome, Italy! It will be followed by the RomHack 
Camp on September 23-25, also in Rome. Check out more information at 
https://www.battlemesh.org/BattleMeshV14




OpenWrt participated in the Battlemesh v13 online edition in 2020.
We do not have an OpenWrt conference, mostly because organizing such an 
event is a lot of none technical work.


BattleMesh V14 will not be an official OpenWrt conference, but it would 
be nice to meet the OpenWrt community in Rome. We can still hack on 
hardware, drink some bear and talk about OpenWrt and other topics. If 
you are interested in giving a talk or a workshop about a topic related 
to OpenWrt, please propose it for Battlemesh V14.


If you do not want to organize a place to stay on your own you have to 
book the accommodation package, BEFORE Monday, July 11, 2022: 
https://fusolab.net/battlemesh


Hauke

___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel


[PATCH] openssl: bump to 1.1.1q

2022-07-06 Thread Dustin Lundquist
Changes between 1.1.1p and 1.1.1q [5 Jul 2022]

  *) AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised
 implementation would not encrypt the entirety of the data under some
 circumstances.  This could reveal sixteen bytes of data that was
 preexisting in the memory that wasn't written.  In the special case of
 "in place" encryption, sixteen bytes of the plaintext would be revealed.

 Since OpenSSL does not support OCB based cipher suites for TLS and DTLS,
 they are both unaffected.
 (CVE-2022-2097)
 [Alex Chernyakhovsky, David Benjamin, Alejandro SedeƱo]

Signed-off-by: Dustin Lundquist 
---
 package/libs/openssl/Makefile | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/package/libs/openssl/Makefile b/package/libs/openssl/Makefile
index ed618568a4..bf2d6ae64d 100644
--- a/package/libs/openssl/Makefile
+++ b/package/libs/openssl/Makefile
@@ -9,7 +9,7 @@ include $(TOPDIR)/rules.mk
 
 PKG_NAME:=openssl
 PKG_BASE:=1.1.1
-PKG_BUGFIX:=p
+PKG_BUGFIX:=q
 PKG_VERSION:=$(PKG_BASE)$(PKG_BUGFIX)
 PKG_RELEASE:=$(AUTORELEASE)
 PKG_USE_MIPS16:=0
@@ -25,7 +25,7 @@ PKG_SOURCE_URL:= \
ftp://ftp.pca.dfn.de/pub/tools/net/openssl/source/ \
ftp://ftp.pca.dfn.de/pub/tools/net/openssl/source/old/$(PKG_BASE)/
 
-PKG_HASH:=bf61b62aaa66c7c7639942a94de4c9ae8280c08f17d4eac2e44644d9fc8ace6f
+PKG_HASH:=d7939ce614029cdff0b6c20f0e2e5703158a489a72b2507b8bd51bf8c8fd10ca
 
 PKG_LICENSE:=OpenSSL
 PKG_LICENSE_FILES:=LICENSE
-- 
2.31.0.rc2


___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel