This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
There'll be two stages in the core fusee payload, loading configuration from a shared ini file (https://en.wikipedia.org/wiki/INI_file). | |
- Stage 1 will be the actual exploit payload, and it will be fairly minimal: | |
- It will initialize DRAM, and initialize the display. | |
- It will load a filename and address for stage 2, loading stage 2 into DRAM and jumping to it. | |
- Stage 2 will be a "loader" -- it will be responsible for loading everything else into place prior to boot. | |
- Stage 2 will be able to load arbitrarily many files to arbitrary load addresses off of the SD card. | |
- Stage 2 will get a list of files to load from a "loadlist" key, with loadables delimited by "|" in the value. | |
- For each loadable, a _path and _addr key will be used to identify a filename and where to load it to. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
SWIG/_m2crypto.i:30: Error: Unable to find 'openssl/opensslv.h' | |
SWIG/_m2crypto.i:33: Error: Unable to find 'openssl/safestack.h' | |
SWIG/_evp.i:12: Error: Unable to find 'openssl/opensslconf.h' | |
SWIG/_ec.i:7: Error: Unable to find 'openssl/opensslconf.h' | |
error: command 'swig' failed with exit status 1 |