# For this example we'll use a fairly simple package that compiles easily
# and has sources available for download at sourceforge
-DROPBEAR=dropbear-0.44test3
+DROPBEAR=dropbear-0.44
DROPBEAR_TARGET=.built
DROPBEAR_DIR=$(BUILD_DIR)/$(DROPBEAR)
DROPBEAR_IPK=$(BUILD_DIR)/$(DROPBEAR)_mipsel.ipk
DROPBEAR_IPK_DIR=$(BUILD_DIR)/$(DROPBEAR)-ipk
-DROPBEAR_SITE=http://matt.ucc.asn.au/dropbear/testing/
+DROPBEAR_SITE=http://matt.ucc.asn.au/dropbear/
DROPBEAR_SOURCE=$(DROPBEAR).tar.bz2
---- dropbear-0.44test3-old/options.h 2004-08-27 11:22:17.000000000 -0400
-+++ dropbear-0.44test3/options.h 2004-08-27 23:44:16.271117200 -0400
-@@ -176,7 +176,7 @@
- #define DROPBEAR_VERSION "0.44test3"
+diff -bBurN dropbear-0.44/options.h dropbear-0.44-openwrt/options.h
+--- dropbear-0.44/options.h 2005-01-03 10:24:03.000000000 +0100
++++ dropbear-0.44-openwrt/options.h 2005-01-14 13:19:38.902029040 +0100
+@@ -139,7 +139,7 @@
+ * will prevent Dropbear from blocking on the device. This could
+ * however significantly reduce the security of your ssh connections
+ * if the PRNG state becomes simpler. */
+-#define DROPBEAR_RANDOM_DEV "/dev/random"
++#define DROPBEAR_RANDOM_DEV "/dev/urandom"
+
+ /* prngd must be manually set up to produce output */
+ /*#define DROPBEAR_PRNGD_SOCKET "/var/run/dropbear-rng"*/
+@@ -188,7 +188,7 @@
+ #define DROPBEAR_VERSION "0.44"
#endif
-#define LOCAL_IDENT "SSH-2.0-dropbear_" DROPBEAR_VERSION