BusyBox 1.34 arrives with new utilities, improvements and more

The launch of the new version of the BusyBox 1.34 package, which this first version of branch 1.34 is positioned as unstable, so full stabilization will be provided in version 1.34.1, which is expected in about a month.

For those who are unfamiliar with BusyBox, they should know that it is presented with the implementation of a set of standard UNIX utilities, designed as a single executable file and optimized for minimal consumption of system resources when the package size is less than 1 MB.

The modular nature of BusyBox makes it possible to form a unified executable file that contains an arbitrary set of implemented utilities in the package (each utility is available in the form of a symbolic link to this file).

Main novelties of BusyBox 1.34

In this new version of BusyBox 1.34 the utilities bc and dc, processing environment variables BC_LINE_LENGTH and DC_LINE_LENGTH it's close to the GNU utilities.

Also Ash and Hush development continues, ^ D command handling has been aligned with ash and bash behavior, a bash-specific $ 'str' construct has been implemented, and $ {var / pattern / repl} replacement operations have been optimized.

As for the profit improvements, we can find for example that added option "-a" to la task set utility (apply CPU binding for all threads of the process), while to utilities chattr and lsattr added the "-p" option which has expanded the number of supported ext2 filesystem flags and added the option "-n" (disable overwrite) and "-t DIR" (set destination directory) to the cp utility.

On the part of the new utilities, we can find the new utility ascii with an interactive table of ASCII character names and crc32 to calculate checksums.

We can also find that the integrated http server supports the DELETE, PUT and OPTIONS methods, Udhcpc offers the possibility of changing the name of the default network interface, while wget allows processing HTTP 307/308 codes for redirects, support for secp256r1 elliptic curves (P256) to the implementation of the TLS protocol and the login utility supports the environment variable LOGIN_TIMEOUT.

Of the other changes that stand out:

  • A large number of fixes and improvements have been made to the awk utility implementation.
  • Added "-i" option to base32 and base64 utilities to ignore invalid characters.
  • The slicer utility implements the "-O OUTSEP", "-D" and "-F LIST" options supported by the toybox toolkit.
  • The construct "cpio -d -p A / B / C" has been set to cpio.
  • The "-t TYPE" option has been added to the df utility (restricting the output to a certain type of filesystem).
  • The "-0" option has been added to the env utility (ending each line with a zero code character).
  • Added "-t" option to ionice utility (ignore locks).
  • The option "-s SIZE" (number of bytes to be erased) has been added to the shred utility.
  • The timeout, top, watch, and ping utilities support non-integer values ​​(NN.N).
    The "-z" option has been added to the uniq utility (use a character with a zero code as a delimiter).
  • The "-t" (file verification) option has been added to the unzip utility.
  •  Improved implementations of moving between paragraphs, selecting ranges, and undoing changes.
  • The –getra and –setra options have been added to the blockdev utility.

Finally, for those who want to know more about the release of this new version of BusyBox 1.34, You can get the details by going to following link

How to get BusyBox?

If you are interested in being able to obtain this new version. You can do it by going to the official website of the project where you will find within its download section both the source code for this, as well as binaries and documentation.

The link is this.


The content of the article adheres to our principles of editorial ethics. To report an error click here!.

A comment, leave yours

Leave a Comment

Your email address will not be published.

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   wget kann noch ftp (s) said

    wget kann noch ftp (s)