.gitignore
|
rebase to openssh-6.6p1
|
2014-06-03 16:51:07 +02:00 |
openssh-4.3p2-askpass-grab-info.patch
|
- improve selinux patch (by Jan Kiszka)
|
2006-07-17 14:09:15 +00:00 |
openssh-5.1p1-askpass-progress.patch
|
- rediff for no fuzz
|
2008-07-23 17:33:16 +00:00 |
openssh-5.1p1-scp-manpage.patch
|
- rediff for no fuzz
|
2008-07-23 17:33:16 +00:00 |
openssh-5.5p1-x11.patch
|
bring back openssh-5.5p1-x11.patch
|
2014-07-03 16:42:56 +02:00 |
openssh-5.6p1-exit-deadlock.patch
|
Upgrade to openssh-5.6p1
|
2010-08-03 02:41:49 +02:00 |
openssh-5.8p1-getaddrinfo.patch
|
Look for x11 forward sockets with AI_ADDRCONFIG flag getaddrinfo (#735889)
|
2012-02-14 18:11:26 +01:00 |
openssh-5.8p1-glob.patch
|
CVE-2010-4755
|
2011-03-07 20:31:52 +01:00 |
openssh-5.8p1-packet.patch
|
the intermediate context is set to sshd_sftpd_t
|
2011-04-05 20:54:12 +02:00 |
openssh-5.8p2-remove-stale-control-socket.patch
|
remove stale control sockets (#706396)
|
2011-06-09 16:10:59 +02:00 |
openssh-5.8p2-sigpipe.patch
|
ignore SIGPIPE in ssh keyscan
|
2011-08-23 19:01:59 +02:00 |
openssh-5.9p1-edns.patch
|
Coverity second pass
|
2011-09-09 21:18:35 +02:00 |
openssh-5.9p1-ipv6man.patch
|
ignore SIGPIPE in ssh keyscan
|
2011-09-07 15:12:54 +02:00 |
openssh-5.9p1-randclean.patch
|
ignore SIGPIPE in ssh keyscan
|
2011-09-07 15:12:54 +02:00 |
openssh-5.9p1-wIm.patch
|
coverity upgrade
|
2011-09-14 17:03:03 +02:00 |
openssh-6.1p1-askpass-ld.patch
|
rebase to openssh-6.1p1 (#852651)
|
2012-09-15 13:29:49 +02:00 |
openssh-6.1p1-gssapi-canohost.patch
|
fix gssapi canohost patch (#863350)
|
2012-10-30 11:06:45 +01:00 |
openssh-6.2p1-vendor.patch
|
Revert "adjust openssh-6.2p1-vendor.patch after previous commit"
|
2013-10-08 17:04:51 +02:00 |
openssh-6.3p1-ctr-evp-fast.patch
|
rebase for openssh-6.3p1, remove unused patches (#1007769)
|
2013-10-14 15:54:41 +02:00 |
openssh-6.3p1-krb5-use-default_ccache_name.patch
|
correct the calculation of bytes for authctxt->krb5_ccname <ams@corefiling.com> (#1161073)
|
2014-11-07 12:52:06 +01:00 |
openssh-6.4p1-CLOCK_BOOTTIME.patch
|
try CLOCK_BOOTTIME with fallback (#1091992)
|
2014-05-14 17:30:43 +02:00 |
openssh-6.4p1-FIPS-mode-SP800-131A.patch
|
FIPS mode - adjust the key echange DH groups and ssh-keygen according to SP800-131A
|
2014-01-23 18:29:02 +01:00 |
openssh-6.4p1-fromto-remote.patch
|
use tty allocation for a remote scp
|
2014-01-23 18:30:39 +01:00 |
openssh-6.4p1-legacy-ssh-copy-id.patch
|
fix ssh-copy-id (#1058792)
|
2014-02-26 14:53:23 +01:00 |
openssh-6.6.1p1-cisco-dh-keys.patch
|
use different values for DH for Cisco servers (#1026430)
|
2014-12-03 17:10:47 +01:00 |
openssh-6.6.1p1-coverity.patch
|
fix several coverity issues Resolves: rhbz#1139794
|
2014-11-13 22:16:51 +01:00 |
openssh-6.6.1p1-ignore-SIGXFSZ-in-postauth.patch
|
Ignore SIGXFSZ in postauth monitor
|
2014-09-29 08:37:05 +02:00 |
openssh-6.6.1p1-localdomain.patch
|
the .local domain example should be in ssh_config, not in sshd_config
|
2014-12-03 18:15:25 +01:00 |
openssh-6.6.1p1-NI_MAXHOST.patch
|
standardise on NI_MAXHOST for gethostname() string lengths (#1051490)
|
2014-07-17 14:28:16 +02:00 |
openssh-6.6.1p1-partial-success.patch
|
don't consider a partial success as a failure
|
2014-09-04 16:33:25 +02:00 |
openssh-6.6.1p1-selinux-contexts.patch
|
privsep_preauth: use SELinux context from selinux-policy (#1008580)
|
2014-11-04 19:06:14 +01:00 |
openssh-6.6.1p1-servconf-parser.patch
|
fix parsing of empty arguments in sshd_conf
|
2014-09-25 11:45:47 +02:00 |
openssh-6.6.1p1-utf8-banner.patch
|
apply RFC3454 stringprep to banners when possible
|
2014-09-04 16:12:11 +02:00 |
openssh-6.6p1-allow-ip-opts.patch
|
rebase to openssh-6.6p1
|
2014-06-03 16:51:07 +02:00 |
openssh-6.6p1-audit.patch
|
change audit trail
|
2014-11-04 18:56:47 +01:00 |
openssh-6.6p1-ctr-cavstest.patch
|
rebase to openssh-6.6p1
|
2014-06-03 16:51:07 +02:00 |
openssh-6.6p1-CVE-2014-2653.patch
|
rebase to openssh-6.6p1
|
2014-06-03 16:51:07 +02:00 |
openssh-6.6p1-entropy.patch
|
rebase to openssh-6.6p1
|
2014-06-03 16:51:07 +02:00 |
openssh-6.6p1-fingerprint.patch
|
rebase to openssh-6.6p1
|
2014-06-03 16:51:07 +02:00 |
openssh-6.6p1-fips.patch
|
use different values for DH for Cisco servers (#1026430)
|
2014-12-03 17:10:47 +01:00 |
openssh-6.6p1-force_krb.patch
|
add missing patches and remove unused patches
|
2014-06-04 10:26:58 +02:00 |
openssh-6.6p1-gsskex.patch
|
fix gsskex patch to correctly handle MONITOR_REQ_GSSSIGN request (#1118005)
|
2014-11-12 17:35:37 +01:00 |
openssh-6.6p1-keycat.patch
|
rebase to openssh-6.6p1
|
2014-06-03 16:51:07 +02:00 |
openssh-6.6p1-keyperm.patch
|
rebase to openssh-6.6p1
|
2014-06-03 16:51:07 +02:00 |
openssh-6.6p1-kuserok.patch
|
fix kuserok patch which checked for the existence of .k5login unconditionally and hence prevented other mechanisms to be used properly
|
2014-10-24 23:50:58 +02:00 |
openssh-6.6p1-ldap.patch
|
rebase to openssh-6.6p1
|
2014-06-03 16:51:07 +02:00 |
openssh-6.6p1-log-usepam-no.patch
|
rebase to openssh-6.6p1
|
2014-06-03 16:51:07 +02:00 |
openssh-6.6p1-privsep-selinux.patch
|
rebase to openssh-6.6p1
|
2014-06-03 16:51:07 +02:00 |
openssh-6.6p1-redhat.patch
|
the .local domain example should be in ssh_config, not in sshd_config
|
2014-12-03 18:15:25 +01:00 |
openssh-6.6p1-role-mls.patch
|
rebase to openssh-6.6p1
|
2014-06-03 16:51:07 +02:00 |
openssh-6.6p1-set_remote_ipaddr.patch
|
set a client's address right after a connection is set
|
2014-09-02 10:49:31 +02:00 |
openssh-5618210618256bbf5f4f71b2887ff186fd451736.patch
|
OpenSSH 6.5 and 6.6 sometimes encode a value used in the
|
2014-06-03 17:18:36 +02:00 |
openssh.spec
|
6.6.1p1-9 + 0.9.3-3
|
2014-12-03 18:18:19 +01:00 |
pam_ssh_agent_auth-0.9.2-seteuid.patch
|
- properly restore euid in case connect to the ssh-agent socket fails
|
2010-11-24 07:49:04 +01:00 |
pam_ssh_agent_auth-0.9.2-visibility.patch
|
fix segfault in su when pam_ssh_agent_auth is used and the ssh-agent
|
2012-06-22 14:52:35 +02:00 |
pam_ssh_agent_auth-0.9.3-build.patch
|
fix segfault in su when pam_ssh_agent_auth is used and the ssh-agent
|
2012-06-22 14:52:35 +02:00 |
pam_ssh_agent_auth-0.9.3-no-xfree.patch
|
don't use xfree in pam_ssh_agent_auth sources <geertj@gmail.com> (#1024965)
|
2013-11-01 17:06:02 +01:00 |
pam_ssh_agent-rmheaders
|
- Add pam_ssh_agent_auth module to a subpackage.
|
2009-10-19 07:32:33 +00:00 |
sources
|
rebase to openssh-6.6p1
|
2014-06-03 16:51:07 +02:00 |
ssh-keycat.pam
|
improove ssk-keycat (documentation)
|
2011-03-04 15:22:12 +01:00 |
sshd-keygen
|
sshd-keygen - don't generate DSA and ED25519 host keys in FIPS mode
|
2014-09-23 12:29:25 +02:00 |
sshd-keygen.service
|
slightly change systemd units logic - use sshd-keygen.service (#1066615)
|
2014-06-03 17:47:56 +02:00 |
sshd.init
|
Systemd compatibility according to Mathieu Bridon <bochecha@fedoraproject.org>
|
2011-06-28 10:35:28 +02:00 |
sshd.pam
|
Add pam_reauthorize.so to sshd.pam (#1115977)
|
2014-07-08 12:46:52 +02:00 |
sshd.service
|
slightly change systemd units logic - use sshd-keygen.service (#1066615)
|
2014-06-03 17:47:56 +02:00 |
sshd.socket
|
still support /etc/sysconfig/sshd loading in sshd service (#754732)
|
2011-11-18 09:20:54 +01:00 |
sshd.sysconfig
|
add support for ED25519 keys to sshd-keygen and sshd.sysconfig
|
2014-06-03 17:41:32 +02:00 |
sshd@.service
|
slightly change systemd units logic - use sshd-keygen.service (#1066615)
|
2014-06-03 17:47:56 +02:00 |