.gitignore
|
6.2p2-1 + 0.9.3-5
|
2013-05-20 09:31:57 +02:00 |
openssh-4.3p2-askpass-grab-info.patch
|
|
|
openssh-5.1p1-askpass-progress.patch
|
|
|
openssh-5.1p1-scp-manpage.patch
|
|
|
openssh-5.2p1-allow-ip-opts.patch
|
|
|
openssh-5.5p1-x11.patch
|
|
|
openssh-5.6p1-exit-deadlock.patch
|
|
|
openssh-5.8p1-getaddrinfo.patch
|
Look for x11 forward sockets with AI_ADDRCONFIG flag getaddrinfo (#735889)
|
2012-02-14 18:11:26 +01:00 |
openssh-5.8p1-glob.patch
|
|
|
openssh-5.8p1-keyperm.patch
|
|
|
openssh-5.8p1-localdomain.patch
|
|
|
openssh-5.8p1-packet.patch
|
|
|
openssh-5.8p2-remove-stale-control-socket.patch
|
|
|
openssh-5.8p2-sigpipe.patch
|
|
|
openssh-5.9p1-ctr-evp-fast.patch
|
enable aes-ctr ciphers use the EVP engines from OpenSSL such as the AES-NI
|
2012-01-11 19:11:33 +01:00 |
openssh-5.9p1-edns.patch
|
|
|
openssh-5.9p1-ipv6man.patch
|
|
|
openssh-5.9p1-randclean.patch
|
|
|
openssh-5.9p1-wIm.patch
|
|
|
openssh-6.1p1-askpass-ld.patch
|
rebase to openssh-6.1p1 (#852651)
|
2012-09-15 13:29:49 +02:00 |
openssh-6.1p1-gssapi-canohost.patch
|
fix gssapi canohost patch (#863350)
|
2012-10-30 11:06:45 +01:00 |
openssh-6.1p1-log-usepam-no.patch
|
rebase to openssh-6.1p1 (#852651)
|
2012-09-15 13:29:49 +02:00 |
openssh-6.1p1-privsep-selinux.patch
|
use SELinux type sshd_net_t for [net] childs (#915085)
|
2013-03-06 10:40:28 +01:00 |
openssh-6.1p1-redhat.patch
|
add SELinux comment to /etc/ssh/sshd_config about SELinux command to modify port (#861400)
|
2012-10-26 16:34:55 +02:00 |
openssh-6.2p1-aarch64.patch
|
don't use GPLv3 versions of config.{sub,guess}
|
2013-04-17 16:29:14 +02:00 |
openssh-6.2p1-audit.patch
|
fix fatal() cleanup in the audit patch (#1029074)
|
2014-05-19 12:34:23 +02:00 |
openssh-6.2p1-coverity.patch
|
rebase to openssh-6.2p1 (#924727)
|
2013-04-04 16:49:30 +02:00 |
openssh-6.2p1-ctr-cavstest.patch
|
rebase to openssh-6.2p1 (#924727)
|
2013-04-04 16:49:30 +02:00 |
openssh-6.2p1-entropy.patch
|
rebase to openssh-6.2p1 (#924727)
|
2013-04-04 16:49:30 +02:00 |
openssh-6.2p1-fingerprint.patch
|
rebase to openssh-6.2p1 (#924727)
|
2013-04-04 16:49:30 +02:00 |
openssh-6.2p1-fips.patch
|
rebase to openssh-6.2p1 (#924727)
|
2013-04-04 16:49:30 +02:00 |
openssh-6.2p1-force_krb.patch
|
rebase to openssh-6.2p1 (#924727)
|
2013-04-04 16:49:30 +02:00 |
openssh-6.2p1-gsskex.patch
|
gssapi credentials need to be stored before a pam session opened (#987792)
|
2013-08-01 09:35:58 +02:00 |
openssh-6.2p1-keycat.patch
|
minor change in HOWTO.ssh-keycat - s/AuthorizedKeysCommandRunAs/AuthorizedKeysCommandUser/
|
2013-11-25 15:55:24 +01:00 |
openssh-6.2p1-kuserok.patch
|
rebase to openssh-6.2p1 (#924727)
|
2013-04-04 16:49:30 +02:00 |
openssh-6.2p1-ldap.patch
|
fix parsing logic of ldap.conf file (#1033662)
|
2014-05-19 11:28:25 +02:00 |
openssh-6.2p1-modpipe-cflags.patch
|
build regress/modpipe tests with $(CFLAGS)
|
2013-04-04 16:50:06 +02:00 |
openssh-6.2p1-role-mls.patch
|
rebase to openssh-6.2p1 (#924727)
|
2013-04-04 16:49:30 +02:00 |
openssh-6.2p1-vendor.patch
|
rebase to openssh-6.2p1 (#924727)
|
2013-04-04 16:49:30 +02:00 |
openssh-6.2p2-increase-size-of-DF-groups.patch
|
Increase the size of the Diffie-Hellman groups requested for a each symmetric key size. New values from NIST Special Publication 800-57 with the upper limit specified by RFC4419. Pointed out by Peter Backes, ok djm@. (#1010607)
|
2013-11-18 12:21:09 +01:00 |
openssh-6.2p2-legacy-ssh-copy-id.patch
|
Run ssh-copy-id in the legacy mode when SSH_COPY_ID_LEGACY variable is set
|
2014-05-19 12:39:27 +02:00 |
openssh-6.2p2-sftp-multibyte.patch
|
make sftp's libedit interface marginally multibyte aware (#841771)
|
2013-06-19 17:10:49 +02:00 |
openssh-6.2p2-ssh_gai_strerror.patch
|
don't show Success for EAI_SYSTEM (#985964)
|
2013-07-23 12:07:49 +02:00 |
openssh.spec
|
Run ssh-copy-id in the legacy mode when SSH_COPY_ID_LEGACY variable is set
|
2014-05-19 12:39:27 +02:00 |
pam_ssh_agent_auth-0.9.2-seteuid.patch
|
|
|
pam_ssh_agent_auth-0.9.2-visibility.patch
|
fix segfault in su when pam_ssh_agent_auth is used and the ssh-agent
|
2012-06-22 14:52:35 +02:00 |
pam_ssh_agent_auth-0.9.3-build.patch
|
fix segfault in su when pam_ssh_agent_auth is used and the ssh-agent
|
2012-06-22 14:52:35 +02:00 |
pam_ssh_agent-rmheaders
|
|
|
sources
|
6.2p2-1 + 0.9.3-5
|
2013-05-20 09:31:57 +02:00 |
ssh-keycat.pam
|
|
|
sshd-keygen
|
sshd-keygen - create an ecdsa host key with 640 permissions (#1023945)
|
2013-12-09 11:19:32 +01:00 |
sshd-keygen.service
|
add socket activated sshd units to the package (#963268)
|
2013-05-21 18:37:18 +02:00 |
sshd.init
|
|
|
sshd.pam
|
|
|
sshd.service
|
sshd.service: use KillMode=process (#890376)
|
2013-04-12 15:15:45 +02:00 |
sshd.socket
|
|
|
sshd.sysconfig
|
don't use export in sysconfig file (#953111)
|
2013-04-17 16:46:47 +02:00 |
sshd@.service
|
add socket activated sshd units to the package (#963268)
|
2013-05-21 18:37:18 +02:00 |