Go to file
2014-11-13 22:21:52 +01:00
.gitignore
openssh-4.3p2-askpass-grab-info.patch
openssh-5.1p1-askpass-progress.patch
openssh-5.1p1-scp-manpage.patch
openssh-5.5p1-x11.patch bring back openssh-5.5p1-x11.patch 2014-07-03 16:42:56 +02:00
openssh-5.6p1-exit-deadlock.patch
openssh-5.8p1-getaddrinfo.patch
openssh-5.8p1-glob.patch
openssh-5.8p1-localdomain.patch
openssh-5.8p1-packet.patch
openssh-5.8p2-remove-stale-control-socket.patch
openssh-5.8p2-sigpipe.patch
openssh-5.9p1-edns.patch
openssh-5.9p1-ipv6man.patch
openssh-5.9p1-randclean.patch
openssh-5.9p1-wIm.patch
openssh-6.1p1-askpass-ld.patch
openssh-6.1p1-gssapi-canohost.patch
openssh-6.2p1-vendor.patch
openssh-6.3p1-ctr-evp-fast.patch
openssh-6.3p1-krb5-use-default_ccache_name.patch correct the calculation of bytes for authctxt->krb5_ccname <ams@corefiling.com> (#1161073) 2014-11-07 12:52:06 +01:00
openssh-6.4p1-CLOCK_BOOTTIME.patch
openssh-6.4p1-FIPS-mode-SP800-131A.patch
openssh-6.4p1-fromto-remote.patch
openssh-6.4p1-legacy-ssh-copy-id.patch
openssh-6.6.1p1-coverity.patch fix several coverity issues Resolves: rhbz#1139794 2014-11-13 22:16:51 +01:00
openssh-6.6.1p1-ignore-SIGXFSZ-in-postauth.patch Ignore SIGXFSZ in postauth monitor 2014-09-29 08:37:05 +02:00
openssh-6.6.1p1-NI_MAXHOST.patch standardise on NI_MAXHOST for gethostname() string lengths (#1051490) 2014-07-17 14:28:16 +02:00
openssh-6.6.1p1-partial-success.patch don't consider a partial success as a failure 2014-09-04 16:33:25 +02:00
openssh-6.6.1p1-selinux-contexts.patch privsep_preauth: use SELinux context from selinux-policy (#1008580) 2014-11-04 19:06:14 +01:00
openssh-6.6.1p1-servconf-parser.patch fix parsing of empty arguments in sshd_conf 2014-09-25 11:45:47 +02:00
openssh-6.6.1p1-utf8-banner.patch apply RFC3454 stringprep to banners when possible 2014-09-04 16:12:11 +02:00
openssh-6.6p1-allow-ip-opts.patch
openssh-6.6p1-audit.patch change audit trail 2014-11-04 18:56:47 +01:00
openssh-6.6p1-ctr-cavstest.patch
openssh-6.6p1-CVE-2014-2653.patch
openssh-6.6p1-entropy.patch
openssh-6.6p1-fingerprint.patch
openssh-6.6p1-fips.patch change the rsa key generation error message due to FIPS restrictions in openssl 2014-09-02 15:41:51 +02:00
openssh-6.6p1-force_krb.patch
openssh-6.6p1-gsskex.patch fix gsskex patch to correctly handle MONITOR_REQ_GSSSIGN request (#1118005) 2014-11-12 17:35:37 +01:00
openssh-6.6p1-keycat.patch
openssh-6.6p1-keyperm.patch
openssh-6.6p1-kuserok.patch fix kuserok patch which checked for the existence of .k5login unconditionally and hence prevented other mechanisms to be used properly 2014-10-24 23:50:58 +02:00
openssh-6.6p1-ldap.patch
openssh-6.6p1-log-usepam-no.patch
openssh-6.6p1-privsep-selinux.patch
openssh-6.6p1-redhat.patch
openssh-6.6p1-role-mls.patch
openssh-6.6p1-set_remote_ipaddr.patch set a client's address right after a connection is set 2014-09-02 10:49:31 +02:00
openssh-5618210618256bbf5f4f71b2887ff186fd451736.patch
openssh.spec 6.6.1p1-8 + 0.9.3-3 2014-11-13 22:21:52 +01:00
pam_ssh_agent_auth-0.9.2-seteuid.patch
pam_ssh_agent_auth-0.9.2-visibility.patch
pam_ssh_agent_auth-0.9.3-build.patch
pam_ssh_agent_auth-0.9.3-no-xfree.patch
pam_ssh_agent-rmheaders
sources
ssh-keycat.pam
sshd-keygen sshd-keygen - don't generate DSA and ED25519 host keys in FIPS mode 2014-09-23 12:29:25 +02:00
sshd-keygen.service
sshd.init
sshd.pam Add pam_reauthorize.so to sshd.pam (#1115977) 2014-07-08 12:46:52 +02:00
sshd.service
sshd.socket
sshd.sysconfig
sshd@.service