.gitignore
|
6.4p1-1 + 0.9.3-1
|
2013-11-08 14:04:33 +01:00 |
openssh-4.3p2-askpass-grab-info.patch
|
|
|
openssh-5.1p1-askpass-progress.patch
|
|
|
openssh-5.1p1-scp-manpage.patch
|
|
|
openssh-5.2p1-allow-ip-opts.patch
|
|
|
openssh-5.5p1-x11.patch
|
- add auditing the host based key ussage
|
2010-11-05 17:31:30 +01:00 |
openssh-5.6p1-exit-deadlock.patch
|
Upgrade to openssh-5.6p1
|
2010-08-03 02:41:49 +02:00 |
openssh-5.8p1-getaddrinfo.patch
|
Look for x11 forward sockets with AI_ADDRCONFIG flag getaddrinfo (#735889)
|
2012-02-14 18:11:26 +01:00 |
openssh-5.8p1-glob.patch
|
CVE-2010-4755
|
2011-03-07 20:31:52 +01:00 |
openssh-5.8p1-keyperm.patch
|
add systemd units
|
2011-04-23 16:15:56 +02:00 |
openssh-5.8p1-localdomain.patch
|
the private keys may be 640 root:ssh_keys ssh_keysign is sgid
|
2011-04-22 11:43:01 +02:00 |
openssh-5.8p1-packet.patch
|
the intermediate context is set to sshd_sftpd_t
|
2011-04-05 20:54:12 +02:00 |
openssh-5.8p2-remove-stale-control-socket.patch
|
remove stale control sockets (#706396)
|
2011-06-09 16:10:59 +02:00 |
openssh-5.8p2-sigpipe.patch
|
ignore SIGPIPE in ssh keyscan
|
2011-08-23 19:01:59 +02:00 |
openssh-5.9p1-edns.patch
|
Coverity second pass
|
2011-09-09 21:18:35 +02:00 |
openssh-5.9p1-ipv6man.patch
|
ignore SIGPIPE in ssh keyscan
|
2011-09-07 15:12:54 +02:00 |
openssh-5.9p1-randclean.patch
|
ignore SIGPIPE in ssh keyscan
|
2011-09-07 15:12:54 +02:00 |
openssh-5.9p1-wIm.patch
|
coverity upgrade
|
2011-09-14 17:03:03 +02:00 |
openssh-6.1p1-askpass-ld.patch
|
rebase to openssh-6.1p1 (#852651)
|
2012-09-15 13:29:49 +02:00 |
openssh-6.1p1-gssapi-canohost.patch
|
fix gssapi canohost patch (#863350)
|
2012-10-30 11:06:45 +01:00 |
openssh-6.1p1-log-usepam-no.patch
|
rebase to openssh-6.1p1 (#852651)
|
2012-09-15 13:29:49 +02:00 |
openssh-6.2p1-entropy.patch
|
bump the minimum value of SSH_USE_STRONG_RNG to 14 according to SP800-131A
|
2013-09-10 09:50:09 +02:00 |
openssh-6.2p1-vendor.patch
|
Revert "adjust openssh-6.2p1-vendor.patch after previous commit"
|
2013-10-08 17:04:51 +02:00 |
openssh-6.3p1-coverity.patch
|
rebase for openssh-6.3p1, remove unused patches (#1007769)
|
2013-10-14 15:54:41 +02:00 |
openssh-6.3p1-ctr-cavstest.patch
|
rebase for openssh-6.3p1, remove unused patches (#1007769)
|
2013-10-14 15:54:41 +02:00 |
openssh-6.3p1-ctr-evp-fast.patch
|
rebase for openssh-6.3p1, remove unused patches (#1007769)
|
2013-10-14 15:54:41 +02:00 |
openssh-6.3p1-fingerprint.patch
|
rebase for openssh-6.3p1, remove unused patches (#1007769)
|
2013-10-14 15:54:41 +02:00 |
openssh-6.3p1-fips.patch
|
don't use SSH_FP_MD5 for fingerprints in FIPS mode
|
2013-10-24 16:41:18 +02:00 |
openssh-6.3p1-force_krb.patch
|
rebase for openssh-6.3p1, remove unused patches (#1007769)
|
2013-10-14 15:54:41 +02:00 |
openssh-6.3p1-gsskex.patch
|
adjust gss kex mechanism to the upstream changes (#1024004)
|
2013-10-31 11:30:12 +01:00 |
openssh-6.3p1-increase-size-of-DF-groups.patch
|
Increase the size of the Diffie-Hellman groups requested for a each
|
2013-10-23 22:41:53 +02:00 |
openssh-6.3p1-keycat.patch
|
minor change in HOWTO.ssh-keycat - s/AuthorizedKeysCommandRunAs/AuthorizedKeysCommandUser/
|
2013-11-25 15:40:42 +01:00 |
openssh-6.3p1-krb5-use-default_ccache_name.patch
|
use default_ccache_name from /etc/krb5.conf for a kerberos cache (#991186)
|
2013-10-23 22:08:19 +02:00 |
openssh-6.3p1-kuserok.patch
|
rebase for openssh-6.3p1, remove unused patches (#1007769)
|
2013-10-14 15:54:41 +02:00 |
openssh-6.3p1-ldap.patch
|
fix parsing logic of ldap.conf file (#1033662)
|
2013-11-26 11:10:04 +01:00 |
openssh-6.3p1-privsep-selinux.patch
|
rebase for openssh-6.3p1, remove unused patches (#1007769)
|
2013-10-14 15:54:41 +02:00 |
openssh-6.3p1-redhat.patch
|
rebase for openssh-6.3p1, remove unused patches (#1007769)
|
2013-10-14 15:54:41 +02:00 |
openssh-6.3p1-role-mls.patch
|
rebase for openssh-6.3p1, remove unused patches (#1007769)
|
2013-10-14 15:54:41 +02:00 |
openssh-6.4p1-audit.patch
|
fix fatal() cleanup in the audit patch (#1029074)
|
2013-11-26 13:22:08 +01:00 |
openssh.spec
|
6.4p1-1 + 0.9.3-1
|
2013-11-08 14:04:33 +01:00 |
pam_ssh_agent_auth-0.9.2-seteuid.patch
|
- properly restore euid in case connect to the ssh-agent socket fails
|
2010-11-24 07:49:04 +01:00 |
pam_ssh_agent_auth-0.9.2-visibility.patch
|
fix segfault in su when pam_ssh_agent_auth is used and the ssh-agent
|
2012-06-22 14:52:35 +02:00 |
pam_ssh_agent_auth-0.9.3-build.patch
|
fix segfault in su when pam_ssh_agent_auth is used and the ssh-agent
|
2012-06-22 14:52:35 +02:00 |
pam_ssh_agent_auth-0.9.3-no-xfree.patch
|
don't use xfree in pam_ssh_agent_auth sources <geertj@gmail.com> (#1024965)
|
2013-11-01 17:06:02 +01:00 |
pam_ssh_agent-rmheaders
|
|
|
sources
|
6.4p1-1 + 0.9.3-1
|
2013-11-08 14:04:33 +01:00 |
ssh-keycat.pam
|
improove ssk-keycat (documentation)
|
2011-03-04 15:22:12 +01:00 |
sshd-keygen
|
sshd-keygen to generate ECDSA keys <i.grok@comcast.net> (#1019222)
|
2013-10-23 22:51:32 +02:00 |
sshd-keygen.service
|
add socket activated sshd units to the package (#963268)
|
2013-05-21 18:37:18 +02:00 |
sshd.init
|
Systemd compatibility according to Mathieu Bridon <bochecha@fedoraproject.org>
|
2011-06-28 10:35:28 +02:00 |
sshd.pam
|
Add postlogin to pam. (#718807)
|
2011-07-14 15:15:29 +02:00 |
sshd.service
|
automatically restart sshd.service on-failure with 42s interval
|
2013-09-11 16:52:21 +02:00 |
sshd.socket
|
still support /etc/sysconfig/sshd loading in sshd service (#754732)
|
2011-11-18 09:20:54 +01:00 |
sshd.sysconfig
|
sshd-keygen: generate only RSA keys by default (#1010092)
|
2013-09-20 17:25:17 +02:00 |
sshd@.service
|
add socket activated sshd units to the package (#963268)
|
2013-05-21 18:37:18 +02:00 |