tests
|
tests: Make sure the user gets removed after the test
|
2019-04-29 15:16:44 +02:00 |
.gitignore
|
openssh-8.0p1-1 + 0.10.3-7
|
2019-04-29 14:12:13 +02:00 |
openssh-4.3p2-askpass-grab-info.patch
|
|
|
openssh-5.1p1-askpass-progress.patch
|
|
|
openssh-5.8p2-sigpipe.patch
|
|
|
openssh-5.9p1-ipv6man.patch
|
|
|
openssh-6.3p1-ctr-evp-fast.patch
|
|
|
openssh-6.4p1-fromto-remote.patch
|
|
|
openssh-6.6.1p1-log-in-chroot.patch
|
openssh-8.0p1-1 + 0.10.3-7
|
2019-04-29 14:12:13 +02:00 |
openssh-6.6.1p1-scp-non-existing-directory.patch
|
|
|
openssh-6.6.1p1-selinux-contexts.patch
|
Do not fallback to sshd_net_t SELinux context
|
2019-03-12 15:16:35 +01:00 |
openssh-6.6p1-allow-ip-opts.patch
|
|
|
openssh-6.6p1-ctr-cavstest.patch
|
|
|
openssh-6.6p1-force_krb.patch
|
|
|
openssh-6.6p1-GSSAPIEnablek5users.patch
|
openssh-8.0p1-1 + 0.10.3-7
|
2019-04-29 14:12:13 +02:00 |
openssh-6.6p1-keycat.patch
|
|
|
openssh-6.6p1-keyperm.patch
|
|
|
openssh-6.6p1-kuserok.patch
|
openssh-8.0p1-1 + 0.10.3-7
|
2019-04-29 14:12:13 +02:00 |
openssh-6.6p1-privsep-selinux.patch
|
|
|
openssh-6.7p1-coverity.patch
|
openssh-8.0p1-1 + 0.10.3-7
|
2019-04-29 14:12:13 +02:00 |
openssh-6.7p1-kdf-cavs.patch
|
openssh-8.0p1-1 + 0.10.3-7
|
2019-04-29 14:12:13 +02:00 |
openssh-6.7p1-ldap.patch
|
|
|
openssh-6.7p1-sftp-force-permission.patch
|
|
|
openssh-6.8p1-sshdT-output.patch
|
openssh-8.0p1-1 + 0.10.3-7
|
2019-04-29 14:12:13 +02:00 |
openssh-6.9p1-permit-root-login.patch
|
|
|
openssh-7.1p2-audit-race-condition.patch
|
openssh-8.0p1-1 + 0.10.3-7
|
2019-04-29 14:12:13 +02:00 |
openssh-7.2p2-k5login_directory.patch
|
openssh-8.0p1-1 + 0.10.3-7
|
2019-04-29 14:12:13 +02:00 |
openssh-7.2p2-s390-closefrom.patch
|
|
|
openssh-7.2p2-x11.patch
|
|
|
openssh-7.3p1-x11-max-displays.patch
|
|
|
openssh-7.4p1-systemd.patch
|
|
|
openssh-7.5p1-sandbox.patch
|
|
|
openssh-7.6p1-audit.patch
|
openssh-8.0p1-1 + 0.10.3-7
|
2019-04-29 14:12:13 +02:00 |
openssh-7.6p1-cleanup-selinux.patch
|
openssh-8.0p1-1 + 0.10.3-7
|
2019-04-29 14:12:13 +02:00 |
openssh-7.7p1-fips.patch
|
FIPS: Do not fail if FIPS-unsupported algorithm is provided in configuration or on command line
|
2019-05-07 11:57:30 +02:00 |
openssh-7.7p1-gssapi-new-unique.patch
|
openssh-8.0p1-1 + 0.10.3-7
|
2019-04-29 14:12:13 +02:00 |
openssh-7.7p1-redhat.patch
|
|
|
openssh-7.8p1-role-mls.patch
|
openssh-8.0p1-1 + 0.10.3-7
|
2019-04-29 14:12:13 +02:00 |
openssh-7.8p1-scp-ipv6.patch
|
|
|
openssh-7.8p1-UsePAM-warning.patch
|
openssh-8.0p1-1 + 0.10.3-7
|
2019-04-29 14:12:13 +02:00 |
openssh-7.9p1-ssh-copy-id.patch
|
|
|
openssh-7.9p1-updated-cached-pw.patch
|
openssh-8.0p1-1 + 0.10.3-7
|
2019-04-29 14:12:13 +02:00 |
openssh-8.0p1-gssapi-keyex.patch
|
openssh-8.0p1-1 + 0.10.3-7
|
2019-04-29 14:12:13 +02:00 |
openssh-8.0p1-pkcs11-uri.patch
|
openssh-8.0p1-1 + 0.10.3-7
|
2019-04-29 14:12:13 +02:00 |
openssh.spec
|
Drop unused patch
|
2019-05-07 13:45:34 +02:00 |
pam_ssh_agent_auth-0.9.2-visibility.patch
|
|
|
pam_ssh_agent_auth-0.9.3-agent_structure.patch
|
|
|
pam_ssh_agent_auth-0.9.3-build.patch
|
|
|
pam_ssh_agent_auth-0.10.2-compat.patch
|
|
|
pam_ssh_agent_auth-0.10.2-dereference.patch
|
|
|
pam_ssh_agent_auth-0.10.3-seteuid.patch
|
|
|
pam_ssh_agent-rmheaders
|
|
|
sources
|
openssh-8.0p1-1 + 0.10.3-7
|
2019-04-29 14:12:13 +02:00 |
ssh-keycat.pam
|
|
|
sshd-keygen
|
|
|
sshd-keygen.target
|
|
|
sshd-keygen@.service
|
|
|
sshd.pam
|
|
|
sshd.service
|
|
|
sshd.socket
|
|
|
sshd.sysconfig
|
|
|
sshd.tmpfiles
|
|
|
sshd@.service
|
|
|