Go to file
Jakub Jelen f660e11adc FIPS: Do not fail if FIPS-unsupported algorithm is provided in configuration or on command line
This effectively allows to use some previously denied algorithms
in FIPS mode, but they are not enabled in default hardcoded configuration
and disabled by FIPS crypto policy.

Additionally, there is no guarantee they will work in underlying OpenSSL.

Resolves: rhbz#1625318
2019-05-07 11:57:30 +02:00
tests tests: Make sure the user gets removed after the test 2019-04-29 15:16:44 +02:00
.gitignore openssh-8.0p1-1 + 0.10.3-7 2019-04-29 14:12:13 +02:00
openssh-4.3p2-askpass-grab-info.patch rebase to openssh-7.4p1-1 2017-01-03 14:31:20 +01:00
openssh-5.1p1-askpass-progress.patch rebase to openssh-7.4p1-1 2017-01-03 14:31:20 +01:00
openssh-5.8p1-getaddrinfo.patch
openssh-5.8p2-sigpipe.patch
openssh-5.9p1-ipv6man.patch
openssh-6.3p1-ctr-evp-fast.patch
openssh-6.4p1-fromto-remote.patch
openssh-6.6.1p1-log-in-chroot.patch openssh-8.0p1-1 + 0.10.3-7 2019-04-29 14:12:13 +02:00
openssh-6.6.1p1-scp-non-existing-directory.patch
openssh-6.6.1p1-selinux-contexts.patch Do not fallback to sshd_net_t SELinux context 2019-03-12 15:16:35 +01:00
openssh-6.6p1-allow-ip-opts.patch Most of the coverity patch applied upstream, context changes for rebase 2016-08-04 10:59:59 +02:00
openssh-6.6p1-ctr-cavstest.patch rebase patches to openssh-7.9p1 2018-10-19 11:41:07 +02:00
openssh-6.6p1-force_krb.patch rebase patches to openssh-7.9p1 2018-10-19 11:41:07 +02:00
openssh-6.6p1-GSSAPIEnablek5users.patch openssh-8.0p1-1 + 0.10.3-7 2019-04-29 14:12:13 +02:00
openssh-6.6p1-keycat.patch openssh-7.8p1-1 + 0.10.3-5 2018-08-24 23:16:24 +02:00
openssh-6.6p1-keyperm.patch
openssh-6.6p1-kuserok.patch openssh-8.0p1-1 + 0.10.3-7 2019-04-29 14:12:13 +02:00
openssh-6.6p1-privsep-selinux.patch Reformat SELinux patch 2019-03-11 17:17:49 +01:00
openssh-6.7p1-coverity.patch openssh-8.0p1-1 + 0.10.3-7 2019-04-29 14:12:13 +02:00
openssh-6.7p1-kdf-cavs.patch openssh-8.0p1-1 + 0.10.3-7 2019-04-29 14:12:13 +02:00
openssh-6.7p1-ldap.patch Fix LDAP configure test (#1642414) 2018-10-26 14:03:00 +02:00
openssh-6.7p1-sftp-force-permission.patch Avoid gcc warnings about uninitialized variables 2017-12-11 11:53:10 +01:00
openssh-6.8p1-sshdT-output.patch openssh-8.0p1-1 + 0.10.3-7 2019-04-29 14:12:13 +02:00
openssh-6.9p1-permit-root-login.patch
openssh-7.1p2-audit-race-condition.patch openssh-8.0p1-1 + 0.10.3-7 2019-04-29 14:12:13 +02:00
openssh-7.2p2-k5login_directory.patch openssh-8.0p1-1 + 0.10.3-7 2019-04-29 14:12:13 +02:00
openssh-7.2p2-s390-closefrom.patch Make closefrom() ignore softlinks to the /dev/ devices on s390 2016-07-18 12:26:15 +02:00
openssh-7.2p2-x11.patch openssh-7.5p1-1 + 0.10.3-2 2017-03-20 16:00:16 +01:00
openssh-7.3p1-x11-max-displays.patch openssh-7.8p1-1 + 0.10.3-5 2018-08-24 23:16:24 +02:00
openssh-7.4p1-systemd.patch Avoid sending SD_NOTIFY from wrong processes (#1427526) 2017-02-28 15:13:24 +01:00
openssh-7.5p1-sandbox.patch rebase patches to openssh-7.9p1 2018-10-19 11:41:07 +02:00
openssh-7.6p1-audit.patch openssh-8.0p1-1 + 0.10.3-7 2019-04-29 14:12:13 +02:00
openssh-7.6p1-cleanup-selinux.patch openssh-8.0p1-1 + 0.10.3-7 2019-04-29 14:12:13 +02:00
openssh-7.7p1-fips.patch FIPS: Do not fail if FIPS-unsupported algorithm is provided in configuration or on command line 2019-05-07 11:57:30 +02:00
openssh-7.7p1-gssapi-new-unique.patch openssh-8.0p1-1 + 0.10.3-7 2019-04-29 14:12:13 +02:00
openssh-7.7p1-redhat.patch Enclose redhat specific configuration with Match final block 2019-02-06 17:18:30 +01:00
openssh-7.8p1-role-mls.patch openssh-8.0p1-1 + 0.10.3-7 2019-04-29 14:12:13 +02:00
openssh-7.8p1-scp-ipv6.patch Unbreak scp between two IPv6 hosts (#1620333) 2018-08-31 13:26:44 +02:00
openssh-7.8p1-UsePAM-warning.patch openssh-8.0p1-1 + 0.10.3-7 2019-04-29 14:12:13 +02:00
openssh-7.9p1-ssh-copy-id.patch ssh-copy-id: Minor issues found by shellcheck 2019-02-06 17:18:30 +01:00
openssh-7.9p1-updated-cached-pw.patch openssh-8.0p1-1 + 0.10.3-7 2019-04-29 14:12:13 +02:00
openssh-8.0p1-gssapi-keyex.patch openssh-8.0p1-1 + 0.10.3-7 2019-04-29 14:12:13 +02:00
openssh-8.0p1-pkcs11-uri.patch openssh-8.0p1-1 + 0.10.3-7 2019-04-29 14:12:13 +02:00
openssh.spec openssh-8.0p1-1 + 0.10.3-7 2019-04-29 14:12:13 +02:00
pam_ssh_agent_auth-0.9.2-visibility.patch Reabse to latest release of pam_ssh_agent_auth with preserving current functionality 2016-01-25 13:32:42 +01:00
pam_ssh_agent_auth-0.9.3-agent_structure.patch Address issues reported by coverity 2018-08-31 13:26:44 +02:00
pam_ssh_agent_auth-0.9.3-build.patch openssh-7.8p1-1 + 0.10.3-5 2018-08-24 23:16:24 +02:00
pam_ssh_agent_auth-0.10.2-compat.patch Address issues reported by coverity 2018-08-31 13:26:44 +02:00
pam_ssh_agent_auth-0.10.2-dereference.patch openssh-7.8p1-1 + 0.10.3-5 2018-08-24 23:16:24 +02:00
pam_ssh_agent_auth-0.10.3-seteuid.patch Check seteuid return values in all cases 2017-02-22 14:56:00 +01:00
pam_ssh_agent-rmheaders Reabse to latest release of pam_ssh_agent_auth with preserving current functionality 2016-01-25 13:32:42 +01:00
sources openssh-8.0p1-1 + 0.10.3-7 2019-04-29 14:12:13 +02:00
ssh-keycat.pam
sshd-keygen Make sshd-keygen comply with packaging guidelines (#1325535) 2016-04-13 13:42:12 +02:00
sshd-keygen.target Add sshd-keygen.target to abstract key creation from sshd.service and sshd@.service (#1325535) 2016-04-15 17:05:32 +02:00
sshd-keygen@.service Add sshd-keygen.target to abstract key creation from sshd.service and sshd@.service (#1325535) 2016-04-15 17:05:32 +02:00
sshd.pam Add pam_motd to the PAM stack 2018-06-14 11:28:51 -04:00
sshd.service Crypto policies changed path 2018-03-06 13:53:17 +01:00
sshd.socket
sshd.sysconfig Drop unused environment variable 2018-08-29 12:55:36 +02:00
sshd.tmpfiles Revert "server crypto policy" 2017-08-09 14:58:13 +02:00
sshd@.service Crypto policies changed path 2018-03-06 13:53:17 +01:00