emaste
1d2f971c73
Upgrade to OpenSSH 7.9p1.
...
MFC after: 2 months
Sponsored by: The FreeBSD Foundation
2020-02-14 19:06:59 +00:00
emaste
3af09b53ad
openssh: cherry-pick OpenSSL 1.1.1 compatibility
...
Compatibility with existing OpenSSL versions is maintained.
Upstream commits:
482d23bcac upstream: hold our collective noses and use the openssl-1.1.x
48f54b9d12 adapt -portable to OpenSSL 1.1x API
86e0a9f3d2 upstream: use only openssl-1.1.x API here too
a3fd8074e2 upstream: missed a bit of openssl-1.0.x API in this unittest
cce8cbe0ed Fix openssl-1.1 fallout for --without-openssl.
Trivial conflicts in sshkey.c and test_sshkey.c were resolved.
Connect libressl-api-compat.c to the build, and regenerate config.h
Reviewed by: des
Approved by: re (rgrimes)
MFC after: 2 seeks
Sponsored by: The FreeBSD Foundation
Differential Revision: https://reviews.freebsd.org/D17444
2018-10-06 14:38:34 +00:00
des
0a47c58bdd
Upgrade to OpenSSH 7.8p1.
...
Approved by: re (kib@)
2018-09-10 16:20:12 +00:00
des
13e42418d1
Upgrade to OpenSSH 7.7p1.
2018-05-11 13:22:43 +00:00
des
271dcc6a42
Upgrade to OpenSSH 7.6p1. This will be followed shortly by 7.7p1.
...
This completely removes client-side support for the SSH 1 protocol,
which was already disabled in 12 but is still enabled in 11. For that
reason, we will not be able to merge 7.6p1 or newer back to 11.
2018-05-08 23:13:11 +00:00
des
a2e5565774
Upgrade to OpenSSH 7.5p1.
2017-08-04 12:57:24 +00:00
des
c995370269
Upgrade to OpenSSH 7.4p1.
2017-03-06 01:37:05 +00:00
des
dc519490bb
Upgrade to OpenSSH 7.3p1.
2017-03-02 00:11:32 +00:00
des
bb6f58c772
Upgrade to OpenSSH 7.2p2.
2016-03-11 00:15:29 +00:00
des
0c80faa259
Upgrade to OpenSSH 7.1p2.
2016-01-21 11:54:34 +00:00
des
9b2207f860
Upgrade to OpenSSH 7.0p1.
2016-01-20 22:57:10 +00:00
des
b856a45731
Upgrade to OpenSSH 6.9p1.
2016-01-19 18:55:44 +00:00
des
7a7bc643b5
Upgrade to OpenSSH 6.8p1.
2016-01-19 18:28:23 +00:00
des
14172c52f8
Upgrade to OpenSSH 6.7p1, retaining libwrap support (which has been removed
...
upstream) and a number of security fixes which we had already backported.
MFC after: 1 week
2016-01-19 16:18:26 +00:00
des
ae82763de4
Upgrade to OpenSSH 6.6p1.
2014-03-25 11:05:34 +00:00
des
7573e91b12
Upgrade to OpenSSH 6.5p1.
2014-01-31 13:12:02 +00:00
des
cda41f674d
Upgrade to 6.3p1.
...
Approved by: re (gjb)
2013-09-21 21:36:09 +00:00
des
b291eafe8d
Upgrade to OpenSSH 6.2p1. The most important new features are support
...
for a key revocation list and more fine-grained authentication control.
2013-03-22 17:55:38 +00:00
des
00f3582ac6
Upgrade OpenSSH to 6.1p1.
2012-09-03 16:51:41 +00:00
des
038442ad80
Upgrade to OpenSSH 5.9p1.
...
MFC after: 3 months
2011-10-05 22:08:17 +00:00
des
ee2afa8165
Upgrade to OpenSSH 5.8p2.
2011-05-04 07:34:44 +00:00
des
59d1af2322
Upgrade to OpenSSH 5.6p1.
2010-11-11 11:46:19 +00:00
des
fc607a2e80
Upgrade to OpenSSH 5.5p1.
2010-04-28 10:36:33 +00:00
des
c3510f9e73
Upgrade to OpenSSH 5.4p1.
...
MFC after: 1 month
2010-03-09 19:16:43 +00:00
des
c6a1085fef
Upgrade to OpenSSH 5.3p1.
2009-10-01 17:12:52 +00:00
des
8bf56a9772
Upgrade to OpenSSH 5.2p1.
...
MFC after: 3 months
2009-05-22 18:46:28 +00:00
des
b7aa600c41
Upgrade to OpenSSH 5.1p1.
...
I have worked hard to reduce diffs against the vendor branch. One
notable change in that respect is that we no longer prefer DSA over
RSA - the reasons for doing so went away years ago. This may cause
some surprises, as ssh will warn about unknown host keys even for
hosts whose keys haven't changed.
MFC after: 6 weeks
2008-08-01 02:48:36 +00:00
des
f1596419c2
Properly flatten openssh/dist.
2008-07-22 19:01:18 +00:00
des
666aa9cc16
Revert part of 180714 - the intent was to flatten dist, not to nuke it.
2008-07-22 18:58:19 +00:00
des
624d93001f
Flatten the OpenSSH vendor tree for 3.x and newer.
2008-07-22 17:13:05 +00:00
des
f591b3e29c
Vendor import of OpenSSH 4.5p1.
2006-11-10 16:39:21 +00:00
des
2f35ce4773
Vendor import of OpenSSH 4.4p1.
2006-09-30 13:29:51 +00:00
des
448503722a
Vendor import of OpenSSH 4.3p1.
2006-03-22 19:46:12 +00:00
des
755a16fa86
Vendor import of OpenSSH 4.2p1.
2005-09-03 06:59:33 +00:00
des
c4dfc1ed3b
Vendor import of OpenSSH 4.1p1.
2005-06-05 15:41:57 +00:00
des
11a09ab416
Vendor import of OpenSSH 4.0p1.
2005-06-05 15:40:50 +00:00
des
d5d493f03a
Vendor import of OpenSSH 3.9p1.
2004-10-28 16:03:53 +00:00
des
7d1750f1d6
Vendor import of OpenSSH 3.8p1.
2004-02-26 10:38:49 +00:00
des
b5d16e7138
Vendor import of OpenSSH 3.7.1p2.
2004-01-07 11:10:17 +00:00
des
85b37b9574
Vendor import of OpenSSH-portable 3.6.1p1.
2003-04-23 16:53:02 +00:00
des
099d1a58f7
Vendor import of OpenSSH-portable 3.5p1.
2002-10-29 09:43:00 +00:00
des
1ba793a7c0
Vendor import of OpenSSH 3.4p1.
2002-06-29 11:34:13 +00:00
des
bb02848f18
Vendor import of OpenSSH 3.3p1.
2002-06-27 22:31:32 +00:00
des
610201f50f
Vendor import of OpenSSH 3.3.
2002-06-23 14:01:54 +00:00
des
2fc4a48897
Vendor import of OpenSSH 3.1
2002-03-18 09:55:03 +00:00
green
8acd87ac47
Say "hi" to the latest in the OpenSSH series, version 2.9!
...
Happy birthday to: rwatson
2001-05-04 03:57:05 +00:00
green
2aecee364f
Import of OpenSSH 2.3.0 (virgin OpenBSD source release).
2000-12-05 02:20:19 +00:00
kris
0ca2bdc2f7
Initial import of OpenSSH post-2.2.0 snapshot dated 2000-09-09
2000-09-10 08:31:17 +00:00
kris
e503398156
Import vendor patches: the first is written by
...
Brian Feldman <green@FreeBSD.org>
* Remove the gratuitous dependency on OpenSSL 0.9.5a (preparation for MFC)
* Disable agent forwarding by default in the client (security risk)
Submitted by: green
Obtained from: OpenBSD
2000-06-03 07:18:09 +00:00
kris
4dc8aa85ce
Initial import of OpenSSH v2.1.
2000-05-15 04:37:24 +00:00