/freebsd/crypto/openssh/.github/ |
H A D | ci-status.md | 2 …C++ CI](https://github.com/openssh/openssh-portable/actions/workflows/c-cpp.yml/badge.svg)](https:… 3 …https://github.com/openssh/openssh-portable-selfhosted/actions/workflows/selfhosted.yml/badge.svg)… 4 …(https://github.com/openssh/openssh-portable-selfhosted/actions/workflows/upstream.yml/badge.svg)]… 5 …IFuzz](https://github.com/openssh/openssh-portable/actions/workflows/cifuzz.yml/badge.svg)](https:… 6 …orage.googleapis.com/badges/openssh.svg)](https://bugs.chromium.org/p/oss-fuzz/issues/list?sort=-o… 7 …//scan.coverity.com/projects/21341/badge.svg)](https://scan.coverity.com/projects/openssh-portable) 10 …(https://github.com/openssh/openssh-portable/actions/workflows/c-cpp.yml/badge.svg?branch=V_9_9)](… 11 …/github.com/openssh/openssh-portable-selfhosted/actions/workflows/selfhosted.yml/badge.svg?branch=…
|
/freebsd/crypto/openssh/ |
H A D | README.md | 3 …C++ CI](https://github.com/openssh/openssh-portable/actions/workflows/c-cpp.yml/badge.svg)](https:… 4 …orage.googleapis.com/badges/openssh.svg)](https://bugs.chromium.org/p/oss-fuzz/issues/list?sort=-o… 5 …//scan.coverity.com/projects/21341/badge.svg)](https://scan.coverity.com/projects/openssh-portable) 9 This is a port of OpenBSD's [OpenSSH](https://openssh.com) to most Unix-like operating systems, inc… 26 …ww.openssh.com/portable.html#downloads). We recommend the use of a stable release for most users. … 47 tar zxvf openssh-X.YpZ.tar.gz 48 cd openssh 60 git clone https://github.com/openssh/openssh-portable # or https://anongit.mindrot.org/openssh.git 61 cd openssh-portable 82 …n the [openssh-unix-dev mailing list](https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev)… [all …]
|
H A D | FREEBSD-upgrade | 17 $ gpg --verify openssh-X.YpZ.tar.gz.asc 21 $ tar xf openssh-X.YpZ.tar.gz 26 $ git worktree add ../vendor/openssh freebsd/vendor/openssh 27 $ cd ../vendor/openssh 28 $ rsync --archive --delete --exclude=.git /path/to/openssh-X.YpZ/ ./ 40 $ git tag -a -m "Tag OpenSSH X.YpZ" vendor/openssh/X.YpZ 44 $ git push freebsd vendor/openssh 45 $ git push freebsd vendor/openssh/X.YpZ 53 $ git push --dry-run --follow-tags freebsd vendor/openssh 54 $ git push --follow-tags freebsd vendor/openssh [all …]
|
H A D | .git_allowed_signers | 2 dtucker@dtucker.net sk-ecdsa-sha2-nistp256@openssh.com AAAAInNrLWVjZHNhLXNoYTItbmlzdHAyNTZAb3BlbnNz… 4 djm@mindrot.org sk-ecdsa-sha2-nistp256@openssh.com AAAAInNrLWVjZHNhLXNoYTItbmlzdHAyNTZAb3BlbnNzaC5j… 5 djm@mindrot.org sk-ecdsa-sha2-nistp256@openssh.com AAAAInNrLWVjZHNhLXNoYTItbmlzdHAyNTZAb3BlbnNzaC5j… 6 djm@mindrot.org sk-ecdsa-sha2-nistp256@openssh.com AAAAInNrLWVjZHNhLXNoYTItbmlzdHAyNTZAb3BlbnNzaC5j… 7 djm@mindrot.org sk-ecdsa-sha2-nistp256@openssh.com AAAAInNrLWVjZHNhLXNoYTItbmlzdHAyNTZAb3BlbnNzaC5j…
|
H A D | PROTOCOL | 7 https://www.openssh.com/txt/draft-ietf-secsh-filexfer-02.txt 17 1.1. transport: Protocol 2 MAC algorithm "umac-64@openssh.com" 23 https://www.openssh.com/txt/draft-miller-secsh-umac-01.txt 25 1.2. transport: Protocol 2 compression algorithm "zlib@openssh.com" 34 https://www.openssh.com/txt/draft-miller-secsh-compression-delayed-00.txt 36 1.3. transport: New public key algorithms "ssh-rsa-cert-v01@openssh.com", 37 "ssh-dsa-cert-v01@openssh.com", 38 "ecdsa-sha2-nistp256-cert-v01@openssh.com", 39 "ecdsa-sha2-nistp384-cert-v01@openssh.com" and 40 "ecdsa-sha2-nistp521-cert-v01@openssh.com" [all …]
|
H A D | freebsd-configure.sh | 17 openssh=$(dirname $(realpath $0)) 18 cd $openssh 21 (cd $openssh && libtoolize --copy && autoheader && autoconf) 40 export CFLAGS="-I$openssh/../../contrib/libcbor/src -I$openssh/../../contrib/libfido2/src"
|
H A D | PROTOCOL.u2f | 54 sk-ecdsa-sha2-nistp256@openssh.com 55 sk-ecdsa-sha2-nistp256-cert-v01@openssh.com 56 sk-ssh-ed25519@openssh.com 57 sk-ssh-ed25519-cert-v01@openssh.com 64 The format of a sk-ecdsa-sha2-nistp256@openssh.com public key is: 66 string "sk-ecdsa-sha2-nistp256@openssh.com" 73 string "sk-ecdsa-sha2-nistp256@openssh.com" 81 The format of a sk-ssh-ed25519@openssh.com public key is: 83 string "sk-ssh-ed25519@openssh.com" 89 string "sk-ssh-ed25519@openssh.com" [all …]
|
H A D | README | 1 See https://www.openssh.com/releasenotes.html#9.9p2 for the release 4 Please read https://www.openssh.com/report.html for bug reporting 16 and Dug Song. It has a homepage at https://www.openssh.com/ 31 refer to https://www.openssh.com/list.html for details on how to join. 34 the mailing list openssh-unix-dev@mindrot.org. To mitigate spam, the 51 [0] https://www.openssh.com/
|
H A D | PROTOCOL.agent | 6 1. session-bind@openssh.com extension 17 string session-bind@openssh.com 38 2. restrict-destination-v00@openssh.com key constraint extension 45 string restrict-destination-v00@openssh.com 73 constraints against the session-bind@openssh.com bindings recorded for 87 3. associated-certs-v00@openssh.com key constraint extension 93 string associated-certs-v00@openssh.com
|
H A D | PROTOCOL.certkeys | 34 ssh-rsa-cert-v01@openssh.com 35 ssh-dss-cert-v01@openssh.com 36 ecdsa-sha2-nistp256-cert-v01@openssh.com 37 ecdsa-sha2-nistp384-cert-v01@openssh.com 38 ecdsa-sha2-nistp521-cert-v01@openssh.com 39 ssh-ed25519-cert-v01@openssh.com 44 rsa-sha2-256-cert-v01@openssh.com 45 rsa-sha2-512-cert-v01@openssh.com 78 string "ssh-rsa-cert-v01@openssh.com" 96 string "ssh-dss-cert-v01@openssh.com" [all …]
|
H A D | PROTOCOL.chacha20poly1305 | 1 This document describes the chacha20-poly1305@openssh.com authenticated 16 The chacha20-poly1305@openssh.com combines these two primitives into an 25 The chacha20-poly1305@openssh.com offers both encryption and 27 chacha20-poly1305@openssh.com cipher is selected in key exchange, 34 The chacha20-poly1305@openssh.com cipher requires 512 bits of key 91 is followed, then chacha20-poly1305@openssh.com requires no special
|
H A D | freebsd-namespace.sh | 24 top_srcdir=${srcdir%/crypto/openssh} 51 * Run crypto/openssh/freebsd-namespace.sh to regenerate.
|
/freebsd/crypto/openssh/contrib/aix/ |
H A D | buildbff.sh | 59 PKGNAME=openssh 165 find . ! -name . -print >../openssh.al 166 $inventory >../openssh.inventory 168 cat <<EOD >../openssh.copyright 170 For the full text of the license, see /usr/lpp/openssh/LICENCE 183 done > ../openssh.size 188 cat <<EOF >>../openssh.post_i 291 for i in openssh.al openssh.copyright openssh.inventory openssh.post_i openssh.size LICENCE README* 325 …sconfdir $libexecdir $mandir/${mansubdir}1 $mandir/${mansubdir}8 $sbindir $datadir /usr/lpp/openssh 342 mkdir -p usr/lpp/openssh [all …]
|
H A D | README | 4 installable) openssh package. 38 may be found at http://www.dtucker.net/openssh/.
|
/freebsd/crypto/openssh/contrib/redhat/ |
H A D | openssh.spec | 82 Name: openssh 89 URL: https://www.openssh.com/portable.html 90 Source0: https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{version}.tar.gz 130 Requires: openssh = %{version}-%{release} 138 Requires: openssh = %{version}-%{release}, chkconfig >= 0.9 146 Requires: openssh = %{version}-%{release} 152 Requires: openssh = %{version}-%{release} 174 You'll also need to install the openssh package on OpenSSH clients. 180 securely connect to your SSH server. You also need to have the openssh 209 --libexecdir=%{_libexecdir}/openssh \ [all …]
|
H A D | gnome-ssh-askpass.csh | 1 setenv SSH_ASKPASS /usr/libexec/openssh/gnome-ssh-askpass
|
H A D | gnome-ssh-askpass.sh | 1 SSH_ASKPASS=/usr/libexec/openssh/gnome-ssh-askpass
|
/freebsd/contrib/blocklist/diff/ |
H A D | ssh.diff | 44 RCS file: /cvsroot/src/crypto/external/bsd/openssh/bin/sshd/Makefile,v 65 diff -ru openssh-7.7p1/auth-pam.c dist/auth-pam.c 66 --- openssh-7.7p1/auth-pam.c 2018-04-02 01:38:28.000000000 -0400 92 diff -ru openssh-7.7p1/auth2.c dist/auth2.c 93 --- openssh-7.7p1/auth2.c 2018-04-02 01:38:28.000000000 -0400 113 diff -ru openssh-7.7p1/sshd.c dist/sshd.c 114 --- openssh-7.7p1/sshd.c 2018-04-02 01:38:28.000000000 -0400
|
/freebsd/crypto/openssh/regress/ |
H A D | ssh-com-client.sh | 33 ${SSHKEYGEN} -i -f ${OBJ}/id.com > $OBJ/id.openssh 34 chmod 600 ${OBJ}/id.openssh 35 ${SSHKEYGEN} -y -f ${OBJ}/id.openssh > $OBJ/authorized_keys_$USER 36 ${SSHKEYGEN} -e -f ${OBJ}/id.openssh > $OBJ/id.com.pub
|
H A D | agent.sh | 202 check_key_present ssh-ed25519-cert-v01@openssh.com 211 check_key_absent ssh-ed25519-cert-v01@openssh.com 219 check_key_absent ssh-ed25519-cert-v01@openssh.com 223 check_key_absent ssh-ed25519-cert-v01@openssh.com
|
H A D | keytype.sh | 45 ed25519-sk) echo sk-ssh-ed25519@openssh.com;; 46 ecdsa-sk) echo sk-ecdsa-sha2-nistp256@openssh.com;;
|
H A D | limit-keytype.sh | 21 sk-ssh-ed25519@openssh.com) ktype5=ed25519-sk ;; 22 sk-ecdsa-sha2-nistp256@openssh.com) ktype6=ecdsa-sk ;;
|
/freebsd/crypto/openssh/contrib/suse/ |
H A D | openssh.spec | 15 Name: openssh 17 URL: https://www.openssh.com/ 19 Source0: openssh-%{version}.tar.gz 23 BuildRoot: %{_tmppath}/openssh-%{version}-buildroot 42 Requires: openssh = %{version} 44 Provides: openssh:${_libdir}/ssh/ssh-askpass
|
/freebsd/crypto/openssh/contrib/solaris/ |
H A D | README | 16 any changes you want in openssh-config.local. Additional customizations 27 openssh-unix-dev@mindrot.org and I will try to assist you as best as I can.
|
/freebsd/crypto/openssh/regress/unittests/sshsig/testdata/ |
H A D | ecdsa_sk_webauthn.pub | 1 sk-ecdsa-sha2-nistp256@openssh.com AAAAInNrLWVjZHNhLXNoYTItbmlzdHAyNTZAb3BlbnNzaC5jb20AAAAIbmlzdHAy…
|