summaryrefslogtreecommitdiffstats
path: root/crypto/openssh/misc.c
Commit message (Collapse)AuthorAgeFilesLines
* MFH (r261320): upgrade openssh to 6.5p1des2014-02-271-1/+9
| | | | MFH (r261340): enable sandboxing by default
* Upgrade to 6.3p1.des2013-09-211-20/+39
|\ | | | | | | Approved by: re (gjb)
* | Upgrade OpenSSH to 6.1p1.des2012-09-031-2/+2
| |
* | Upgrade to OpenSSH 5.9p1.des2011-10-051-1/+14
|\ \ | |/ | | | | MFC after: 3 months
* | Add support for dynamically adjusted buffers to allow the full use ofbrooks2011-08-031-0/+32
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | the bandwidth of long fat pipes (i.e. 100Mbps+ trans-oceanic or trans-continental links). Bandwidth-delay products up to 64MB are supported. Also add support (not compiled by default) for the None cypher. The None cypher can only be enabled on non-interactive sessions (those without a pty where -T was not used) and must be enabled in both the client and server configuration files and on the client command line. Additionally, the None cypher will only be activated after authentication is complete. To enable the None cypher you must add -DNONE_CIPHER_ENABLED to CFLAGS via the make command line or in /etc/make.conf. This code is a style(9) compliant version of these features extracted from the patches published at: http://www.psc.edu/networking/projects/hpn-ssh/ Merging this patch has been a collaboration between me and Bjoern. Reviewed by: bz Approved by: re (kib), des (maintainer)
* | Upgrade to OpenSSH 5.8p2.des2011-05-041-7/+132
|\ \ | |/
* | Upgrade to OpenSSH 5.6p1.des2010-11-111-4/+15
|\ \ | |/
* | Upgrade to OpenSSH 5.4p1.des2010-03-091-9/+20
|\ \ | |/ | | | | MFC after: 1 month
* | Upgrade to OpenSSH 5.2p1.des2009-05-221-15/+12
|\ \ | |/ | | | | MFC after: 3 months
* | Upgrade to OpenSSH 5.1p1.des2008-08-011-2/+33
|\ \ | |/ | | | | | | | | | | | | | | | | I have worked hard to reduce diffs against the vendor branch. One notable change in that respect is that we no longer prefer DSA over RSA - the reasons for doing so went away years ago. This may cause some surprises, as ssh will warn about unknown host keys even for hosts whose keys haven't changed. MFC after: 6 weeks
| * Properly flatten openssh/dist.des2008-07-221-823/+0
| |
| * Revert part of 180714 - the intent was to flatten dist, not to nuke it.des2008-07-221-0/+823
| |
| * Flatten the OpenSSH vendor tree for 3.x and newer.des2008-07-221-823/+0
|/
* Vendor import of OpenSSH 4.4p1.des2006-09-301-12/+145
|
* Vendor import of OpenSSH 4.3p1.des2006-03-221-4/+169
|
* Vendor import of OpenSSH 4.2p1.des2005-09-031-1/+127
|
* Vendor import of OpenSSH 4.1p1.des2005-06-051-4/+4
|
* Vendor import of OpenSSH 4.0p1.des2005-06-051-1/+66
|
* Vendor import of OpenSSH 3.9p1.des2004-10-281-15/+21
|
* Vendor import of OpenSSH 3.8p1.des2004-02-261-2/+2
|
* Vendor import of OpenSSH 3.7.1p2.des2004-01-071-28/+2
|
* Correct more cases of allocation size bookkeeping being updated beforenectar2003-09-171-4/+7
| | | | | | | calling functions which can potentially fail and cause cleanups to be invoked. Submitted by: Solar Designer <solar@openwall.com>
* Vendor import of OpenSSH-portable 3.6.1p1.des2003-04-231-2/+2
|
* Vendor import of OpenSSH 3.3p1.des2002-06-271-0/+32
|
* Vendor import of OpenSSH 3.1des2002-03-181-9/+198
|
* Say "hi" to the latest in the OpenSSH series, version 2.9!green2001-05-041-0/+130
Happy birthday to: rwatson
OpenPOWER on IntegriCloud