| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
|
| |
in the struct utmp due to concerns about the length of the hostname buffer.
However, this breaks the UseDNS option. There is a simpler and better
solution: initialize utmp_len to the correct value (UT_HOSTSIZE instead of
MAXHOSTNAMELEN) and let get_remote_name_or_ip() worry about the size of the
buffer.
PR: bin/97499
Submitted by: Bruce Cran <bruce@cran.org.uk>
MFC after: 1 week
|
|
|
|
| |
MFC after: 3 days
|
|
|
|
| |
MFC after: 1 week
|
| |
|
| |
|
|
|
|
| |
aren't used for anything, but that's no excuse for being silly.
|
|
|
|
|
|
|
| |
Submitted upstream, no reaction.
Submitted by: delphij@
MFC after: 2 weeks
|
|\
| |
| |
| |
| |
| |
| |
| |
| |
| | |
I have worked hard to reduce diffs against the vendor branch. One
notable change in that respect is that we no longer prefer DSA over
RSA - the reasons for doing so went away years ago. This may cause
some surprises, as ssh will warn about unknown host keys even for
hosts whose keys haven't changed.
MFC after: 6 weeks
|
| | |
|
| | |
|
| | |
|
| |
| |
| |
| | |
"This time for sure!"
|
| | |
|
| |
| |
| |
| | |
every time I think I got them all, another one pops up.
|
| | |
|
| | |
|
| | |
|
| |
| |
| |
| |
| | |
original $FreeBSD$ keywords. Revert those changes, and simply disable
keyword expansion.
|
| | |
|
| | |
|
| |
| |
| |
| | |
Add svn command to diff against vendor branch.
|
| | |
|
| | |
|
| | |
|
| | |
|
| |
| |
| |
| | |
that code in ages - we use pam_opie(8) instead - so this is a NOP.
|
| | |
|
| |
| |
| |
| |
| |
| |
| | |
cmsghdr. Derived from upstream patch.
Submitted by: cognet
MFC after: 2 weeks
|
| |
| |
| |
| | |
available in base/vendor-crypto/openssh/dist/.
|
| |
| |
| |
| | |
all non-style changes made by heimdal to our own libgssapi.
|
|\ \
| | |
| | |
| | | |
which included commits to RCS files with non-trunk default branches.
|
| | | |
|
| | |
| | |
| | |
| | | |
instructions accordingly.
|
| | |
| | |
| | |
| | |
| | | |
The idea is to have a FREEBSD-vendor file for every third-party package
in the tree.
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
with OpenSSL 0.9.8 import.
Note that this does not enable cryptodev by default, as it was the
case with OpenSSL 0.9.7 in FreeBSD base, but this change makes it
possible to enable cryptodev at all.
This has been submitted upstream as:
http://rt.openssl.org/Ticket/Display.html?id=1624
Submitted by: nork
|
|\ \ \
| | | |
| | | |
| | | | |
which included commits to RCS files with non-trunk default branches.
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
From the OpenSSL advisory:
Andy Polyakov discovered a flaw in OpenSSL's DTLS
implementation which could lead to the compromise of clients
and servers with DTLS enabled.
DTLS is a datagram variant of TLS specified in RFC 4347 first
supported in OpenSSL version 0.9.8. Note that the
vulnerabilities do not affect SSL and TLS so only clients and
servers explicitly using DTLS are affected.
We believe this flaw will permit remote code execution.
Security: CVE-2007-4995
Security: http://www.openssl.org/news/secadv_20071012.txt
|
| | | |
| | | |
| | | |
| | | | |
the freebsd.org cluster.
|
| | | |
| | | |
| | | |
| | | |
| | | | |
Security: FreeBSD-SA-07:08.openssl
Approved by: re (security blanket)
|
| | | | |
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
casts a bit less evil.
This was e.g. seen when using portsnap as:
Fetching snapshot tag from portsnap3.FreeBSD.org... Illegal instruction
Note the patch is slightly different from kan's original patch to
match style in the OpenSSL source files a bit better.
Submitted by: kan
Tested by: many
|
| | | |
| | | |
| | | |
| | | | |
- Add reminder to bump version numer in Makefile.inc.
|
|\ \ \ \
| |/ / /
| | | |
| | | | |
which included commits to RCS files with non-trunk default branches.
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
EVP_CIPHER_CTX_key_length() should return the set key length
in the EVP_CIPHER_CTX structure which may not be the same as
the underlying cipher key length for variable length ciphers.
This fixes problems in OpenSSH using some ciphers, and possibly other
applications.
See also: http://bugzilla.mindrot.org/show_bug.cgi?id=1291
|
| | | | |
|
|\ \ \ \
| |/ / /
| | | |
| | | | |
which included commits to RCS files with non-trunk default branches.
|
| | | | |
|
| | | | |
|
|\ \ \ \
| | |_|/
| |/| |
| | | | |
which included commits to RCS files with non-trunk default branches.
|
| | | | |
|