head	1.53;
access;
symbols
	RELEASE_8_3_0:1.53
	RELEASE_9_0_0:1.53
	RELEASE_7_4_0:1.51
	RELEASE_8_2_0:1.51
	RELEASE_6_EOL:1.51
	RELEASE_8_1_0:1.51
	RELEASE_7_3_0:1.51
	RELEASE_8_0_0:1.51
	RELEASE_7_2_0:1.49
	RELEASE_7_1_0:1.47
	RELEASE_6_4_0:1.47
	RELEASE_5_EOL:1.47
	RELEASE_7_0_0:1.45
	RELEASE_6_3_0:1.45
	PRE_XORG_7:1.41
	RELEASE_4_EOL:1.40
	RELEASE_6_2_0:1.38
	RELEASE_6_1_0:1.32
	RELEASE_5_5_0:1.32
	RELEASE_6_0_0:1.27
	RELEASE_5_4_0:1.26
	RELEASE_4_11_0:1.25
	RELEASE_5_3_0:1.25
	RELEASE_4_10_0:1.23
	RELEASE_5_2_1:1.22
	RELEASE_5_2_0:1.22
	RELEASE_4_9_0:1.20
	RELEASE_5_1_0:1.20
	RELEASE_4_8_0:1.16
	RELEASE_5_0_0:1.16
	RELEASE_4_7_0:1.15
	RELEASE_4_6_2:1.10
	RELEASE_4_6_1:1.10
	RELEASE_4_6_0:1.10
	RELEASE_5_0_DP1:1.9
	RELEASE_4_5_0:1.6
	RELEASE_4_4_0:1.2;
locks; strict;
comment	@# @;


1.53
date	2011.10.21.16.18.56;	author flo;	state Exp;
branches;
next	1.52;

1.52
date	2011.07.03.14.03.02;	author ohauer;	state Exp;
branches;
next	1.51;

1.51
date	2009.09.18.14.05.52;	author pav;	state Exp;
branches;
next	1.50;

1.50
date	2009.05.15.11.00.27;	author pav;	state Exp;
branches;
next	1.49;

1.49
date	2009.03.24.17.41.06;	author pav;	state Exp;
branches;
next	1.48;

1.48
date	2009.03.24.17.26.17;	author pav;	state Exp;
branches;
next	1.47;

1.47
date	2008.04.19.13.46.24;	author mnag;	state Exp;
branches;
next	1.46;

1.46
date	2008.01.16.13.09.00;	author mnag;	state Exp;
branches;
next	1.45;

1.45
date	2007.10.05.12.41.25;	author mnag;	state Exp;
branches;
next	1.44;

1.44
date	2007.09.14.01.32.25;	author mnag;	state Exp;
branches;
next	1.43;

1.43
date	2007.09.08.01.18.31;	author mnag;	state Exp;
branches;
next	1.42;

1.42
date	2007.08.30.15.40.39;	author mnag;	state Exp;
branches;
next	1.41;

1.41
date	2007.03.12.22.13.18;	author mnag;	state Exp;
branches;
next	1.40;

1.40
date	2006.11.17.18.58.43;	author ale;	state Exp;
branches;
next	1.39;

1.39
date	2006.11.10.13.11.49;	author mnag;	state Exp;
branches;
next	1.38;

1.38
date	2006.10.17.13.27.18;	author mnag;	state Exp;
branches;
next	1.37;

1.37
date	2006.10.07.21.06.55;	author mnag;	state Exp;
branches;
next	1.36;

1.36
date	2006.10.04.13.53.54;	author mnag;	state Exp;
branches;
next	1.35;

1.35
date	2006.10.01.02.15.00;	author mnag;	state Exp;
branches;
next	1.34;

1.34
date	2006.08.29.19.47.07;	author ale;	state Exp;
branches;
next	1.33;

1.33
date	2006.07.04.20.10.25;	author mnag;	state Exp;
branches;
next	1.32;

1.32
date	2006.02.11.23.59.28;	author mnag;	state Exp;
branches;
next	1.31;

1.31
date	2006.02.11.23.55.26;	author mnag;	state Exp;
branches;
next	1.30;

1.30
date	2006.02.07.20.07.53;	author mnag;	state Exp;
branches;
next	1.29;

1.29
date	2005.11.09.02.32.49;	author mnag;	state Exp;
branches;
next	1.28;

1.28
date	2005.09.01.19.24.36;	author garga;	state Exp;
branches;
next	1.27;

1.27
date	2005.06.06.19.09.04;	author pav;	state Exp;
branches;
next	1.26;

1.26
date	2005.03.20.01.00.03;	author ahze;	state Exp;
branches;
next	1.25;

1.25
date	2004.08.18.11.35.53;	author dinoex;	state Exp;
branches;
next	1.24;

1.24
date	2004.04.29.03.04.27;	author dinoex;	state Exp;
branches;
next	1.23;

1.23
date	2004.02.25.12.32.57;	author dinoex;	state Exp;
branches;
next	1.22;

1.22
date	2003.09.28.18.41.51;	author dinoex;	state Exp;
branches;
next	1.21;

1.21
date	2003.09.26.18.13.52;	author dinoex;	state Exp;
branches;
next	1.20;

1.20
date	2003.05.07.20.04.49;	author dinoex;	state Exp;
branches;
next	1.19;

1.19
date	2003.04.30.05.44.38;	author dinoex;	state Exp;
branches;
next	1.18;

1.18
date	2003.04.02.04.26.55;	author dinoex;	state Exp;
branches;
next	1.17;

1.17
date	2003.04.01.03.02.56;	author dinoex;	state Exp;
branches;
next	1.16;

1.16
date	2002.10.17.04.40.18;	author dinoex;	state Exp;
branches;
next	1.15;

1.15
date	2002.06.28.06.18.24;	author dinoex;	state Exp;
branches;
next	1.14;

1.14
date	2002.06.26.17.32.02;	author dinoex;	state Exp;
branches;
next	1.13;

1.13
date	2002.06.22.16.24.04;	author dinoex;	state Exp;
branches;
next	1.12;

1.12
date	2002.05.31.20.51.48;	author dinoex;	state Exp;
branches;
next	1.11;

1.11
date	2002.05.31.07.28.46;	author dinoex;	state Exp;
branches;
next	1.10;

1.10
date	2002.05.03.03.02.30;	author dinoex;	state Exp;
branches;
next	1.9;

1.9
date	2002.03.23.04.08.33;	author dinoex;	state Exp;
branches;
next	1.8;

1.8
date	2002.03.08.05.54.04;	author dinoex;	state Exp;
branches;
next	1.7;

1.7
date	2002.02.17.15.00.25;	author dinoex;	state Exp;
branches;
next	1.6;

1.6
date	2001.12.02.06.52.42;	author dinoex;	state Exp;
branches;
next	1.5;

1.5
date	2001.11.18.08.43.00;	author dinoex;	state Exp;
branches;
next	1.4;

1.4
date	2001.11.07.13.47.51;	author dinoex;	state Exp;
branches;
next	1.3;

1.3
date	2001.10.03.15.19.23;	author dinoex;	state Exp;
branches;
next	1.2;

1.2
date	2001.08.19.17.22.37;	author dinoex;	state Exp;
branches;
next	1.1;

1.1
date	2001.06.01.14.49.32;	author dinoex;	state Exp;
branches;
next	;


desc
@@


1.53
log
@- update to 5.8p2 [1]
- fix Kerberos knob [2]
- fix build on 9.0 [3]
- fix deinstall with various knobs [4]
- fix LPK knob [5]

PR:		ports/161818 [1], ports/144597 [2], ports/160389 [3]
		ports/150493, ports/156926 [4], ports/155456 [5]

Submitted by:	"Grzegorz Blach" <magik@@roorback.net> [1], [2], [4], [5]
		pluknet [3]
Reported by:	Jonathan <lordsith49@@hotmail.com> [2]
		Kevin Thompson <antiduh@@csh.rit.edu> [4]
		Alexey Remizov <alexey@@remizov.org> [5]
@
text
@SHA256 (openssh-5.8p2.tar.gz) = 5c35ec7c966ce05cc4497ac59c0b54a556e55ae7368165cc8c4129694654f314
SIZE (openssh-5.8p2.tar.gz) = 1115475
SHA256 (openssh-5.8p1-hpn13v11.diff.gz) = 62b500d29d8889ce76c8b596eb65731d8ac3469d89d9c6eb29fec2a845159df7
SIZE (openssh-5.8p1-hpn13v11.diff.gz) = 22993
SHA256 (openssh-5.8p1+x509-7.0.diff.gz) = 3b578cbf69f25e630e8da52b6586a36c62c0c7ce026f95acda91c023dc47c85b
SIZE (openssh-5.8p1+x509-7.0.diff.gz) = 184277
SHA256 (openssh-5.7p1-gsskex-all-20110125.patch) = bfdc72c3d7d5d4f9f8a78b649988dff8fad780cfa72bad4a69eb94c54de9a359
SIZE (openssh-5.7p1-gsskex-all-20110125.patch) = 91889
@


1.52
log
@-remove MD5
@
text
@d1 8
a8 6
SHA256 (openssh-5.2p1.tar.gz) = 4023710c37d0b3d79e6299cb79b6de2a31db7d581fe59e775a5351784034ecae
SIZE (openssh-5.2p1.tar.gz) = 1016612
SHA256 (openssh-5.2p1+x509-6.2.diff.gz) = 72cfb1e232b6ae0a9df6e8539a9f6b53db7c0a2141cf2e4dd65b407748fa9f34
SIZE (openssh-5.2p1+x509-6.2.diff.gz) = 153010
SHA256 (openssh-5.2p1-gsskex-all-20090726.patch) = 6eb297d6fa74be3323c5e4f53df5b6e1f4edf6bf394e3e707c075846886e18e7
SIZE (openssh-5.2p1-gsskex-all-20090726.patch) = 90959
@


1.51
log
@- Unbreak KERBEROS option
- Add option for OpenBSD support
- Fix crash in sftp listing

PR:		ports/138409 (cumulative patch)
Submitted by:	Denis Barov <dindin@@dindin.ru> (maintainer)
Feature safe:	yes
@
text
@a0 1
MD5 (openssh-5.2p1.tar.gz) = ada79c7328a8551bdf55c95e631e7dad
a2 1
MD5 (openssh-5.2p1+x509-6.2.diff.gz) = 8dbbfb743226864f6bb49b56e77776d9
a4 1
MD5 (openssh-5.2p1-gsskex-all-20090726.patch) = e5c116b4bc3f4b816206e8403dd08af7
@


1.50
log
@- Update to 5.2p1
- Assign maintainership to the submitter

PR:		ports/134160
Submitted by:	Denis Barov <dindin@@dindin.ru>
@
text
@d7 3
@


1.49
log
@- Integrate x509 certificate patch (optional, default off) from http://www.roumenpetrov.info/openssh/

PR:		ports/121438
Submitted by:	Dirk-Willem van Gulik <dirkx@@webweaving.org>
Approved by:	maintainer timeout (mnag; 1 year)
@
text
@d1 6
a6 9
MD5 (openssh-5.1p1.tar.gz) = 03f2d0c1b5ec60d4ac9997a146d2faec
SHA256 (openssh-5.1p1.tar.gz) = f05358164dae1021386ae57be53a5e9f5cba7a1f8c9beaa428299e28a5666d75
SIZE (openssh-5.1p1.tar.gz) = 1040041
MD5 (openssh-5.1p1-hpn13v5.diff.gz) = 614f2cc34817bb9460e3b700be21b94b
SHA256 (openssh-5.1p1-hpn13v5.diff.gz) = 81bebd71fb0aa8a265c0576aa3c42c0fdf263712db771f12d35c8aff09523aab
SIZE (openssh-5.1p1-hpn13v5.diff.gz) = 23017
MD5 (openssh-5.1p1+x509-6.1.1.diff.gz) = 9be4b5f1104e51333199423802e97fe7
SHA256 (openssh-5.1p1+x509-6.1.1.diff.gz) = 2821d8fe003337569d6551fd26a387f53b4adc9b59f2b0131659936e11966eb3
SIZE (openssh-5.1p1+x509-6.1.1.diff.gz) = 152642
@


1.48
log
@- Update to 5.1p1

PR:		ports/128679
Submitted by:	Sunpoet Po-Chuan Hsieh <sunpoet@@sunpoet.net>
Approved by:	maintainer timeout (mnag; 4 months)
@
text
@d7 3
@


1.47
log
@- Update to 5.0p1
- Port LPK patch to 5.0p1 and add to files dir
- Remove USE_PERL_BUILD since doesn't need [1]
- Update KERB_GSSAPI to 5.0p1
- Update HPN patch to 5.0p1 13v3
- Respect LOCALBASE on configure_args of LPK [2]
- Change MASTER_SITE of snapshot
- portlint(1)

PR:		121826 [2]
Submitted by:	Andrew Kolchoogin <andrew___rinet.ru> [2]
Reported by:	Björn König <bkoenig___alpha-tierchen.d [1]
@
text
@d1 6
a6 9
MD5 (openssh-5.0p1.tar.gz) = 1f1dfaa775f33dd3328169de9bdc292a
SHA256 (openssh-5.0p1.tar.gz) = 73a58620cd475155be8524f46997ba1942bc9e54204eeb15f0465e54ca279f4f
SIZE (openssh-5.0p1.tar.gz) = 1011556
MD5 (openssh-5.0p1-gsskex-20080404.patch) = d13bf38e852e38b7f29b9e6993b00b52
SHA256 (openssh-5.0p1-gsskex-20080404.patch) = 8f8b9910af767ce8e2a5d4854e95c8eb8b089bb250b290d22add38e9ddb1791e
SIZE (openssh-5.0p1-gsskex-20080404.patch) = 68272
MD5 (openssh-5.0p1-hpn13v3.diff.gz) = 95e7f78d63b419babd820c0653aa47ef
SHA256 (openssh-5.0p1-hpn13v3.diff.gz) = e9000f969705dbdf72f7ea069e5f8a2475eb89e88e014c678ecb102ddf4bcde2
SIZE (openssh-5.0p1-hpn13v3.diff.gz) = 24060
@


1.46
log
@- Update HPN patch to hpn12v20
- Bump PORTREVISION

Submitted by:	Ollivier Robert <roberto__keltia.freenix.fr>
@
text
@d1 9
a9 12
MD5 (openssh-4.7p1.tar.gz) = 50a800fd2c6def9e9a53068837e87b91
SHA256 (openssh-4.7p1.tar.gz) = d47133f0c6737d2889bf8da7bdf389fc2268d1c7fa3cd11a52451501eab548bc
SIZE (openssh-4.7p1.tar.gz) = 991119
MD5 (openssh-4.7p1-gsskex-20070927.patch) = ad58a9848dcaa3ad5a2ab14182fb9212
SHA256 (openssh-4.7p1-gsskex-20070927.patch) = 7ef9009baa842c696d356c7e5e5d022797a227531c1662dd998510e45a6dd597
SIZE (openssh-4.7p1-gsskex-20070927.patch) = 66693
MD5 (openssh-4.7p1-hpn12v20.diff.gz) = 7a75e87b03e4d713973c5a3330a68ab5
SHA256 (openssh-4.7p1-hpn12v20.diff.gz) = 4b951b444f3c093ca3dbb1ae6e9825c33610719ee8ca593e660ec8248c5b09c6
SIZE (openssh-4.7p1-hpn12v20.diff.gz) = 15211
MD5 (openssh-lpk-4.6p1-0.3.9.patch) = f43a8aae7d69e72f0ec07bc96e46b328
SHA256 (openssh-lpk-4.6p1-0.3.9.patch) = e12335e8bf020508ea3866db07b306f4c965e3f9de262c06f62fad494e93107e
SIZE (openssh-lpk-4.6p1-0.3.9.patch) = 61605
@


1.45
log
@- Update gsskex patch to 20070927
- Update HPN patch to hpn12v19 [1]

Notified by:	ale [1]
@
text
@d7 3
a9 3
MD5 (openssh-4.7p1-hpn12v19.diff.gz) = befa2e169944d1d32216cbf35d182a96
SHA256 (openssh-4.7p1-hpn12v19.diff.gz) = 60ba4bfd986f5ee21394387bc8ffd87bd1f2e16c5e8853b7896327faf1595bf3
SIZE (openssh-4.7p1-hpn12v19.diff.gz) = 15122
@


1.44
log
@- Update MD5/SHA256 of openssh hpn patch. This patch are rerolled to update version:

--- openssh-4.7p1-hpn12v18.diff 2007-09-13 17:11:05.000000000 -0300
+++ /usr/ports/distfiles/openssh-4.7p1-hpn12v18.diff    2007-09-05 18:13:03.000000000 -0300
@@@@ -1580,5 +1580,5 @@@@

  #define SSH_PORTABLE  "p1"
 -#define SSH_RELEASE   SSH_VERSION SSH_PORTABLE
-+#define SSH_HPN         "-hpn12v18"
++#define SSH_HPN         "-hpn12v17"
 +#define SSH_RELEASE   SSH_VERSION SSH_PORTABLE SSH_HPN

Reported by:	Tsurutani Naoki <turutani___scphys.kyoto-u.ac.jp>
@
text
@d4 6
a9 6
MD5 (openssh-4.6p1-gsskex-20070312.patch) = 9607f2faa8a50078d74f1169b5040599
SHA256 (openssh-4.6p1-gsskex-20070312.patch) = d4f94d0a046ef1ada973faa4815d8af4d74ca068213e34b8537d6ac313895f92
SIZE (openssh-4.6p1-gsskex-20070312.patch) = 69637
MD5 (openssh-4.7p1-hpn12v18.diff.gz) = 5b536701ee999a29bb622c2f41745ef8
SHA256 (openssh-4.7p1-hpn12v18.diff.gz) = 45e6ea24e2722cab9b4e143952bf6539024aa8cc93353b88807c910330bb735b
SIZE (openssh-4.7p1-hpn12v18.diff.gz) = 16094
@


1.43
log
@- Update to 4.7p1
- Update HPN patch to 4.7p1-hpn12v18
- Mark as BROKEN WITH_KERB_GSSAPI while developer release a new patch
@
text
@d7 2
a8 2
MD5 (openssh-4.7p1-hpn12v18.diff.gz) = 39011b556b2cfdeb3fb74d2bd6f2d7d8
SHA256 (openssh-4.7p1-hpn12v18.diff.gz) = b94e406d5269cbc51546ce6b61199450270ca01b4f10d3149e2a6403649ea0de
@


1.42
log
@- Enable ssl-engine
- Update gsskex patch to 4.6p1-gsskex-20070312
- Update lpk patch to 4.6p1-0.3.9
- Update hpn patch to 4.6p1-hpn12v17
- Fix challenge-response issue
- Bump PORTREVISION

Reported by:	Stefan Lambrev [1], ale@@ [1]
@
text
@d1 3
a3 3
MD5 (openssh-4.6p1.tar.gz) = 6a7fa99f44d9e1b5b04d15256e1405bb
SHA256 (openssh-4.6p1.tar.gz) = 7bbe277faa80c8d8d9cb96111db65fc0007d451784cc459207cd46b746a6f23a
SIZE (openssh-4.6p1.tar.gz) = 967395
d7 3
a9 3
MD5 (openssh-4.6p1-hpn12v17.diff.gz) = d5d4148c985c58a8784048edae9d8866
SHA256 (openssh-4.6p1-hpn12v17.diff.gz) = 61438f6dc8959b038dee4fb365fe79b749053ccc149e768cdb73cb9c8740360b
SIZE (openssh-4.6p1-hpn12v17.diff.gz) = 16145
@


1.41
log
@- Update OpenSSH to 4.6p1
- Update GSSKEX patch to 20061220
- Update HPN patch to hpn12v16
- Update LPK patch to 0.3.8
@
text
@d4 9
a12 6
MD5 (openssh-4.6p1-hpn12v16.diff.gz) = 0bc643a4e1588f7abdcdbb31304bac56
SHA256 (openssh-4.6p1-hpn12v16.diff.gz) = f304e3b04e2772c27c09e9aa5a3fd02747187a8775de39879c3d871fad1e156f
SIZE (openssh-4.6p1-hpn12v16.diff.gz) = 15944
MD5 (openssh-lpk-4.5p1-0.3.8.patch) = 663ce0f968c4f7eacc5128dc91645245
SHA256 (openssh-lpk-4.5p1-0.3.8.patch) = c96cb24ea0c21cd93f2a28c31c38902bed8ddf0cb7a2879337bb21a5edd7ce35
SIZE (openssh-lpk-4.5p1-0.3.8.patch) = 62340
@


1.40
log
@Update HPN patch to v14 for openssh 4.5p1.

Approved by:	mnag
@
text
@d1 9
a9 9
MD5 (openssh-4.5p1.tar.gz) = 6468c339886f78e8a149b88f695839dd
SHA256 (openssh-4.5p1.tar.gz) = 7046b9d372f9e31ca654a66492310c188470480ddab300eb715dbf5e2177ae55
SIZE (openssh-4.5p1.tar.gz) = 965925
MD5 (openssh-4.4p1-gsskex-20061002.patch) = 61e8573f7192eb1ff26036f486db445a
SHA256 (openssh-4.4p1-gsskex-20061002.patch) = cc21b7038589be27924bdc0ba163cf059ea1f0b7b65d0f8d7ddc015cac6d9ac4
SIZE (openssh-4.4p1-gsskex-20061002.patch) = 69152
MD5 (openssh-4.5p1-hpn12v14.diff.gz) = 86d3751f777c9c99663aebbb36281a0e
SHA256 (openssh-4.5p1-hpn12v14.diff.gz) = 5cc6cd882cbb94498483b44722b3e81c8e6d7854dc2b2c57e1d56040bfdc23bd
SIZE (openssh-4.5p1-hpn12v14.diff.gz) = 15791
@


1.39
log
@- Update to 4.5p1
- patch-sshd.c unconditionally includes <gssapi.h>. Include "ssh-gss.h" instead. [1]

PR:		104481 [1]
Submitted by:	Mark Andrews <Mark_Andrews___isc.org> [1]
@
text
@d7 3
a9 3
MD5 (openssh-4.4p1-hpn12v11.diff.gz) = ae271cb7f4e4ba8f6d34b9e289bd1123
SHA256 (openssh-4.4p1-hpn12v11.diff.gz) = f42e6799de702281228691eadd5c983acadf81ceb31af82434607633c2cc4ada
SIZE (openssh-4.4p1-hpn12v11.diff.gz) = 15786
@


1.38
log
@- Update HPN patch. Patch are renamed, the only content differences are two rows now enclosed in an "else" block.

Submitted by:	ale
Approved by:	portmgr (erwin)
@
text
@d1 3
a3 3
MD5 (openssh-4.4p1.tar.gz) = 793a709a8de695c22f523024d7e9bf07
SHA256 (openssh-4.4p1.tar.gz) = 0252474af4009129cde6a2df2893fb1ac24316436758796f6adc043ac73b35ac
SIZE (openssh-4.4p1.tar.gz) = 1044334
@


1.37
log
@- Add OPTION to enable Kerberos/GSSAPI patch [1]
- Add OPTION to enable LPK patch (ldap stored public key) [2]

PR:		86384 [1], 103399 [2]
Submitted by:	Garrett Wollman <wollman___khavrinen.csail.mit.edu> [1], Dmitriy Kirhlarov <dkirhlarov___oilspace.com> [2]
@
text
@d7 3
a9 6
MD5 (openssh-4.4p1-hpn.diff.gz) = d5f07fcb10360b52bdcacf3c7de803b6
SHA256 (openssh-4.4p1-hpn.diff.gz) = 6febe17260ff66a8dbb7b466252889f855dcc5dec50c93eff25050839cf65977
SIZE (openssh-4.4p1-hpn.diff.gz) = 16258
MD5 (openssh-lpk-4.3p1-0.3.7.patch) = d9eacb819a73daddb3d21ca7aa8e5c25
SHA256 (openssh-lpk-4.3p1-0.3.7.patch) = 0bcfa28804caf685de2248ddc966666196f6df81d1d058066f2da17714518af4
SIZE (openssh-lpk-4.3p1-0.3.7.patch) = 60451
@


1.36
log
@- Fix package creation. [1]
- Update HPN patch and remove IGNORE. [2]
- Bump PORTREVISION

PR:		103961
Submitted by:	Phil Oleson <oz___nixil.net> [1], ale [2]
@
text
@d4 3
d10 3
@


1.35
log
@- Update to 4.4p1.
- Disable temporary HPN patch until HPN release new version.
- Fix rc.d script path in sshd.8
- Add FreeBSD-${PKGNAME} in SSH_VERSION and SSH_RELEASE like src does.
- Sync patches with src.

Security:	CVE-2006-4924, CVE-2006-5051
@
text
@d4 3
@


1.34
log
@Update HPN-12 patch to version 8 (no functional changes,
only documentation changes and a small bug fix on option parsing).

Approved by:	mnag
@
text
@d1 3
a3 6
MD5 (openssh-4.3p2.tar.gz) = 7e9880ac20a9b9db0d3fea30a9ff3d46
SHA256 (openssh-4.3p2.tar.gz) = 4ba757d6c933e7d075b6424124d92d197eb5d91e4a58794596b67f5f0ca21d4f
SIZE (openssh-4.3p2.tar.gz) = 941455
MD5 (openssh-4.3p2-hpn12.diff.gz) = f2fef0ecd2315d940dbb5b9188546400
SHA256 (openssh-4.3p2-hpn12.diff.gz) = 704ff6ac9737850ac04b77bbb613099c0d557be4a0b28925946a90a76d7d7ac0
SIZE (openssh-4.3p2-hpn12.diff.gz) = 14891
@


1.33
log
@- Remove unecessary ?= in PKGNAMESUFFIX [1]
- Update HPN patch to hpn12. Now none cipher are configured in run time. [2]

Notified by:	Peter Losher <plosher___plosh.net> [1], Scott Larson <stl___iowainteractive.com> [2]
@
text
@d4 3
a6 3
MD5 (openssh-4.3p2-hpn12.diff.gz) = 5ade4be51e0d49c18f4107013c60ac14
SHA256 (openssh-4.3p2-hpn12.diff.gz) = d98d8a016d6b7a83c9c821339e6d01b8d67a7607ec7ace11a72b347689411a74
SIZE (openssh-4.3p2-hpn12.diff.gz) = 14806
@


1.32
log
@Forget to add HPN patches.
@
text
@d4 3
a6 6
MD5 (openssh-4.3p1-hpn11.diff) = 7dd2a6716b81da33af4ca960185fdd1b
SHA256 (openssh-4.3p1-hpn11.diff) = 0a0b0e07bd845fdbf2112769c426a3b47b795076c8459f6dbc3e7c9060abb740
SIZE (openssh-4.3p1-hpn11.diff) = 11024
MD5 (openssh-4.3p1-hpn11-none.diff) = bf4f192a36bbee39ea23423ab06b0fb6
SHA256 (openssh-4.3p1-hpn11-none.diff) = ed9abd22a463e4aedaaac4fc04747741bbf8cddf32fa07e9d91433221cdf9dc3
SIZE (openssh-4.3p1-hpn11-none.diff) = 16617
@


1.31
log
@- Update to 4.3p2
@
text
@d4 6
@


1.30
log
@- Update to 4.3p1
- Use DISTVERSION
- Add most configuration in OPTIONS
- Enable support to libedit in sftp [1]
- Add OPTIONS to HPN patches [2]
- Add new rc.d script [3]
- New rc.d script are responsible to check configuration and create host keys
- Using USE_RC_SUBR
- Modify pkg-message to reflect new rc.d script
- Fix pkg-plist

Reviewd by:	dougb [3]
Submitted by:	vs [1], brooks [2]
Tested by:	me, John E Hein
@
text
@d1 3
a3 9
MD5 (openssh-4.3p1.tar.gz) = eaeb880b1b6c63b9a4d7c5b1e74727c4
SHA256 (openssh-4.3p1.tar.gz) = 7a4e356742190901e458b7526f91dfa24c66babbcd24d55cf7eac282266f5254
SIZE (openssh-4.3p1.tar.gz) = 940777
MD5 (openssh-4.3p1-hpn11.diff) = 7dd2a6716b81da33af4ca960185fdd1b
SHA256 (openssh-4.3p1-hpn11.diff) = 0a0b0e07bd845fdbf2112769c426a3b47b795076c8459f6dbc3e7c9060abb740
SIZE (openssh-4.3p1-hpn11.diff) = 11024
MD5 (openssh-4.3p1-hpn11-none.diff) = bf4f192a36bbee39ea23423ab06b0fb6
SHA256 (openssh-4.3p1-hpn11-none.diff) = ed9abd22a463e4aedaaac4fc04747741bbf8cddf32fa07e9d91433221cdf9dc3
SIZE (openssh-4.3p1-hpn11-none.diff) = 16617
@


1.29
log
@Add SHA256
@
text
@d1 9
a9 3
MD5 (openssh-4.2p1.tar.gz) = df899194a340c933944b193477c628fa
SHA256 (openssh-4.2p1.tar.gz) = 2a61e84b36958c0af19e4f6f9f3e27f8ed432a5188d654e26602402fd4047f6d
SIZE (openssh-4.2p1.tar.gz) = 914165
@


1.28
log
@- Update to 4.2p1

PR:		ports/85578
Submitted by:	Marcus Grando <marcus@@corp.grupos.com.br>
@
text
@d2 1
@


1.27
log
@- Update to 4.1p1

PR:		ports/81948
Submitted by:	Daniel Gerzo <danger@@rulez.sk>
@
text
@d1 2
a2 2
MD5 (openssh-4.1p1.tar.gz) = 959c663e709c981f07a3315bfd64f3d0
SIZE (openssh-4.1p1.tar.gz) = 894234
@


1.26
log
@- Update to 4.0p1

PR:		ports/79029
Submitted by:	Dimitry Andric <dimitry@@andric.com>
@
text
@d1 2
a2 2
MD5 (openssh-4.0p1.tar.gz) = 7b36f28fc16e1b7f4ba3c1dca191ac92
SIZE (openssh-4.0p1.tar.gz) = 889880
@


1.25
log
@- update to 3.9p1

set PORTVERSION 3.9.0.1 to avoid another
bump of PORTEPOCH if 3.9.1p1 come out.

- new option OPENSSH_SNAPSHOT
@
text
@d1 2
a2 2
MD5 (openssh-3.9p1.tar.gz) = 8e1774d0b52aff08f817f3987442a16e
SIZE (openssh-3.9p1.tar.gz) = 854027
@


1.24
log
@- update to 3.8.1p1
@
text
@d1 2
a2 2
MD5 (openssh-3.8.1p1.tar.gz) = 1dbfd40ae683f822ae917eebf171ca42
SIZE (openssh-3.8.1p1.tar.gz) = 817932
@


1.23
log
@- update to 3.8p1
@
text
@d1 2
a2 2
MD5 (openssh-3.8p1.tar.gz) = 7861a4c0841ab69a6eec5c747daff6fb
SIZE (openssh-3.8p1.tar.gz) = 826588
@


1.22
log
@- cleanup GSSAPI option
@
text
@d1 2
a2 1
MD5 (openssh-3.7.1p2.tar.gz) = 61cf5b059938718308836d00f6764a94
@


1.21
log
@- update to 3.7.1p2
more regressions tests successfull
@
text
@a1 1
MD5 (openssh-3.6.1p2-gssapi-20030430.diff) = 520e15f541398efed2763aaf8ac08e6a
@


1.20
log
@- Update to gssapi-20030430
Submitted by:	wollman@@lcs.mit.edu
@
text
@d1 1
a1 1
MD5 (openssh-3.6.1p2.tar.gz) = f3879270bffe479e1bd057aa36258696
@


1.19
log
@- Update to 3.6.1p2
@
text
@d2 1
@


1.18
log
@- Update to 3.6.1p1
@
text
@d1 1
a1 1
MD5 (openssh-3.6.1p1.tar.gz) = d4c2c88b883f097fe88e327cbb4b2e2a
@


1.17
log
@- Update to 3.6p1
@
text
@d1 1
a1 2
MD5 (openssh-3.6p1.tar.gz) = 72ef1134d521cb6926c99256dad17fe0
MD5 (openssh-3.4p1-gssapi-20020627.diff) = bd58f041a44538ab532efe261c904973
@


1.16
log
@Update to 3.5p1
@
text
@d1 1
a1 1
MD5 (openssh-3.5p1.tar.gz) = 42bd78508d208b55843c84dd54dea848
@


1.15
log
@Update gssapi patch
@
text
@d1 1
a1 1
MD5 (openssh-3.4p1.tar.gz) = 459c1d0262e939d6432f193c7a4ba8a8
@


1.14
log
@Update to openssh-3.4
Update to openssh-3.4p1
@
text
@d2 1
@


1.13
log
@Update: openssh-3.2.3p1
New manpages: ssh-keysign.8 sftp-server.8 sshd.8
New program ssh-keysign
@
text
@d1 1
a1 2
MD5 (openssh-3.3p1.tar.gz) = 226fdde5498c56288e777c7a697996e0
MD5 (openssh-3.2.3p1-gssapi-20020527.diff) = 27f170956f607b951ffda48da588b00a
@


1.12
log
@- get rid of duplicate code in Makefiles.
- Fix USE_OPENSSL_PORT and USE_OPENSSL_BASE
- drop obsolete/broken USE_OPENSSL
@
text
@d1 1
a1 1
MD5 (openssh-3.2.3p1.tar.gz) = f153ccdb5a91fa06ec78d0c6313f4d77
@


1.11
log
@Update to OpenSSH 3.2.3

- patch openssh-3.1-adv.token.patch is now obsolete.
- remerged PAM changes form previous port
- declare CMSG_* macros.
- fixed bad type in function input_userauth_passwd_changereq

Update to OpenSSH-portable-3.2.3p1

- patch openssh-3.1p1-adv.token.patch is now obsolete
- keep previously declared CONFIGURE_ARGS
- remove openssh-mit-krb5-20020326.diff (should be in the distribution now)
- patch patch-readpassphrase.c is now in teh distribution
- merged previous patches.
- extend CONFIGURE_ARGS so it find OPENSSL again.
- new patches for GSSAPI, not fully tested.

If you have the patch applied:
http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/36080

Builds with openssl-0.9.6d under:
2.2.8-RELEASE
3.2-RELEASE
4.2-RELEASE
4.6-RC
@
text
@d2 1
a2 2
MD5 (openssh-3.1p1-gssapi-20020325.diff) = a5002539db6b838190ad92bc627f6b5e
MD5 (openssh-mit-krb5-20020326.diff) = 2f83bf4f0185f20672c68856aee643c8
@


1.10
log
@Security fix for token passing, see bugtraq for details.
- fetch and use openssh-3.1-adv.token.patch to build.
- bump PORTREVISION
@
text
@d1 3
a3 4
MD5 (openssh-3.1p1.tar.gz) = c6a52d4126ed27eb57c31729ec6b2362
MD5 (openssh-3.1p1-gssapi-20020321.diff) = d571cea9810630650139013a1af4b1d9
MD5 (openssh-3.1p1-adv.token.patch) = 8c34327404f504f8d5bf1a2063f4e7b7
MD5 (openssh-mit-krb5-20020319.diff) = 151af40132624a615c96027491f09f25
@


1.9
log
@- Update patches for Option KRB5_HOME
	openssh-3.1p1-gssapi-20020321.diff
	openssh-mit-krb5-20020319.diff
@
text
@d3 1
@


1.8
log
@Update to OpenSSH 3.1 OpennSSH-portable 3.1p1

- update patch-au,patch-session.c for password changes.
- patch-channel.c is now integrated

Excerpt from Changelog:

20020304
 - OpenBSD CVS Sync
   - deraadt@@cvs.openbsd.org 2002/02/26 18:52:32
     [sftp.1]
     Ic cannot have that many arguments; spotted by mouring@@etoh.eviladmin.org
   - mouring@@cvs.openbsd.org 2002/02/26 19:04:37
     [sftp.1]
     > Ic cannot have that many arguments; spotted by mouring@@etoh.eviladmin.org
     Last Ic on the first line should not have a space between it and the final
     comma.
   - deraadt@@cvs.openbsd.org 2002/02/26 19:06:43
     [sftp.1]
     no, look closely.  the comma was highlighted. split .Ic even more
   - stevesk@@cvs.openbsd.org 2002/02/26 20:03:51
     [misc.c]
     use socklen_t
   - stevesk@@cvs.openbsd.org 2002/02/27 21:23:13
     [canohost.c channels.c packet.c sshd.c]
     remove unneeded casts in [gs]etsockopt(); ok markus@@
   - markus@@cvs.openbsd.org 2002/02/28 15:46:33
     [authfile.c kex.c kexdh.c kexgex.c key.c ssh-dss.c]
     add some const EVP_MD for openssl-0.9.7
   - stevesk@@cvs.openbsd.org 2002/02/28 19:36:28
     [auth.c match.c match.h]
     delay hostname lookup until we see a ``@@'' in DenyUsers and AllowUsers
     for sshd -u0; ok markus@@
   - stevesk@@cvs.openbsd.org 2002/02/28 20:36:42
     [sshd.8]
     DenyUsers allows user@@host pattern also
   - stevesk@@cvs.openbsd.org 2002/02/28 20:46:10
     [sshd.8]
     -u0 DNS for user@@host
   - stevesk@@cvs.openbsd.org 2002/02/28 20:56:00
     [auth.c]
     log user not allowed details, from dwd@@bell-labs.com; ok markus@@
   - markus@@cvs.openbsd.org 2002/03/01 13:12:10
     [auth.c match.c match.h]
     undo the 'delay hostname lookup' change
     match.c must not use compress.c (via canonhost.c/packet.c)
     thanks to wilfried@@
   - markus@@cvs.openbsd.org 2002/03/04 12:43:06
     [auth-passwd.c auth-rh-rsa.c auth-rhosts.c]
   - markus@@cvs.openbsd.org 2002/03/04 13:10:46
     [misc.c]
     error-> debug, because O_NONBLOCK for /dev/null causes too many different
     errnos; ok stevesk@@, deraadt@@
     unused include
   - stevesk@@cvs.openbsd.org 2002/03/04 17:27:39
     [auth-krb5.c auth-options.h auth.h authfd.h authfile.h bufaux.h buffer.h
      channels.h cipher.h compat.h compress.h crc32.h deattack.c getput.h
      groupaccess.c misc.c mpaux.h packet.h readconf.h rsa.h scard.h
      servconf.h ssh-agent.c ssh.h ssh2.h sshpty.h sshtty.c ttymodes.h
      uuencode.c xmalloc.h]
     $OpenBSD$ and RCSID() cleanup: don't use RCSID() in .h files; add
     missing RCSID() to .c files and remove dup /*$OpenBSD$*/ from .c
     files.  ok markus@@
   - stevesk@@cvs.openbsd.org 2002/03/04 18:30:23
     [ssh-keyscan.c]
     handle connection close during read of protocol version string.
     fixes erroneous "bad greeting".  ok markus@@
   - markus@@cvs.openbsd.org 2002/03/04 19:37:58
     [channels.c]
     off by one; thanks to joost@@pine.nl
20020226
 - (tim) Bug 12 [configure.ac] add sys/bitypes.h to int64_t tests
   based on patch by mooney@@dogbert.cc.ndsu.nodak.edu (Tim Mooney)
   Bug 45 [configure.ac] modify skey test to work around conflict with autoconf
   reported by nolan@@naic.edu (Michael Nolan)
   patch by  Pekka Savola <pekkas@@netcore.fi>
   Bug 74 [configure.ac defines.h] add sig_atomic_t test
   reported by dwd@@bell-labs.com (Dave Dykstra)
   Bug 102 [defines.h] UNICOS fixes. patch by wendyp@@cray.com
   [configure.ac Makefile.in] link libwrap only with sshd
   based on patch by Maciej W. Rozycki <macro@@ds2.pg.gda.pl>
   Bug 123 link libpam only with sshd
   reported by peak@@argo.troja.mff.cuni.cz (Pavel Kankovsky)
   [configure.ac defines.h] modify previous SCO3 fix to not break Solaris 7
   [acconfig.h] remove unused HAVE_REGCOMP
   [configure.ac] put back in search for prngd-socket
 - (stevesk) openbsd-compat/base64.h: typo in comment
 - (bal) OpenBSD CVS Sync
   - markus@@cvs.openbsd.org 2002/02/15 23:54:10
     [auth-krb5.c]
     krb5_get_err_text() does not like context==NULL; he@@nordu.net via google;
     ok provos@@
   - markus@@cvs.openbsd.org 2002/02/22 12:20:34
     [log.c log.h ssh-keyscan.c]
     overwrite fatal() in ssh-keyscan.c; fixes pr 2354; ok provos@@
   - markus@@cvs.openbsd.org 2002/02/23 17:59:02
     [kex.c kexdh.c kexgex.c]
     don't allow garbage after payload.
   - stevesk@@cvs.openbsd.org 2002/02/24 16:09:52
     [sshd.c]
     use u_char* here; ok markus@@
   - markus@@cvs.openbsd.org 2002/02/24 16:57:19
     [sftp-client.c]
     early close(), missing free; ok stevesk@@
   - markus@@cvs.openbsd.org 2002/02/24 16:58:32
     [packet.c]
     make 'cp' unsigned and merge with 'ucp'; ok stevesk@@
   - markus@@cvs.openbsd.org 2002/02/24 18:31:09
     [uuencode.c]
     typo in comment
   - markus@@cvs.openbsd.org 2002/02/24 19:14:59
     [auth2.c authfd.c authfd.h authfile.c kexdh.c kexgex.c key.c key.h
      ssh-dss.c ssh-dss.h ssh-keygen.c ssh-rsa.c ssh-rsa.h sshconnect2.c]
     signed vs. unsigned: make size arguments u_int, ok stevesk@@
   - stevesk@@cvs.openbsd.org 2002/02/24 19:59:42
     [channels.c misc.c]
     disable Nagle in connect_to() and channel_post_port_listener() (port
     forwarding endpoints).  the intention is to preserve the on-the-wire
     appearance to applications at either end; the applications can then
     enable TCP_NODELAY according to their requirements. ok markus@@
   - markus@@cvs.openbsd.org 2002/02/25 16:33:27
     [ssh-keygen.c sshconnect2.c uuencode.c uuencode.h]
     more u_* fixes
 - (bal) Imported missing fatal.c and fixed up Makefile.in
 - (tim) [configure.ac] correction to Bug 123 fix
     [configure.ac] correction to sig_atomic_t test

20020224
 - (tim) [loginrec.c session.c sshlogin.c sshlogin.h] Bug 84
   patch by wknox@@mitre.org (William Knox).
   [sshlogin.h] declare record_utmp_only for session.c

20020219
 - (djm) OpenBSD CVS Sync
   - mpech@@cvs.openbsd.org 2002/02/13 08:33:47
     [ssh-keyscan.1]
     When you give command examples and etc., in a manual page prefix them with:     $ command
     or
     # command
   - markus@@cvs.openbsd.org 2002/02/14 23:27:59
     [channels.c]
     increase the SSH v2 window size to 4 packets. comsumes a little
     bit more memory for slow receivers but increases througput.
   - markus@@cvs.openbsd.org 2002/02/14 23:28:00
     [channels.h session.c ssh.c]
     increase the SSH v2 window size to 4 packets. comsumes a little
     bit more memory for slow receivers but increases througput.
   - markus@@cvs.openbsd.org 2002/02/14 23:41:01
     [authfile.c cipher.c cipher.h kex.c kex.h packet.c]
     hide some more implementation details of cipher.[ch] and prepares for move
     to EVP, ok deraadt@@
   - stevesk@@cvs.openbsd.org 2002/02/16 14:53:37
     [ssh-keygen.1]
     -t required now for key generation
   - stevesk@@cvs.openbsd.org 2002/02/16 20:40:08
     [ssh-keygen.c]
     default to rsa keyfile path for non key generation operations where
     keyfile not specified.  fixes core dump in those cases.  ok markus@@
   - millert@@cvs.openbsd.org 2002/02/16 21:27:53
     [auth.h]
     Part one of userland __P removal.  Done with a simple regexp with
     some minor hand editing to make comments line up correctly.  Another
     pass is forthcoming that handles the cases that could not be done
     automatically.
   - millert@@cvs.openbsd.org 2002/02/17 19:42:32
     [auth.h]
     Manual cleanup of remaining userland __P use (excluding packages
     maintained outside the tree)
   - markus@@cvs.openbsd.org 2002/02/18 13:05:32
     [cipher.c cipher.h]
     switch to EVP, ok djm@@ deraadt@@
   - markus@@cvs.openbsd.org 2002/02/18 17:55:20
     [ssh.1]
     -q: Fatal errors are _not_ displayed.
   - deraadt@@cvs.openbsd.org 2002/02/19 02:50:59
     [sshd_config]
     stategy is not an english word
 - (bal) OpenBSD CVS Sync
   - markus@@cvs.openbsd.org 2002/02/15 23:11:26
     [session.c]
     split do_child(), ok mouring@@
   - markus@@cvs.openbsd.org 2002/02/16 00:51:44
     [session.c]
     typo

20020218
 - (tim) newer config.guess from ftp://ftp.gnu.org/gnu/config/config.guess

20020213
 - (djm) Bug #114 - not starting PAM for SSH protocol 1 invalid users

20020213
 - (djm) OpenBSD CVS Sync
   - markus@@cvs.openbsd.org 2002/02/11 16:10:15
     [kex.c]
     restore kexinit handler if we reset the dispatcher, this unbreaks
     rekeying s/kex_clear_dispatch/kex_reset_dispatch/
   - markus@@cvs.openbsd.org 2002/02/11 16:15:46
     [sshconnect1.c]
     include md5.h, not evp.h
   - markus@@cvs.openbsd.org 2002/02/11 16:17:55
     [sshd.c]
     do not complain about port > 1024 if rhosts-auth is disabled
   - markus@@cvs.openbsd.org 2002/02/11 16:19:39
     [sshd.c]
     include md5.h not hmac.h
   - markus@@cvs.openbsd.org 2002/02/11 16:21:42
     [match.c]
     support up to 40 algorithms per proposal
   - djm@@cvs.openbsd.org 2002/02/12 12:32:27
     [sftp.1 sftp.c sftp-client.c sftp-client.h sftp-int.c]
     Perform multiple overlapping read/write requests in file transfer. Mostly
     done by Tobias Ringstrom <tori@@ringstrom.mine.nu>; ok markus@@
   - djm@@cvs.openbsd.org 2002/02/12 12:44:46
     [sftp-client.c]
     Let overlapped upload path handle servers which reorder ACKs. This may be
     permitted by the protocol spec; ok markus@@
   - markus@@cvs.openbsd.org 2002/02/13 00:28:13
     [sftp-server.c]
     handle SSH2_FILEXFER_ATTR_SIZE in SSH2_FXP_(F)SETSTAT; ok djm@@
   - markus@@cvs.openbsd.org 2002/02/13 00:39:15
     [readpass.c]
     readpass.c is not longer from UCB, since we now use readpassphrase(3)
   - djm@@cvs.openbsd.org 2002/02/13 00:59:23
     [sftp-client.c sftp-client.h sftp-glob.c sftp-glob.h sftp.h]
     [sftp-int.c sftp-int.h]
     API cleanup and backwards compat for filexfer v.0 servers; ok markus@@
 - (djm) Sync openbsd-compat with OpenBSD CVS too
 - (djm) Bug #106: Add --without-rpath configure option. Patch from
   Nicolas.Williams@@ubsw.com

20020210
 - (djm) OpenBSD CVS Sync
   - deraadt@@cvs.openbsd.org 2002/02/09 17:37:34
     [pathnames.h session.c ssh.1 sshd.8 sshd_config ssh-keyscan.1]
     move ssh config files to /etc/ssh
 - (djm) Adjust portable Makefile.in tnd ssh-rand-helper.c o match
   - deraadt@@cvs.openbsd.org 2002/02/10 01:07:05
     [readconf.h sshd.8]
     more /etc/ssh; openbsd@@davidkrause.com

20020208
 - (djm) OpenBSD CVS Sync
   - markus@@cvs.openbsd.org 2002/02/04 12:15:25
     [sshd.c]
     add SYSLOG_FACILITY_NOT_SET = -1, SYSLOG_LEVEL_NOT_SET = -1,
     fixes arm/netbsd; based on patch from bjh21@@netbsd.org; ok djm@@
   - stevesk@@cvs.openbsd.org 2002/02/04 20:41:16
     [ssh-agent.1]
     more sync for default ssh-add identities; ok markus@@
   - djm@@cvs.openbsd.org 2002/02/05 00:00:46
     [sftp.1 sftp.c sftp-client.c sftp-client.h sftp-int.c]
     Add "-B" option to specify copy buffer length (default 32k); ok markus@@
   - markus@@cvs.openbsd.org 2002/02/05 14:32:55
     [channels.c channels.h ssh.c]
     merge channel_request() into channel_request_start()
   - markus@@cvs.openbsd.org 2002/02/06 14:22:42
     [sftp.1]
     sort options; ok mpech@@, stevesk@@
   - mpech@@cvs.openbsd.org 2002/02/06 14:27:23
     [sftp.c]
     sync usage() with manual.
   - markus@@cvs.openbsd.org 2002/02/06 14:37:22
     [session.c]
     minor KNF
   - markus@@cvs.openbsd.org 2002/02/06 14:55:16
     [channels.c clientloop.c serverloop.c ssh.c]
     channel_new never returns NULL, mouring@@; ok djm@@
   - markus@@cvs.openbsd.org 2002/02/07 09:35:39
     [ssh.c]
     remove bogus comments

20020205
 - (djm) Cleanup after sync:
   - :%s/reverse_mapping_check/verify_reverse_mapping/g
 - (djm) OpenBSD CVS Sync
   - stevesk@@cvs.openbsd.org 2002/01/24 21:09:25
     [channels.c misc.c misc.h packet.c]
     add set_nodelay() to set TCP_NODELAY on a socket (prep for nagle tuning).
     no nagle changes just yet; ok djm@@ markus@@
   - stevesk@@cvs.openbsd.org 2002/01/24 21:13:23
     [packet.c]
     need misc.h for set_nodelay()
   - markus@@cvs.openbsd.org 2002/01/25 21:00:24
     [sshconnect2.c]
     unused include
   - markus@@cvs.openbsd.org 2002/01/25 21:42:11
     [ssh-dss.c ssh-rsa.c]
     use static EVP_MAX_MD_SIZE buffers for EVP_DigestFinal; ok stevesk@@
     don't use evp_md->md_size, it's not public.
   - markus@@cvs.openbsd.org 2002/01/25 22:07:40
     [kex.c kexdh.c kexgex.c key.c mac.c]
     use EVP_MD_size(evp_md) and not evp_md->md_size; ok steveks@@
   - stevesk@@cvs.openbsd.org 2002/01/26 16:44:22
     [includes.h session.c]
     revert code to add x11 localhost display authorization entry for
     hostname/unix:d and uts.nodename/unix:d if nodename was different than
     hostname.  just add entry for unix:d instead.  ok markus@@
   - stevesk@@cvs.openbsd.org 2002/01/27 14:57:46
     [channels.c servconf.c servconf.h session.c sshd.8 sshd_config]
     add X11UseLocalhost; ok markus@@
   - stevesk@@cvs.openbsd.org 2002/01/27 18:08:17
     [ssh.c]
     handle simple case to identify FamilyLocal display; ok markus@@
   - markus@@cvs.openbsd.org 2002/01/29 14:27:57
     [ssh-add.c]
     exit 2 if no agent, exit 1 if list fails; debian#61078; ok djm@@
   - markus@@cvs.openbsd.org 2002/01/29 14:32:03
     [auth2.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c canohost.c]
     [servconf.c servconf.h session.c sshd.8 sshd_config]
     s/ReverseMappingCheck/VerifyReverseMapping/ and avoid confusion;
     ok stevesk@@
   - stevesk@@cvs.openbsd.org 2002/01/29 16:29:02
     [session.c]
     limit subsystem length in log; ok markus@@
   - markus@@cvs.openbsd.org 2002/01/29 16:41:19
     [ssh-add.1]
     add DIAGNOSTICS; ok stevesk@@
   - markus@@cvs.openbsd.org 2002/01/29 22:46:41
     [session.c]
     don't depend on servconf.c; ok djm@@
   - markus@@cvs.openbsd.org 2002/01/29 23:50:37
     [scp.1 ssh.1]
     mention exit status; ok stevesk@@
   - markus@@cvs.openbsd.org 2002/01/31 13:35:11
     [kexdh.c kexgex.c]
     cross check announced key type and type from key blob
   - markus@@cvs.openbsd.org 2002/01/31 15:00:05
     [serverloop.c]
     no need for WNOHANG; ok stevesk@@
   - markus@@cvs.openbsd.org 2002/02/03 17:53:25
     [auth1.c serverloop.c session.c session.h]
     don't use channel_input_channel_request and callback
     use new server_input_channel_req() instead:
     	server_input_channel_req does generic request parsing on server side
     	session_input_channel_req handles just session specific things now
     ok djm@@
   - markus@@cvs.openbsd.org 2002/02/03 17:55:55
     [channels.c channels.h]
     remove unused channel_input_channel_request
   - markus@@cvs.openbsd.org 2002/02/03 17:58:21
     [channels.c channels.h ssh.c]
     generic callbacks are not really used, remove and
     add a callback for msg of type SSH2_MSG_CHANNEL_OPEN_CONFIRMATION
     ok djm@@
   - markus@@cvs.openbsd.org 2002/02/03 17:59:23
     [sshconnect2.c]
     more cross checking if announced vs. used key type; ok stevesk@@
   - stevesk@@cvs.openbsd.org 2002/02/03 22:35:57
     [ssh.1 sshd.8]
     some KeepAlive cleanup/clarify; ok markus@@
   - stevesk@@cvs.openbsd.org 2002/02/03 23:22:59
     [ssh-agent.1]
     ssh-add also adds $HOME/.ssh/id_rsa and $HOME/.ssh/id_dsa now.
   - stevesk@@cvs.openbsd.org 2002/02/04 00:53:39
     [ssh-agent.c]
     unneeded includes
   - markus@@cvs.openbsd.org 2002/02/04 11:58:10
     [auth2.c]
     cross checking of announced vs actual pktype in pubkey/hostbaed auth;
     ok stevesk@@
   - markus@@cvs.openbsd.org 2002/02/04 12:15:25
     [log.c log.h readconf.c servconf.c]
     add SYSLOG_FACILITY_NOT_SET = -1, SYSLOG_LEVEL_NOT_SET = -1,
     fixes arm/netbsd; based on patch from bjh21@@netbsd.org; ok djm@@
   - stevesk@@cvs.openbsd.org 2002/02/04 20:41:16
     [ssh-add.1]
     more sync for default ssh-add identities; ok markus@@
   - djm@@cvs.openbsd.org 2002/02/04 21:53:12
     [sftp.1 sftp.c]
     Add "-P" option to directly connect to a local sftp-server. Should be
     useful for regression testing; ok markus@@
   - djm@@cvs.openbsd.org 2002/02/05 00:00:46
     [sftp.1 sftp.c sftp-client.c sftp-client.h sftp-int.c]
     Add "-B" option to specify copy buffer length (default 32k); ok markus@@

20020130
 - (djm) Delay PRNG seeding until we need it in ssh-keygen, from markus@@
 - (tim) [configure.ac] fix logic on when ssh-rand-helper is installed.
   [sshd_config] put back in line that tells what PATH was compiled into sshd.

20020125
 - (djm) Don't grab Xserver or pointer by default. x11-ssh-askpass doesn't
   and grabbing can cause deadlocks with kinput2.

20020124
 - (stevesk) Makefile.in: bug #61; delete commented line for now.

20020123
 - (djm) Fix non-standard shell syntax in autoconf. Patch from
   Dave Dykstra <dwd@@bell-labs.com>
 - (stevesk) fix --with-zlib=
 - (djm) Use case statements in autoconf to clean up some tests

20020122
 - (djm) autoconf hacking:
   - We don't support --without-zlib currently, so don't allow it.
   - Rework cryptographic random number support detection. We now detect
     whether OpenSSL seeds itself. If it does, then we don't bother with
     the ssh-rand-helper program. You can force the use of ssh-rand-helper
     using the --with-rand-helper configure argument
   - Simplify and clean up ssh-rand-helper configuration
   - Add OpenSSL sanity check: verify that header version matches version
     reported by library
 - (djm) Fix some bugs I introduced into ssh-rand-helper yesterday
 - OpenBSD CVS Sync
   - djm@@cvs.openbsd.org 2001/12/21 08:52:22
     [ssh-keygen.1 ssh-keygen.c]
     Remove default (rsa1) key type; ok markus@@
   - djm@@cvs.openbsd.org 2001/12/21 08:53:45
     [readpass.c]
     Avoid interruptable passphrase read; ok markus@@
   - djm@@cvs.openbsd.org 2001/12/21 10:06:43
     [ssh-add.1 ssh-add.c]
     Try all standard key files (id_rsa, id_dsa, identity) when invoked with
     no arguments; ok markus@@
   - markus@@cvs.openbsd.org 2001/12/21 12:17:33
     [serverloop.c]
     remove ifdef for USE_PIPES since fdin != fdout; ok djm@@
   - deraadt@@cvs.openbsd.org 2001/12/24 07:29:43
     [ssh-add.c]
     try all listed keys.. how did this get broken?
   - markus@@cvs.openbsd.org 2001/12/25 18:49:56
     [key.c]
     be more careful on allocation
   - markus@@cvs.openbsd.org 2001/12/25 18:53:00
     [auth1.c]
     be more carefull on allocation
   - markus@@cvs.openbsd.org 2001/12/27 18:10:29
     [ssh-keygen.c]
     -t is only needed for key generation (unbreaks -i, -e, etc).
   - markus@@cvs.openbsd.org 2001/12/27 18:22:16
     [auth1.c authfile.c auth-rsa.c dh.c kexdh.c kexgex.c key.c rsa.c]
     [scard.c ssh-agent.c sshconnect1.c sshd.c ssh-dss.c]
     call fatal() for openssl allocation failures
   - stevesk@@cvs.openbsd.org 2001/12/27 18:22:53
     [sshd.8]
     clarify -p; ok markus@@
   - markus@@cvs.openbsd.org 2001/12/27 18:26:13
     [authfile.c]
     missing include
   - markus@@cvs.openbsd.org 2001/12/27 19:37:23
     [dh.c kexdh.c kexgex.c]
     always use BN_clear_free instead of BN_free
   - markus@@cvs.openbsd.org 2001/12/27 19:54:53
     [auth1.c auth.h auth-rh-rsa.c]
     auth_rhosts_rsa now accept generic keys.
   - markus@@cvs.openbsd.org 2001/12/27 20:39:58
     [auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h]
     [serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c]
     get rid of packet_integrity_check, use packet_done() instead.
   - markus@@cvs.openbsd.org 2001/12/28 12:14:27
     [auth1.c auth2.c auth2-chall.c auth-rsa.c channels.c clientloop.c]
     [kex.c kexdh.c kexgex.c packet.c packet.h serverloop.c session.c]
     [ssh.c sshconnect1.c sshconnect2.c sshd.c]
     s/packet_done/packet_check_eom/ (end-of-message); ok djm@@
   - markus@@cvs.openbsd.org 2001/12/28 13:57:33
     [auth1.c kexdh.c kexgex.c packet.c packet.h sshconnect1.c sshd.c]
     packet_get_bignum* no longer returns a size
   - markus@@cvs.openbsd.org 2001/12/28 14:13:13
     [bufaux.c bufaux.h packet.c]
     buffer_get_bignum: int -> void
   - markus@@cvs.openbsd.org 2001/12/28 14:50:54
     [auth1.c auth-rsa.c channels.c dispatch.c kex.c kexdh.c kexgex.c]
     [packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c]
     [sshconnect2.c sshd.c]
     packet_read* no longer return the packet length, since it's not used.
   - markus@@cvs.openbsd.org 2001/12/28 15:06:00
     [auth2.c auth2-chall.c channels.c channels.h clientloop.c dispatch.c]
     [dispatch.h kex.c kex.h serverloop.c ssh.c sshconnect2.c]
     remove plen from the dispatch fn. it's no longer used.
   - stevesk@@cvs.openbsd.org 2001/12/28 22:37:48
     [ssh.1 sshd.8]
     document LogLevel DEBUG[123]; ok markus@@
   - stevesk@@cvs.openbsd.org 2001/12/29 21:56:01
     [authfile.c channels.c compress.c packet.c sftp-server.c]
     [ssh-agent.c ssh-keygen.c]
     remove unneeded casts and some char->u_char cleanup; ok markus@@
   - stevesk@@cvs.openbsd.org 2002/01/03 04:11:08
     [ssh_config]
     grammar in comment
   - stevesk@@cvs.openbsd.org 2002/01/04 17:59:17
     [readconf.c servconf.c]
     remove #ifdef _PATH_XAUTH/#endif; ok markus@@
   - stevesk@@cvs.openbsd.org 2002/01/04 18:14:16
     [servconf.c sshd.8]
     protocol 2 HostKey code default is now /etc/ssh_host_rsa_key and
     /etc/ssh_host_dsa_key like we have in sshd_config.  ok markus@@
   - markus@@cvs.openbsd.org 2002/01/05 10:43:40
     [channels.c]
     fix hanging x11 channels for rejected cookies (e.g.
     XAUTHORITY=/dev/null xbiff) bug #36, based on patch from
     djast@@cs.toronto.edu
   - stevesk@@cvs.openbsd.org 2002/01/05 21:51:56
     [ssh.1 sshd.8]
     some missing and misplaced periods
   - markus@@cvs.openbsd.org 2002/01/09 13:49:27
     [ssh-keygen.c]
     append \n only for public keys
   - markus@@cvs.openbsd.org 2002/01/09 17:16:00
     [channels.c]
     merge channel_pre_open_15/channel_pre_open_20; ok provos@@
   - markus@@cvs.openbsd.org 2002/01/09 17:26:35
     [channels.c nchan.c]
     replace buffer_consume(b, buffer_len(b)) with buffer_clear(b);
     ok provos@@
   - markus@@cvs.openbsd.org 2002/01/10 11:13:29
     [serverloop.c]
     skip client_alive_check until there are channels; ok beck@@
   - markus@@cvs.openbsd.org 2002/01/10 11:24:04
     [clientloop.c]
     handle SSH2_MSG_GLOBAL_REQUEST (just reply with failure); ok djm@@
   - markus@@cvs.openbsd.org 2002/01/10 12:38:26
     [nchan.c]
     remove dead code (skip drain)
   - markus@@cvs.openbsd.org 2002/01/10 12:47:59
     [nchan.c]
     more unused code (with channels.c:1.156)
   - markus@@cvs.openbsd.org 2002/01/11 10:31:05
     [packet.c]
     handle received SSH2_MSG_UNIMPLEMENTED messages; ok djm@@
   - markus@@cvs.openbsd.org 2002/01/11 13:36:43
     [ssh2.h]
     add defines for msg type ranges
   - markus@@cvs.openbsd.org 2002/01/11 13:39:36
     [auth2.c dispatch.c dispatch.h kex.c]
     a single dispatch_protocol_error() that sends a message of
     type 'UNIMPLEMENTED'
     dispatch_range(): set handler for a ranges message types
     use dispatch_protocol_ignore() for authentication requests after
     successful authentication (the drafts requirement).
     serverloop/clientloop now send a 'UNIMPLEMENTED' message instead
     of exiting.
   - markus@@cvs.openbsd.org 2002/01/11 20:14:11
     [auth2-chall.c auth-skey.c]
     use strlcpy not strlcat; mouring@@
   - markus@@cvs.openbsd.org 2002/01/11 23:02:18
     [readpass.c]
     use _PATH_TTY
   - markus@@cvs.openbsd.org 2002/01/11 23:02:51
     [auth2-chall.c]
     use snprintf; mouring@@
   - markus@@cvs.openbsd.org 2002/01/11 23:26:30
     [auth-skey.c]
     use snprintf; mouring@@
   - markus@@cvs.openbsd.org 2002/01/12 13:10:29
     [auth-skey.c]
     undo local change
   - provos@@cvs.openbsd.org 2002/01/13 17:27:07
     [ssh-agent.c]
     change to use queue.h macros; okay markus@@
   - markus@@cvs.openbsd.org 2002/01/13 17:57:37
     [auth2.c auth2-chall.c compat.c sshconnect2.c sshd.c]
     use buffer API and avoid static strings of fixed size;
     ok provos@@/mouring@@
   - markus@@cvs.openbsd.org 2002/01/13 21:31:20
     [channels.h nchan.c]
     add chan_set_[io]state(), order states, state is now an u_int,
     simplifies debugging messages; ok provos@@
   - markus@@cvs.openbsd.org 2002/01/14 13:22:35
     [nchan.c]
     chan_send_oclose1() no longer calls chan_shutdown_write(); ok provos@@
   - markus@@cvs.openbsd.org 2002/01/14 13:34:07
     [nchan.c]
     merge chan_[io]buf_empty[12]; ok provos@@
   - markus@@cvs.openbsd.org 2002/01/14 13:40:10
     [nchan.c]
     correct fn names for ssh2, do not switch from closed to closed;
     ok provos@@
   - markus@@cvs.openbsd.org 2002/01/14 13:41:13
     [nchan.c]
     remove duplicated code; ok provos@@
   - markus@@cvs.openbsd.org 2002/01/14 13:55:55
     [channels.c channels.h nchan.c]
     remove function pointers for events, remove chan_init*; ok provos@@
   - markus@@cvs.openbsd.org 2002/01/14 13:57:03
     [channels.h nchan.c]
     (c) 2002
   - markus@@cvs.openbsd.org 2002/01/16 13:17:51
     [channels.c channels.h serverloop.c ssh.c]
     wrapper for channel_setup_fwd_listener
   - stevesk@@cvs.openbsd.org 2002/01/16 17:40:23
     [sshd_config]
     The stategy now used for options in the default sshd_config shipped
     with OpenSSH is to specify options with their default value where
     possible, but leave them commented.  Uncommented options change a
     default value.  Subsystem is currently the only default option
     changed.  ok markus@@
   - stevesk@@cvs.openbsd.org 2002/01/16 17:42:33
     [ssh.1]
     correct defaults for -i/IdentityFile; ok markus@@
   - stevesk@@cvs.openbsd.org 2002/01/16 17:55:33
     [ssh_config]
     correct some commented defaults.  add Ciphers default.  ok markus@@
   - stevesk@@cvs.openbsd.org 2002/01/17 04:27:37
     [log.c]
     casts to silence enum type warnings for bugzilla bug 37; ok markus@@
   - stevesk@@cvs.openbsd.org 2002/01/18 17:14:16
     [sshd.8]
     correct Ciphers default; paola.mannaro@@ubs.com
   - stevesk@@cvs.openbsd.org 2002/01/18 18:14:17
     [authfd.c bufaux.c buffer.c cipher.c packet.c ssh-agent.c ssh-keygen.c]
     unneeded cast cleanup; ok markus@@
   - stevesk@@cvs.openbsd.org 2002/01/18 20:46:34
     [sshd.8]
     clarify Allow(Groups|Users) and Deny(Groups|Users); suggestion from
     allard@@oceanpark.com; ok markus@@
   - markus@@cvs.openbsd.org 2002/01/21 15:13:51
     [sshconnect.c]
     use read_passphrase+ECHO in confirm(), allows use of ssh-askpass
     for hostkey confirm.
   - markus@@cvs.openbsd.org 2002/01/21 22:30:12
     [cipher.c compat.c myproposal.h]
     remove "rijndael-*", just use "aes-" since this how rijndael is called
     in the drafts; ok stevesk@@
   - markus@@cvs.openbsd.org 2002/01/21 23:27:10
     [channels.c nchan.c]
     cleanup channels faster if the are empty and we are in drain-state;
     ok deraadt@@
   - stevesk@@cvs.openbsd.org 2002/01/22 02:52:41
     [servconf.c]
     typo in error message; from djast@@cs.toronto.edu
 - (djm) Make auth2-pam.c compile again after dispatch.h and packet.h
   changes
 - (djm) Recent Glibc includes an incompatible sys/queue.h. Treat it as
   bogus in configure
 - (djm) Use local sys/queue.h if necessary in ssh-agent.c

20020121
 - (djm) Rework ssh-rand-helper:
   - Reduce quantity of ifdef code, in preparation for ssh_rand_conf
   - Always seed from system calls, even when doing PRNGd seeding
   - Tidy and comment #define knobs
   - Remove unused facility for multiple runs through command list
   - KNF, cleanup, update copyright

20020114
 - (djm) Bug #50 - make autoconf entropy path checks more robust

20020108
 - (djm) Merge Cygwin copy_environment with do_pam_environment, removing
   fixed env var size limit in the process. Report from Corinna Vinschen
   <vinschen@@redhat.com>
 - (stevesk) defines.h: use "/var/spool/sockets/X11/%u" for HP-UX.  does
   not depend on transition links.  from Lutz Jaenicke.

20020106
 - (stevesk) defines.h: determine _PATH_UNIX_X; currently "/tmp/.X11-unix/X%u"
   for all platforms except HP-UX, which is "/usr/spool/sockets/X11/%u".

20020103
 - (djm) Use bigcrypt() on systems with SCO_PROTECTED_PW. Patch from
   Roger Cornelius <rac@@tenzing.org>
@
text
@d2 2
@


1.7
log
@Add option to support patches:

        OpenSSH supports Kerberos v5 authentication, but this is not
        enabled in the portable version.  A patch is available to
        correct this deficiency for those wishing to use this port
        with Kerberos.  In addition, a patch is also available from
        Simon Wilkinson to implement the GSS-API key-exchange
        mechanism for SSHv2, which is currently being standardized.
        Use of this mechanism with Kerberos v5 obviates the need for
        manual management of host keys, a considerable improvement for
        large Kerberos sites.

PR:		34363
Submitted by:	wollman@@hergotha.lcs.mit.edu
@
text
@d1 1
a1 3
MD5 (openssh-3.0.2p1.tar.gz) = 2fa62bf878862cb47a7515c35afe35b6
MD5 (openssh-3.0.2p1-gssapi.patch) = 66ce171ac4b09603c7069cea198d2090
MD5 (openssh-3.0.2p1-krb5.patch) = c6fe5622607b3137fa22741897cbd5db
@


1.6
log
@- Udate to OpenSSH-3.0.2
- make batch-processing cleaner

20011202
 - (djm) Syn with OpenBSD OpenSSH-3.0.2
   - markus@@cvs.openbsd.org
     [session.c sshd.8 version.h]
     Don't allow authorized_keys specified environment variables when
     UseLogin in active
@
text
@d2 2
@


1.5
log
@Update to openssh-3.0.1 and openssh-portable-3.0.1p1

- now in protocol2:
Background ssh at logout when waiting for forwarded connection / X11 sessions
to terminate

disabled -DSKEY

from Changelog (not complete):

20011115
 - (djm) Fix IPv4 default in ssh-keyscan. Spotted by Dan Astoorian
   <djast@@cs.toronto.edu> Fix from markus@@
 - (djm) Release 3.0.1p1

20011113
 - (djm) Fix early (and double) free of remote user when using Kerberos.
   Patch from Simon Wilkinson <simon@@sxw.org.uk>
 - (djm) AIX login{success,failed} changes. Move loginsuccess call to
   do_authenticated. Call loginfailed for protocol 2 failures > MAX like
   we do for protocol 1. Reports from Ralf Wenk <wera0003@@fh-karlsruhe.de>,
   K.Wolkersdorfer@@fz-juelich.de and others
 - (djm) OpenBSD CVS Sync
   - dugsong@@cvs.openbsd.org 2001/11/11 18:47:10
     [auth-krb5.c]
     fix krb5 authorization check. found by <jhawk@@MIT.EDU>. from
     art@@, deraadt@@ ok
   - markus@@cvs.openbsd.org  2001/11/12 11:17:07
     [servconf.c]
     enable authorized_keys2 again. tested by fries@@

20011112
 - OpenBSD CVS Sync
   - markus@@cvs.openbsd.org 2001/10/24 08:41:41
     [sshd.c]
     mention remote port in debug message
   - markus@@cvs.openbsd.org 2001/10/24 08:51:35
     [clientloop.c ssh.c]
     ignore SIGPIPE early, makes ssh work if agent dies, netbsd-pr via itojun@@
   - markus@@cvs.openbsd.org 2001/10/24 19:57:40
     [clientloop.c]
     make ~& (backgrounding) work again for proto v1; add support ~& for v2, too
   - markus@@cvs.openbsd.org 2001/10/25 21:14:32
     [ssh-keygen.1 ssh-keygen.c]
     better docu for fingerprinting, ok deraadt@@
   - markus@@cvs.openbsd.org 2001/10/29 19:27:15
     [sshconnect2.c]
     hostbased: check for client hostkey before building chost
   - markus@@cvs.openbsd.org 2001/11/07 16:03:17
     [packet.c packet.h sshconnect2.c]
     pad using the padding field from the ssh2 packet instead of sending
     extra ignore messages. tested against several other ssh servers.
   - markus@@cvs.openbsd.org 2001/11/07 21:40:21
     [ssh-rsa.c]
     ssh_rsa_sign/verify: SSH_BUG_SIGBLOB not supported
   - markus@@cvs.openbsd.org 2001/11/07 22:10:28
     [ssh-dss.c ssh-rsa.c]
     missing free and sync dss/rsa code.
   - markus@@cvs.openbsd.org 2001/11/07 22:53:21
     [channels.h]
     crank c->path to 256 so they can hold a full hostname; dwd@@bell-labs.com
   - markus@@cvs.openbsd.org 2001/11/08 10:51:08
     [readpass.c]
     don't strdup too much data; from gotoh@@taiyo.co.jp; ok millert.
   - markus@@cvs.openbsd.org 2001/11/10 13:22:42
     [ssh-rsa.c]
     KNF (unexpand)
   - markus@@cvs.openbsd.org 2001/11/11 13:02:31
     [servconf.c]
     make AuthorizedKeysFile2 fallback to AuthorizedKeysFile if
     AuthorizedKeysFile is specified.

20011109
 - (stevesk) auth-pam.c: use do_pam_authenticate(PAM_DISALLOW_NULL_AUTHTOK)
   if permit_empty_passwd == 0 so null password check cannot be bypassed.
   jayaraj@@amritapuri.com OpenBSD bug 2168
@
text
@d1 1
a1 1
MD5 (openssh-3.0.1p1.tar.gz) = ded31e3ca433790bab7584b4521ddd52
@


1.4
log
@Update to OpenSSH 3.0 and OpenSSH-portable 3.0p1
Extracted from Changelog (not complete):

20011012
   - markus@@cvs.openbsd.org 2001/10/10 22:18:47
     [channels.c channels.h clientloop.c nchan.c serverloop.c]
     [session.c session.h]
     try to keep channels open until an exit-status message is sent.
     don't kill the login shells if the shells stdin/out/err is closed.
     this should now work:
     ssh -2n localhost 'exec > /dev/null 2>&1; sleep 10; exit 5'; echo ?
   - markus@@cvs.openbsd.org 2001/10/11 13:45:21
     [session.c]
     delay detach of session if a channel gets closed but the child is
     still alive.  however, release pty, since the fd's to the child are
     already closed.
   - markus@@cvs.openbsd.org 2001/10/11 15:24:00
     [clientloop.c]
     clear select masks if we return before calling select().

20011010
   - markus@@cvs.openbsd.org 2001/10/04 14:34:16
     [key.c]
     call OPENSSL_free() for memory allocated by openssl; from chombier@@mac.com
   - markus@@cvs.openbsd.org 2001/10/04 15:05:40
     [channels.c serverloop.c]
     comment out bogus conditions for selecting on connection_in
   - markus@@cvs.openbsd.org 2001/10/04 15:12:37
     [serverloop.c]
     client_alive_check cleanup
   - markus@@cvs.openbsd.org 2001/10/06 00:14:50
     [sshconnect.c]
     remove unused argument
   - markus@@cvs.openbsd.org 2001/10/06 00:36:42
     [session.c]
     fix typo in error message, sync with do_exec_nopty
   - markus@@cvs.openbsd.org 2001/10/06 11:18:19
     [sshconnect1.c sshconnect2.c sshconnect.c]
     unify hostkey check error messages, simplify prompt.
   - markus@@cvs.openbsd.org 2001/10/07 10:29:52
     [authfile.c]
     grammer; Matthew_Clarke@@mindlink.bc.ca
   - markus@@cvs.openbsd.org 2001/10/07 17:49:40
     [channels.c channels.h]
     avoid possible FD_ISSET overflow for channels established
     during channnel_after_select() (used for dynamic channels).
   - markus@@cvs.openbsd.org 2001/10/08 11:48:57
     [channels.c]
     better debug
   - markus@@cvs.openbsd.org 2001/10/08 16:15:47
     [sshconnect.c]
     use correct family for -b option
   - markus@@cvs.openbsd.org 2001/10/08 19:05:05
     [ssh.c sshconnect.c sshconnect.h ssh-keyscan.c]
     some more IPv4or6 cleanup
   - markus@@cvs.openbsd.org 2001/10/09 10:12:08
     [session.c]
     chdir $HOME after krb_afslog(); from bbense@@networking.stanford.edu
   - markus@@cvs.openbsd.org 2001/10/09 19:32:49
     [session.c]
     stat subsystem command before calling do_exec, and return error to client.
   - markus@@cvs.openbsd.org 2001/10/09 19:51:18
     [serverloop.c]
     close all channels if the connection to the remote host has been closed,
     should fix sshd's hanging with WCHAN==wait
   - markus@@cvs.openbsd.org 2001/10/09 21:59:41
     [channels.c channels.h serverloop.c session.c session.h]
     simplify session close: no more delayed session_close, no more
     blocking wait() calls.
 - (bal) seed_init() and seed_rng() required in ssh-keyscan.c

20011003
   - markus@@cvs.openbsd.org 2001/09/27 11:58:16
     [compress.c]
     mem leak; chombier@@mac.com
   - markus@@cvs.openbsd.org 2001/09/27 11:59:37
     [packet.c]
     missing called=1; chombier@@mac.com
   - markus@@cvs.openbsd.org 2001/09/27 15:31:17
     [auth2.c auth2-chall.c sshconnect1.c]
     typos; from solar
   - camield@@cvs.openbsd.org 2001/09/27 17:53:24
     [sshd.8]
     don't talk about compile-time options
     ok markus@@
   - djm@@cvs.openbsd.org 2001/09/28 12:07:09
     [ssh-keygen.c]
     bzero private key after loading to smartcard; ok markus@@
   - markus@@cvs.openbsd.org 2001/09/28 15:46:29
     [ssh.c]
     bug: read user config first; report kaukasoi@@elektroni.ee.tut.fi
   - markus@@cvs.openbsd.org 2001/10/01 08:06:28
     [scp.c]
     skip filenames containing \n; report jdamery@@chiark.greenend.org.uk
     and matthew@@debian.org
   - markus@@cvs.openbsd.org 2001/10/01 21:38:53
     [channels.c channels.h ssh.c sshd.c]
     remove ugliness; vp@@drexel.edu via angelos
   - markus@@cvs.openbsd.org 2001/10/01 21:51:16
     [readconf.c readconf.h ssh.1 sshconnect.c]
     add NoHostAuthenticationForLocalhost; note that the hostkey is
     now check for localhost, too.
   - djm@@cvs.openbsd.org 2001/10/02 08:38:50
     [ssh-add.c]
     return non-zero exit code on error; ok markus@@
   - stevesk@@cvs.openbsd.org 2001/10/02 22:56:09
     [sshd.c]
     #include "channels.h" for channel_set_af()
   - markus@@cvs.openbsd.org 2001/10/03 10:01:20
     [auth.c]
     use realpath() for homedir, too. from jinmei@@isl.rdc.toshiba.co.jp

20011001
 - (stevesk) loginrec.c: fix type conversion problems exposed when using
   64-bit off_t.

20010928
   - djm@@cvs.openbsd.org 2001/09/28 09:49:31
     [scard.c]
     Fix segv when smartcard communication error occurs during key load.
     ok markus@@
 - (djm) Update spec files for new x11-askpass

20010927
 - (stevesk) session.c: declare do_pre_login() before use
   wayned@@users.sourceforge.net

20010925
 - (djm) Pull in auth-krb5.c from OpenBSD CVS. NB. it is not currently used.
 - (djm) Sync $sysconfdir/moduli
 - (djm) Avoid bad and unportable sprintf usage in compat code
@
text
@d1 1
a1 1
MD5 (openssh-3.0p1.tar.gz) = 8f60ea3933b405a697e09c0eec46ab82
@


1.3
log
@- Update to OpenSSH 2.9.9p2
- security-patch for cookie files obsolete
- MD5 password support activated

Approved by:	dwcjr@@FreeBSD.org
@
text
@d1 1
a1 1
MD5 (openssh-2.9.9p2.tar.gz) = 5061e6e0748713bca1b40fc8b13ff5ce
@


1.2
log
@- Update to p2:
- stripped down some patches

20010617
 - (djm) Pull in small fix from -CURRENT for session.c:
    typo, use pid not s->pid, mstone@@cs.loyola.edu

20010615
 - (stevesk) don't set SA_RESTART and set SIGCHLD to SIG_DFL
   around grantpt().

20010614
 - (bal) Applied X11 Cookie Patch.  X11 Cookie behavior has changed to
   no longer use /tmp/ssh-XXXXX/

20010528
 - (tim) [conifgure.in] add setvbuf test needed for sftp-int.c
   Patch by Corinna Vinschen <vinschen@@redhat.com>

Approved by:	dwcjr@@freebsd.org
@
text
@d1 1
a1 1
MD5 (openssh-2.9p2.tar.gz) = fb5ea44cb5a894bed7b610c5a517542d
@


1.1
log
@New port:
OpenSSH portable, which has GNU-configure and more.
Diffs to OpenSSH-OPenBSD are huge.
So this is here a complete diffrent branch, no repro-copy
- Did a bit cleanup in the Makefile

Submitted by:	dwcjr@@inethouston.net
@
text
@d1 1
a1 1
MD5 (openssh-2.9p1.tar.gz) = 591a5f59962c5604c8be81e37090759f
@

