Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: libssh2-devel | Distribution: openSUSE Tumbleweed |
Version: 1.11.1 | Vendor: openSUSE |
Release: 1.1 | Build date: Tue Oct 22 09:29:06 2024 |
Group: Development/Libraries/C and C++ | Build host: reproducible |
Size: 547321 | Source RPM: libssh2_org-1.11.1-1.1.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://www.libssh2.org/ | |
Summary: A library implementing the SSH2 protocol |
libssh2 is a library implementing the SSH2 protocol as defined by Internet Drafts: SECSH-TRANS, SECSH-USERAUTH, SECSH-CONNECTION, SECSH-ARCH, SECSH-FILEXFER, SECSH-DHGEX, SECSH-NUMBERS, and SECSH-PUBLICKEY.
BSD-3-Clause
* Tue Oct 22 2024 Pedro Monreal <pmonreal@suse.com> - Update to 1.11.1: * build: enable '-pedantic-errors' * build: add 'LIBSSH2_NO_DEPRECATED' option * build: stop requiring libssl from openssl * disable DSA by default * hostkey: do not advertise ssh-rsa when SHA1 is disabled * kex: prevent possible double free of hostkey * kex: always check for null pointers before calling _libssh2_bn_set_word * kex: fix a memory leak in key exchange * kex: always add extension indicators to kex_algorithms * md5: allow disabling old-style encrypted private keys at build-time * openssl: free allocated resources when using openssl3 * openssl: fix memory leaks in '_libssh2_ecdsa_curve_name_with_octal_new' and '_libssh2_ecdsa_verify' * openssl: fix calculating DSA public key with OpenSSL 3 * openssl: initialize BIGNUMs to NULL in 'gen_publickey_from_dsa' for OpenSSL 3 * openssl: fix cppcheck found NULL dereferences * openssl: delete internal 'read_openssh_private_key_from_memory()' * openssl: use OpenSSL 3 HMAC API, add 'no-deprecated' CI job * openssl: make a function static, add '#ifdef' comments * openssl: fix DSA code to use OpenSSL 3 API * openssl: fix 'EC_KEY' reference with OpenSSL 3 'no-deprecated' build * openssl: use non-deprecated APIs with OpenSSL 3.x * openssl: silence '-Wunused-value' warnings * openssl: add missing check for 'LIBRESSL_VERSION_NUMBER' before use * packet: properly bounds check packet_authagent_open() * pem: fix private keys encrypted with AES-GCM methods * reuse: provide SPDX identifiers * scp: fix missing cast for targets without large file support * session: support server banners up to 8192 bytes * session: add 'libssh2_session_callback_set2()' * session: handle EINTR from send/recv/poll/select to try again as the error is not fatal * sftp: increase SFTP_HANDLE_MAXLEN back to 4092 * sftp: implement posix-rename@openssh.com * src: implement chacha20-poly1305@openssh.com * src: check the return value from '_libssh2_bn_*()' functions * src: support RSA-SHA2 cert-based authentication (rsa-sha2-512_cert and rsa-sha2-256_cert) * src: check hash update/final success * src: check hash init success * src: add 'strict KEX' to fix CVE-2023-48795 "Terrapin Attack" * transport: fix unstable connections over non-blocking sockets * transport: check ETM on remote end when receiving * transport: fix incorrect byte offset in debug message * userauth: avoid oob with huge interactive kbd response * userauth: add a new structure to separate memory read and file read * userauth: check whether '*key_method' is a NULL pointer instead of 'key_method' * Rebase libssh2-ocloexec.patch * Remove patches fixed upstream: - libssh2_org-CVE-2023-48795.patch - libssh2_org-CVE-2023-48795-ext.patch - libssh2_org-ETM-remote.patch * Tue Apr 02 2024 Pedro Monreal <pmonreal@suse.com> - Fix an issue with Encrypt-then-MAC family. [bsc#1221622] * Test the ETM feature in the remote end's configuration when receiving data. Upstream issue: #1331. * Add libssh2_org-ETM-remote.patch * Fri Feb 09 2024 Pedro Monreal <pmonreal@suse.com> - Always add the KEX pseudo-methods "ext-info-c" and "kex-strict-c-v00@openssh.com" when configuring custom method list. [bsc#1218971, CVE-2023-48795] * The strict-kex extension is announced in the list of available KEX methods. However, when the default KEX method list is modified or replaced, the extension is not added back automatically. * Add libssh2_org-CVE-2023-48795-ext.patch * Tue Dec 19 2023 Otto Hollmann <otto.hollmann@suse.com> - Security fix: [bsc#1218127, CVE-2023-48795] * Add 'strict KEX' to fix CVE-2023-48795 "Terrapin Attack" * Add libssh2_org-CVE-2023-48795.patch * Tue Jun 20 2023 Pedro Monreal <pmonreal@suse.com> - Update to 1.11.0: * Enhancements and bugfixes - Adds support for encrypt-then-mac (ETM) MACs - Adds support for AES-GCM crypto protocols - Adds support for sk-ecdsa-sha2-nistp256 and sk-ssh-ed25519 keys - Adds support for RSA certificate authentication - Adds FIDO support with *_sk() functions - Adds RSA-SHA2 key upgrading to OpenSSL, WinCNG, mbedTLS, OS400 backends - Adds Agent Forwarding and libssh2_agent_sign() - Adds support for Channel Signal message libssh2_channel_signal_ex() - Adds support to get the user auth banner message libssh2_userauth_banner() - Adds LIBSSH2_NO_{MD5, HMAC_RIPEMD, DSA, RSA, RSA_SHA1, ECDSA, ED25519, AES_CBC, AES_CTR, BLOWFISH, RC4, CAST, 3DES} options - Adds direct stream UNIX sockets with libssh2_channel_direct_streamlocal_ex() - Adds wolfSSL support to CMake file - Adds mbedTLS 3.x support - Adds LibreSSL 3.5 support - Adds support for CMake "unity" builds - Adds CMake support for building shared and static libs in a single pass - Adds symbol hiding support to CMake - Adds support for libssh2.rc for all build tools - Adds .zip, .tar.xz and .tar.bz2 release tarballs - Enables ed25519 key support for LibreSSL 3.7.0 or higher - Improves OpenSSL 1.1 and 3 compatibility - Now requires OpenSSL 1.0.2 or newer - Now requires CMake 3.1 or newer - SFTP: Adds libssh2_sftp_open_ex_r() and libssh2_sftp_open_r() extended APIs - SFTP: No longer has a packet limit when reading a directory - SFTP: now parses attribute extensions if they exist - SFTP: no longer will busy loop if SFTP fails to initialize - SFTP: now clear various errors as expected - SFTP: no longer skips files if the line buffer is too small - SCP: add option to not quote paths - SCP: Enables 64-bit offset support unconditionally - Now skips leading \r and \n characters in banner_receive() - Enables secure memory zeroing with all build tools on all platforms - No longer logs SSH_MSG_REQUEST_FAILURE packets from keepalive - Speed up base64 encoding by 7x - Assert if there is an attempt to write a value that is too large - WinCNG: fix memory leak in _libssh2_dh_secret() - Added protection against possible null pointer dereferences - Agent now handles overly large comment lengths - Now ensure KEX replies don't include extra bytes - Fixed possible buffer overflow when receiving SSH_MSG_USERAUTH_BANNER - Fixed possible buffer overflow in keyboard interactive code path - Fixed overlapping memcpy() - Fixed Windows UWP builds - Fixed DLL import name - Renamed local RANDOM_PADDING macro to avoid unexpected define on Windows - Support for building with gcc versions older than 8 - Improvements to CMake, Makefile, NMakefile, GNUmakefile, autoreconf files - Restores ANSI C89 compliance - Enabled new compiler warnings and fixed/silenced them - Improved error messages - Now uses CIFuzz - Numerous minor code improvements - Improvements to CI builds - Improvements to unit tests - Improvements to doc files - Improvements to example files - Removed "old gex" build option - Removed no-encryption/no-mac builds - Removed support for NetWare and Watcom wmake build files * Rebase libssh2-ocloexec.patch * Fri Dec 10 2021 David Anes <david.anes@suse.com> - Bump to version 1.10.0 Enhancements and bugfixes: * support ECDSA certificate authentication * fix detailed _libssh2_error being overwritten by generic errors * unified error handling * fix _libssh2_random() silently discarding errors * don't error if using keys without RSA * avoid OpenSSL latent error in FIPS mode * fix EVP_Cipher interface change in openssl 3 * fix potential overwrite of buffer when reading stdout of command * use string_buf in ecdh_sha2_nistp() to avoid attempting to parse malformed data * correct a typo which may lead to stack overflow * fix random big number generation to match openssl * added key exchange group16-sha512 and group18-sha512. * add support for an OSS Fuzzer fuzzing target * adds support for ECDSA for both key exchange and host key algorithms * clean up curve25519 code * update the min, preferred and max DH group values based on RFC 8270. * changed type of LIBSSH2_FX_* constants to unsigned long * added diffie-hellman-group14-sha256 kex * fix for use of uninitialized aes_ctr_cipher.key_len when using HAVE_OPAQUE_STRUCTS, regression * fixes memory leaks and use after free AES EVP_CIPHER contexts when using OpenSSL 1.0.x. * fixes crash with delayed compression option using Bitvise server. * adds support for PKIX key reading * use new API to parse data in packet_x11_open() for better bounds checking. * double the static buffer size when reading and writing known hosts * improved bounds checking in packet_queue_listener * improve message parsing (CVE-2019-17498) * improve bounds checking in kex_agree_methods() * adding SSH agent forwarding. * fix agent forwarding message, updated example. * added integration test code and cmake target. Added example to cmake list. * don't call `libssh2_crypto_exit()` until `_libssh2_initialized` count is down to zero. * add an EWOULDBLOCK check for better portability * fix off by one error when loading public keys with no id * fix use-after-free crash on reinitialization of openssl backend * preserve error info from agent_list_identities() * make sure the error code is set in _libssh2_channel_open() * fixed misspellings * fix potential typecast error for `_libssh2_ecdsa_key_get_curve_type` * rename _libssh2_ecdsa_key_get_curve_type to _libssh2_ecdsa_get_curve_type - Rebased patch libssh2-ocloexec.path - Removed patch libssh2_org-CVE-2019-17498.patch: the security fix is already included in the latest version. * Thu Aug 27 2020 Dominique Leuenberger <dimstar@opensuse.org> - Drop man and groff BuildRequires: both are no longer used in current versions. * Wed Oct 23 2019 Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com> - Security fix: [bsc#1154862, CVE-2019-17498] * The SSH_MSG_DISCONNECT:packet.c logic has an integer overflow in a bounds check that might lead to disclose sensitive information or cause a denial of service * Add patch libssh2_org-CVE-2019-17498.patch * Thu Jun 20 2019 Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com> - Version update to 1.9.0: Enhancements and bugfixes: * adds ECDSA keys and host key support when using OpenSSL * adds ED25519 key and host key support when using OpenSSL 1.1.1 * adds OpenSSH style key file reading * adds AES CTR mode support when using WinCNG * adds PEM passphrase protected file support for Libgcrypt and WinCNG * adds SHA256 hostkey fingerprint * adds libssh2_agent_get_identity_path() and libssh2_agent_set_identity_path() * adds explicit zeroing of sensitive data in memory * adds additional bounds checks to network buffer reads * adds the ability to use the server default permissions when creating sftp directories * adds support for building with OpenSSL no engine flag * adds support for building with LibreSSL * increased sftp packet size to 256k * fixed oversized packet handling in sftp * fixed building with OpenSSL 1.1 * fixed a possible crash if sftp stat gets an unexpected response * fixed incorrect parsing of the KEX preference string value * fixed conditional RSA and AES-CTR support * fixed a small memory leak during the key exchange process * fixed a possible memory leak of the ssh banner string * fixed various small memory leaks in the backends * fixed possible out of bounds read when parsing public keys from the server * fixed possible out of bounds read when parsing invalid PEM files * no longer null terminates the scp remote exec command * now handle errors when diffie hellman key pair generation fails * improved building instructions * improved unit tests - Rebased patch libssh2-ocloexec.patch * Tue Apr 09 2019 Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com> - Version update to 1.8.2: [bsc#1130103] Bug fixes: * Fixed the misapplied userauth patch that broke 1.8.1 * moved the MAX size declarations from the public header
/usr/include/libssh2.h /usr/include/libssh2_publickey.h /usr/include/libssh2_sftp.h /usr/lib64/libssh2.so /usr/lib64/pkgconfig/libssh2.pc /usr/share/doc/packages/libssh2-devel /usr/share/doc/packages/libssh2-devel/BINDINGS.md /usr/share/doc/packages/libssh2-devel/HACKING.md /usr/share/doc/packages/libssh2-devel/NEWS /usr/share/doc/packages/libssh2-devel/TODO /usr/share/man/man3/libssh2_agent_connect.3.gz /usr/share/man/man3/libssh2_agent_disconnect.3.gz /usr/share/man/man3/libssh2_agent_free.3.gz /usr/share/man/man3/libssh2_agent_get_identity.3.gz /usr/share/man/man3/libssh2_agent_get_identity_path.3.gz /usr/share/man/man3/libssh2_agent_init.3.gz /usr/share/man/man3/libssh2_agent_list_identities.3.gz /usr/share/man/man3/libssh2_agent_set_identity_path.3.gz /usr/share/man/man3/libssh2_agent_sign.3.gz /usr/share/man/man3/libssh2_agent_userauth.3.gz /usr/share/man/man3/libssh2_banner_set.3.gz /usr/share/man/man3/libssh2_base64_decode.3.gz /usr/share/man/man3/libssh2_channel_close.3.gz /usr/share/man/man3/libssh2_channel_direct_streamlocal_ex.3.gz /usr/share/man/man3/libssh2_channel_direct_tcpip.3.gz /usr/share/man/man3/libssh2_channel_direct_tcpip_ex.3.gz /usr/share/man/man3/libssh2_channel_eof.3.gz /usr/share/man/man3/libssh2_channel_exec.3.gz /usr/share/man/man3/libssh2_channel_flush.3.gz /usr/share/man/man3/libssh2_channel_flush_ex.3.gz /usr/share/man/man3/libssh2_channel_flush_stderr.3.gz /usr/share/man/man3/libssh2_channel_forward_accept.3.gz /usr/share/man/man3/libssh2_channel_forward_cancel.3.gz /usr/share/man/man3/libssh2_channel_forward_listen.3.gz /usr/share/man/man3/libssh2_channel_forward_listen_ex.3.gz /usr/share/man/man3/libssh2_channel_free.3.gz /usr/share/man/man3/libssh2_channel_get_exit_signal.3.gz /usr/share/man/man3/libssh2_channel_get_exit_status.3.gz /usr/share/man/man3/libssh2_channel_handle_extended_data.3.gz /usr/share/man/man3/libssh2_channel_handle_extended_data2.3.gz /usr/share/man/man3/libssh2_channel_ignore_extended_data.3.gz /usr/share/man/man3/libssh2_channel_open_ex.3.gz /usr/share/man/man3/libssh2_channel_open_session.3.gz /usr/share/man/man3/libssh2_channel_process_startup.3.gz /usr/share/man/man3/libssh2_channel_read.3.gz /usr/share/man/man3/libssh2_channel_read_ex.3.gz /usr/share/man/man3/libssh2_channel_read_stderr.3.gz /usr/share/man/man3/libssh2_channel_receive_window_adjust.3.gz /usr/share/man/man3/libssh2_channel_receive_window_adjust2.3.gz /usr/share/man/man3/libssh2_channel_request_auth_agent.3.gz /usr/share/man/man3/libssh2_channel_request_pty.3.gz /usr/share/man/man3/libssh2_channel_request_pty_ex.3.gz /usr/share/man/man3/libssh2_channel_request_pty_size.3.gz /usr/share/man/man3/libssh2_channel_request_pty_size_ex.3.gz /usr/share/man/man3/libssh2_channel_send_eof.3.gz /usr/share/man/man3/libssh2_channel_set_blocking.3.gz /usr/share/man/man3/libssh2_channel_setenv.3.gz /usr/share/man/man3/libssh2_channel_setenv_ex.3.gz /usr/share/man/man3/libssh2_channel_shell.3.gz /usr/share/man/man3/libssh2_channel_signal_ex.3.gz /usr/share/man/man3/libssh2_channel_subsystem.3.gz /usr/share/man/man3/libssh2_channel_wait_closed.3.gz /usr/share/man/man3/libssh2_channel_wait_eof.3.gz /usr/share/man/man3/libssh2_channel_window_read.3.gz /usr/share/man/man3/libssh2_channel_window_read_ex.3.gz /usr/share/man/man3/libssh2_channel_window_write.3.gz /usr/share/man/man3/libssh2_channel_window_write_ex.3.gz /usr/share/man/man3/libssh2_channel_write.3.gz /usr/share/man/man3/libssh2_channel_write_ex.3.gz /usr/share/man/man3/libssh2_channel_write_stderr.3.gz /usr/share/man/man3/libssh2_channel_x11_req.3.gz /usr/share/man/man3/libssh2_channel_x11_req_ex.3.gz /usr/share/man/man3/libssh2_crypto_engine.3.gz /usr/share/man/man3/libssh2_exit.3.gz /usr/share/man/man3/libssh2_free.3.gz /usr/share/man/man3/libssh2_hostkey_hash.3.gz /usr/share/man/man3/libssh2_init.3.gz /usr/share/man/man3/libssh2_keepalive_config.3.gz /usr/share/man/man3/libssh2_keepalive_send.3.gz /usr/share/man/man3/libssh2_knownhost_add.3.gz /usr/share/man/man3/libssh2_knownhost_addc.3.gz /usr/share/man/man3/libssh2_knownhost_check.3.gz /usr/share/man/man3/libssh2_knownhost_checkp.3.gz /usr/share/man/man3/libssh2_knownhost_del.3.gz /usr/share/man/man3/libssh2_knownhost_free.3.gz /usr/share/man/man3/libssh2_knownhost_get.3.gz /usr/share/man/man3/libssh2_knownhost_init.3.gz /usr/share/man/man3/libssh2_knownhost_readfile.3.gz /usr/share/man/man3/libssh2_knownhost_readline.3.gz /usr/share/man/man3/libssh2_knownhost_writefile.3.gz /usr/share/man/man3/libssh2_knownhost_writeline.3.gz /usr/share/man/man3/libssh2_poll.3.gz /usr/share/man/man3/libssh2_poll_channel_read.3.gz /usr/share/man/man3/libssh2_publickey_add.3.gz /usr/share/man/man3/libssh2_publickey_add_ex.3.gz /usr/share/man/man3/libssh2_publickey_init.3.gz /usr/share/man/man3/libssh2_publickey_list_fetch.3.gz /usr/share/man/man3/libssh2_publickey_list_free.3.gz /usr/share/man/man3/libssh2_publickey_remove.3.gz /usr/share/man/man3/libssh2_publickey_remove_ex.3.gz /usr/share/man/man3/libssh2_publickey_shutdown.3.gz /usr/share/man/man3/libssh2_scp_recv.3.gz /usr/share/man/man3/libssh2_scp_recv2.3.gz /usr/share/man/man3/libssh2_scp_send.3.gz /usr/share/man/man3/libssh2_scp_send64.3.gz /usr/share/man/man3/libssh2_scp_send_ex.3.gz /usr/share/man/man3/libssh2_session_abstract.3.gz /usr/share/man/man3/libssh2_session_banner_get.3.gz /usr/share/man/man3/libssh2_session_banner_set.3.gz /usr/share/man/man3/libssh2_session_block_directions.3.gz /usr/share/man/man3/libssh2_session_callback_set.3.gz /usr/share/man/man3/libssh2_session_callback_set2.3.gz /usr/share/man/man3/libssh2_session_disconnect.3.gz /usr/share/man/man3/libssh2_session_disconnect_ex.3.gz /usr/share/man/man3/libssh2_session_flag.3.gz /usr/share/man/man3/libssh2_session_free.3.gz /usr/share/man/man3/libssh2_session_get_blocking.3.gz /usr/share/man/man3/libssh2_session_get_read_timeout.3.gz /usr/share/man/man3/libssh2_session_get_timeout.3.gz /usr/share/man/man3/libssh2_session_handshake.3.gz /usr/share/man/man3/libssh2_session_hostkey.3.gz /usr/share/man/man3/libssh2_session_init.3.gz /usr/share/man/man3/libssh2_session_init_ex.3.gz /usr/share/man/man3/libssh2_session_last_errno.3.gz /usr/share/man/man3/libssh2_session_last_error.3.gz /usr/share/man/man3/libssh2_session_method_pref.3.gz /usr/share/man/man3/libssh2_session_methods.3.gz /usr/share/man/man3/libssh2_session_set_blocking.3.gz /usr/share/man/man3/libssh2_session_set_last_error.3.gz /usr/share/man/man3/libssh2_session_set_read_timeout.3.gz /usr/share/man/man3/libssh2_session_set_timeout.3.gz /usr/share/man/man3/libssh2_session_startup.3.gz /usr/share/man/man3/libssh2_session_supported_algs.3.gz /usr/share/man/man3/libssh2_sftp_close.3.gz /usr/share/man/man3/libssh2_sftp_close_handle.3.gz /usr/share/man/man3/libssh2_sftp_closedir.3.gz /usr/share/man/man3/libssh2_sftp_fsetstat.3.gz /usr/share/man/man3/libssh2_sftp_fstat.3.gz /usr/share/man/man3/libssh2_sftp_fstat_ex.3.gz /usr/share/man/man3/libssh2_sftp_fstatvfs.3.gz /usr/share/man/man3/libssh2_sftp_fsync.3.gz /usr/share/man/man3/libssh2_sftp_get_channel.3.gz /usr/share/man/man3/libssh2_sftp_init.3.gz /usr/share/man/man3/libssh2_sftp_last_error.3.gz /usr/share/man/man3/libssh2_sftp_lstat.3.gz /usr/share/man/man3/libssh2_sftp_mkdir.3.gz /usr/share/man/man3/libssh2_sftp_mkdir_ex.3.gz /usr/share/man/man3/libssh2_sftp_open.3.gz /usr/share/man/man3/libssh2_sftp_open_ex.3.gz /usr/share/man/man3/libssh2_sftp_open_ex_r.3.gz /usr/share/man/man3/libssh2_sftp_open_r.3.gz /usr/share/man/man3/libssh2_sftp_opendir.3.gz /usr/share/man/man3/libssh2_sftp_posix_rename.3.gz /usr/share/man/man3/libssh2_sftp_posix_rename_ex.3.gz /usr/share/man/man3/libssh2_sftp_read.3.gz /usr/share/man/man3/libssh2_sftp_readdir.3.gz /usr/share/man/man3/libssh2_sftp_readdir_ex.3.gz /usr/share/man/man3/libssh2_sftp_readlink.3.gz /usr/share/man/man3/libssh2_sftp_realpath.3.gz /usr/share/man/man3/libssh2_sftp_rename.3.gz /usr/share/man/man3/libssh2_sftp_rename_ex.3.gz /usr/share/man/man3/libssh2_sftp_rewind.3.gz /usr/share/man/man3/libssh2_sftp_rmdir.3.gz /usr/share/man/man3/libssh2_sftp_rmdir_ex.3.gz /usr/share/man/man3/libssh2_sftp_seek.3.gz /usr/share/man/man3/libssh2_sftp_seek64.3.gz /usr/share/man/man3/libssh2_sftp_setstat.3.gz /usr/share/man/man3/libssh2_sftp_shutdown.3.gz /usr/share/man/man3/libssh2_sftp_stat.3.gz /usr/share/man/man3/libssh2_sftp_stat_ex.3.gz /usr/share/man/man3/libssh2_sftp_statvfs.3.gz /usr/share/man/man3/libssh2_sftp_symlink.3.gz /usr/share/man/man3/libssh2_sftp_symlink_ex.3.gz /usr/share/man/man3/libssh2_sftp_tell.3.gz /usr/share/man/man3/libssh2_sftp_tell64.3.gz /usr/share/man/man3/libssh2_sftp_unlink.3.gz /usr/share/man/man3/libssh2_sftp_unlink_ex.3.gz /usr/share/man/man3/libssh2_sftp_write.3.gz /usr/share/man/man3/libssh2_sign_sk.3.gz /usr/share/man/man3/libssh2_trace.3.gz /usr/share/man/man3/libssh2_trace_sethandler.3.gz /usr/share/man/man3/libssh2_userauth_authenticated.3.gz /usr/share/man/man3/libssh2_userauth_banner.3.gz /usr/share/man/man3/libssh2_userauth_hostbased_fromfile.3.gz /usr/share/man/man3/libssh2_userauth_hostbased_fromfile_ex.3.gz /usr/share/man/man3/libssh2_userauth_keyboard_interactive.3.gz /usr/share/man/man3/libssh2_userauth_keyboard_interactive_ex.3.gz /usr/share/man/man3/libssh2_userauth_list.3.gz /usr/share/man/man3/libssh2_userauth_password.3.gz /usr/share/man/man3/libssh2_userauth_password_ex.3.gz /usr/share/man/man3/libssh2_userauth_publickey.3.gz /usr/share/man/man3/libssh2_userauth_publickey_fromfile.3.gz /usr/share/man/man3/libssh2_userauth_publickey_fromfile_ex.3.gz /usr/share/man/man3/libssh2_userauth_publickey_frommemory.3.gz /usr/share/man/man3/libssh2_userauth_publickey_sk.3.gz /usr/share/man/man3/libssh2_version.3.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Sat Dec 21 00:03:11 2024