Displaying 5 results from an estimated 5 matches for "ssleay_version".
2018 Oct 22
2
[PATCH] openssl-compat: Add version compatibility for SSLeay and friends
...0264c0..b4f0908f 100644
--- a/openbsd-compat/openssl-compat.h
+++ b/openbsd-compat/openssl-compat.h
@@ -87,6 +87,13 @@ void ssh_aes_ctr_iv(EVP_CIPHER_CTX *, int, u_char *, size_t);
*/
#ifndef SSH_DONT_OVERLOAD_OPENSSL_FUNCS
+/* OpenSSL >= 1.1.0 without deprecated APIs needs this.*/
+#ifndef SSLEAY_VERSION
+# define SSLEAY_VERSION OPENSSL_VERSION
+# define SSLeay_version OpenSSL_version
+# define SSLeay OpenSSL_version_num
+#endif
+
# ifdef USE_OPENSSL_ENGINE
# ifdef OpenSSL_add_all_algorithms
# undef OpenSSL_add_all_algorithms
--
2.19.1
2014 Mar 31
1
Version string
...================
RCS file: /cvs/openssh/ssh.c,v
retrieving revision 1.398
diff -u -r1.398 ssh.c
--- ssh.c 26 Feb 2014 23:17:13 -0000 1.398
+++ ssh.c 31 Mar 2014 20:48:30 -0000
@@ -876,7 +876,7 @@
SYSLOG_FACILITY_USER, !use_syslog);
if (debug_flag)
- logit("%s, %s", SSH_VERSION, SSLeay_version(SSLEAY_VERSION));
+ logit("%s, %s", SSH_RELEASE, SSLeay_version(SSLEAY_VERSION));
/* Parse the configuration files */
process_config_files(pw);
DES
--
Dag-Erling Sm?rgrav - des at des.no
2005 Feb 24
3
Suggestion: SSHD pseudo/fake mode. Source available.
Hi,
SSH brute force attacks seem to enjoy increasing popularity. Call me an
optimist or a misrouted kind of contributer to the community, but on our
company server I actually go through the logs and report extreme cases
to the providers of the originating IP's. With the increasing number of
these attacks, however, I have now decided that it's better to move the
SSHd to a different
2003 Mar 08
6
[Bug 505] ssh -V could print a human readable openssl version string
http://bugzilla.mindrot.org/show_bug.cgi?id=505
------- Additional Comments From mindrot at ee.lbl.gov 2003-03-08 15:19 -------
Created an attachment (id=241)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=241&action=view)
patch to ssh.c
This patch makes ssh use SSLeay_version(SSLEAY_VERSION) to generate a human
readable version string.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2016 Jan 04
2
OPenssl and dependencies such as openssh
...t;conftest.ssllibver"
int
main ()
{
FILE *fd;
int rc;
fd = fopen(DATA,"w");
if(fd == NULL)
exit(1);
if ((rc = fprintf(fd ,"%08x (%s)\n", SSLeay(),
SSLeay_version(SSLEAY_VERSION))) <0)
exit(1);
exit(0);
;
return 0;
}
_ACEOF
if ac_fn_c_try_run "$LINENO"; then :
ssl_library_ver=`cat conftest.ssllibver`
# Check version is supported....