Bug 503754 - Review Request: libssh - A library implementing the SSH2 protocol (0xbadc0de version)
Review Request: libssh - A library implementing the SSH2 protocol (0xbadc0de ...
Status: CLOSED DUPLICATE of bug 503742
Product: Fedora
Classification: Fedora
Component: Package Review (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Nobody's working on this, feel free to take it
Fedora Extras Quality Assurance
Depends On:
  Show dependency treegraph
Reported: 2009-06-02 10:34 EDT by Jan F. Chadima
Modified: 2009-06-02 10:36 EDT (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2009-06-02 10:36:38 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Jan F. Chadima 2009-06-02 10:34:41 EDT
Spec URL: http://www.benhur.prf.cuni.cz/medved-7/wydobitki/fedora/libssh/libssh.spec
SRPM URL: http://www.benhur.prf.cuni.cz/medved-7/wydobitki/fedora/libssh/libssh-0.2-1.fc11.src.rpm
The SSH library with
-Full C library functions for manipulating a client-side SSH connection                                                                     
-Fully configurable sessions                                                                                                                
-Support for AES-128,AES-192,AES-256,blowfish, in cbc mode                                                                                  
-use multiple SSH connections in a same process, at same time.                                                                              
-usable SFTP implementation                                                                                                                 
-Public key and password authentication
Comment 1 Matěj Cepl 2009-06-02 10:36:38 EDT

*** This bug has been marked as a duplicate of bug 503742 ***

Note You need to log in before you can comment on or make changes to this bug.