PN: openssh
PV: 9.6p1
PR: r0
PKGV: 9.6p1
PKGR: r0@EXTENDPRAUTO@
LICENSE: BSD-2-Clause & BSD-3-Clause & ISC & MIT
DESCRIPTION: Secure rlogin/rsh/rcp/telnet replacement (OpenSSH) Ssh (Secure Shell) is a program for logging into a remote machine and for executing commands on a remote machine.
SUMMARY: A suite of security-related network utilities based on the SSH protocol including the ssh client and sshd server
RDEPENDS:openssh-sshd: base-files base-passwd openssh-keygen pam-plugin-keyinit pam-plugin-loginuid shadow audit (>= 4.0.1) glibc (>= 2.39+git4+b027d5b145) libcrypto (>= 3.2.6) libpam (>= 1.5.3) libselinux (>= 3.7) libxcrypt (>= 4.4.36) zlib (>= 1.3.1)
RPROVIDES:openssh-sshd: sshd
RCONFLICTS:openssh-sshd: dropbear
SECTION: console/network
PKG:openssh-sshd: openssh-sshd
FILES:openssh-sshd: /usr/sbin/sshd /etc/init.d/sshd /usr/lib/systemd/system /etc/ssh/moduli /etc/ssh/sshd_config /etc/ssh/sshd_config_readonly /etc/default/volatiles/99_sshd /etc/pam.d/sshd /usr/libexec/openssh/sshd_check_keys /usr/lib/systemd/system-preset/98-openssh-sshd.preset /usr/lib/systemd/system/sshd.socket /usr/lib/systemd/system/sshd@.service
CONFFILES:openssh-sshd: /etc/ssh/sshd_config
FILES_INFO:openssh-sshd: {"/etc/default/volatiles/99_sshd": 75, "/etc/pam.d/sshd": 1110, "/etc/ssh/moduli": 620105, "/etc/ssh/sshd_config": 3198, "/etc/ssh/sshd_config_readonly": 3226, "/usr/lib/systemd/system-preset/98-openssh-sshd.preset": 19, "/usr/lib/systemd/system/sshd.socket": 173, "/usr/lib/systemd/system/sshd@.service": 223, "/usr/lib/systemd/system/sshdgenkeys.service": 169, "/usr/libexec/openssh/sshd_check_keys": 2109, "/usr/sbin/sshd": 1051984}
pkg_postinst:openssh-sshd: #!/bin/sh\nset -e\nif systemctl >/dev/null 2>/dev/null; then\n\tOPTS=""\n\n\tif [ -n "$D" ]; then\n\t\tOPTS="--root=$D"\n\tfi\n\n\tif [ "enable" = "enable" ]; then\n\t\tfor service in sshd.socket; do\n\t\t\tsystemctl ${OPTS} enable "$service"\n\t\tdone\n\tfi\n\n\tif [ -z "$D" ]; then\n\t\tsystemctl daemon-reload\n\t\tsystemctl preset sshd.socket\n\n\t\tif [ "enable" = "enable" ]; then\n\t\t\tsystemctl --no-block restart sshd.socket\n\t\tfi\n\tfi\nfi\n
pkg_preinst:openssh-sshd: #!/bin/sh\nset -e\nbbnote () {\n\techo "NOTE: $*"\n}\nbbwarn () {\n\techo "WARNING: $*"\n}\nbbfatal () {\n\techo "ERROR: $*"\n\texit 1\n}\nperform_groupadd () {\n\tlocal rootdir="$1"\n\tlocal opts="$2"\n\tbbnote "openssh: Performing groupadd with [$opts]"\n\tlocal groupname=`echo "$opts" | awk '{ print $NF }'`\n\tlocal group_exists="`grep "^$groupname:" $rootdir/etc/group || true`"\n\tif test "x$group_exists" = "x"; then\n\t\teval flock -x $rootdir/etc -c \\"$PSEUDO groupadd \\$opts\\" || true\n\t\tgroup_exists="`grep "^$groupname:" $rootdir/etc/group || true`"\n\t\tif test "x$group_exists" = "x"; then\n\t\t\tbbfatal "openssh: groupadd command did not succeed."\n\t\tfi\n\telse\n\t\tbbnote "openssh: group $groupname already exists, not re-creating it"\n\tfi\n}\nperform_useradd () {\n\tlocal rootdir="$1"\n\tlocal opts="$2"\n\tbbnote "openssh: Performing useradd with [$opts]"\n\tlocal username=`echo "$opts" | awk '{ print $NF }'`\n\tlocal user_exists="`grep "^$username:" $rootdir/etc/passwd || true`"\n\tif test "x$user_exists" = "x"; then\n\t\teval flock -x $rootdir/etc -c  \\"$PSEUDO useradd \\$opts\\" || true\n\t\tuser_exists="`grep "^$username:" $rootdir/etc/passwd || true`"\n\t\tif test "x$user_exists" = "x"; then\n\t\t\tbbfatal "openssh: useradd command did not succeed."\n\t\tfi\n\telse\n\t\tbbnote "openssh: user $username already exists, not re-creating it"\n\tfi\n}\nperform_groupmems () {\n\tlocal rootdir="$1"\n\tlocal opts="$2"\n\tbbnote "openssh: Performing groupmems with [$opts]"\n\tlocal groupname=`echo "$opts" | awk '{ for (i = 1; i < NF; i++) if ($i == "-g" || $i == "--group") print $(i+1) }'`\n\tlocal username=`echo "$opts" | awk '{ for (i = 1; i < NF; i++) if ($i == "-a" || $i == "--add") print $(i+1) }'`\n\tbbnote "openssh: Running groupmems command with group $groupname and user $username"\n\tlocal mem_exists="`grep "^$groupname:[^:]*:[^:]*:\\([^,]*,\\)*$username\\(,[^,]*\\)*$" $rootdir/etc/group || true`"\n\tif test "x$mem_exists" = "x"; then\n\t\teval flock -x $rootdir/etc -c \\"$PSEUDO groupmems \\$opts\\" || true\n\t\tmem_exists="`grep "^$groupname:[^:]*:[^:]*:\\([^,]*,\\)*$username\\(,[^,]*\\)*$" $rootdir/etc/group || true`"\n\t\tif test "x$mem_exists" = "x"; then\n\t\t\tbbfatal "openssh: groupmems command did not succeed."\n\t\tfi\n\telse\n\t\tbbnote "openssh: group $groupname already contains $username, not re-adding it"\n\tfi\n}\nOPT=""\nSYSROOT=""\n\nif test "x$D" != "x"; then\n\t# Installing into a sysroot\n\tSYSROOT="$D"\n\tOPT="--root $D"\n\n\t# Make sure login.defs is there, this is to make debian package backend work\n\t# correctly while doing rootfs.\n\t# The problem here is that if /etc/login.defs is treated as a config file for\n\t# shadow package, then while performing preinsts for packages that depend on\n\t# shadow, there might only be /etc/login.def.dpkg-new there in root filesystem.\n\tif [ ! -e $D/etc/login.defs -a -e $D/etc/login.defs.dpkg-new ]; then\n\t    cp $D/etc/login.defs.dpkg-new $D/etc/login.defs\n\tfi\n\n\t# user/group lookups should match useradd/groupadd --root\n\texport PSEUDO_PASSWD="$SYSROOT"\nfi\n\n# If we're not doing a special SSTATE/SYSROOT install\n# then set the values, otherwise use the environment\nif test "x$UA_SYSROOT" = "x"; then\n\t# Installing onto a target\n\t# Add groups and users defined only for this package\n\tGROUPADD_PARAM="--gid 996 sshd"\n\tUSERADD_PARAM="--home-dir /var/run/sshd --gid 996 --no-create-home --system --shell /bin/false --uid 996 sshd"\n\tGROUPMEMS_PARAM=""\nfi\n\n# Perform group additions first, since user additions may depend\n# on these groups existing\nif test "x`echo $GROUPADD_PARAM | tr -d '[:space:]'`" != "x"; then\n\techo "Running groupadd commands..."\n\t# Invoke multiple instances of groupadd for parameter lists\n\t# separated by ';'\n\topts=`echo "$GROUPADD_PARAM" | cut -d ';' -f 1 | sed -e 's#[ \\t]*$##'`\n\tremaining=`echo "$GROUPADD_PARAM" | cut -d ';' -f 2- | sed -e 's#[ \\t]*$##'`\n\twhile test "x$opts" != "x"; do\n\t\tperform_groupadd "$SYSROOT" "$OPT $opts"\n\t\tif test "x$opts" = "x$remaining"; then\n\t\t\tbreak\n\t\tfi\n\t\topts=`echo "$remaining" | cut -d ';' -f 1 | sed -e 's#[ \\t]*$##'`\n\t\tremaining=`echo "$remaining" | cut -d ';' -f 2- | sed -e 's#[ \\t]*$##'`\n\tdone\nfi\n\nif test "x`echo $USERADD_PARAM | tr -d '[:space:]'`" != "x"; then\n\techo "Running useradd commands..."\n\t# Invoke multiple instances of useradd for parameter lists\n\t# separated by ';'\n\topts=`echo "$USERADD_PARAM" | cut -d ';' -f 1 | sed -e 's#[ \\t]*$##'`\n\tremaining=`echo "$USERADD_PARAM" | cut -d ';' -f 2- | sed -e 's#[ \\t]*$##'`\n\twhile test "x$opts" != "x"; do\n\t\tperform_useradd "$SYSROOT" "$OPT $opts"\n\t\tif test "x$opts" = "x$remaining"; then\n\t\t\tbreak\n\t\tfi\n\t\topts=`echo "$remaining" | cut -d ';' -f 1 | sed -e 's#[ \\t]*$##'`\n\t\tremaining=`echo "$remaining" | cut -d ';' -f 2- | sed -e 's#[ \\t]*$##'`\n\tdone\nfi\n\nif test "x`echo $GROUPMEMS_PARAM | tr -d '[:space:]'`" != "x"; then\n\techo "Running groupmems commands..."\n\t# Invoke multiple instances of groupmems for parameter lists\n\t# separated by ';'\n\topts=`echo "$GROUPMEMS_PARAM" | cut -d ';' -f 1 | sed -e 's#[ \\t]*$##'`\n\tremaining=`echo "$GROUPMEMS_PARAM" | cut -d ';' -f 2- | sed -e 's#[ \\t]*$##'`\n\twhile test "x$opts" != "x"; do\n\t\tperform_groupmems "$SYSROOT" "$OPT $opts"\n\t\tif test "x$opts" = "x$remaining"; then\n\t\t\tbreak\n\t\tfi\n\t\topts=`echo "$remaining" | cut -d ';' -f 1 | sed -e 's#[ \\t]*$##'`\n\t\tremaining=`echo "$remaining" | cut -d ';' -f 2- | sed -e 's#[ \\t]*$##'`\n\tdone\nfi\n
pkg_prerm:openssh-sshd: #!/bin/sh\nset -e\nif systemctl >/dev/null 2>/dev/null; then\n\tif [ -z "$D" ]; then\n\t\tsystemctl stop sshd.socket\n\n\t\tsystemctl disable sshd.socket\n\tfi\nfi\n
FILERDEPENDSFLIST:openssh-sshd: /usr/libexec/openssh/sshd@underscore@check@underscore@keys /usr/sbin/sshd
FILERDEPENDS:/usr/libexec/openssh/sshd@underscore@check@underscore@keys:openssh-sshd:  /bin/sh
FILERDEPENDS:/usr/sbin/sshd:openssh-sshd:  libcrypt.so.2(XCRYPT_2.0)(64bit) ld-linux-aarch64.so.1(GLIBC_2.17)(64bit) libpam.so.0(LIBPAM_1.0)(64bit) libselinux.so.1(LIBSELINUX_1.0)(64bit) libc.so.6(GLIBC_2.26)(64bit) libc.so.6(GLIBC_2.33)(64bit) libc.so.6(GLIBC_2.34)(64bit) libc.so.6(GLIBC_2.36)(64bit) libc.so.6(GLIBC_2.38)(64bit) libc.so.6(GLIBC_2.25)(64bit) libc.so.6(GLIBC_2.17)(64bit) libcrypto.so.3(OPENSSL_3.0.0)(64bit) libcrypt.so.2()(64bit) libaudit.so.1()(64bit) libpam.so.0()(64bit) libselinux.so.1()(64bit) libcrypto.so.3()(64bit) libz.so.1()(64bit) libc.so.6()(64bit) ld-linux-aarch64.so.1()(64bit) rtld(GNU_HASH)
PKGSIZE:openssh-sshd: 1682391
