[openssh-commits] [openssh] branch master updated (b8df8fe9 -> 8784b02d)

git+noreply at mindrot.org git+noreply at mindrot.org
Fri Dec 20 14:28:39 AEDT 2019


This is an automated email from the git hooks/post-receive script.

dtucker pushed a change to branch master
in repository openssh.

      from  b8df8fe9  Mac OS X has PAM too.
       new  57634bfc  upstream: sort sk-* methods behind their plain key methods cousins
       new  f65cf116  upstream: strdup may return NULL if memory allocation fails. Use
       new  e905f726  upstream: cut obsolete lists of crypto algorithms from outline of
       new  bc2dc091  upstream: "Forward security" -> "Forward secrecy" since that's the
       new  ae024b22  upstream: Document that security key-hosted keys can act as host
       new  345be609  upstream: Remove now-obsolete config options from example in
       new  8784b02d  upstream: Remove obsolete opcodes from the configuation enum.

The 7 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.


Detailed log of new commits:

commit 8784b02dc49e1c98df4e7aca466be2f652ed4ad1
Author: dtucker at openbsd.org <dtucker at openbsd.org>
Date:   Fri Dec 20 02:29:21 2019 +0000

    upstream: Remove obsolete opcodes from the configuation enum.
    
    Patch from openbsd at academicsolutions.ch, ok djm@
    
    OpenBSD-Commit-ID: 395c202228872ce8d9044cc08552ac969f51e01b

commit 345be6091bdc9be09c90a937d1320f97c01fab2a
Author: dtucker at openbsd.org <dtucker at openbsd.org>
Date:   Fri Dec 20 02:11:38 2019 +0000

    upstream: Remove now-obsolete config options from example in
    
    comment.  Patch from openbsd at academicsolutions.ch, ok djm@
    
    OpenBSD-Commit-ID: 35862beb0927b1cb0af476ec23cc07f6e3006101

commit ae024b22c4fd68e7f39681d605585889f9511108
Author: naddy at openbsd.org <naddy at openbsd.org>
Date:   Thu Dec 19 15:09:30 2019 +0000

    upstream: Document that security key-hosted keys can act as host
    
    keys.
    
    Update the list of default host key algorithms in ssh_config.5 and
    sshd_config.5.  Copy the description of the SecurityKeyProvider
    option to sshd_config.5.
    
    ok jmc@
    
    OpenBSD-Commit-ID: edadf3566ab5e94582df4377fee3b8b702c7eca0

commit bc2dc091e0ac4ff6245c43a61ebe12c7e9ea0b7f
Author: dtucker at openbsd.org <dtucker at openbsd.org>
Date:   Thu Dec 19 03:50:01 2019 +0000

    upstream: "Forward security" -> "Forward secrecy" since that's the
    
    correct term. Add "MAC" since we use that acronym in other man pages.  ok
    naddy@
    
    OpenBSD-Commit-ID: c35529e511788586725fb63bda3459e10738c5f5

commit e905f7260d72bc0e33ef5f10a0db737ff6e77ba7
Author: naddy at openbsd.org <naddy at openbsd.org>
Date:   Tue Dec 17 16:21:07 2019 +0000

    upstream: cut obsolete lists of crypto algorithms from outline of
    
    how SSH works ok markus@ jmc@
    
    OpenBSD-Commit-ID: 8e34973f232ab48c4d4f5d07df48d501708b9160

commit f65cf1163ff01531ae02f3f9210391d0d692f699
Author: tobhe at openbsd.org <tobhe at openbsd.org>
Date:   Mon Dec 16 13:58:53 2019 +0000

    upstream: strdup may return NULL if memory allocation fails. Use
    
    the safer xstrdup which fatals on allocation failures.
    
    ok markus@
    
    OpenBSD-Commit-ID: 8b608d387120630753cbcb8110e0b019c0c9a0d0

commit 57634bfc5708477826c0be265ddc59b9d83e4886
Author: djm at openbsd.org <djm at openbsd.org>
Date:   Mon Dec 16 03:16:58 2019 +0000

    upstream: sort sk-* methods behind their plain key methods cousins
    
    for now
    
    OpenBSD-Commit-ID: c97e22c2b28c0d12ee389b8b4ef5f2ada7908828

Summary of changes:
 auth.c        | 14 +++++++-------
 myproposal.h  |  2 +-
 packet.c      |  6 +++---
 readconf.c    | 14 ++++++--------
 ssh_config.5  | 26 +++++++++++++++++---------
 sshd.8        | 13 +++++--------
 sshd_config.5 | 30 +++++++++++++++++++++---------
 7 files changed, 60 insertions(+), 45 deletions(-)

-- 
To stop receiving notification emails like this one, please contact
djm at mindrot.org.


More information about the openssh-commits mailing list