This is an automated email from the ASF dual-hosted git repository.

lgoldstein pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/mina-sshd.git

commit 726629f31247220af48c412b2ad787aa1376709d
Author: Lyor Goldstein <lgoldst...@apache.org>
AuthorDate: Sun Oct 17 19:54:24 2021 +0300

    [SSHD-1216] Updated README and CHANGES files
---
 CHANGES.md | 1 +
 README.md  | 5 ++---
 2 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/CHANGES.md b/CHANGES.md
index 9c4838c..3e6508a 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -34,3 +34,4 @@
 * [SSHD-1171](https://issues.apache.org/jira/browse/SSHD-1171) 
OpenSSHCertificatesTest: certificates expire in 2030
 * [SSHD-1172](https://issues.apache.org/jira/browse/SSHD-1172) Expiration of 
OpenSshCertificates needs to compare timestamps as unsigned long
 * [SSHD-1202](https://issues.apache.org/jira/browse/SSHD-1202) Provide 
SftpErrorDataHandler callback support for SFTP client.
+* [SSHD-1216](https://issues.apache.org/jira/browse/SSHD-1216) Implement RFC 
8332 server-sig-algs on the server
diff --git a/README.md b/README.md
index d7b9b87..6c1ff82 100644
--- a/README.md
+++ b/README.md
@@ -28,9 +28,8 @@ based applications requiring SSH support.
 * [RFC 8160 - IUTF8 Terminal Mode in Secure Shell 
(SSH)](https://tools.ietf.org/html/rfc8160)
 * [RFC 8268 - More Modular Exponentiation (MODP) Diffie-Hellman (DH) Key 
Exchange (KEX) Groups for Secure Shell 
(SSH)](https://tools.ietf.org/html/rfc8268)
 * [RFC 8308 - Extension Negotiation in the Secure Shell (SSH) 
Protocol](https://tools.ietf.org/html/rfc8308)
-    * **Note:** - the code contains 
[**hooks**](./docs/event-listeners.md#kexextensionhandler) for implementing the 
RFC but
-    beyond allowing convenient support for the required protocol details, it 
does not implement any default logic that handles
-    the messages or manages the actual extension negotiation (though some 
**experimental** code is available).
+    * **Note:** - the code contains 
[**hooks**](./docs/event-listeners.md#kexextensionhandler) for implementing the 
RFC and
+    also provides default client and server implementation for 
`server-sig-algs` extensions.
 * [RFC 8332 - Use of RSA Keys with SHA-256 and SHA-512 in the Secure Shell 
(SSH) Protocol](https://tools.ietf.org/html/rfc8332)
     * **Note:** - the server side supports these signatures by default. The 
client side requires specific
     initialization - see [section 
3.3](https://tools.ietf.org/html/rfc8332#section-3.3) and also the

Reply via email to