This is an automated email from the ASF dual-hosted git repository.

twolf pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/mina-sshd.git

commit 11a9277500499030fecab6e3fe2c4a973e74cefc
Author: Thomas Wolf <tw...@apache.org>
AuthorDate: Thu Jan 23 19:18:52 2025 +0100

    Update documentation
---
 CHANGES.md        |  2 ++
 docs/standards.md | 10 +++++-----
 2 files changed, 7 insertions(+), 5 deletions(-)

diff --git a/CHANGES.md b/CHANGES.md
index cee3a126d..04312e988 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -44,6 +44,8 @@
 * [GH-626](https://github.com/apache/mina-sshd/issues/626) Enable 
`Streaming.Async` for `ChannelDirectTcpip`
 * [GH-628](https://github.com/apache/mina-sshd/issues/628) SFTP: fix reading 
directories with trailing blanks in the name
 * [GH-636](https://github.com/apache/mina-sshd/issues/636) Fix handling of 
unsupported key types in `known_hosts` file
+* [GH-642](https://github.com/apache/mina-sshd/issues/642) Do not use 
`SecureRandom.getInstanceString()` due to possible entropy starvation 
(regression in 2.14.0)
+* [GH-654](https://github.com/apache/mina-sshd/issues/654) Fix test dependency 
for assertj in `sshd-contrib`
 
 ## New Features
 
diff --git a/docs/standards.md b/docs/standards.md
index 34cf56a56..c424d60e4 100644
--- a/docs/standards.md
+++ b/docs/standards.md
@@ -82,7 +82,7 @@ supports the extension and then use it, but our server does 
not publish it as be
 ### Ciphers
 
 * aes128-cbc, aes128-ctr, aes192-cbc, aes192-ctr, aes256-cbc, aes256-ctr, 
arcfour128, arcfour256, blowfish-cbc,
-aes128-...@openssh.com, aes256-...@openssh.com, chacha20-poly1...@openssh.com, 
3des-cbc
+aes128-gcm@<!-- -->openssh.com, aes256-gcm@<!-- -->openssh.com, 
chacha20-poly1305@<!-- -->openssh.com, 3des-cbc
 
 ### Digests
 
@@ -90,8 +90,8 @@ aes128-...@openssh.com, aes256-...@openssh.com, 
chacha20-poly1...@openssh.com, 3
 
 ### Macs
 
-* hmacmd5, hmacmd596, hmacsha1, hmacsha196, hmacsha256, hmacsha512, 
hmac-sha2-256-...@openssh.com
-, hmac-sha2-512-...@openssh.com, hmac-sha1-...@openssh.com
+* hmacmd5, hmacmd596, hmacsha1, hmacsha196, hmacsha256, hmacsha512, 
hmac-sha2-256-etm@<!-- -->openssh.com
+, hmac-sha2-512-etm@<!-- -->openssh.com, hmac-sha1-etm@<!-- -->openssh.com
 
 ### Key exchange
 
@@ -105,13 +105,13 @@ mlkem1024nistp384-sha384.
 
 ### Compressions
 
-* none, zlib, z...@openssh.com
+* none, zlib, zlib@<!-- -->openssh.com
 
 ### Signatures/Keys
 
 * ssh-dss, ssh-rsa, rsa-sha2-256, rsa-sha2-512, nistp256, nistp384, nistp521
 , ssh-ed25519 (requires Bouncy Castle or `net.i2p.crypto.eddsa` as an optional 
dependency - if both are present, `net.i2p.crypto.eddsa` is used)
-, sk-ecdsa-sha2-nistp...@openssh.com, sk-ssh-ed25519@<!-- -->openssh.com
+, sk-ecdsa-sha2-nistp256@<!-- -->openssh.com, sk-ssh-ed25519@<!-- 
-->openssh.com
 , ssh-rsa-cert-v01@<!-- -->openssh.com, ssh-dss-cert-v01<!-- -->@openssh.com, 
ssh-ed25519-cert-v01@<!-- -->openssh.com
 , ecdsa-sha2-nistp256-cert-v01@<!-- -->openssh.com, 
ecdsa-sha2-nistp384-cert-v01<!-- -->@openssh.com
 , ecdsa-sha2-nistp521-cert-v01<!-- -->@openssh.com

Reply via email to