Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package openssh for openSUSE:Factory checked in at 2026-05-13 17:18:26 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/openssh (Old) and /work/SRC/openSUSE:Factory/.openssh.new.1966 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "openssh" Wed May 13 17:18:26 2026 rev:203 rq:1352555 version:10.3p1 Changes: -------- +++ only whitespace diff in changes, re-diffing --- /work/SRC/openSUSE:Factory/openssh/openssh.changes 2026-05-10 16:47:10.729966563 +0200 +++ /work/SRC/openSUSE:Factory/.openssh.new.1966/openssh.changes 2026-05-13 17:18:29.357176413 +0200 @@ -1,0 +2,7 @@ +Mon May 11 18:45:43 UTC 2026 - Hans Petter Jansson <[email protected]> + +- Update openssh-7.7p1-fips.patch (bsc#1264787): Add the rijndael + alias to the list of all ciphers, making the FIPS list a strict + subset. + +------------------------------------------------------------------- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ openssh.spec: same change ++++++ openssh-7.7p1-fips.patch ++++++ --- /var/tmp/diff_new_pack.MliZGT/_old 2026-05-13 17:18:33.157335180 +0200 +++ /var/tmp/diff_new_pack.MliZGT/_new 2026-05-13 17:18:33.161335348 +0200 @@ -39,7 +39,16 @@ #ifdef WITH_OPENSSL #ifndef OPENSSL_NO_DES { "3des-cbc", 8, 24, 0, 0, CFLAG_CBC, EVP_des_ede3_cbc }, -@@ -109,8 +112,50 @@ static const struct sshcipher ciphers[] +@@ -90,6 +93,8 @@ static const struct sshcipher ciphers[] + { "aes128-cbc", 16, 16, 0, 0, CFLAG_CBC, EVP_aes_128_cbc }, + { "aes192-cbc", 16, 24, 0, 0, CFLAG_CBC, EVP_aes_192_cbc }, + { "aes256-cbc", 16, 32, 0, 0, CFLAG_CBC, EVP_aes_256_cbc }, ++ { "[email protected]", ++ 16, 32, 0, 0, CFLAG_CBC, EVP_aes_256_cbc }, + { "aes128-ctr", 16, 16, 0, 0, 0, EVP_aes_128_ctr }, + { "aes192-ctr", 16, 24, 0, 0, 0, EVP_aes_192_ctr }, + { "aes256-ctr", 16, 32, 0, 0, 0, EVP_aes_256_ctr }, +@@ -109,8 +114,50 @@ static const struct sshcipher ciphers[] { NULL, 0, 0, 0, 0, 0, NULL } }; @@ -90,7 +99,7 @@ /* Returns a comma-separated list of supported ciphers. */ char * cipher_alg_list(char sep, int auth_only) -@@ -119,7 +164,7 @@ cipher_alg_list(char sep, int auth_only) +@@ -119,7 +166,7 @@ cipher_alg_list(char sep, int auth_only) const struct sshcipher *c; char sep_str[2] = {sep, '\0'}; @@ -99,7 +108,7 @@ if ((c->flags & CFLAG_INTERNAL) != 0) continue; if (auth_only && c->auth_len == 0) -@@ -193,19 +238,19 @@ const struct sshcipher * +@@ -193,19 +240,19 @@ const struct sshcipher * cipher_by_name(const char *name) { const struct sshcipher *c; @@ -124,7 +133,7 @@ if (names == NULL || strcmp(names, "") == 0) return 0; -@@ -213,7 +258,7 @@ ciphers_valid(const char *names) +@@ -213,7 +260,7 @@ ciphers_valid(const char *names) return 0; for ((p = strsep(&cp, CIPHER_SEP)); p && *p != '\0'; (p = strsep(&cp, CIPHER_SEP))) { @@ -133,7 +142,7 @@ if (c == NULL || (c->flags & CFLAG_INTERNAL) != 0) { free(cipher_list); return 0; -@@ -223,6 +268,31 @@ ciphers_valid(const char *names) +@@ -223,6 +270,31 @@ ciphers_valid(const char *names) return 1; }
