upstream: ssh(1) no longer supports being setuid root. Remove reference

to crc32 which went with protocol 1.  Pointed out by deraadt@.

OpenBSD-Commit-ID: f8763c25fd96ed91dd1abdab5667fd2e27e377b6
This commit is contained in:
dtucker@openbsd.org 2018-07-27 03:55:22 +00:00 committed by Damien Miller
parent 4492e2ec4e
commit c12033e102

View File

@ -61,7 +61,7 @@ these programs.
code in packet.c does not concern itself with packet types or their
execution; it contains code to build packets, to receive them and
extract data from them, and the code to compress and/or encrypt
packets. CRC code comes from crc32.c.
packets.
- The code in packet.c calls the buffer manipulation routines
(buffer.c, bufaux.c), compression routines (zlib), and the
@ -105,12 +105,6 @@ these programs.
calls client_loop in clientloop.c. This does the real work for
the session.
- The client is suid root. It tries to temporarily give up this
rights while reading the configuration data. The root
privileges are only used to make the connection (from a
privileged socket). Any extra privileges are dropped before
calling ssh_login.
Pseudo-tty manipulation and tty modes
- Code to allocate and use a pseudo tty is in pty.c. Code to
@ -164,4 +158,4 @@ these programs.
uidswap.c uid-swapping
xmalloc.c "safe" malloc routines
$OpenBSD: OVERVIEW,v 1.13 2018/07/10 06:45:29 djm Exp $
$OpenBSD: OVERVIEW,v 1.14 2018/07/27 03:55:22 dtucker Exp $