summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/ssh-agent.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* highly polished whitespace, mostly fixing spaces-for-tab and baddjm2021-04-031-4/+4
* factor SSH_AGENT_CONSTRAIN_EXTENSION parsing into its own functiondjm2021-02-121-41/+59
* memleak on error path; ok markus@djm2021-02-021-2/+2
* fix the values of enum sock_typedjm2021-01-291-4/+4
* give typedef'd struct a struct name; makes the fuzzer I'm writing a bitdjm2021-01-291-2/+2
* Logical not bitwise or. ok djm@dtucker2021-01-271-2/+2
* Remove unused variables leftover from refactoring. ok djm@dtucker2021-01-261-6/+4
* refactor key constraint parsing in ssh-agentdjm2021-01-261-69/+95
* more ssh-agent refactoringdjm2021-01-261-67/+130
* use recallocarray to allocate the agent sockets table; also cleardjm2021-01-261-4/+16
* Change convtime() from returning long to returning int. On platformsdtucker2021-01-111-2/+2
* when requesting a security key touch on stderr, inform the user oncedjm2020-11-081-2/+2
* use the new variant log macros instead of prepending __func__ anddjm2020-10-181-95/+77
* There are lots of place where we want to redirect stdin, stdoutdjm2020-10-031-10/+4
* handle multiple messages in a single read()djm2020-09-181-6/+13
* support for user-verified FIDO keysdjm2020-08-271-2/+3
* some language improvements; ok markusdjm2020-07-051-4/+4
* updated argument name for -P in first synopsis was missed in previous;jmc2020-06-221-2/+2
* better terminology for permissions; feedback & ok markus@djm2020-06-221-12/+12
* Correct synopsis and usage for the options accepted when passing a commanddtucker2020-06-191-2/+4
* Restrict ssh-agent from signing web challenges for FIDO keys.djm2020-05-261-10/+100
* initialize seconds for debug message; ok djmmarkus2020-03-061-2/+2
* change explicit_bzero();free() to freezero()jsg2020-02-261-3/+2
* Replace "security key" with "authenticator" in program messages.naddy2020-02-061-3/+3
* process security key provider via realpath() in agent, avoidsdjm2020-01-251-7/+19
* expose PKCS#11 key labels/X.509 subjects as commentsdjm2020-01-251-6/+13
* Replace all calls to signal(2) with a wrapper around sigaction(2).dtucker2020-01-231-5/+5
* use ssh-sk-helper for all security key signing operationsdjm2019-12-131-140/+20
* revert previous: naddy pointed out what's meant to happen. rethink needed...jmc2019-11-191-3/+4
* -c and -s do not make sense with -k; reshuffle -k into the main synopsis/usage;jmc2019-11-191-4/+3
* additional missing stdarg.h includes when built without WITH_OPENSSL; ok djm@naddy2019-11-181-1/+2
* always use ssh-sk-helper, even for the internal USB HID support.djm2019-11-161-33/+11
* unshield security key privkey before attempting signature indjm2019-11-151-4/+16
* don't consult dlopen whitelist for internal security key provider;djm2019-11-151-2/+4
* show the "please touch your security key" notifier when using thedjm2019-11-151-9/+15
* directly support U2F/FIDO2 security keys in OpenSSH by linkingdjm2019-11-141-1/+6
* fix shield/unshield for xmss keys:markus2019-11-131-5/+5
* security keys typically need to be tapped/touched in order to performdjm2019-11-121-2/+11
* enable ed25519 support; ok djmmarkus2019-11-121-2/+2
* Refactor signing - use sshkey_sign for everything, including the newdjm2019-10-311-3/+4
* ssh-agent support for U2F/FIDO keysdjm2019-10-311-19/+199
* When system calls indicate an error they return -1, not some arbitraryderaadt2019-06-281-5/+5
* Add protection for private keys at rest in RAM against speculationdjm2019-06-211-2/+5
* process agent requests for RSA certificate private keys using correctdjm2019-06-141-1/+6
* Replace calls to ssh_malloc_init() by a static init of malloc_options.otto2019-06-061-2/+1
* backoff reading messages from active connections when the input bufferdjm2019-01-221-4/+18
* typo in error message; caught by Debian lintian, via Colin Watsondjm2018-11-091-2/+2
* implement EMFILE mitigation for ssh-agent: remember the fd rlimitdjm2018-05-111-11/+49
* lots of typos in comments/docs. Patch from Karsten Weiss after checkingdjm2018-04-101-2/+2
* don't kill ssh-agent's listening socket entriely if we fail to accept adjm2018-04-091-4/+3