summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/ssh-agent.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* updated argument name for -P in first synopsis was missed in previous;jmc2020-06-221-2/+2
* better terminology for permissions; feedback & ok markus@djm2020-06-221-12/+12
* Correct synopsis and usage for the options accepted when passing a commanddtucker2020-06-191-2/+4
* Restrict ssh-agent from signing web challenges for FIDO keys.djm2020-05-261-10/+100
* initialize seconds for debug message; ok djmmarkus2020-03-061-2/+2
* change explicit_bzero();free() to freezero()jsg2020-02-261-3/+2
* Replace "security key" with "authenticator" in program messages.naddy2020-02-061-3/+3
* process security key provider via realpath() in agent, avoidsdjm2020-01-251-7/+19
* expose PKCS#11 key labels/X.509 subjects as commentsdjm2020-01-251-6/+13
* Replace all calls to signal(2) with a wrapper around sigaction(2).dtucker2020-01-231-5/+5
* use ssh-sk-helper for all security key signing operationsdjm2019-12-131-140/+20
* revert previous: naddy pointed out what's meant to happen. rethink needed...jmc2019-11-191-3/+4
* -c and -s do not make sense with -k; reshuffle -k into the main synopsis/usage;jmc2019-11-191-4/+3
* additional missing stdarg.h includes when built without WITH_OPENSSL; ok djm@naddy2019-11-181-1/+2
* always use ssh-sk-helper, even for the internal USB HID support.djm2019-11-161-33/+11
* unshield security key privkey before attempting signature indjm2019-11-151-4/+16
* don't consult dlopen whitelist for internal security key provider;djm2019-11-151-2/+4
* show the "please touch your security key" notifier when using thedjm2019-11-151-9/+15
* directly support U2F/FIDO2 security keys in OpenSSH by linkingdjm2019-11-141-1/+6
* fix shield/unshield for xmss keys:markus2019-11-131-5/+5
* security keys typically need to be tapped/touched in order to performdjm2019-11-121-2/+11
* enable ed25519 support; ok djmmarkus2019-11-121-2/+2
* Refactor signing - use sshkey_sign for everything, including the newdjm2019-10-311-3/+4
* ssh-agent support for U2F/FIDO keysdjm2019-10-311-19/+199
* When system calls indicate an error they return -1, not some arbitraryderaadt2019-06-281-5/+5
* Add protection for private keys at rest in RAM against speculationdjm2019-06-211-2/+5
* process agent requests for RSA certificate private keys using correctdjm2019-06-141-1/+6
* Replace calls to ssh_malloc_init() by a static init of malloc_options.otto2019-06-061-2/+1
* backoff reading messages from active connections when the input bufferdjm2019-01-221-4/+18
* typo in error message; caught by Debian lintian, via Colin Watsondjm2018-11-091-2/+2
* implement EMFILE mitigation for ssh-agent: remember the fd rlimitdjm2018-05-111-11/+49
* lots of typos in comments/docs. Patch from Karsten Weiss after checkingdjm2018-04-101-2/+2
* don't kill ssh-agent's listening socket entriely if we fail to accept adjm2018-04-091-4/+3
* Add experimental support for PQC XMSS keys (Extended Hash-Based Signatures)markus2018-02-231-5/+19
* Drop compatibility hacks for some ancient SSH implementations, includingdjm2018-01-231-3/+1
* downgrade a couple more request parsing errors from process-fatal todjm2017-11-151-10/+23
* fix regression in 7.6: failure to parse a signature request messagedjm2017-11-151-3/+6
* g/c unused variable; make a little more portabledjm2017-07-241-5/+3
* switch from select() to poll() for the ssh-agent mainloop; ok markusdjm2017-07-191-125/+183
* remove post-SSHv1 removal dead code from rsa.c and merge thedjm2017-07-011-2/+1
* flense SSHv1 support from ssh-agent, considerably simplifying itdjm2017-04-301-162/+90
* remove KEY_RSA1djm2017-04-301-16/+12
* unifdef WITH_SSH1djm2017-04-301-172/+1
* accidents happen to the best of us; ok djmderaadt2017-03-151-1/+2
* fix regression in 7.4: deletion of PKCS#11-hosted keys would faildjm2017-03-151-4/+11
* relax PKCS#11 whitelist a bit to allow libexec as well as libdjm2017-01-041-2/+2
* add a whitelist of paths from which ssh-agent will load (viadjm2016-11-301-8/+35
* Add MAXIMUM(), MINIMUM(), and ROUNDUP() to misc.h, then use those definitionsderaadt2016-09-121-5/+4
* fix signed/unsigned errors reported by clang-3.7; adddjm2016-05-021-7/+8
* Add a function to enable security-related malloc_options. With and okdtucker2016-02-151-1/+2