summaryrefslogtreecommitdiff
path: root/ssh-agent.c
Commit message (Expand)AuthorAgeFilesLines
* upstream: fix memleak in process_extension(); oss-fuzz issue #42719djm@openbsd.org2022-01-011-1/+2
* upstream: spelling ok dtucker@jsg@openbsd.org2022-01-011-2/+2
* remove sys/param.h in -portable, after upstreamDamien Miller2021-12-221-1/+0
* upstream: Use hostkey parsed from hostbound userauth requestdjm@openbsd.org2021-12-201-3/+23
* upstream: agent support for parsing hostkey-bound signaturesdjm@openbsd.org2021-12-201-7/+17
* upstream: ssh-agent side of destination constraintsdjm@openbsd.org2021-12-201-42/+463
* upstream: ssh-agent side of bindingdjm@openbsd.org2021-12-201-9/+168
* upstream: check for POLLHUP wherever we check for POLLINdjm@openbsd.org2021-11-181-4/+3
* upstream: highly polished whitespace, mostly fixing spaces-for-tabdjm@openbsd.org2021-04-031-4/+4
* upstream: factor SSH_AGENT_CONSTRAIN_EXTENSION parsing into its owndjm@openbsd.org2021-02-171-41/+59
* upstream: memleak on error path; ok markus@djm@openbsd.org2021-02-051-2/+2
* upstream: fix the values of enum sock_typedjm@openbsd.org2021-01-301-4/+4
* upstream: give typedef'd struct a struct name; makes the fuzzer I'mdjm@openbsd.org2021-01-301-2/+2
* upstream: Logical not bitwise or. ok djm@dtucker@openbsd.org2021-01-271-2/+2
* upstream: Remove unused variables leftover from refactoring. okdtucker@openbsd.org2021-01-261-6/+4
* upstream: refactor key constraint parsing in ssh-agentdjm@openbsd.org2021-01-261-69/+95
* upstream: more ssh-agent refactoringdjm@openbsd.org2021-01-261-67/+130
* upstream: use recallocarray to allocate the agent sockets table;djm@openbsd.org2021-01-261-4/+16
* upstream: Change convtime() from returning long to returning int.dtucker@openbsd.org2021-01-111-2/+2
* upstream: when requesting a security key touch on stderr, inform thedjm@openbsd.org2020-11-091-2/+2
* upstream: use the new variant log macros instead of prependingdjm@openbsd.org2020-10-181-95/+77
* upstream: There are lots of place where we want to redirect stdin,djm@openbsd.org2020-10-031-10/+4
* upstream: handle multiple messages in a single read()djm@openbsd.org2020-09-181-6/+13
* upstream: support for user-verified FIDO keysdjm@openbsd.org2020-08-271-2/+3
* upstream: some language improvements; ok markusdjm@openbsd.org2020-07-151-4/+4
* upstream: updated argument name for -P in first synopsis wasjmc@openbsd.org2020-06-261-2/+2
* upstream: better terminology for permissions; feedback & ok markus@djm@openbsd.org2020-06-221-12/+12
* upstream: Correct synopsis and usage for the options accepted whendtucker@openbsd.org2020-06-221-2/+4
* upstream: Restrict ssh-agent from signing web challenges for FIDOdjm@openbsd.org2020-05-271-10/+100
* upstream: initialize seconds for debug message; ok djmmarkus@openbsd.org2020-03-131-2/+2
* upstream: change explicit_bzero();free() to freezero()jsg@openbsd.org2020-02-281-3/+2
* upstream: Replace "security key" with "authenticator" in programnaddy@openbsd.org2020-02-071-3/+3
* upstream: process security key provider via realpath() in agent,djm@openbsd.org2020-01-251-7/+19
* upstream: expose PKCS#11 key labels/X.509 subjects as commentsdjm@openbsd.org2020-01-251-6/+13
* upstream: Replace all calls to signal(2) with a wrapper arounddtucker@openbsd.org2020-01-231-5/+5
* upstream: use ssh-sk-helper for all security key signing operationsdjm@openbsd.org2019-12-141-140/+20
* upstream: revert previous: naddy pointed out what's meant tojmc@openbsd.org2019-11-201-3/+4
* upstream: -c and -s do not make sense with -k; reshuffle -k intojmc@openbsd.org2019-11-201-4/+3
* upstream: additional missing stdarg.h includes when built withoutnaddy@openbsd.org2019-11-201-1/+1
* upstream: always use ssh-sk-helper, even for the internal USB HIDdjm@openbsd.org2019-11-171-35/+11
* upstream: unshield security key privkey before attempting signaturedjm@openbsd.org2019-11-151-4/+16
* upstream: don't consult dlopen whitelist for internal security keydjm@openbsd.org2019-11-151-2/+4
* upstream: show the "please touch your security key" notifier whendjm@openbsd.org2019-11-151-9/+15
* upstream: directly support U2F/FIDO2 security keys in OpenSSH bydjm@openbsd.org2019-11-151-1/+8
* upstream: fix shield/unshield for xmss keys: - in ssh-agent we needmarkus@openbsd.org2019-11-151-5/+5
* upstream: security keys typically need to be tapped/touched indjm@openbsd.org2019-11-131-2/+11
* upstream: enable ed25519 support; ok djmmarkus@openbsd.org2019-11-131-2/+2
* upstream: Refactor signing - use sshkey_sign for everything,djm@openbsd.org2019-11-011-3/+4
* upstream: ssh-agent support for U2F/FIDO keysdjm@openbsd.org2019-11-011-19/+199
* Only use RLIMIT_NOFILE if it's defined.Darren Tucker2019-10-281-0/+2