summaryrefslogtreecommitdiff
path: root/ssh-agent.c
AgeCommit message (Expand)Author
12 daysupstream: handle multiple messages in a single read()djm@openbsd.org
2020-08-27upstream: support for user-verified FIDO keysdjm@openbsd.org
2020-07-15upstream: some language improvements; ok markusdjm@openbsd.org
2020-06-26upstream: updated argument name for -P in first synopsis wasjmc@openbsd.org
2020-06-22upstream: better terminology for permissions; feedback & ok markus@djm@openbsd.org
2020-06-22upstream: Correct synopsis and usage for the options accepted whendtucker@openbsd.org
2020-05-27upstream: Restrict ssh-agent from signing web challenges for FIDOdjm@openbsd.org
2020-03-13upstream: initialize seconds for debug message; ok djmmarkus@openbsd.org
2020-02-28upstream: change explicit_bzero();free() to freezero()jsg@openbsd.org
2020-02-07upstream: Replace "security key" with "authenticator" in programnaddy@openbsd.org
2020-01-25upstream: process security key provider via realpath() in agent,djm@openbsd.org
2020-01-25upstream: expose PKCS#11 key labels/X.509 subjects as commentsdjm@openbsd.org
2020-01-23upstream: Replace all calls to signal(2) with a wrapper arounddtucker@openbsd.org
2019-12-14upstream: use ssh-sk-helper for all security key signing operationsdjm@openbsd.org
2019-11-20upstream: revert previous: naddy pointed out what's meant tojmc@openbsd.org
2019-11-20upstream: -c and -s do not make sense with -k; reshuffle -k intojmc@openbsd.org
2019-11-20upstream: additional missing stdarg.h includes when built withoutnaddy@openbsd.org
2019-11-17upstream: always use ssh-sk-helper, even for the internal USB HIDdjm@openbsd.org
2019-11-15upstream: unshield security key privkey before attempting signaturedjm@openbsd.org
2019-11-15upstream: don't consult dlopen whitelist for internal security keydjm@openbsd.org
2019-11-15upstream: show the "please touch your security key" notifier whendjm@openbsd.org
2019-11-15upstream: directly support U2F/FIDO2 security keys in OpenSSH bydjm@openbsd.org
2019-11-15upstream: fix shield/unshield for xmss keys: - in ssh-agent we needmarkus@openbsd.org
2019-11-13upstream: security keys typically need to be tapped/touched indjm@openbsd.org
2019-11-13upstream: enable ed25519 support; ok djmmarkus@openbsd.org
2019-11-01upstream: Refactor signing - use sshkey_sign for everything,djm@openbsd.org
2019-11-01upstream: ssh-agent support for U2F/FIDO keysdjm@openbsd.org
2019-10-28Only use RLIMIT_NOFILE if it's defined.Darren Tucker
2019-07-05upstream: When system calls indicate an error they return -1, notderaadt@openbsd.org
2019-06-21upstream: Add protection for private keys at rest in RAM againstdjm@openbsd.org
2019-06-14upstream: process agent requests for RSA certificate private keys usingdjm@openbsd.org
2019-06-08upstream: Replace calls to ssh_malloc_init() by a static init ofotto@openbsd.org
2019-01-23upstream: backoff reading messages from active connections when thedjm@openbsd.org
2018-11-23refactor libcrypto initialisationDamien Miller
2018-11-16upstream: typo in error message; caught by Debian lintian, viadjm@openbsd.org
2018-05-11upstream: implement EMFILE mitigation for ssh-agent: remember thedjm@openbsd.org
2018-04-10upstream: lots of typos in comments/docs. Patch from Karsten Weissdjm@openbsd.org
2018-04-10upstream: don't kill ssh-agent's listening socket entriely if wedjm@openbsd.org
2018-02-26upstream: Add experimental support for PQC XMSS keys (Extendedmarkus@openbsd.org
2018-01-23upstream commitdjm@openbsd.org
2017-11-15upstream commitdjm@openbsd.org@openbsd.org
2017-11-15upstream commitdjm@openbsd.org@openbsd.org
2017-07-24upstream commitdjm@openbsd.org
2017-07-21upstream commitdjm@openbsd.org
2017-07-21upstream commitdjm@openbsd.org
2017-05-01upstream commitdjm@openbsd.org
2017-05-01upstream commitdjm@openbsd.org
2017-05-01upstream commitdjm@openbsd.org
2017-03-15upstream commitderaadt@openbsd.org
2017-03-15upstream commitdjm@openbsd.org