index
:
openssh
master
openssh
Fast-forward packages
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
ssh-agent.c
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
upstream: highly polished whitespace, mostly fixing spaces-for-tab
djm@openbsd.org
2021-04-03
1
-4
/
+4
*
upstream: factor SSH_AGENT_CONSTRAIN_EXTENSION parsing into its own
djm@openbsd.org
2021-02-17
1
-41
/
+59
*
upstream: memleak on error path; ok markus@
djm@openbsd.org
2021-02-05
1
-2
/
+2
*
upstream: fix the values of enum sock_type
djm@openbsd.org
2021-01-30
1
-4
/
+4
*
upstream: give typedef'd struct a struct name; makes the fuzzer I'm
djm@openbsd.org
2021-01-30
1
-2
/
+2
*
upstream: Logical not bitwise or. ok djm@
dtucker@openbsd.org
2021-01-27
1
-2
/
+2
*
upstream: Remove unused variables leftover from refactoring. ok
dtucker@openbsd.org
2021-01-26
1
-6
/
+4
*
upstream: refactor key constraint parsing in ssh-agent
djm@openbsd.org
2021-01-26
1
-69
/
+95
*
upstream: more ssh-agent refactoring
djm@openbsd.org
2021-01-26
1
-67
/
+130
*
upstream: use recallocarray to allocate the agent sockets table;
djm@openbsd.org
2021-01-26
1
-4
/
+16
*
upstream: Change convtime() from returning long to returning int.
dtucker@openbsd.org
2021-01-11
1
-2
/
+2
*
upstream: when requesting a security key touch on stderr, inform the
djm@openbsd.org
2020-11-08
1
-2
/
+2
*
upstream: use the new variant log macros instead of prepending
djm@openbsd.org
2020-10-18
1
-95
/
+77
*
upstream: There are lots of place where we want to redirect stdin,
djm@openbsd.org
2020-10-03
1
-10
/
+4
*
upstream: handle multiple messages in a single read()
djm@openbsd.org
2020-09-18
1
-6
/
+13
*
upstream: support for user-verified FIDO keys
djm@openbsd.org
2020-08-27
1
-2
/
+3
*
upstream: some language improvements; ok markus
djm@openbsd.org
2020-07-15
1
-4
/
+4
*
upstream: updated argument name for -P in first synopsis was
jmc@openbsd.org
2020-06-26
1
-2
/
+2
*
upstream: better terminology for permissions; feedback & ok markus@
djm@openbsd.org
2020-06-22
1
-12
/
+12
*
upstream: Correct synopsis and usage for the options accepted when
dtucker@openbsd.org
2020-06-22
1
-2
/
+4
*
upstream: Restrict ssh-agent from signing web challenges for FIDO
djm@openbsd.org
2020-05-27
1
-10
/
+100
*
upstream: initialize seconds for debug message; ok djm
markus@openbsd.org
2020-03-13
1
-2
/
+2
*
upstream: change explicit_bzero();free() to freezero()
jsg@openbsd.org
2020-02-28
1
-3
/
+2
*
upstream: Replace "security key" with "authenticator" in program
naddy@openbsd.org
2020-02-06
1
-3
/
+3
*
upstream: process security key provider via realpath() in agent,
djm@openbsd.org
2020-01-25
1
-7
/
+19
*
upstream: expose PKCS#11 key labels/X.509 subjects as comments
djm@openbsd.org
2020-01-25
1
-6
/
+13
*
upstream: Replace all calls to signal(2) with a wrapper around
dtucker@openbsd.org
2020-01-23
1
-5
/
+5
*
upstream: use ssh-sk-helper for all security key signing operations
djm@openbsd.org
2019-12-13
1
-140
/
+20
*
upstream: revert previous: naddy pointed out what's meant to
jmc@openbsd.org
2019-11-19
1
-3
/
+4
*
upstream: -c and -s do not make sense with -k; reshuffle -k into
jmc@openbsd.org
2019-11-19
1
-4
/
+3
*
upstream: additional missing stdarg.h includes when built without
naddy@openbsd.org
2019-11-19
1
-1
/
+1
*
upstream: always use ssh-sk-helper, even for the internal USB HID
djm@openbsd.org
2019-11-16
1
-35
/
+11
*
upstream: unshield security key privkey before attempting signature
djm@openbsd.org
2019-11-15
1
-4
/
+16
*
upstream: don't consult dlopen whitelist for internal security key
djm@openbsd.org
2019-11-15
1
-2
/
+4
*
upstream: show the "please touch your security key" notifier when
djm@openbsd.org
2019-11-15
1
-9
/
+15
*
upstream: directly support U2F/FIDO2 security keys in OpenSSH by
djm@openbsd.org
2019-11-14
1
-1
/
+8
*
upstream: fix shield/unshield for xmss keys: - in ssh-agent we need
markus@openbsd.org
2019-11-14
1
-5
/
+5
*
upstream: security keys typically need to be tapped/touched in
djm@openbsd.org
2019-11-13
1
-2
/
+11
*
upstream: enable ed25519 support; ok djm
markus@openbsd.org
2019-11-12
1
-2
/
+2
*
upstream: Refactor signing - use sshkey_sign for everything,
djm@openbsd.org
2019-10-31
1
-3
/
+4
*
upstream: ssh-agent support for U2F/FIDO keys
djm@openbsd.org
2019-10-31
1
-19
/
+199
*
Only use RLIMIT_NOFILE if it's defined.
Darren Tucker
2019-10-28
1
-0
/
+2
*
upstream: When system calls indicate an error they return -1, not
deraadt@openbsd.org
2019-07-05
1
-5
/
+5
*
upstream: Add protection for private keys at rest in RAM against
djm@openbsd.org
2019-06-21
1
-2
/
+5
*
upstream: process agent requests for RSA certificate private keys using
djm@openbsd.org
2019-06-14
1
-1
/
+6
*
upstream: Replace calls to ssh_malloc_init() by a static init of
otto@openbsd.org
2019-06-07
1
-2
/
+1
*
upstream: backoff reading messages from active connections when the
djm@openbsd.org
2019-01-23
1
-4
/
+18
*
refactor libcrypto initialisation
Damien Miller
2018-11-23
1
-4
/
+0
*
upstream: typo in error message; caught by Debian lintian, via
djm@openbsd.org
2018-11-16
1
-2
/
+2
*
upstream: implement EMFILE mitigation for ssh-agent: remember the
djm@openbsd.org
2018-05-11
1
-11
/
+49
[next]