summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/ssh-agent.c
AgeCommit message (Collapse)Author
2017-07-24g/c unused variable; make a little more portableDamien Miller
2017-07-19switch from select() to poll() for the ssh-agent mainloop; ok markusDamien Miller
2017-07-01remove post-SSHv1 removal dead code from rsa.c and merge theDamien Miller
remaining bit that it still used into ssh-rsa.c; ok markus
2017-04-30flense SSHv1 support from ssh-agent, considerably simplifying itDamien Miller
ok markus
2017-04-30remove KEY_RSA1Damien Miller
ok markus@
2017-04-30unifdef WITH_SSH1Damien Miller
ok markus@
2017-03-15accidents happen to the best of us; ok djmTheo de Raadt
2017-03-15fix regression in 7.4: deletion of PKCS#11-hosted keys would failDamien Miller
unless they were specified by full physical pathname. Report and fix from Jakub Jelen via bz#2682; ok dtucker@
2017-01-04relax PKCS#11 whitelist a bit to allow libexec as well as libDamien Miller
directories.
2016-11-30add a whitelist of paths from which ssh-agent will load (viaDamien Miller
ssh-pkcs11-helper) a PKCS#11 module; ok markus@
2016-09-12Add MAXIMUM(), MINIMUM(), and ROUNDUP() to misc.h, then use those definitionsTheo de Raadt
rather than pulling <sys/param.h> and unknown namespace pollution. ok djm markus dtucker
2016-05-02fix signed/unsigned errors reported by clang-3.7; addDamien Miller
sshbuf_dup_string() to replace a common idiom of strdup(sshbuf_ptr()) with better safety checking; feedback and ok markus@
2016-02-15Add a function to enable security-related malloc_options. With and okDarren Tucker
deraadt@, something similar has been in the snaps for a while.
2015-12-11Add "id" to ssh-agent pledge for subprocess support.Doug Hogan
Found the hard way by Jan Johansson when using ssh-agent with X. Also, rearranged proc/exec and retval to match other pledge calls in the tree. ok djm@
2015-12-11fflush stdout so that output is seen even when running in debug mode whenDarren Tucker
output may otherwise not be flushed. Patch from dustin at null-ptr.net.
2015-12-11correct error messages; from Tomas Kuthan bz#2507Damien Miller
2015-12-04implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth)Markus Friedl
based on draft-rsa-dsa-sha2-256-03.txt and draft-ssh-ext-info-04.txt; with & ok djm@
2015-12-02Add "cpath" to the ssh-agent pledge so the cleanup handler can unlink().Doug Hogan
ok djm@
2015-12-02ssh-agent pledge needs proc for askpass; spotted by todd@Damien Miller
2015-12-01basic pledge() for ssh-agent, more refinement neededDamien Miller
2015-07-08no need to include the old buffer/key APIMarkus Friedl
2015-05-15Use a salted hash of the lock passphrase instead of plain text and doDarren Tucker
constant-time comparisons of it. Should prevent leaking any information about it via timing, pointed out by Ryan Castellucci. Add a 0.1s incrementing delay for each failed unlock attempt up to 10s. ok markus@ (earlier version), djm@
2015-04-24combine -Dd onto one line and update usage();Jason McIntyre
2015-04-24add ssh-agent -D to leave ssh-agent in foreground without enablingDamien Miller
debug mode; bz#2381 ok dtucker@
2015-04-24rename xrealloc() to xreallocarray() since it follows that form.Theo de Raadt
ok djm
2015-03-04make ssh-add -D work with !SSH1 agentDamien Miller
2015-03-03add SSH1 Makefile knob to make it easier to build without SSH1 support;Damien Miller
ok markus@
2015-01-28update to new API (key_fingerprint => sshkey_fingerprint)Damien Miller
check sshkey_fingerprint return values; ok markus
2015-01-16Replace <sys/param.h> with <limits.h> and other less dirty headers whereTheo de Raadt
possible. Annotate <sys/param.h> lines with their current reasons. Switch to PATH_MAX, NGROUPS_MAX, HOST_NAME_MAX+1, LOGIN_NAME_MAX, etc. Change MIN() and MAX() to local definitions of MINIMUM() and MAXIMUM() where sensible to avoid pulling in the pollution. These are the files confirmed through binary verification. ok guenther, millert, doug (helped with the verification protocol)
2015-01-14fix small regression: ssh-agent would return a success messageDamien Miller
but an empty signature if asked to sign using an unknown key; ok markus@
2015-01-14switch to sshbuf/sshkey; with & ok djm@Markus Friedl
2014-12-21tweak previous;Jason McIntyre
2014-12-21Add FingerprintHash option to control algorithm used for keyDamien Miller
fingerprints. Default changes from MD5 to SHA256 and format from hex to base64. Feedback and ok naddy@ markus@
2014-11-18Nuke more obvious #include duplications.Kenneth R Westerback
ok deraadt@ millert@ tedu@
2014-07-25Clear buffer used for handling messages. This prevents keys beingDarren Tucker
left in memory after they have been expired or deleted in some cases (but note that ssh-agent is setgid so you would still need root to access them). Pointed out by Kevin Burns, ok deraadt
2014-07-18restore umask around listener socket creation (dropped in streamlocal patchDamien Miller
merge)
2014-07-15Add support for Unix domain socket forwarding. A remote TCP portTodd C. Miller
may be forwarded to a local Unix domain socket and vice versa or both ends may be a Unix domain socket. This is a reimplementation of the streamlocal patches by William Ahern from: http://www.25thandclement.com/~william/projects/streamlocal.html OK djm@ markus@
2014-07-03Only cleanup agent socket in the main agent process and not in anyDamien Miller
subprocesses it may have started (e.g. forked askpass). Fixes agent sockets being zapped when askpass processes fatal(); bz#2236 patch from Dmitry V. Levin
2014-06-24New key API: refactor key-related functions to be more library-like,Damien Miller
existing API is offered as a set of wrappers. with and ok markus@ Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew Dempsky and Ron Bowes for a detailed review a few months ago.
2014-04-29make compiling against OpenSSL optional (make OPENSSL=no);Markus Friedl
reduces algorithms to curve25519, aes-ctr, chacha, ed25519; allows us to explore further options; with and ok djm
2014-03-15Improve usage() and documentation towards the standard form. In particular,Theo de Raadt
this line saves a lot of man page reading time. usage: ssh-keygen [-q] [-b bits] [-t dsa | ecdsa | ed25519 | rsa | rsa1] [-N new_passphrase] [-C comment] [-f output_keyfile] ok schwarze jmc
2014-02-02convert memset of potentially-private data to explicit_bzero()Damien Miller
2014-01-27replace openssl MD5 with our ssh_digest_*; ok djm@Markus Friedl
2013-12-19bz#2186: don't crash (NULL deref) when deleting PKCS#11 keys from an agentDamien Miller
that has a mix of normal and PKCS#11 keys; fix from jay AT slushpupie.com; ok dtucker
2013-12-06support ed25519 keys (hostkeys and user identities) using the public domainMarkus Friedl
ed25519 reference code from SUPERCOP, see http://ed25519.cr.yp.to/software.html feedback, help & ok djm@
2013-12-06new private key format, bcrypt as KDF by default; details in PROTOCOL.key;Markus Friedl
feedback and lots help from djm; ok djm@
2013-12-06move private key (de)serialization to key.c; ok djmMarkus Friedl
2013-07-20call cleanup_handler on SIGINT when in debug mode to ensure socketsDamien Miller
are cleaned up on manual exit; bz#2120
2013-06-02Make parent_alive_interval time_t to avoid signed/unsigned comparisonDarren Tucker
2013-06-01Use clock_gettime(CLOCK_MONOTONIC ...) for ssh timers so that things likeDarren Tucker
keepalives and rekeying will work properly over clock steps. Suggested by markus@, "looks good" djm@.