diff options
author | Jeffrey Sharkey <jsharkey@jsharkey.org> | 2008-11-02 23:12:26 +0000 |
---|---|---|
committer | Jeffrey Sharkey <jsharkey@jsharkey.org> | 2008-11-02 23:12:26 +0000 |
commit | fd7e5a93b95ca7ddb51f0306b14aa0fe5c9a300c (patch) | |
tree | 144ca1c42a3f9eb4bb4de83be02a8e8eb97f2268 /lib/src/main/java/com/trilead/ssh2/auth | |
parent | c60120dc76aa2f4f1d200f9b3916a3d5b8ee3d2b (diff) | |
download | sshlib-fd7e5a93b95ca7ddb51f0306b14aa0fe5c9a300c.tar.gz sshlib-fd7e5a93b95ca7ddb51f0306b14aa0fe5c9a300c.tar.bz2 sshlib-fd7e5a93b95ca7ddb51f0306b14aa0fe5c9a300c.zip |
* added "in-memory" function to backend service so that unlocked keys can be stored there. this is also disable-able from settings
* "use any key" for a host will only look through unlocked in-memory keys
* implemented "load on start" functionality in backend service
* implemented "import key" which lets you select any openssh-formatted key (including passworded-ones) from simple /sdcard browser
* cleaned up context menu in pubkeylist, now includes toggle checkbox for "load at start" but only available when password-less and non-imported
* clicking a key in pubkeylist will toggle its backend status (decrypt and put in memory, or remove from memory)
* created preference for screen orientation forcing versus auto, but still need to test
* created preference for camera button behavior, but still need to test
Diffstat (limited to 'lib/src/main/java/com/trilead/ssh2/auth')
-rw-r--r-- | lib/src/main/java/com/trilead/ssh2/auth/AuthenticationManager.java | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/lib/src/main/java/com/trilead/ssh2/auth/AuthenticationManager.java b/lib/src/main/java/com/trilead/ssh2/auth/AuthenticationManager.java index 99d62ca..43c226a 100644 --- a/lib/src/main/java/com/trilead/ssh2/auth/AuthenticationManager.java +++ b/lib/src/main/java/com/trilead/ssh2/auth/AuthenticationManager.java @@ -233,7 +233,9 @@ public class AuthenticationManager implements MessageHandler PacketUserauthRequestPublicKey ua = new PacketUserauthRequestPublicKey("ssh-connection", user,
"ssh-rsa", pk_enc, rsa_sig_enc);
+
tm.sendMessage(ua.getPayload());
+
}
else
{
@@ -241,7 +243,6 @@ public class AuthenticationManager implements MessageHandler }
byte[] ar = getNextMessage();
-
if (ar[0] == Packets.SSH_MSG_USERAUTH_SUCCESS)
{
authenticated = true;
@@ -264,6 +265,7 @@ public class AuthenticationManager implements MessageHandler }
catch (IOException e)
{
+e.printStackTrace();
tm.close(e, false);
throw (IOException) new IOException("Publickey authentication failed.").initCause(e);
}
|