aboutsummaryrefslogtreecommitdiffstats
path: root/src/com/trilead/ssh2/auth/AuthenticationManager.java
diff options
context:
space:
mode:
authorJeffrey Sharkey <jsharkey@jsharkey.org>2008-11-02 23:12:26 +0000
committerJeffrey Sharkey <jsharkey@jsharkey.org>2008-11-02 23:12:26 +0000
commit7a4f3578afc79f409ed8da118d9809557cf5ec46 (patch)
tree4f5b5b9e936842e24c07ce3c77c5f71ca9926248 /src/com/trilead/ssh2/auth/AuthenticationManager.java
parentccc3a32792175a561fc2c75ccc4fd9f441295830 (diff)
downloadconnectbot-7a4f3578afc79f409ed8da118d9809557cf5ec46.tar.gz
connectbot-7a4f3578afc79f409ed8da118d9809557cf5ec46.tar.bz2
connectbot-7a4f3578afc79f409ed8da118d9809557cf5ec46.zip
* added "in-memory" function to backend service so that unlocked keys can be stored there. this is also disable-able from settings
* "use any key" for a host will only look through unlocked in-memory keys * implemented "load on start" functionality in backend service * implemented "import key" which lets you select any openssh-formatted key (including passworded-ones) from simple /sdcard browser * cleaned up context menu in pubkeylist, now includes toggle checkbox for "load at start" but only available when password-less and non-imported * clicking a key in pubkeylist will toggle its backend status (decrypt and put in memory, or remove from memory) * created preference for screen orientation forcing versus auto, but still need to test * created preference for camera button behavior, but still need to test
Diffstat (limited to 'src/com/trilead/ssh2/auth/AuthenticationManager.java')
-rw-r--r--src/com/trilead/ssh2/auth/AuthenticationManager.java4
1 files changed, 3 insertions, 1 deletions
diff --git a/src/com/trilead/ssh2/auth/AuthenticationManager.java b/src/com/trilead/ssh2/auth/AuthenticationManager.java
index 99d62ca..43c226a 100644
--- a/src/com/trilead/ssh2/auth/AuthenticationManager.java
+++ b/src/com/trilead/ssh2/auth/AuthenticationManager.java
@@ -233,7 +233,9 @@ public class AuthenticationManager implements MessageHandler
PacketUserauthRequestPublicKey ua = new PacketUserauthRequestPublicKey("ssh-connection", user,
"ssh-rsa", pk_enc, rsa_sig_enc);
+
tm.sendMessage(ua.getPayload());
+
}
else
{
@@ -241,7 +243,6 @@ public class AuthenticationManager implements MessageHandler
}
byte[] ar = getNextMessage();
-
if (ar[0] == Packets.SSH_MSG_USERAUTH_SUCCESS)
{
authenticated = true;
@@ -264,6 +265,7 @@ public class AuthenticationManager implements MessageHandler
}
catch (IOException e)
{
+e.printStackTrace();
tm.close(e, false);
throw (IOException) new IOException("Publickey authentication failed.").initCause(e);
}