diff options
| author | Jeffrey Sharkey <jsharkey@jsharkey.org> | 2008-11-02 23:12:26 +0000 |
|---|---|---|
| committer | Jeffrey Sharkey <jsharkey@jsharkey.org> | 2008-11-02 23:12:26 +0000 |
| commit | 7a4f3578afc79f409ed8da118d9809557cf5ec46 (patch) | |
| tree | 4f5b5b9e936842e24c07ce3c77c5f71ca9926248 /src/com/trilead/ssh2/auth/AuthenticationManager.java | |
| parent | ccc3a32792175a561fc2c75ccc4fd9f441295830 (diff) | |
| download | connectbot-7a4f3578afc79f409ed8da118d9809557cf5ec46.tar.gz connectbot-7a4f3578afc79f409ed8da118d9809557cf5ec46.tar.bz2 connectbot-7a4f3578afc79f409ed8da118d9809557cf5ec46.zip | |
* added "in-memory" function to backend service so that unlocked keys can be stored there. this is also disable-able from settings
* "use any key" for a host will only look through unlocked in-memory keys
* implemented "load on start" functionality in backend service
* implemented "import key" which lets you select any openssh-formatted key (including passworded-ones) from simple /sdcard browser
* cleaned up context menu in pubkeylist, now includes toggle checkbox for "load at start" but only available when password-less and non-imported
* clicking a key in pubkeylist will toggle its backend status (decrypt and put in memory, or remove from memory)
* created preference for screen orientation forcing versus auto, but still need to test
* created preference for camera button behavior, but still need to test
Diffstat (limited to 'src/com/trilead/ssh2/auth/AuthenticationManager.java')
| -rw-r--r-- | src/com/trilead/ssh2/auth/AuthenticationManager.java | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/src/com/trilead/ssh2/auth/AuthenticationManager.java b/src/com/trilead/ssh2/auth/AuthenticationManager.java index 99d62ca..43c226a 100644 --- a/src/com/trilead/ssh2/auth/AuthenticationManager.java +++ b/src/com/trilead/ssh2/auth/AuthenticationManager.java @@ -233,7 +233,9 @@ public class AuthenticationManager implements MessageHandler PacketUserauthRequestPublicKey ua = new PacketUserauthRequestPublicKey("ssh-connection", user,
"ssh-rsa", pk_enc, rsa_sig_enc);
+
tm.sendMessage(ua.getPayload());
+
}
else
{
@@ -241,7 +243,6 @@ public class AuthenticationManager implements MessageHandler }
byte[] ar = getNextMessage();
-
if (ar[0] == Packets.SSH_MSG_USERAUTH_SUCCESS)
{
authenticated = true;
@@ -264,6 +265,7 @@ public class AuthenticationManager implements MessageHandler }
catch (IOException e)
{
+e.printStackTrace();
tm.close(e, false);
throw (IOException) new IOException("Publickey authentication failed.").initCause(e);
}
|
