Overview
Comment: | Improved SSH agent |
---|---|
Downloads: | Tarball | ZIP archive | SQL archive |
Timelines: | family | ancestors | descendants | both | trunk |
Files: | files | file ages | folders |
SHA1: |
43f92f8f98cb9e1bef41faa37bfa9608 |
User & Date: | rkeene on 2019-01-31 07:23:46 |
Other Links: | manifest | tags |
Context
2019-01-31
| ||
13:25 | Better handling for unapproved apps and dealing with non-RSA signing attempts check-in: d756b0ea34 user: rkeene tags: trunk | |
07:23 | Improved SSH agent check-in: 43f92f8f98 user: rkeene tags: trunk | |
07:16 | Added SSH agent support check-in: 5d6a50ef48 user: rkeene tags: trunk | |
Changes
Modified build/chrome/ssh-agent.js from [d68e90b355] to [f8ff078c88].
︙ | ︙ | |||
84 85 86 87 88 89 90 | return({ value: result, output: input.slice(info.value) }); } | < < < < < < < < < < < < | 84 85 86 87 88 89 90 91 92 93 94 95 96 97 | return({ value: result, output: input.slice(info.value) }); } function cackeySSHAgentEncodeToUTF8Array(str) { var utf8 = []; if (typeof(str) === "string") { str = str.split("").map(function(c) { return(c.charCodeAt(0)); }); |
︙ | ︙ | |||
309 310 311 312 313 314 315 | */ if ((flags & flagMeaning.SSH_AGENT_RSA_SHA2_512) == flagMeaning.SSH_AGENT_RSA_SHA2_512) { hashMethod = "SHA512"; data = await crypto.subtle.digest("SHA-512", new Uint8Array(data)); } else if ((flags & flagMeaning.SSH_AGENT_RSA_SHA2_256) == flagMeaning.SSH_AGENT_RSA_SHA2_256) { hashMethod = "SHA256"; data = await crypto.subtle.digest("SHA-256", new Uint8Array(data)); | | | 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 | */ if ((flags & flagMeaning.SSH_AGENT_RSA_SHA2_512) == flagMeaning.SSH_AGENT_RSA_SHA2_512) { hashMethod = "SHA512"; data = await crypto.subtle.digest("SHA-512", new Uint8Array(data)); } else if ((flags & flagMeaning.SSH_AGENT_RSA_SHA2_256) == flagMeaning.SSH_AGENT_RSA_SHA2_256) { hashMethod = "SHA256"; data = await crypto.subtle.digest("SHA-256", new Uint8Array(data)); } else if (flags == 0) { hashMethod = "SHA1"; data = await crypto.subtle.digest("SHA-1", new Uint8Array(data)); } else { console.info("[cackeySSH] Sign request with flags set to", flags, "which is unsupported, failing the request."); return(null); } |
︙ | ︙ | |||
381 382 383 384 385 386 387 | sshRequest = {}; if (sshRequestID < cackeySSHAgentCommands.length) { sshRequest = cackeySSHAgentCommands[sshRequestID]; } response = null; if (!sshRequest.name) { | > | > | 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 | sshRequest = {}; if (sshRequestID < cackeySSHAgentCommands.length) { sshRequest = cackeySSHAgentCommands[sshRequestID]; } response = null; if (!sshRequest.name) { if (goog.DEBUG) { console.log("[cackeySSH] Unsupported request: ", request, "; from: ", socket.sender.id); } } else { if (goog.DEBUG) { console.log("[cackeySSH] Request: ", sshRequest.name, "; from: ", socket.sender.id); } try { response = await sshRequest.handler(request.data); |
︙ | ︙ |