diff options
author | Pierre Ossman <ossman@cendio.se> | 2018-06-07 14:57:17 +0200 |
---|---|---|
committer | Pierre Ossman <ossman@cendio.se> | 2018-06-07 14:57:17 +0200 |
commit | e6bad200e470ea675a00980b83008d63197e1858 (patch) | |
tree | c234b8e4cfb98d182d6193c6bf8ceb396fc81874 | |
parent | 13364d70ddfd47e25793f03c70e05b1f42e7731c (diff) | |
download | novnc-e6bad200e470ea675a00980b83008d63197e1858.tar.gz |
Add debug logging for Tight authentication
Makes it easier to diagnose user issues when we can see what the
server and noVNC are trying to negotiate.
-rw-r--r-- | core/rfb.js | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/core/rfb.js b/core/rfb.js index d336d6c..2f4e815 100644 --- a/core/rfb.js +++ b/core/rfb.js @@ -1006,6 +1006,8 @@ RFB.prototype = { serverSupportedTunnelTypes[cap_code] = { vendor: cap_vendor, signature: cap_signature }; } + Log.Debug("Server Tight tunnel types: " + serverSupportedTunnelTypes); + // choose the notunnel type if (serverSupportedTunnelTypes[0]) { if (serverSupportedTunnelTypes[0].vendor != clientSupportedTunnelTypes[0].vendor || @@ -1013,6 +1015,7 @@ RFB.prototype = { return this._fail("Client's tunnel type had the incorrect " + "vendor or signature"); } + Log.Debug("Selected tunnel type: " + clientSupportedTunnelTypes[0]); this._sock.send([0, 0, 0, 0]); // use NOTUNNEL return false; // wait until we receive the sub auth count to continue } else { @@ -1058,9 +1061,12 @@ RFB.prototype = { serverSupportedTypes.push(capabilities); } + Log.Debug("Server Tight authentication types: " + serverSupportedTypes); + for (let authType in clientSupportedTypes) { if (serverSupportedTypes.indexOf(authType) != -1) { this._sock.send([0, 0, 0, clientSupportedTypes[authType]]); + Log.Debug("Selected authentication type: " + authType); switch (authType) { case 'STDVNOAUTH__': // no auth |