mirror of
https://github.com/moonD4rk/HackBrowserData.git
synced 2026-05-19 18:58:03 +02:00
fix: per-tier master-key retrievers for mixed-cipher profiles (#579)
* fix: per-tier master-key retrievers for mixed-cipher profiles
This commit is contained in:
@@ -67,13 +67,16 @@ func platformBrowsers() []types.BrowserConfig {
|
||||
}
|
||||
}
|
||||
|
||||
// newPlatformInjector returns a closure that injects the Chromium master-key
|
||||
// retriever chain into each Browser.
|
||||
// newPlatformInjector returns a closure that wires the Linux Chromium master-key retrievers into
|
||||
// each Browser. Linux has two tiers: V10 uses the "peanuts" hardcoded password (kV10Key); V11
|
||||
// uses the D-Bus Secret Service keyring (kV11Key). V20 is nil — App-Bound Encryption is Windows-
|
||||
// only. Both V10 and V11 run independently so a profile carrying mixed cipher prefixes decrypts
|
||||
// both tiers.
|
||||
func newPlatformInjector(_ PickOptions) func(Browser) {
|
||||
retriever := keyretriever.DefaultRetriever()
|
||||
retrievers := keyretriever.DefaultRetrievers()
|
||||
return func(b Browser) {
|
||||
if s, ok := b.(retrieverSetter); ok {
|
||||
s.SetRetriever(retriever)
|
||||
if s, ok := b.(keyRetrieversSetter); ok {
|
||||
s.SetKeyRetrievers(retrievers)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user