diff --git a/apps/routerconsole/java/src/net/i2p/router/web/helpers/ConfigKeyringHelper.java b/apps/routerconsole/java/src/net/i2p/router/web/helpers/ConfigKeyringHelper.java index 90e499ef4b..e9f4966a33 100644 --- a/apps/routerconsole/java/src/net/i2p/router/web/helpers/ConfigKeyringHelper.java +++ b/apps/routerconsole/java/src/net/i2p/router/web/helpers/ConfigKeyringHelper.java @@ -2,10 +2,13 @@ package net.i2p.router.web.helpers; import java.io.IOException; import java.io.StringWriter; +import java.util.List; import java.util.Map; +import net.i2p.data.BlindData; import net.i2p.data.Destination; import net.i2p.data.Hash; +import net.i2p.data.PrivateKey; import net.i2p.data.SessionKey; import net.i2p.router.TunnelPoolSettings; import net.i2p.router.web.HelperBase; @@ -39,12 +42,18 @@ public class ConfigKeyringHelper extends HelperBase { /** * @since 0.9.33 moved from PersistentKeyRing + * @param local true for local (Enc. LS1 only), false for remote (all types) */ private void render(StringBuilder buf, boolean local) { buf.append("\n
").append(_t("Destination")) - .append(" | ").append(_t("Name")) - .append(" | ").append(_t("Encryption Key")) - .append(" | ").append(_t("Name")); + if (!local) + buf.append(" | ").append(_t("Type")); + buf.append(" | ").append(_t("Encryption Key")); + if (!local) + buf.append(" | ").append(_t("Lookup Password"));
+ buf.append("");
+ // Enc. LS1
for (Map.Entry");
+ if (!local)
+ buf.append(_t("Encrypted")).append(" | ");
SessionKey sk = e.getValue();
buf.append(sk.toBase64());
+ if (!local)
+ buf.append(" | ");
buf.append(" | \n");
}
+ // LS2
+ if (!local) {
+ List");
+ buf.append(h.toBase32());
+ buf.append(" | ");
+ String host = _context.namingService().reverseLookup(h);
+ if (host != null)
+ buf.append(host);
+ buf.append(" | ");
+ int type = bd.getAuthType();
+ PrivateKey pk = bd.getAuthPrivKey();
+ String secret = bd.getSecret();
+ String s;
+ if (type == BlindData.AUTH_DH) {
+ if (secret != null)
+ s = _t("Blinded with lookup password and per-user key");
+ else
+ s = _t("Blinded with per-user key");
+ } else if (type == BlindData.AUTH_PSK) {
+ if (secret != null)
+ s = _t("Blinded with lookup password and shared key");
+ else
+ s = _t("Blinded with shared key");
+ } else {
+ if (secret != null)
+ s = _t("Blinded with lookup password");
+ else
+ s = _t("Blinded");
+ }
+ buf.append(s);
+ buf.append(" | ");
+ if (pk != null) {
+ // display pubkey for DH for sharing with server
+ if (type == BlindData.AUTH_DH)
+ buf.append(pk.toPublic().toBase64());
+ else
+ buf.append(pk.toBase64());
+ }
+ buf.append(" | ");
+ if (secret != null)
+ buf.append(secret);
+ buf.append(" | |
---|