diff --git a/apps/i2ptunnel/jsp/editServer.jsi b/apps/i2ptunnel/jsp/editServer.jsi index aa2cc6c4fe..67261d900f 100644 --- a/apps/i2ptunnel/jsp/editServer.jsi +++ b/apps/i2ptunnel/jsp/editServer.jsi @@ -441,15 +441,15 @@ <% - if (editBean.isAdvanced() || curEncryptMode.equals("10")) { + if (curEncryptMode.equals("10")) { %> <% - } // isAdvanced() + } // mode = 10 %> - + <% int curSigType = editBean.getSigType(curTunnel, tunnelType); boolean allowBlinding = (curSigType == 7 || curSigType == 11); @@ -458,22 +458,22 @@ <% - if (editBean.isAdvanced()) { + if (true /* editBean.isAdvanced() */) { %> - - - - - - - + + + + + + <% } // isAdvanced() } // allowBlinding @@ -483,7 +483,7 @@ <% - if (allowBlinding && editBean.isAdvanced()) { + if (allowBlinding /* && editBean.isAdvanced() */) { %> <%=intl._t("Optional lookup password")%>: <% @@ -504,7 +504,7 @@ <% - if (allowBlinding && editBean.isAdvanced()) { + if (allowBlinding /* && editBean.isAdvanced() */) { %> " value="<%=editBean.getBlindedPassword(curTunnel)%>" class="freetext password" /> <% @@ -515,7 +515,7 @@ <% - if (allowBlinding && editBean.isAdvanced()) { + if (allowBlinding /* && editBean.isAdvanced() */) { boolean pskClient = curEncryptMode.equals("6") || curEncryptMode.equals("7"); boolean dhClient = curEncryptMode.equals("8") || curEncryptMode.equals("9"); if (pskClient || dhClient) { diff --git a/apps/routerconsole/java/src/net/i2p/router/web/helpers/ConfigKeyringHandler.java b/apps/routerconsole/java/src/net/i2p/router/web/helpers/ConfigKeyringHandler.java index e2583e2c77..10bc1091cc 100644 --- a/apps/routerconsole/java/src/net/i2p/router/web/helpers/ConfigKeyringHandler.java +++ b/apps/routerconsole/java/src/net/i2p/router/web/helpers/ConfigKeyringHandler.java @@ -160,7 +160,7 @@ public class ConfigKeyringHandler extends FormHandler { _context.netDb().setBlindData(bdout); addFormNotice(_t("Key for {0} added to keyring", bdout.toBase32())); if (_mode == 6 || _mode == 7) { - addFormNotice(_t("Send your new key to the server opererator") + ": " + pk.toPublic().toBase64()); + addFormNotice(_t("Send key to server opererator.") + ' ' + pk.toPublic().toBase64()); } } catch (IllegalArgumentException iae) { addFormError(_t("Invalid destination") + ": " + iae.getMessage()); diff --git a/apps/routerconsole/java/src/net/i2p/router/web/helpers/ConfigKeyringHelper.java b/apps/routerconsole/java/src/net/i2p/router/web/helpers/ConfigKeyringHelper.java index 260cf0d632..4c861fe755 100644 --- a/apps/routerconsole/java/src/net/i2p/router/web/helpers/ConfigKeyringHelper.java +++ b/apps/routerconsole/java/src/net/i2p/router/web/helpers/ConfigKeyringHelper.java @@ -79,7 +79,7 @@ public class ConfigKeyringHelper extends HelperBase { } buf.append(""); if (!local) - buf.append(_t("Encrypted")).append(""); + buf.append(_t("Encrypted")).append(" (AES)"); SessionKey sk = e.getValue(); buf.append(sk.toBase64()); if (!local) @@ -110,14 +110,14 @@ public class ConfigKeyringHelper extends HelperBase { String s; if (type == BlindData.AUTH_DH) { if (secret != null) - s = _t("Blinded with lookup password and per-user key"); + s = _t("Encrypted with lookup password") + " (DH)"; else - s = _t("Blinded with per-user key"); + s = _t("Encrypted") + " (DH)"; } else if (type == BlindData.AUTH_PSK) { if (secret != null) - s = _t("Blinded with lookup password and shared key"); + s = _t("Encrypted with lookup password") + " (PSK)"; else - s = _t("Blinded with shared key"); + s = _t("Encrypted") + " (PSK)"; } else { if (secret != null) s = _t("Blinded with lookup password"); diff --git a/apps/routerconsole/jsp/configkeyring.jsp b/apps/routerconsole/jsp/configkeyring.jsp index 3b4ba97204..3afe464a57 100644 --- a/apps/routerconsole/jsp/configkeyring.jsp +++ b/apps/routerconsole/jsp/configkeyring.jsp @@ -46,20 +46,20 @@ <%=intl._t("Type")%>: <%=intl._t("Encryption Key")%>: