forked from I2P_Developers/i2p.i2p
compile fixes after prop
This commit is contained in:
@ -124,7 +124,7 @@ public class ConsolePasswordManager extends RouterPasswordManager {
|
||||
*
|
||||
* @return success or nothing to migrate
|
||||
*/
|
||||
public boolean migrateConsole() {
|
||||
private boolean migrateConsole() {
|
||||
synchronized(ConsolePasswordManager.class) {
|
||||
if (_context.getBooleanProperty(PROP_MIGRATED))
|
||||
return true;
|
||||
@ -205,6 +205,8 @@ public class ConsolePasswordManager extends RouterPasswordManager {
|
||||
ConsolePasswordManager pm = new ConsolePasswordManager(ctx);
|
||||
if (!pm.migrate())
|
||||
System.out.println("Fail 1");
|
||||
if (!pm.migrateConsole())
|
||||
System.out.println("Fail 1a");
|
||||
|
||||
System.out.println("Test plain");
|
||||
if (!pm.savePlain("type1", "user1", "pw1"))
|
||||
|
@ -469,9 +469,9 @@ public class RouterConsoleRunner implements RouterApp {
|
||||
SslSelectChannelConnector sssll = new SslSelectChannelConnector();
|
||||
// the keystore path and password
|
||||
sssll.setKeystore(keyStore.getAbsolutePath());
|
||||
sssll.setPassword(ctx.getProperty(PROP_KEYSTORE_PASSWORD, DEFAULT_KEYSTORE_PASSWORD));
|
||||
sssll.setPassword(_context.getProperty(PROP_KEYSTORE_PASSWORD, DEFAULT_KEYSTORE_PASSWORD));
|
||||
// the X.509 cert password (if not present, verifyKeyStore() returned false)
|
||||
sssll.setKeyPassword(ctx.getProperty(PROP_KEY_PASSWORD, "thisWontWork"));
|
||||
sssll.setKeyPassword(_context.getProperty(PROP_KEY_PASSWORD, "thisWontWork"));
|
||||
sssll.setUseDirectBuffers(false); // default true seems to be leaky
|
||||
ssll = sssll;
|
||||
} else {
|
||||
@ -479,9 +479,9 @@ public class RouterConsoleRunner implements RouterApp {
|
||||
SslSocketConnector sssll = new SslSocketConnector();
|
||||
// the keystore path and password
|
||||
sssll.setKeystore(keyStore.getAbsolutePath());
|
||||
sssll.setPassword(ctx.getProperty(PROP_KEYSTORE_PASSWORD, DEFAULT_KEYSTORE_PASSWORD));
|
||||
sssll.setPassword(_context.getProperty(PROP_KEYSTORE_PASSWORD, DEFAULT_KEYSTORE_PASSWORD));
|
||||
// the X.509 cert password (if not present, verifyKeyStore() returned false)
|
||||
sssll.setKeyPassword(ctx.getProperty(PROP_KEY_PASSWORD, "thisWontWork"));
|
||||
sssll.setKeyPassword(_context.getProperty(PROP_KEY_PASSWORD, "thisWontWork"));
|
||||
ssll = sssll;
|
||||
}
|
||||
ssll.setHost(host);
|
||||
|
Reference in New Issue
Block a user