diff --git a/src/apps/relay/turn_admin_server.c b/src/apps/relay/turn_admin_server.c
index fb79fb81..b8ba215e 100644
--- a/src/apps/relay/turn_admin_server.c
+++ b/src/apps/relay/turn_admin_server.c
@@ -1808,7 +1808,7 @@ static void write_pc_page(ioa_socket_handle s)
str_buffer_append(sb,"
\r\n");
str_buffer_append(sb,home_link);
str_buffer_append(sb,"
\r\n");
- str_buffer_append(sb,"Configuration Parameters:
\r\n");
+ str_buffer_append(sb,"Configuration Parameters:
\r\n");
str_buffer_append(sb,"| Parameter | Value |
\r\n");
{
@@ -2266,7 +2266,7 @@ static void write_ps_page(ioa_socket_handle s, const char* client_protocol, cons
str_buffer_append(sb,"\r\n");
str_buffer_append(sb,"\r\n");
- str_buffer_append(sb,"TURN Sessions:
\r\n");
+ str_buffer_append(sb,"
TURN Sessions:
\r\n");
str_buffer_append(sb,"| N | Session ID | User | Realm | Origin | Age, secs | Expires, secs | Client protocol | Relay protocol | Client addr | Server addr | Relay addr (IPv4) | Relay addr (IPv6) | Fingerprints | Mobile | TLS method | TLS cipher | BPS (allocated) | Packets | Rate | Peers |
\r\n");
size_t total_sz = https_print_sessions(sb,client_protocol,user_pattern,max_sessions,cs);
@@ -2420,14 +2420,19 @@ static void write_users_page(ioa_socket_handle s, const u08bits *add_user, const
str_buffer_append(sb,"\" value=\"");
str_buffer_append(sb,"");
str_buffer_append(sb,"\"");
- str_buffer_append(sb,">
\r\n");
+ str_buffer_append(sb,">
\r\n");
+
+ if(turn_params.shatype == SHATYPE_SHA256)
+ str_buffer_append(sb,"SHA type: SHA256
\r\n");
+ else
+ str_buffer_append(sb,"SHA type: SHA1
\r\n");
str_buffer_append(sb,"
");
str_buffer_append(sb,"\r\n");
str_buffer_append(sb,"\r\n");
- str_buffer_append(sb,"Users:
\r\n");
+ str_buffer_append(sb,"
Users:
\r\n");
str_buffer_append(sb,"\r\n");
str_buffer_append(sb,"| N | Name | ");
if(!current_socket->as_eff_realm[0]) {
@@ -2580,7 +2585,7 @@ static void write_shared_secrets_page(ioa_socket_handle s, const char* add_secre
str_buffer_append(sb,"\r\n");
str_buffer_append(sb,"\r\n");
- str_buffer_append(sb,"Secrets:
\r\n");
+ str_buffer_append(sb,"
Shared secrets:
\r\n");
str_buffer_append(sb,"\r\n");
str_buffer_append(sb,"| N | Value | ");
if(!current_socket->as_eff_realm[0]) {
@@ -2730,7 +2735,7 @@ static void write_origins_page(ioa_socket_handle s, const char* add_origin, cons
str_buffer_append(sb,"\r\n");
}
- str_buffer_append(sb,"Origins:
\r\n");
+ str_buffer_append(sb,"
Origins:
\r\n");
str_buffer_append(sb,"\r\n");
str_buffer_append(sb,"| N | Value | ");
if(!current_socket->as_eff_realm[0]) {
@@ -3019,9 +3024,9 @@ static void handle_https(ioa_socket_handle s, ioa_network_buffer_handle nbh)
STRCPY(u,add_user);
STRCPY(r,add_realm);
STRCPY(p,pwd);
- stun_produce_integrity_key_str(u, r, p, key, SHATYPE_DEFAULT);
+ stun_produce_integrity_key_str(u, r, p, key, turn_params.shatype);
size_t i = 0;
- size_t sz = get_hmackey_size(SHATYPE_DEFAULT);
+ size_t sz = get_hmackey_size(turn_params.shatype);
int maxsz = (int) (sz * 2) + 1;
char *s = skey;
for (i = 0; (i < sz) && (maxsz > 2); i++) {
|---|
|---|
|---|