diff --git a/src/apps/relay/turn_admin_server.c b/src/apps/relay/turn_admin_server.c index fb79fb81..b8ba215e 100644 --- a/src/apps/relay/turn_admin_server.c +++ b/src/apps/relay/turn_admin_server.c @@ -1808,7 +1808,7 @@ static void write_pc_page(ioa_socket_handle s) str_buffer_append(sb,"
\r\n"); str_buffer_append(sb,home_link); str_buffer_append(sb,"
\r\n"); - str_buffer_append(sb,"Configuration Parameters:
\r\n"); + str_buffer_append(sb,"Configuration Parameters:

\r\n"); str_buffer_append(sb,"\r\n"); { @@ -2266,7 +2266,7 @@ static void write_ps_page(ioa_socket_handle s, const char* client_protocol, cons str_buffer_append(sb,"\r\n"); str_buffer_append(sb,"\r\n"); - str_buffer_append(sb,"TURN Sessions:
ParameterValue
\r\n"); + str_buffer_append(sb,"
TURN Sessions:

\r\n"); str_buffer_append(sb,"\r\n"); size_t total_sz = https_print_sessions(sb,client_protocol,user_pattern,max_sessions,cs); @@ -2420,14 +2420,19 @@ static void write_users_page(ioa_socket_handle s, const u08bits *add_user, const str_buffer_append(sb,"\" value=\""); str_buffer_append(sb,""); str_buffer_append(sb,"\""); - str_buffer_append(sb,">
\r\n"); + str_buffer_append(sb,">

\r\n"); + + if(turn_params.shatype == SHATYPE_SHA256) + str_buffer_append(sb,"SHA type: SHA256
\r\n"); + else + str_buffer_append(sb,"SHA type: SHA1
\r\n"); str_buffer_append(sb,"
"); str_buffer_append(sb,"\r\n"); str_buffer_append(sb,"\r\n"); - str_buffer_append(sb,"Users:
\r\n"); + str_buffer_append(sb,"
Users:

\r\n"); str_buffer_append(sb,"
NSession IDUserRealmOriginAge, secsExpires, secsClient protocolRelay protocolClient addrServer addrRelay addr (IPv4)Relay addr (IPv6)FingerprintsMobileTLS methodTLS cipherBPS (allocated)PacketsRatePeers
\r\n"); str_buffer_append(sb,""); if(!current_socket->as_eff_realm[0]) { @@ -2580,7 +2585,7 @@ static void write_shared_secrets_page(ioa_socket_handle s, const char* add_secre str_buffer_append(sb,"\r\n"); str_buffer_append(sb,"\r\n"); - str_buffer_append(sb,"Secrets:
\r\n"); + str_buffer_append(sb,"
Shared secrets:

\r\n"); str_buffer_append(sb,"
NName
\r\n"); str_buffer_append(sb,""); if(!current_socket->as_eff_realm[0]) { @@ -2730,7 +2735,7 @@ static void write_origins_page(ioa_socket_handle s, const char* add_origin, cons str_buffer_append(sb,"\r\n"); } - str_buffer_append(sb,"Origins:
\r\n"); + str_buffer_append(sb,"
Origins:

\r\n"); str_buffer_append(sb,"
NValue
\r\n"); str_buffer_append(sb,""); if(!current_socket->as_eff_realm[0]) { @@ -3019,9 +3024,9 @@ static void handle_https(ioa_socket_handle s, ioa_network_buffer_handle nbh) STRCPY(u,add_user); STRCPY(r,add_realm); STRCPY(p,pwd); - stun_produce_integrity_key_str(u, r, p, key, SHATYPE_DEFAULT); + stun_produce_integrity_key_str(u, r, p, key, turn_params.shatype); size_t i = 0; - size_t sz = get_hmackey_size(SHATYPE_DEFAULT); + size_t sz = get_hmackey_size(turn_params.shatype); int maxsz = (int) (sz * 2) + 1; char *s = skey; for (i = 0; (i < sz) && (maxsz > 2); i++) {
NValue