Overview
Comment: | Only display extended key usage if it is present in the certificate |
---|---|
Downloads: | Tarball | ZIP archive | SQL archive |
Timelines: | family | ancestors | descendants | both | trunk |
Files: | files | file ages | folders |
SHA1: |
731ccabde63de583b623824699f2eb31 |
User & Date: | rkeene on 2019-01-30 17:24:14 |
Other Links: | manifest | tags |
Context
2019-01-30
| ||
17:47 | Added reload button to CACKey UI page to reload info more easily check-in: 8e5aed79dc user: rkeene tags: trunk | |
17:24 | Only display extended key usage if it is present in the certificate check-in: 731ccabde6 user: rkeene tags: trunk | |
17:23 | Fix dereferencing of cackey_pin_command when it is NULL and ensure printed buffers are truncated check-in: ce07b4406e user: rkeene tags: trunk | |
Changes
Modified build/chrome/ui.js from [8a7c575cc8] to [ae57f2ddff].
︙ | ︙ | |||
21 22 23 24 25 26 27 | certObj.hex = BAtohex(new Uint8Array(cert.certificate)); html += "\t<li>"; html += "\t\t" + certObj.getSubjectString() + ":" + certObj.getSerialNumberHex(); html += "\t\t<ol type=\"a\">"; html += "\t\t\t<li>Serial Number: " + certObj.getSerialNumberHex() + "</li>"; | > | > | 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 | certObj.hex = BAtohex(new Uint8Array(cert.certificate)); html += "\t<li>"; html += "\t\t" + certObj.getSubjectString() + ":" + certObj.getSerialNumberHex(); html += "\t\t<ol type=\"a\">"; html += "\t\t\t<li>Serial Number: " + certObj.getSerialNumberHex() + "</li>"; try { html += "\t\t\t<li>Usage: " + X509.getExtKeyUsageString(certObj.hex) + "</li>"; } catch (_) {}; html += "\t\t</ol>"; html += "\t</li>"; } html += "</ol>"; delete certObj; |
︙ | ︙ |