Overview
| Comment: | Only display extended key usage if it is present in the certificate |
|---|---|
| Downloads: | Tarball | ZIP archive | SQL archive |
| Timelines: | family | ancestors | descendants | both | trunk |
| Files: | files | file ages | folders |
| SHA1: |
731ccabde63de583b623824699f2eb31 |
| User & Date: | rkeene on 2019-01-30 17:24:14 |
| Other Links: | manifest | tags |
Context
|
2019-01-30
| ||
| 17:47 | Added reload button to CACKey UI page to reload info more easily check-in: 8e5aed79dc user: rkeene tags: trunk | |
| 17:24 | Only display extended key usage if it is present in the certificate check-in: 731ccabde6 user: rkeene tags: trunk | |
| 17:23 | Fix dereferencing of cackey_pin_command when it is NULL and ensure printed buffers are truncated check-in: ce07b4406e user: rkeene tags: trunk | |
Changes
Modified build/chrome/ui.js from [8a7c575cc8] to [ae57f2ddff].
| ︙ | ︙ | |||
21 22 23 24 25 26 27 | certObj.hex = BAtohex(new Uint8Array(cert.certificate)); html += "\t<li>"; html += "\t\t" + certObj.getSubjectString() + ":" + certObj.getSerialNumberHex(); html += "\t\t<ol type=\"a\">"; html += "\t\t\t<li>Serial Number: " + certObj.getSerialNumberHex() + "</li>"; | > | > | 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 |
certObj.hex = BAtohex(new Uint8Array(cert.certificate));
html += "\t<li>";
html += "\t\t" + certObj.getSubjectString() + ":" + certObj.getSerialNumberHex();
html += "\t\t<ol type=\"a\">";
html += "\t\t\t<li>Serial Number: " + certObj.getSerialNumberHex() + "</li>";
try {
html += "\t\t\t<li>Usage: " + X509.getExtKeyUsageString(certObj.hex) + "</li>";
} catch (_) {};
html += "\t\t</ol>";
html += "\t</li>";
}
html += "</ol>";
delete certObj;
|
| ︙ | ︙ |