diff --git a/amt-desktop-0.0.2.js b/amt-desktop-0.0.2.js index 2ab8001..4893aee 100644 --- a/amt-desktop-0.0.2.js +++ b/amt-desktop-0.0.2.js @@ -768,7 +768,7 @@ var CreateAmtRemoteDesktop = function (divid, scrolldiv) { if ((obj.onKvmDataAck == true) && (obj.onKvmDataPending.length > 0)) { obj.sendKvmData(obj.onKvmDataPending.shift()); } // Send pending data } else { console.log('Got KVM clipboard data:', d); - if (urlvars && urlvars['kvmdatatrace']) { console.log('KVM-ClipBoard-Recv(' + x.length + '): ' + rstr2hex(x) + ', ' + x); } + if (urlvars && urlvars['kvmdatatrace']) { console.log('KVM-ClipBoard-Recv(' + d.length + '): ' + rstr2hex(d) + ', ' + d); } } } // ###END###{DesktopInband} diff --git a/forge.js/forge.bundle.js b/forge.js/forge.bundle.js index 96721f7..75bf9c6 100644 --- a/forge.js/forge.bundle.js +++ b/forge.js/forge.bundle.js @@ -18480,9 +18480,9 @@ pki.certificateFromAsn1 = function(obj, computeHash) { // get oid var oid = asn1.derToOid(capture.publicKeyOid); - if(oid !== pki.oids['rsaEncryption']) { - throw new Error('Cannot read public key. OID is not RSA.'); - } + //if(oid !== pki.oids['rsaEncryption']) { + //throw new Error('Cannot read public key. OID is not RSA.'); + //} // create certificate var cert = pki.createCertificate(); @@ -18602,8 +18602,13 @@ pki.certificateFromAsn1 = function(obj, computeHash) { cert.extensions = []; } + if (oid === pki.oids.rsaEncryption) { + // convert RSA public key from ASN.1 + cert.publicKey = pki.publicKeyFromAsn1(capture.subjectPublicKeyInfo); + } + // convert RSA public key from ASN.1 - cert.publicKey = pki.publicKeyFromAsn1(capture.subjectPublicKeyInfo); + //cert.publicKey = pki.publicKeyFromAsn1(capture.subjectPublicKeyInfo); return cert; }; diff --git a/forge.js/x509.js b/forge.js/x509.js index 29f4b46..8cc1faa 100644 --- a/forge.js/x509.js +++ b/forge.js/x509.js @@ -1275,9 +1275,9 @@ pki.certificateFromAsn1 = function(obj, computeHash) { // get oid var oid = asn1.derToOid(capture.publicKeyOid); - if(oid !== pki.oids['rsaEncryption']) { - throw new Error('Cannot read public key. OID is not RSA.'); - } + //if(oid !== pki.oids['rsaEncryption']) { + //throw new Error('Cannot read public key. OID is not RSA.'); + //} // create certificate var cert = pki.createCertificate(); @@ -1397,8 +1397,13 @@ pki.certificateFromAsn1 = function(obj, computeHash) { cert.extensions = []; } - // convert RSA public key from ASN.1 - cert.publicKey = pki.publicKeyFromAsn1(capture.subjectPublicKeyInfo); + if (oid === pki.oids.rsaEncryption) { + // convert RSA public key from ASN.1 + cert.publicKey = pki.publicKeyFromAsn1(capture.subjectPublicKeyInfo); + } + + // convert RSA public key from ASN.1 + //cert.publicKey = pki.publicKeyFromAsn1(capture.subjectPublicKeyInfo); return cert; }; diff --git a/index-old.html b/index-old.html new file mode 100644 index 0000000..85eb8da --- /dev/null +++ b/index-old.html @@ -0,0 +1,13547 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + MeshCommander + + + LMS MeshCommander + + + + ScriptCommander + + + + Intel® Active Management Technology + + + Intel® System Defense Utility + + + Intel® Manageability Commander + + + Intel® Unite - Hardware Management + + + + + + + + +
+ + + + + + + +
+

Intel® Active Management Technology

+

+
+ +
+ + +
+
+
+ +
+ + + +
+
+
+ +
+ + + + + + + +
+

Intel® Manageability Commander

+

+
+ +
+ + + + + + + + + +
+ + +

Manageability Switchbox

+ + + + + +

MeshCommander

+ + +

LMS MeshCommander

+ + + +

ScriptCommander

+ + + + +

Intel® Active Management Technology

+ + +

Intel® Standard Manageability

+ + +

Intel® Small Buisness Technology

+ +

+
+ + + + + + + + + + +
+ + + + + + + + +
+
+   +   +
+
+ +
+ +
+ + +
+ + +
+ + +
+ + +
+ + +
+ +
+
+
+ + Disconnected + + + Loading... + + +

+ + +

+ +
+ + + + + + + + + + +