Check-in [c8a8a96d25]
Overview
Comment:Updated to do additional error checking
Downloads: Tarball | ZIP archive | SQL archive
Timelines: family | ancestors | descendants | both | trunk
Files: files | file ages | folders
SHA1: c8a8a96d25eb2a136e823d599511a4761652d4dc
User & Date: rkeene on 2016-03-11 21:16:58
Other Links: manifest | tags
Context
2016-03-11
21:17
Made error reporting less verbose check-in: 51935c7f5c user: rkeene tags: trunk
21:16
Updated to do additional error checking check-in: c8a8a96d25 user: rkeene tags: trunk
20:56
Updated to allow updatePassword to prompt if the new password is blank check-in: 33225e8766 user: rkeene tags: trunk
Changes

Modified hunter2 from [745b700e51] to [60941617be].

247
248
249
250
251
252
253





254
255
256
257
258
259
260
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265







+
+
+
+
+







	puts ""
	flush stdout

	return $password
}

proc _getPassword {name} {
	set exists [db eval {SELECT 1 FROM passwords WHERE name = $name LIMIT 1;}]
	if {$exists != "1"} {
		return -code error "Password \"$name\" does not exists."
	}

	foreach slotInfoDict [_listCertificates] {
		unset -nocomplain slotInfo
		array set slotInfo $slotInfoDict

		set pubkey $slotInfo(pubkey)
		set prompt $slotInfo(prompt)

280
281
282
283
284
285
286





287
288
289
290
291
292
293
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303







+
+
+
+
+







		}
	}

	return -code error "No valid keys"
}

proc _modifyPublicKeys {passwordName userNames sql} {
	set exists [db eval {SELECT 1 FROM passwords WHERE name = $passwordName LIMIT 1;}]
	if {$exists != "1"} {
		return -code error "Password \"$passwordName\" does not exists."
	}

	set publicKeys [list]

	db eval {SELECT publicKey FROM passwords WHERE name = $passwordName;} row {
		lappend publicKeys $row(publicKey)
	}

	set changeRequired 0