Overview
| Comment: | Updated to do additional error checking |
|---|---|
| Downloads: | Tarball | ZIP archive |
| Timelines: | family | ancestors | descendants | both | trunk |
| Files: | files | file ages | folders |
| SHA1: |
c8a8a96d25eb2a136e823d599511a476 |
| User & Date: | rkeene on 2016-03-11 21:16:58.582 |
| Other Links: | manifest | tags |
Context
|
2016-03-11
| ||
| 21:17 | Made error reporting less verbose check-in: 51935c7f5c user: rkeene tags: trunk | |
| 21:16 | Updated to do additional error checking check-in: c8a8a96d25 user: rkeene tags: trunk | |
| 20:56 | Updated to allow updatePassword to prompt if the new password is blank check-in: 33225e8766 user: rkeene tags: trunk | |
Changes
Modified hunter2
from [745b700e51]
to [60941617be].
| ︙ | |||
247 248 249 250 251 252 253 254 255 256 257 258 259 260 | 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 | + + + + + |
puts ""
flush stdout
return $password
}
proc _getPassword {name} {
set exists [db eval {SELECT 1 FROM passwords WHERE name = $name LIMIT 1;}]
if {$exists != "1"} {
return -code error "Password \"$name\" does not exists."
}
foreach slotInfoDict [_listCertificates] {
unset -nocomplain slotInfo
array set slotInfo $slotInfoDict
set pubkey $slotInfo(pubkey)
set prompt $slotInfo(prompt)
|
| ︙ | |||
280 281 282 283 284 285 286 287 288 289 290 291 292 293 | 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 | + + + + + |
}
}
return -code error "No valid keys"
}
proc _modifyPublicKeys {passwordName userNames sql} {
set exists [db eval {SELECT 1 FROM passwords WHERE name = $passwordName LIMIT 1;}]
if {$exists != "1"} {
return -code error "Password \"$passwordName\" does not exists."
}
set publicKeys [list]
db eval {SELECT publicKey FROM passwords WHERE name = $passwordName;} row {
lappend publicKeys $row(publicKey)
}
set changeRequired 0
|
| ︙ |