diff options
author | relyea%netscape.com <devnull@localhost> | 2002-05-22 23:13:05 +0000 |
---|---|---|
committer | relyea%netscape.com <devnull@localhost> | 2002-05-22 23:13:05 +0000 |
commit | 1fcc5dd972efe8f04dc0929fecad4bd70dba724c (patch) | |
tree | 19edf681a55a474ecbd871482e4938c66aca3857 /security | |
parent | f66105f32067d52042cf81a102df581f7dc251b8 (diff) | |
download | nss-hg-1fcc5dd972efe8f04dc0929fecad4bd70dba724c.tar.gz |
Refresh token cache after login on tokens that need to log in before they
could read their certs.
Diffstat (limited to 'security')
-rw-r--r-- | security/nss/lib/pk11wrap/pk11slot.c | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/security/nss/lib/pk11wrap/pk11slot.c b/security/nss/lib/pk11wrap/pk11slot.c index 5ac8d00bd..6d93bc650 100644 --- a/security/nss/lib/pk11wrap/pk11slot.c +++ b/security/nss/lib/pk11wrap/pk11slot.c @@ -54,6 +54,7 @@ #include "dev.h" #include "dev3hack.h" #include "pki3hack.h" +#include "pkim.h" /************************************************************* @@ -1142,6 +1143,10 @@ PK11_DoPassword(PK11SlotInfo *slot, PRBool loadCerts, void *wincx) } if (rv == SECSuccess) { rv = pk11_CheckVerifyTest(slot); + if (!PK11_IsFriendly(slot)) { + nssTrustDomain_UpdateCachedTokenCerts(slot->nssToken->trustDomain, + slot->nssToken); + } } else if (!attempt) PORT_SetError(SEC_ERROR_BAD_PASSWORD); return rv; } |