summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorrelyea%netscape.com <devnull@localhost>2002-05-22 23:13:05 +0000
committerrelyea%netscape.com <devnull@localhost>2002-05-22 23:13:05 +0000
commit1fcc5dd972efe8f04dc0929fecad4bd70dba724c (patch)
tree19edf681a55a474ecbd871482e4938c66aca3857 /security
parentf66105f32067d52042cf81a102df581f7dc251b8 (diff)
downloadnss-hg-1fcc5dd972efe8f04dc0929fecad4bd70dba724c.tar.gz
Refresh token cache after login on tokens that need to log in before they
could read their certs.
Diffstat (limited to 'security')
-rw-r--r--security/nss/lib/pk11wrap/pk11slot.c5
1 files changed, 5 insertions, 0 deletions
diff --git a/security/nss/lib/pk11wrap/pk11slot.c b/security/nss/lib/pk11wrap/pk11slot.c
index 5ac8d00bd..6d93bc650 100644
--- a/security/nss/lib/pk11wrap/pk11slot.c
+++ b/security/nss/lib/pk11wrap/pk11slot.c
@@ -54,6 +54,7 @@
#include "dev.h"
#include "dev3hack.h"
#include "pki3hack.h"
+#include "pkim.h"
/*************************************************************
@@ -1142,6 +1143,10 @@ PK11_DoPassword(PK11SlotInfo *slot, PRBool loadCerts, void *wincx)
}
if (rv == SECSuccess) {
rv = pk11_CheckVerifyTest(slot);
+ if (!PK11_IsFriendly(slot)) {
+ nssTrustDomain_UpdateCachedTokenCerts(slot->nssToken->trustDomain,
+ slot->nssToken);
+ }
} else if (!attempt) PORT_SetError(SEC_ERROR_BAD_PASSWORD);
return rv;
}