-
Jim Fulton authored
necessitated by changes in the security policy that requires access to source objects and attribute names to check acces to objects obtained through attribute access.
bf3537c7
necessitated by changes in the security policy that requires access to source objects and attribute names to check acces to objects obtained through attribute access.