On 03/08/2011 19:40, helpcrypto helpcrypto wrote:

>> Well... The user should be responsible for selecting the "best" slot.
>> That IMHO shouldn't be a "slot" in the first place, but just a
>> certificate. The browser should only filter certs so that only
>> acceptable ones are proposed to the user.
> Thats what actually is done, isnt it? At least, after the pin request,
> a window with certs is shown to select one...
Yes. But in my head it should work the other way around: ask for the PIN 
only if no suitable object is found. If user wants to use a private 
object, he must authenticate first.

>> If an object isn't accessible ('cause it's marked private), it should
>> user's responsibility to login w/ the correct credentials first.
> The NSS should detect the flag, and if needed, call C_Login or do the
> operations needed. Sometimes the object is not extractable from the
> smartcard, so it depends.
Usually just private (or secret) keys are unextractable.

> Maybe the PIN should be cached cause sometimes card can be reset
> between calls, and that loose the security access.
Unless the object is marked for user consent.

> Thats the reason why spanish ID its requesting the PIN all the time(?)
Probably 'cause it's for signature, so it's marked user-consent 
(uncacheable).

BYtE,
  Diego.
_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to