Viktor TARASOV wrote, On 2009-01-05 08:53:

> is it normal that, during the SSL handshake, the disabled removable
> token is asked for the authentication certificate/key, please?

The feature that allows slots to be disabled is intended to be a
configuration feature, not intended for dynamic use during the lifetime of
a process.  NSS checks the disabled bit on each slot when it starts up, and
(IINM) may also check it on removable slots when the token is inserted or a
new slot becomes available (that is, a slot appears that was not present
when NSS was initialized).

If the disabled flag is set when the token is already in use, I would not
expect the disabled flag to have any effect on objects or sessions that are
already known to NSS at the time it is disabled.  I would not expect the
disabled flag to have much effect on a slot with a removable token
unless/until the next time a token is inserted.

> Looking though the sources, it appears that, when getting the client 
> authentication data, the 'disabled' flag is ignored for the removable
> tokens . (For the permanent tokens, the 'disabled' flag is checked in 
> nssToken_IsPresent()) .

Well, it's checked at startup time for slots with removable tokens.  But
perhaps disabling a token might be expected to prevent new objects from
being found in a removable token.  If you file a bug about that, I will
discuss the subject with the other NSS developers.

_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to