Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Secure Area Interface: getKeyInvalidated is unclear #853

Open
paulbastian opened this issue Jan 27, 2025 · 2 comments
Open

Secure Area Interface: getKeyInvalidated is unclear #853

paulbastian opened this issue Jan 27, 2025 · 2 comments

Comments

@paulbastian
Copy link

The description of getKeyInvalidated is very short and unclear, it may benefit from some more detail, e.g.

  • by whom is this invalidated
  • why
  • what are potential use cases here
  • how does this effect the other functionality
@davidz25
Copy link
Contributor

davidz25 commented Feb 3, 2025

We currently have the following in the KDoc for SecureArea:

 * Existing keys in a Secure Area may be invalidated and this can happen
 * on Android if e.g. the LSKF is removed or if a Cloud-based Secure Area
 * is turned down. This is modeled through the [KeyInvalidatedException]
 * being thrown when attempting to use the key. Applications can also use
 * [getKeyInvalidated] to learn ahead of time if a key is still usable.

which I think is accurate but, yea, perhaps a bit too cryptic. Happy to make this more crisp, suggestions?

@paulbastian
Copy link
Author

Does this mean a Wallet should request this function for all active Credentials to verify that they are still useable? Is it realistic that this information can be fetched from a Remote WSCD without user authentication, i.e. do we need keyUnlockData?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants