Hi Robert,
my situation now is like this;
There is no keypair yet in my token, also no certificate yet.Whenever
i try to go to a secure website (https), C_CreateObject will get
called, followed by C_VerifyRecoverInit, then C_VerifyRecover and
C_DestroyObject.A public key template is passed in by Communicator
during C_CreateObject. I am confused about a couple of things happened
here; I guessed that the secure website is presenting a certificate to
NC, and the public key is extracted by NC., and then a public key
template is passed in to C_CraeteObject. Then C_VerifyRecoverxxx is
called to verify the certificate's signature. Am i right at this
point?
Question: Why the public Key modulus is always the same, with length
of 126 bytes,(including a leading '0' byte) no matter which https site
i go to? I am pretty much confused here,
any ideas what had happened?
>
> Is it consistantly 126 bytes? or is this just a one time thing? Either
> way this definately does not sound right. It should be 128 bytes or 129
> bytes (with a leading '0'). If you can grab a copy of PSM and mozilla it
> might be easier to debug, since you can use trace right into the PSM
> source and find out what is going wrong.
>
> BTW does the private key also have a 126 byte modulus?
>
> bob