diff options
| author | Benjamin Dauvergne <bdauvergne@entrouvert.com> | 2010-06-14 21:21:27 +0000 |
|---|---|---|
| committer | Benjamin Dauvergne <bdauvergne@entrouvert.com> | 2010-06-14 21:21:27 +0000 |
| commit | c1902b7d7e10d56982ee0020d5158de564974a45 (patch) | |
| tree | d1343fe9776205f74444d3696d7c98cee6556473 | |
| parent | 900a8008c4dbd6cc27dbac83ea6b162e6f88ff7f (diff) | |
| download | lasso-c1902b7d7e10d56982ee0020d5158de564974a45.tar.gz lasso-c1902b7d7e10d56982ee0020d5158de564974a45.tar.xz lasso-c1902b7d7e10d56982ee0020d5158de564974a45.zip | |
Core: when reloading a dump, use the signing private key password for loading the encryption private key
We currently do not store the encryption private key, instead on reload
of a dump, we try to use the signing private key as the encryption
private key. But we forgot to use the stored private key password.
That's now fixed.
Next step would be to keep the encryption private key around also.
| -rw-r--r-- | lasso/id-ff/server.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/lasso/id-ff/server.c b/lasso/id-ff/server.c index 2279c452..b5d9a3a2 100644 --- a/lasso/id-ff/server.c +++ b/lasso/id-ff/server.c @@ -289,7 +289,7 @@ init_from_xml(LassoNode *node, xmlNode *xmlnode) if (server->private_key) { server->private_data->encryption_private_key = - lasso_xmlsec_load_private_key(server->private_key, NULL); + lasso_xmlsec_load_private_key(server->private_key, server->private_key_password); } if (rc) return rc; |
