The [sic] look like the standard CRT components.
So:
a = iqmp c = dmp1 f = dmq1
And, in fact, if you look at the PNG's in the posting,
"iqmp" Inverse of Q mod P a = Q^-1 mod P "dmp1" D mod prime 1 c = Ks mod (P-1) "dmp2" D mod prime 2 f = Ks mod (Q-1)
so it all makes sense, given that P and Q (which are the secret factors of M) are "prime1" and "prime2".
I've got a staff meeting in 10 minutes, so I don't have time to really work this out, but given private key format
http://ospkibook.sourceforge.net/docs/OSPKI-2.4.6/OSPKI/sample-key-components.htm
you might be able to find a correspondance between the above and
exponent1 exponent2 coefficient
failing that, I guess you'd have to compute a, c, f...
-- Charles B (Ben) Cranston mailto: [EMAIL PROTECTED] http://www.wam.umd.edu/~zben
______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]