Home | History | Annotate | Download | only in dropbear

Lines Matching refs:blob

345 /* Simple structure to point to an mp-int within a blob. */
468 errmsg = "Encrypted key blob is not a multiple of cipher block size";
557 * Now decrypt the key blob.
568 * Now we have a decrypted key blob, which contains an ASN.1
571 * We expect the whole key blob to be formatted as a SEQUENCE
573 * the blob is part of the sequence). Within that SEQUENCE we
602 * Space to create key blob in.
736 * key blob, and also decide on the header line.
977 * The format of the base64 blob is largely ssh2-packet-formatted,
982 * So. The blob contains:
985 * - uint32 size (total blob size)
988 * - string encrypted-blob
995 * The encrypted blob, once decrypted, contains a single string
1001 * The payload blob, for an RSA key, contains:
1009 * For a DSA key, the payload blob contains:
1268 unsigned char *blob = NULL;
1288 errmsg = "Key blob does not contain a key type string";
1308 errmsg = "Key blob does not contain a cipher type string";
1326 errmsg = "Key blob does not contain actual key data";
1367 * Now decrypt the key blob.
1403 blob = snewn(blobsize, unsigned char);
1421 pos += put_string(blob+pos, "ssh-rsa", 7);
1422 pos += put_mp(blob+pos, e.start, e.bytes);
1423 pos += put_mp(blob+pos, n.start, n.bytes);
1425 pos += put_string(blob+pos, d.start, d.bytes);
1426 pos += put_mp(blob+pos, q.start, q.bytes);
1427 pos += put_mp(blob+pos, p.start, p.bytes);
1428 pos += put_mp(blob+pos, u.start, u.bytes);
1449 pos += put_string(blob+pos, "ssh-dss", 7);
1450 pos += put_mp(blob+pos, p.start, p.bytes);
1451 pos += put_mp(blob+pos, q.start, q.bytes);
1452 pos += put_mp(blob+pos, g.start, g.bytes);
1453 pos += put_mp(blob+pos, y.start, y.bytes);
1455 pos += put_mp(blob+pos, x.start, x.bytes);
1463 retkey->data = alg->createkey(blob, publen, blob+publen, privlen);
1475 if (blob) {
1476 memset(blob, 0, blobsize);
1477 m_free(blob);
1510 * key blob, and also decide on the header line.
1565 * Total size of key blob will be somewhere under 512 plus
1567 * precise size as we construct the blob.
1575 * Create the unencrypted key blob.
1586 pos += 4; /* encrypted-blob size */
1597 /* Pad encrypted blob to a multiple of cipher block size. */
1606 /* Wrap up the encrypted blob string. */
1638 * Now decrypt the key blob.