Home | History | Annotate | Download | only in dropbear

Lines Matching full:outblob

698 	unsigned char *outblob = NULL;
889 * Now we know how big outblob needs to be. Allocate it.
891 outblob = (unsigned char*)m_malloc(outlen);
897 pos += ber_write_id_len(outblob+pos, 16, seqlen, ASN1_CONSTRUCTED);
899 pos += ber_write_id_len(outblob+pos, 2, numbers[i].bytes, 0);
900 memcpy(outblob+pos, numbers[i].start, numbers[i].bytes);
923 outblob[pos++] = outlen - len;
948 base64_encode_fp(fp, outblob, outlen, 64);
954 if (outblob) {
955 memset(outblob, 0, outlen);
956 m_free(outblob);
1491 unsigned char *outblob;
1506 outblob = NULL;
1572 outblob = snewn(outlen, unsigned char);
1578 PUT_32BIT(outblob+pos, SSHCOM_MAGIC_NUMBER); pos += 4;
1580 pos += put_string(outblob+pos, type, strlen(type));
1583 pos += put_string(outblob+pos, ciphertype, strlen(ciphertype));
1589 PUT_32BIT(outblob+pos, 0);
1593 pos += sshcom_put_mpint(outblob+pos,
1596 PUT_32BIT(outblob+lenpos+4, pos - (lenpos+8));
1601 outblob[pos++] = random_byte();
1603 ciphertext = (char *)outblob+lenpos+4;
1607 PUT_32BIT(outblob+lenpos, cipherlen);
1609 PUT_32BIT(outblob+4, pos);
1673 base64_encode_fp(fp, outblob, pos, 70);
1679 if (outblob) {
1680 memset(outblob, 0, outlen);
1681 m_free(outblob);