Home | History | Annotate | Download | only in dropbear

Lines Matching refs:keyblob

357 	unsigned char *keyblob;
371 ret->keyblob = NULL;
449 ret->keyblob = (unsigned char*)m_realloc(ret->keyblob,
454 ret->keyblob + ret->keyblob_len, &outlen) != CRYPT_OK){
462 if (ret->keyblob_len == 0 || !ret->keyblob) {
478 if (ret->keyblob) {
479 memset(ret->keyblob, 0, ret->keyblob_size);
480 m_free(ret->keyblob);
502 memset(key->keyblob, 0, key->keyblob_size);
503 m_free(key->keyblob);
560 key->keyblob, key->keyblob_len);
585 p = key->keyblob;
613 ret = ber_read_id_len(p, key->keyblob+key->keyblob_len-p,
617 key->keyblob+key->keyblob_len-p < len) {
683 m_burn(key->keyblob, key->keyblob_size);
684 m_free(key->keyblob);
696 buffer * keyblob = NULL;
727 keyblob = buf_new(3000);
728 buf_put_priv_key(keyblob, key, keytype);
730 buf_setpos(keyblob, 0);
732 buf_incrpos(keyblob, buf_getint(keyblob));
749 numbers[2].bytes = buf_getint(keyblob);
750 numbers[2].start = buf_getptr(keyblob, numbers[2].bytes);
751 buf_incrpos(keyblob, numbers[2].bytes);
754 numbers[1].bytes = buf_getint(keyblob);
755 numbers[1].start = buf_getptr(keyblob, numbers[1].bytes);
756 buf_incrpos(keyblob, numbers[1].bytes);
759 numbers[3].bytes = buf_getint(keyblob);
760 numbers[3].start = buf_getptr(keyblob, numbers[3].bytes);
761 buf_incrpos(keyblob, numbers[3].bytes);
764 numbers[4].bytes = buf_getint(keyblob);
765 numbers[4].start = buf_getptr(keyblob, numbers[4].bytes);
766 buf_incrpos(keyblob, numbers[4].bytes);
769 numbers[5].bytes = buf_getint(keyblob);
770 numbers[5].start = buf_getptr(keyblob, numbers[5].bytes);
771 buf_incrpos(keyblob, numbers[5].bytes);
840 numbers[1].bytes = buf_getint(keyblob);
841 numbers[1].start = buf_getptr(keyblob, numbers[1].bytes);
842 buf_incrpos(keyblob, numbers[1].bytes);
845 numbers[2].bytes = buf_getint(keyblob);
846 numbers[2].start = buf_getptr(keyblob, numbers[2].bytes);
847 buf_incrpos(keyblob, numbers[2].bytes);
850 numbers[3].bytes = buf_getint(keyblob);
851 numbers[3].start = buf_getptr(keyblob, numbers[3].bytes);
852 buf_incrpos(keyblob, numbers[3].bytes);
855 numbers[4].bytes = buf_getint(keyblob);
856 numbers[4].start = buf_getptr(keyblob, numbers[4].bytes);
857 buf_incrpos(keyblob, numbers[4].bytes);
860 numbers[5].bytes = buf_getint(keyblob);
861 numbers[5].start = buf_getptr(keyblob, numbers[5].bytes);
862 buf_incrpos(keyblob, numbers[5].bytes);
958 if (keyblob) {
959 buf_burn(keyblob);
960 buf_free(keyblob);
1050 unsigned char *keyblob;
1067 ret->keyblob = NULL;
1141 ret->keyblob = sresize(ret->keyblob, ret->keyblob_size,
1145 memcpy(ret->keyblob + ret->keyblob_len, out, len);
1154 if (ret->keyblob_len == 0 || !ret->keyblob) {
1163 if (ret->keyblob) {
1164 memset(ret->keyblob, 0, ret->keyblob_size);
1165 m_free(ret->keyblob);
1185 if (GET_32BIT(key->keyblob) != 0x3f6ff9eb)
1195 pos += 4 + GET_32BIT(key->keyblob + pos); /* skip key type */
1198 len = GET_32BIT(key->keyblob + pos); /* find cipher-type length */
1201 if (len != 4 || 0 != memcmp(key->keyblob + pos + 4, "none", 4))
1206 memset(key->keyblob, 0, key->keyblob_size);
1207 m_free(key->keyblob);
1277 if (GET_32BIT(key->keyblob) != SSHCOM_MAGIC_NUMBER) {
1287 (len = GET_32BIT(key->keyblob + pos)) > key->keyblob_len - pos - 4) {
1292 keyblob+pos+4, prefix_rsa, sizeof(prefix_rsa) - 1)) {
1295 !memcmp(key->keyblob+pos+4, prefix_dsa, sizeof(prefix_dsa) - 1)) {
1307 (len = GET_32BIT(key->keyblob + pos)) > key->keyblob_len - pos - 4) {
1311 if (len == 4 && !memcmp(key->keyblob+pos+4, "none", 4))
1313 else if (len == 8 && !memcmp(key->keyblob+pos+4, "3des-cbc", 8))
1325 (len = GET_32BIT(key->keyblob + pos)) > key->keyblob_len - pos - 4) {
1329 ciphertext = (char *)key->keyblob + pos + 4;
1479 memset(key->keyblob, 0, key->keyblob_size);
1480 m_free(key->keyblob);