diff options
author | djm@openbsd.org <djm@openbsd.org> | 2021-05-07 04:29:40 +0200 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2021-05-07 04:36:18 +0200 |
commit | 24fee8973abdf1c521cd2c0047d89e86d9c3fc38 (patch) | |
tree | 575e54bdfdd393cd0ab8837e9a6c4c4801b788d0 /PROTOCOL.key | |
parent | upstream: Don't pass NULL as a string in debugging as it does not work (diff) | |
download | openssh-24fee8973abdf1c521cd2c0047d89e86d9c3fc38.tar.xz openssh-24fee8973abdf1c521cd2c0047d89e86d9c3fc38.zip |
upstream: correct mistake in spec - the private key blobs are encoded
verbatim and not as strings (i.e. no 4-byte length header)
OpenBSD-Commit-ID: 3606b5d443d72118c5b76c4af6dd87a5d5a4f837
Diffstat (limited to 'PROTOCOL.key')
-rw-r--r-- | PROTOCOL.key | 9 |
1 files changed, 6 insertions, 3 deletions
diff --git a/PROTOCOL.key b/PROTOCOL.key index 959bd7aee..38df268b6 100644 --- a/PROTOCOL.key +++ b/PROTOCOL.key @@ -35,9 +35,9 @@ of the cipher block size. uint32 checkint uint32 checkint - string privatekey1 + byte[] privatekey1 string comment1 - string privatekey2 + byte[] privatekey2 string comment2 ... string privatekeyN @@ -48,6 +48,9 @@ of the cipher block size. ... char padlen % 255 +where each private key is encoded using the same rules as used for +SSH agent. + Before the key is encrypted, a random integer is assigned to both checkint fields so successful decryption can be quickly checked by verifying that both checkint fields @@ -65,4 +68,4 @@ For unencrypted keys the cipher "none" and the KDF "none" are used with empty passphrases. The options if the KDF "none" are the empty string. -$OpenBSD: PROTOCOL.key,v 1.1 2013/12/06 13:34:54 markus Exp $ +$OpenBSD: PROTOCOL.key,v 1.2 2021/05/07 02:29:40 djm Exp $ |