upstream: correct mistake in spec - the private key blobs are encoded

verbatim and not as strings (i.e. no 4-byte length header)

OpenBSD-Commit-ID: 3606b5d443d72118c5b76c4af6dd87a5d5a4f837
This commit is contained in:
djm@openbsd.org 2021-05-07 02:29:40 +00:00 committed by Damien Miller
parent f43859159c
commit 24fee8973a
1 changed files with 6 additions and 3 deletions

View File

@ -35,9 +35,9 @@ of the cipher block size.
uint32 checkint uint32 checkint
uint32 checkint uint32 checkint
string privatekey1 byte[] privatekey1
string comment1 string comment1
string privatekey2 byte[] privatekey2
string comment2 string comment2
... ...
string privatekeyN string privatekeyN
@ -48,6 +48,9 @@ of the cipher block size.
... ...
char padlen % 255 char padlen % 255
where each private key is encoded using the same rules as used for
SSH agent.
Before the key is encrypted, a random integer is assigned Before the key is encrypted, a random integer is assigned
to both checkint fields so successful decryption can be to both checkint fields so successful decryption can be
quickly checked by verifying that both checkint fields quickly checked by verifying that both checkint fields
@ -65,4 +68,4 @@ For unencrypted keys the cipher "none" and the KDF "none"
are used with empty passphrases. The options if the KDF "none" are used with empty passphrases. The options if the KDF "none"
are the empty string. are the empty string.
$OpenBSD: PROTOCOL.key,v 1.1 2013/12/06 13:34:54 markus Exp $ $OpenBSD: PROTOCOL.key,v 1.2 2021/05/07 02:29:40 djm Exp $