func golang.org/x/crypto/ssh.Marshal

81 uses

	golang.org/x/crypto/ssh (current package)
		certs.go#L89: 		to = append(to, Marshal(&s)...)
		certs.go#L117: 			s.Value = Marshal(&optionsTupleValue{value})
		certs.go#L119: 		ret = append(ret, Marshal(&s)...)
		certs.go#L480: 		generic.Signature = Marshal(c.Signature)
		certs.go#L482: 	genericBytes := Marshal(&generic)
		certs.go#L485: 	prefix := Marshal(&struct {
		channel.go#L225: 	p := Marshal(msg)
		client_auth.go#L25: 	if err := c.transport.writePacket(Marshal(&serviceRequestMsg{serviceUserAuth})); err != nil {
		client_auth.go#L106: 	if err := c.writePacket(Marshal(&userAuthRequestMsg{
		client_auth.go#L142: 	if err := c.writePacket(Marshal(&passwordAuthMsg{
		client_auth.go#L224: 		s := Marshal(sign)
		client_auth.go#L236: 		p := Marshal(&msg)
		client_auth.go#L279: 	if err := c.writePacket(Marshal(&msg)); err != nil {
		client_auth.go#L407: 	if err := c.writePacket(Marshal(&initiateMsg{
		client_auth.go#L555: 	if err := c.writePacket(Marshal(m)); err != nil {
		client_auth.go#L583: 			if err := c.writePacket(Marshal(&userAuthGSSAPIToken{
		client_auth.go#L631: 	if err := c.writePacket(Marshal(&userAuthGSSAPIMIC{
		common.go#L296: 	return Marshal(data)
		handshake.go#L466: 	packet := Marshal(msg)
		kex.go#L116: 	if err := c.writePacket(Marshal(&kexDHInit)); err != nil {
		kex.go#L206: 	packet = Marshal(&kexDHReply)
		kex.go#L234: 	serialized := Marshal(&kexInit)
		kex.go#L373: 	serialized := Marshal(&reply)
		kex.go#L445: 	if err := c.writePacket(Marshal(&kexECDHInitMsg{kp.pub[:]})); err != nil {
		kex.go#L540: 	if err := c.writePacket(Marshal(&reply)); err != nil {
		kex.go#L580: 	if err := c.writePacket(Marshal(&kexDHGexRequest)); err != nil {
		kex.go#L622: 	if err := c.writePacket(Marshal(&kexDHGexInit)); err != nil {
		kex.go#L712: 	if err := c.writePacket(Marshal(&kexDHGexGroup)); err != nil {
		kex.go#L771: 	packet = Marshal(&kexDHGexReply)
		keys.go#L380: 	return Marshal(&wirekey)
		keys.go#L462: 	return Marshal(&w)
		keys.go#L580: 	return Marshal(&w)
		keys.go#L666: 	return Marshal(&w)
		keys.go#L770: 	return Marshal(&w)
		keys.go#L811: 	original := Marshal(blob)
		keys.go#L866: 	return Marshal(&w)
		keys.go#L910: 	original := Marshal(blob)
		keys.go#L1032: 			signature = Marshal(asn1Sig)
		messages.go#L497: func Marshal(msg interface{}) []byte {
		mux.go#L133: 	p := Marshal(msg)
		server.go#L222: 	return Marshal(sig), nil
		server.go#L273: 	if err := s.transport.writePacket(Marshal(&serviceAccept)); err != nil {
		server.go#L339: 			if err := s.transport.writePacket(Marshal(&userAuthGSSAPIToken{
		server.go#L415: 			if err := s.transport.writePacket(Marshal(discMsg)); err != nil {
		server.go#L445: 				if err := s.transport.writePacket(Marshal(bannerMsg)); err != nil {
		server.go#L545: 					if err = s.transport.writePacket(Marshal(&okMsg)); err != nil {
		server.go#L602: 			if err := s.transport.writePacket(Marshal(&userAuthGSSAPIResponse{
		server.go#L656: 		if err := s.transport.writePacket(Marshal(&failureMsg)); err != nil {
		server.go#L684: 	if err := c.transport.writePacket(Marshal(&userAuthInfoRequestMsg{
		session.go#L172: 	ok, err := s.ch.SendRequest("env", true, Marshal(&msg))
		session.go#L198: 		tm = append(tm, Marshal(&kv)...)
		session.go#L209: 	ok, err := s.ch.SendRequest("pty-req", true, Marshal(&req))
		session.go#L227: 	ok, err := s.ch.SendRequest("subsystem", true, Marshal(&msg))
		session.go#L250: 	_, err := s.ch.SendRequest("window-change", false, Marshal(&req))
		session.go#L266: 	_, err := s.ch.SendRequest("signal", false, Marshal(&msg))
		session.go#L286: 	ok, err := s.ch.SendRequest("exec", true, Marshal(&req))
		streamlocal.go#L40: 	ok, _, err := c.SendRequest("streamlocal-forward@openssh.com", true, Marshal(&m))
		streamlocal.go#L56: 	ch, in, err := c.OpenChannel("direct-streamlocal@openssh.com", Marshal(&msg))
		streamlocal.go#L103: 	ok, _, err := l.conn.SendRequest("cancel-streamlocal-forward@openssh.com", true, Marshal(&m))
		tcpip.go#L115: 	ok, resp, err := c.SendRequest("tcpip-forward", true, Marshal(&m))
		tcpip.go#L323: 	ok, _, err := l.conn.SendRequest("cancel-tcpip-forward", true, Marshal(&m))
		tcpip.go#L422: 	ch, in, err := c.OpenChannel("direct-tcpip", Marshal(&msg))

	golang.org/x/crypto/ssh/agent
		client.go#L378: 	req := ssh.Marshal(&agentRemoveIdentityMsg{
		client.go#L385: 	req := ssh.Marshal(&agentLockMsg{
		client.go#L392: 	req := ssh.Marshal(&agentUnlockMsg{
		client.go#L437: 	req := ssh.Marshal(signRequestAgentMsg{
		client.go#L538: 		req = ssh.Marshal(rsaKeyMsg{
		client.go#L550: 		req = ssh.Marshal(dsaKeyMsg{
		client.go#L562: 		req = ssh.Marshal(ecdsaKeyMsg{
		client.go#L571: 		req = ssh.Marshal(ed25519KeyMsg{
		client.go#L582: 		req = ssh.Marshal(ed25519KeyMsg{
		client.go#L650: 		constraints = append(constraints, ssh.Marshal(constrainLifetimeAgentMsg{secs})...)
		client.go#L672: 		req = ssh.Marshal(rsaCertMsg{
		client.go#L683: 		req = ssh.Marshal(dsaCertMsg{
		client.go#L691: 		req = ssh.Marshal(ecdsaCertMsg{
		client.go#L699: 		req = ssh.Marshal(ed25519CertMsg{
		client.go#L711: 		req = ssh.Marshal(ed25519CertMsg{
		client.go#L792: 	req := ssh.Marshal(extensionAgentMsg{
		server.go#L43: 	return ssh.Marshal(rep)
		server.go#L54: 	return ssh.Marshal(&record)
		server.go#L142: 		return &signResponseAgentMsg{SigBlob: ssh.Marshal(sig)}, nil