func golang.org/x/crypto/ssh.Marshal
81 uses
golang.org/x/crypto/ssh (current package)
certs.go#L89: to = append(to, Marshal(&s)...)
certs.go#L117: s.Value = Marshal(&optionsTupleValue{value})
certs.go#L119: ret = append(ret, Marshal(&s)...)
certs.go#L480: generic.Signature = Marshal(c.Signature)
certs.go#L482: genericBytes := Marshal(&generic)
certs.go#L485: prefix := Marshal(&struct {
channel.go#L225: p := Marshal(msg)
client_auth.go#L25: if err := c.transport.writePacket(Marshal(&serviceRequestMsg{serviceUserAuth})); err != nil {
client_auth.go#L106: if err := c.writePacket(Marshal(&userAuthRequestMsg{
client_auth.go#L142: if err := c.writePacket(Marshal(&passwordAuthMsg{
client_auth.go#L224: s := Marshal(sign)
client_auth.go#L236: p := Marshal(&msg)
client_auth.go#L279: if err := c.writePacket(Marshal(&msg)); err != nil {
client_auth.go#L407: if err := c.writePacket(Marshal(&initiateMsg{
client_auth.go#L555: if err := c.writePacket(Marshal(m)); err != nil {
client_auth.go#L583: if err := c.writePacket(Marshal(&userAuthGSSAPIToken{
client_auth.go#L631: if err := c.writePacket(Marshal(&userAuthGSSAPIMIC{
common.go#L296: return Marshal(data)
handshake.go#L466: packet := Marshal(msg)
kex.go#L116: if err := c.writePacket(Marshal(&kexDHInit)); err != nil {
kex.go#L206: packet = Marshal(&kexDHReply)
kex.go#L234: serialized := Marshal(&kexInit)
kex.go#L373: serialized := Marshal(&reply)
kex.go#L445: if err := c.writePacket(Marshal(&kexECDHInitMsg{kp.pub[:]})); err != nil {
kex.go#L540: if err := c.writePacket(Marshal(&reply)); err != nil {
kex.go#L580: if err := c.writePacket(Marshal(&kexDHGexRequest)); err != nil {
kex.go#L622: if err := c.writePacket(Marshal(&kexDHGexInit)); err != nil {
kex.go#L712: if err := c.writePacket(Marshal(&kexDHGexGroup)); err != nil {
kex.go#L771: packet = Marshal(&kexDHGexReply)
keys.go#L380: return Marshal(&wirekey)
keys.go#L462: return Marshal(&w)
keys.go#L580: return Marshal(&w)
keys.go#L666: return Marshal(&w)
keys.go#L770: return Marshal(&w)
keys.go#L811: original := Marshal(blob)
keys.go#L866: return Marshal(&w)
keys.go#L910: original := Marshal(blob)
keys.go#L1032: signature = Marshal(asn1Sig)
messages.go#L497: func Marshal(msg interface{}) []byte {
mux.go#L133: p := Marshal(msg)
server.go#L222: return Marshal(sig), nil
server.go#L273: if err := s.transport.writePacket(Marshal(&serviceAccept)); err != nil {
server.go#L339: if err := s.transport.writePacket(Marshal(&userAuthGSSAPIToken{
server.go#L415: if err := s.transport.writePacket(Marshal(discMsg)); err != nil {
server.go#L445: if err := s.transport.writePacket(Marshal(bannerMsg)); err != nil {
server.go#L545: if err = s.transport.writePacket(Marshal(&okMsg)); err != nil {
server.go#L602: if err := s.transport.writePacket(Marshal(&userAuthGSSAPIResponse{
server.go#L656: if err := s.transport.writePacket(Marshal(&failureMsg)); err != nil {
server.go#L684: if err := c.transport.writePacket(Marshal(&userAuthInfoRequestMsg{
session.go#L172: ok, err := s.ch.SendRequest("env", true, Marshal(&msg))
session.go#L198: tm = append(tm, Marshal(&kv)...)
session.go#L209: ok, err := s.ch.SendRequest("pty-req", true, Marshal(&req))
session.go#L227: ok, err := s.ch.SendRequest("subsystem", true, Marshal(&msg))
session.go#L250: _, err := s.ch.SendRequest("window-change", false, Marshal(&req))
session.go#L266: _, err := s.ch.SendRequest("signal", false, Marshal(&msg))
session.go#L286: ok, err := s.ch.SendRequest("exec", true, Marshal(&req))
streamlocal.go#L40: ok, _, err := c.SendRequest("streamlocal-forward@openssh.com", true, Marshal(&m))
streamlocal.go#L56: ch, in, err := c.OpenChannel("direct-streamlocal@openssh.com", Marshal(&msg))
streamlocal.go#L103: ok, _, err := l.conn.SendRequest("cancel-streamlocal-forward@openssh.com", true, Marshal(&m))
tcpip.go#L115: ok, resp, err := c.SendRequest("tcpip-forward", true, Marshal(&m))
tcpip.go#L323: ok, _, err := l.conn.SendRequest("cancel-tcpip-forward", true, Marshal(&m))
tcpip.go#L422: ch, in, err := c.OpenChannel("direct-tcpip", Marshal(&msg))
golang.org/x/crypto/ssh/agent
client.go#L378: req := ssh.Marshal(&agentRemoveIdentityMsg{
client.go#L385: req := ssh.Marshal(&agentLockMsg{
client.go#L392: req := ssh.Marshal(&agentUnlockMsg{
client.go#L437: req := ssh.Marshal(signRequestAgentMsg{
client.go#L538: req = ssh.Marshal(rsaKeyMsg{
client.go#L550: req = ssh.Marshal(dsaKeyMsg{
client.go#L562: req = ssh.Marshal(ecdsaKeyMsg{
client.go#L571: req = ssh.Marshal(ed25519KeyMsg{
client.go#L582: req = ssh.Marshal(ed25519KeyMsg{
client.go#L650: constraints = append(constraints, ssh.Marshal(constrainLifetimeAgentMsg{secs})...)
client.go#L672: req = ssh.Marshal(rsaCertMsg{
client.go#L683: req = ssh.Marshal(dsaCertMsg{
client.go#L691: req = ssh.Marshal(ecdsaCertMsg{
client.go#L699: req = ssh.Marshal(ed25519CertMsg{
client.go#L711: req = ssh.Marshal(ed25519CertMsg{
client.go#L792: req := ssh.Marshal(extensionAgentMsg{
server.go#L43: return ssh.Marshal(rep)
server.go#L54: return ssh.Marshal(&record)
server.go#L142: return &signResponseAgentMsg{SigBlob: ssh.Marshal(sig)}, nil
 |
The pages are generated with Golds v0.3.2-preview. (GOOS=darwin GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @Go100and1 (reachable from the left QR code) to get the latest news of Golds. |