/dports/security/john/john-1.9.0-jumbo-1/run/ |
H A D | ssh2john.py | 127 AUTH_MAGIC = b"openssh-key-v1" 132 if not data.startswith(AUTH_MAGIC): 134 offset = offset + len(AUTH_MAGIC) + 1 # sizeof(AUTH_MAGIC)
|
/dports/net/p5-Net-SSH-Perl/Net-SSH-Perl-2.14/lib/Net/SSH/Perl/Key/ |
H A D | Ed25519.pm | 15 use constant AUTH_MAGIC => "openssh-key-v1\0"; constant 63 my $str = AUTH_MAGIC; 68 $b->consume(length(AUTH_MAGIC)); 191 $b->put_char(AUTH_MAGIC);
|
/dports/security/gnome-ssh-askpass/openssh-6.6p1/ |
H A D | PROTOCOL.key | 8 #define AUTH_MAGIC "openssh-key-v1" 10 byte[] AUTH_MAGIC
|
H A D | authfile.c | 83 #define AUTH_MAGIC "openssh-key-v1" macro 138 buffer_append(&encoded, AUTH_MAGIC, sizeof(AUTH_MAGIC)); in key_private_to_blob2() 264 if (buffer_len(©) < sizeof(AUTH_MAGIC) || in key_parse_private2() 265 memcmp(buffer_ptr(©), AUTH_MAGIC, sizeof(AUTH_MAGIC))) { in key_parse_private2() 269 buffer_consume(©, sizeof(AUTH_MAGIC)); in key_parse_private2()
|
/dports/security/pam_ssh/pam_ssh-8.0/openssh/ |
H A D | PROTOCOL.key | 8 #define AUTH_MAGIC "openssh-key-v1" 10 byte[] AUTH_MAGIC
|
H A D | sshkey.c | 71 #define AUTH_MAGIC "openssh-key-v1" macro 3412 if ((r = sshbuf_put(encoded, AUTH_MAGIC, sizeof(AUTH_MAGIC))) != 0 || in sshkey_private_to_blob2() 3568 if (sshbuf_len(decoded) < sizeof(AUTH_MAGIC) || in sshkey_parse_private2() 3569 memcmp(sshbuf_ptr(decoded), AUTH_MAGIC, sizeof(AUTH_MAGIC))) { in sshkey_parse_private2() 3574 if ((r = sshbuf_consume(decoded, sizeof(AUTH_MAGIC))) != 0 || in sshkey_parse_private2()
|
/dports/security/openssh-portable/openssh-8.8p1/ |
H A D | PROTOCOL.key | 8 #define AUTH_MAGIC "openssh-key-v1" 10 byte[] AUTH_MAGIC
|
H A D | sshkey.c | 75 #define AUTH_MAGIC "openssh-key-v1" macro 3941 if ((r = sshbuf_put(encoded, AUTH_MAGIC, sizeof(AUTH_MAGIC))) != 0 || in sshkey_private_to_blob2() 4069 if (sshbuf_len(decoded) < sizeof(AUTH_MAGIC) || in private2_uudecode() 4070 memcmp(sshbuf_ptr(decoded), AUTH_MAGIC, sizeof(AUTH_MAGIC))) { in private2_uudecode() 4110 if ((r = sshbuf_consume(decoded, sizeof(AUTH_MAGIC))) != 0 || in private2_decrypt() 4331 if ((r = sshbuf_consume(decoded, sizeof(AUTH_MAGIC))) != 0 || in sshkey_parse_private2_pubkey()
|
/dports/java/bouncycastle15/crypto-169/core/src/main/java/org/bouncycastle/crypto/util/ |
H A D | OpenSSHPrivateKeyUtil.java | 45 …static final byte[] AUTH_MAGIC = Strings.toByteArray("openssh-key-v1\0"); // C string so null term… field in OpenSSHPrivateKeyUtil 104 builder.writeBytes(AUTH_MAGIC); in encodePrivateKey() 214 SSHBuffer kIn = new SSHBuffer(AUTH_MAGIC, blob); in parsePrivateKeyBlob()
|
/dports/security/cargo-audit/rustsec-cargo-audit-v0.15.2/cargo-audit/cargo-crates/libssh2-sys-0.2.21/libssh2/src/ |
H A D | pem.c | 358 #define AUTH_MAGIC "openssh-key-v1" macro 400 if(decoded.len < strlen(AUTH_MAGIC)) { in _libssh2_openssh_pem_parse_data() 405 if(strncmp((char *) decoded.dataptr, AUTH_MAGIC, in _libssh2_openssh_pem_parse_data() 406 strlen(AUTH_MAGIC)) != 0) { in _libssh2_openssh_pem_parse_data() 412 decoded.dataptr += strlen(AUTH_MAGIC) + 1; in _libssh2_openssh_pem_parse_data()
|
/dports/devel/gbump/gbump-1.0.1/cargo-crates/libssh2-sys-0.2.13/libssh2/src/ |
H A D | pem.c | 358 #define AUTH_MAGIC "openssh-key-v1" macro 400 if(decoded.len < strlen(AUTH_MAGIC)) { in _libssh2_openssh_pem_parse_data() 405 if(strncmp((char *) decoded.dataptr, AUTH_MAGIC, in _libssh2_openssh_pem_parse_data() 406 strlen(AUTH_MAGIC)) != 0) { in _libssh2_openssh_pem_parse_data() 412 decoded.dataptr += strlen(AUTH_MAGIC) + 1; in _libssh2_openssh_pem_parse_data()
|
/dports/security/nmap/nmap-7.91/libssh2/src/ |
H A D | pem.c | 358 #define AUTH_MAGIC "openssh-key-v1" macro 400 if(decoded.len < strlen(AUTH_MAGIC)) { in _libssh2_openssh_pem_parse_data() 405 if(strncmp((char *) decoded.dataptr, AUTH_MAGIC, in _libssh2_openssh_pem_parse_data() 406 strlen(AUTH_MAGIC)) != 0) { in _libssh2_openssh_pem_parse_data() 412 decoded.dataptr += strlen(AUTH_MAGIC) + 1; in _libssh2_openssh_pem_parse_data()
|
/dports/devel/cargo-generate/cargo-generate-0.9.0/cargo-crates/libssh2-sys-0.2.21/libssh2/src/ |
H A D | pem.c | 358 #define AUTH_MAGIC "openssh-key-v1" macro 400 if(decoded.len < strlen(AUTH_MAGIC)) { in _libssh2_openssh_pem_parse_data() 405 if(strncmp((char *) decoded.dataptr, AUTH_MAGIC, in _libssh2_openssh_pem_parse_data() 406 strlen(AUTH_MAGIC)) != 0) { in _libssh2_openssh_pem_parse_data() 412 decoded.dataptr += strlen(AUTH_MAGIC) + 1; in _libssh2_openssh_pem_parse_data()
|
/dports/lang/rust/rustc-1.58.1-src/vendor/libssh2-sys/libssh2/src/ |
H A D | pem.c | 358 #define AUTH_MAGIC "openssh-key-v1" macro 400 if(decoded.len < strlen(AUTH_MAGIC)) { in _libssh2_openssh_pem_parse_data() 405 if(strncmp((char *) decoded.dataptr, AUTH_MAGIC, in _libssh2_openssh_pem_parse_data() 406 strlen(AUTH_MAGIC)) != 0) { in _libssh2_openssh_pem_parse_data() 412 decoded.dataptr += strlen(AUTH_MAGIC) + 1; in _libssh2_openssh_pem_parse_data()
|
/dports/devel/cargo-c/cargo-c-0.9.6+cargo-0.58/cargo-crates/libssh2-sys-0.2.23/libssh2/src/ |
H A D | pem.c | 362 #define AUTH_MAGIC "openssh-key-v1" macro 404 if(decoded.len < strlen(AUTH_MAGIC)) { in _libssh2_openssh_pem_parse_data() 409 if(strncmp((char *) decoded.dataptr, AUTH_MAGIC, in _libssh2_openssh_pem_parse_data() 410 strlen(AUTH_MAGIC)) != 0) { in _libssh2_openssh_pem_parse_data() 416 decoded.dataptr += strlen(AUTH_MAGIC) + 1; in _libssh2_openssh_pem_parse_data()
|
/dports/security/libssh2/libssh2-1.10.0/src/ |
H A D | pem.c | 362 #define AUTH_MAGIC "openssh-key-v1" 404 if(decoded.len < strlen(AUTH_MAGIC)) { 409 if(strncmp((char *) decoded.dataptr, AUTH_MAGIC, 410 strlen(AUTH_MAGIC)) != 0) { 416 decoded.dataptr += strlen(AUTH_MAGIC) + 1;
|
/dports/devel/pijul/pijul-1.0.0.a55/cargo-crates/libssh2-sys-0.2.23/libssh2/src/ |
H A D | pem.c | 362 #define AUTH_MAGIC "openssh-key-v1" macro 404 if(decoded.len < strlen(AUTH_MAGIC)) { in _libssh2_openssh_pem_parse_data() 409 if(strncmp((char *) decoded.dataptr, AUTH_MAGIC, in _libssh2_openssh_pem_parse_data() 410 strlen(AUTH_MAGIC)) != 0) { in _libssh2_openssh_pem_parse_data() 416 decoded.dataptr += strlen(AUTH_MAGIC) + 1; in _libssh2_openssh_pem_parse_data()
|
/dports/security/erlang-jose/erlang-jose-1.11.1/src/jwk/ |
H A D | jose_jwk_openssh_key.erl | 18 -define(AUTH_MAGIC, "openssh-key-v1"). macro
|
/dports/security/elixir-jose/erlang-jose-1.11.1/src/jwk/ |
H A D | jose_jwk_openssh_key.erl | 18 -define(AUTH_MAGIC, "openssh-key-v1"). macro
|
/dports/net/rabbitmq/rabbitmq-server-3.9.11/deps/jose/src/jwk/ |
H A D | jose_jwk_openssh_key.erl | 18 -define(AUTH_MAGIC, "openssh-key-v1"). macro
|
/dports/security/ncrack/ncrack-0.7/opensshlib/ |
H A D | sshkey.c | 76 #define AUTH_MAGIC "openssh-key-v1" macro 3174 if ((r = sshbuf_put(encoded, AUTH_MAGIC, sizeof(AUTH_MAGIC))) != 0 || 3330 if (sshbuf_len(decoded) < sizeof(AUTH_MAGIC) || 3331 memcmp(sshbuf_ptr(decoded), AUTH_MAGIC, sizeof(AUTH_MAGIC))) { 3336 if ((r = sshbuf_consume(decoded, sizeof(AUTH_MAGIC))) != 0 ||
|