PNG  IHDR* pHYs+ IDATx]n#; cdLb Ǚ[at¤_:uP}>!Usă cag޿ ֵNu`ݼTâabO7uL&y^wFٝA"l[|ŲHLN밪4*sG3|Dv}?+y߉{OuOAt4Jj.u]Gz*҉sP'VQKbA1u\`& Af;HWj hsO;ogTu uj7S3/QzUr&wS`M$X_L7r2;aE+ώ%vikDA:dR+%KzƉo>eOth$z%: :{WwaQ:wz%4foɹE[9<]#ERINƻv溂E%P1i01 |Jvҗ&{b?9g=^wζXn/lK::90KwrюO\!ջ3uzuGv^;騢wq<Iatv09:tt~hEG`v;3@MNZD.1]L:{ծI3`L(÷ba")Y.iljCɄae#I"1 `3*Bdz>j<fU40⨬%O$3cGt]j%Fߠ_twJ;ABU8vP3uEԑwQ V:h%))LfraqX-ۿX]v-\9I gl8tzX ]ecm)-cgʒ#Uw=Wlێn(0hPP/ӨtQ“&J35 $=]r1{tLuǮ*i0_;NƝ8;-vݏr8+U-kruȕYr0RnC]*ެ(M:]gE;{]tg(#ZJ9y>utRDRMdr9㪩̞zֹb<ģ&wzJM"iI( .ꮅX)Qw:9,i좜\Ԛi7&N0:asϓc];=ΗOӣ APqz93 y $)A*kVHZwBƺnWNaby>XMN*45~ղM6Nvm;A=jֲ.~1}(9`KJ/V F9[=`~[;sRuk]rєT!)iQO)Y$V ی ۤmzWz5IM Zb )ˆC`6 rRa}qNmUfDsWuˤV{ Pݝ'=Kֳbg,UҘVz2ﴻnjNgBb{? ߮tcsͻQuxVCIY۠:(V뺕 ٥2;t`@Fo{Z9`;]wMzU~%UA蛚dI vGq\r82iu +St`cR.6U/M9IENDB` REDROOM
PHP 5.6.40
Preview: PROTOCOL.key Size: 1.50 KB
//usr/share/doc/openssh/PROTOCOL.key

This document describes the private key format for OpenSSH.

1. Overall format

The key consists of a header, a list of public keys, and
an encrypted list of matching private keys.

#define AUTH_MAGIC      "openssh-key-v1"

	byte[]	AUTH_MAGIC
	string	ciphername
	string	kdfname
	string	kdfoptions
	int	number of keys N
	string	publickey1
	string	publickey2
	...
	string	publickeyN
	string	encrypted, padded list of private keys

2. KDF options for kdfname "bcrypt"

The options:

	string salt
	uint32 rounds

are concatenated and represented as a string.

3. Unencrypted list of N private keys

The list of privatekey/comment pairs is padded with the
bytes 1, 2, 3, ... until the total length is a multiple
of the cipher block size.

	uint32	checkint
	uint32	checkint
	string	privatekey1
	string	comment1
	string	privatekey2
	string	comment2
	...
	string	privatekeyN
	string	commentN
	char	1
	char	2
	char	3
	...
	char	padlen % 255

Before the key is encrypted, a random integer is assigned
to both checkint fields so successful decryption can be
quickly checked by verifying that both checkint fields
hold the same value.

4. Encryption

The KDF is used to derive a key, IV (and other values required by
the cipher) from the passphrase. These values are then used to
encrypt the unencrypted list of private keys.

5. No encryption

For unencrypted keys the cipher "none" and the KDF "none"
are used with empty passphrases. The options if the KDF "none"
are the empty string.

$OpenBSD: PROTOCOL.key,v 1.1 2013/12/06 13:34:54 markus Exp $

Directory Contents

Dirs: 0 × Files: 18

Name Size Perms Modified Actions
323.31 KB lrw-r--r-- 2019-04-17 22:53:45
Edit Download
5.36 KB lrw-r--r-- 2019-04-17 22:52:57
Edit Download
9.02 KB lrw-r--r-- 2019-04-17 22:52:57
Edit Download
6.18 KB lrw-r--r-- 2019-04-17 22:52:57
Edit Download
19.31 KB lrw-r--r-- 2025-12-18 02:26:20
Edit Download
220 B lrw-r--r-- 2019-04-17 22:52:57
Edit Download
11.94 KB lrw-r--r-- 2019-04-17 22:52:57
Edit Download
4.52 KB lrw-r--r-- 2019-04-17 22:52:57
Edit Download
18.00 KB lrw-r--r-- 2019-04-17 22:52:57
Edit Download
1.50 KB lrw-r--r-- 2019-04-17 22:52:57
Edit Download
5.13 KB lrw-r--r-- 2019-04-17 22:52:57
Edit Download
8.87 KB lrw-r--r-- 2019-04-17 22:52:57
Edit Download
2.39 KB lrw-r--r-- 2019-04-17 22:52:57
Edit Download
1.57 KB lrw-r--r-- 2019-04-17 22:52:57
Edit Download
3.95 KB lrw-r--r-- 2019-04-17 22:52:57
Edit Download
2.25 KB lrw-r--r-- 2019-04-17 22:52:57
Edit Download
4.78 KB lrw-r--r-- 2019-04-17 22:52:57
Edit Download
2.54 KB lrw-r--r-- 2019-04-17 22:52:57
Edit Download

If ZipArchive is unavailable, a .tar will be created (no compression).
© 2026 REDROOM — Secure File Manager. All rights reserved. Built with ❤️ & Red Dark UI