-
Notifications
You must be signed in to change notification settings - Fork 49
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
NIOSSHPrivateKey from file/bytes #94
Comments
Yes, this is currently correct. The main reason we haven't added this support at the moment is that CryptoKit does not provide the algorithms required for us to support protected private keys (that is, private keys protected by passphrases). This is the overwhelmingly most common format for private keys on disk. I think the most useful addition to work around this would be to add support for the ssh agent protocol, and use that as a potential backing for NIOSSHPrivateKey. This is admittedly a lot of work, but it circumvents the need for us to manage the protection of the key at all, and encourages good SSH key hygiene. |
Not if you plan on using this on IOS 😄 |
I don't know if I am missing something, is there a way to parse a private key file or private key data with a passphrase into a NIOSSHPrivateKey without knowing the type of private key you want to open?
The text was updated successfully, but these errors were encountered: