-
-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Should SignRequest
's pubkey
be a Credential
too?
#83
Comments
Good pickup! So it looks like Long story short, I think OpenSSH allows certs here, so we should too 😄 I'll take a further dive into this, I think |
Thanks for the confirmation @jcspencer ! I plan to test all these messages locally, capture them using the |
Okay, I've spent a moment coding this up and it seems
|
Yeah, we need to to add another one of the |
Ack! The private data parsing was merged as part of #33. Thanks for the sanity check! 👍 |
This additional function is needed for SSH Agent Protocol where, based on the algorithm, we need to parse the `Certificate` or the `KeyData`. Without `decode_as` the `decode` function will greedily consume additional string from the reader. See: wiktor-k/ssh-agent-lib#83 Signed-off-by: Wiktor Kwapisiewicz <[email protected]>
…#233) * Expose `KeyData::decode_as` * Add `Certificate::decode_as` This additional function is needed for SSH Agent Protocol where, based on the algorithm, we need to parse the `Certificate` or the `KeyData`. Without `decode_as` the `decode` function will greedily consume additional string from the reader. See: wiktor-k/ssh-agent-lib#83 Signed-off-by: Wiktor Kwapisiewicz <[email protected]>
#33 added support for adding certificates (thanks @baloo 🙇 )
I wonder if
SignRequest::pubkey
should now be aCredential
(which wraps keys and certs alike) since today it's just aKeyData
.Thoughts?
(I'll probably need to make a reproducer 🤔 )
The text was updated successfully, but these errors were encountered: