Expand description
Public key algorithms.
The SSH protocol supports several public key algorithms, which are used to authenticate the server and might also be used to authenticate the client.
Supported algorithms
- “ssh-ed25519” (
SSH_ED25519
, usesEd25519Pubkey
andEd25519Privkey
) - “ecdsa-sha2-nistp256” (
ECDSA_SHA2_NISTP256
, usesEcdsaPubkey<p256::NistP256>
andEcdsaPrivkey<p256::NistP256>
) - “ecdsa-sha2-nistp384” (
ECDSA_SHA2_NISTP384
, usesEcdsaPubkey<p384::NistP384>
andEcdsaPrivkey<p384::NistP384>
) - “ssh-rsa” (
SSH_RSA_SHA1
, usesRsaPubkey
andRsaPrivkey
) - “rsa-sha2-256” (
RSA_SHA2_256
, usesRsaPubkey
andRsaPrivkey
) - “rsa-sha2-512” (
RSA_SHA2_512
, usesRsaPubkey
andRsaPrivkey
)
Structs
- ECDSA private key using curve
C
. - ECDSA public key using curve
C
. - Ed25519 keypair from RFC 8032.
- Ed25519 public key from RFC 8032.
- Algorithm for public key cryptography.
- RSA whole key (private and public parts).
- RSA public key.
Enums
- Private key (keypair) in one of supported formats.
- Public key in one of supported formats.
Statics
- “ecdsa-sha2-nistp256” public key algorithm from RFC 5656.
- “ecdsa-sha2-nistp384” public key algorithm from RFC 5656.
- “rsa-sha2-256” public key algorithm from RFC 8332.
- “rsa-sha2-512” public key algorithm from RFC 8332.
- “ssh-ed25519” public key algorithm from RFC 8709.
- “ssh-rsa” public key algorithm using SHA-1 from RFC 4253.