-
-
Notifications
You must be signed in to change notification settings - Fork 675
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RFC 4253 (OpenSSH) ECDSA public keys are not supported #243
Comments
mark-adams
added a commit
that referenced
this issue
Mar 14, 2017
Cryptography previously lacked support for ECDSA keys in RFC 4253 format. Now that they have support for those keys, we should take advantage of it and support them in PyJWT. Implements #243.
mark-adams
added a commit
that referenced
this issue
Mar 14, 2017
Cryptography previously lacked support for ECDSA keys in RFC 4253 format. Now that they have support for those keys, we should take advantage of it and support them in PyJWT. Implements #243.
mark-adams
added a commit
that referenced
this issue
Mar 14, 2017
Cryptography previously lacked support for ECDSA keys in RFC 4253 format. Now that they have support for those keys, we should take advantage of it and support them in PyJWT. Implements #243.
mark-adams
added a commit
that referenced
this issue
Mar 14, 2017
Cryptography previously lacked support for ECDSA keys in RFC 4253 format. Now that they have support for those keys, we should take advantage of it and support them in PyJWT. Implements #243.
mark-adams
added a commit
that referenced
this issue
Mar 14, 2017
Cryptography previously lacked support for ECDSA keys in RFC 4253 format. Now that they have support for those keys, we should take advantage of it and support them in PyJWT. Implements #243.
Closed by #244 Thanks @mark-adams! |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Previously,
cryptography
did not support ECDSA OpenSSH-style public keys. Now they do so we should implement support for it.The text was updated successfully, but these errors were encountered: