@@ -70,8 +70,8 @@ The main types provided by this library are:
7070* aes128-ctr
7171* aes192-ctr
7272* aes256-ctr
73- * aes128-gcm<span ></span >@openssh .com (.NET 6 and higher)
74- * aes256-gcm<span ></span >@openssh .com (.NET 6 and higher)
73+ * aes128-gcm<span ></span >@openssh .com
74+ * aes256-gcm<span ></span >@openssh .com
7575* chacha20-poly1305<span ></span >@openssh .com
7676* aes128-cbc
7777* aes192-cbc
@@ -96,19 +96,48 @@ The main types provided by this library are:
9696## Public Key Authentication
9797
9898** SSH.NET** supports the following private key formats:
99- * RSA in OpenSSL PEM ("BEGIN RSA PRIVATE KEY") and ssh.com ("BEGIN SSH2 ENCRYPTED PRIVATE KEY") format
100- * DSA in OpenSSL PEM ("BEGIN DSA PRIVATE KEY") and ssh.com ("BEGIN SSH2 ENCRYPTED PRIVATE KEY") format
101- * ECDSA 256/384/521 in OpenSSL PEM format ("BEGIN EC PRIVATE KEY")
102- * ECDSA 256/384/521, ED25519 and RSA in OpenSSH key format ("BEGIN OPENSSH PRIVATE KEY")
103-
104- Private keys can be encrypted using one of the following cipher methods:
99+ * RSA in
100+ * OpenSSL traditional PEM format ("BEGIN RSA PRIVATE KEY")
101+ * OpenSSL PKCS #8 PEM format ("BEGIN PRIVATE KEY", "BEGIN ENCRYPTED PRIVATE KEY")
102+ * ssh.com format ("BEGIN SSH2 ENCRYPTED PRIVATE KEY")
103+ * OpenSSH key format ("BEGIN OPENSSH PRIVATE KEY")
104+ * DSA in
105+ * OpenSSL traditional PEM format ("BEGIN DSA PRIVATE KEY")
106+ * OpenSSL PKCS #8 PEM format ("BEGIN PRIVATE KEY", "BEGIN ENCRYPTED PRIVATE KEY")
107+ * ssh.com format ("BEGIN SSH2 ENCRYPTED PRIVATE KEY")
108+ * ECDSA 256/384/521 in
109+ * OpenSSL traditional PEM format ("BEGIN EC PRIVATE KEY")
110+ * OpenSSL PKCS #8 PEM format ("BEGIN PRIVATE KEY", "BEGIN ENCRYPTED PRIVATE KEY")
111+ * OpenSSH key format ("BEGIN OPENSSH PRIVATE KEY")
112+ * ED25519 in
113+ * OpenSSL PKCS #8 PEM format ("BEGIN PRIVATE KEY", "BEGIN ENCRYPTED PRIVATE KEY")
114+ * OpenSSH key format ("BEGIN OPENSSH PRIVATE KEY")
115+
116+ Private keys in OpenSSL traditional PEM format can be encrypted using one of the following cipher methods:
105117* DES-EDE3-CBC
106118* DES-EDE3-CFB
107119* DES-CBC
108120* AES-128-CBC
109121* AES-192-CBC
110122* AES-256-CBC
111123
124+ Private keys in OpenSSL PKCS #8 PEM format can be encrypted using any cipher method BouncyCastle supports.
125+
126+ Private keys in ssh.com format can be encrypted using one of the following cipher methods:
127+ * 3des-cbc
128+
129+ Private keys in OpenSSH key format can be encrypted using one of the following cipher methods:
130+ * 3des-cbc
131+ * aes128-cbc
132+ * aes192-cbc
133+ * aes256-cbc
134+ * aes128-ctr
135+ * aes192-ctr
136+ * aes256-ctr
137+ * aes128-gcm<span ></span >@openssh .com
138+ * aes256-gcm<span ></span >@openssh .com
139+ * chacha20-poly1305<span ></span >@openssh .com
140+
112141## Host Key Algorithms
113142
114143** SSH.NET** supports the following host key algorithms:
0 commit comments