files directly, in such a way that is completely transparent to SSH.
No modification is made to the SSH protocol on the wire (it continues
to use raw RSA public keys), and no modification is needed to the
files directly, in such a way that is completely transparent to SSH.
No modification is made to the SSH protocol on the wire (it continues
to use raw RSA public keys), and no modification is needed to the