diff --git a/src/sign.rs b/src/sign.rs
index 44b54bb23cb71406e942c048b247615755425a81..e8afa7f0e490a4ac4a3238b3f9c8a8754712242d 100644
--- a/src/sign.rs
+++ b/src/sign.rs
@@ -68,10 +68,11 @@ impl SigType {
                 let k: salty::PublicKey = k.try_into().map_err(|_| Error::BadKey)?;
                 let s: &[u8; 64] = s.sig.0.try_into().map_err(|_| Error::BadSig)?;
                 let s: salty::Signature = s.into();
-                k.verify_parts(&s, |h| {
-                    sshwire::hash_ser(h, msg, None).map_err(|_| salty::Error::ContextTooLong)
-                })
-                .map_err(|_| Error::BadSig)
+                todo!("get verify_parts upstream");
+                // k.verify_parts(&s, |h| {
+                //     sshwire::hash_ser(h, msg, None).map_err(|_| salty::Error::ContextTooLong)
+                // })
+                // .map_err(|_| Error::BadSig)
             }
 
             (SigType::RSA256, PubKey::RSA(_k), Signature::RSA256(_s)) => {
@@ -151,11 +152,12 @@ impl SignKey {
     pub(crate) fn sign(&self, msg: &impl SSHEncode, parse_ctx: Option<&ParseContext>) -> Result<OwnedSig> {
         match self {
             SignKey::Ed25519(k) => {
-                k.sign_parts(|h| {
-                    sshwire::hash_ser(h, msg, parse_ctx).map_err(|_| salty::Error::ContextTooLong)
-                })
-                .trap()
-                .map(|s| s.into())
+                todo!("get sign_parts upstream");
+                // k.sign_parts(|h| {
+                //     sshwire::hash_ser(h, msg, parse_ctx).map_err(|_| salty::Error::ContextTooLong)
+                // })
+                // .trap()
+                // .map(|s| s.into())
             }
         }
     }