No, the server has no knowledge of the protection used for the SSH key on the client.
It could be a passworded PEM file, a key loaded into an agent, stored on a smartcard, etc -- all the server knows is the client responded with the correctly signed response.
No, the server has no knowledge of the protection used for the SSH key on the client.
It could be a passworded PEM file, a key loaded into an agent, stored on a smartcard, etc -- all the server knows is the client responded with the correctly signed response.