Hi, +-From: "John Elliott (IT)" <[email protected]> -- |_Date: Mon, 14 May 2012 13:44:01 -0400 __________________ | ... |byte[] sid=session.getSessionId(); |int sidlen=sid.length; |byte[] tmp=new byte[4+sidlen+buf.index-5]; |tmp[0]=(byte)(sidlen>>>24); |tmp[1]=(byte)(sidlen>>>16); |tmp[2]=(byte)(sidlen>>>8); |tmp[3]=(byte)(sidlen); |System.arraycopy(sid, 0, tmp, 4, sidlen); |System.arraycopy(buf.buffer, 5, tmp, 4+sidlen, buf.index-5); |byte[] signature=identity.getSignature(tmp); |if(signature==null){ // for example, too long key length. |break; |}
|The target server registers no complaints, however the signature |is set to null for the bad key, not null for the good key. If I have that key pair, I may be able to check what's going on. Can you send it to me directly? Sincerely, -- Atsuhiko Yamanaka JCraft,Inc. 1-14-20 HONCHO AOBA-KU, SENDAI, MIYAGI 980-0014 Japan. Tel +81-22-723-2150 Skype callto://jcraft/ Twitter: http://twitter.com/ymnk Facebook: http://facebook.com/aymnk ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ JSch-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/jsch-users
