Hi,

   +-From: "John Elliott (IT)" <[email protected]> --
   |_Date: Mon, 14 May 2012 13:44:01 -0400 __________________
   |
   ...
   |byte[] sid=session.getSessionId();
   |int sidlen=sid.length;
   |byte[] tmp=new byte[4+sidlen+buf.index-5];
   |tmp[0]=(byte)(sidlen>>>24);
   |tmp[1]=(byte)(sidlen>>>16);
   |tmp[2]=(byte)(sidlen>>>8);
   |tmp[3]=(byte)(sidlen);
   |System.arraycopy(sid, 0, tmp, 4, sidlen);
   |System.arraycopy(buf.buffer, 5, tmp, 4+sidlen, buf.index-5);
   |byte[] signature=identity.getSignature(tmp);
   |if(signature==null){ // for example, too long key length.
   |break;
   |}

   |The target server registers no complaints, however the signature
   |is set to null for the bad key, not null for the good key.

If I have that key pair, I may be able to check what's going on.
Can you send it to me directly?


Sincerely,
--
Atsuhiko Yamanaka
JCraft,Inc.
1-14-20 HONCHO AOBA-KU,
SENDAI, MIYAGI 980-0014 Japan.
Tel +81-22-723-2150
Skype callto://jcraft/
Twitter: http://twitter.com/ymnk
Facebook: http://facebook.com/aymnk

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
JSch-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/jsch-users

Reply via email to