On May 15, 2012, at 11:17 PM, Atsuhiko Yamanaka wrote: > > If the provider "SunJCE" is available on your environment, > how about executing the following line at the beginning of your code? > > java.security.Security.insertProviderAt( > java.security.Security.getProvider("SunJCE"), > 1 > ); >
Unfortunately, one of my requirements is that all encryption algorithms have been validated through the US FIPS 140-2 approval process, and the SunJCE has not passed that validation. I must explicitly invoke Security.removeProvider("SunJCE"). There are a number of issues dealing with the PKCS11 interface, the main being that secret and private keys can never exist outside of the memory space of the "token". After digging through the source today, I don't think it will be an easy task to convert Jsch to work within those constraints. Mark Manes StillSecure, Inc. ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ JSch-users mailing list JSch-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/jsch-users