Am 11.09.2014 18:12, schrieb Nick:
> It is not quite correct to replace "AES" with "AES256" based on
> the following reference:
> http://docs.oracle.com/javase/8/docs/technotes/guides/security/StandardNames.html

I found that out later as well. It seems that dependent on
your installed providers this sometimes works.

> Anyway I did few tests with 128, 192, 256 key lengths. All of
> them are passed successfully. Here are fragments of my code,
> please write me if I am mistaken:

that's OK.

> Let us assume that aes256-cbc and aes192-cbc are not available but It reports 
> nothing about aes128-cbc availability:
> 
>> kex: server: 
>> twofish-cbc,twofish128-cbc,3des-cbc,cast128-cbc,aes256-cbc,*aes128-cbc*
>> kex: client: aes128-ctr,*aes128-cbc*,3des-ctr,3des-cbc,blowfish-cbc

I missed these entries, so my theory is wrong ;-)

> So why it is failed?

Have you tried Atsuhiko's suggestion already? What size is the key
being involved here? Maybe that's what's too big.


Cheers, Lothar

------------------------------------------------------------------------------
Want excitement?
Manually upgrade your production database.
When you want reliability, choose Perforce
Perforce version control. Predictably reliable.
http://pubads.g.doubleclick.net/gampad/clk?id=157508191&iu=/4140/ostg.clktrk
_______________________________________________
JSch-users mailing list
JSch-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/jsch-users

Reply via email to