Return-Path: X-Original-To: apmail-cxf-users-archive@www.apache.org Delivered-To: apmail-cxf-users-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 852A5D3BA for ; Fri, 1 Feb 2013 21:28:31 +0000 (UTC) Received: (qmail 91919 invoked by uid 500); 1 Feb 2013 21:28:30 -0000 Delivered-To: apmail-cxf-users-archive@cxf.apache.org Received: (qmail 91865 invoked by uid 500); 1 Feb 2013 21:28:30 -0000 Mailing-List: contact users-help@cxf.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: users@cxf.apache.org Delivered-To: mailing list users@cxf.apache.org Received: (qmail 91852 invoked by uid 99); 1 Feb 2013 21:28:30 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 01 Feb 2013 21:28:30 +0000 X-ASF-Spam-Status: No, hits=-0.0 required=5.0 tests=RCVD_IN_DNSWL_NONE,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: domain of gmazza@talend.com designates 64.95.72.241 as permitted sender) Received: from [64.95.72.241] (HELO mxout.myoutlookonline.com) (64.95.72.241) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 01 Feb 2013 21:28:24 +0000 Received: from mxout.myoutlookonline.com (localhost [127.0.0.1]) by mxout.myoutlookonline.com (Postfix) with ESMTP id 082A68BFF06 for ; Fri, 1 Feb 2013 16:28:04 -0500 (EST) X-Virus-Scanned: by SpamTitan at mail.lan Received: from S10HUB003.SH10.lan (unknown [10.110.2.1]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by mxout.myoutlookonline.com (Postfix) with ESMTPS id 96C9D8BFEE0 for ; Fri, 1 Feb 2013 16:28:03 -0500 (EST) Received: from S10HUBR002.SH10.lan (10.110.133.101) by S10HUB003.SH10.lan (10.110.133.13) with Microsoft SMTP Server (TLS) id 14.1.379.0; Fri, 1 Feb 2013 16:28:03 -0500 Received: from [192.168.1.47] (71.191.237.199) by mail10.myoutlookonline.com (10.110.133.101) with Microsoft SMTP Server id 14.1.438.0; Fri, 1 Feb 2013 16:27:59 -0500 Message-ID: <510C335F.3080702@talend.com> Date: Fri, 1 Feb 2013 16:27:59 -0500 From: Glen Mazza User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130106 Thunderbird/17.0.2 MIME-Version: 1.0 To: Subject: Re: running samples sts from cxf 2.5 throwing error References: <1359746737249-5722616.post@n5.nabble.com> <510C2A8E.70601@talend.com> <1359752259.60565.YahooMailNeo@web163406.mail.gq1.yahoo.com> <1359753409552-5722622.post@n5.nabble.com> <44C5B230-98C0-466C-A509-CBAD3EF595CF@apache.org> In-Reply-To: <44C5B230-98C0-466C-A509-CBAD3EF595CF@apache.org> Content-Type: text/plain; charset="windows-1252"; format=flowed Content-Transfer-Encoding: 8bit X-Originating-IP: [71.191.237.199] X-Virus-Checked: Checked by ClamAV on apache.org Yes, per the sample's README unlimited strength is required (and available in both JDK 6 and 7), just follow the simple readme within the Oracle unlimited strength download for installation instructions. Glen On 02/01/2013 04:21 PM, Daniel Kulp wrote: > On Feb 1, 2013, at 4:16 PM, kk31 wrote: > >> I am installing jdk 1.7, will try to run once again. >> >> Dan, >> Can you please explain little bit more, what's do mean by unlimited >> strength of encryption stuff which is not available on JDK 6. >> May be its huge topic, but in short what are the things missing in >> jdk 6 > By default, the JDK's from Oracle have limited strength encryption built in. Large key sizes, certain algorithms, etc� won't work. It has to do with export restrictions or something. If you go to: > > http://www.oracle.com/technetwork/java/javase/downloads/jce-6-download-429243.html > > you can download replacement security things for the JRE which allows the stronger algorithms. > > -- Glen Mazza Talend Community Coders - coders.talend.com blog: www.jroller.com/gmazza