https://issues.apache.org/bugzilla/show_bug.cgi?id=51966

--- Comment #3 from Adam Caldwell <accaldw...@west.com> 2011-10-05 22:16:39 UTC 
---
Thank you for the great feedback. The salt isn't part of the users password. If
you look at the digest method that's used to generate the encoded password, it
is 4 random bytes. The ssha name is the same name/4 random byte method that is
already used in the ldap code. 

My need for this stems from a weblogic to tomcat conversion we are doing.
Weblogic uses the same 4-byte random method.

I do like the idea of hard-coding less though so that you could use salts with
any algorithm. I'll see what I can come up with.

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to