I found this provider to be a good starting point
http://www.bouncycastle.org/latest_releases.html
There are multiple classes available for Message Digest 5
http://www.bouncycastle.org/docs/docs1.5/index.html
one of which is Message Digest 5 with Data Encryption Standard
see
JCEBlockCipher.PBEWit
I found this provider to be a good starting point
http://www.bouncycastle.org/latest_releases.html
There are multiple classes available for Message Digest 5
http://www.bouncycastle.org/docs/docs1.5/index.html
one of which is Message Digest 5 with Data Encryption Standard
see
JCEBlockCipher.PBEWit
There is no way built in to tomcat to obfuscate the password on a JNDI
resource. It's been discussed here on the list and the general
concensus is to secure the server.xml file from prying eyes using file
permissions and general server configuration.
--David
Darren wrote:
I tried adding dig
I tried adding digest="MD5" as you advised, but it's not being used.
If the password is left in cleartext (with digest="MD5") the
connection works fine, but if the MD5 version of the password is used
it fails to connect to the database.
On 16 Aug 2006, at 10:31, Yassine ELassad (YEL) wrote
HI Darren,
I guess you need this : digest="MD5" in your realm definition so it
would look like follow:
Greetings, Yassine
Cologne,Germany
On 8/16/06, Darren <[EMAIL PROTECTED]> wrote:
Hi,
I have a JDBC resource configured with tomcat 5.0 (in server.xml) and
it is working fine.
I would
Hi,
I have a JDBC resource configured with tomcat 5.0 (in server.xml) and
it is working fine.
type="javax.sql.DataSource" maxActive="10" maxIdle="15"
maxWait="1" removeAbandoned="true" removeAbandonedTimeout="300"
logAbandoned="true" driverClassName="com.mysql.jdbc.Driver"
username=