[ 
https://issues.apache.org/jira/browse/SHIRO-290?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13713799#comment-13713799
 ] 

Les Hazlewood commented on SHIRO-290:
-------------------------------------

As an approach, that'd be fine.  But I'm not so sure about jBcrypt itself: when 
I looked into its algorithm almost a year ago, it did not appear to implement 
the Eksblowfish algorithm correctly (Section 4 in this paper written by the 
BCrypt authors: https://www.usenix.org/legacy/event/usenix99/provos/provos.pdf).

One test might be to perform a BCrypt hash on unix and then, using the same 
password, attempt the BCrypt hash via jBcrypt - if they two results are 
identical, jBcrypt is probably fine, but I'd want to test the algorithm myself.
                
> Create a BCrypt Hash implementation
> -----------------------------------
>
>                 Key: SHIRO-290
>                 URL: https://issues.apache.org/jira/browse/SHIRO-290
>             Project: Shiro
>          Issue Type: New Feature
>          Components: Cryptography & Hashing
>            Reporter: Les Hazlewood
>            Assignee: Les Hazlewood
>             Fix For: 1.3.0
>
>
> Enable BCrypt hashing for those that wish to use it.  The following code can 
> probably be modified and included (it is a BSD license):
> http://www.mindrot.org/projects/jBCrypt/

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

Reply via email to