As far as I know Shiro uses the crypto libraries included in the JDK and just exposes them in a more user friendly way.
-- View this message in context: http://shiro-user.582556.n2.nabble.com/Strange-Sha256Hash-implementation-tp7580691p7580700.html Sent from the Shiro User mailing list archive at Nabble.com.
