As far as I know Shiro uses the crypto libraries included in the JDK and just
exposes them in a more user friendly way.



--
View this message in context: 
http://shiro-user.582556.n2.nabble.com/Strange-Sha256Hash-implementation-tp7580691p7580700.html
Sent from the Shiro User mailing list archive at Nabble.com.

Reply via email to