From 2d836a2702385563c401986738099f49ca7b946b Mon Sep 17 00:00:00 2001 From: "Francois @fanf42 Armand" Date: Wed, 7 Sep 2016 14:28:29 +0200 Subject: [PATCH] Fixes #8804: Give more precise requirements for JVM to manage AIX sha256/512 passwords --- 4_advanced_usage/50_script_in_directives.txt | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/4_advanced_usage/50_script_in_directives.txt b/4_advanced_usage/50_script_in_directives.txt index 0db8a2f1..d7edbc13 100644 --- a/4_advanced_usage/50_script_in_directives.txt +++ b/4_advanced_usage/50_script_in_directives.txt @@ -116,10 +116,12 @@ at each policy generation. ==== -AIX password generation depends on the availability of *PBKDF2WithHmac256* and -*PBKDF2WithHmac512* in the JVM. Some JVMs don't include these libraries. In -this case, the hashing algorithm falls back to *SHA1*, and an error message -will be logged. +AIX password generation depends on the availability of *PBKDF2WithHmacSHA256* and +*PBKDF2WithHmacSHA512* in the JVM. These algorithms are included by default on +HotSpot 1.8 and OpenJDK 1.8 and upward. In the case where your JVM does not support these +algorithms, typically on an IBM JDK or a JVM 1.7 version of HotStop and OpenJDK, the hashing +algorithm falls back to *SHA1* with *PBKDF2WithHmacSHA1*, and an error message will be +logged. You can also check your JVM editor manual to add support for these algorithms. ====