Description
From Shiro HashedCredentialsMatcher , SHA-1 algorithms are now known to be vulnerable to compromise and/or collisions should use SHA-256.
From Shiro HashedCredentialsMatcher , SHA-1 algorithms are now known to be vulnerable to compromise and/or collisions should use SHA-256.