So for this example password:
{crypt}$6$8W2nXYP2YhgxuSDk$aYEhNk04T5fNxzNPOS3FPoJ46tkhj9QNDAqtyuotu.LCi15K0Jqjk.t2M5kOnPckkO7q27P.g3VhsFWxOdGZD0
the salt value is:
8W2nXYP2YhgxuSDk
And the actual SHA512 hashed password that was produced with the above salt
is:
aYEhNk04T5fNxzNPOS3FPoJ46tkhj9QNDAqtyuotu.LCi15K0Jqjk.t2M5kOnPckkO7q27P.g3VhsFWxOdGZD0
Is that correct?
Yes
Are you also using the default 5000 rounds?
Yes, thought EGroupware would understand a hash like
"$6$rounds=10000$$ hash.
I’m also assuming the {crypt} part at the beginning is also required?
That’s an LDAP convention we are using in our database too, to be able
to support different hashing methods.
I’m not a PHP programmer. I’m trying to replicate the functionality using CFML,
so I’m just trying to figure out how it works. I really appreciate this.
I thought that’s an already dead technology 
Ralf
Ralf Becker
Director Software Development
Stylite AG
Morschheimer Strasse 15 | Tel. +49 6352 70629 0
D-67292 Kirchheimbolanden | Fax. +49 6352 70629 30
Email: rb@stylite.de
www.stylite.de | www.egroupware.org
Managing Directors: Andre Keller | Ralf Becker | Gudrun Mueller
Chairman of the supervisory board: Prof. Dr. Birger Leon Kropshofer
VAT DE214280951 | Registered HRB 31158 Kaiserslautern Germany
Symantec Endpoint Protection 12 positioned as A LEADER in The Forrester
Wave™: Endpoint Security, Q1 2013 and “remains a good choice” in the
endpoint security space. For insight on selecting the right partner to
tackle endpoint security challenges, access the full report.
http://p.sf.net/sfu/symantec-dev2dev
eGroupWare-users mailing list
eGroupWare-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/egroupware-users