This change allows the "special" salt type to be used in supported_enctypes or in the argument to kadmin's cpw -e. If used, kadmind will pick a salt consisting of 64 random bits represented as 16 printable ASCII characters. The use of random explicit salts creates some interoperability issues and is not generally recommended, but can be useful for interop testing, as a workaround for obscure bugs, or to increase the difficulty of brute-force password searches in situations where none of the interoperability issues apply. https://github.com/krb5/krb5/commit/260161b4fe2a05b9afa95446eee9096f6c75ceaf Commit By: ghudson Revision: 25226 Changed Files: U trunk/src/lib/kdb/kdb_cpw.c