Browse Source

Fix the JavaDoc for Pbkdf2PasswordEncoder so that it uses the actual values for default hash width and number of iterations

pull/4424/merge
Joris Portegies Zwart 9 years ago committed by Rob Winch
parent
commit
de9fe3e3b1
  1. 6
      crypto/src/main/java/org/springframework/security/crypto/password/Pbkdf2PasswordEncoder.java

6
crypto/src/main/java/org/springframework/security/crypto/password/Pbkdf2PasswordEncoder.java

@ -57,8 +57,8 @@ public class Pbkdf2PasswordEncoder implements PasswordEncoder { @@ -57,8 +57,8 @@ public class Pbkdf2PasswordEncoder implements PasswordEncoder {
/**
* Constructs a PBKDF2 password encoder with no additional secret value. There will be
* 185,000 iterations and a hash width of 256. The default is based upon aiming for .5
* seconds to validate the password when this class was added. Users should tune
* {@value DEFAULT_ITERATIONS} iterations and a hash width of {@value DEFAULT_HASH_WIDTH}. The default is based upon aiming for .5
* seconds to validate the password when this class was added.. Users should tune
* password verification to their own systems.
*/
public Pbkdf2PasswordEncoder() {
@ -67,7 +67,7 @@ public class Pbkdf2PasswordEncoder implements PasswordEncoder { @@ -67,7 +67,7 @@ public class Pbkdf2PasswordEncoder implements PasswordEncoder {
/**
* Constructs a standard password encoder with a secret value which is also included
* in the password hash. There will be 185,000 iterations and a hash width of 256.
* in the password hash. There will be {@value DEFAULT_ITERATIONS} iterations and a hash width of {@value DEFAULT_HASH_WIDTH}.
*
* @param secret the secret key used in the encoding process (should not be shared)
*/

Loading…
Cancel
Save