From d48079eb19ee6a543cd3444d8e268a057adb7180 Mon Sep 17 00:00:00 2001 From: Joris Portegies Zwart Date: Thu, 6 Jul 2017 11:44:22 +0200 Subject: [PATCH] JavaDoc for Pbkdf2PasswordEncoder refer to constants Fix Javadoc so that it uses the actual values for default hash width and number of iterations Fixes gh-4768 --- .../security/crypto/password/Pbkdf2PasswordEncoder.java | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/crypto/src/main/java/org/springframework/security/crypto/password/Pbkdf2PasswordEncoder.java b/crypto/src/main/java/org/springframework/security/crypto/password/Pbkdf2PasswordEncoder.java index 698c6b2e7a..90023d91ec 100644 --- a/crypto/src/main/java/org/springframework/security/crypto/password/Pbkdf2PasswordEncoder.java +++ b/crypto/src/main/java/org/springframework/security/crypto/password/Pbkdf2PasswordEncoder.java @@ -53,7 +53,7 @@ public class Pbkdf2PasswordEncoder implements PasswordEncoder { /** * Constructs a PBKDF2 password encoder with no additional secret value. There will be - * 360000 iterations and a hash width of 160. The default is based upon aiming for .5 + * {@value DEFAULT_ITERATIONS} iterations and a hash width of {@value DEFAULT_HASH_WIDTH}. The default is based upon aiming for .5 * seconds to validate the password when this class was added.. Users should tune * password verification to their own systems. */ @@ -63,7 +63,7 @@ public class Pbkdf2PasswordEncoder implements PasswordEncoder { /** * Constructs a standard password encoder with a secret value which is also included - * in the password hash. There will be 1024 iterations and a hash width of 160. + * in the password hash. There will be {@value DEFAULT_ITERATIONS} iterations and a hash width of {@value DEFAULT_HASH_WIDTH}. * * @param secret the secret key used in the encoding process (should not be shared) */ @@ -126,4 +126,4 @@ public class Pbkdf2PasswordEncoder implements PasswordEncoder { throw new IllegalStateException("Could not create hash", e); } } -} \ No newline at end of file +}