mirror of
https://github.com/spring-projects/spring-security.git
synced 2025-03-01 10:59:16 +00:00
Fix the JavaDoc for Pbkdf2PasswordEncoder so that it uses the actual values for default hash width and number of iterations
This commit is contained in:
parent
4fa9b4dd15
commit
de9fe3e3b1
@ -57,8 +57,8 @@ public class Pbkdf2PasswordEncoder implements PasswordEncoder {
|
||||
|
||||
/**
|
||||
* Constructs a PBKDF2 password encoder with no additional secret value. There will be
|
||||
* 185,000 iterations and a hash width of 256. The default is based upon aiming for .5
|
||||
* seconds to validate the password when this class was added. Users should tune
|
||||
* {@value DEFAULT_ITERATIONS} iterations and a hash width of {@value DEFAULT_HASH_WIDTH}. The default is based upon aiming for .5
|
||||
* seconds to validate the password when this class was added.. Users should tune
|
||||
* password verification to their own systems.
|
||||
*/
|
||||
public Pbkdf2PasswordEncoder() {
|
||||
@ -67,7 +67,7 @@ public class Pbkdf2PasswordEncoder implements PasswordEncoder {
|
||||
|
||||
/**
|
||||
* Constructs a standard password encoder with a secret value which is also included
|
||||
* in the password hash. There will be 185,000 iterations and a hash width of 256.
|
||||
* in the password hash. There will be {@value DEFAULT_ITERATIONS} iterations and a hash width of {@value DEFAULT_HASH_WIDTH}.
|
||||
*
|
||||
* @param secret the secret key used in the encoding process (should not be shared)
|
||||
*/
|
||||
|
Loading…
x
Reference in New Issue
Block a user