diff --git a/crypto/src/main/java/org/springframework/security/crypto/encrypt/Encryptors.java b/crypto/src/main/java/org/springframework/security/crypto/encrypt/Encryptors.java index aee376b702..7ebfb5a356 100644 --- a/crypto/src/main/java/org/springframework/security/crypto/encrypt/Encryptors.java +++ b/crypto/src/main/java/org/springframework/security/crypto/encrypt/Encryptors.java @@ -1,5 +1,5 @@ /* - * Copyright 2011-2016 the original author or authors. + * Copyright 2011-2020 the original author or authors. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -32,7 +32,7 @@ public class Encryptors { * (Password-Based Key Derivation Function #2). Salts the password to prevent * dictionary attacks against the key. The provided salt is expected to be * hex-encoded; it should be random and at least 8 bytes in length. Also applies a - * random 16 byte initialization vector to ensure each encrypted message will be + * random 16-byte initialization vector to ensure each encrypted message will be * unique. Requires Java 6. * * @param password the password used to generate the encryptor's secret key; should @@ -50,7 +50,7 @@ public class Encryptors { * Derives the secret key using PKCS #5's PBKDF2 (Password-Based Key Derivation * Function #2). Salts the password to prevent dictionary attacks against the key. The * provided salt is expected to be hex-encoded; it should be random and at least 8 - * bytes in length. Also applies a random 16 byte initialization vector to ensure each + * bytes in length. Also applies a random 16-byte initialization vector to ensure each * encrypted message will be unique. Requires Java 6. * NOTE: This mode is not * authenticated @@ -63,7 +63,7 @@ public class Encryptors { * @param salt a hex-encoded, random, site-global salt value to use to generate the * key * - * @see #stronger(CharSequence, CharSequence) which uses the significatly more secure + * @see #stronger(CharSequence, CharSequence), which uses the significatly more secure * GCM (instead of CBC) */ public static BytesEncryptor standard(CharSequence password, CharSequence salt) { @@ -105,7 +105,10 @@ public class Encryptors { * not be shared * @param salt a hex-encoded, random, site-global salt value to use to generate the * secret key + * @deprecated This encryptor is not secure. Instead, look to your data store for a + * mechanism to query encrypted data. */ + @Deprecated public static TextEncryptor queryableText(CharSequence password, CharSequence salt) { return new HexEncodingTextEncryptor(new AesBytesEncryptor(password.toString(), salt));