فهرست منبع

Fix the JavaDoc for Pbkdf2PasswordEncoder so that it uses the actual values for default hash width and number of iterations

Joris Portegies Zwart 8 سال پیش
والد
کامیت
de9fe3e3b1
1فایلهای تغییر یافته به همراه3 افزوده شده و 3 حذف شده
  1. 3 3
      crypto/src/main/java/org/springframework/security/crypto/password/Pbkdf2PasswordEncoder.java

+ 3 - 3
crypto/src/main/java/org/springframework/security/crypto/password/Pbkdf2PasswordEncoder.java

@@ -57,8 +57,8 @@ public class Pbkdf2PasswordEncoder implements PasswordEncoder {
 
 	/**
 	 * Constructs a PBKDF2 password encoder with no additional secret value. There will be
-	 * 185,000 iterations and a hash width of 256. The default is based upon aiming for .5
-	 * seconds to validate the password when this class was added. Users should tune
+	 * {@value DEFAULT_ITERATIONS} iterations and a hash width of {@value DEFAULT_HASH_WIDTH}. The default is based upon aiming for .5
+	 * seconds to validate the password when this class was added.. Users should tune
 	 * password verification to their own systems.
 	 */
 	public Pbkdf2PasswordEncoder() {
@@ -67,7 +67,7 @@ public class Pbkdf2PasswordEncoder implements PasswordEncoder {
 
 	/**
 	 * Constructs a standard password encoder with a secret value which is also included
-	 * in the password hash. There will be 185,000 iterations and a hash width of 256.
+	 * in the password hash. There will be {@value DEFAULT_ITERATIONS} iterations and a hash width of {@value DEFAULT_HASH_WIDTH}.
 	 *
 	 * @param secret the secret key used in the encoding process (should not be shared)
 	 */