From 61b9eb1be03fc03a9f4bb0013a08ff44a1059503 Mon Sep 17 00:00:00 2001
From: Jean-Noël Rouvignac <jean-noel.rouvignac@forgerock.com>
Date: Wed, 20 Apr 2016 14:25:46 +0000
Subject: [PATCH] opendj-server-legacy: added @Override + Autorefactor'ed comments
---
opendj-server-legacy/src/main/java/org/opends/server/extensions/PBKDF2PasswordStorageScheme.java | 17 -----------------
1 files changed, 0 insertions(+), 17 deletions(-)
diff --git a/opendj-server-legacy/src/main/java/org/opends/server/extensions/PBKDF2PasswordStorageScheme.java b/opendj-server-legacy/src/main/java/org/opends/server/extensions/PBKDF2PasswordStorageScheme.java
index a9a367e..ff5f40c 100644
--- a/opendj-server-legacy/src/main/java/org/opends/server/extensions/PBKDF2PasswordStorageScheme.java
+++ b/opendj-server-legacy/src/main/java/org/opends/server/extensions/PBKDF2PasswordStorageScheme.java
@@ -82,7 +82,6 @@
super();
}
- /** {@inheritDoc} */
@Override
public void initializePasswordStorageScheme(PBKDF2PasswordStorageSchemeCfg configuration)
throws ConfigException, InitializationException
@@ -102,7 +101,6 @@
config.addPBKDF2ChangeListener(this);
}
- /** {@inheritDoc} */
@Override
public boolean isConfigurationChangeAcceptable(PBKDF2PasswordStorageSchemeCfg configuration,
List<LocalizableMessage> unacceptableReasons)
@@ -110,7 +108,6 @@
return true;
}
- /** {@inheritDoc} */
@Override
public ConfigChangeResult applyConfigurationChange(PBKDF2PasswordStorageSchemeCfg configuration)
{
@@ -118,14 +115,12 @@
return new ConfigChangeResult();
}
- /** {@inheritDoc} */
@Override
public String getStorageSchemeName()
{
return STORAGE_SCHEME_NAME_PBKDF2;
}
- /** {@inheritDoc} */
@Override
public ByteString encodePassword(ByteSequence plaintext)
throws DirectoryException
@@ -139,7 +134,6 @@
return ByteString.valueOfUtf8(iterations + ":" + Base64.encode(hashPlusSalt));
}
- /** {@inheritDoc} */
@Override
public ByteString encodePasswordWithScheme(ByteSequence plaintext)
throws DirectoryException
@@ -147,7 +141,6 @@
return ByteString.valueOfUtf8('{' + STORAGE_SCHEME_NAME_PBKDF2 + '}' + encodePassword(plaintext));
}
- /** {@inheritDoc} */
@Override
public boolean passwordMatches(ByteSequence plaintextPassword, ByteSequence storedPassword) {
// Split the iterations from the stored value (separated by a ':')
@@ -185,21 +178,18 @@
}
}
- /** {@inheritDoc} */
@Override
public boolean supportsAuthPasswordSyntax()
{
return true;
}
- /** {@inheritDoc} */
@Override
public String getAuthPasswordSchemeName()
{
return AUTH_PASSWORD_SCHEME_NAME_PBKDF2;
}
- /** {@inheritDoc} */
@Override
public ByteString encodeAuthPassword(ByteSequence plaintext)
throws DirectoryException
@@ -213,7 +203,6 @@
+ iterations + ':' + Base64.encode(saltBytes) + '$' + Base64.encode(digestBytes));
}
- /** {@inheritDoc} */
@Override
public boolean authPasswordMatches(ByteSequence plaintextPassword, String authInfo, String authValue)
{
@@ -236,14 +225,12 @@
}
}
- /** {@inheritDoc} */
@Override
public boolean isReversible()
{
return false;
}
- /** {@inheritDoc} */
@Override
public ByteString getPlaintextValue(ByteSequence storedPassword)
throws DirectoryException
@@ -252,7 +239,6 @@
throw new DirectoryException(ResultCode.CONSTRAINT_VIOLATION, message);
}
- /** {@inheritDoc} */
@Override
public ByteString getAuthPasswordPlaintextValue(String authInfo, String authValue)
throws DirectoryException
@@ -261,14 +247,12 @@
throw new DirectoryException(ResultCode.CONSTRAINT_VIOLATION, message);
}
- /** {@inheritDoc} */
@Override
public boolean isStorageSchemeSecure()
{
return true;
}
-
/**
* Generates an encoded password string from the given clear-text password.
* This method is primarily intended for use when it is necessary to generate a password with the server
@@ -364,5 +348,4 @@
System.arraycopy(saltBytes, 0, hashPlusSalt, digestBytes.length, NUM_SALT_BYTES);
return hashPlusSalt;
}
-
}
--
Gitblit v1.10.0