From 61b9eb1be03fc03a9f4bb0013a08ff44a1059503 Mon Sep 17 00:00:00 2001
From: Jean-Noël Rouvignac <jean-noel.rouvignac@forgerock.com>
Date: Wed, 20 Apr 2016 14:25:46 +0000
Subject: [PATCH] opendj-server-legacy: added @Override + Autorefactor'ed comments

---
 opendj-server-legacy/src/main/java/org/opends/server/extensions/PBKDF2PasswordStorageScheme.java |   17 -----------------
 1 files changed, 0 insertions(+), 17 deletions(-)

diff --git a/opendj-server-legacy/src/main/java/org/opends/server/extensions/PBKDF2PasswordStorageScheme.java b/opendj-server-legacy/src/main/java/org/opends/server/extensions/PBKDF2PasswordStorageScheme.java
index a9a367e..ff5f40c 100644
--- a/opendj-server-legacy/src/main/java/org/opends/server/extensions/PBKDF2PasswordStorageScheme.java
+++ b/opendj-server-legacy/src/main/java/org/opends/server/extensions/PBKDF2PasswordStorageScheme.java
@@ -82,7 +82,6 @@
     super();
   }
 
-  /** {@inheritDoc} */
   @Override
   public void initializePasswordStorageScheme(PBKDF2PasswordStorageSchemeCfg configuration)
       throws ConfigException, InitializationException
@@ -102,7 +101,6 @@
     config.addPBKDF2ChangeListener(this);
   }
 
-  /** {@inheritDoc} */
   @Override
   public boolean isConfigurationChangeAcceptable(PBKDF2PasswordStorageSchemeCfg configuration,
                                                  List<LocalizableMessage> unacceptableReasons)
@@ -110,7 +108,6 @@
     return true;
   }
 
-  /** {@inheritDoc} */
   @Override
   public ConfigChangeResult applyConfigurationChange(PBKDF2PasswordStorageSchemeCfg configuration)
   {
@@ -118,14 +115,12 @@
     return new ConfigChangeResult();
   }
 
-  /** {@inheritDoc} */
   @Override
   public String getStorageSchemeName()
   {
     return STORAGE_SCHEME_NAME_PBKDF2;
   }
 
-  /** {@inheritDoc} */
   @Override
   public ByteString encodePassword(ByteSequence plaintext)
       throws DirectoryException
@@ -139,7 +134,6 @@
     return ByteString.valueOfUtf8(iterations + ":" + Base64.encode(hashPlusSalt));
   }
 
-  /** {@inheritDoc} */
   @Override
   public ByteString encodePasswordWithScheme(ByteSequence plaintext)
       throws DirectoryException
@@ -147,7 +141,6 @@
     return ByteString.valueOfUtf8('{' + STORAGE_SCHEME_NAME_PBKDF2 + '}' + encodePassword(plaintext));
   }
 
-  /** {@inheritDoc} */
   @Override
   public boolean passwordMatches(ByteSequence plaintextPassword, ByteSequence storedPassword) {
     // Split the iterations from the stored value (separated by a ':')
@@ -185,21 +178,18 @@
     }
   }
 
-  /** {@inheritDoc} */
   @Override
   public boolean supportsAuthPasswordSyntax()
   {
     return true;
   }
 
-  /** {@inheritDoc} */
   @Override
   public String getAuthPasswordSchemeName()
   {
     return AUTH_PASSWORD_SCHEME_NAME_PBKDF2;
   }
 
-  /** {@inheritDoc} */
   @Override
   public ByteString encodeAuthPassword(ByteSequence plaintext)
       throws DirectoryException
@@ -213,7 +203,6 @@
         + iterations + ':' + Base64.encode(saltBytes) + '$' + Base64.encode(digestBytes));
   }
 
-  /** {@inheritDoc} */
   @Override
   public boolean authPasswordMatches(ByteSequence plaintextPassword, String authInfo, String authValue)
   {
@@ -236,14 +225,12 @@
     }
   }
 
-  /** {@inheritDoc} */
   @Override
   public boolean isReversible()
   {
     return false;
   }
 
-  /** {@inheritDoc} */
   @Override
   public ByteString getPlaintextValue(ByteSequence storedPassword)
       throws DirectoryException
@@ -252,7 +239,6 @@
     throw new DirectoryException(ResultCode.CONSTRAINT_VIOLATION, message);
   }
 
-  /** {@inheritDoc} */
   @Override
   public ByteString getAuthPasswordPlaintextValue(String authInfo, String authValue)
       throws DirectoryException
@@ -261,14 +247,12 @@
     throw new DirectoryException(ResultCode.CONSTRAINT_VIOLATION, message);
   }
 
-  /** {@inheritDoc} */
   @Override
   public boolean isStorageSchemeSecure()
   {
     return true;
   }
 
-
   /**
    * Generates an encoded password string from the given clear-text password.
    * This method is primarily intended for use when it is necessary to generate a password with the server
@@ -364,5 +348,4 @@
     System.arraycopy(saltBytes, 0, hashPlusSalt, digestBytes.length, NUM_SALT_BYTES);
     return hashPlusSalt;
   }
-
 }

--
Gitblit v1.10.0