From 61b9eb1be03fc03a9f4bb0013a08ff44a1059503 Mon Sep 17 00:00:00 2001
From: Jean-Noël Rouvignac <jean-noel.rouvignac@forgerock.com>
Date: Wed, 20 Apr 2016 14:25:46 +0000
Subject: [PATCH] opendj-server-legacy: added @Override + Autorefactor'ed comments

---
 opendj-server-legacy/src/main/java/org/opends/server/extensions/PlainSASLMechanismHandler.java |   37 +------------------------------------
 1 files changed, 1 insertions(+), 36 deletions(-)

diff --git a/opendj-server-legacy/src/main/java/org/opends/server/extensions/PlainSASLMechanismHandler.java b/opendj-server-legacy/src/main/java/org/opends/server/extensions/PlainSASLMechanismHandler.java
index 53130a5..eff15b6 100644
--- a/opendj-server-legacy/src/main/java/org/opends/server/extensions/PlainSASLMechanismHandler.java
+++ b/opendj-server-legacy/src/main/java/org/opends/server/extensions/PlainSASLMechanismHandler.java
@@ -64,14 +64,12 @@
 {
   private static final LocalizedLogger logger = LocalizedLogger.getLoggerForThisClass();
 
-  /** The identity mapper that will be used to map ID strings to user entries.*/
+  /** The identity mapper that will be used to map ID strings to user entries. */
   private IdentityMapper<?> identityMapper;
 
   /** The current configuration for this SASL mechanism handler. */
   private PlainSASLMechanismHandlerCfg currentConfig;
 
-
-
   /**
    * Creates a new instance of this SASL mechanism handler.  No initialization
    * should be done in this method, as it should all be performed in the
@@ -82,9 +80,6 @@
     super();
   }
 
-
-
-  /** {@inheritDoc} */
   @Override
   public void initializeSASLMechanismHandler(
                    PlainSASLMechanismHandlerCfg configuration)
@@ -93,18 +88,13 @@
     configuration.addPlainChangeListener(this);
     currentConfig = configuration;
 
-
     // Get the identity mapper that should be used to find users.
     DN identityMapperDN = configuration.getIdentityMapperDN();
     identityMapper = DirectoryServer.getIdentityMapper(identityMapperDN);
 
-
     DirectoryServer.registerSASLMechanismHandler(SASL_MECHANISM_PLAIN, this);
   }
 
-
-
-  /** {@inheritDoc} */
   @Override
   public void finalizeSASLMechanismHandler()
   {
@@ -112,10 +102,6 @@
     DirectoryServer.deregisterSASLMechanismHandler(SASL_MECHANISM_PLAIN);
   }
 
-
-
-
-  /** {@inheritDoc} */
   @Override
   public void processSASLBind(BindOperation bindOperation)
   {
@@ -151,7 +137,6 @@
       authzID = credString.substring(0, nullPos1);
     }
 
-
     int nullPos2 = credString.indexOf('\u0000', nullPos1+1);
     if (nullPos2 < 0)
     {
@@ -183,7 +168,6 @@
     authcID  = credString.substring(nullPos1+1, nullPos2);
     password = credString.substring(nullPos2+1);
 
-
     // Get the user entry for the authentication ID.  Allow for an
     // authentication ID that is just a username (as per the SASL PLAIN spec),
     // but also allow a value in the authzid form specified in RFC 2829.
@@ -259,7 +243,6 @@
       }
     }
 
-
     // At this point, we should have a user entry.  If we don't then fail.
     if (userEntry == null)
     {
@@ -274,7 +257,6 @@
       bindOperation.setSASLAuthUserEntry(userEntry);
     }
 
-
     // If an authorization ID was provided, then make sure that it is
     // acceptable.
     Entry authZEntry = userEntry;
@@ -413,7 +395,6 @@
       }
     }
 
-
     // Get the password policy for the user and use it to determine if the
     // provided password was correct.
     try
@@ -452,7 +433,6 @@
       return;
     }
 
-
     // If we've gotten here, then the authentication was successful.
     bindOperation.setResultCode(ResultCode.SUCCESS);
 
@@ -464,9 +444,6 @@
     return;
   }
 
-
-
-  /** {@inheritDoc} */
   @Override
   public boolean isPasswordBased(String mechanism)
   {
@@ -474,9 +451,6 @@
     return true;
   }
 
-
-
-  /** {@inheritDoc} */
   @Override
   public boolean isSecure(String mechanism)
   {
@@ -484,9 +458,6 @@
     return false;
   }
 
-
-
-  /** {@inheritDoc} */
   @Override
   public boolean isConfigurationAcceptable(
                       SASLMechanismHandlerCfg configuration,
@@ -497,9 +468,6 @@
     return isConfigurationChangeAcceptable(config, unacceptableReasons);
   }
 
-
-
-  /** {@inheritDoc} */
   @Override
   public boolean isConfigurationChangeAcceptable(
                       PlainSASLMechanismHandlerCfg configuration,
@@ -508,9 +476,6 @@
     return true;
   }
 
-
-
-  /** {@inheritDoc} */
   @Override
   public ConfigChangeResult applyConfigurationChange(
               PlainSASLMechanismHandlerCfg configuration)

--
Gitblit v1.10.0