From 61b9eb1be03fc03a9f4bb0013a08ff44a1059503 Mon Sep 17 00:00:00 2001
From: Jean-Noël Rouvignac <jean-noel.rouvignac@forgerock.com>
Date: Wed, 20 Apr 2016 14:25:46 +0000
Subject: [PATCH] opendj-server-legacy: added @Override + Autorefactor'ed comments
---
opendj-server-legacy/src/main/java/org/opends/server/extensions/SHA1PasswordStorageScheme.java | 49 +------------------------------------------------
1 files changed, 1 insertions(+), 48 deletions(-)
diff --git a/opendj-server-legacy/src/main/java/org/opends/server/extensions/SHA1PasswordStorageScheme.java b/opendj-server-legacy/src/main/java/org/opends/server/extensions/SHA1PasswordStorageScheme.java
index c103a27..0ac70e3 100644
--- a/opendj-server-legacy/src/main/java/org/opends/server/extensions/SHA1PasswordStorageScheme.java
+++ b/opendj-server-legacy/src/main/java/org/opends/server/extensions/SHA1PasswordStorageScheme.java
@@ -16,8 +16,6 @@
*/
package org.opends.server.extensions;
-
-
import java.security.MessageDigest;
import java.util.Arrays;
@@ -37,8 +35,6 @@
import static org.opends.server.extensions.ExtensionsConstants.*;
import static org.opends.server.util.StaticUtils.*;
-
-
/**
* This class defines a Directory Server password storage scheme based on the
* SHA-1 algorithm defined in FIPS 180-1. This is a one-way digest algorithm
@@ -53,22 +49,16 @@
{
private static final LocalizedLogger logger = LocalizedLogger.getLoggerForThisClass();
- /**
- * The fully-qualified name of this class.
- */
+ /** The fully-qualified name of this class. */
private static final String CLASS_NAME =
"org.opends.server.extensions.SHA1PasswordStorageScheme";
-
-
/** The message digest that will actually be used to generate the SHA-1 hashes. */
private MessageDigest messageDigest;
/** The lock used to provide threadsafe access to the message digest. */
private Object digestLock;
-
-
/**
* Creates a new instance of this password storage scheme. Note that no
* initialization should be performed here, as all initialization should be
@@ -79,9 +69,6 @@
super();
}
-
-
- /** {@inheritDoc} */
@Override
public void initializePasswordStorageScheme(
SHA1PasswordStorageSchemeCfg configuration)
@@ -103,18 +90,12 @@
digestLock = new Object();
}
-
-
- /** {@inheritDoc} */
@Override
public String getStorageSchemeName()
{
return STORAGE_SCHEME_NAME_SHA_1;
}
-
-
- /** {@inheritDoc} */
@Override
public ByteString encodePassword(ByteSequence plaintext)
throws DirectoryException
@@ -151,9 +132,6 @@
return ByteString.valueOfUtf8(Base64.encode(digestBytes));
}
-
-
- /** {@inheritDoc} */
@Override
public ByteString encodePasswordWithScheme(ByteSequence plaintext)
throws DirectoryException
@@ -197,9 +175,6 @@
return ByteString.valueOfUtf8(buffer);
}
-
-
- /** {@inheritDoc} */
@Override
public boolean passwordMatches(ByteSequence plaintextPassword,
ByteSequence storedPassword)
@@ -247,9 +222,6 @@
return userPWDigestBytes.equals(storedPWDigestBytes);
}
-
-
- /** {@inheritDoc} */
@Override
public boolean supportsAuthPasswordSyntax()
{
@@ -257,9 +229,6 @@
return false;
}
-
-
- /** {@inheritDoc} */
@Override
public ByteString encodeAuthPassword(ByteSequence plaintext)
throws DirectoryException
@@ -269,9 +238,6 @@
throw new DirectoryException(ResultCode.UNWILLING_TO_PERFORM, message);
}
-
-
- /** {@inheritDoc} */
@Override
public boolean authPasswordMatches(ByteSequence plaintextPassword,
String authInfo, String authValue)
@@ -280,18 +246,12 @@
return false;
}
-
-
- /** {@inheritDoc} */
@Override
public boolean isReversible()
{
return false;
}
-
-
- /** {@inheritDoc} */
@Override
public ByteString getPlaintextValue(ByteSequence storedPassword)
throws DirectoryException
@@ -301,9 +261,6 @@
throw new DirectoryException(ResultCode.CONSTRAINT_VIOLATION, message);
}
-
-
- /** {@inheritDoc} */
@Override
public ByteString getAuthPasswordPlaintextValue(String authInfo,
String authValue)
@@ -314,9 +271,6 @@
throw new DirectoryException(ResultCode.UNWILLING_TO_PERFORM, message);
}
-
-
- /** {@inheritDoc} */
@Override
public boolean isStorageSchemeSecure()
{
@@ -324,4 +278,3 @@
return true;
}
}
-
--
Gitblit v1.10.0