From 393f1a0f3650b3a8f0742e7a6d9d5bcc176d8128 Mon Sep 17 00:00:00 2001 From: ljacqu Date: Mon, 18 Jan 2016 15:17:02 +0100 Subject: [PATCH] Minor: replace self-closing tags in javadoc --- .../authme/security/crypts/BCryptService.java | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/src/main/java/fr/xephi/authme/security/crypts/BCryptService.java b/src/main/java/fr/xephi/authme/security/crypts/BCryptService.java index c2f58f605..94ed32c3c 100644 --- a/src/main/java/fr/xephi/authme/security/crypts/BCryptService.java +++ b/src/main/java/fr/xephi/authme/security/crypts/BCryptService.java @@ -33,25 +33,25 @@ import java.security.SecureRandom; * call the hashpw method with a random salt, like this: *

* - * String pw_hash = BCrypt.hashpw(plain_password, BCrypt.gensalt());
+ * String pw_hash = BCrypt.hashpw(plain_password, BCrypt.gensalt());
*
*

* To check whether a plaintext password matches one that has been * hashed previously, use the checkpw method: *

* - * if (BCrypt.checkpw(candidate_password, stored_hash))
- *     System.out.println("It matches");
- * else
- *     System.out.println("It does not match");
+ * if (BCrypt.checkpw(candidate_password, stored_hash))
+ *     System.out.println("It matches");
+ * else
+ *     System.out.println("It does not match");
*
*

* The gensalt() method takes an optional parameter (log_rounds) * that determines the computational complexity of the hashing: *

* - * String strong_salt = BCrypt.gensalt(10)
- * String stronger_salt = BCrypt.gensalt(12)
+ * String strong_salt = BCrypt.gensalt(10)
+ * String stronger_salt = BCrypt.gensalt(12)
*
*

* The amount of work increases exponentially (2**log_rounds), so