diff --git a/src/main/java/fr/xephi/authme/security/crypts/BCryptService.java b/src/main/java/fr/xephi/authme/security/crypts/BCryptService.java index c2f58f60..94ed32c3 100644 --- a/src/main/java/fr/xephi/authme/security/crypts/BCryptService.java +++ b/src/main/java/fr/xephi/authme/security/crypts/BCryptService.java @@ -33,25 +33,25 @@ import java.security.SecureRandom; * call the hashpw method with a random salt, like this: *
*
- * String pw_hash = BCrypt.hashpw(plain_password, BCrypt.gensalt());
*
+ * String pw_hash = BCrypt.hashpw(plain_password, BCrypt.gensalt());
*
* To check whether a plaintext password matches one that has been * hashed previously, use the checkpw method: *
*
- * if (BCrypt.checkpw(candidate_password, stored_hash))
*
- * System.out.println("It matches");
- * else
- * System.out.println("It does not match");
+ * if (BCrypt.checkpw(candidate_password, stored_hash))
+ * System.out.println("It matches");
+ * else
+ * System.out.println("It does not match");
*
* The gensalt() method takes an optional parameter (log_rounds) * that determines the computational complexity of the hashing: *
*
- * String strong_salt = BCrypt.gensalt(10)
*
- * String stronger_salt = BCrypt.gensalt(12)
+ * String strong_salt = BCrypt.gensalt(10)
+ * String stronger_salt = BCrypt.gensalt(12)
*
* The amount of work increases exponentially (2**log_rounds), so