/** * Encodes a password. This implementation completely ignores salt, as jasypt's * <tt>PasswordEncryptor</tt> and <tt>StringDigester</tt> normally use a random one. Thus, it * can be safely passed as <tt>null</tt>. * * @param rawPass The password to be encoded. * @param salt The salt, which will be ignored. It can be null. */ public String encodePassword(final String rawPass, final Object salt) { checkInitialization(); if (this.useEncryptor.booleanValue()) { return this.passwordEncryptor.encryptPassword(rawPass); } return this.stringDigester.digest(rawPass); }
@Override public String hashForInternalUse(String raw) { return passwordEncryptor.digest(raw); }
/** * Encodes a password. This implementation completely ignores salt, * as jasypt's <tt>PasswordEncryptor</tt> and <tt>StringDigester</tt> * normally use a random one. Thus, it can be safely passed as <tt>null</tt>. * * @param rawPass The password to be encoded. * @param salt The salt, which will be ignored. It can be null. */ public String encodePassword(final String rawPass, final Object salt) { checkInitialization(); if (this.useEncryptor.booleanValue()) { return this.passwordEncryptor.encryptPassword(rawPass); } return this.stringDigester.digest(rawPass); }
/** * Encodes a password. This implementation completely ignores salt, * as jasypt's <tt>PasswordEncryptor</tt> and <tt>StringDigester</tt> * normally use a random one. Thus, it can be safely passed as <tt>null</tt>. * * @param rawPass The password to be encoded. * @param salt The salt, which will be ignored. It can be null. */ public String encodePassword(final String rawPass, final Object salt) { checkInitialization(); if (this.useEncryptor.booleanValue()) { return this.passwordEncryptor.encryptPassword(rawPass); } return this.stringDigester.digest(rawPass); }
System.currentTimeMillis() + 1000L* (tokenValiditySeconds < 0 ? TWO_WEEKS_S : tokenValiditySeconds); final String signature = this.digester.digest(getSignatureData(expiryTime, username, password));
System.currentTimeMillis() + 1000L* (tokenValiditySeconds < 0 ? TWO_WEEKS_S : tokenValiditySeconds); final String signature = this.digester.digest(getSignatureData(expiryTime, username, password));