Skip to content

Commit 716aa6d

Browse files
committed
Merge branch '5.8.x'
2 parents ed6a7f7 + ffbcaca commit 716aa6d

File tree

2 files changed

+20
-12
lines changed

2 files changed

+20
-12
lines changed

docs/modules/ROOT/pages/features/authentication/password-storage.adoc

Lines changed: 18 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -93,8 +93,12 @@ String idForEncode = "bcrypt";
9393
Map encoders = new HashMap<>();
9494
encoders.put(idForEncode, new BCryptPasswordEncoder());
9595
encoders.put("noop", NoOpPasswordEncoder.getInstance());
96-
encoders.put("pbkdf2", new Pbkdf2PasswordEncoder());
97-
encoders.put("scrypt", new SCryptPasswordEncoder());
96+
encoders.put("pbkdf2", Pbkdf2PasswordEncoder.defaultsForSpringSecurity_v5_5());
97+
encoders.put("pbkdf2@SpringSecurity_v5_8", Pbkdf2PasswordEncoder.defaultsForSpringSecurity_v5_8());
98+
encoders.put("scrypt", SCryptPasswordEncoder.defaultsForSpringSecurity_v4_1());
99+
encoders.put("scrypt@SpringSecurity_v5_8", SCryptPasswordEncoder.defaultsForSpringSecurity_v5_8());
100+
encoders.put("argon2", Argon2PasswordEncoder.defaultsForSpringSecurity_v5_2());
101+
encoders.put("argon2@SpringSecurity_v5_8", Argon2PasswordEncoder.defaultsForSpringSecurity_v5_8());
98102
encoders.put("sha256", new StandardPasswordEncoder());
99103
100104
PasswordEncoder passwordEncoder =
@@ -108,8 +112,12 @@ val idForEncode = "bcrypt"
108112
val encoders: MutableMap<String, PasswordEncoder> = mutableMapOf()
109113
encoders[idForEncode] = BCryptPasswordEncoder()
110114
encoders["noop"] = NoOpPasswordEncoder.getInstance()
111-
encoders["pbkdf2"] = Pbkdf2PasswordEncoder()
112-
encoders["scrypt"] = SCryptPasswordEncoder()
115+
encoders["pbkdf2"] = Pbkdf2PasswordEncoder.defaultsForSpringSecurity_v5_5()
116+
encoders["pbkdf2@SpringSecurity_v5_8"] = Pbkdf2PasswordEncoder.defaultsForSpringSecurity_v5_8()
117+
encoders["scrypt"] = SCryptPasswordEncoder.defaultsForSpringSecurity_v4_1()
118+
encoders["scrypt@SpringSecurity_v5_8"] = SCryptPasswordEncoder.defaultsForSpringSecurity_v5_8()
119+
encoders["argon2"] = Argon2PasswordEncoder.defaultsForSpringSecurity_v5_2()
120+
encoders["argon2@SpringSecurity_v5_8"] = Argon2PasswordEncoder.defaultsForSpringSecurity_v5_8()
113121
encoders["sha256"] = StandardPasswordEncoder()
114122
115123
val passwordEncoder: PasswordEncoder = DelegatingPasswordEncoder(idForEncode, encoders)
@@ -367,7 +375,7 @@ The current implementation of the `Argon2PasswordEncoder` requires BouncyCastle.
367375
[source,java,role="primary"]
368376
----
369377
// Create an encoder with all the defaults
370-
Argon2PasswordEncoder encoder = new Argon2PasswordEncoder();
378+
Argon2PasswordEncoder encoder = Argon2PasswordEncoder.defaultsForSpringSecurity_v5_8();
371379
String result = encoder.encode("myPassword");
372380
assertTrue(encoder.matches("myPassword", result));
373381
----
@@ -376,7 +384,7 @@ assertTrue(encoder.matches("myPassword", result));
376384
[source,kotlin,role="secondary"]
377385
----
378386
// Create an encoder with all the defaults
379-
val encoder = Argon2PasswordEncoder()
387+
val encoder = Argon2PasswordEncoder.defaultsForSpringSecurity_v5_8()
380388
val result: String = encoder.encode("myPassword")
381389
assertTrue(encoder.matches("myPassword", result))
382390
----
@@ -396,7 +404,7 @@ This algorithm is a good choice when FIPS certification is required.
396404
[source,java,role="primary"]
397405
----
398406
// Create an encoder with all the defaults
399-
Pbkdf2PasswordEncoder encoder = new Pbkdf2PasswordEncoder();
407+
Pbkdf2PasswordEncoder encoder = Pbkdf2PasswordEncoder.defaultsForSpringSecurity_v5_8();
400408
String result = encoder.encode("myPassword");
401409
assertTrue(encoder.matches("myPassword", result));
402410
----
@@ -405,7 +413,7 @@ assertTrue(encoder.matches("myPassword", result));
405413
[source,kotlin,role="secondary"]
406414
----
407415
// Create an encoder with all the defaults
408-
val encoder = Pbkdf2PasswordEncoder()
416+
val encoder = Pbkdf2PasswordEncoder.defaultsForSpringSecurity_v5_8()
409417
val result: String = encoder.encode("myPassword")
410418
assertTrue(encoder.matches("myPassword", result))
411419
----
@@ -424,7 +432,7 @@ Like other adaptive one-way functions, it should be tuned to take about 1 second
424432
[source,java,role="primary"]
425433
----
426434
// Create an encoder with all the defaults
427-
SCryptPasswordEncoder encoder = new SCryptPasswordEncoder();
435+
SCryptPasswordEncoder encoder = SCryptPasswordEncoder.defaultsForSpringSecurity_v5_8();
428436
String result = encoder.encode("myPassword");
429437
assertTrue(encoder.matches("myPassword", result));
430438
----
@@ -433,7 +441,7 @@ assertTrue(encoder.matches("myPassword", result));
433441
[source,kotlin,role="secondary"]
434442
----
435443
// Create an encoder with all the defaults
436-
val encoder = SCryptPasswordEncoder()
444+
val encoder = SCryptPasswordEncoder.defaultsForSpringSecurity_v5_8()
437445
val result: String = encoder.encode("myPassword")
438446
assertTrue(encoder.matches("myPassword", result))
439447
----

docs/modules/ROOT/pages/features/integrations/cryptography.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -235,7 +235,7 @@ The following system uses the `Pbkdf2PasswordEncoder`:
235235
[source,java,role="primary"]
236236
----
237237
// Create an encoder with all the defaults
238-
Pbkdf2PasswordEncoder encoder = new Pbkdf2PasswordEncoder();
238+
Pbkdf2PasswordEncoder encoder = Pbkdf2PasswordEncoder.defaultsForSpringSecurity_v5_8();
239239
String result = encoder.encode("myPassword");
240240
assertTrue(encoder.matches("myPassword", result));
241241
----
@@ -244,7 +244,7 @@ assertTrue(encoder.matches("myPassword", result));
244244
[source,kotlin,role="secondary"]
245245
----
246246
// Create an encoder with all the defaults
247-
val encoder = Pbkdf2PasswordEncoder()
247+
val encoder = Pbkdf2PasswordEncoder.defaultsForSpringSecurity_v5_8()
248248
val result: String = encoder.encode("myPassword")
249249
assertTrue(encoder.matches("myPassword", result))
250250
----

0 commit comments

Comments
 (0)