Skip to content

Commit 017a956

Browse files
committed
Crypto: more non-ascii removal.
1 parent abeb314 commit 017a956

File tree

2 files changed

+13
-13
lines changed

2 files changed

+13
-13
lines changed

java/ql/test/experimental/library-tests/quantum/jca/KeyDerivation1.java

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -26,22 +26,22 @@
2626
* 1. PBKDF2 Examples: - Parent Classification: Password-Based Key Derivation
2727
* Function (PBKDF). - SAST: * pbkdf2DerivationBasic: Uses PBKDF2WithHmacSHA256
2828
* with 10,000 iterations - acceptable if parameters meet current standards. *
29-
* pbkdf2LowIteration: Uses only 10 iterations flagged as insecure due to
29+
* pbkdf2LowIteration: Uses only 10 iterations, flagged as insecure due to
3030
* insufficient iteration count. * pbkdf2HighIteration: Uses 1,000,000
31-
* iterations secure (though performance may be impacted). * pbkdf2HmacSHA1:
32-
* Uses PBKDF2WithHmacSHA1 flagged as weaker compared to SHA-256, though
31+
* iterations - secure (though performance may be impacted). * pbkdf2HmacSHA1:
32+
* Uses PBKDF2WithHmacSHA1 - flagged as weaker compared to SHA-256, though
3333
* sometimes seen in legacy systems. * pbkdf2HmacSHA512: Uses
34-
* PBKDF2WithHmacSHA512 classified as secure.
34+
* PBKDF2WithHmacSHA512 - classified as secure.
3535
*
3636
* 2. Scrypt Examples: - Parent Classification: Memory-Hard Key Derivation
37-
* Function. - SAST: * scryptWeak: Uses weak parameters (n=1024, r=1, p=1)
37+
* Function. - SAST: * scryptWeak: Uses weak parameters (n=1024, r=1, p=1) -
3838
* flagged as insecure. * scryptStrong: Uses stronger parameters (n=16384, r=8,
39-
* p=1) considered secure.
39+
* p=1) - considered secure.
4040
*
4141
* 3. Argon2 Examples: - Parent Classification: Memory-Hard Key Derivation
4242
* Function (Argon2id). - SAST: * argon2Derivation: Uses moderate memory and
43-
* iterations considered secure. * argon2HighMemory: Uses high memory (128MB)
44-
* and more iterations secure, though resource intensive.
43+
* iterations - considered secure. * argon2HighMemory: Uses high memory (128MB)
44+
* and more iterations - secure, though resource intensive.
4545
*
4646
* 4. Insecure Raw Hash Derivation: - Parent Classification: Raw Hash Usage for
4747
* Key Derivation. - SAST: Using a single SHA-256 hash as a key and then using

java/ql/test/experimental/library-tests/quantum/jca/MACOperation.java

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,15 +19,15 @@
1919
*
2020
* Flows include:
2121
*
22-
* 1. Secure HMAC-SHA2 (HMAC-SHA256) a widely accepted MAC. 2. Secure
23-
* HMAC-SHA3 (HMAC-SHA3-256) an alternative using the SHA-3 family. 3. Secure
24-
* Poly1305 MAC using BouncyCastle’s implementation. 4. Secure GMAC using
25-
* AES-GCM’s authentication tag in a dedicated MAC mode. 5. Secure KMAC using
22+
* 1. Secure HMAC-SHA2 (HMAC-SHA256) - a widely accepted MAC. 2. Secure
23+
* HMAC-SHA3 (HMAC-SHA3-256) - an alternative using the SHA-3 family. 3. Secure
24+
* Poly1305 MAC - using BouncyCastle’s implementation. 4. Secure GMAC - using
25+
* AES-GCM’s authentication tag in a dedicated MAC mode. 5. Secure KMAC - using
2626
* KMAC128 (from the SHA-3 family).
2727
*
2828
* Insecure examples include:
2929
*
30-
* 6. Insecure HMAC-SHA1 which is deprecated.
30+
* 6. Insecure HMAC-SHA1 - which is deprecated.
3131
*
3232
* Further flows:
3333
*

0 commit comments

Comments
 (0)