The following document contains the results of FindBugs Report
FindBugs Version is 2.0.1
Threshold is medium
Effort is max
Class | Bugs |
---|---|
com.lightszentip.module.security.password.PasswordModuleImpl | 5 |
com.lightszentip.module.security.password.PasswordModuleImplTest | 3 |
Bug | Category | Details | Line | Priority |
---|---|---|---|---|
Found reliance on default encoding in com.lightszentip.module.security.password.PasswordModuleImpl.crypt(String, String, EncryptionType, int): new String(byte[]) | I18N | DM_DEFAULT_ENCODING | 229 | High |
Found reliance on default encoding in com.lightszentip.module.security.password.PasswordModuleImpl.crypt(String, String, EncryptionType, int): String.getBytes() | I18N | DM_DEFAULT_ENCODING | 225 | High |
Found reliance on default encoding in com.lightszentip.module.security.password.PasswordModuleImpl.crypt(String, String, EncryptionType, int): String.getBytes() | I18N | DM_DEFAULT_ENCODING | 227 | High |
Found reliance on default encoding in com.lightszentip.module.security.password.PasswordModuleImpl.hashPwd(String, AlgorithmType): String.getBytes() | I18N | DM_DEFAULT_ENCODING | 191 | High |
Possible null pointer dereference of md in com.lightszentip.module.security.password.PasswordModuleImpl.hashPwd(String, AlgorithmType) | CORRECTNESS | NP_NULL_ON_SOME_PATH | 191 | Medium |
Bug | Category | Details | Line | Priority |
---|---|---|---|---|
com.lightszentip.module.security.password.PasswordModuleImplTest.typeSha512 isn't final but should be | MALICIOUS_CODE | MS_SHOULD_BE_FINAL | 42 | High |
com.lightszentip.module.security.password.PasswordModuleImplTest.typeTwofish isn't final but should be | MALICIOUS_CODE | MS_SHOULD_BE_FINAL | 50 | High |
Unread public/protected field: com.lightszentip.module.security.password.PasswordModuleImplTest.name | STYLE | URF_UNREAD_PUBLIC_OR_PROTECTED_FIELD | 56 | Medium |