From 31018235dcd1e1704def10a38cb484bfb14f79f2 Mon Sep 17 00:00:00 2001
From: Leo Galambos
- * Examples: - *
- * - *
- * {@code
+ * Examples
{@code
* Strings.toShortString(null) -> "null"
* Strings.toShortString(new byte[0]) -> "[]"
* Strings.toShortString(new byte[]{1, 2, 3})
@@ -118,7 +113,7 @@ public final class Strings {
* {@code
+ * Examples
{@code
* toShortHexString(null) -> "null"
* toShortHexString(new byte[0]) -> "[]"
* toShortHexString(new byte[]{0x01}) -> "[0x01]"
diff --git a/lib/src/main/java/zeroecho/sdk/guard/PasswordRecipient.java b/lib/src/main/java/zeroecho/sdk/guard/PasswordRecipient.java
index b29b154..de3a777 100644
--- a/lib/src/main/java/zeroecho/sdk/guard/PasswordRecipient.java
+++ b/lib/src/main/java/zeroecho/sdk/guard/PasswordRecipient.java
@@ -78,7 +78,7 @@ public final class PasswordRecipient implements Recipient {
* marked as a decoy to obscure the actual number of usable recipients.
*
*
- * Security considerations
+ * Security considerations
* - * Typical usage: - *
- *{@code
+ * Typical usage
{@code
* // RSA-OAEP recipient; the header will contain the id and the RSA-wrapped CEK
* Recipient r = new MultiRecipientDataSourceBuilder.RsaOaepRecipient(rsaPublicKey);
* byte[] entryBlob = r.buildRecipientEntry(cek);
@@ -67,7 +64,7 @@ public interface Recipient {
* intentionally unusable for recovering the content-encryption key (CEK).
*
*
- * Security considerations
+ * Security considerations
*