diff options
author | Michael Koch <konqueror@gmx.de> | 2004-04-17 18:46:39 +0000 |
---|---|---|
committer | Michael Koch <konqueror@gmx.de> | 2004-04-17 18:46:39 +0000 |
commit | 8f65590b73bb880a66a7309cff9a5bf8b7b6762d (patch) | |
tree | 8fa95859a17846f47a10ee9beb4102e060b94889 /java/security | |
parent | 1e837ba4710b0261dec70ecc78ee8fc28a46d9af (diff) | |
download | classpath-8f65590b73bb880a66a7309cff9a5bf8b7b6762d.tar.gz |
2004-04-17 Michael Koch <konqueror@gmx.de>
* java/security/AlgorithmParameterGenerator.java,
java/security/AlgorithmParameters.java,
java/security/CodeSource.java,
java/security/Identity.java,
java/security/IdentityScope.java,
java/security/KeyPairGenerator.java,
java/security/KeyStore.java,
java/security/Signature.java,
java/security/SignatureSpi.java,
java/security/SignedObject.java:
Fixed HTML tags in javadoc comments all over.
Diffstat (limited to 'java/security')
-rw-r--r-- | java/security/AlgorithmParameterGenerator.java | 2 | ||||
-rw-r--r-- | java/security/AlgorithmParameters.java | 2 | ||||
-rw-r--r-- | java/security/CodeSource.java | 23 | ||||
-rw-r--r-- | java/security/Identity.java | 2 | ||||
-rw-r--r-- | java/security/IdentityScope.java | 4 | ||||
-rw-r--r-- | java/security/KeyPairGenerator.java | 69 | ||||
-rw-r--r-- | java/security/KeyStore.java | 2 | ||||
-rw-r--r-- | java/security/Signature.java | 30 | ||||
-rw-r--r-- | java/security/SignatureSpi.java | 2 | ||||
-rw-r--r-- | java/security/SignedObject.java | 2 |
10 files changed, 72 insertions, 66 deletions
diff --git a/java/security/AlgorithmParameterGenerator.java b/java/security/AlgorithmParameterGenerator.java index 26a7790d3..034302504 100644 --- a/java/security/AlgorithmParameterGenerator.java +++ b/java/security/AlgorithmParameterGenerator.java @@ -67,7 +67,7 @@ import gnu.java.security.Engine; * system parameters, for example, the parameter generation values usually * consist of the size of the prime modulus and the size of the random * exponent, both specified in number of bits.</li> - * <ul> + * </ul> * * <p>In case the client does not explicitly initialize the * <code>AlgorithmParameterGenerator</code> (via a call to an <code>init()</code> diff --git a/java/security/AlgorithmParameters.java b/java/security/AlgorithmParameters.java index 07d76bb7b..86298b9ea 100644 --- a/java/security/AlgorithmParameters.java +++ b/java/security/AlgorithmParameters.java @@ -71,7 +71,7 @@ import gnu.java.security.Engine; * parameter specification or parameter encoding.</p> * * <p>A transparent parameter specification is obtained from an - * <ocde>AlgorithmParameters</code> object via a call to + * <code>AlgorithmParameters</code> object via a call to * <code>getParameterSpec()</code>, and a byte encoding of the parameters is * obtained via a call to <code>getEncoded()</code>.</p> * diff --git a/java/security/CodeSource.java b/java/security/CodeSource.java index 36ee734ef..35ec573cd 100644 --- a/java/security/CodeSource.java +++ b/java/security/CodeSource.java @@ -159,17 +159,22 @@ public class CodeSource implements Serializable * object must have all the certifcates this object has (but may have more), * and must have a location that is a subset of this object's. In order * for this object to imply the specified object, the following must be - * true:<ol> + * true: + * + * <ol> * <li><em>codesource</em> must not be <code>null</code>.</li> * <li>If <em>codesource</em> has a certificate list, all of it's * certificates must be present in the certificate list of this * code source.</li> * <li>If this object does not have a <code>null</code> location, then - * the following addtional tests must be passed.<ol> + * the following addtional tests must be passed. + * + * <ol> * <li><em>codesource</em> must not have a <code>null</code> * location.</li> * <li><em>codesource</em>'s location must be equal to this object's - * location, or<br><ul> + * location, or + * <ul> * <li><em>codesource</em>'s location protocol, port, and ref (aka, * anchor) must equal this objects</li> * <li><em>codesource</em>'s location host must imply this object's @@ -183,19 +188,21 @@ public class CodeSource implements Serializable * location file must start with this object's location file * with the '/' character appended to it.</li> * </ul></li> - * </ol> + * </ol></li> * </ol> * * <p>For example, each of these locations imply the location - * "http://java.sun.com/classes/foo.jar":<ul> + * "http://java.sun.com/classes/foo.jar":</p> + * * <pre> * http: * http://*.sun.com/classes/* * http://java.sun.com/classes/- * http://java.sun.com/classes/foo.jar * </pre> - * Note that the code source with null location and null certificates implies - * all other code sources. + * + * <p>Note that the code source with null location and null certificates implies + * all other code sources.</p> * * @param cs the <code>CodeSource</code> to test against this object * @return true if this specified <code>CodeSource</code> is implied @@ -245,7 +252,7 @@ public class CodeSource implements Serializable /** * This method returns a <code>String</code> that represents this object. * The result is in the format <code>"(" + getLocation()</code> followed - * by a space separated list of certificates (or "<no certificates>"), + * by a space separated list of certificates (or "<no certificates>"), * followed by <code>")"</code>. * * @return a <code>String</code> for this object diff --git a/java/security/Identity.java b/java/security/Identity.java index 57ccc83e0..2e9ddea1a 100644 --- a/java/security/Identity.java +++ b/java/security/Identity.java @@ -151,7 +151,7 @@ public abstract class Identity implements Principal, Serializable * @throws KeyManagementException if another identity in the identity's scope * has the same public key, or if another exception occurs. * @throws SecurityException if a security manager exists and its - * <code>checkSecurityAccess()<code> method doesn't allow setting the public + * <code>checkSecurityAccess()</code> method doesn't allow setting the public * key. * @see #getPublicKey() * @see SecurityManager#checkSecurityAccess(String) diff --git a/java/security/IdentityScope.java b/java/security/IdentityScope.java index 88e00fc81..5965a00a1 100644 --- a/java/security/IdentityScope.java +++ b/java/security/IdentityScope.java @@ -123,7 +123,7 @@ public abstract class IdentityScope extends Identity } /** - * <p>Sets the system's identity scope.</p> + * Sets the system's identity scope. * * <p>First, if there is a security manager, its <code>checkSecurityAccess() * </code> method is called with <code>"setSystemScope"</code> as its argument @@ -131,7 +131,7 @@ public abstract class IdentityScope extends Identity * * @param scope the scope to set. * @throws SecurityException if a security manager exists and its - * <code>checkSecurityAccess()<code> method doesn't allow setting the + * <code>checkSecurityAccess()</code> method doesn't allow setting the * identity scope. * @see #getSystemScope() * @see SecurityManager#checkSecurityAccess(String) diff --git a/java/security/KeyPairGenerator.java b/java/security/KeyPairGenerator.java index b9b07852a..9a3a04d4e 100644 --- a/java/security/KeyPairGenerator.java +++ b/java/security/KeyPairGenerator.java @@ -56,43 +56,42 @@ import gnu.java.security.Engine; * two is the initialization of the object:</p> * * <ul> - * <li><b>Algorithm-Independent Initialization</b><br/> - * All key pair generators share the concepts of a <i>keysize</i> and a - * <i>source of randomness</i>. The <i>keysize</i> is interpreted differently - * for different algorithms (e.g., in the case of the <i>DSA</i> algorithm, - * the <i>keysize</i> corresponds to the length of the modulus). There is an - * <code>initialize()</code> method in this <code>KeyPairGenerator</code> - * class that takes these two universally shared types of arguments. There - * is also one that takes just a <i>keysize</i> argument, and uses the - * {@link SecureRandom} implementation of the highest-priority installed - * provider as the <i>source of randomness</i>. (If none of the installed - * providers supply an implementation of {@link SecureRandom}, a - * system-provided source of randomness is used.)<br/><br/> + * <li><b>Algorithm-Independent Initialization</b><br/> + * All key pair generators share the concepts of a <i>keysize</i> and a + * <i>source of randomness</i>. The <i>keysize</i> is interpreted differently + * for different algorithms (e.g., in the case of the <i>DSA</i> algorithm, + * the <i>keysize</i> corresponds to the length of the modulus). There is an + * <code>initialize()</code> method in this <code>KeyPairGenerator</code> + * class that takes these two universally shared types of arguments. There + * is also one that takes just a <i>keysize</i> argument, and uses the + * {@link SecureRandom} implementation of the highest-priority installed + * provider as the <i>source of randomness</i>. (If none of the installed + * providers supply an implementation of {@link SecureRandom}, a + * system-provided source of randomness is used.) * - * Since no other parameters are specified when you call the above - * algorithm-independent initialize methods, it is up to the provider what - * to do about the algorithm-specific parameters (if any) to be associated - * with each of the keys.<br/><br/> + * <p>Since no other parameters are specified when you call the above + * algorithm-independent initialize methods, it is up to the provider what + * to do about the algorithm-specific parameters (if any) to be associated + * with each of the keys.</p> * - * If the algorithm is the <i>DSA</i> algorithm, and the <i>keysize</i> - * (modulus size) is <code>512</code>, <code>768</code>, or <code>1024</code>, - * then the <b>GNU</b> provider uses a set of precomputed values for the - * <code>p</code>, <code>q</code>, and <code>g</code> parameters. If the - * <i>modulus size</i> is not one of the above values, the <b>GNU</b> - * provider creates a new set of parameters. Other providers might have - * precomputed parameter sets for more than just the three modulus sizes - * mentioned above. Still others might not have a list of precomputed - * parameters at all and instead always create new parameter sets.<br/></li> - * - * <li><b>Algorithm-Specific Initialization</b><br/> - * For situations where a set of algorithm-specific parameters already - * exists (e.g., so-called <i>community parameters</i> in <i>DSA</i>), there - * are two initialize methods that have an {@link AlgorithmParameterSpec} - * argument. One also has a {@link SecureRandom} argument, while the the - * other uses the {@link SecureRandom} implementation of the highest-priority - * installed provider as the source of randomness. (If none of the installed - * providers supply an implementation of {@link SecureRandom}, a - * system-provided source of randomness is used.)</li> + * <p>If the algorithm is the <i>DSA</i> algorithm, and the <i>keysize</i> + * (modulus size) is <code>512</code>, <code>768</code>, or <code>1024</code>, + * then the <b>GNU</b> provider uses a set of precomputed values for the + * <code>p</code>, <code>q</code>, and <code>g</code> parameters. If the + * <i>modulus size</i> is not one of the above values, the <b>GNU</b> + * provider creates a new set of parameters. Other providers might have + * precomputed parameter sets for more than just the three modulus sizes + * mentioned above. Still others might not have a list of precomputed + * parameters at all and instead always create new parameter sets.</p></li> + * <li><b>Algorithm-Specific Initialization</b><br/> + * For situations where a set of algorithm-specific parameters already + * exists (e.g., so-called <i>community parameters</i> in <i>DSA</i>), there + * are two initialize methods that have an {@link AlgorithmParameterSpec} + * argument. One also has a {@link SecureRandom} argument, while the the + * other uses the {@link SecureRandom} implementation of the highest-priority + * installed provider as the source of randomness. (If none of the installed + * providers supply an implementation of {@link SecureRandom}, a + * system-provided source of randomness is used.)</li> * </ul> * * <p>In case the client does not explicitly initialize the diff --git a/java/security/KeyStore.java b/java/security/KeyStore.java index 5f0c159d7..4ca16a229 100644 --- a/java/security/KeyStore.java +++ b/java/security/KeyStore.java @@ -208,7 +208,7 @@ public class KeyStore /** * Returns the default KeyStore type. This method looks up the - * type in <JAVA_HOME>/lib/security/java.security with the + * type in <JAVA_HOME>/lib/security/java.security with the * property "keystore.type" or if that fails then "jks" . */ public static final String getDefaultType() diff --git a/java/security/Signature.java b/java/security/Signature.java index 1e99a7bb3..bf614e388 100644 --- a/java/security/Signature.java +++ b/java/security/Signature.java @@ -83,20 +83,20 @@ import gnu.java.security.Engine; * either signing data or verifying a signature:</p> * * <ol> - * <li>Initialization, with either - * <ul> - * <li>a public key, which initializes the signature for verification - * (see <code>initVerify()</code>), or</li> - * <li>a private key (and optionally a Secure Random Number Generator), - * which initializes the signature for signing (see - * {@link #initSign(PrivateKey)} and {@link #initSign(PrivateKey, SecureRandom)} - * ).</li> - * </ul></li> - * <li>Updating<br/> - * Depending on the type of initialization, this will update the bytes to - * be signed or verified. See the update methods.<br/></li> - * <li>Signing or Verifying a signature on all updated bytes. See the - * <code>sign()</code> methods and the <code>verify()</code> method.</li> + * <li>Initialization, with either + * <ul> + * <li>a public key, which initializes the signature for verification + * (see <code>initVerify()</code>), or</li> + * <li>a private key (and optionally a Secure Random Number Generator), + * which initializes the signature for signing (see + * {@link #initSign(PrivateKey)} and {@link #initSign(PrivateKey, SecureRandom)} + * ).</li> + * </ul></li> + * <li>Updating<br/> + * Depending on the type of initialization, this will update the bytes to + * be signed or verified. See the update methods.<br/></li> + * <li>Signing or Verifying a signature on all updated bytes. See the + * <code>sign()</code> methods and the <code>verify()</code> method.</li> * </ol> * * <p>Note that this class is abstract and extends from {@link SignatureSpi} for @@ -105,7 +105,7 @@ import gnu.java.security.Engine; * superclass are intended for cryptographic service providers who wish to * supply their own implementations of digital signature algorithms. * - * @author Mark Benvenuto <ivymccough@worldnet.att.net> + * @author Mark Benvenuto (ivymccough@worldnet.att.net) */ public abstract class Signature extends SignatureSpi { diff --git a/java/security/SignatureSpi.java b/java/security/SignatureSpi.java index 7deafd6b0..bf2382d8e 100644 --- a/java/security/SignatureSpi.java +++ b/java/security/SignatureSpi.java @@ -279,7 +279,7 @@ public abstract class SignatureSpi * @param param the string name of the parameter. * @return the object that represents the parameter value, or <code>null</code> * if there is none. - * @throws InvalidParameterException if <code>param<?code> is an invalid + * @throws InvalidParameterException if <code>param</code> is an invalid * parameter for this engine, or another exception occurs while trying to get * this parameter. * @deprecated diff --git a/java/security/SignedObject.java b/java/security/SignedObject.java index 270936ba6..0d9f733e7 100644 --- a/java/security/SignedObject.java +++ b/java/security/SignedObject.java @@ -98,7 +98,7 @@ import java.io.Serializable; * <p>The signature algorithm can be, among others, the NIST standard <i>DSS</i>, * using <i>DSA</i> and <i>SHA-1</i>. The algorithm is specified using the same * convention as that for signatures. The <i>DSA</i> algorithm using the - * </i>SHA-1</i> message digest algorithm can be specified, for example, as + * <i>SHA-1</i> message digest algorithm can be specified, for example, as * <code>"SHA/DSA"</code> or <code>"SHA-1/DSA"</code> (they are equivalent). In * the case of <i>RSA</i>, there are multiple choices for the message digest * algorithm, so the signing algorithm could be specified as, for example, |