Index: java/security/AlgorithmParameterGenerator.java =================================================================== RCS file: /cvsroot/classpath/classpath/java/security/AlgorithmParameterGenerator.java,v retrieving revision 1.8 diff -u -r1.8 AlgorithmParameterGenerator.java --- java/security/AlgorithmParameterGenerator.java 23 Apr 2003 23:15:47 -0000 1.8 +++ java/security/AlgorithmParameterGenerator.java 17 Apr 2004 18:45:50 -0000 @@ -67,7 +67,7 @@ * system parameters, for example, the parameter generation values usually * consist of the size of the prime modulus and the size of the random * exponent, both specified in number of bits. - *
In case the client does not explicitly initialize the
* AlgorithmParameterGenerator
(via a call to an init()
Index: java/security/AlgorithmParameters.java
===================================================================
RCS file: /cvsroot/classpath/classpath/java/security/AlgorithmParameters.java,v
retrieving revision 1.8
diff -u -r1.8 AlgorithmParameters.java
--- java/security/AlgorithmParameters.java 23 Apr 2003 23:15:47 -0000 1.8
+++ java/security/AlgorithmParameters.java 17 Apr 2004 18:45:50 -0000
@@ -71,7 +71,7 @@
* parameter specification or parameter encoding.
A transparent parameter specification is obtained from an
- * AlgorithmParameters
object via a call to
* getParameterSpec()
, and a byte encoding of the parameters is
* obtained via a call to getEncoded()
.
null
.null
location, then
- * the following addtional tests must be passed.null
* location.For example, each of these locations imply the location - * "http://java.sun.com/classes/foo.jar":
* http: * http://*.sun.com/classes/* * http://java.sun.com/classes/- * http://java.sun.com/classes/foo.jar *- * Note that the code source with null location and null certificates implies - * all other code sources. + * + *
Note that the code source with null location and null certificates implies + * all other code sources.
* * @param cs theCodeSource
to test against this object
* @return true if this specified CodeSource
is implied
@@ -245,7 +252,7 @@
/**
* This method returns a String
that represents this object.
* The result is in the format "(" + getLocation()
followed
- * by a space separated list of certificates (or "")"
.
*
* @return a String
for this object
Index: java/security/Identity.java
===================================================================
RCS file: /cvsroot/classpath/classpath/java/security/Identity.java,v
retrieving revision 1.7
diff -u -r1.7 Identity.java
--- java/security/Identity.java 10 May 2003 05:58:28 -0000 1.7
+++ java/security/Identity.java 17 Apr 2004 18:45:50 -0000
@@ -151,7 +151,7 @@
* @throws KeyManagementException if another identity in the identity's scope
* has the same public key, or if another exception occurs.
* @throws SecurityException if a security manager exists and its
- * checkSecurityAccess() method doesn't allow setting the public
+ * checkSecurityAccess()
method doesn't allow setting the public
* key.
* @see #getPublicKey()
* @see SecurityManager#checkSecurityAccess(String)
Index: java/security/IdentityScope.java
===================================================================
RCS file: /cvsroot/classpath/classpath/java/security/IdentityScope.java,v
retrieving revision 1.7
diff -u -r1.7 IdentityScope.java
--- java/security/IdentityScope.java 10 May 2003 05:58:28 -0000 1.7
+++ java/security/IdentityScope.java 17 Apr 2004 18:45:50 -0000
@@ -123,7 +123,7 @@
}
/**
- * Sets the system's identity scope.
+ * Sets the system's identity scope.
*
* First, if there is a security manager, its checkSecurityAccess()
*
method is called with "setSystemScope"
as its argument
@@ -131,7 +131,7 @@
*
* @param scope the scope to set.
* @throws SecurityException if a security manager exists and its
- * checkSecurityAccess() method doesn't allow setting the
+ * checkSecurityAccess()
method doesn't allow setting the
* identity scope.
* @see #getSystemScope()
* @see SecurityManager#checkSecurityAccess(String)
Index: java/security/KeyPairGenerator.java
===================================================================
RCS file: /cvsroot/classpath/classpath/java/security/KeyPairGenerator.java,v
retrieving revision 1.10
diff -u -r1.10 KeyPairGenerator.java
--- java/security/KeyPairGenerator.java 23 Apr 2003 23:15:47 -0000 1.10
+++ java/security/KeyPairGenerator.java 17 Apr 2004 18:45:51 -0000
@@ -56,43 +56,42 @@
* two is the initialization of the object:
*
*
- * - Algorithm-Independent Initialization
- * All key pair generators share the concepts of a keysize and a
- * source of randomness. The keysize is interpreted differently
- * for different algorithms (e.g., in the case of the DSA algorithm,
- * the keysize corresponds to the length of the modulus). There is an
- * initialize()
method in this KeyPairGenerator
- * class that takes these two universally shared types of arguments. There
- * is also one that takes just a keysize argument, and uses the
- * address@hidden SecureRandom} implementation of the highest-priority installed
- * provider as the source of randomness. (If none of the installed
- * providers supply an implementation of address@hidden SecureRandom}, a
- * system-provided source of randomness is used.)
+ * - Algorithm-Independent Initialization
+ * All key pair generators share the concepts of a keysize and a
+ * source of randomness. The keysize is interpreted differently
+ * for different algorithms (e.g., in the case of the DSA algorithm,
+ * the keysize corresponds to the length of the modulus). There is an
+ * initialize()
method in this KeyPairGenerator
+ * class that takes these two universally shared types of arguments. There
+ * is also one that takes just a keysize argument, and uses the
+ * address@hidden SecureRandom} implementation of the highest-priority installed
+ * provider as the source of randomness. (If none of the installed
+ * providers supply an implementation of address@hidden SecureRandom}, a
+ * system-provided source of randomness is used.)
*
- * Since no other parameters are specified when you call the above
- * algorithm-independent initialize methods, it is up to the provider what
- * to do about the algorithm-specific parameters (if any) to be associated
- * with each of the keys.
+ * Since no other parameters are specified when you call the above
+ * algorithm-independent initialize methods, it is up to the provider what
+ * to do about the algorithm-specific parameters (if any) to be associated
+ * with each of the keys.
*
- * If the algorithm is the DSA algorithm, and the keysize
- * (modulus size) is 512
, 768
, or 1024
,
- * then the GNU provider uses a set of precomputed values for the
- * p
, q
, and g
parameters. If the
- * modulus size is not one of the above values, the GNU
- * provider creates a new set of parameters. Other providers might have
- * precomputed parameter sets for more than just the three modulus sizes
- * mentioned above. Still others might not have a list of precomputed
- * parameters at all and instead always create new parameter sets.
- *
- * - Algorithm-Specific Initialization
- * For situations where a set of algorithm-specific parameters already
- * exists (e.g., so-called community parameters in DSA), there
- * are two initialize methods that have an address@hidden AlgorithmParameterSpec}
- * argument. One also has a address@hidden SecureRandom} argument, while the the
- * other uses the address@hidden SecureRandom} implementation of the highest-priority
- * installed provider as the source of randomness. (If none of the installed
- * providers supply an implementation of address@hidden SecureRandom}, a
- * system-provided source of randomness is used.)
+ * If the algorithm is the DSA algorithm, and the keysize
+ * (modulus size) is 512
, 768
, or 1024
,
+ * then the GNU provider uses a set of precomputed values for the
+ * p
, q
, and g
parameters. If the
+ * modulus size is not one of the above values, the GNU
+ * provider creates a new set of parameters. Other providers might have
+ * precomputed parameter sets for more than just the three modulus sizes
+ * mentioned above. Still others might not have a list of precomputed
+ * parameters at all and instead always create new parameter sets.
+ * - Algorithm-Specific Initialization
+ * For situations where a set of algorithm-specific parameters already
+ * exists (e.g., so-called community parameters in DSA), there
+ * are two initialize methods that have an address@hidden AlgorithmParameterSpec}
+ * argument. One also has a address@hidden SecureRandom} argument, while the the
+ * other uses the address@hidden SecureRandom} implementation of the highest-priority
+ * installed provider as the source of randomness. (If none of the installed
+ * providers supply an implementation of address@hidden SecureRandom}, a
+ * system-provided source of randomness is used.)
*
*
* In case the client does not explicitly initialize the
Index: java/security/KeyStore.java
===================================================================
RCS file: /cvsroot/classpath/classpath/java/security/KeyStore.java,v
retrieving revision 1.7
diff -u -r1.7 KeyStore.java
--- java/security/KeyStore.java 23 Apr 2003 23:15:47 -0000 1.7
+++ java/security/KeyStore.java 17 Apr 2004 18:45:51 -0000
@@ -208,7 +208,7 @@
/**
* Returns the default KeyStore type. This method looks up the
- * type in /lib/security/java.security with the
+ * type in <JAVA_HOME>/lib/security/java.security with the
* property "keystore.type" or if that fails then "jks" .
*/
public static final String getDefaultType()
Index: java/security/Signature.java
===================================================================
RCS file: /cvsroot/classpath/classpath/java/security/Signature.java,v
retrieving revision 1.13
diff -u -r1.13 Signature.java
--- java/security/Signature.java 25 Apr 2003 07:04:30 -0000 1.13
+++ java/security/Signature.java 17 Apr 2004 18:45:51 -0000
@@ -83,20 +83,20 @@
* either signing data or verifying a signature:
*
*
- * - Initialization, with either
- *
- * - a public key, which initializes the signature for verification
- * (see
initVerify()
), or
- * - a private key (and optionally a Secure Random Number Generator),
- * which initializes the signature for signing (see
- * address@hidden #initSign(PrivateKey)} and address@hidden #initSign(PrivateKey, SecureRandom)}
- * ).
- *
- * - Updating
- * Depending on the type of initialization, this will update the bytes to
- * be signed or verified. See the update methods.
- * - Signing or Verifying a signature on all updated bytes. See the
- *
sign()
methods and the verify()
method.
+ * - Initialization, with either
+ *
+ * - a public key, which initializes the signature for verification
+ * (see
initVerify()
), or
+ * - a private key (and optionally a Secure Random Number Generator),
+ * which initializes the signature for signing (see
+ * address@hidden #initSign(PrivateKey)} and address@hidden #initSign(PrivateKey, SecureRandom)}
+ * ).
+ *
+ * - Updating
+ * Depending on the type of initialization, this will update the bytes to
+ * be signed or verified. See the update methods.
+ * - Signing or Verifying a signature on all updated bytes. See the
+ *
sign()
methods and the verify()
method.
*
*
* Note that this class is abstract and extends from address@hidden SignatureSpi} for
@@ -105,7 +105,7 @@
* superclass are intended for cryptographic service providers who wish to
* supply their own implementations of digital signature algorithms.
*
- * @author Mark Benvenuto
+ * @author Mark Benvenuto (address@hidden)
*/
public abstract class Signature extends SignatureSpi
{
Index: java/security/SignatureSpi.java
===================================================================
RCS file: /cvsroot/classpath/classpath/java/security/SignatureSpi.java,v
retrieving revision 1.6
diff -u -r1.6 SignatureSpi.java
--- java/security/SignatureSpi.java 9 Mar 2003 07:24:26 -0000 1.6
+++ java/security/SignatureSpi.java 17 Apr 2004 18:45:51 -0000
@@ -279,7 +279,7 @@
* @param param the string name of the parameter.
* @return the object that represents the parameter value, or null
* if there is none.
- * @throws InvalidParameterException if param is an invalid
+ * @throws InvalidParameterException if param
is an invalid
* parameter for this engine, or another exception occurs while trying to get
* this parameter.
* @deprecated
Index: java/security/SignedObject.java
===================================================================
RCS file: /cvsroot/classpath/classpath/java/security/SignedObject.java,v
retrieving revision 1.9
diff -u -r1.9 SignedObject.java
--- java/security/SignedObject.java 10 May 2003 05:58:28 -0000 1.9
+++ java/security/SignedObject.java 17 Apr 2004 18:45:51 -0000
@@ -98,7 +98,7 @@
* The signature algorithm can be, among others, the NIST standard DSS,
* using DSA and SHA-1. The algorithm is specified using the same
* convention as that for signatures. The DSA algorithm using the
- * SHA-1 message digest algorithm can be specified, for example, as
+ * SHA-1 message digest algorithm can be specified, for example, as
* "SHA/DSA"
or "SHA-1/DSA"
(they are equivalent). In
* the case of RSA, there are multiple choices for the message digest
* algorithm, so the signing algorithm could be specified as, for example,