Index: src/test/java/common/org/apache/harmony/auth/tests/module/Krb5LoginModuleTest.java =================================================================== --- src/test/java/common/org/apache/harmony/auth/tests/module/Krb5LoginModuleTest.java (revision 486667) +++ src/test/java/common/org/apache/harmony/auth/tests/module/Krb5LoginModuleTest.java (working copy) @@ -53,7 +53,7 @@ private final TreeMap options = new TreeMap(); /** - * Sets system env. properties and optionaly starts local mock server + * Sets system env. properties and optionally starts local mock server */ @Override protected void setUp() throws Exception { @@ -97,7 +97,7 @@ */ public void test_Config() throws Exception { - // create loging module for testing + // create logging module for testing Krb5LoginModule module = new Krb5LoginModule(); module.initialize(null, new MockCallbackHandler(), null, options); Index: src/test/java/common/org/apache/harmony/auth/tests/login/DefaultConfigParserTest.java =================================================================== --- src/test/java/common/org/apache/harmony/auth/tests/login/DefaultConfigParserTest.java (revision 486667) +++ src/test/java/common/org/apache/harmony/auth/tests/login/DefaultConfigParserTest.java (working copy) @@ -67,7 +67,7 @@ } /** - * test on existance of a application name + * test on existence of a application name * @throws Exception */ public final void testConfigParser_01() throws Exception { Index: src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/SubjectDomainCombinerTest.java =================================================================== --- src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/SubjectDomainCombinerTest.java (revision 486667) +++ src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/SubjectDomainCombinerTest.java (working copy) @@ -83,7 +83,7 @@ ProtectionDomain[] pd; - // test case: both prarameters are null + // test case: both parameters are null assertNull(combiner.combine(null, null)); // test case: check assigned principals Index: src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/login/LoginContextTest.java =================================================================== --- src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/login/LoginContextTest.java (revision 486667) +++ src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/login/LoginContextTest.java (working copy) @@ -202,7 +202,7 @@ * are created in the constructor above * * Expected: not null subject, null callback handler or - * wraped default callback handler, not null shared + * wrapped default callback handler, not null shared * state and not null options. */ public final void testLC_String_LoginModuleInitialize() throws Exception { @@ -212,7 +212,7 @@ // add required module to the current configuration MyConfig.addRequired("MyLoginModule", options); - // reset initialised login modules list + // reset initialized login modules list MyLoginModule.reset(); LoginContext context = new LoginContext(moduleName); @@ -249,7 +249,7 @@ context.login(); - // TODO how to test defualt callback handler wrapping for LoginContext(java.lang.String)? + // TODO how to test default callback handler wrapping for LoginContext(java.lang.String)? // FIXME wrap a handler //assertFalse("Handler", MyLoginModule.handler.getClass().equals( @@ -361,7 +361,7 @@ * Precondition: parameters for login module initialization * are created in the constructor above * - * Expected: not null subject, wraped provided callback handler, + * Expected: not null subject, wrapped provided callback handler, * not null shared state and not null options. */ public final void testLC_StringCallbackHandler_LoginModuleInitialize() @@ -372,7 +372,7 @@ // add required module to the current configuration MyConfig.addRequired("MyLoginModule", options); - // reset initialised login modules list + // reset initialized login modules list MyLoginModule.reset(); LoginContext context = new LoginContext(moduleName, handler); @@ -524,7 +524,7 @@ * are created in the constructor above * * Expected: provided subject, null callback handler or - * wraped default callback handler, not null shared + * wrapped default callback handler, not null shared * state and not null options. */ public final void testLC_StringSubject_LoginModuleInitialize() @@ -535,7 +535,7 @@ // add required module to the current configuration MyConfig.addRequired("MyLoginModule", options); - // reset initialised login modules list + // reset initialized login modules list MyLoginModule.reset(); LoginContext context = new LoginContext(moduleName, subject); @@ -669,7 +669,7 @@ * Precondition: parameters for login module initialization * are created in the constructor above * - * Expected: provided subject, wraped default callback handler, + * Expected: provided subject, wrapped default callback handler, * not null shared state and not null options. */ @@ -681,7 +681,7 @@ // add required module to the current configuration MyConfig.addRequired("MyLoginModule", options); - // reset initialised login modules list + // reset initialized login modules list MyLoginModule.reset(); LoginContext context = new LoginContext(moduleName, subject, handler); @@ -770,7 +770,7 @@ // tmp user home to avoid presence of ${user.home}/.java.login.config String tmpUserHome = System.getProperty("java.io.tmpdir") - + File.separatorChar + "tmpUserHomeForLogingContextTest"; + + File.separatorChar + "tmpUserHomeForLoggingContextTest"; File dir = new File(tmpUserHome); if (!dir.exists()) { dir.mkdirs(); @@ -910,7 +910,7 @@ /** * Reset configuration. * - * Afer invokation the configuration doesn't have login modules + * After invocation the configuration doesn't have login modules * and the method Configuration.getAppConfigurationEntry(String) * always returns null; */ Index: src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/login/LoginContext1Test.java =================================================================== --- src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/login/LoginContext1Test.java (revision 486667) +++ src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/login/LoginContext1Test.java (working copy) @@ -269,7 +269,7 @@ * static field {@link #staticMask}.
* By default, all the methods return true (success) and do not * throw anything.
- * The constatnts FAIL_AT_* shows where to fail. Then if + * The constants FAIL_AT_* shows where to fail. Then if * {@link staticRE} field is set, then this RuntimeException will be thrown, * otherwise if {@link #staticErr} is set, then this Error will be thrown, * otherwise, if {@link #staticLE} is set, then this LoginException will be @@ -687,10 +687,10 @@ //1st, static installed Config must be queried assertTrue(TestConfig.get().wasTheNameQueried(name)); - //2d, the another config must be quered for other + //2d, the another config must be queried for other assertTrue(TestConfig.get().wasTheNameQueried("other")); - // Valid names which exist but does not have eny entries must + // Valid names which exist but does not have any entries must // also be accepted. Empty set will be considered as a problem // much later - at login() phase new LoginContext(CONFIG_NAME); @@ -1781,7 +1781,7 @@ /** * Tests LoginContext.getSubject()
- * Must return subject created after succesful login. + * Must return subject created after successful login. */ public void testGetSubject_01() throws Exception { TestConfig.addInstalledRequired("TestLoginModule_Success"); @@ -1794,7 +1794,7 @@ /** * Tests LoginContext.getSubject()
- * Must return null until succesful login(). + * Must return null until successful login(). */ public void testGetSubject_02() throws Exception { TestConfig.addInstalledRequired("TestLoginModule"); Index: src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/kerberos/KerberosTicketTest.java =================================================================== --- src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/kerberos/KerberosTicketTest.java (revision 486667) +++ src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/kerberos/KerberosTicketTest.java (working copy) @@ -95,7 +95,7 @@ // returned value is copied assertNotSame(krbTicket.getAuthTime(), krbTicket.getAuthTime()); - // auth time: null value is illegal for contructor + // auth time: null value is illegal for constructor try { new KerberosTicket(ticket, pClient, pServer, sessionKey, KEY_TYPE, flags, null, startTime, endTime, renewTill, addesses); @@ -115,7 +115,7 @@ assertSame(pClient, krbTicket.getClient()); - // client principal: null value is illegal for contructor + // client principal: null value is illegal for constructor try { new KerberosTicket(ticket, null, pServer, sessionKey, KEY_TYPE, flags, authTime, startTime, endTime, renewTill, addesses); @@ -142,7 +142,7 @@ assertNotSame(krbTicket.getClientAddresses(), krbTicket .getClientAddresses()); - // addesses: null value is OK for contructor + // addesses: null value is OK for constructor krbTicket = new KerberosTicket(ticket, pClient, pServer, sessionKey, KEY_TYPE, flags, authTime, startTime, endTime, renewTill, null); assertNull(krbTicket.getClientAddresses()); @@ -165,7 +165,7 @@ // KerberosTicket instance is immutable assertNotSame(krbTicket.getEncoded(), krbTicket.getEncoded()); - // ticket: null value is illegal for contructor + // ticket: null value is illegal for constructor try { new KerberosTicket(null, pClient, pServer, sessionKey, KEY_TYPE, flags, authTime, startTime, endTime, renewTill, addesses); @@ -192,7 +192,7 @@ // returned value is copied assertNotSame(krbTicket.getEndTime(), krbTicket.getEndTime()); - // end time: null value is illegal for contructor + // end time: null value is illegal for constructor try { new KerberosTicket(ticket, pClient, pServer, sessionKey, KEY_TYPE, flags, authTime, startTime, null, renewTill, addesses); @@ -292,7 +292,7 @@ assertSame(pServer, krbTicket.getServer()); - // server principal: null value is illegal for contructor + // server principal: null value is illegal for constructor try { new KerberosTicket(ticket, pClient, null, sessionKey, KEY_TYPE, flags, authTime, startTime, endTime, renewTill, addesses); @@ -325,7 +325,7 @@ assertEquals("algorithm", "DES", sKey.getAlgorithm()); assertEquals("format", "RAW", sKey.getFormat()); - // sessionKey: null value is illegal for contructor + // sessionKey: null value is illegal for constructor try { new KerberosTicket(ticket, pClient, pServer, null, KEY_TYPE, flags, authTime, startTime, endTime, renewTill, addesses); @@ -364,7 +364,7 @@ // returned value is copied assertNotSame(krbTicket.getStartTime(), krbTicket.getStartTime()); - // start time: null value is valid for contructor + // start time: null value is valid for constructor krbTicket = new KerberosTicket(ticket, pClient, pServer, sessionKey, KEY_TYPE, flags, authTime, null, endTime, renewTill, addesses); assertEquals(authTime, krbTicket.getStartTime()); Index: src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/kerberos/DelegationPermissionTest.java =================================================================== --- src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/kerberos/DelegationPermissionTest.java (revision 486667) +++ src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/kerberos/DelegationPermissionTest.java (working copy) @@ -145,7 +145,7 @@ // testing of the KrbDelegationPermissionCollection - // testing of the add coolection method + // testing of the add collection method public void testAddCollection() { DelegationPermission dp = new DelegationPermission("\"AAA\" \"BBB\""); PermissionCollection pc1 = dp.newPermissionCollection(); Index: src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/Sasl2Test.java =================================================================== --- src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/Sasl2Test.java (revision 486667) +++ src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/Sasl2Test.java (working copy) @@ -463,7 +463,7 @@ /** * Test for getSaslServerFactories() method * - * Assertion: returns enumeration of factories for producing SaslServert. + * Assertion: returns enumeration of factories for producing SaslServer. * * Enumeration consists of 4 elements. * Index: src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/Sasl3Test.java =================================================================== --- src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/Sasl3Test.java (revision 486667) +++ src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/Sasl3Test.java (working copy) @@ -129,7 +129,7 @@ try { Sasl.createSaslClient(new String[] { "NAME-1" }, null, "protocol", null, null, cbH); - fail("SaslException should be thrown when mechamisms is wrong"); + fail("SaslException should be thrown when mechanisms is wrong"); } catch (SaslException e) { } try { Index: src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/Sasl4Test.java =================================================================== --- src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/Sasl4Test.java (revision 486667) +++ src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/Sasl4Test.java (working copy) @@ -125,7 +125,7 @@ cbH = new Sasl3Test.cbHandN(); try { Sasl.createSaslServer("MECH-1", "protocol", null, null, cbH); - fail("SaslException should be thrown when mechamisms is wrong"); + fail("SaslException should be thrown when mechanisms is wrong"); } catch (SaslException e) { } try { Index: src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/RealmChoiceCallbackTest.java =================================================================== --- src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/RealmChoiceCallbackTest.java (revision 486667) +++ src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/RealmChoiceCallbackTest.java (working copy) @@ -108,7 +108,7 @@ * int defaultChoice, boolean multiple) constructor * * Assertion: creates RealmChoiceCallback object which does not allow - * multiple chices + * multiple choices */ public void test02() { RealmChoiceCallback rCCB; @@ -126,12 +126,12 @@ ind = new int[3]; try { rCCB.setSelectedIndexes(ind); - fail("UnsupportedOperationException should be thrown fot non-multiple callback"); + fail("UnsupportedOperationException should be thrown for non-multiple callback"); } catch (UnsupportedOperationException e) { } try { rCCB.setSelectedIndexes(null); - fail("UnsupportedOperationException should be thrown fot non-multiple callback"); + fail("UnsupportedOperationException should be thrown for non-multiple callback"); } catch (UnsupportedOperationException e) { } for (int j = 0; j < indexes.length; j++) { @@ -148,7 +148,7 @@ * int defaultChoice, boolean multiple) constructor * * Assertion: creates RealmChoiceCallback object which allows - * multiple chices + * multiple choices */ public void test03() { RealmChoiceCallback rCCB; @@ -165,7 +165,7 @@ assertNull("Incorrect selected indexes", ind); rCCB.setSelectedIndexes(indexes); ind = rCCB.getSelectedIndexes(); - assertEquals("Incoddect index length", ind.length, indexes.length); + assertEquals("Incorrect index length", ind.length, indexes.length); for (int j = 0; j < indexes.length; j++) { assertEquals("Incorrect index number: " + Integer.toString(j), ind[j], indexes[j]); @@ -178,7 +178,7 @@ } rCCB.setSelectedIndexes(indexes); ind = rCCB.getSelectedIndexes(); - assertEquals("Incoddect index length", ind.length, indexes.length); + assertEquals("Incorrect index length", ind.length, indexes.length); for (int j = 0; j < indexes.length; j++) { assertEquals("Incorrect index number: " + Integer.toString(j), ind[j], indexes[j]); Index: src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/serialization/SaslExceptionTest.java =================================================================== --- src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/serialization/SaslExceptionTest.java (revision 486667) +++ src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/serialization/SaslExceptionTest.java (working copy) @@ -27,7 +27,7 @@ import org.apache.harmony.testframework.serialization.SerializationTest; /** - * Test for SaslException seialization + * Test for SaslException serialization * */ Index: src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/serialization/AuthorizeCallbackTest.java =================================================================== --- src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/serialization/AuthorizeCallbackTest.java (revision 486667) +++ src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/serialization/AuthorizeCallbackTest.java (working copy) @@ -29,7 +29,7 @@ import org.apache.harmony.testframework.serialization.SerializationTest; /** - * Test for AuthorizeCallback seialization + * Test for AuthorizeCallback serialization * */ Index: src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/serialization/RealmChoiceCallbackTest.java =================================================================== --- src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/serialization/RealmChoiceCallbackTest.java (revision 486667) +++ src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/serialization/RealmChoiceCallbackTest.java (working copy) @@ -29,7 +29,7 @@ import org.apache.harmony.testframework.serialization.SerializationTest; /** - * Test for RealmChoiceCallback seialization + * Test for RealmChoiceCallback serialization * */ Index: src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/serialization/RealmCallbackTest.java =================================================================== --- src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/serialization/RealmCallbackTest.java (revision 486667) +++ src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/serialization/RealmCallbackTest.java (working copy) @@ -29,7 +29,7 @@ import org.apache.harmony.testframework.serialization.SerializationTest; /** - * Test for RealmCallback seialization + * Test for RealmCallback serialization * */ Index: src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/serialization/AuthenticationExceptionTest.java =================================================================== --- src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/serialization/AuthenticationExceptionTest.java (revision 486667) +++ src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/serialization/AuthenticationExceptionTest.java (working copy) @@ -27,7 +27,7 @@ import org.apache.harmony.testframework.serialization.SerializationTest; /** - * Test for AuthoricationException seialization + * Test for AuthenticationException serialization * */ Index: src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/RealmCallbackTest.java =================================================================== --- src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/RealmCallbackTest.java (revision 486667) +++ src/test/java/common/org/apache/harmony/auth/tests/javax/security/sasl/RealmCallbackTest.java (working copy) @@ -83,7 +83,7 @@ for (int i = 0; i < prompts.length; i++) { for (int j = 0; j < prompts.length; j++) { rCB = new RealmCallback(prompts[i], defInfo[j]); - assertEquals("Incoorect default info", rCB.getDefaultText(), + assertEquals("Incorrect default info", rCB.getDefaultText(), defInfo[j]); assertEquals("Incorrect prompt", rCB.getPrompt(), prompts[i]); assertNull("Not null text", rCB.getText()); @@ -126,7 +126,7 @@ String ss; for (int i = 0; i < prompts.length; i++) { rCB = new RealmCallback(prompts[i]); - assertNull("Incoorect default info", rCB.getDefaultText()); + assertNull("Incorrect default info", rCB.getDefaultText()); assertEquals("Incorrect prompt", rCB.getPrompt(), prompts[i]); assertNull("Not null text", rCB.getText()); sb = new StringBuffer(prompts[i]); Index: src/test/java/common/org/apache/harmony/auth/internal/SecurityTest.java =================================================================== --- src/test/java/common/org/apache/harmony/auth/internal/SecurityTest.java (revision 486667) +++ src/test/java/common/org/apache/harmony/auth/internal/SecurityTest.java (working copy) @@ -164,7 +164,7 @@ /** * Sets grant mode - * all permissions are denided, test can only grant specific permission + * all permissions are denied, test can only grant specific permission */ public void grantMode() { mode = false; Index: src/test/java/common/javax/security/auth/PolicyTest.java =================================================================== --- src/test/java/common/javax/security/auth/PolicyTest.java (revision 486667) +++ src/test/java/common/javax/security/auth/PolicyTest.java (working copy) @@ -201,7 +201,7 @@ // Principal javax.security.auth.MyPrincipal "duke" // - // no prinipals at all + // no principals at all subject = new Subject(); c = p.getPermissions(subject, null); assertFalse("Elements: ", c.elements().hasMoreElements()); @@ -259,7 +259,7 @@ assertEquals("Permission: ", per, new RuntimePermission( "createClassLoader")); - // reset subject : no prinipals at all + // reset subject : no principals at all subject = new Subject(); c = p.getPermissions(subject, source); assertFalse("Elements: ", c.elements().hasMoreElements()); Index: src/test/java/common/javax/security/auth/SubjectTest.java =================================================================== --- src/test/java/common/javax/security/auth/SubjectTest.java (revision 486667) +++ src/test/java/common/javax/security/auth/SubjectTest.java (working copy) @@ -48,7 +48,7 @@ /** - * Tests Subject and its innner classes implementation. + * Tests Subject and its inner classes implementation. */ public class SubjectTest extends SecurityTest { @@ -183,7 +183,7 @@ /** * Testing Subject(boolean,Set,Set,Set) constructor - * in resticted security context + * in restricted security context */ public final void testSubject_3Set_NoPermissions() { @@ -556,7 +556,7 @@ assertTrue(obj2.equals(obj3)); assertTrue(obj1.equals(obj3)); - // consistenty + // consistency assertTrue(obj3.equals(obj1)); assertTrue(obj3.equals(obj1)); @@ -586,19 +586,19 @@ //doesn't verify private credential permissions on itself assertTrue(subject1.equals(subject1)); - // principals comparision goes before + // principals comparison goes before // no SecurityException expected Subject subject2 = new Subject(false, hash, new HashSet(), hash); assertFalse(subject1.equals(subject2)); - // public credential comparision goes before + // public credential comparison goes before // no SecurityException expected subject2 = new Subject(false, new HashSet(), hash, hash); assertFalse(subject1.equals(subject2)); - // principal and public credentils sets are equal + // principal and public credentials sets are equal // Expected: SecurityException subject2 = new Subject(false, new HashSet(), new HashSet(), hash); try { Index: src/test/java/common/javax/security/auth/x500/X500PrincipalTest.java =================================================================== --- src/test/java/common/javax/security/auth/x500/X500PrincipalTest.java (revision 486667) +++ src/test/java/common/javax/security/auth/x500/X500PrincipalTest.java (working copy) @@ -193,7 +193,7 @@ /** * Inits X500Principal with byte array - * Itins other X500Principal with equivalent string + * Inits other X500Principal with equivalent string * checks if equals returns true for first against second one */ public void testEquals() throws Exception { @@ -720,7 +720,7 @@ } /** - * FIXME test is faild - implement unicode normalization + * FIXME test is failed - implement unicode normalization * @throws Exception */ public void testGetNameUnicodeNormalized() throws Exception { @@ -1980,7 +1980,7 @@ // testing OID case : OID => // tested all OIDs from RFC 2253 (2.3) and RFC 1779 (Table 1) - // differen variants of 2.5.4.3 (CN) OID + // different variants of 2.5.4.3 (CN) OID list.add("OID.2.5.4.3=A", "CN=A", "CN=A"); list.add("oid.2.5.4.3=A", "CN=A", "CN=A"); list.add("2.5.4.3=A", "CN=A", "CN=A"); @@ -2220,13 +2220,13 @@ //FIXME list.add("CN=\"\\\r\"", "CN=\"\\\r\""); // "\" // AttributeValue : RFC 1779 compatibility - list.add("CN= A ", "CN=A", "CN=A", "cn=a"); // leading & traling spaces + list.add("CN= A ", "CN=A", "CN=A", "cn=a"); // leading & trailing spaces list.add("CN=\\ A ", "CN=\\ A", "CN=\" A\"", "cn=a", null, (byte) 0x01); // escaped leading space list.add("CN= A \\ ", "CN=A \\ ", "CN=\"A \"", "cn=a", null, - (byte) 0x01); // escaped traling space + (byte) 0x01); // escaped trailing space - list.add("CN= \"A\" ", "CN=A", "CN=A", "cn=a"); // leading & traling spaces + list.add("CN= \"A\" ", "CN=A", "CN=A", "cn=a"); // leading & trailing spaces StringBuffer errorMsg = new StringBuffer(); for (int i = 0; i < list.size(); i++) { @@ -2314,7 +2314,7 @@ String[] illegalDN = new String[] { // RDN //FIXME " ", // space only - "CN", // atttibute type only + "CN", // attribute type only "CN=A;", // RFC 1779: BNF allows this, but ... "CN=A,", // RFC 1779: BNF allows this, but ... ",CN=A", // no AttributeType for first RDN @@ -2399,7 +2399,7 @@ // Empty // list.add(new byte[] { 0x30, 0x00 }, "", "", ""); - list.add(new byte[] { 0x30, 0x02, 0x31, 0x00 }, "", "", ""); //??? invalid size contraints + list.add(new byte[] { 0x30, 0x02, 0x31, 0x00 }, "", "", ""); //??? invalid size constraints // // Known OID + string with different tags(all string) Index: src/test/java/common/javax/security/auth/PrivateCredentialPermissionTest.java =================================================================== --- src/test/java/common/javax/security/auth/PrivateCredentialPermissionTest.java (revision 486667) +++ src/test/java/common/javax/security/auth/PrivateCredentialPermissionTest.java (working copy) @@ -599,7 +599,7 @@ } /** - * Returns the set of pincipals which to represent like array[x][y] + * Returns the set of principals which to represent like array[x][y] * Implementation specific. */ public final void testGetPrincipals_01() { Index: src/main/java/unix/org/apache/harmony/auth/UnixNumericGroupPrincipal.java =================================================================== --- src/main/java/unix/org/apache/harmony/auth/UnixNumericGroupPrincipal.java (revision 486667) +++ src/main/java/unix/org/apache/harmony/auth/UnixNumericGroupPrincipal.java (working copy) @@ -23,7 +23,7 @@ import org.apache.harmony.auth.internal.nls.Messages; /** - * This class represents a unix groupd by its group id. + * This class represents a unix groups by its group id. */ public class UnixNumericGroupPrincipal implements Serializable, Principal { Index: src/main/java/unix/org/apache/harmony/auth/UnixPrincipal.java =================================================================== --- src/main/java/unix/org/apache/harmony/auth/UnixPrincipal.java (revision 486667) +++ src/main/java/unix/org/apache/harmony/auth/UnixPrincipal.java (working copy) @@ -64,7 +64,7 @@ /** * Compares two UnixPrincipal objects.
- * Two pricipal objects are considered equal if they are both of type + * Two principal objects are considered equal if they are both of type * UnixPrincipal and their names are equal. */ @Override Index: src/main/java/common/org/apache/harmony/auth/internal/kerberos/v5/KDCRequest.java =================================================================== --- src/main/java/common/org/apache/harmony/auth/internal/kerberos/v5/KDCRequest.java (revision 486667) +++ src/main/java/common/org/apache/harmony/auth/internal/kerberos/v5/KDCRequest.java (working copy) @@ -138,7 +138,7 @@ protected void getValues(Object object, Object[] values) { KDCRequest request = (KDCRequest) object; - // FIXME: hardcoded - no KDCoptions are set + // FIXME: hardcoded - no KDCOptions are set // note: number of bits should be >= 32 // (see RFC 4120, 5.2.8. KerberosFlags) values[0] = new byte[] { (byte) 0x03, (byte) 0x05, (byte) 0x00, (byte) 0x00, Index: src/main/java/common/javax/security/auth/kerberos/KerberosTicket.java =================================================================== --- src/main/java/common/javax/security/auth/kerberos/KerberosTicket.java (revision 486667) +++ src/main/java/common/javax/security/auth/kerberos/KerberosTicket.java (working copy) @@ -201,7 +201,7 @@ public final boolean isForwarded() { checkState(); - //TODO: was based on authentication involving a forwarde TGT ? + //TODO: was based on authentication involving a forward TGT ? return flags[FORWARDED]; } Index: src/main/java/common/javax/security/auth/PrivateCredentialPermission.java =================================================================== --- src/main/java/common/javax/security/auth/PrivateCredentialPermission.java (revision 486667) +++ src/main/java/common/javax/security/auth/PrivateCredentialPermission.java (working copy) @@ -80,7 +80,7 @@ } /** - * Initialize a PivateCredentialPermission object and checks that a target + * Initialize a PrivateCredentialPermission object and checks that a target * name has a correct format: CredentialClass 1*(PrincipalClass * "PrincipalName") */ Index: src/main/java/windows/org/apache/harmony/auth/NTSidGroupPrincipal.java =================================================================== --- src/main/java/windows/org/apache/harmony/auth/NTSidGroupPrincipal.java (revision 486667) +++ src/main/java/windows/org/apache/harmony/auth/NTSidGroupPrincipal.java (working copy) @@ -29,7 +29,7 @@ private static final long serialVersionUID = -1181422254891703071L; /** - * A constructor which takes group SID as its only argumant. + * A constructor which takes group SID as its only argument. * @param sid group SID */ public NTSidGroupPrincipal(String name) { Index: src/main/java/windows/org/apache/harmony/auth/NTSid.java =================================================================== --- src/main/java/windows/org/apache/harmony/auth/NTSid.java (revision 486667) +++ src/main/java/windows/org/apache/harmony/auth/NTSid.java (working copy) @@ -44,7 +44,7 @@ private String domain; /** - * A constructor which takes object's SID as its only argumant. + * A constructor which takes object's SID as its only argument. * @param sid SID */ public NTSid(String sid) { Index: src/main/java/windows/org/apache/harmony/auth/NTSidUserPrincipal.java =================================================================== --- src/main/java/windows/org/apache/harmony/auth/NTSidUserPrincipal.java (revision 486667) +++ src/main/java/windows/org/apache/harmony/auth/NTSidUserPrincipal.java (working copy) @@ -29,7 +29,7 @@ private static final long serialVersionUID = -76980455882379611L; /** - * A constructor which takes user SID as its only argumant. + * A constructor which takes user SID as its only argument. * @param sid user SID */ public NTSidUserPrincipal(String sid) { Index: src/main/java/windows/org/apache/harmony/auth/NTSidPrimaryGroupPrincipal.java =================================================================== --- src/main/java/windows/org/apache/harmony/auth/NTSidPrimaryGroupPrincipal.java (revision 486667) +++ src/main/java/windows/org/apache/harmony/auth/NTSidPrimaryGroupPrincipal.java (working copy) @@ -30,7 +30,7 @@ private static final long serialVersionUID = 1652712324814773197L; /** - * A constructor which takes group SID as its only argumant. + * A constructor which takes group SID as its only argument. * @param sid group SID */ public NTSidPrimaryGroupPrincipal(String sid) { Index: src/main/java/windows/org/apache/harmony/auth/NTSidDomainPrincipal.java =================================================================== --- src/main/java/windows/org/apache/harmony/auth/NTSidDomainPrincipal.java (revision 486667) +++ src/main/java/windows/org/apache/harmony/auth/NTSidDomainPrincipal.java (working copy) @@ -29,7 +29,7 @@ private static final long serialVersionUID = -8278226353092135089L; /** - * A constructor which takes domain's SID as its only argumant. + * A constructor which takes domain's SID as its only argument. * @param sid domain SID */ public NTSidDomainPrincipal(String sid) { @@ -40,7 +40,7 @@ * A constructor which takes an extended set of information - domain SID, * and its name * @param sid domain SID - * @param domani name of the domain + * @param domain name of the domain */ public NTSidDomainPrincipal(String sid, String domain) { super(sid, domain, domain); Index: src/main/native/auth/windows/authwin32.c =================================================================== --- src/main/native/auth/windows/authwin32.c (revision 486667) +++ src/main/native/auth/windows/authwin32.c (working copy) @@ -316,7 +316,7 @@ // step +1: get primary group sid // if( NULL == (lpGroupData = QueryInfo(jenv, hUser, TokenPrimaryGroup)) ) { - errMsg = "Unable to get primaty group"; + errMsg = "Unable to get primary group"; goto exit; };