Index: src/test/impl/java/org/apache/harmony/security/tests/java/security/KeyStore_Impl1Test.java =================================================================== --- src/test/impl/java/org/apache/harmony/security/tests/java/security/KeyStore_Impl1Test.java (revision 490317) +++ src/test/impl/java/org/apache/harmony/security/tests/java/security/KeyStore_Impl1Test.java (working copy) @@ -489,7 +489,7 @@ .isCertificateEntry(aliases[j])); en = kss[i].getEntry(aliases[j], pPath); - assertTrue("Incorect Entry", + assertTrue("Incorrect Entry", en instanceof KeyStore.PrivateKeyEntry); Key key = pKey.getPrivateKey(); Key key1 = ((KeyStore.PrivateKeyEntry) en).getPrivateKey(); @@ -550,7 +550,7 @@ try { kss[i].getEntry(aliases[j], pPar); - fail("UnrecoverableEntryExceptionn should be thrown"); + fail("UnrecoverableEntryException should be thrown"); } catch (UnrecoverableEntryException e) { } } @@ -572,7 +572,7 @@ * setEntry(..) throws KeyStoreException when incorrect Entry is used. * * FIXME: this test should be changed to verify SecretKeyEntry. - * It is not supoorted. + * It is not supported. */ public void testEntry03() throws Exception { assertTrue(NotSupportMsg, JKSSupported); @@ -634,7 +634,7 @@ } try { kss[i].getEntry(aliases[j], pPar); - fail("UnrecoverableEntryExceptionn should be thrown"); + fail("UnrecoverableEntryException should be thrown"); } catch (UnrecoverableEntryException e) { } } @@ -720,7 +720,7 @@ * setKeyEntry(...) throws KeyStoreException when key or password * is null * - * setCertificateEntry(..) throws KeyStoreException when KeyEntry was overwriten + * setCertificateEntry(..) throws KeyStoreException when KeyEntry was overwritten * * setKeyEntry(..) stores used entry, getKey(..) returns it and getCertificateChain(...) * returns cert @@ -971,7 +971,7 @@ } catch (KeyStoreException e) { } keySt = new tmpKeyStore(null, null, null); - assertNull("Aalgorithm must be null", keySt.getType()); + assertNull("Algorithm must be null", keySt.getType()); assertNull("Provider must be null", keySt.getProvider()); try { keySt.load(null, pwd); Index: src/test/impl/java/org/apache/harmony/security/tests/java/security/SecureRandom_ImplTest.java =================================================================== --- src/test/impl/java/org/apache/harmony/security/tests/java/security/SecureRandom_ImplTest.java (revision 490317) +++ src/test/impl/java/org/apache/harmony/security/tests/java/security/SecureRandom_ImplTest.java (working copy) @@ -46,7 +46,7 @@ */ protected void setUp() throws Exception { super.setUp(); - // remove all registerd providers + // remove all registered providers for (int i = 0; i < providers.length; i++) { Security.removeProvider(providers[i].getName()); } @@ -57,7 +57,7 @@ */ protected void tearDown() throws Exception { super.tearDown(); - // restore all registerd providers + // restore all registered providers for (int i = 0; i < providers.length; i++) { Security.addProvider(providers[i]); } Index: src/test/impl/java/org/apache/harmony/security/tests/java/security/spec/ECFieldF2m_ImplTest.java =================================================================== --- src/test/impl/java/org/apache/harmony/security/tests/java/security/spec/ECFieldF2m_ImplTest.java (revision 490317) +++ src/test/impl/java/org/apache/harmony/security/tests/java/security/spec/ECFieldF2m_ImplTest.java (working copy) @@ -35,7 +35,7 @@ /** * Support class for this test. - * Incapsulates ECFieldF2m testing + * Encapsulates ECFieldF2m testing * domain parameters. * */ Index: src/test/impl/java/org/apache/harmony/security/tests/java/security/CodeSource_ImplTest.java =================================================================== --- src/test/impl/java/org/apache/harmony/security/tests/java/security/CodeSource_ImplTest.java (revision 490317) +++ src/test/impl/java/org/apache/harmony/security/tests/java/security/CodeSource_ImplTest.java (working copy) @@ -118,7 +118,7 @@ boolean noMoreFactories = false; try { // remove all providers for x509 - // 'for' loop here for the sake of avoding endless loop - well, just + // 'for' loop here for the sake of avoiding endless loop - well, just // in case if something is wrong with add/remove machinery. // '100' seems reasonable big to remove all necessary providers // ... Index: src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/TrustAnchor_ImplTest.java =================================================================== --- src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/TrustAnchor_ImplTest.java (revision 490317) +++ src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/TrustAnchor_ImplTest.java (working copy) @@ -592,7 +592,7 @@ // // Full NameConstraints encoding - // (generated by own encoder class created durind test development) + // (generated by own encoder class created during test development) // // @return Full NameConstraints encoding // with all OPTIONAL values presented. @@ -641,7 +641,7 @@ // // NameConstraints encoding without excludedSubtrees - // (generated by own encoder class created durind test development) + // (generated by own encoder class created during test development) // // @return NameConstraints encoding with // permittedSubtrees only; all OPTIONAL @@ -673,7 +673,7 @@ // // NameConstraints encoding without permittedSubtrees - // (generated by own encoder class created durind test development) + // (generated by own encoder class created during test development) // // @return NameConstraints encoding with // excludedSubtrees only; all OPTIONAL @@ -706,7 +706,7 @@ // // NameConstraints full encoding with all (OPTIONAL) // minimum/maximum GeneralSubtree fields OMITTED - // (generated by own encoder class created durind test development) + // (generated by own encoder class created during test development) // // @return Full NameConstraints encoding // with all (OPTIONAL) minimum/maximum @@ -746,7 +746,7 @@ } // Returns OID encoding - // (generated by own encoder class created durind test development) + // (generated by own encoder class created during test development) private static final byte[] getEncodingOid() { // DO NOT MODIFY! return new byte[] { Index: src/test/impl/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator_ImplTest.java =================================================================== --- src/test/impl/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator_ImplTest.java (revision 490317) +++ src/test/impl/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator_ImplTest.java (working copy) @@ -74,7 +74,7 @@ /** * Test for init(int size) and * init(int size, SecureRandom random methods - * Assertion: throws InvalidParameterExceptiom when size is incorrect + * Assertion: throws InvalidParameterException when size is incorrect */ public void testAlgorithmParameterGenerator11() throws Exception { if (!DSASupported) { Index: src/test/impl/java/org/apache/harmony/security/tests/fortress/PolicyUtilsTest.java =================================================================== --- src/test/impl/java/org/apache/harmony/security/tests/fortress/PolicyUtilsTest.java (revision 490317) +++ src/test/impl/java/org/apache/harmony/security/tests/fortress/PolicyUtilsTest.java (working copy) @@ -272,7 +272,7 @@ } } - /** Tests convertion of null, empty and non-empty heterogenious collections. */ + /** Tests conversion of null, empty and non-empty heterogeneous collections. */ public void testToPermissionCollection() { Permission p1 = new SecurityPermission("abc"); Permission p2 = new AllPermission(); Index: src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1_MessageDigestTest.java =================================================================== --- src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1_MessageDigestTest.java (revision 490317) +++ src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1_MessageDigestTest.java (working copy) @@ -17,10 +17,10 @@ /* * TODO - * Two tescases, one in testDigestbyteArrayintint01() and one in testUpdatebyteArrayintint01(), + * Two testcases, one in testDigestbyteArrayintint01() and one in testUpdatebyteArrayintint01(), * and testUpdatebyteArrayintint03() test are commented out because * current implementations of the MessageDigest and MessageDigestSpi classes - * are not compatibile with RI; see JIRA ## 1120 and 1148. + * are not compatible with RI; see JIRA ## 1120 and 1148. */ @@ -403,7 +403,7 @@ /** * test against the "void engineReset()" method; - * it checks out that digests returned after preceeding "engineReset()" + * it checks out that digests returned after proceeding "engineReset()" * is the same as in case of initial digest */ public final void testReset() { Index: src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1withDSA_SignatureTest.java =================================================================== --- src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1withDSA_SignatureTest.java (revision 490317) +++ src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1withDSA_SignatureTest.java (working copy) @@ -367,7 +367,7 @@ * 1. In RI, negating effect of previous call includes * discarding updates done before calling the method. * 2. - * The specification for the method contains the folowing clause: + * The specification for the method contains the following clause: * "If this method is called again with a different argument, * it negates the effect of this call." * which meaning requires certainty in case of sequence @@ -573,7 +573,7 @@ try { signingSigns[i].sign(sig, 0, 44); - fail("case1 : no SignatureExcepton : i=" + i); + fail("case1 : no SignatureException : i=" + i); } catch (SignatureException e) {} } } @@ -679,7 +679,7 @@ * The compatibility with RI test. * It checks out that * for the predefined message and signature signed with PrivateKey from RI - * the method invoked on a Signature object initiazed with corresponding PublicKey from RI + * the method invoked on a Signature object initialized with corresponding PublicKey from RI * returns "true". */ public final void testVerifybyteArray03() throws Exception { @@ -865,7 +865,7 @@ assertTrue("case1: test failure", verifyingSign.verify(sigBytes, 0, n)); assertFalse("case2: test failure", verifyingSign.verify(sigBytes, 0, n)); - // tastcase2: first call returns false (incorrect signature), + // testcase2: first call returns false (incorrect signature), // second returns false too, in spite of correct signature (!), // because Signature object was reset in first call Index: src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/DSAKeyFactoryImplTest.java =================================================================== --- src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/DSAKeyFactoryImplTest.java (revision 490317) +++ src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/DSAKeyFactoryImplTest.java (working copy) @@ -506,7 +506,7 @@ * A test against the "getKeySpec(Key, Class)" method. * The test checks out that the method throws up InvalidKeySpecException if * a "Class" argument is not appropriate for a "Key" argument - * regradless of whether a correct value or null is passed to a Key argument. + * regardless of whether a correct value or null is passed to a Key argument. */ public final void testGetKeySpec01() throws Exception { @@ -594,7 +594,7 @@ /** * A test against the "getKeySpec(Key, Class)" method. * The test checks out that - * 1) a KeySpec returned by the methodis being casted to + * 1) a KeySpec returned by the method is being casted to expected "DSAPrivateKeySpec" or "PKCS8EncodedKeySpec", and * 2) DSAPublickey object generated from KeySpec is equal a "privateKey" argument. */ Index: src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1PRNG_SecureRandomTest.java =================================================================== --- src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1PRNG_SecureRandomTest.java (revision 490317) +++ src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1PRNG_SecureRandomTest.java (working copy) @@ -234,11 +234,11 @@ * byte array of zero length to "nextBytes(byte[])" method. * The test contains two testcases: * - first testcase checks out that if for two newly created SecureRandom objects - * invokation of "nextBytes(new byte[0])" method are first ones + * invocation of "nextBytes(new byte[0])" method are first ones * then further calls to nextBytes(..) methods return different byte arrays, * that is, first "nextBytes(new byte[0])" aslo randomizes internal state; * - second testcase checks out that if for two newly created SecureRandom objects - * invokation of "setSeed(..)" methods are first ones + * invocation of "setSeed(..)" methods are first ones * then further calls to "nextBytes(new byte[0])" methods has no effect */ public final void testNextBytesbyteArray04() throws NoSuchAlgorithmException, @@ -365,8 +365,8 @@ /** * test against the "void setSeed(byte[])" method; * it checks out that the "byte[0]" argument has no effect; there are two testcases: - * - if one of two SecureRandom objects sipplied with the same seed is additionally - * sipplied with such array, "nextBytes(..)" of both objects return the same bytes; + * - if one of two SecureRandom objects supplied with the same seed is additionally + * supplied with such array, "nextBytes(..)" of both objects return the same bytes; * - two byte arrays returned by "nextBytes(..)" in following sequence * nextBytes(..); setSeed(new byte[0]); nextBytes(..); * don't contain the same byte sequencies. Index: src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/serialization/SHA1PRNG_SecureRandomTest.java =================================================================== --- src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/serialization/SHA1PRNG_SecureRandomTest.java (revision 490317) +++ src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/serialization/SHA1PRNG_SecureRandomTest.java (working copy) @@ -105,7 +105,7 @@ /** - * Compareing sequencies of bytes + * Comparing sequencies of bytes * returned by "nextBytes(..)" of referenced and tested objects */ private void testingSame(SecureRandom ref, SecureRandom test) { @@ -137,7 +137,7 @@ /** - * Compareing sequencies of bytes + * Comparing sequencies of bytes * returned by "nextBytes(..)" of referenced and tested objects */ private void testingNotSame(SecureRandom ref, SecureRandom test) { Index: src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1ImplTest.java =================================================================== --- src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1ImplTest.java (revision 490317) +++ src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1ImplTest.java (working copy) @@ -97,7 +97,7 @@ /* * The test checks out that SHA1Impl computes correct value - * if data supplied takes exactly fourteen words of sexteen word buffer. + * if data supplied takes exactly fourteen words of sixteen word buffer. */ public final void testMultiBlockMessage() { @@ -163,7 +163,7 @@ */ private void alternateHash(int[] bufW, int[] hash) { - // constants defned in Secure Hash Standard + // constants defined in Secure Hash Standard final int[] K = { 0x5A827999, 0x5A827999, 0x5A827999, 0x5A827999, Index: src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CertImplTest.java =================================================================== --- src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CertImplTest.java (revision 490317) +++ src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CertImplTest.java (working copy) @@ -95,7 +95,7 @@ String algName = "SHA1withDSA"; // DER boolean false encoding (http://asn1.elibel.tm.fr) - // Makes no sence. For testing purposes we need just provide + // Makes no sense. For testing purposes we need just provide // some ASN.1 structure: byte[] algParams = {1, 1, 0}; String issuerName = "O=Certificate Issuer"; @@ -761,7 +761,7 @@ public void testVerify3() throws Exception { try { certificate.verify(publicKey); - fail("Incorrect signature succesfully verified."); + fail("Incorrect signature successfully verified."); } catch (Exception e) { } } Index: src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CRLImplTest.java =================================================================== --- src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CRLImplTest.java (revision 490317) +++ src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CRLImplTest.java (working copy) @@ -74,7 +74,7 @@ private static String algOID = "1.2.840.10040.4.3"; private static String algName = "SHA1withDSA"; // DER boolean false encoding (http://asn1.elibel.tm.fr) - // Makes no sence. For testing purposes we need just provide + // Makes no sense. For testing purposes we need just provide // some ASN.1 structure: private static byte[] algParams = {1, 1, 0}; private static AlgorithmIdentifier signature; @@ -485,7 +485,7 @@ public void testVerify3() throws Exception { try { crl.verify(publicKey); - fail("Incorrect signature succesfully verified."); + fail("Incorrect signature successfully verified."); } catch (Exception e) { } } Index: src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CertFactoryPerfTest.java =================================================================== --- src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CertFactoryPerfTest.java (revision 490317) +++ src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CertFactoryPerfTest.java (working copy) @@ -70,7 +70,7 @@ static String algName = "SHA1withDSA"; // DER boolean false encoding (http://asn1.elibel.tm.fr) - // Makes no sence. For testing purposes we need just provide + // Makes no sense. For testing purposes we need just provide // some ASN.1 structure: static byte[] algParams = {1, 1, 0}; static String issuerName = "O=Certificate Issuer"; @@ -844,7 +844,7 @@ public void testVerify3() throws Exception { try { certificate.verify(publicKey); - fail("Incorrect signature succesfully verified."); + fail("Incorrect signature successfully verified."); } catch (Exception e) { } } Index: src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CRLEntryImplTest.java =================================================================== --- src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CRLEntryImplTest.java (revision 490317) +++ src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CRLEntryImplTest.java (working copy) @@ -48,7 +48,7 @@ // revoked certificate issuer X500Principal issuer = new X500Principal("O=Certificate Issuer"); - // revoked sertificate serial number + // revoked certificate serial number BigInteger serialNumber = BigInteger.valueOf(555); // crl entry extensions Extensions crlEntryExtensions = new Extensions(); Index: src/test/impl/java.injected/java/security/UnresolvedPermissionTest.java =================================================================== --- src/test/impl/java.injected/java/security/UnresolvedPermissionTest.java (revision 490317) +++ src/test/impl/java.injected/java/security/UnresolvedPermissionTest.java (working copy) @@ -27,7 +27,7 @@ public class UnresolvedPermissionTest extends TestCase { /** - * newPermissionCollection() should return new BasicPermissionCollection on every invokation + * newPermissionCollection() should return new BasicPermissionCollection on every invocation */ public void testCollection() { Index: src/test/impl/java.injected/java/security/UnresolvedPermissionCollection_ImplTest.java =================================================================== --- src/test/impl/java.injected/java/security/UnresolvedPermissionCollection_ImplTest.java (revision 490317) +++ src/test/impl/java.injected/java/security/UnresolvedPermissionCollection_ImplTest.java (working copy) @@ -145,7 +145,7 @@ resolved = upc.resolveCollection(ap, null); assertNotNull(resolved); assertTrue(ap.equals(resolved.elements().nextElement())); - assertFalse("resolved permission should be removed from unresolevd collection", upc.elements().hasMoreElements()); + assertFalse("resolved permission should be removed from unresolved collection", upc.elements().hasMoreElements()); } /** @@ -191,7 +191,7 @@ assertTrue(sp.equals(els.nextElement())); assertFalse(els.hasMoreElements()); els = upc.elements(); - assertTrue("resolved permission should be removed from unresolevd collection", + assertTrue("resolved permission should be removed from unresolved collection", up1.equals(els.nextElement())); assertFalse(els.hasMoreElements()); } Index: src/test/impl/java.injected/java/security/cert/X509CertSelectorTest.java =================================================================== --- src/test/impl/java.injected/java/security/cert/X509CertSelectorTest.java (revision 490317) +++ src/test/impl/java.injected/java/security/cert/X509CertSelectorTest.java (working copy) @@ -1784,7 +1784,7 @@ Name nameSubject = new Name(subject); for (int i=0; iKeyStore.CallbackHandlerProtection(CallbackHandler handler) * constructor - * Assertion: throws NullPointerException when hendler is null + * Assertion: throws NullPointerException when handler is null */ public void testCallbackHandlerProtection() { try { Index: src/test/api/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator4Test.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator4Test.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator4Test.java (working copy) @@ -43,7 +43,7 @@ */ public void test_getAlgorithm() throws Exception { String alg = KeyPairGenerator.getInstance("DSA").getAlgorithm(); - assertEquals("getAlgorithm returned enexpected value", "DSA", alg); + assertEquals("getAlgorithm returned unexpected value", "DSA", alg); } /** Index: src/test/api/java/org/apache/harmony/security/tests/java/security/interfaces/DSAPublicKeyTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/interfaces/DSAPublicKeyTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/interfaces/DSAPublicKeyTest.java (working copy) @@ -49,7 +49,7 @@ */ public void testField() { checkDSAPublicKey k = new checkDSAPublicKey(); - assertEquals("Incorrect serialVerstionUID", + assertEquals("Incorrect serialVersionUID", k.getSerVerUID(), //DSAPublicKey.serialVersionUID 1234526332779022332L); } Index: src/test/api/java/org/apache/harmony/security/tests/java/security/interfaces/DSAPrivateKeyTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/interfaces/DSAPrivateKeyTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/interfaces/DSAPrivateKeyTest.java (working copy) @@ -49,7 +49,7 @@ */ public void testField() { checkDSAPrivateKey k = new checkDSAPrivateKey(); - assertEquals("Incorrect serialVerstionUID", + assertEquals("Incorrect serialVersionUID", k.getSerVerUID(), //DSAPrivateKey.serialVersionUID 7776497482533790279L); } Index: src/test/api/java/org/apache/harmony/security/tests/java/security/interfaces/ECPrivateKeyTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/interfaces/ECPrivateKeyTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/interfaces/ECPrivateKeyTest.java (working copy) @@ -49,7 +49,7 @@ */ public void testField() { checkECPrivateKey k = new checkECPrivateKey(); - assertEquals("Incorrect serialVerstionUID", + assertEquals("Incorrect serialVersionUID", k.getSerVerUID(), //ECPrivateKey.serialVersionUID -7896394956925609184L); } Index: src/test/api/java/org/apache/harmony/security/tests/java/security/ProtectionDomainTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/ProtectionDomainTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/ProtectionDomainTest.java (working copy) @@ -162,7 +162,7 @@ /** * ProtectionDomain with PermissionCollection which contains AllPermission - * must imply() AllPemrssion. + * must imply() AllPermission. */ public void testImplies_01() { assertTrue(new ProtectionDomain(null, perms).implies(allperm)); Index: src/test/api/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator1Test.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator1Test.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator1Test.java (working copy) @@ -382,7 +382,7 @@ * Assertion: throws InvalidParameterException or * InvalidAlgorithmParameterException when parameters keysize or param are * incorrect Assertion: generateKeyPair() and genKeyPair() return null - * KeyPair Addtional class MyKeyPairGenerator1 is used + * KeyPair Additional class MyKeyPairGenerator1 is used */ public void testKeyPairGenerator12() { int[] keys = { -1, -250, 1, 64, 512, 1024 }; @@ -455,9 +455,9 @@ * generateKeyPair() * genKeyPair() * Assertion: initialize(int ...) throws InvalidParameterException when - * keysize in incorrect Aserrtion: initialiaze(AlgorithmParameterSpec + * keysize in incorrect Assertion: initialize(AlgorithmParameterSpec * ...)throws UnsupportedOperationException Assertion: generateKeyPair() and - * genKeyPair() return not null KeyPair Addtional class MyKeyPairGenerator2 + * genKeyPair() return not null KeyPair Additional class MyKeyPairGenerator2 * is used */ public void testKeyPairGenerator13() { Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/KeyManagementExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/KeyManagementExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/KeyManagementExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for KeyManagementException seialization + * Test for KeyManagementException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/ProviderExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/ProviderExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/ProviderExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for ProviderException seialization + * Test for ProviderException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/InvalidAlgorithmParameterExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/InvalidAlgorithmParameterExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/InvalidAlgorithmParameterExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for InvalidAlgorithmParameterException seialization + * Test for InvalidAlgorithmParameterException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/InvalidKeyExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/InvalidKeyExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/InvalidKeyExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for InvalidKeyException seialization + * Test for InvalidKeyException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/UnrecoverableKeyExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/UnrecoverableKeyExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/UnrecoverableKeyExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for UnrecoverableKeyException seialization + * Test for UnrecoverableKeyException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/KeyStoreExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/KeyStoreExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/KeyStoreExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for KeyStoreException seialization + * Test for KeyStoreException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/GeneralSecurityExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/GeneralSecurityExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/GeneralSecurityExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for GeneralSecurityException seialization + * Test for GeneralSecurityException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/NoSuchAlgorithmExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/NoSuchAlgorithmExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/NoSuchAlgorithmExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for NoSuchAlgorithmException seialization + * Test for NoSuchAlgorithmException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/NoSuchProviderExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/NoSuchProviderExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/NoSuchProviderExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for NoSuchProviderException seialization + * Test for NoSuchProviderException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/UnrecoverableEntryExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/UnrecoverableEntryExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/UnrecoverableEntryExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for UnrecoverableEntryException seialization + * Test for UnrecoverableEntryException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/InvalidParameterExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/InvalidParameterExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/InvalidParameterExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for InvalidParameterException seialization + * Test for InvalidParameterException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/KeyExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/KeyExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/KeyExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for KeyException seialization + * Test for KeyException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/SignatureExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/SignatureExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/SignatureExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for SignatureException seialization + * Test for SignatureException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/KSPasswordProtectionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/KSPasswordProtectionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/KSPasswordProtectionTest.java (working copy) @@ -56,14 +56,14 @@ char [] pass = {'a', 'b', 'c'}; KeyStore.PasswordProtection ksPWP = new KeyStore.PasswordProtection(pass); char [] rPass = ksPWP.getPassword(); - assertFalse("PasswordProtection Should not be descroyed", ksPWP.isDestroyed()); + assertFalse("PasswordProtection Should not be destroyed", ksPWP.isDestroyed()); assertEquals("Incorrect password length", pass.length, rPass.length); for (int i = 0; i < pass.length; i++) { assertEquals("Incorrect password (item: ".concat(Integer.toString(i)) .concat(")"), pass[i], rPass[i]); } ksPWP.destroy(); - assertTrue("PasswordProtection must be descroyed", ksPWP.isDestroyed()); + assertTrue("PasswordProtection must be destroyed", ksPWP.isDestroyed()); try { ksPWP.getPassword(); fail("IllegalStateException must be thrown because PasswordProtection is destroyed"); Index: src/test/api/java/org/apache/harmony/security/tests/java/security/BasicPermission2Test.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/BasicPermission2Test.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/BasicPermission2Test.java (working copy) @@ -99,7 +99,7 @@ public void test_impliesLjava_security_Permission() { // Test for method boolean // java.security.BasicPermission.implies(java.security.Permission) - assertTrue("Equal objects should imply eachother", bp.implies(bp2)); + assertTrue("Equal objects should imply each other", bp.implies(bp2)); assertTrue("a) should not imply", !bp.implies(bp3)); assertTrue("b) should not imply", !bp4.implies(bp5)); assertTrue("a) should imply", bp3.implies(bp5)); Index: src/test/api/java/org/apache/harmony/security/tests/java/security/PrivilegedActionException2Test.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/PrivilegedActionException2Test.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/PrivilegedActionException2Test.java (working copy) @@ -41,9 +41,9 @@ * @tests java.security.PrivilegedActionException#getException() */ public void test_getException() { - Exception e = new IOException("test IOexception"); + Exception e = new IOException("test IOException"); PrivilegedActionException pe = new PrivilegedActionException(e); - assertEquals("Did not encapsulate test IOexception!", e, pe + assertEquals("Did not encapsulate test IOException!", e, pe .getException()); } } \ No newline at end of file Index: src/test/api/java/org/apache/harmony/security/tests/java/security/DigestInputStream2Test.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/DigestInputStream2Test.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/DigestInputStream2Test.java (working copy) @@ -185,7 +185,7 @@ try { digest = MessageDigest.getInstance("SHA-1"); } catch (NoSuchAlgorithmException e) { - fail("Unable to find SHA-1 algorithim"); + fail("Unable to find SHA-1 algorithm"); } } } \ No newline at end of file Index: src/test/api/java/org/apache/harmony/security/tests/java/security/KeyStoreTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/KeyStoreTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/KeyStoreTest.java (working copy) @@ -125,7 +125,7 @@ kss[i].load(null, null); try { kss[i].store(null); - fail("IOException or IllegalArgumentException should be thrown for nill parameter"); + fail("IOException or IllegalArgumentException should be thrown for null parameter"); } catch (IOException e) { } catch (IllegalArgumentException e) { } @@ -141,7 +141,7 @@ /** - * Test for setKeyEntry(String alias, bute[] key, Certificate[] chain) + * Test for setKeyEntry(String alias, byte[] key, Certificate[] chain) * method * Assertion: stores KeyEntry. */ @@ -231,7 +231,7 @@ } /** - * @test java.security.KeyStore.PasswordProtectionn.getPassword() + * @test java.security.KeyStore.PasswordProtection.getPassword() */ public void testKeyStorePPGetPassword() { // Regression for HARMONY-1539 @@ -250,7 +250,7 @@ KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType()); keyStore.load(null, "pwd".toCharArray()); - // genarate a key + // generate a key KeyGenerator keyGen = KeyGenerator.getInstance("DES"); keyGen.init(56); SecretKey secretKey = keyGen.generateKey(); Index: src/test/api/java/org/apache/harmony/security/tests/java/security/AlgorithmParametersTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/AlgorithmParametersTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/AlgorithmParametersTest.java (working copy) @@ -490,7 +490,7 @@ } private void checkUnititialized(AlgorithmParameters ap) { - assertNull("Unititialized: toString() failed", ap.toString()); + assertNull("Uninitialized: toString() failed", ap.toString()); } private void checkAP(AlgorithmParameters ap, Provider p) throws Exception { Index: src/test/api/java/org/apache/harmony/security/tests/java/security/DigestInputStreamTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/DigestInputStreamTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/DigestInputStreamTest.java (working copy) @@ -114,7 +114,7 @@ /** * Test #1 for read() method
* - * Assertion: reutns the byte read
+ * Assertion: returns the byte read
* Assertion: updates associated digest
*/ public final void testRead01() @@ -144,7 +144,7 @@ /** * Test #2 for read() method
* - * Assertion: reutns -1 if EOS had been + * Assertion: returns -1 if EOS had been * reached but not read before method call
* * Assertion: must not update digest if EOS had been @@ -322,7 +322,7 @@ /** * Test #2 for read(byte[],int,int) method
* - * Assertion: reutns the number of bytes read
+ * Assertion: returns the number of bytes read
* * Assertion: put bytes read into specified array at specified offset
* @@ -362,7 +362,7 @@ /** * Test #3 for read(byte[],int,int) method
* - * Assertion: reutns the number of bytes read
+ * Assertion: returns the number of bytes read
* * Assertion: put bytes read into specified array at specified offset
* @@ -411,7 +411,7 @@ /** * Test #4 for read(byte[],int,int) method
* - * Assertion: reutns the number of bytes read
+ * Assertion: returns the number of bytes read
* * Assertion: updates associated digest
*/ @@ -444,7 +444,7 @@ /** * Test #5 for read(byte[],int,int) method
* - * Assertion: reutns the number of bytes read
+ * Assertion: returns the number of bytes read
* * Assertion: put bytes read into specified array at specified offset
* @@ -483,7 +483,7 @@ /** * Test for getMessageDigest() method
* - * Assertion: reutns associated message digest
+ * Assertion: returns associated message digest
*/ public final void testGetMessageDigest() { for (int ii=0; iigetMessageDigest()
method
* - * Assertion: reutns associated message digest
+ * Assertion: returns associated message digest
*/ public final void testGetMessageDigest() { for (int k=0; kPKIXCertPathBuilderResult(CertPath, TrustAnchor, * PolicyNode, PublicKey) constructor
- * Assertion: plicy tree parameter may be null + * Assertion: policy tree parameter may be null * @throws NoSuchAlgorithmException * @throws InvalidKeySpecException */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertStore1Test.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertStore1Test.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertStore1Test.java (working copy) @@ -234,7 +234,7 @@ * getInstance(String type, CertStoreParameters params, String provider) * Assertion: throws IllegalArgumentException when provider is null or empty * - * FIXME: verify IllegalArgumentException when privider is empty + * FIXME: verify IllegalArgumentException when provider is empty */ public void testCertStore06() throws InvalidAlgorithmParameterException, NoSuchAlgorithmException, @@ -410,7 +410,7 @@ } } /** - * Addifional class to verify CertStore constructor + * Additional class to verify CertStore constructor */ class myCertStore extends CertStore { public myCertStore(CertStoreSpi spi, Provider prov, String type, CertStoreParameters params) { Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertificateFactory1Test.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertificateFactory1Test.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertificateFactory1Test.java (working copy) @@ -387,7 +387,7 @@ try { colCer = certFs[i].generateCertificates(is); if (colCer != null) { - assertTrue("Not empy certificate collection", colCer.isEmpty()); + assertTrue("Not empty certificate collection", colCer.isEmpty()); } } catch (CertificateException e) { } @@ -430,7 +430,7 @@ * generateCRLs(InputStream inStream) * methods * Assertion: throw CertificateException and CRLException when inStream - * contains incompatibale datas + * contains incompatible datas */ public void testCertificateFactory11() throws CertificateException, NoSuchProviderException, IOException { Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertificateFactory3Test.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertificateFactory3Test.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertificateFactory3Test.java (working copy) @@ -113,7 +113,7 @@ TestUtils.getEncodedX509Certificate())); Iterator it = col.iterator(); assertEquals("Incorrect Collection size", col.size(), 1); - assertEquals("Incorect Certificate in Collection", cert, it.next()); + assertEquals("Incorrect Certificate in Collection", cert, it.next()); } } Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CRLExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CRLExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CRLExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for CRLException seialization + * Test for CRLException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertPathValidatorExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertPathValidatorExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertPathValidatorExceptionTest.java (working copy) @@ -30,7 +30,7 @@ /** - * Test for CertPathValidatorException seialization + * Test for CertPathValidatorException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertPathBuilderExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertPathBuilderExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertPathBuilderExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for CertPathBuilderException seialization + * Test for CertPathBuilderException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for CertificateException seialization + * Test for CertificateException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateExpiredExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateExpiredExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateExpiredExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for CertificateExpiredException seialization + * Test for CertificateExpiredException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateNotYetValidExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateNotYetValidExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateNotYetValidExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for CertificateNotYetValidException seialization + * Test for CertificateNotYetValidException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateParsingExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateParsingExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateParsingExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for CertificateParsingException seialization + * Test for CertificateParsingException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateEncodingExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateEncodingExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateEncodingExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for CertificateEncodingException seialization + * Test for CertificateEncodingException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertStoreExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertStoreExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertStoreExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for CertStoreException seialization + * Test for CertStoreException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertPathValidator1Test.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertPathValidator1Test.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertPathValidator1Test.java (working copy) @@ -392,7 +392,7 @@ } } /** - * Addifional class to verify CertPathValidator constructor + * Additional class to verify CertPathValidator constructor */ class myCertPathValidator extends CertPathValidator { Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/TrustAnchorTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/TrustAnchorTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/TrustAnchorTest.java (working copy) @@ -393,7 +393,7 @@ // // Full NameConstraints encoding - // (generated by own encoder class created durind test development) + // (generated by own encoder class created during test development) // // @return Full NameConstraints encoding // with all OPTIONAL values presented. @@ -442,7 +442,7 @@ // // NameConstraints encoding without excludedSubtrees - // (generated by own encoder class created durind test development) + // (generated by own encoder class created during test development) // // @return NameConstraints encoding with // permittedSubtrees only; all OPTIONAL @@ -474,7 +474,7 @@ // // NameConstraints encoding without permittedSubtrees - // (generated by own encoder class created durind test development) + // (generated by own encoder class created during test development) // // @return NameConstraints encoding with // excludedSubtrees only; all OPTIONAL @@ -507,7 +507,7 @@ // // NameConstraints full encoding with all (OPTIONAL) // minimum/maximum GeneralSubtree fields OMITTED - // (generated by own encoder class created durind test development) + // (generated by own encoder class created during test development) // // @return Full NameConstraints encoding // with all (OPTIONAL) minimum/maximum Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/X509CRLEntryTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/X509CRLEntryTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/X509CRLEntryTest.java (working copy) @@ -89,7 +89,7 @@ } /** - * equals(Object other) method testing. Tests the correctnel of equal + * equals(Object other) method testing. Tests the correctness of equal * operation: it should be reflexive, symmetric, transitive, consistent * and should be false on null object. */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/UnresolvedPermissionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/UnresolvedPermissionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/UnresolvedPermissionTest.java (working copy) @@ -31,7 +31,7 @@ public class UnresolvedPermissionTest extends TestCase { /** - * Creates an Object with given name, type, action, certificaties. + * Creates an Object with given name, type, action, certificates. * Empty or null type is not allowed - exception should be thrown. */ public void testCtor() Index: src/test/api/java/org/apache/harmony/security/tests/java/security/spec/ECFieldF2mTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/spec/ECFieldF2mTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/spec/ECFieldF2mTest.java (working copy) @@ -36,7 +36,7 @@ /** * Support class for this test. - * Incapsulates ECFieldF2m testing + * Encapsulates ECFieldF2m testing * domain parameters. * */ @@ -452,7 +452,7 @@ /** * Test #1 for getMidTermsOfReductionPolynomial() method.
* - * Assertion: returns mid terms of reduction polinomial + * Assertion: returns mid terms of reduction polynomial */ public final void testGetMidTermsOfReductionPolynomial01() { int[] a = new int[] {981,2,1}; @@ -475,7 +475,7 @@ /** * Test #3 for getMidTermsOfReductionPolynomial() method.
* - * Assertion: returns mid terms of reduction polinomial + * Assertion: returns mid terms of reduction polynomial */ public final void testGetMidTermsOfReductionPolynomial03() { int[] a = new int[] {367}; @@ -486,7 +486,7 @@ /** * Test #1 for getReductionPolynomial() method.
* - * Assertion: returns reduction polinomial + * Assertion: returns reduction polynomial */ public final void testGetReductionPolynomial01() { BigInteger rp = BigInteger.valueOf(0L).setBit(0).setBit(1).setBit(2). Index: src/test/api/java/org/apache/harmony/security/tests/java/security/spec/RSAMultiPrimePrivateCrtKeySpecTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/spec/RSAMultiPrimePrivateCrtKeySpecTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/spec/RSAMultiPrimePrivateCrtKeySpecTest.java (working copy) @@ -573,7 +573,7 @@ } // - // immutabelity tests + // immutability tests // /** Index: src/test/api/java/org/apache/harmony/security/tests/java/security/spec/serialization/InvalidParameterSpecExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/spec/serialization/InvalidParameterSpecExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/spec/serialization/InvalidParameterSpecExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for InvalidParameterSpecException seialization + * Test for InvalidParameterSpecException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/spec/serialization/InvalidKeySpecExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/spec/serialization/InvalidKeySpecExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/spec/serialization/InvalidKeySpecExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for InvalidKeySpecException seialization + * Test for InvalidKeySpecException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator1Test.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator1Test.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator1Test.java (working copy) @@ -324,7 +324,7 @@ * Test for init(AlgorithmParameterSpec param) and * init(AlgorithmParameterSpec param, SecureRandom random * methods - * Assertion: throws InvalidAlgorithmParameterExceptiom when param is null + * Assertion: throws InvalidAlgorithmParameterException when param is null */ public void testAlgorithmParameterGenerator12() { if (!DSASupported) { @@ -380,7 +380,7 @@ } } /** - * Addifional class to verify AlgorithmParameterGenerator constructor + * Additional class to verify AlgorithmParameterGenerator constructor */ class myAlgPG extends AlgorithmParameterGenerator { public myAlgPG(AlgorithmParameterGeneratorSpi spi, Provider prov, String alg) { Index: src/test/api/java/org/apache/harmony/security/tests/java/security/KeyStoreSpiTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/KeyStoreSpiTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/KeyStoreSpiTest.java (working copy) @@ -141,7 +141,7 @@ } catch (KeyStoreException e) { } assertNull("engineAliases() must return null", ksSpi.engineAliases()); - assertFalse("engineConatinsAlias(..) must return false", ksSpi + assertFalse("engineContainsAlias(..) must return false", ksSpi .engineContainsAlias("")); assertEquals("engineSize() must return 0", 0, ksSpi.engineSize()); try { Index: src/test/api/java/org/apache/harmony/security/tests/java/security/KeyStore2Test.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/KeyStore2Test.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/KeyStore2Test.java (working copy) @@ -268,7 +268,7 @@ assertTrue("key entry - the alias returned for this " + "certificate was wrong", alias.equals("alias2")); - // testing case with a nonexistant certificate + // testing case with a nonexistent certificate X509Certificate cert2 = (X509Certificate) cf .generateCertificate(certArray3); String aliasNull = keyTest.getCertificateAlias(cert2); Index: src/test/api/java/org/apache/harmony/security/tests/java/security/KeyTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/KeyTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/KeyTest.java (working copy) @@ -47,7 +47,7 @@ */ public void testField() { checkKey mk = new checkKey(); - assertEquals("Incorrect seralVersionUID", mk.getSerVerUID(), //Key.serialVersionUID, + assertEquals("Incorrect serialVersionUID", mk.getSerVerUID(), //Key.serialVersionUID, 6603384152749567654L); } Index: src/test/api/java/org/apache/harmony/security/tests/java/security/CodeSourceTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/java/security/CodeSourceTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/java/security/CodeSourceTest.java (working copy) @@ -62,7 +62,7 @@ private static URL urlDir_port80, urlDir_port81; - /* must be exatly the same as urlDir, but with slash added */ + /* must be exactly the same as urlDir, but with slash added */ private static URL urlDirWithSlash; //private static URL urlDirFtp; @@ -174,7 +174,7 @@ /** * Test for equals(Object)
- * The signer certificate chain must contain the same set of cerificates, but + * The signer certificate chain must contain the same set of certificates, but * the order of the certificates is not taken into account. */ public void testEqualsObject_02() { @@ -203,7 +203,7 @@ } /** - * Tests CodeSource.getCeritficates(). + * Tests CodeSource.getCertificates(). */ public void testGetCertificates_00() { assertNull(new CodeSource(null, (Certificate[]) null).getCertificates()); @@ -369,7 +369,7 @@ /** * Tests whether we are running with the 1.5 features.
* The test is preformed by looking for (via reflection) the CodeSource's - * costructor {@link CodeSource#CodeSource(URL, CodeSigner[])}. + * constructor {@link CodeSource#CodeSource(URL, CodeSigner[])}. * @return true if 1.5 feature is presented, false * otherwise. */ @@ -597,7 +597,7 @@ /** * Testing with special URLs like 'localhost', 'file://' scheme ... - * These cpesial URLs have a special processing in implies(), + * These special URLs have a special processing in implies(), * so they need to be covered and performance need to be checked */ public void testImplies_0C() throws Exception { @@ -612,7 +612,7 @@ /** * Testing with special URLs like 'localhost', 'file://' scheme ... - * These cpesial URLs have a special processing in implies(), + * These special URLs have a special processing in implies(), * so they need to be covered and performance need to be checked */ public void testImplies_0D() throws Exception { Index: src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/CertificateTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/CertificateTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/CertificateTest.java (working copy) @@ -72,7 +72,7 @@ } /** - * equals(Object obj) method testing. Tests the correctnel of equal + * equals(Object obj) method testing. Tests the correctness of equal * operation: it should be reflexive, symmetric, transitive, consistent * and should be false on null object. */ Index: src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for CertificateException seialization + * Test for CertificateException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateExpiredExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateExpiredExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateExpiredExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for CertificateExpiredException seialization + * Test for CertificateExpiredException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateNotYetValidExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateNotYetValidExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateNotYetValidExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for CertificateNotYetValidException seialization + * Test for CertificateNotYetValidException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateParsingExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateParsingExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateParsingExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for CertificateParsingException seialization + * Test for CertificateParsingException serialization * */ Index: src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateEncodingExceptionTest.java =================================================================== --- src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateEncodingExceptionTest.java (revision 490317) +++ src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateEncodingExceptionTest.java (working copy) @@ -28,7 +28,7 @@ /** - * Test for CertificateEncodingException seialization + * Test for CertificateEncodingException serialization * */ Index: src/test/api/java.injected/java/security/AllPermissionTest.java =================================================================== --- src/test/api/java.injected/java/security/AllPermissionTest.java (revision 490317) +++ src/test/api/java.injected/java/security/AllPermissionTest.java (working copy) @@ -80,7 +80,7 @@ assertTrue(a1.implies(new UnresolvedPermission("2323", "", "", null))); } - /** newPermissionCollection() returns a new AllPermissionCollection on every invokation. */ + /** newPermissionCollection() returns a new AllPermissionCollection on every invocation. */ public void testCollection() { AllPermission a1 = new AllPermission(); Index: src/test/api/java.injected/java/security/IdentityTest.java =================================================================== --- src/test/api/java.injected/java/security/IdentityTest.java (revision 490317) +++ src/test/api/java.injected/java/security/IdentityTest.java (working copy) @@ -111,7 +111,7 @@ } /* - * Cverify Identity(String) creates instance with given name + * verify Identity(String) creates instance with given name */ public void testIdentityString() { Identity i = new IdentityStub("iii"); @@ -198,7 +198,7 @@ // // Commented out since there will no be fix for the test failure // /** -// * verify removeCertificate(Certificate certificate) removes cetrificate +// * verify removeCertificate(Certificate certificate) removes certificate // */ // public void testRemoveCertificate1() throws Exception{ // Identity i = new IdentityStub("iii"); Index: src/test/api/java.injected/java/security/BasicPermissionTest.java =================================================================== --- src/test/api/java.injected/java/security/BasicPermissionTest.java (revision 490317) +++ src/test/api/java.injected/java/security/BasicPermissionTest.java (working copy) @@ -129,7 +129,7 @@ } /** - * newPermissionCollection() should return new BasicPermissionCollection on every invokation + * newPermissionCollection() should return new BasicPermissionCollection on every invocation */ public void testCollection() { Index: src/test/support/common/java/org/apache/harmony/security/tests/support/cert/MyCertPath.java =================================================================== --- src/test/support/common/java/org/apache/harmony/security/tests/support/cert/MyCertPath.java (revision 490317) +++ src/test/support/common/java/org/apache/harmony/security/tests/support/cert/MyCertPath.java (working copy) @@ -49,7 +49,7 @@ private final byte[] encoding; /** - * Constucts new instance of MyCertPath + * Constructs new instance of MyCertPath * * @param type * @param encoding Index: src/test/support/common/java/org/apache/harmony/security/tests/support/cert/TestUtils.java =================================================================== --- src/test/support/common/java/org/apache/harmony/security/tests/support/cert/TestUtils.java (revision 490317) +++ src/test/support/common/java/org/apache/harmony/security/tests/support/cert/TestUtils.java (working copy) @@ -62,9 +62,9 @@ + ".ks"; // // The file name suffixes to load keystore from - // *.ks1 - keystore containing untrusted cerificates only - // *.ks2 - keystore containing trusted cerificates only - // *.ks3 - keystore containing both trusted and untrusted cerificates + // *.ks1 - keystore containing untrusted certificates only + // *.ks2 - keystore containing trusted certificates only + // *.ks3 - keystore containing both trusted and untrusted certificates // public static final int UNTRUSTED = 1; public static final int TRUSTED = 2; @@ -140,7 +140,7 @@ * The following types supported:
* 1 - KeyStore with untrusted certificates only
* 2 - KeyStore with trusted certificates only
- * 3 - KeyStore with botht trusted and untrusted certificates + * 3 - KeyStore with both trusted and untrusted certificates * * @return Returns test KeyStore instance */ @@ -286,7 +286,7 @@ } }; } - // X.509 encoded sertificate + // X.509 encoded certificate private static final String ENCODED_X509_CERTIFICATE = "-----BEGIN CERTIFICATE-----\n" + "MIIDHTCCAtsCBEFT72swCwYHKoZIzjgEAwUAMHQxCzAJBgNVBAYTAlJVMQwwCgYDVQQIEwNOU08x\n" + "FDASBgNVBAcTC05vdm9zaWJpcnNrMQ4wDAYDVQQKEwVJbnRlbDEVMBMGA1UECxMMRFJMIFNlY3Vy\n" Index: src/test/support/common/java/org/apache/harmony/security/tests/support/MDGoldenData.java =================================================================== --- src/test/support/common/java/org/apache/harmony/security/tests/support/MDGoldenData.java (revision 490317) +++ src/test/support/common/java/org/apache/harmony/security/tests/support/MDGoldenData.java (working copy) @@ -25,13 +25,13 @@ /** * Golden data for Message Digest related tests.
- * Incapsulates the following data:
+ * Encapsulates the following data:
* - reference message
* - reference message digests calculated using * BEA JRockit j2sdk1.4.2_04 (http://www.bea.com) * for various MD algorithms: * SHA-1, SHA-256, SHA-384, SHA-512, MD-5. - * Standart algorithm names are defined in + * Standard algorithm names are defined in * "JavaTM Cryptography Architecture API Specification & Reference" * */ Index: src/test/support/common/java/org/apache/harmony/security/tests/support/TestCertUtils.java =================================================================== --- src/test/support/common/java/org/apache/harmony/security/tests/support/TestCertUtils.java (revision 490317) +++ src/test/support/common/java/org/apache/harmony/security/tests/support/TestCertUtils.java (working copy) @@ -59,7 +59,7 @@ /** * Returns new instance of test certificate each time the method is called. * - * @return test ceritifcate + * @return test certificate */ public static Certificate getCert() { return new TestCertificate(); @@ -67,7 +67,7 @@ /** * Returns an array of 3 test certificates. IMP: The array returned is not - * reall chain of certificates, it's just an array of 3 certs. The method + * real chain of certificates, it's just an array of 3 certs. The method * returns new array each time it's called. The number of 3 was chosen * arbitrarily and is subject to change. * @@ -92,9 +92,9 @@ /** * Generates and returns an instance of TestCertPath.
* TestCertificate-s included in the CertPath will be uniq (will have - * diffrent numbers passed to their ctor-s).
+ * different numbers passed to their ctor-s).
* The second arguments shows which number will have the first Certificate - * in the CertPath. The second sertificate will have (startID+1) nubmber + * in the CertPath. The second certificate will have (startID+1) number * and so on. * * @param howMany - shows how many TestCerts must contain the CertPath generated @@ -322,7 +322,7 @@ } /** - * A special purpose ctor. Pass different String-s to hava different TestCertificates. + * A special purpose ctor. Pass different String-s to have different TestCertificates. * TestCertificate-s with the same String passed to this ctor are considered equal. */ public TestCertificate(String diff) { @@ -609,7 +609,7 @@ * Tries to create an instance of TestX509Certificate, basing * on the presumption that its {@link TestX509Certificate#getEncoded() * encoded} form is stored.
- * @throws CertificateException is the presumtion is not met or if + * @throws CertificateException is the presumption is not met or if * any IO problem occurs. */ public Certificate engineGenerateCertificate(InputStream is) @@ -705,7 +705,7 @@ { "John Doe", null, null, null }, // 'organisation unit'-s { null, "SSG", null, null }, { null, "SSG/DRL", null, null }, - // organisations + // organizations { null, null, "Intel ZAO", null }, { null, null, "Intel Inc", null }, // countries Index: src/test/support/common/java/org/apache/harmony/security/tests/support/IdentityStub.java =================================================================== --- src/test/support/common/java/org/apache/harmony/security/tests/support/IdentityStub.java (revision 490317) +++ src/test/support/common/java/org/apache/harmony/security/tests/support/IdentityStub.java (working copy) @@ -63,7 +63,7 @@ } /** - * Auxilary constructor + * Auxiliary constructor * @param name * @param key * @throws KeyManagementException Index: src/main/java/unix/org/apache/harmony/security/provider/crypto/RandomBitsSupplier.java =================================================================== --- src/main/java/unix/org/apache/harmony/security/provider/crypto/RandomBitsSupplier.java (revision 490317) +++ src/main/java/unix/org/apache/harmony/security/provider/crypto/RandomBitsSupplier.java (working copy) @@ -33,13 +33,13 @@ /** - * The static class providing access on Linux paltform + * The static class providing access on Linux platform * to system means for generating true random bits.
* * The source for true random bits is one of Linux's devices "/dev/urandom/" or - * "/dev/random" depends on which one is avalable; if both the first is used.
+ * "/dev/random" depends on which one is available; if both the first is used.
* - * If no device available the service is not avilable, + * If no device available the service is not available, * that is, provider shouldn't register the algorithm.
*/ Index: src/main/java/common/java/security/SecureClassLoader.java =================================================================== --- src/main/java/common/java/security/SecureClassLoader.java (revision 490317) +++ src/main/java/common/java/security/SecureClassLoader.java (working copy) @@ -83,7 +83,7 @@ // Constructs and caches ProtectionDomain for the given CodeSource // object.
- // It calls {@link getPermssions()} to get a set of permissions. + // It calls {@link getPermissions()} to get a set of permissions. // // @param cs CodeSource object // @return ProtectionDomain for the passed CodeSource object Index: src/main/java/common/java/security/KeyStore.java =================================================================== --- src/main/java/common/java/security/KeyStore.java (revision 490317) +++ src/main/java/common/java/security/KeyStore.java (working copy) @@ -265,7 +265,7 @@ /** * * - * 1.4.2 and 1.5 releases throw unspecified NullPointerExcedption + * 1.4.2 and 1.5 releases throw unspecified NullPointerException * when alias is null */ public final void setCertificateEntry(String alias, Certificate cert) @@ -282,7 +282,7 @@ /** * * - * 1.4.2 and 1.5 releases throw NullPointerExcedption when alias is null + * 1.4.2 and 1.5 releases throw NullPointerException when alias is null */ public final void deleteEntry(String alias) throws KeyStoreException { if (!isInit) { @@ -453,7 +453,7 @@ /** * * - * 1.5 release throws unspecified NullPointerExcedption when alias or + * 1.5 release throws unspecified NullPointerException when alias or * entry is null */ public final void setEntry(String alias, Entry entry, Index: src/main/java/common/java/security/AlgorithmParameters.java =================================================================== --- src/main/java/common/java/security/AlgorithmParameters.java (revision 490317) +++ src/main/java/common/java/security/AlgorithmParameters.java (working copy) @@ -62,7 +62,7 @@ private String algorithm; /** - * The initialisation state + * The initialization state */ private boolean initialized; // = false; Index: src/main/java/common/java/security/KeyPairGenerator.java =================================================================== --- src/main/java/common/java/security/KeyPairGenerator.java (revision 490317) +++ src/main/java/common/java/security/KeyPairGenerator.java (working copy) @@ -44,7 +44,7 @@ // Store SecureRandom private static SecureRandom random = new SecureRandom(); - // Store used ptovider + // Store used provider private Provider provider; // Store used algorithm Index: src/main/java/common/java/security/DigestInputStream.java =================================================================== --- src/main/java/common/java/security/DigestInputStream.java (revision 490317) +++ src/main/java/common/java/security/DigestInputStream.java (working copy) @@ -37,7 +37,7 @@ */ protected MessageDigest digest; - // Indicates wether digest functionality is on or off + // Indicates whether digest functionality is on or off private boolean isOn = true; /** @@ -78,7 +78,7 @@ /** * Reads the next byte and answers it as an int. Updates the digest for the - * byte if this fuction is enabled. + * byte if this function is enabled. * * * @return int the byte which was read or -1 at end of stream. Index: src/main/java/common/java/security/DigestOutputStream.java =================================================================== --- src/main/java/common/java/security/DigestOutputStream.java (revision 490317) +++ src/main/java/common/java/security/DigestOutputStream.java (working copy) @@ -37,7 +37,7 @@ */ protected MessageDigest digest; - // Indicates wether digest functionality is on or off + // Indicates whether digest functionality is on or off private boolean isOn = true; /** Index: src/main/java/common/java/security/InvalidAlgorithmParameterException.java =================================================================== --- src/main/java/common/java/security/InvalidAlgorithmParameterException.java (revision 490317) +++ src/main/java/common/java/security/InvalidAlgorithmParameterException.java (working copy) @@ -23,7 +23,7 @@ package java.security; /** - * This class represents invalid algorithm parameters to cryprographic services. + * This class represents invalid algorithm parameters to cryptographic services. * */ public class InvalidAlgorithmParameterException extends Index: src/main/java/common/java/security/UnresolvedPermission.java =================================================================== --- src/main/java/common/java/security/UnresolvedPermission.java (revision 490317) +++ src/main/java/common/java/security/UnresolvedPermission.java (working copy) @@ -269,7 +269,7 @@ * signers. If it does, a zero, one, and/or two-argument constructor is * tried to instantiate a new permission, which is then returned.
* If an appropriate constructor is not available or the class is - * improperrly signed, null is returned. + * improperly signed, null is returned. * * @param targetType - a target class instance, must not be * null Index: src/main/java/common/java/security/Security.java =================================================================== --- src/main/java/common/java/security/Security.java (revision 490317) +++ src/main/java/common/java/security/Security.java (working copy) @@ -50,9 +50,9 @@ // Security properties private static Properties secprops = new Properties(); - // static inicialization + // static initialization // - load security properties files - // - load staticaly registered providers + // - load statically registered providers // - if no provider description file found then load default providers static { AccessController.doPrivileged(new java.security.PrivilegedAction() { @@ -74,7 +74,7 @@ } } - if ("true".equalsIgnoreCase(secprops.getProperty("security.allowCustomePropertiesFile", "true"))) { //$NON-NLS-1$ //$NON-NLS-2$ //$NON-NLS-3$ + if ("true".equalsIgnoreCase(secprops.getProperty("security.allowCustomPropertiesFile", "true"))) { //$NON-NLS-1$ //$NON-NLS-2$ //$NON-NLS-3$ String securityFile = System.getProperty("java.security.properties"); //$NON-NLS-1$ if (securityFile != null) { if (securityFile.startsWith("=")) { // overwrite //$NON-NLS-1$ @@ -164,7 +164,7 @@ int position) { // check security access; check that provider is not already // installed, else return -1; if (position <1) or (position > max - // position) position = max position + 1; insert provider, shifte up + // position) position = max position + 1; insert provider, shift up // one position for next providers; Note: The position is 1-based SecurityManager sm = System.getSecurityManager(); if (sm != null) { @@ -198,7 +198,7 @@ public static synchronized void removeProvider(String name) { // It is not clear from spec.: // 1. if name is null, should we checkSecurityAccess or not? - // throw SecurityExeption or not? + // throw SecurityException or not? // 2. as 1 but provider is not installed // 3. behavior if name is empty string? Index: src/main/java/common/java/security/Permissions.java =================================================================== --- src/main/java/common/java/security/Permissions.java (revision 490317) +++ src/main/java/common/java/security/Permissions.java (working copy) @@ -182,7 +182,7 @@ */ public boolean implies(Permission permission) { if (permission == null) { - // RI compartible + // RI compatible throw new NullPointerException(Messages.getString("security.21")); //$NON-NLS-1$ } if (allEnabled) { Index: src/main/java/common/java/security/CodeSource.java =================================================================== --- src/main/java/common/java/security/CodeSource.java (revision 490317) +++ src/main/java/common/java/security/CodeSource.java (working copy) @@ -57,7 +57,7 @@ // Array of CodeSigners private transient CodeSigner[] signers; - // SocketPermission() in implies() method takes tooooooooo many time. + // SocketPermission() in implies() method takes to many time. // Need to cache it for better performance. private transient SocketPermission sp; @@ -198,12 +198,12 @@ // // So the following loop scans trough the certs and checks // that every next certificate is an Issuer of the previous one. - // Any certificate that is not an Issuer of the previos one starts a + // Any certificate that is not an Issuer of the previous one starts a // new chain (== a new CertPath) for (int i = 0; i < certs.length; i++) { if (!(certs[i] instanceof X509Certificate)) { - // Only X509CErtificate-s are taken into account - see API spec. + // Only X509Certificate-s are taken into account - see API spec. continue; } X509Certificate x509 = (X509Certificate) certs[i]; @@ -368,7 +368,7 @@ .length() == 0 || "localhost".equals(thatHost))) //$NON-NLS-1$ && !thisHost.equals(thatHost)) { - // Obvious, but veeery slooooow waaaaaaay.... + // Obvious, but very slow way.... // // SocketPermission thisPerm = new SocketPermission( // this.location.getHost(), "resolve"); Index: src/main/java/common/java/security/KeyRep.java =================================================================== --- src/main/java/common/java/security/KeyRep.java (revision 490317) +++ src/main/java/common/java/security/KeyRep.java (working copy) @@ -128,7 +128,7 @@ throw new NotSerializableException(Messages.getString("security.0E", type)); //$NON-NLS-1$ } - // Makes deffensive copy of key encoding + // Makes defensive copy of key encoding private void readObject(ObjectInputStream is) throws IOException, ClassNotFoundException { is.defaultReadObject(); Index: src/main/java/common/java/security/cert/PKIXParameters.java =================================================================== --- src/main/java/common/java/security/cert/PKIXParameters.java (revision 490317) +++ src/main/java/common/java/security/cert/PKIXParameters.java (working copy) @@ -47,7 +47,7 @@ private Set initialPolicies; // List of cert stores that used to find certificates and CRLs private List certStores; - // Time for which the valididty of the certification + // Time for which the validity of the certification // patch should be determined private Date date; // List of certification patch checkers (PKIXCertPathChecker) @@ -56,15 +56,15 @@ private String sigProvider; // Required constraints on the target certificate private CertSelector targetCertConstraints; - // Indicates wether cert revocation is enabled or not + // Indicates whether cert revocation is enabled or not private boolean revocationEnabled = true; - // Indicates wether explicit policy required or not + // Indicates whether explicit policy required or not private boolean explicitPolicyRequired = false; - // Indicates wether policy mapping inhibited or not + // Indicates whether policy mapping inhibited or not private boolean policyMappingInhibited = false; - // Indicates wether any policy inhibited or not + // Indicates whether any policy inhibited or not private boolean anyPolicyInhibited = false; - // Indicates wether certificates that include policy + // Indicates whether certificates that include policy // qualifiers in a certificate policies extension that // is marked critical must be rejected or not private boolean policyQualifiersRejected = true; Index: src/main/java/common/java/security/cert/CertificateFactory.java =================================================================== --- src/main/java/common/java/security/cert/CertificateFactory.java (revision 490317) +++ src/main/java/common/java/security/cert/CertificateFactory.java (working copy) @@ -120,7 +120,7 @@ * Answers a new CertificateFactory of the given type. * * @param type - * java.lang.String Type of certificatem desired + * java.lang.String Type of certificate desired * @param provider * java.security.Provider Provider which has to implement the * algorithm Index: src/main/java/common/java/security/cert/X509CertSelector.java =================================================================== --- src/main/java/common/java/security/cert/X509CertSelector.java (revision 490317) +++ src/main/java/common/java/security/cert/X509CertSelector.java (working copy) @@ -56,7 +56,7 @@ */ public class X509CertSelector implements CertSelector { - // match criterias + // match criteria private X509Certificate certificateEquals; private BigInteger serialNumber; private X500Principal issuer; Index: src/main/java/common/java/security/ProtectionDomain.java =================================================================== --- src/main/java/common/java/security/ProtectionDomain.java (revision 490317) +++ src/main/java/common/java/security/ProtectionDomain.java (working copy) @@ -48,7 +48,7 @@ private boolean dynamicPerms; /** - * Contructs a protection domain from the given code source and the + * Constructs a protection domain from the given code source and the * permissions that that should be granted to the classes which are * encapsulated in it. * @param cs @@ -66,7 +66,7 @@ } /** - * Contructs a protection domain from the given code source and the + * Constructs a protection domain from the given code source and the * permissions that that should be granted to the classes which are * encapsulated in it. * @@ -162,7 +162,7 @@ } // ... and we get here if - // either the permissiona are static + // either the permissions are static // or Policy.implies() did not check for static permissions // or the permission is not implied return permissions == null ? false : permissions.implies(permission); Index: src/main/java/common/java/security/Signature.java =================================================================== --- src/main/java/common/java/security/Signature.java (revision 490317) +++ src/main/java/common/java/security/Signature.java (working copy) @@ -437,7 +437,7 @@ private SignatureSpi spiImpl; - // Consructor + // Constructor public SignatureImpl(SignatureSpi signatureSpi, Provider provider, String algorithm) { super(algorithm); Index: src/main/java/common/java/security/spec/ECFieldF2m.java =================================================================== --- src/main/java/common/java/security/spec/ECFieldF2m.java (revision 490317) +++ src/main/java/common/java/security/spec/ECFieldF2m.java (working copy) @@ -160,7 +160,7 @@ return true; } } else { - // at least this field with polinomial basis + // at least this field with polynomial basis // check that rp match // return this.rp.equals(o.rp); return Arrays.equals(this.ks, o.ks); Index: src/main/java/common/java/security/spec/RSAMultiPrimePrivateCrtKeySpec.java =================================================================== --- src/main/java/common/java/security/spec/RSAMultiPrimePrivateCrtKeySpec.java (revision 490317) +++ src/main/java/common/java/security/spec/RSAMultiPrimePrivateCrtKeySpec.java (working copy) @@ -93,7 +93,7 @@ throw new IllegalArgumentException( Messages.getString("security.85")); //$NON-NLS-1$ } - // Clone array to prevent subsecuent modification + // Clone array to prevent subsequent modification this.otherPrimeInfo = new RSAOtherPrimeInfo[otherPrimeInfo.length]; System.arraycopy(otherPrimeInfo, 0, this.otherPrimeInfo, 0, this.otherPrimeInfo.length); @@ -119,7 +119,7 @@ * @com.intel.drl.spec_ref */ public RSAOtherPrimeInfo[] getOtherPrimeInfo() { - // Clone array (if not null) to prevent subsecuent modification + // Clone array (if not null) to prevent subsequent modification if (otherPrimeInfo == null) { return null; } else { Index: src/main/java/common/org/apache/harmony/security/provider/crypto/DSAPublicKeyImpl.java =================================================================== --- src/main/java/common/org/apache/harmony/security/provider/crypto/DSAPublicKeyImpl.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/provider/crypto/DSAPublicKeyImpl.java (working copy) @@ -19,7 +19,7 @@ * TODO * 1. The class extends the PublicKeyImpl class in "org.apache.harmony.security" package. * - * 2. The class uses methods in the auxilliary non-public "ThreeIntegerSequence" class + * 2. The class uses methods in the auxiliary non-public "ThreeIntegerSequence" class * defined along with the "DSAPrivateKeyImpl" class. * * 3. See a compatibility with RI comments Index: src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1_MessageDigestImpl.java =================================================================== --- src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1_MessageDigestImpl.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1_MessageDigestImpl.java (working copy) @@ -282,7 +282,7 @@ /** * Updates current message.
* - * The method overrides "engineUpdate(byte[],intint)" in class MessageDigestSpi.
+ * The method overrides "engineUpdate(byte[],int,int)" in class MessageDigestSpi.
* * The method silently returns if "len" <= 0. * Index: src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1withDSA_SignatureImpl.java =================================================================== --- src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1withDSA_SignatureImpl.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1withDSA_SignatureImpl.java (working copy) @@ -306,7 +306,7 @@ * Updates data to sign or to verify. * * @params - * b byte array containg bytes to update + * b byte array containing bytes to update * @params * off offset in byte array to start from * @params @@ -421,7 +421,7 @@ * @params * offset index in sigBytes to start from * @params - * length number of bytes alotted for signature + * length number of bytes allotted for signature * @return * true if signature bytes were verified, false otherwise * @throws Index: src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1PRNG_SecureRandomImpl.java =================================================================== --- src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1PRNG_SecureRandomImpl.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1PRNG_SecureRandomImpl.java (working copy) @@ -34,8 +34,8 @@ * This class extends the SecureRandomSpi class implementing all its abstract methods.
*
* To generate pseudo-random bits, the implementation uses technique described in - * the "Random Number Generator (RNG) algoritms" section, Appendix A, - * JavaTM Cryptography Architecure, API Specification&Reference
+ * the "Random Number Generator (RNG) algorithm" section, Appendix A, + * JavaTM Cryptography Architecture, API Specification&Reference
*
* The class implements the Serializable interface. */ @@ -73,7 +73,7 @@ // value of 16 defined in the "SECURE HASH STANDARD", FIPS PUB 180-2 private static final int FRAME_LENGTH = 16; - // miscellanous constans defined in this implementation: + // miscellaneous constants defined in this implementation: // COUNTER_BASE - initial value to set to "counter" before computing "nextBytes(..)"; // note, that the exact value is not defined in STANDARD // HASHCOPY_OFFSET - offset for copy of current hash in "copies" array @@ -138,7 +138,7 @@ // The "seed" array is used to compute both "current seed hash" and "next bytes". // - // As the "SHA1" algorithm computes a hash of entire seed by spletting it into + // As the "SHA1" algorithm computes a hash of entire seed by splitting it into // a number of the 512-bit length frames (512 bits = 64 bytes = 16 words), // "current seed hash" is a hash (5 words, 20 bytes) for all previous full frames; // remaining bytes are stored in the 0-15 word frame of the "seed" array. @@ -194,7 +194,7 @@ /** * Changes current seed by supplementing a seed argument to the current seed, * if this already set; - * the argument is used as first seed othewise.
+ * the argument is used as first seed otherwise.
* * The method overrides "engineSetSeed(byte[])" in class SecureRandomSpi. * @@ -257,7 +257,7 @@ } /** - * Writes random bytes into an array suppied. + * Writes random bytes into an array supplied. * Bits in a byte are from left to right.
* * To generate random bytes, the "expansion of source bits" method is used, Index: src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1Impl.java =================================================================== --- src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1Impl.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1Impl.java (working copy) @@ -82,7 +82,7 @@ int temp; // In this implementation the "d. For t = 0 to 79 do" loop - // is splet into four loops. The following constans: + // is split into four loops. The following constants: // K = 5A827999 0 <= t <= 19 // K = 6ED9EBA1 20 <= t <= 39 // K = 8F1BBCDC 40 <= t <= 59 Index: src/main/java/common/org/apache/harmony/security/provider/crypto/ThreeIntegerSequence.java =================================================================== --- src/main/java/common/org/apache/harmony/security/provider/crypto/ThreeIntegerSequence.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/provider/crypto/ThreeIntegerSequence.java (working copy) @@ -25,8 +25,8 @@ /** - * The auxilliary class providing means to process ASN1Sequence of three Integers. - * Such sequenies are parts of ASN1 encoded formats for DSA private and public keys. + * The auxiliary class providing means to process ASN1Sequence of three Integers. + * Such sequences are parts of ASN1 encoded formats for DSA private and public keys. */ class ThreeIntegerSequence { Index: src/main/java/common/org/apache/harmony/security/provider/cert/Cache.java =================================================================== --- src/main/java/common/org/apache/harmony/security/provider/cert/Cache.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/provider/cert/Cache.java (working copy) @@ -66,7 +66,7 @@ * if not - new object should be generated and saved in the cache.
* * Note: The length of the prefixes of the encoded forms should not be - * less than correspondance (default value is 28). + * less than correspondence (default value is 28). */ public class Cache { @@ -125,7 +125,7 @@ /** * Creates the Cache object. - * @param pref_size specifyes how many leading/trailing bytes of object's + * @param pref_size specifies how many leading/trailing bytes of object's * encoded form will be used for hash computation * @param size capacity of the cache to be created. */ @@ -140,7 +140,7 @@ /** * Creates the Cache object of size of 900. - * @param pref_size specifyes how many leading/trailing bytes of object's + * @param pref_size specifies how many leading/trailing bytes of object's * encoded form will be used for hash computation */ public Cache(int pref_size) { Index: src/main/java/common/org/apache/harmony/security/provider/cert/X509CertImpl.java =================================================================== --- src/main/java/common/org/apache/harmony/security/provider/cert/X509CertImpl.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/provider/cert/X509CertImpl.java (working copy) @@ -497,7 +497,7 @@ SignatureException { Signature signature = Signature.getInstance(getSigAlgName()); signature.initVerify(key); - // retrieve the ecnoding of the TBSCertificate structure + // retrieve the encoding of the TBSCertificate structure if (tbsCertificate == null) { tbsCertificate = tbsCert.getEncoded(); } @@ -520,7 +520,7 @@ Signature signature = Signature.getInstance(getSigAlgName(), sigProvider); signature.initVerify(key); - // retrieve the ecnoding of the TBSCertificate structure + // retrieve the encoding of the TBSCertificate structure if (tbsCertificate == null) { tbsCertificate = tbsCert.getEncoded(); } Index: src/main/java/common/org/apache/harmony/security/x501/AttributeValue.java =================================================================== --- src/main/java/common/org/apache/harmony/security/x501/AttributeValue.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/x501/AttributeValue.java (working copy) @@ -170,7 +170,7 @@ // Escapes: // 1) chars ",", "+", """, "\", "<", ">", ";" (RFC 2253) // 2) chars "#", "=" (required by RFC 1779) - // 3) a space char at the beggining or end + // 3) a space char at the beginning or end // 4) according to the requirement to be RFC 1779 compatible: // '#' char is escaped in any position // Index: src/main/java/common/org/apache/harmony/security/x501/AttributeTypeAndValue.java =================================================================== --- src/main/java/common/org/apache/harmony/security/x501/AttributeTypeAndValue.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/x501/AttributeTypeAndValue.java (working copy) @@ -48,7 +48,7 @@ // Country code attribute (name from RFC 1779) private static final ObjectIdentifier C; - // Common name attributem (name from RFC 1779) + // Common name attribute (name from RFC 1779) private static final ObjectIdentifier CN; // Domain component attribute (name from RFC 2253) @@ -97,7 +97,7 @@ // (name from API spec) private static final ObjectIdentifier SURNAME; - // Title attribute (object in an organzation)(name from API spec) + // Title attribute (object in an organization)(name from API spec) private static final ObjectIdentifier T; // User identifier attribute (name from RFC 2253) Index: src/main/java/common/org/apache/harmony/security/x501/DirectoryString.java =================================================================== --- src/main/java/common/org/apache/harmony/security/x501/DirectoryString.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/x501/DirectoryString.java (working copy) @@ -29,7 +29,7 @@ /** - * The class incapsulates the ASN.1 DER encoding/decoding work + * The class encapsulates the ASN.1 DER encoding/decoding work * with the DirectoryString structure * (as specified in RFC 3280 - * Internet X.509 Public Key Infrastructure. Index: src/main/java/common/org/apache/harmony/security/SystemScope.java =================================================================== --- src/main/java/common/org/apache/harmony/security/SystemScope.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/SystemScope.java (working copy) @@ -128,7 +128,7 @@ public synchronized void removeIdentity(Identity identity) throws KeyManagementException { - //Exception catched = null; + //Exception caught = null; if (identity == null) { throw new NullPointerException(Messages.getString("security.92")); //$NON-NLS-1$ } Index: src/main/java/common/org/apache/harmony/security/utils/ObjectIdentifier.java =================================================================== --- src/main/java/common/org/apache/harmony/security/utils/ObjectIdentifier.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/utils/ObjectIdentifier.java (working copy) @@ -60,7 +60,7 @@ private Object group; /** - * Creats ObjectIdentifier(OID) from array of integers. + * Creates ObjectIdentifier(OID) from array of integers. * * @param oid - array of integers * @return - OID object @@ -75,7 +75,7 @@ } /** - * Creats ObjectIdentifier(OID) from array of integers. + * Creates ObjectIdentifier(OID) from array of integers. * * @param oid - array of integers * @param name - name of OID Index: src/main/java/common/org/apache/harmony/security/asn1/ASN1Constants.java =================================================================== --- src/main/java/common/org/apache/harmony/security/asn1/ASN1Constants.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/asn1/ASN1Constants.java (working copy) @@ -37,7 +37,7 @@ int CLASS_PRIVATE = 192; /** - * Tag Primitive/Conctructed (P/C) flag + * Tag Primitive/Constructed (P/C) flag */ int PC_PRIMITIVE = 0; int PC_CONSTRUCTED = 32; Index: src/main/java/common/org/apache/harmony/security/asn1/ObjectIdentifier.java =================================================================== --- src/main/java/common/org/apache/harmony/security/asn1/ObjectIdentifier.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/asn1/ObjectIdentifier.java (working copy) @@ -50,7 +50,7 @@ private String soid; /** - * Creats ObjectIdentifier(OID) from array of integers. + * Creates ObjectIdentifier(OID) from array of integers. * * @param oid - array of integers * @throws IllegalArgumentException - if oid is invalid or null @@ -61,7 +61,7 @@ } /** - * Creats ObjectIdentifier(OID) from string representation. + * Creates ObjectIdentifier(OID) from string representation. * * @param strOid - oid string * @throws IllegalArgumentException - if oid string is invalid or null Index: src/main/java/common/org/apache/harmony/security/asn1/ASN1GeneralizedTime.java =================================================================== --- src/main/java/common/org/apache/harmony/security/asn1/ASN1GeneralizedTime.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/asn1/ASN1GeneralizedTime.java (working copy) @@ -94,7 +94,7 @@ // // According to X.680: // four digit year, seconds always presented - // and fractional-secons elements without + // and fractional-seconds elements without // trailing 0's (must be cut later from content) private final static String GEN_PATTERN = "yyyyMMddHHmmss.SSS"; //$NON-NLS-1$ Index: src/main/java/common/org/apache/harmony/security/asn1/BerInputStream.java =================================================================== --- src/main/java/common/org/apache/harmony/security/asn1/BerInputStream.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/asn1/BerInputStream.java (working copy) @@ -83,7 +83,7 @@ * @param offset - * the encoding offset * @param expectedLength - - * expeced length of full encoding, this includes identifier, + * expected length of full encoding, this includes identifier, * length an content octets * @throws IOException - * if an error occurs @@ -131,7 +131,7 @@ if (length != INDEFINIT_LENGTH) { // input stream has definite length encoding - // check allocated length to avoid futher reallocations + // check allocated length to avoid father reallocations if (buffer.length < length) { byte[] newBuffer = new byte[length]; System.arraycopy(buffer, 0, newBuffer, 0, offset); @@ -443,7 +443,7 @@ // FIXME: any other optimizations? readContent(); - // FIXME store string somewhare to allow a custom time type perform + // FIXME store string somewhere to allow a custom time type perform // additional checks // check syntax: the last char MUST be Z @@ -869,7 +869,7 @@ } /** - * Indicates defined or indefined reading mode for assosiated InputStream. + * Indicates defined or indefined reading mode for associated InputStream. * * This mode is defined by reading a length * for a first ASN.1 type from InputStream. Index: src/main/java/common/org/apache/harmony/security/asn1/DerInputStream.java =================================================================== --- src/main/java/common/org/apache/harmony/security/asn1/DerInputStream.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/asn1/DerInputStream.java (working copy) @@ -132,7 +132,7 @@ public void readSetOf(ASN1SetOf setOf) throws IOException { // // According to ASN.1 DER spec. set of MUST appear in - // ascending order (short component are padded for comparision) + // ascending order (short component are padded for comparison) // // Verification of this assertion is not implemented // Index: src/main/java/common/org/apache/harmony/security/asn1/ASN1Constructured.java =================================================================== --- src/main/java/common/org/apache/harmony/security/asn1/ASN1Constructured.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/asn1/ASN1Constructured.java (working copy) @@ -24,7 +24,7 @@ /** - * This abstract class is the super class for all constructured ASN.1 types + * This abstract class is the super class for all constructed ASN.1 types * * @see http://asn1.elibel.tm.fr/en/standards/index.htm */ Index: src/main/java/common/org/apache/harmony/security/asn1/ASN1UTCTime.java =================================================================== --- src/main/java/common/org/apache/harmony/security/asn1/ASN1UTCTime.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/asn1/ASN1UTCTime.java (working copy) @@ -112,7 +112,7 @@ // // According to X.680 coordinated universal time format: // two digit year, seconds always presented, - // no fractional-secons elements, 'Z' at the end + // no fractional-seconds elements, 'Z' at the end private final static String UTC_PATTERN = "yyMMddHHmmss'Z'"; //$NON-NLS-1$ public void setEncodingContent(BerOutputStream out) { Index: src/main/java/common/org/apache/harmony/security/x509/Extensions.java =================================================================== --- src/main/java/common/org/apache/harmony/security/x509/Extensions.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/x509/Extensions.java (working copy) @@ -39,7 +39,7 @@ import org.apache.harmony.security.asn1.BerInputStream; /** - * The class incapsulates the ASN.1 DER encoding/decoding work + * The class encapsulates the ASN.1 DER encoding/decoding work * with the Extensions part of X.509 certificate * (as specified in RFC 3280 - * Internet X.509 Public Key Infrastructure. @@ -175,7 +175,7 @@ /** * Returns the value of Key Usage extension (OID == 2.5.29.15). - * The ASN.1 definitionn of Key Usage Extension is: + * The ASN.1 definition of Key Usage Extension is: * *
 
      * id-ce-keyUsage OBJECT IDENTIFIER ::=  { id-ce 15 }
@@ -196,7 +196,7 @@
      *
      * @return the value of Key Usage Extension if it is in the list,
      * and null if there is no such extension or its value can not be decoded
-     * otherwithe. Note, that the length of returned array can be greater
+     * otherwise. Note, that the length of returned array can be greater
      * than 9.
      */
     public boolean[] valueOfKeyUsage() {
@@ -210,7 +210,7 @@
    
     /**
      * Returns the value of Extended Key Usage extension (OID == 2.5.29.37).
-     * The ASN.1 definitionn of Extended Key Usage Extension is:
+     * The ASN.1 definition of Extended Key Usage Extension is:
      *
      * 
 
      *  id-ce-extKeyUsage OBJECT IDENTIFIER ::= { id-ce 37 }
@@ -236,7 +236,7 @@
     
     /**
      * Returns the value of Basic Constraints Extension (OID = 2.5.29.19).
-     * The ASN.1 definitionn of Basic Constraints Extension is:
+     * The ASN.1 definition of Basic Constraints Extension is:
      *
      * 
 
      *   id-ce-basicConstraints OBJECT IDENTIFIER ::=  { id-ce 19 }
@@ -263,7 +263,7 @@
     
     /**
      * Returns the value of Subject Alternative Name (OID = 2.5.29.17).
-     * The ASN.1 definitionn for Subject Alternative Name is:
+     * The ASN.1 definition for Subject Alternative Name is:
      *
      * 
 
      *  id-ce-subjectAltName OBJECT IDENTIFIER ::=  { id-ce 17 }
@@ -287,7 +287,7 @@
     
     /**
      * Returns the value of Issuer Alternative Name Extension (OID = 2.5.29.18).
-     * The ASN.1 definitionn for Issuer Alternative Name is:
+     * The ASN.1 definition for Issuer Alternative Name is:
      *
      * 
 
      *   id-ce-issuerAltName OBJECT IDENTIFIER ::=  { id-ce 18 }
Index: src/main/java/common/org/apache/harmony/security/x509/TBSCertList.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/TBSCertList.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/TBSCertList.java	(working copy)
@@ -41,7 +41,7 @@
 
 
 /**
- * The class incapsulates the ASN.1 DER encoding/decoding work 
+ * The class encapsulates the ASN.1 DER encoding/decoding work 
  * with TBSCertList structure which is the part of X.509 CRL
  * (as specified in RFC 3280 -
  *  Internet X.509 Public Key Infrastructure.
@@ -159,7 +159,7 @@
          * into the StringBuffer object.
          */
         public void dumpValue(StringBuffer buffer, String prefix) {
-            buffer.append(prefix).append("Certificae Serial Number: ") //$NON-NLS-1$
+            buffer.append(prefix).append("Certificate Serial Number: ") //$NON-NLS-1$
                 .append(userCertificate).append('\n');
             buffer.append(prefix).append("Revocation Date: ") //$NON-NLS-1$
                 .append(revocationDate);
Index: src/main/java/common/org/apache/harmony/security/x509/AccessDescription.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/AccessDescription.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/AccessDescription.java	(working copy)
@@ -24,7 +24,7 @@
 import org.apache.harmony.security.asn1.ObjectIdentifier;
 
 /**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
  * with the AccessDescription which is a part of X.509 framework
  * (as specified in RFC 3280 -
  *  Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/PolicyInformation.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/PolicyInformation.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/PolicyInformation.java	(working copy)
@@ -30,7 +30,7 @@
 import org.apache.harmony.security.asn1.ObjectIdentifier;
 
 /**
- * The class incapsulates the ASN.1 DER encoding/decoding work 
+ * The class encapsulates the ASN.1 DER encoding/decoding work 
  * with PolicyInformation structure which is a subpart of certificatePolicies
  * (as specified in RFC 3280 -
  *  Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/GeneralSubtree.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/GeneralSubtree.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/GeneralSubtree.java	(working copy)
@@ -29,7 +29,7 @@
 import org.apache.harmony.security.asn1.BerInputStream;
 
 /**
- * The class incapsulates the ASN.1 DER encoding/decoding work 
+ * The class encapsulates the ASN.1 DER encoding/decoding work 
  * with the GeneralSubtree structure which is a part of X.509 certificate:
  * (as specified in RFC 3280 -
  *  Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/CertificatePolicies.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/CertificatePolicies.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/CertificatePolicies.java	(working copy)
@@ -33,7 +33,7 @@
 import org.apache.harmony.security.asn1.BerInputStream;
 
 /**
- * The class incapsulates the ASN.1 DER encoding/decoding work 
+ * The class encapsulates the ASN.1 DER encoding/decoding work 
  * with Certificate Policies structure which is a part of X.509 certificate
  * (as specified in RFC 3280 -
  *  Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/PrivateKeyUsagePeriod.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/PrivateKeyUsagePeriod.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/PrivateKeyUsagePeriod.java	(working copy)
@@ -31,7 +31,7 @@
 import org.apache.harmony.security.asn1.BerInputStream;
 
 /**
- * The class incapsulates the ASN.1 DER encoding/decoding work 
+ * The class encapsulates the ASN.1 DER encoding/decoding work 
  * with the following certificate extension (OID: 2.5.29.16)
  * (as specified in RFC 3280 -
  *  Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/SubjectKeyIdentifier.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/SubjectKeyIdentifier.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/SubjectKeyIdentifier.java	(working copy)
@@ -25,7 +25,7 @@
 /**
  * Subject Key Identifier Extension (OID = 2.5.29.14).
  *
- * The ASN.1 definitionn for extension is:
+ * The ASN.1 definition for extension is:
  *
  * 
  *  id-ce-subjectKeyIdentifier OBJECT IDENTIFIER ::=  { id-ce 14 }
Index: src/main/java/common/org/apache/harmony/security/x509/Extension.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/Extension.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/Extension.java	(working copy)
@@ -35,7 +35,7 @@
 import org.apache.harmony.security.utils.Array;
 
 /**
- * The class incapsulates the ASN.1 DER encoding/decoding work 
+ * The class encapsulates the ASN.1 DER encoding/decoding work 
  * with the Extension part of X.509 certificate
  * (as specified in RFC 3280 -
  *  Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/CRLDistributionPoints.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/CRLDistributionPoints.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/CRLDistributionPoints.java	(working copy)
@@ -33,7 +33,7 @@
 import org.apache.harmony.security.internal.nls.Messages;
 
 /**
- * The class incapsulates the ASN.1 DER encoding/decoding work 
+ * The class encapsulates the ASN.1 DER encoding/decoding work 
  * with the CRL Distribution Points which is the part of X.509 Certificate
  * (as specified in RFC 3280 -
  *  Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/CertificateIssuer.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/CertificateIssuer.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/CertificateIssuer.java	(working copy)
@@ -34,7 +34,7 @@
  *   certificateIssuer ::=     GeneralNames
  * 
* (as specified in RFC 3280) - * In java implementation it is presumed that GeneralNames cansist of + * In java implementation it is presumed that GeneralNames consist of * one element and its type is directoryName. */ public class CertificateIssuer extends ExtensionValue { Index: src/main/java/common/org/apache/harmony/security/x509/CertificateList.java =================================================================== --- src/main/java/common/org/apache/harmony/security/x509/CertificateList.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/x509/CertificateList.java (working copy) @@ -30,7 +30,7 @@ import org.apache.harmony.security.utils.Array; /** - * The class incapsulates the ASN.1 DER encoding/decoding work + * The class encapsulates the ASN.1 DER encoding/decoding work * with the X.509 CRL. Its ASN notation is as follows * (as specified in RFC 3280 - * Internet X.509 Public Key Infrastructure. Index: src/main/java/common/org/apache/harmony/security/x509/EDIPartyName.java =================================================================== --- src/main/java/common/org/apache/harmony/security/x509/EDIPartyName.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/x509/EDIPartyName.java (working copy) @@ -29,7 +29,7 @@ import org.apache.harmony.security.x501.DirectoryString; /** - * The class incapsulates the ASN.1 DER encoding/decoding work + * The class encapsulates the ASN.1 DER encoding/decoding work * with the following structure which is a subpart of GeneralName * (as specified in RFC 3280 - * Internet X.509 Public Key Infrastructure. Index: src/main/java/common/org/apache/harmony/security/x509/Certificate.java =================================================================== --- src/main/java/common/org/apache/harmony/security/x509/Certificate.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/x509/Certificate.java (working copy) @@ -30,7 +30,7 @@ import org.apache.harmony.security.utils.Array; /** - * The class incapsulates the ASN.1 DER encoding/decoding work + * The class encapsulates the ASN.1 DER encoding/decoding work * with the X.509 certificate. Its ASN notation is as follows * (as specified in RFC 3280 - * Internet X.509 Public Key Infrastructure. Index: src/main/java/common/org/apache/harmony/security/x509/InfoAccessSyntax.java =================================================================== --- src/main/java/common/org/apache/harmony/security/x509/InfoAccessSyntax.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/x509/InfoAccessSyntax.java (working copy) @@ -29,7 +29,7 @@ import org.apache.harmony.security.internal.nls.Messages; /** - * The class incapsulates the ASN.1 DER encoding/decoding work + * The class encapsulates the ASN.1 DER encoding/decoding work * with the SubjectInfoAccessSyntax and AuthorityInfoAccessSyntax * which are a part of X.509 framework * (as specified in RFC 3280 - Index: src/main/java/common/org/apache/harmony/security/x509/Validity.java =================================================================== --- src/main/java/common/org/apache/harmony/security/x509/Validity.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/x509/Validity.java (working copy) @@ -29,7 +29,7 @@ import org.apache.harmony.security.asn1.BerInputStream; /** - * The class incapsulates the ASN.1 DER encoding/decoding work + * The class encapsulates the ASN.1 DER encoding/decoding work * with Validity structure which is the part of X.509 certificate * (as specified in RFC 3280 - * Internet X.509 Public Key Infrastructure. Index: src/main/java/common/org/apache/harmony/security/x509/PolicyConstraints.java =================================================================== --- src/main/java/common/org/apache/harmony/security/x509/PolicyConstraints.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/x509/PolicyConstraints.java (working copy) @@ -32,7 +32,7 @@ import org.apache.harmony.security.asn1.BerInputStream; /** - * The class incapsulates the ASN.1 DER encoding/decoding work + * The class encapsulates the ASN.1 DER encoding/decoding work * with PolicyConstraints structure which is a part of X.509 certificate * (as specified in RFC 3280 - * Internet X.509 Public Key Infrastructure. Index: src/main/java/common/org/apache/harmony/security/x509/AlgorithmIdentifier.java =================================================================== --- src/main/java/common/org/apache/harmony/security/x509/AlgorithmIdentifier.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/x509/AlgorithmIdentifier.java (working copy) @@ -34,7 +34,7 @@ /** - * The class incapsulates the ASN.1 DER encoding/decoding work + * The class encapsulates the ASN.1 DER encoding/decoding work * with the Algorithm Identifier which is a part of X.509 certificate * (as specified in RFC 3280 - * Internet X.509 Public Key Infrastructure. Index: src/main/java/common/org/apache/harmony/security/x509/GeneralSubtrees.java =================================================================== --- src/main/java/common/org/apache/harmony/security/x509/GeneralSubtrees.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/x509/GeneralSubtrees.java (working copy) @@ -31,7 +31,7 @@ import org.apache.harmony.security.asn1.BerInputStream; /** - * The class incapsulates the ASN.1 DER encoding/decoding work + * The class encapsulates the ASN.1 DER encoding/decoding work * with the GeneralSubtrees structure which is a part of X.509 certificate: * (as specified in RFC 3280 - * Internet X.509 Public Key Infrastructure. Index: src/main/java/common/org/apache/harmony/security/x509/GeneralNames.java =================================================================== --- src/main/java/common/org/apache/harmony/security/x509/GeneralNames.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/x509/GeneralNames.java (working copy) @@ -33,7 +33,7 @@ /** - * The class incapsulates the ASN.1 DER encoding/decoding work + * The class encapsulates the ASN.1 DER encoding/decoding work * with the GeneralNames structure which is a part of X.509 certificate * (as specified in RFC 3280 - * Internet X.509 Public Key Infrastructure. Index: src/main/java/common/org/apache/harmony/security/x509/ReasonFlags.java =================================================================== --- src/main/java/common/org/apache/harmony/security/x509/ReasonFlags.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/x509/ReasonFlags.java (working copy) @@ -29,7 +29,7 @@ import org.apache.harmony.security.asn1.BerOutputStream; /** - * The class incapsulates the ASN.1 DER encoding/decoding work + * The class encapsulates the ASN.1 DER encoding/decoding work * with the following part of X.509 CRL * (as specified in RFC 3280 - * Internet X.509 Public Key Infrastructure. Index: src/main/java/common/org/apache/harmony/security/x509/AuthorityKeyIdentifier.java =================================================================== --- src/main/java/common/org/apache/harmony/security/x509/AuthorityKeyIdentifier.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/x509/AuthorityKeyIdentifier.java (working copy) @@ -34,7 +34,7 @@ import org.apache.harmony.security.utils.Array; /** - * The class incapsulates the ASN.1 DER encoding/decoding work + * The class encapsulates the ASN.1 DER encoding/decoding work * with Authority Key Identifier Extension (OID = 2.5.29.35). * (as specified in RFC 3280 - * Internet X.509 Public Key Infrastructure. Index: src/main/java/common/org/apache/harmony/security/x509/NameConstraints.java =================================================================== --- src/main/java/common/org/apache/harmony/security/x509/NameConstraints.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/x509/NameConstraints.java (working copy) @@ -36,7 +36,7 @@ import org.apache.harmony.security.internal.nls.Messages; /** - * The class incapsulates the ASN.1 DER encoding/decoding work + * The class encapsulates the ASN.1 DER encoding/decoding work * with the following structure which is a part of X.509 certificate * (as specified in RFC 3280 - * Internet X.509 Public Key Infrastructure. @@ -184,7 +184,7 @@ * names of specified X509Certificate. Restrictions apply only * if specified name form is present in the certificate. * The restrictions are applied according the RFC 3280 - * (see 4.2.1.11 Name Constraints), exepting that restricions are applied + * (see 4.2.1.11 Name Constraints), excepting that restrictions are applied * and to CA certificates, and to certificates which issuer and subject * names the same (i.e. method does not check if it CA's certificate or not, * or if the names differ or not. This check if it is needed should be done @@ -250,7 +250,7 @@ } } } - // Search the name in permitred names + // Search the name in permitted names // (if we already found the name of such type between the alt // names - we do not need to check others) if ((permitted_names[type] != null) && (!permitted_found[type])) { Index: src/main/java/common/org/apache/harmony/security/x509/BasicConstraints.java =================================================================== --- src/main/java/common/org/apache/harmony/security/x509/BasicConstraints.java (revision 490317) +++ src/main/java/common/org/apache/harmony/security/x509/BasicConstraints.java (working copy) @@ -28,7 +28,7 @@ /** * Basic Constraints Extension (OID == 2.5.29.19). * - * The ASN.1 definitionn for Basic Constraints Extension is: + * The ASN.1 definition for Basic Constraints Extension is: * *
  *   id-ce-basicConstraints OBJECT IDENTIFIER ::=  { id-ce 19 }
Index: src/main/java/common/org/apache/harmony/security/x509/KeyUsage.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/KeyUsage.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/KeyUsage.java	(working copy)
@@ -24,7 +24,7 @@
 /**
  * Key Usage Extension (OID = 2.5.29.15).
  *
- * The ASN.1 definitionn for Key Usage Extension is:
+ * The ASN.1 definition for Key Usage Extension is:
  *
  * 
  * id-ce-keyUsage OBJECT IDENTIFIER ::=  { id-ce 15 }
Index: src/main/java/common/org/apache/harmony/security/x509/PolicyQualifierInfo.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/PolicyQualifierInfo.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/PolicyQualifierInfo.java	(working copy)
@@ -30,7 +30,7 @@
 
 /**
 /**
- * The class incapsulates the ASN.1 DER decoding work 
+ * The class encapsulates the ASN.1 DER decoding work 
  * with PolicyQualifierInfo structure
  * (as specified in RFC 3280 -
  *  Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/GeneralName.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/GeneralName.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/GeneralName.java	(working copy)
@@ -44,7 +44,7 @@
 import org.apache.harmony.security.x501.Name;
 
 /**
- * The class incapsulates the ASN.1 DER encoding/decoding work 
+ * The class encapsulates the ASN.1 DER encoding/decoding work 
  * with the GeneralName structure which is a part of X.509 certificate
  * (as specified in RFC 3280 -
  *  Internet X.509 Public Key Infrastructure.
@@ -333,7 +333,7 @@
      * The name is acceptable if it has the same type name and its
      * name value is equal to name value of this object. Also the name
      * is acceptable if this general name object is a part of name 
-     * constrants and the specified name is satisfied the restriction
+     * constraints and the specified name is satisfied the restriction
      * provided by this object (for more detail see section 4.2.1.11
      * of rfc 3280).
      * Note that for X400Address [3] check procedure is unclear so method
@@ -428,7 +428,7 @@
     
     /**
      * Gets a list representation of this GeneralName object.
-     * The first entry of the list is an Iteger object representing
+     * The first entry of the list is an Integer object representing
      * the type of mane (0-8), and the second entry is a value of the name:
      * string or ASN.1 DER encoded form depending on the type as follows:
      * rfc822Name, dNSName, uniformResourceIdentifier names are returned 
@@ -820,7 +820,7 @@
      *  pieces of the address.
      *  If the length is 8 or 32 then it represents an address range (RFC 1519)
      *  and the output String will contain 2 IP address divided by "/"
-     * @return  Stringe representation of ip address
+     * @return  String representation of ip address
      */
     public static String ipBytesToStr(byte[] ip) {
         String result = ""; //$NON-NLS-1$
Index: src/main/java/common/org/apache/harmony/security/x509/OtherName.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/OtherName.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/OtherName.java	(working copy)
@@ -31,7 +31,7 @@
 import org.apache.harmony.security.asn1.ObjectIdentifier;
 
 /**
- * The class incapsulates the ASN.1 DER encoding/decoding work 
+ * The class encapsulates the ASN.1 DER encoding/decoding work 
  * with OtherName structure which is a subpart of GeneralName
  * (as specified in RFC 3280 -
  *  Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/SubjectPublicKeyInfo.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/SubjectPublicKeyInfo.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/SubjectPublicKeyInfo.java	(working copy)
@@ -34,7 +34,7 @@
 import org.apache.harmony.security.utils.AlgNameMapper;
 
 /**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
  * with the following structure which is a part of X.509 certificate
  * (as specified in RFC 3280 -
  *  Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/tsp/PKIFailureInfo.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/tsp/PKIFailureInfo.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/tsp/PKIFailureInfo.java	(working copy)
@@ -48,7 +48,7 @@
       -- the request cannot be handled due to system failure  }
 
     The value of PKIFailureInfo can take only one of the values,
-    so it is represenred by an integer here.
+    so it is represented by an integer here.
  */
 public enum PKIFailureInfo {
     /**
Index: src/main/java/common/org/apache/harmony/security/x509/ORAddress.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/ORAddress.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/ORAddress.java	(working copy)
@@ -27,7 +27,7 @@
 import org.apache.harmony.security.asn1.BerInputStream;
 
 /**
- * The class incapsulates the ASN.1 DER encoding/decoding work 
+ * The class encapsulates the ASN.1 DER encoding/decoding work 
  * with the ORAddress structure which is a part of X.509 certificate:
  * (as specified in RFC 3280 -
  *  Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/DistributionPoint.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/DistributionPoint.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/DistributionPoint.java	(working copy)
@@ -32,8 +32,8 @@
 import org.apache.harmony.security.internal.nls.Messages;
 
 /**
- * The class incapsulates the ASN.1 DER encoding/decoding work 
- * with the DistributionPoint stucture which is the part of X.509 CRL
+ * The class encapsulates the ASN.1 DER encoding/decoding work 
+ * with the DistributionPoint structure which is the part of X.509 CRL
  * (as specified in RFC 3280 -
  *  Internet X.509 Public Key Infrastructure.
  *  Certificate and Certificate Revocation List (CRL) Profile.
Index: src/main/java/common/org/apache/harmony/security/x509/TBSCertificate.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/TBSCertificate.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/TBSCertificate.java	(working copy)
@@ -36,7 +36,7 @@
 import org.apache.harmony.security.x501.Name;
 
 /**
- * The class incapsulates the ASN.1 DER encoding/decoding work 
+ * The class encapsulates the ASN.1 DER encoding/decoding work 
  * with TBSCertificate structure which is the part of X.509 certificate
  * (as specified in RFC 3280 -
  *  Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/ExtendedKeyUsage.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/ExtendedKeyUsage.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/ExtendedKeyUsage.java	(working copy)
@@ -29,7 +29,7 @@
 /**
  * Extended Key Usage Extension (OID == 2.5.29.37).
  *
- * The ASN.1 definitionn for Extended Key Usage Extension is:
+ * The ASN.1 definition for Extended Key Usage Extension is:
  *
  * 
  *  id-ce-extKeyUsage OBJECT IDENTIFIER ::= { id-ce 37 }
Index: src/main/java/common/org/apache/harmony/security/fortress/DefaultPolicyParser.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/fortress/DefaultPolicyParser.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/fortress/DefaultPolicyParser.java	(working copy)
@@ -239,8 +239,8 @@
 
     /**
      * Translates PermissionEntry token to Permission object.
-     * First, it performs general expantion for non-null name and
-     * properties expantion for non-null name, action 
+     * First, it performs general expansion for non-null name and
+     * properties expansion for non-null name, action 
      * and signers.
      * Then, it obtains signing Certificates(if any), tries to find a class specified by 
      * klass name and instantiate a corresponding permission object.
Index: src/main/java/common/org/apache/harmony/security/UnresolvedPrincipal.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/UnresolvedPrincipal.java	(revision 490317)
+++ src/main/java/common/org/apache/harmony/security/UnresolvedPrincipal.java	(working copy)
@@ -55,7 +55,7 @@
     /**
      * Constructs a a new definition of a Principal with specified
      * parameters. 
-     * @param klass fully qualified class name, may be wilcard
+     * @param klass fully qualified class name, may be wildcard
      * @param name name of principal, may be wildcard
      * @throws IllegalArgumentException if klass value 
      * is null  or is empty string 
@@ -70,7 +70,7 @@
     }
 
     /**
-     * Returns name of a modelled Principal, or wildcard 
+     * Returns name of a modeled Principal, or wildcard 
      * if any name is acceptable.
      */
     public String getName() {
@@ -78,7 +78,7 @@
     }
 
     /** 
-     * Returns fully qualified class name of a modelled Principal,
+     * Returns fully qualified class name of a modeled Principal,
      * or wildcard if any class is acceptable. 
      */
     public String getClassName() {
Index: src/main/java/windows/org/apache/harmony/security/provider/crypto/RandomBitsSupplier.java
===================================================================
--- src/main/java/windows/org/apache/harmony/security/provider/crypto/RandomBitsSupplier.java	(revision 490317)
+++ src/main/java/windows/org/apache/harmony/security/provider/crypto/RandomBitsSupplier.java	(working copy)
@@ -25,7 +25,7 @@
 
 
 /**
- * The static class providing access on Windows paltform
+ * The static class providing access on Windows platform
  * to system means for generating true random bits. 
* * It uses a native method to get the random bits from CryptGenRandom.