ECFieldF2m testing
+ * Encapsulates ECFieldF2m testing
* domain parameters.
*
*/
Index: src/test/impl/java/org/apache/harmony/security/tests/java/security/CodeSource_ImplTest.java
===================================================================
--- src/test/impl/java/org/apache/harmony/security/tests/java/security/CodeSource_ImplTest.java (revision 490317)
+++ src/test/impl/java/org/apache/harmony/security/tests/java/security/CodeSource_ImplTest.java (working copy)
@@ -118,7 +118,7 @@
boolean noMoreFactories = false;
try {
// remove all providers for x509
- // 'for' loop here for the sake of avoding endless loop - well, just
+ // 'for' loop here for the sake of avoiding endless loop - well, just
// in case if something is wrong with add/remove machinery.
// '100' seems reasonable big to remove all necessary providers
// ...
Index: src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/TrustAnchor_ImplTest.java
===================================================================
--- src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/TrustAnchor_ImplTest.java (revision 490317)
+++ src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/TrustAnchor_ImplTest.java (working copy)
@@ -592,7 +592,7 @@
//
// Full NameConstraints encoding
- // (generated by own encoder class created durind test development)
+ // (generated by own encoder class created during test development)
//
// @return Full NameConstraints encoding
// with all OPTIONAL values presented.
@@ -641,7 +641,7 @@
//
// NameConstraints encoding without excludedSubtrees
- // (generated by own encoder class created durind test development)
+ // (generated by own encoder class created during test development)
//
// @return NameConstraints encoding with
// permittedSubtrees only; all OPTIONAL
@@ -673,7 +673,7 @@
//
// NameConstraints encoding without permittedSubtrees
- // (generated by own encoder class created durind test development)
+ // (generated by own encoder class created during test development)
//
// @return NameConstraints encoding with
// excludedSubtrees only; all OPTIONAL
@@ -706,7 +706,7 @@
//
// NameConstraints full encoding with all (OPTIONAL)
// minimum/maximum GeneralSubtree fields OMITTED
- // (generated by own encoder class created durind test development)
+ // (generated by own encoder class created during test development)
//
// @return Full NameConstraints encoding
// with all (OPTIONAL) minimum/maximum
@@ -746,7 +746,7 @@
}
// Returns OID encoding
- // (generated by own encoder class created durind test development)
+ // (generated by own encoder class created during test development)
private static final byte[] getEncodingOid() {
// DO NOT MODIFY!
return new byte[] {
Index: src/test/impl/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator_ImplTest.java
===================================================================
--- src/test/impl/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator_ImplTest.java (revision 490317)
+++ src/test/impl/java/org/apache/harmony/security/tests/java/security/AlgorithmParameterGenerator_ImplTest.java (working copy)
@@ -74,7 +74,7 @@
/**
* Test for init(int size) and
* init(int size, SecureRandom random methods
- * Assertion: throws InvalidParameterExceptiom when size is incorrect
+ * Assertion: throws InvalidParameterException when size is incorrect
*/
public void testAlgorithmParameterGenerator11() throws Exception {
if (!DSASupported) {
Index: src/test/impl/java/org/apache/harmony/security/tests/fortress/PolicyUtilsTest.java
===================================================================
--- src/test/impl/java/org/apache/harmony/security/tests/fortress/PolicyUtilsTest.java (revision 490317)
+++ src/test/impl/java/org/apache/harmony/security/tests/fortress/PolicyUtilsTest.java (working copy)
@@ -272,7 +272,7 @@
}
}
- /** Tests convertion of null, empty and non-empty heterogenious collections. */
+ /** Tests conversion of null, empty and non-empty heterogeneous collections. */
public void testToPermissionCollection() {
Permission p1 = new SecurityPermission("abc");
Permission p2 = new AllPermission();
Index: src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1_MessageDigestTest.java
===================================================================
--- src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1_MessageDigestTest.java (revision 490317)
+++ src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1_MessageDigestTest.java (working copy)
@@ -17,10 +17,10 @@
/*
* TODO
- * Two tescases, one in testDigestbyteArrayintint01() and one in testUpdatebyteArrayintint01(),
+ * Two testcases, one in testDigestbyteArrayintint01() and one in testUpdatebyteArrayintint01(),
* and testUpdatebyteArrayintint03() test are commented out because
* current implementations of the MessageDigest and MessageDigestSpi classes
- * are not compatibile with RI; see JIRA ## 1120 and 1148.
+ * are not compatible with RI; see JIRA ## 1120 and 1148.
*/
@@ -403,7 +403,7 @@
/**
* test against the "void engineReset()" method;
- * it checks out that digests returned after preceeding "engineReset()"
+ * it checks out that digests returned after proceeding "engineReset()"
* is the same as in case of initial digest
*/
public final void testReset() {
Index: src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1withDSA_SignatureTest.java
===================================================================
--- src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1withDSA_SignatureTest.java (revision 490317)
+++ src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1withDSA_SignatureTest.java (working copy)
@@ -367,7 +367,7 @@
* 1. In RI, negating effect of previous call includes
* discarding updates done before calling the method.
* 2.
- * The specification for the method contains the folowing clause:
+ * The specification for the method contains the following clause:
* "If this method is called again with a different argument,
* it negates the effect of this call."
* which meaning requires certainty in case of sequence
@@ -573,7 +573,7 @@
try {
signingSigns[i].sign(sig, 0, 44);
- fail("case1 : no SignatureExcepton : i=" + i);
+ fail("case1 : no SignatureException : i=" + i);
} catch (SignatureException e) {}
}
}
@@ -679,7 +679,7 @@
* The compatibility with RI test.
* It checks out that
* for the predefined message and signature signed with PrivateKey from RI
- * the method invoked on a Signature object initiazed with corresponding PublicKey from RI
+ * the method invoked on a Signature object initialized with corresponding PublicKey from RI
* returns "true".
*/
public final void testVerifybyteArray03() throws Exception {
@@ -865,7 +865,7 @@
assertTrue("case1: test failure", verifyingSign.verify(sigBytes, 0, n));
assertFalse("case2: test failure", verifyingSign.verify(sigBytes, 0, n));
- // tastcase2: first call returns false (incorrect signature),
+ // testcase2: first call returns false (incorrect signature),
// second returns false too, in spite of correct signature (!),
// because Signature object was reset in first call
Index: src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/DSAKeyFactoryImplTest.java
===================================================================
--- src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/DSAKeyFactoryImplTest.java (revision 490317)
+++ src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/DSAKeyFactoryImplTest.java (working copy)
@@ -506,7 +506,7 @@
* A test against the "getKeySpec(Key, Class)" method.
* The test checks out that the method throws up InvalidKeySpecException if
* a "Class" argument is not appropriate for a "Key" argument
- * regradless of whether a correct value or null is passed to a Key argument.
+ * regardless of whether a correct value or null is passed to a Key argument.
*/
public final void testGetKeySpec01() throws Exception {
@@ -594,7 +594,7 @@
/**
* A test against the "getKeySpec(Key, Class)" method.
* The test checks out that
- * 1) a KeySpec returned by the methodis being casted to
+ * 1) a KeySpec returned by the method is being casted to
expected "DSAPrivateKeySpec" or "PKCS8EncodedKeySpec", and
* 2) DSAPublickey object generated from KeySpec is equal a "privateKey" argument.
*/
Index: src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1PRNG_SecureRandomTest.java
===================================================================
--- src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1PRNG_SecureRandomTest.java (revision 490317)
+++ src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1PRNG_SecureRandomTest.java (working copy)
@@ -234,11 +234,11 @@
* byte array of zero length to "nextBytes(byte[])" method.
* The test contains two testcases:
* - first testcase checks out that if for two newly created SecureRandom objects
- * invokation of "nextBytes(new byte[0])" method are first ones
+ * invocation of "nextBytes(new byte[0])" method are first ones
* then further calls to nextBytes(..) methods return different byte arrays,
* that is, first "nextBytes(new byte[0])" aslo randomizes internal state;
* - second testcase checks out that if for two newly created SecureRandom objects
- * invokation of "setSeed(..)" methods are first ones
+ * invocation of "setSeed(..)" methods are first ones
* then further calls to "nextBytes(new byte[0])" methods has no effect
*/
public final void testNextBytesbyteArray04() throws NoSuchAlgorithmException,
@@ -365,8 +365,8 @@
/**
* test against the "void setSeed(byte[])" method;
* it checks out that the "byte[0]" argument has no effect; there are two testcases:
- * - if one of two SecureRandom objects sipplied with the same seed is additionally
- * sipplied with such array, "nextBytes(..)" of both objects return the same bytes;
+ * - if one of two SecureRandom objects supplied with the same seed is additionally
+ * supplied with such array, "nextBytes(..)" of both objects return the same bytes;
* - two byte arrays returned by "nextBytes(..)" in following sequence
* nextBytes(..); setSeed(new byte[0]); nextBytes(..);
* don't contain the same byte sequencies.
Index: src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/serialization/SHA1PRNG_SecureRandomTest.java
===================================================================
--- src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/serialization/SHA1PRNG_SecureRandomTest.java (revision 490317)
+++ src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/serialization/SHA1PRNG_SecureRandomTest.java (working copy)
@@ -105,7 +105,7 @@
/**
- * Compareing sequencies of bytes
+ * Comparing sequencies of bytes
* returned by "nextBytes(..)" of referenced and tested objects
*/
private void testingSame(SecureRandom ref, SecureRandom test) {
@@ -137,7 +137,7 @@
/**
- * Compareing sequencies of bytes
+ * Comparing sequencies of bytes
* returned by "nextBytes(..)" of referenced and tested objects
*/
private void testingNotSame(SecureRandom ref, SecureRandom test) {
Index: src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1ImplTest.java
===================================================================
--- src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1ImplTest.java (revision 490317)
+++ src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/SHA1ImplTest.java (working copy)
@@ -97,7 +97,7 @@
/*
* The test checks out that SHA1Impl computes correct value
- * if data supplied takes exactly fourteen words of sexteen word buffer.
+ * if data supplied takes exactly fourteen words of sixteen word buffer.
*/
public final void testMultiBlockMessage() {
@@ -163,7 +163,7 @@
*/
private void alternateHash(int[] bufW, int[] hash) {
- // constants defned in Secure Hash Standard
+ // constants defined in Secure Hash Standard
final int[] K = {
0x5A827999, 0x5A827999, 0x5A827999, 0x5A827999,
Index: src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CertImplTest.java
===================================================================
--- src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CertImplTest.java (revision 490317)
+++ src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CertImplTest.java (working copy)
@@ -95,7 +95,7 @@
String algName = "SHA1withDSA";
// DER boolean false encoding (http://asn1.elibel.tm.fr)
- // Makes no sence. For testing purposes we need just provide
+ // Makes no sense. For testing purposes we need just provide
// some ASN.1 structure:
byte[] algParams = {1, 1, 0};
String issuerName = "O=Certificate Issuer";
@@ -761,7 +761,7 @@
public void testVerify3() throws Exception {
try {
certificate.verify(publicKey);
- fail("Incorrect signature succesfully verified.");
+ fail("Incorrect signature successfully verified.");
} catch (Exception e) {
}
}
Index: src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CRLImplTest.java
===================================================================
--- src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CRLImplTest.java (revision 490317)
+++ src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CRLImplTest.java (working copy)
@@ -74,7 +74,7 @@
private static String algOID = "1.2.840.10040.4.3";
private static String algName = "SHA1withDSA";
// DER boolean false encoding (http://asn1.elibel.tm.fr)
- // Makes no sence. For testing purposes we need just provide
+ // Makes no sense. For testing purposes we need just provide
// some ASN.1 structure:
private static byte[] algParams = {1, 1, 0};
private static AlgorithmIdentifier signature;
@@ -485,7 +485,7 @@
public void testVerify3() throws Exception {
try {
crl.verify(publicKey);
- fail("Incorrect signature succesfully verified.");
+ fail("Incorrect signature successfully verified.");
} catch (Exception e) {
}
}
Index: src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CertFactoryPerfTest.java
===================================================================
--- src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CertFactoryPerfTest.java (revision 490317)
+++ src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CertFactoryPerfTest.java (working copy)
@@ -70,7 +70,7 @@
static String algName = "SHA1withDSA";
// DER boolean false encoding (http://asn1.elibel.tm.fr)
- // Makes no sence. For testing purposes we need just provide
+ // Makes no sense. For testing purposes we need just provide
// some ASN.1 structure:
static byte[] algParams = {1, 1, 0};
static String issuerName = "O=Certificate Issuer";
@@ -844,7 +844,7 @@
public void testVerify3() throws Exception {
try {
certificate.verify(publicKey);
- fail("Incorrect signature succesfully verified.");
+ fail("Incorrect signature successfully verified.");
} catch (Exception e) {
}
}
Index: src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CRLEntryImplTest.java
===================================================================
--- src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CRLEntryImplTest.java (revision 490317)
+++ src/test/impl/java/org/apache/harmony/security/tests/provider/cert/X509CRLEntryImplTest.java (working copy)
@@ -48,7 +48,7 @@
// revoked certificate issuer
X500Principal issuer =
new X500Principal("O=Certificate Issuer");
- // revoked sertificate serial number
+ // revoked certificate serial number
BigInteger serialNumber = BigInteger.valueOf(555);
// crl entry extensions
Extensions crlEntryExtensions = new Extensions();
Index: src/test/impl/java.injected/java/security/UnresolvedPermissionTest.java
===================================================================
--- src/test/impl/java.injected/java/security/UnresolvedPermissionTest.java (revision 490317)
+++ src/test/impl/java.injected/java/security/UnresolvedPermissionTest.java (working copy)
@@ -27,7 +27,7 @@
public class UnresolvedPermissionTest extends TestCase {
/**
- * newPermissionCollection() should return new BasicPermissionCollection on every invokation
+ * newPermissionCollection() should return new BasicPermissionCollection on every invocation
*/
public void testCollection()
{
Index: src/test/impl/java.injected/java/security/UnresolvedPermissionCollection_ImplTest.java
===================================================================
--- src/test/impl/java.injected/java/security/UnresolvedPermissionCollection_ImplTest.java (revision 490317)
+++ src/test/impl/java.injected/java/security/UnresolvedPermissionCollection_ImplTest.java (working copy)
@@ -145,7 +145,7 @@
resolved = upc.resolveCollection(ap, null);
assertNotNull(resolved);
assertTrue(ap.equals(resolved.elements().nextElement()));
- assertFalse("resolved permission should be removed from unresolevd collection", upc.elements().hasMoreElements());
+ assertFalse("resolved permission should be removed from unresolved collection", upc.elements().hasMoreElements());
}
/**
@@ -191,7 +191,7 @@
assertTrue(sp.equals(els.nextElement()));
assertFalse(els.hasMoreElements());
els = upc.elements();
- assertTrue("resolved permission should be removed from unresolevd collection",
+ assertTrue("resolved permission should be removed from unresolved collection",
up1.equals(els.nextElement()));
assertFalse(els.hasMoreElements());
}
Index: src/test/impl/java.injected/java/security/cert/X509CertSelectorTest.java
===================================================================
--- src/test/impl/java.injected/java/security/cert/X509CertSelectorTest.java (revision 490317)
+++ src/test/impl/java.injected/java/security/cert/X509CertSelectorTest.java (working copy)
@@ -1784,7 +1784,7 @@
Name nameSubject = new Name(subject);
for (int i=0; iKeyStore.CallbackHandlerProtection(CallbackHandler handler)
* constructor
- * Assertion: throws NullPointerException when hendler is null
+ * Assertion: throws NullPointerException when handler is null
*/
public void testCallbackHandlerProtection() {
try {
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator4Test.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator4Test.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator4Test.java (working copy)
@@ -43,7 +43,7 @@
*/
public void test_getAlgorithm() throws Exception {
String alg = KeyPairGenerator.getInstance("DSA").getAlgorithm();
- assertEquals("getAlgorithm returned enexpected value", "DSA", alg);
+ assertEquals("getAlgorithm returned unexpected value", "DSA", alg);
}
/**
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/interfaces/DSAPublicKeyTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/interfaces/DSAPublicKeyTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/interfaces/DSAPublicKeyTest.java (working copy)
@@ -49,7 +49,7 @@
*/
public void testField() {
checkDSAPublicKey k = new checkDSAPublicKey();
- assertEquals("Incorrect serialVerstionUID",
+ assertEquals("Incorrect serialVersionUID",
k.getSerVerUID(), //DSAPublicKey.serialVersionUID
1234526332779022332L);
}
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/interfaces/DSAPrivateKeyTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/interfaces/DSAPrivateKeyTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/interfaces/DSAPrivateKeyTest.java (working copy)
@@ -49,7 +49,7 @@
*/
public void testField() {
checkDSAPrivateKey k = new checkDSAPrivateKey();
- assertEquals("Incorrect serialVerstionUID",
+ assertEquals("Incorrect serialVersionUID",
k.getSerVerUID(), //DSAPrivateKey.serialVersionUID
7776497482533790279L);
}
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/interfaces/ECPrivateKeyTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/interfaces/ECPrivateKeyTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/interfaces/ECPrivateKeyTest.java (working copy)
@@ -49,7 +49,7 @@
*/
public void testField() {
checkECPrivateKey k = new checkECPrivateKey();
- assertEquals("Incorrect serialVerstionUID",
+ assertEquals("Incorrect serialVersionUID",
k.getSerVerUID(), //ECPrivateKey.serialVersionUID
-7896394956925609184L);
}
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/ProtectionDomainTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/ProtectionDomainTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/ProtectionDomainTest.java (working copy)
@@ -162,7 +162,7 @@
/**
* ProtectionDomain with PermissionCollection which contains AllPermission
- * must imply() AllPemrssion.
+ * must imply() AllPermission.
*/
public void testImplies_01() {
assertTrue(new ProtectionDomain(null, perms).implies(allperm));
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator1Test.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator1Test.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/KeyPairGenerator1Test.java (working copy)
@@ -382,7 +382,7 @@
* Assertion: throws InvalidParameterException or
* InvalidAlgorithmParameterException when parameters keysize or param are
* incorrect Assertion: generateKeyPair() and genKeyPair() return null
- * KeyPair Addtional class MyKeyPairGenerator1 is used
+ * KeyPair Additional class MyKeyPairGenerator1 is used
*/
public void testKeyPairGenerator12() {
int[] keys = { -1, -250, 1, 64, 512, 1024 };
@@ -455,9 +455,9 @@
* generateKeyPair()
* genKeyPair()
* Assertion: initialize(int ...) throws InvalidParameterException when
- * keysize in incorrect Aserrtion: initialiaze(AlgorithmParameterSpec
+ * keysize in incorrect Assertion: initialize(AlgorithmParameterSpec
* ...)throws UnsupportedOperationException Assertion: generateKeyPair() and
- * genKeyPair() return not null KeyPair Addtional class MyKeyPairGenerator2
+ * genKeyPair() return not null KeyPair Additional class MyKeyPairGenerator2
* is used
*/
public void testKeyPairGenerator13() {
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/KeyManagementExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/KeyManagementExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/KeyManagementExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for KeyManagementException seialization
+ * Test for KeyManagementException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/ProviderExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/ProviderExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/ProviderExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for ProviderException seialization
+ * Test for ProviderException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/InvalidAlgorithmParameterExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/InvalidAlgorithmParameterExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/InvalidAlgorithmParameterExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for InvalidAlgorithmParameterException seialization
+ * Test for InvalidAlgorithmParameterException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/InvalidKeyExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/InvalidKeyExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/InvalidKeyExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for InvalidKeyException seialization
+ * Test for InvalidKeyException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/UnrecoverableKeyExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/UnrecoverableKeyExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/UnrecoverableKeyExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for UnrecoverableKeyException seialization
+ * Test for UnrecoverableKeyException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/KeyStoreExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/KeyStoreExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/KeyStoreExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for KeyStoreException seialization
+ * Test for KeyStoreException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/GeneralSecurityExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/GeneralSecurityExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/GeneralSecurityExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for GeneralSecurityException seialization
+ * Test for GeneralSecurityException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/NoSuchAlgorithmExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/NoSuchAlgorithmExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/NoSuchAlgorithmExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for NoSuchAlgorithmException seialization
+ * Test for NoSuchAlgorithmException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/NoSuchProviderExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/NoSuchProviderExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/NoSuchProviderExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for NoSuchProviderException seialization
+ * Test for NoSuchProviderException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/UnrecoverableEntryExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/UnrecoverableEntryExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/UnrecoverableEntryExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for UnrecoverableEntryException seialization
+ * Test for UnrecoverableEntryException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/InvalidParameterExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/InvalidParameterExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/InvalidParameterExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for InvalidParameterException seialization
+ * Test for InvalidParameterException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/KeyExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/KeyExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/KeyExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for KeyException seialization
+ * Test for KeyException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/SignatureExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/SignatureExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/SignatureExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for SignatureException seialization
+ * Test for SignatureException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/KSPasswordProtectionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/KSPasswordProtectionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/KSPasswordProtectionTest.java (working copy)
@@ -56,14 +56,14 @@
char [] pass = {'a', 'b', 'c'};
KeyStore.PasswordProtection ksPWP = new KeyStore.PasswordProtection(pass);
char [] rPass = ksPWP.getPassword();
- assertFalse("PasswordProtection Should not be descroyed", ksPWP.isDestroyed());
+ assertFalse("PasswordProtection Should not be destroyed", ksPWP.isDestroyed());
assertEquals("Incorrect password length", pass.length, rPass.length);
for (int i = 0; i < pass.length; i++) {
assertEquals("Incorrect password (item: ".concat(Integer.toString(i))
.concat(")"), pass[i], rPass[i]);
}
ksPWP.destroy();
- assertTrue("PasswordProtection must be descroyed", ksPWP.isDestroyed());
+ assertTrue("PasswordProtection must be destroyed", ksPWP.isDestroyed());
try {
ksPWP.getPassword();
fail("IllegalStateException must be thrown because PasswordProtection is destroyed");
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/BasicPermission2Test.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/BasicPermission2Test.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/BasicPermission2Test.java (working copy)
@@ -99,7 +99,7 @@
public void test_impliesLjava_security_Permission() {
// Test for method boolean
// java.security.BasicPermission.implies(java.security.Permission)
- assertTrue("Equal objects should imply eachother", bp.implies(bp2));
+ assertTrue("Equal objects should imply each other", bp.implies(bp2));
assertTrue("a) should not imply", !bp.implies(bp3));
assertTrue("b) should not imply", !bp4.implies(bp5));
assertTrue("a) should imply", bp3.implies(bp5));
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/PrivilegedActionException2Test.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/PrivilegedActionException2Test.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/PrivilegedActionException2Test.java (working copy)
@@ -41,9 +41,9 @@
* @tests java.security.PrivilegedActionException#getException()
*/
public void test_getException() {
- Exception e = new IOException("test IOexception");
+ Exception e = new IOException("test IOException");
PrivilegedActionException pe = new PrivilegedActionException(e);
- assertEquals("Did not encapsulate test IOexception!", e, pe
+ assertEquals("Did not encapsulate test IOException!", e, pe
.getException());
}
}
\ No newline at end of file
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/DigestInputStream2Test.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/DigestInputStream2Test.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/DigestInputStream2Test.java (working copy)
@@ -185,7 +185,7 @@
try {
digest = MessageDigest.getInstance("SHA-1");
} catch (NoSuchAlgorithmException e) {
- fail("Unable to find SHA-1 algorithim");
+ fail("Unable to find SHA-1 algorithm");
}
}
}
\ No newline at end of file
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/KeyStoreTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/KeyStoreTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/KeyStoreTest.java (working copy)
@@ -125,7 +125,7 @@
kss[i].load(null, null);
try {
kss[i].store(null);
- fail("IOException or IllegalArgumentException should be thrown for nill parameter");
+ fail("IOException or IllegalArgumentException should be thrown for null parameter");
} catch (IOException e) {
} catch (IllegalArgumentException e) {
}
@@ -141,7 +141,7 @@
/**
- * Test for setKeyEntry(String alias, bute[] key, Certificate[] chain)
+ * Test for setKeyEntry(String alias, byte[] key, Certificate[] chain)
* method
* Assertion: stores KeyEntry.
*/
@@ -231,7 +231,7 @@
}
/**
- * @test java.security.KeyStore.PasswordProtectionn.getPassword()
+ * @test java.security.KeyStore.PasswordProtection.getPassword()
*/
public void testKeyStorePPGetPassword() {
// Regression for HARMONY-1539
@@ -250,7 +250,7 @@
KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType());
keyStore.load(null, "pwd".toCharArray());
- // genarate a key
+ // generate a key
KeyGenerator keyGen = KeyGenerator.getInstance("DES");
keyGen.init(56);
SecretKey secretKey = keyGen.generateKey();
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/AlgorithmParametersTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/AlgorithmParametersTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/AlgorithmParametersTest.java (working copy)
@@ -490,7 +490,7 @@
}
private void checkUnititialized(AlgorithmParameters ap) {
- assertNull("Unititialized: toString() failed", ap.toString());
+ assertNull("Uninitialized: toString() failed", ap.toString());
}
private void checkAP(AlgorithmParameters ap, Provider p) throws Exception {
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/DigestInputStreamTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/DigestInputStreamTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/DigestInputStreamTest.java (working copy)
@@ -114,7 +114,7 @@
/**
* Test #1 for read() method
*
- * Assertion: reutns the byte read
+ * Assertion: returns the byte read
* Assertion: updates associated digest
*/
public final void testRead01()
@@ -144,7 +144,7 @@
/**
* Test #2 for read() method
*
- * Assertion: reutns -1 if EOS had been
+ * Assertion: returns -1 if EOS had been
* reached but not read before method call
*
* Assertion: must not update digest if EOS had been
@@ -322,7 +322,7 @@
/**
* Test #2 for read(byte[],int,int) method
*
- * Assertion: reutns the number of bytes read
+ * Assertion: returns the number of bytes read
*
* Assertion: put bytes read into specified array at specified offset
*
@@ -362,7 +362,7 @@
/**
* Test #3 for read(byte[],int,int) method
*
- * Assertion: reutns the number of bytes read
+ * Assertion: returns the number of bytes read
*
* Assertion: put bytes read into specified array at specified offset
*
@@ -411,7 +411,7 @@
/**
* Test #4 for read(byte[],int,int) method
*
- * Assertion: reutns the number of bytes read
+ * Assertion: returns the number of bytes read
*
* Assertion: updates associated digest
*/
@@ -444,7 +444,7 @@
/**
* Test #5 for read(byte[],int,int) method
*
- * Assertion: reutns the number of bytes read
+ * Assertion: returns the number of bytes read
*
* Assertion: put bytes read into specified array at specified offset
*
@@ -483,7 +483,7 @@
/**
* Test for getMessageDigest() method
*
- * Assertion: reutns associated message digest
+ * Assertion: returns associated message digest
*/
public final void testGetMessageDigest() {
for (int ii=0; iigetMessageDigest() methodnull
+ * Assertion: policy tree parameter may be null
* @throws NoSuchAlgorithmException
* @throws InvalidKeySpecException
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertStore1Test.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertStore1Test.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertStore1Test.java (working copy)
@@ -234,7 +234,7 @@
* getInstance(String type, CertStoreParameters params, String provider)
* Assertion: throws IllegalArgumentException when provider is null or empty
*
- * FIXME: verify IllegalArgumentException when privider is empty
+ * FIXME: verify IllegalArgumentException when provider is empty
*/
public void testCertStore06()
throws InvalidAlgorithmParameterException, NoSuchAlgorithmException,
@@ -410,7 +410,7 @@
}
}
/**
- * Addifional class to verify CertStore constructor
+ * Additional class to verify CertStore constructor
*/
class myCertStore extends CertStore {
public myCertStore(CertStoreSpi spi, Provider prov, String type, CertStoreParameters params) {
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertificateFactory1Test.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertificateFactory1Test.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertificateFactory1Test.java (working copy)
@@ -387,7 +387,7 @@
try {
colCer = certFs[i].generateCertificates(is);
if (colCer != null) {
- assertTrue("Not empy certificate collection", colCer.isEmpty());
+ assertTrue("Not empty certificate collection", colCer.isEmpty());
}
} catch (CertificateException e) {
}
@@ -430,7 +430,7 @@
* generateCRLs(InputStream inStream)
* methods
* Assertion: throw CertificateException and CRLException when inStream
- * contains incompatibale datas
+ * contains incompatible datas
*/
public void testCertificateFactory11() throws CertificateException,
NoSuchProviderException, IOException {
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertificateFactory3Test.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertificateFactory3Test.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertificateFactory3Test.java (working copy)
@@ -113,7 +113,7 @@
TestUtils.getEncodedX509Certificate()));
Iterator it = col.iterator();
assertEquals("Incorrect Collection size", col.size(), 1);
- assertEquals("Incorect Certificate in Collection", cert, it.next());
+ assertEquals("Incorrect Certificate in Collection", cert, it.next());
}
}
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CRLExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CRLExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CRLExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for CRLException seialization
+ * Test for CRLException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertPathValidatorExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertPathValidatorExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertPathValidatorExceptionTest.java (working copy)
@@ -30,7 +30,7 @@
/**
- * Test for CertPathValidatorException seialization
+ * Test for CertPathValidatorException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertPathBuilderExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertPathBuilderExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertPathBuilderExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for CertPathBuilderException seialization
+ * Test for CertPathBuilderException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for CertificateException seialization
+ * Test for CertificateException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateExpiredExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateExpiredExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateExpiredExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for CertificateExpiredException seialization
+ * Test for CertificateExpiredException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateNotYetValidExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateNotYetValidExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateNotYetValidExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for CertificateNotYetValidException seialization
+ * Test for CertificateNotYetValidException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateParsingExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateParsingExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateParsingExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for CertificateParsingException seialization
+ * Test for CertificateParsingException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateEncodingExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateEncodingExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertificateEncodingExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for CertificateEncodingException seialization
+ * Test for CertificateEncodingException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertStoreExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertStoreExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/serialization/CertStoreExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for CertStoreException seialization
+ * Test for CertStoreException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertPathValidator1Test.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertPathValidator1Test.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/CertPathValidator1Test.java (working copy)
@@ -392,7 +392,7 @@
}
}
/**
- * Addifional class to verify CertPathValidator constructor
+ * Additional class to verify CertPathValidator constructor
*/
class myCertPathValidator extends CertPathValidator {
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/TrustAnchorTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/TrustAnchorTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/TrustAnchorTest.java (working copy)
@@ -393,7 +393,7 @@
//
// Full NameConstraints encoding
- // (generated by own encoder class created durind test development)
+ // (generated by own encoder class created during test development)
//
// @return Full NameConstraints encoding
// with all OPTIONAL values presented.
@@ -442,7 +442,7 @@
//
// NameConstraints encoding without excludedSubtrees
- // (generated by own encoder class created durind test development)
+ // (generated by own encoder class created during test development)
//
// @return NameConstraints encoding with
// permittedSubtrees only; all OPTIONAL
@@ -474,7 +474,7 @@
//
// NameConstraints encoding without permittedSubtrees
- // (generated by own encoder class created durind test development)
+ // (generated by own encoder class created during test development)
//
// @return NameConstraints encoding with
// excludedSubtrees only; all OPTIONAL
@@ -507,7 +507,7 @@
//
// NameConstraints full encoding with all (OPTIONAL)
// minimum/maximum GeneralSubtree fields OMITTED
- // (generated by own encoder class created durind test development)
+ // (generated by own encoder class created during test development)
//
// @return Full NameConstraints encoding
// with all (OPTIONAL) minimum/maximum
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/cert/X509CRLEntryTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/cert/X509CRLEntryTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/cert/X509CRLEntryTest.java (working copy)
@@ -89,7 +89,7 @@
}
/**
- * equals(Object other) method testing. Tests the correctnel of equal
+ * equals(Object other) method testing. Tests the correctness of equal
* operation: it should be reflexive, symmetric, transitive, consistent
* and should be false on null object.
*/
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/UnresolvedPermissionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/UnresolvedPermissionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/UnresolvedPermissionTest.java (working copy)
@@ -31,7 +31,7 @@
public class UnresolvedPermissionTest extends TestCase {
/**
- * Creates an Object with given name, type, action, certificaties.
+ * Creates an Object with given name, type, action, certificates.
* Empty or null type is not allowed - exception should be thrown.
*/
public void testCtor()
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/spec/ECFieldF2mTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/spec/ECFieldF2mTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/spec/ECFieldF2mTest.java (working copy)
@@ -36,7 +36,7 @@
/**
* Support class for this test.
- * Incapsulates ECFieldF2m testing
+ * Encapsulates ECFieldF2m testing
* domain parameters.
*
*/
@@ -452,7 +452,7 @@
/**
* Test #1 for getMidTermsOfReductionPolynomial() method.getMidTermsOfReductionPolynomial() method.getReductionPolynomial() method.init(AlgorithmParameterSpec param) and
* init(AlgorithmParameterSpec param, SecureRandom random
* methods
- * Assertion: throws InvalidAlgorithmParameterExceptiom when param is null
+ * Assertion: throws InvalidAlgorithmParameterException when param is null
*/
public void testAlgorithmParameterGenerator12() {
if (!DSASupported) {
@@ -380,7 +380,7 @@
}
}
/**
- * Addifional class to verify AlgorithmParameterGenerator constructor
+ * Additional class to verify AlgorithmParameterGenerator constructor
*/
class myAlgPG extends AlgorithmParameterGenerator {
public myAlgPG(AlgorithmParameterGeneratorSpi spi, Provider prov, String alg) {
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/KeyStoreSpiTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/KeyStoreSpiTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/KeyStoreSpiTest.java (working copy)
@@ -141,7 +141,7 @@
} catch (KeyStoreException e) {
}
assertNull("engineAliases() must return null", ksSpi.engineAliases());
- assertFalse("engineConatinsAlias(..) must return false", ksSpi
+ assertFalse("engineContainsAlias(..) must return false", ksSpi
.engineContainsAlias(""));
assertEquals("engineSize() must return 0", 0, ksSpi.engineSize());
try {
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/KeyStore2Test.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/KeyStore2Test.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/KeyStore2Test.java (working copy)
@@ -268,7 +268,7 @@
assertTrue("key entry - the alias returned for this "
+ "certificate was wrong", alias.equals("alias2"));
- // testing case with a nonexistant certificate
+ // testing case with a nonexistent certificate
X509Certificate cert2 = (X509Certificate) cf
.generateCertificate(certArray3);
String aliasNull = keyTest.getCertificateAlias(cert2);
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/KeyTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/KeyTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/KeyTest.java (working copy)
@@ -47,7 +47,7 @@
*/
public void testField() {
checkKey mk = new checkKey();
- assertEquals("Incorrect seralVersionUID", mk.getSerVerUID(), //Key.serialVersionUID,
+ assertEquals("Incorrect serialVersionUID", mk.getSerVerUID(), //Key.serialVersionUID,
6603384152749567654L);
}
Index: src/test/api/java/org/apache/harmony/security/tests/java/security/CodeSourceTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/java/security/CodeSourceTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/java/security/CodeSourceTest.java (working copy)
@@ -62,7 +62,7 @@
private static URL urlDir_port80, urlDir_port81;
- /* must be exatly the same as urlDir, but with slash added */
+ /* must be exactly the same as urlDir, but with slash added */
private static URL urlDirWithSlash;
//private static URL urlDirFtp;
@@ -174,7 +174,7 @@
/**
* Test for equals(Object)
- * The signer certificate chain must contain the same set of cerificates, but
+ * The signer certificate chain must contain the same set of certificates, but
* the order of the certificates is not taken into account.
*/
public void testEqualsObject_02() {
@@ -203,7 +203,7 @@
}
/**
- * Tests CodeSource.getCeritficates().
+ * Tests CodeSource.getCertificates().
*/
public void testGetCertificates_00() {
assertNull(new CodeSource(null, (Certificate[]) null).getCertificates());
@@ -369,7 +369,7 @@
/**
* Tests whether we are running with the 1.5 features.
* The test is preformed by looking for (via reflection) the CodeSource's
- * costructor {@link CodeSource#CodeSource(URL, CodeSigner[])}.
+ * constructor {@link CodeSource#CodeSource(URL, CodeSigner[])}.
* @return true if 1.5 feature is presented, false
* otherwise.
*/
@@ -597,7 +597,7 @@
/**
* Testing with special URLs like 'localhost', 'file://' scheme ...
- * These cpesial URLs have a special processing in implies(),
+ * These special URLs have a special processing in implies(),
* so they need to be covered and performance need to be checked
*/
public void testImplies_0C() throws Exception {
@@ -612,7 +612,7 @@
/**
* Testing with special URLs like 'localhost', 'file://' scheme ...
- * These cpesial URLs have a special processing in implies(),
+ * These special URLs have a special processing in implies(),
* so they need to be covered and performance need to be checked
*/
public void testImplies_0D() throws Exception {
Index: src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/CertificateTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/CertificateTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/CertificateTest.java (working copy)
@@ -72,7 +72,7 @@
}
/**
- * equals(Object obj) method testing. Tests the correctnel of equal
+ * equals(Object obj) method testing. Tests the correctness of equal
* operation: it should be reflexive, symmetric, transitive, consistent
* and should be false on null object.
*/
Index: src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for CertificateException seialization
+ * Test for CertificateException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateExpiredExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateExpiredExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateExpiredExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for CertificateExpiredException seialization
+ * Test for CertificateExpiredException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateNotYetValidExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateNotYetValidExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateNotYetValidExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for CertificateNotYetValidException seialization
+ * Test for CertificateNotYetValidException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateParsingExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateParsingExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateParsingExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for CertificateParsingException seialization
+ * Test for CertificateParsingException serialization
*
*/
Index: src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateEncodingExceptionTest.java
===================================================================
--- src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateEncodingExceptionTest.java (revision 490317)
+++ src/test/api/java/org/apache/harmony/security/tests/javax/security/cert/serialization/CertificateEncodingExceptionTest.java (working copy)
@@ -28,7 +28,7 @@
/**
- * Test for CertificateEncodingException seialization
+ * Test for CertificateEncodingException serialization
*
*/
Index: src/test/api/java.injected/java/security/AllPermissionTest.java
===================================================================
--- src/test/api/java.injected/java/security/AllPermissionTest.java (revision 490317)
+++ src/test/api/java.injected/java/security/AllPermissionTest.java (working copy)
@@ -80,7 +80,7 @@
assertTrue(a1.implies(new UnresolvedPermission("2323", "", "", null)));
}
- /** newPermissionCollection() returns a new AllPermissionCollection on every invokation. */
+ /** newPermissionCollection() returns a new AllPermissionCollection on every invocation. */
public void testCollection()
{
AllPermission a1 = new AllPermission();
Index: src/test/api/java.injected/java/security/IdentityTest.java
===================================================================
--- src/test/api/java.injected/java/security/IdentityTest.java (revision 490317)
+++ src/test/api/java.injected/java/security/IdentityTest.java (working copy)
@@ -111,7 +111,7 @@
}
/*
- * Cverify Identity(String) creates instance with given name
+ * verify Identity(String) creates instance with given name
*/
public void testIdentityString() {
Identity i = new IdentityStub("iii");
@@ -198,7 +198,7 @@
//
// Commented out since there will no be fix for the test failure
// /**
-// * verify removeCertificate(Certificate certificate) removes cetrificate
+// * verify removeCertificate(Certificate certificate) removes certificate
// */
// public void testRemoveCertificate1() throws Exception{
// Identity i = new IdentityStub("iii");
Index: src/test/api/java.injected/java/security/BasicPermissionTest.java
===================================================================
--- src/test/api/java.injected/java/security/BasicPermissionTest.java (revision 490317)
+++ src/test/api/java.injected/java/security/BasicPermissionTest.java (working copy)
@@ -129,7 +129,7 @@
}
/**
- * newPermissionCollection() should return new BasicPermissionCollection on every invokation
+ * newPermissionCollection() should return new BasicPermissionCollection on every invocation
*/
public void testCollection()
{
Index: src/test/support/common/java/org/apache/harmony/security/tests/support/cert/MyCertPath.java
===================================================================
--- src/test/support/common/java/org/apache/harmony/security/tests/support/cert/MyCertPath.java (revision 490317)
+++ src/test/support/common/java/org/apache/harmony/security/tests/support/cert/MyCertPath.java (working copy)
@@ -49,7 +49,7 @@
private final byte[] encoding;
/**
- * Constucts new instance of MyCertPath
+ * Constructs new instance of MyCertPath
*
* @param type
* @param encoding
Index: src/test/support/common/java/org/apache/harmony/security/tests/support/cert/TestUtils.java
===================================================================
--- src/test/support/common/java/org/apache/harmony/security/tests/support/cert/TestUtils.java (revision 490317)
+++ src/test/support/common/java/org/apache/harmony/security/tests/support/cert/TestUtils.java (working copy)
@@ -62,9 +62,9 @@
+ ".ks";
//
// The file name suffixes to load keystore from
- // *.ks1 - keystore containing untrusted cerificates only
- // *.ks2 - keystore containing trusted cerificates only
- // *.ks3 - keystore containing both trusted and untrusted cerificates
+ // *.ks1 - keystore containing untrusted certificates only
+ // *.ks2 - keystore containing trusted certificates only
+ // *.ks3 - keystore containing both trusted and untrusted certificates
//
public static final int UNTRUSTED = 1;
public static final int TRUSTED = 2;
@@ -140,7 +140,7 @@
* The following types supported:
* 1 - KeyStore with untrusted certificates only
* 2 - KeyStore with trusted certificates only
- * 3 - KeyStore with botht trusted and untrusted certificates
+ * 3 - KeyStore with both trusted and untrusted certificates
*
* @return Returns test KeyStore instance
*/
@@ -286,7 +286,7 @@
}
};
}
- // X.509 encoded sertificate
+ // X.509 encoded certificate
private static final String ENCODED_X509_CERTIFICATE = "-----BEGIN CERTIFICATE-----\n"
+ "MIIDHTCCAtsCBEFT72swCwYHKoZIzjgEAwUAMHQxCzAJBgNVBAYTAlJVMQwwCgYDVQQIEwNOU08x\n"
+ "FDASBgNVBAcTC05vdm9zaWJpcnNrMQ4wDAYDVQQKEwVJbnRlbDEVMBMGA1UECxMMRFJMIFNlY3Vy\n"
Index: src/test/support/common/java/org/apache/harmony/security/tests/support/MDGoldenData.java
===================================================================
--- src/test/support/common/java/org/apache/harmony/security/tests/support/MDGoldenData.java (revision 490317)
+++ src/test/support/common/java/org/apache/harmony/security/tests/support/MDGoldenData.java (working copy)
@@ -25,13 +25,13 @@
/**
* Golden data for Message Digest related tests.
- * Incapsulates the following data:
+ * Encapsulates the following data:
* - reference message
* - reference message digests calculated using
* BEA JRockit j2sdk1.4.2_04 (http://www.bea.com)
* for various MD algorithms:
* SHA-1, SHA-256, SHA-384, SHA-512, MD-5.
- * Standart algorithm names are defined in
+ * Standard algorithm names are defined in
* "JavaTM Cryptography Architecture API Specification & Reference"
*
*/
Index: src/test/support/common/java/org/apache/harmony/security/tests/support/TestCertUtils.java
===================================================================
--- src/test/support/common/java/org/apache/harmony/security/tests/support/TestCertUtils.java (revision 490317)
+++ src/test/support/common/java/org/apache/harmony/security/tests/support/TestCertUtils.java (working copy)
@@ -59,7 +59,7 @@
/**
* Returns new instance of test certificate each time the method is called.
*
- * @return test ceritifcate
+ * @return test certificate
*/
public static Certificate getCert() {
return new TestCertificate();
@@ -67,7 +67,7 @@
/**
* Returns an array of 3 test certificates. IMP: The array returned is not
- * reall chain of certificates, it's just an array of 3 certs. The method
+ * real chain of certificates, it's just an array of 3 certs. The method
* returns new array each time it's called. The number of 3 was chosen
* arbitrarily and is subject to change.
*
@@ -92,9 +92,9 @@
/**
* Generates and returns an instance of TestCertPath.
* TestCertificate-s included in the CertPath will be uniq (will have
- * diffrent numbers passed to their ctor-s).
+ * different numbers passed to their ctor-s).
* The second arguments shows which number will have the first Certificate
- * in the CertPath. The second sertificate will have (startID+1) nubmber
+ * in the CertPath. The second certificate will have (startID+1) number
* and so on.
*
* @param howMany - shows how many TestCerts must contain the CertPath generated
@@ -322,7 +322,7 @@
}
/**
- * A special purpose ctor. Pass different String-s to hava different TestCertificates.
+ * A special purpose ctor. Pass different String-s to have different TestCertificates.
* TestCertificate-s with the same String passed to this ctor are considered equal.
*/
public TestCertificate(String diff) {
@@ -609,7 +609,7 @@
* Tries to create an instance of TestX509Certificate, basing
* on the presumption that its {@link TestX509Certificate#getEncoded()
* encoded} form is stored.
- * @throws CertificateException is the presumtion is not met or if
+ * @throws CertificateException is the presumption is not met or if
* any IO problem occurs.
*/
public Certificate engineGenerateCertificate(InputStream is)
@@ -705,7 +705,7 @@
{ "John Doe", null, null, null },
// 'organisation unit'-s
{ null, "SSG", null, null }, { null, "SSG/DRL", null, null },
- // organisations
+ // organizations
{ null, null, "Intel ZAO", null },
{ null, null, "Intel Inc", null },
// countries
Index: src/test/support/common/java/org/apache/harmony/security/tests/support/IdentityStub.java
===================================================================
--- src/test/support/common/java/org/apache/harmony/security/tests/support/IdentityStub.java (revision 490317)
+++ src/test/support/common/java/org/apache/harmony/security/tests/support/IdentityStub.java (working copy)
@@ -63,7 +63,7 @@
}
/**
- * Auxilary constructor
+ * Auxiliary constructor
* @param name
* @param key
* @throws KeyManagementException
Index: src/main/java/unix/org/apache/harmony/security/provider/crypto/RandomBitsSupplier.java
===================================================================
--- src/main/java/unix/org/apache/harmony/security/provider/crypto/RandomBitsSupplier.java (revision 490317)
+++ src/main/java/unix/org/apache/harmony/security/provider/crypto/RandomBitsSupplier.java (working copy)
@@ -33,13 +33,13 @@
/**
- * The static class providing access on Linux paltform
+ * The static class providing access on Linux platform
* to system means for generating true random bits.
*
* The source for true random bits is one of Linux's devices "/dev/urandom/" or
- * "/dev/random" depends on which one is avalable; if both the first is used.
+ * "/dev/random" depends on which one is available; if both the first is used.
*
- * If no device available the service is not avilable,
+ * If no device available the service is not available,
* that is, provider shouldn't register the algorithm.
*/
Index: src/main/java/common/java/security/SecureClassLoader.java
===================================================================
--- src/main/java/common/java/security/SecureClassLoader.java (revision 490317)
+++ src/main/java/common/java/security/SecureClassLoader.java (working copy)
@@ -83,7 +83,7 @@
// Constructs and caches ProtectionDomain for the given CodeSource
// object.
- // It calls {@link getPermssions()} to get a set of permissions.
+ // It calls {@link getPermissions()} to get a set of permissions.
//
// @param cs CodeSource object
// @return ProtectionDomain for the passed CodeSource object
Index: src/main/java/common/java/security/KeyStore.java
===================================================================
--- src/main/java/common/java/security/KeyStore.java (revision 490317)
+++ src/main/java/common/java/security/KeyStore.java (working copy)
@@ -265,7 +265,7 @@
/**
*
*
- * 1.4.2 and 1.5 releases throw unspecified NullPointerExcedption
+ * 1.4.2 and 1.5 releases throw unspecified NullPointerException
* when alias is null
*/
public final void setCertificateEntry(String alias, Certificate cert)
@@ -282,7 +282,7 @@
/**
*
*
- * 1.4.2 and 1.5 releases throw NullPointerExcedption when alias is null
+ * 1.4.2 and 1.5 releases throw NullPointerException when alias is null
*/
public final void deleteEntry(String alias) throws KeyStoreException {
if (!isInit) {
@@ -453,7 +453,7 @@
/**
*
*
- * 1.5 release throws unspecified NullPointerExcedption when alias or
+ * 1.5 release throws unspecified NullPointerException when alias or
* entry is null
*/
public final void setEntry(String alias, Entry entry,
Index: src/main/java/common/java/security/AlgorithmParameters.java
===================================================================
--- src/main/java/common/java/security/AlgorithmParameters.java (revision 490317)
+++ src/main/java/common/java/security/AlgorithmParameters.java (working copy)
@@ -62,7 +62,7 @@
private String algorithm;
/**
- * The initialisation state
+ * The initialization state
*/
private boolean initialized; // = false;
Index: src/main/java/common/java/security/KeyPairGenerator.java
===================================================================
--- src/main/java/common/java/security/KeyPairGenerator.java (revision 490317)
+++ src/main/java/common/java/security/KeyPairGenerator.java (working copy)
@@ -44,7 +44,7 @@
// Store SecureRandom
private static SecureRandom random = new SecureRandom();
- // Store used ptovider
+ // Store used provider
private Provider provider;
// Store used algorithm
Index: src/main/java/common/java/security/DigestInputStream.java
===================================================================
--- src/main/java/common/java/security/DigestInputStream.java (revision 490317)
+++ src/main/java/common/java/security/DigestInputStream.java (working copy)
@@ -37,7 +37,7 @@
*/
protected MessageDigest digest;
- // Indicates wether digest functionality is on or off
+ // Indicates whether digest functionality is on or off
private boolean isOn = true;
/**
@@ -78,7 +78,7 @@
/**
* Reads the next byte and answers it as an int. Updates the digest for the
- * byte if this fuction is enabled.
+ * byte if this function is enabled.
*
*
* @return int the byte which was read or -1 at end of stream.
Index: src/main/java/common/java/security/DigestOutputStream.java
===================================================================
--- src/main/java/common/java/security/DigestOutputStream.java (revision 490317)
+++ src/main/java/common/java/security/DigestOutputStream.java (working copy)
@@ -37,7 +37,7 @@
*/
protected MessageDigest digest;
- // Indicates wether digest functionality is on or off
+ // Indicates whether digest functionality is on or off
private boolean isOn = true;
/**
Index: src/main/java/common/java/security/InvalidAlgorithmParameterException.java
===================================================================
--- src/main/java/common/java/security/InvalidAlgorithmParameterException.java (revision 490317)
+++ src/main/java/common/java/security/InvalidAlgorithmParameterException.java (working copy)
@@ -23,7 +23,7 @@
package java.security;
/**
- * This class represents invalid algorithm parameters to cryprographic services.
+ * This class represents invalid algorithm parameters to cryptographic services.
*
*/
public class InvalidAlgorithmParameterException extends
Index: src/main/java/common/java/security/UnresolvedPermission.java
===================================================================
--- src/main/java/common/java/security/UnresolvedPermission.java (revision 490317)
+++ src/main/java/common/java/security/UnresolvedPermission.java (working copy)
@@ -269,7 +269,7 @@
* signers. If it does, a zero, one, and/or two-argument constructor is
* tried to instantiate a new permission, which is then returned.
* If an appropriate constructor is not available or the class is
- * improperrly signed, null is returned.
+ * improperly signed, null is returned.
*
* @param targetType - a target class instance, must not be
* null
Index: src/main/java/common/java/security/Security.java
===================================================================
--- src/main/java/common/java/security/Security.java (revision 490317)
+++ src/main/java/common/java/security/Security.java (working copy)
@@ -50,9 +50,9 @@
// Security properties
private static Properties secprops = new Properties();
- // static inicialization
+ // static initialization
// - load security properties files
- // - load staticaly registered providers
+ // - load statically registered providers
// - if no provider description file found then load default providers
static {
AccessController.doPrivileged(new java.security.PrivilegedAction() {
@@ -74,7 +74,7 @@
}
}
- if ("true".equalsIgnoreCase(secprops.getProperty("security.allowCustomePropertiesFile", "true"))) { //$NON-NLS-1$ //$NON-NLS-2$ //$NON-NLS-3$
+ if ("true".equalsIgnoreCase(secprops.getProperty("security.allowCustomPropertiesFile", "true"))) { //$NON-NLS-1$ //$NON-NLS-2$ //$NON-NLS-3$
String securityFile = System.getProperty("java.security.properties"); //$NON-NLS-1$
if (securityFile != null) {
if (securityFile.startsWith("=")) { // overwrite //$NON-NLS-1$
@@ -164,7 +164,7 @@
int position) {
// check security access; check that provider is not already
// installed, else return -1; if (position <1) or (position > max
- // position) position = max position + 1; insert provider, shifte up
+ // position) position = max position + 1; insert provider, shift up
// one position for next providers; Note: The position is 1-based
SecurityManager sm = System.getSecurityManager();
if (sm != null) {
@@ -198,7 +198,7 @@
public static synchronized void removeProvider(String name) {
// It is not clear from spec.:
// 1. if name is null, should we checkSecurityAccess or not?
- // throw SecurityExeption or not?
+ // throw SecurityException or not?
// 2. as 1 but provider is not installed
// 3. behavior if name is empty string?
Index: src/main/java/common/java/security/Permissions.java
===================================================================
--- src/main/java/common/java/security/Permissions.java (revision 490317)
+++ src/main/java/common/java/security/Permissions.java (working copy)
@@ -182,7 +182,7 @@
*/
public boolean implies(Permission permission) {
if (permission == null) {
- // RI compartible
+ // RI compatible
throw new NullPointerException(Messages.getString("security.21")); //$NON-NLS-1$
}
if (allEnabled) {
Index: src/main/java/common/java/security/CodeSource.java
===================================================================
--- src/main/java/common/java/security/CodeSource.java (revision 490317)
+++ src/main/java/common/java/security/CodeSource.java (working copy)
@@ -57,7 +57,7 @@
// Array of CodeSigners
private transient CodeSigner[] signers;
- // SocketPermission() in implies() method takes tooooooooo many time.
+ // SocketPermission() in implies() method takes to many time.
// Need to cache it for better performance.
private transient SocketPermission sp;
@@ -198,12 +198,12 @@
//
// So the following loop scans trough the certs and checks
// that every next certificate is an Issuer of the previous one.
- // Any certificate that is not an Issuer of the previos one starts a
+ // Any certificate that is not an Issuer of the previous one starts a
// new chain (== a new CertPath)
for (int i = 0; i < certs.length; i++) {
if (!(certs[i] instanceof X509Certificate)) {
- // Only X509CErtificate-s are taken into account - see API spec.
+ // Only X509Certificate-s are taken into account - see API spec.
continue;
}
X509Certificate x509 = (X509Certificate) certs[i];
@@ -368,7 +368,7 @@
.length() == 0 || "localhost".equals(thatHost))) //$NON-NLS-1$
&& !thisHost.equals(thatHost)) {
- // Obvious, but veeery slooooow waaaaaaay....
+ // Obvious, but very slow way....
//
// SocketPermission thisPerm = new SocketPermission(
// this.location.getHost(), "resolve");
Index: src/main/java/common/java/security/KeyRep.java
===================================================================
--- src/main/java/common/java/security/KeyRep.java (revision 490317)
+++ src/main/java/common/java/security/KeyRep.java (working copy)
@@ -128,7 +128,7 @@
throw new NotSerializableException(Messages.getString("security.0E", type)); //$NON-NLS-1$
}
- // Makes deffensive copy of key encoding
+ // Makes defensive copy of key encoding
private void readObject(ObjectInputStream is)
throws IOException, ClassNotFoundException {
is.defaultReadObject();
Index: src/main/java/common/java/security/cert/PKIXParameters.java
===================================================================
--- src/main/java/common/java/security/cert/PKIXParameters.java (revision 490317)
+++ src/main/java/common/java/security/cert/PKIXParameters.java (working copy)
@@ -47,7 +47,7 @@
private Set initialPolicies;
// List of cert stores that used to find certificates and CRLs
private List certStores;
- // Time for which the valididty of the certification
+ // Time for which the validity of the certification
// patch should be determined
private Date date;
// List of certification patch checkers (PKIXCertPathChecker)
@@ -56,15 +56,15 @@
private String sigProvider;
// Required constraints on the target certificate
private CertSelector targetCertConstraints;
- // Indicates wether cert revocation is enabled or not
+ // Indicates whether cert revocation is enabled or not
private boolean revocationEnabled = true;
- // Indicates wether explicit policy required or not
+ // Indicates whether explicit policy required or not
private boolean explicitPolicyRequired = false;
- // Indicates wether policy mapping inhibited or not
+ // Indicates whether policy mapping inhibited or not
private boolean policyMappingInhibited = false;
- // Indicates wether any policy inhibited or not
+ // Indicates whether any policy inhibited or not
private boolean anyPolicyInhibited = false;
- // Indicates wether certificates that include policy
+ // Indicates whether certificates that include policy
// qualifiers in a certificate policies extension that
// is marked critical must be rejected or not
private boolean policyQualifiersRejected = true;
Index: src/main/java/common/java/security/cert/CertificateFactory.java
===================================================================
--- src/main/java/common/java/security/cert/CertificateFactory.java (revision 490317)
+++ src/main/java/common/java/security/cert/CertificateFactory.java (working copy)
@@ -120,7 +120,7 @@
* Answers a new CertificateFactory of the given type.
*
* @param type
- * java.lang.String Type of certificatem desired
+ * java.lang.String Type of certificate desired
* @param provider
* java.security.Provider Provider which has to implement the
* algorithm
Index: src/main/java/common/java/security/cert/X509CertSelector.java
===================================================================
--- src/main/java/common/java/security/cert/X509CertSelector.java (revision 490317)
+++ src/main/java/common/java/security/cert/X509CertSelector.java (working copy)
@@ -56,7 +56,7 @@
*/
public class X509CertSelector implements CertSelector {
- // match criterias
+ // match criteria
private X509Certificate certificateEquals;
private BigInteger serialNumber;
private X500Principal issuer;
Index: src/main/java/common/java/security/ProtectionDomain.java
===================================================================
--- src/main/java/common/java/security/ProtectionDomain.java (revision 490317)
+++ src/main/java/common/java/security/ProtectionDomain.java (working copy)
@@ -48,7 +48,7 @@
private boolean dynamicPerms;
/**
- * Contructs a protection domain from the given code source and the
+ * Constructs a protection domain from the given code source and the
* permissions that that should be granted to the classes which are
* encapsulated in it.
* @param cs
@@ -66,7 +66,7 @@
}
/**
- * Contructs a protection domain from the given code source and the
+ * Constructs a protection domain from the given code source and the
* permissions that that should be granted to the classes which are
* encapsulated in it.
*
@@ -162,7 +162,7 @@
}
// ... and we get here if
- // either the permissiona are static
+ // either the permissions are static
// or Policy.implies() did not check for static permissions
// or the permission is not implied
return permissions == null ? false : permissions.implies(permission);
Index: src/main/java/common/java/security/Signature.java
===================================================================
--- src/main/java/common/java/security/Signature.java (revision 490317)
+++ src/main/java/common/java/security/Signature.java (working copy)
@@ -437,7 +437,7 @@
private SignatureSpi spiImpl;
- // Consructor
+ // Constructor
public SignatureImpl(SignatureSpi signatureSpi, Provider provider,
String algorithm) {
super(algorithm);
Index: src/main/java/common/java/security/spec/ECFieldF2m.java
===================================================================
--- src/main/java/common/java/security/spec/ECFieldF2m.java (revision 490317)
+++ src/main/java/common/java/security/spec/ECFieldF2m.java (working copy)
@@ -160,7 +160,7 @@
return true;
}
} else {
- // at least this field with polinomial basis
+ // at least this field with polynomial basis
// check that rp match
// return this.rp.equals(o.rp);
return Arrays.equals(this.ks, o.ks);
Index: src/main/java/common/java/security/spec/RSAMultiPrimePrivateCrtKeySpec.java
===================================================================
--- src/main/java/common/java/security/spec/RSAMultiPrimePrivateCrtKeySpec.java (revision 490317)
+++ src/main/java/common/java/security/spec/RSAMultiPrimePrivateCrtKeySpec.java (working copy)
@@ -93,7 +93,7 @@
throw new IllegalArgumentException(
Messages.getString("security.85")); //$NON-NLS-1$
}
- // Clone array to prevent subsecuent modification
+ // Clone array to prevent subsequent modification
this.otherPrimeInfo = new RSAOtherPrimeInfo[otherPrimeInfo.length];
System.arraycopy(otherPrimeInfo, 0,
this.otherPrimeInfo, 0, this.otherPrimeInfo.length);
@@ -119,7 +119,7 @@
* @com.intel.drl.spec_ref
*/
public RSAOtherPrimeInfo[] getOtherPrimeInfo() {
- // Clone array (if not null) to prevent subsecuent modification
+ // Clone array (if not null) to prevent subsequent modification
if (otherPrimeInfo == null) {
return null;
} else {
Index: src/main/java/common/org/apache/harmony/security/provider/crypto/DSAPublicKeyImpl.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/provider/crypto/DSAPublicKeyImpl.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/provider/crypto/DSAPublicKeyImpl.java (working copy)
@@ -19,7 +19,7 @@
* TODO
* 1. The class extends the PublicKeyImpl class in "org.apache.harmony.security" package.
*
- * 2. The class uses methods in the auxilliary non-public "ThreeIntegerSequence" class
+ * 2. The class uses methods in the auxiliary non-public "ThreeIntegerSequence" class
* defined along with the "DSAPrivateKeyImpl" class.
*
* 3. See a compatibility with RI comments
Index: src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1_MessageDigestImpl.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1_MessageDigestImpl.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1_MessageDigestImpl.java (working copy)
@@ -282,7 +282,7 @@
/**
* Updates current message.
*
- * The method overrides "engineUpdate(byte[],intint)" in class MessageDigestSpi.
+ * The method overrides "engineUpdate(byte[],int,int)" in class MessageDigestSpi.
*
* The method silently returns if "len" <= 0.
*
Index: src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1withDSA_SignatureImpl.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1withDSA_SignatureImpl.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1withDSA_SignatureImpl.java (working copy)
@@ -306,7 +306,7 @@
* Updates data to sign or to verify.
*
* @params
- * b byte array containg bytes to update
+ * b byte array containing bytes to update
* @params
* off offset in byte array to start from
* @params
@@ -421,7 +421,7 @@
* @params
* offset index in sigBytes to start from
* @params
- * length number of bytes alotted for signature
+ * length number of bytes allotted for signature
* @return
* true if signature bytes were verified, false otherwise
* @throws
Index: src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1PRNG_SecureRandomImpl.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1PRNG_SecureRandomImpl.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1PRNG_SecureRandomImpl.java (working copy)
@@ -34,8 +34,8 @@
* This class extends the SecureRandomSpi class implementing all its abstract methods.
*
* To generate pseudo-random bits, the implementation uses technique described in
- * the "Random Number Generator (RNG) algoritms" section, Appendix A,
- * JavaTM Cryptography Architecure, API Specification&Reference
+ * the "Random Number Generator (RNG) algorithm" section, Appendix A,
+ * JavaTM Cryptography Architecture, API Specification&Reference
*
* The class implements the Serializable interface.
*/
@@ -73,7 +73,7 @@
// value of 16 defined in the "SECURE HASH STANDARD", FIPS PUB 180-2
private static final int FRAME_LENGTH = 16;
- // miscellanous constans defined in this implementation:
+ // miscellaneous constants defined in this implementation:
// COUNTER_BASE - initial value to set to "counter" before computing "nextBytes(..)";
// note, that the exact value is not defined in STANDARD
// HASHCOPY_OFFSET - offset for copy of current hash in "copies" array
@@ -138,7 +138,7 @@
// The "seed" array is used to compute both "current seed hash" and "next bytes".
//
- // As the "SHA1" algorithm computes a hash of entire seed by spletting it into
+ // As the "SHA1" algorithm computes a hash of entire seed by splitting it into
// a number of the 512-bit length frames (512 bits = 64 bytes = 16 words),
// "current seed hash" is a hash (5 words, 20 bytes) for all previous full frames;
// remaining bytes are stored in the 0-15 word frame of the "seed" array.
@@ -194,7 +194,7 @@
/**
* Changes current seed by supplementing a seed argument to the current seed,
* if this already set;
- * the argument is used as first seed othewise.
+ * the argument is used as first seed otherwise.
*
* The method overrides "engineSetSeed(byte[])" in class SecureRandomSpi.
*
@@ -257,7 +257,7 @@
}
/**
- * Writes random bytes into an array suppied.
+ * Writes random bytes into an array supplied.
* Bits in a byte are from left to right.
*
* To generate random bytes, the "expansion of source bits" method is used,
Index: src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1Impl.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1Impl.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1Impl.java (working copy)
@@ -82,7 +82,7 @@
int temp;
// In this implementation the "d. For t = 0 to 79 do" loop
- // is splet into four loops. The following constans:
+ // is split into four loops. The following constants:
// K = 5A827999 0 <= t <= 19
// K = 6ED9EBA1 20 <= t <= 39
// K = 8F1BBCDC 40 <= t <= 59
Index: src/main/java/common/org/apache/harmony/security/provider/crypto/ThreeIntegerSequence.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/provider/crypto/ThreeIntegerSequence.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/provider/crypto/ThreeIntegerSequence.java (working copy)
@@ -25,8 +25,8 @@
/**
- * The auxilliary class providing means to process ASN1Sequence of three Integers.
- * Such sequenies are parts of ASN1 encoded formats for DSA private and public keys.
+ * The auxiliary class providing means to process ASN1Sequence of three Integers.
+ * Such sequences are parts of ASN1 encoded formats for DSA private and public keys.
*/
class ThreeIntegerSequence {
Index: src/main/java/common/org/apache/harmony/security/provider/cert/Cache.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/provider/cert/Cache.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/provider/cert/Cache.java (working copy)
@@ -66,7 +66,7 @@
* if not - new object should be generated and saved in the cache.
*
* Note: The length of the prefixes of the encoded forms should not be
- * less than correspondance (default value is 28).
+ * less than correspondence (default value is 28).
*/
public class Cache {
@@ -125,7 +125,7 @@
/**
* Creates the Cache object.
- * @param pref_size specifyes how many leading/trailing bytes of object's
+ * @param pref_size specifies how many leading/trailing bytes of object's
* encoded form will be used for hash computation
* @param size capacity of the cache to be created.
*/
@@ -140,7 +140,7 @@
/**
* Creates the Cache object of size of 900.
- * @param pref_size specifyes how many leading/trailing bytes of object's
+ * @param pref_size specifies how many leading/trailing bytes of object's
* encoded form will be used for hash computation
*/
public Cache(int pref_size) {
Index: src/main/java/common/org/apache/harmony/security/provider/cert/X509CertImpl.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/provider/cert/X509CertImpl.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/provider/cert/X509CertImpl.java (working copy)
@@ -497,7 +497,7 @@
SignatureException {
Signature signature = Signature.getInstance(getSigAlgName());
signature.initVerify(key);
- // retrieve the ecnoding of the TBSCertificate structure
+ // retrieve the encoding of the TBSCertificate structure
if (tbsCertificate == null) {
tbsCertificate = tbsCert.getEncoded();
}
@@ -520,7 +520,7 @@
Signature signature =
Signature.getInstance(getSigAlgName(), sigProvider);
signature.initVerify(key);
- // retrieve the ecnoding of the TBSCertificate structure
+ // retrieve the encoding of the TBSCertificate structure
if (tbsCertificate == null) {
tbsCertificate = tbsCert.getEncoded();
}
Index: src/main/java/common/org/apache/harmony/security/x501/AttributeValue.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x501/AttributeValue.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x501/AttributeValue.java (working copy)
@@ -170,7 +170,7 @@
// Escapes:
// 1) chars ",", "+", """, "\", "<", ">", ";" (RFC 2253)
// 2) chars "#", "=" (required by RFC 1779)
- // 3) a space char at the beggining or end
+ // 3) a space char at the beginning or end
// 4) according to the requirement to be RFC 1779 compatible:
// '#' char is escaped in any position
//
Index: src/main/java/common/org/apache/harmony/security/x501/AttributeTypeAndValue.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x501/AttributeTypeAndValue.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x501/AttributeTypeAndValue.java (working copy)
@@ -48,7 +48,7 @@
// Country code attribute (name from RFC 1779)
private static final ObjectIdentifier C;
- // Common name attributem (name from RFC 1779)
+ // Common name attribute (name from RFC 1779)
private static final ObjectIdentifier CN;
// Domain component attribute (name from RFC 2253)
@@ -97,7 +97,7 @@
// (name from API spec)
private static final ObjectIdentifier SURNAME;
- // Title attribute (object in an organzation)(name from API spec)
+ // Title attribute (object in an organization)(name from API spec)
private static final ObjectIdentifier T;
// User identifier attribute (name from RFC 2253)
Index: src/main/java/common/org/apache/harmony/security/x501/DirectoryString.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x501/DirectoryString.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x501/DirectoryString.java (working copy)
@@ -29,7 +29,7 @@
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with the DirectoryString structure
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/SystemScope.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/SystemScope.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/SystemScope.java (working copy)
@@ -128,7 +128,7 @@
public synchronized void removeIdentity(Identity identity)
throws KeyManagementException {
- //Exception catched = null;
+ //Exception caught = null;
if (identity == null) {
throw new NullPointerException(Messages.getString("security.92")); //$NON-NLS-1$
}
Index: src/main/java/common/org/apache/harmony/security/utils/ObjectIdentifier.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/utils/ObjectIdentifier.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/utils/ObjectIdentifier.java (working copy)
@@ -60,7 +60,7 @@
private Object group;
/**
- * Creats ObjectIdentifier(OID) from array of integers.
+ * Creates ObjectIdentifier(OID) from array of integers.
*
* @param oid - array of integers
* @return - OID object
@@ -75,7 +75,7 @@
}
/**
- * Creats ObjectIdentifier(OID) from array of integers.
+ * Creates ObjectIdentifier(OID) from array of integers.
*
* @param oid - array of integers
* @param name - name of OID
Index: src/main/java/common/org/apache/harmony/security/asn1/ASN1Constants.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/asn1/ASN1Constants.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/asn1/ASN1Constants.java (working copy)
@@ -37,7 +37,7 @@
int CLASS_PRIVATE = 192;
/**
- * Tag Primitive/Conctructed (P/C) flag
+ * Tag Primitive/Constructed (P/C) flag
*/
int PC_PRIMITIVE = 0;
int PC_CONSTRUCTED = 32;
Index: src/main/java/common/org/apache/harmony/security/asn1/ObjectIdentifier.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/asn1/ObjectIdentifier.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/asn1/ObjectIdentifier.java (working copy)
@@ -50,7 +50,7 @@
private String soid;
/**
- * Creats ObjectIdentifier(OID) from array of integers.
+ * Creates ObjectIdentifier(OID) from array of integers.
*
* @param oid - array of integers
* @throws IllegalArgumentException - if oid is invalid or null
@@ -61,7 +61,7 @@
}
/**
- * Creats ObjectIdentifier(OID) from string representation.
+ * Creates ObjectIdentifier(OID) from string representation.
*
* @param strOid - oid string
* @throws IllegalArgumentException - if oid string is invalid or null
Index: src/main/java/common/org/apache/harmony/security/asn1/ASN1GeneralizedTime.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/asn1/ASN1GeneralizedTime.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/asn1/ASN1GeneralizedTime.java (working copy)
@@ -94,7 +94,7 @@
//
// According to X.680:
// four digit year, seconds always presented
- // and fractional-secons elements without
+ // and fractional-seconds elements without
// trailing 0's (must be cut later from content)
private final static String GEN_PATTERN = "yyyyMMddHHmmss.SSS"; //$NON-NLS-1$
Index: src/main/java/common/org/apache/harmony/security/asn1/BerInputStream.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/asn1/BerInputStream.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/asn1/BerInputStream.java (working copy)
@@ -83,7 +83,7 @@
* @param offset -
* the encoding offset
* @param expectedLength -
- * expeced length of full encoding, this includes identifier,
+ * expected length of full encoding, this includes identifier,
* length an content octets
* @throws IOException -
* if an error occurs
@@ -131,7 +131,7 @@
if (length != INDEFINIT_LENGTH) {
// input stream has definite length encoding
- // check allocated length to avoid futher reallocations
+ // check allocated length to avoid father reallocations
if (buffer.length < length) {
byte[] newBuffer = new byte[length];
System.arraycopy(buffer, 0, newBuffer, 0, offset);
@@ -443,7 +443,7 @@
// FIXME: any other optimizations?
readContent();
- // FIXME store string somewhare to allow a custom time type perform
+ // FIXME store string somewhere to allow a custom time type perform
// additional checks
// check syntax: the last char MUST be Z
@@ -869,7 +869,7 @@
}
/**
- * Indicates defined or indefined reading mode for assosiated InputStream.
+ * Indicates defined or indefined reading mode for associated InputStream.
*
* This mode is defined by reading a length
* for a first ASN.1 type from InputStream.
Index: src/main/java/common/org/apache/harmony/security/asn1/DerInputStream.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/asn1/DerInputStream.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/asn1/DerInputStream.java (working copy)
@@ -132,7 +132,7 @@
public void readSetOf(ASN1SetOf setOf) throws IOException {
//
// According to ASN.1 DER spec. set of MUST appear in
- // ascending order (short component are padded for comparision)
+ // ascending order (short component are padded for comparison)
//
// Verification of this assertion is not implemented
//
Index: src/main/java/common/org/apache/harmony/security/asn1/ASN1Constructured.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/asn1/ASN1Constructured.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/asn1/ASN1Constructured.java (working copy)
@@ -24,7 +24,7 @@
/**
- * This abstract class is the super class for all constructured ASN.1 types
+ * This abstract class is the super class for all constructed ASN.1 types
*
* @see http://asn1.elibel.tm.fr/en/standards/index.htm
*/
Index: src/main/java/common/org/apache/harmony/security/asn1/ASN1UTCTime.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/asn1/ASN1UTCTime.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/asn1/ASN1UTCTime.java (working copy)
@@ -112,7 +112,7 @@
//
// According to X.680 coordinated universal time format:
// two digit year, seconds always presented,
- // no fractional-secons elements, 'Z' at the end
+ // no fractional-seconds elements, 'Z' at the end
private final static String UTC_PATTERN = "yyMMddHHmmss'Z'"; //$NON-NLS-1$
public void setEncodingContent(BerOutputStream out) {
Index: src/main/java/common/org/apache/harmony/security/x509/Extensions.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/Extensions.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/Extensions.java (working copy)
@@ -39,7 +39,7 @@
import org.apache.harmony.security.asn1.BerInputStream;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with the Extensions part of X.509 certificate
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
@@ -175,7 +175,7 @@
/**
* Returns the value of Key Usage extension (OID == 2.5.29.15).
- * The ASN.1 definitionn of Key Usage Extension is:
+ * The ASN.1 definition of Key Usage Extension is:
*
*
* id-ce-keyUsage OBJECT IDENTIFIER ::= { id-ce 15 }
@@ -196,7 +196,7 @@
*
* @return the value of Key Usage Extension if it is in the list,
* and null if there is no such extension or its value can not be decoded
- * otherwithe. Note, that the length of returned array can be greater
+ * otherwise. Note, that the length of returned array can be greater
* than 9.
*/
public boolean[] valueOfKeyUsage() {
@@ -210,7 +210,7 @@
/**
* Returns the value of Extended Key Usage extension (OID == 2.5.29.37).
- * The ASN.1 definitionn of Extended Key Usage Extension is:
+ * The ASN.1 definition of Extended Key Usage Extension is:
*
*
* id-ce-extKeyUsage OBJECT IDENTIFIER ::= { id-ce 37 }
@@ -236,7 +236,7 @@
/**
* Returns the value of Basic Constraints Extension (OID = 2.5.29.19).
- * The ASN.1 definitionn of Basic Constraints Extension is:
+ * The ASN.1 definition of Basic Constraints Extension is:
*
*
* id-ce-basicConstraints OBJECT IDENTIFIER ::= { id-ce 19 }
@@ -263,7 +263,7 @@
/**
* Returns the value of Subject Alternative Name (OID = 2.5.29.17).
- * The ASN.1 definitionn for Subject Alternative Name is:
+ * The ASN.1 definition for Subject Alternative Name is:
*
*
* id-ce-subjectAltName OBJECT IDENTIFIER ::= { id-ce 17 }
@@ -287,7 +287,7 @@
/**
* Returns the value of Issuer Alternative Name Extension (OID = 2.5.29.18).
- * The ASN.1 definitionn for Issuer Alternative Name is:
+ * The ASN.1 definition for Issuer Alternative Name is:
*
*
* id-ce-issuerAltName OBJECT IDENTIFIER ::= { id-ce 18 }
Index: src/main/java/common/org/apache/harmony/security/x509/TBSCertList.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/TBSCertList.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/TBSCertList.java (working copy)
@@ -41,7 +41,7 @@
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with TBSCertList structure which is the part of X.509 CRL
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
@@ -159,7 +159,7 @@
* into the StringBuffer object.
*/
public void dumpValue(StringBuffer buffer, String prefix) {
- buffer.append(prefix).append("Certificae Serial Number: ") //$NON-NLS-1$
+ buffer.append(prefix).append("Certificate Serial Number: ") //$NON-NLS-1$
.append(userCertificate).append('\n');
buffer.append(prefix).append("Revocation Date: ") //$NON-NLS-1$
.append(revocationDate);
Index: src/main/java/common/org/apache/harmony/security/x509/AccessDescription.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/AccessDescription.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/AccessDescription.java (working copy)
@@ -24,7 +24,7 @@
import org.apache.harmony.security.asn1.ObjectIdentifier;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with the AccessDescription which is a part of X.509 framework
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/PolicyInformation.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/PolicyInformation.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/PolicyInformation.java (working copy)
@@ -30,7 +30,7 @@
import org.apache.harmony.security.asn1.ObjectIdentifier;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with PolicyInformation structure which is a subpart of certificatePolicies
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/GeneralSubtree.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/GeneralSubtree.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/GeneralSubtree.java (working copy)
@@ -29,7 +29,7 @@
import org.apache.harmony.security.asn1.BerInputStream;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with the GeneralSubtree structure which is a part of X.509 certificate:
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/CertificatePolicies.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/CertificatePolicies.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/CertificatePolicies.java (working copy)
@@ -33,7 +33,7 @@
import org.apache.harmony.security.asn1.BerInputStream;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with Certificate Policies structure which is a part of X.509 certificate
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/PrivateKeyUsagePeriod.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/PrivateKeyUsagePeriod.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/PrivateKeyUsagePeriod.java (working copy)
@@ -31,7 +31,7 @@
import org.apache.harmony.security.asn1.BerInputStream;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with the following certificate extension (OID: 2.5.29.16)
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/SubjectKeyIdentifier.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/SubjectKeyIdentifier.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/SubjectKeyIdentifier.java (working copy)
@@ -25,7 +25,7 @@
/**
* Subject Key Identifier Extension (OID = 2.5.29.14).
*
- * The ASN.1 definitionn for extension is:
+ * The ASN.1 definition for extension is:
*
*
* id-ce-subjectKeyIdentifier OBJECT IDENTIFIER ::= { id-ce 14 }
Index: src/main/java/common/org/apache/harmony/security/x509/Extension.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/Extension.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/Extension.java (working copy)
@@ -35,7 +35,7 @@
import org.apache.harmony.security.utils.Array;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with the Extension part of X.509 certificate
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/CRLDistributionPoints.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/CRLDistributionPoints.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/CRLDistributionPoints.java (working copy)
@@ -33,7 +33,7 @@
import org.apache.harmony.security.internal.nls.Messages;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with the CRL Distribution Points which is the part of X.509 Certificate
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/CertificateIssuer.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/CertificateIssuer.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/CertificateIssuer.java (working copy)
@@ -34,7 +34,7 @@
* certificateIssuer ::= GeneralNames
*
* (as specified in RFC 3280)
- * In java implementation it is presumed that GeneralNames cansist of
+ * In java implementation it is presumed that GeneralNames consist of
* one element and its type is directoryName.
*/
public class CertificateIssuer extends ExtensionValue {
Index: src/main/java/common/org/apache/harmony/security/x509/CertificateList.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/CertificateList.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/CertificateList.java (working copy)
@@ -30,7 +30,7 @@
import org.apache.harmony.security.utils.Array;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with the X.509 CRL. Its ASN notation is as follows
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/EDIPartyName.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/EDIPartyName.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/EDIPartyName.java (working copy)
@@ -29,7 +29,7 @@
import org.apache.harmony.security.x501.DirectoryString;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with the following structure which is a subpart of GeneralName
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/Certificate.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/Certificate.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/Certificate.java (working copy)
@@ -30,7 +30,7 @@
import org.apache.harmony.security.utils.Array;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with the X.509 certificate. Its ASN notation is as follows
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/InfoAccessSyntax.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/InfoAccessSyntax.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/InfoAccessSyntax.java (working copy)
@@ -29,7 +29,7 @@
import org.apache.harmony.security.internal.nls.Messages;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with the SubjectInfoAccessSyntax and AuthorityInfoAccessSyntax
* which are a part of X.509 framework
* (as specified in RFC 3280 -
Index: src/main/java/common/org/apache/harmony/security/x509/Validity.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/Validity.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/Validity.java (working copy)
@@ -29,7 +29,7 @@
import org.apache.harmony.security.asn1.BerInputStream;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with Validity structure which is the part of X.509 certificate
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/PolicyConstraints.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/PolicyConstraints.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/PolicyConstraints.java (working copy)
@@ -32,7 +32,7 @@
import org.apache.harmony.security.asn1.BerInputStream;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with PolicyConstraints structure which is a part of X.509 certificate
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/AlgorithmIdentifier.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/AlgorithmIdentifier.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/AlgorithmIdentifier.java (working copy)
@@ -34,7 +34,7 @@
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with the Algorithm Identifier which is a part of X.509 certificate
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/GeneralSubtrees.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/GeneralSubtrees.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/GeneralSubtrees.java (working copy)
@@ -31,7 +31,7 @@
import org.apache.harmony.security.asn1.BerInputStream;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with the GeneralSubtrees structure which is a part of X.509 certificate:
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/GeneralNames.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/GeneralNames.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/GeneralNames.java (working copy)
@@ -33,7 +33,7 @@
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with the GeneralNames structure which is a part of X.509 certificate
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/ReasonFlags.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/ReasonFlags.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/ReasonFlags.java (working copy)
@@ -29,7 +29,7 @@
import org.apache.harmony.security.asn1.BerOutputStream;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with the following part of X.509 CRL
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/AuthorityKeyIdentifier.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/AuthorityKeyIdentifier.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/AuthorityKeyIdentifier.java (working copy)
@@ -34,7 +34,7 @@
import org.apache.harmony.security.utils.Array;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with Authority Key Identifier Extension (OID = 2.5.29.35).
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/NameConstraints.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/NameConstraints.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/NameConstraints.java (working copy)
@@ -36,7 +36,7 @@
import org.apache.harmony.security.internal.nls.Messages;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with the following structure which is a part of X.509 certificate
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
@@ -184,7 +184,7 @@
* names of specified X509Certificate. Restrictions apply only
* if specified name form is present in the certificate.
* The restrictions are applied according the RFC 3280
- * (see 4.2.1.11 Name Constraints), exepting that restricions are applied
+ * (see 4.2.1.11 Name Constraints), excepting that restrictions are applied
* and to CA certificates, and to certificates which issuer and subject
* names the same (i.e. method does not check if it CA's certificate or not,
* or if the names differ or not. This check if it is needed should be done
@@ -250,7 +250,7 @@
}
}
}
- // Search the name in permitred names
+ // Search the name in permitted names
// (if we already found the name of such type between the alt
// names - we do not need to check others)
if ((permitted_names[type] != null) && (!permitted_found[type])) {
Index: src/main/java/common/org/apache/harmony/security/x509/BasicConstraints.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/BasicConstraints.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/BasicConstraints.java (working copy)
@@ -28,7 +28,7 @@
/**
* Basic Constraints Extension (OID == 2.5.29.19).
*
- * The ASN.1 definitionn for Basic Constraints Extension is:
+ * The ASN.1 definition for Basic Constraints Extension is:
*
*
* id-ce-basicConstraints OBJECT IDENTIFIER ::= { id-ce 19 }
Index: src/main/java/common/org/apache/harmony/security/x509/KeyUsage.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/KeyUsage.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/KeyUsage.java (working copy)
@@ -24,7 +24,7 @@
/**
* Key Usage Extension (OID = 2.5.29.15).
*
- * The ASN.1 definitionn for Key Usage Extension is:
+ * The ASN.1 definition for Key Usage Extension is:
*
*
* id-ce-keyUsage OBJECT IDENTIFIER ::= { id-ce 15 }
Index: src/main/java/common/org/apache/harmony/security/x509/PolicyQualifierInfo.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/PolicyQualifierInfo.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/PolicyQualifierInfo.java (working copy)
@@ -30,7 +30,7 @@
/**
/**
- * The class incapsulates the ASN.1 DER decoding work
+ * The class encapsulates the ASN.1 DER decoding work
* with PolicyQualifierInfo structure
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/GeneralName.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/GeneralName.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/GeneralName.java (working copy)
@@ -44,7 +44,7 @@
import org.apache.harmony.security.x501.Name;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with the GeneralName structure which is a part of X.509 certificate
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
@@ -333,7 +333,7 @@
* The name is acceptable if it has the same type name and its
* name value is equal to name value of this object. Also the name
* is acceptable if this general name object is a part of name
- * constrants and the specified name is satisfied the restriction
+ * constraints and the specified name is satisfied the restriction
* provided by this object (for more detail see section 4.2.1.11
* of rfc 3280).
* Note that for X400Address [3] check procedure is unclear so method
@@ -428,7 +428,7 @@
/**
* Gets a list representation of this GeneralName object.
- * The first entry of the list is an Iteger object representing
+ * The first entry of the list is an Integer object representing
* the type of mane (0-8), and the second entry is a value of the name:
* string or ASN.1 DER encoded form depending on the type as follows:
* rfc822Name, dNSName, uniformResourceIdentifier names are returned
@@ -820,7 +820,7 @@
* pieces of the address.
* If the length is 8 or 32 then it represents an address range (RFC 1519)
* and the output String will contain 2 IP address divided by "/"
- * @return Stringe representation of ip address
+ * @return String representation of ip address
*/
public static String ipBytesToStr(byte[] ip) {
String result = ""; //$NON-NLS-1$
Index: src/main/java/common/org/apache/harmony/security/x509/OtherName.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/OtherName.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/OtherName.java (working copy)
@@ -31,7 +31,7 @@
import org.apache.harmony.security.asn1.ObjectIdentifier;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with OtherName structure which is a subpart of GeneralName
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/SubjectPublicKeyInfo.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/SubjectPublicKeyInfo.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/SubjectPublicKeyInfo.java (working copy)
@@ -34,7 +34,7 @@
import org.apache.harmony.security.utils.AlgNameMapper;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with the following structure which is a part of X.509 certificate
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/tsp/PKIFailureInfo.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/tsp/PKIFailureInfo.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/tsp/PKIFailureInfo.java (working copy)
@@ -48,7 +48,7 @@
-- the request cannot be handled due to system failure }
The value of PKIFailureInfo can take only one of the values,
- so it is represenred by an integer here.
+ so it is represented by an integer here.
*/
public enum PKIFailureInfo {
/**
Index: src/main/java/common/org/apache/harmony/security/x509/ORAddress.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/ORAddress.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/ORAddress.java (working copy)
@@ -27,7 +27,7 @@
import org.apache.harmony.security.asn1.BerInputStream;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with the ORAddress structure which is a part of X.509 certificate:
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/DistributionPoint.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/DistributionPoint.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/DistributionPoint.java (working copy)
@@ -32,8 +32,8 @@
import org.apache.harmony.security.internal.nls.Messages;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
- * with the DistributionPoint stucture which is the part of X.509 CRL
+ * The class encapsulates the ASN.1 DER encoding/decoding work
+ * with the DistributionPoint structure which is the part of X.509 CRL
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
* Certificate and Certificate Revocation List (CRL) Profile.
Index: src/main/java/common/org/apache/harmony/security/x509/TBSCertificate.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/TBSCertificate.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/TBSCertificate.java (working copy)
@@ -36,7 +36,7 @@
import org.apache.harmony.security.x501.Name;
/**
- * The class incapsulates the ASN.1 DER encoding/decoding work
+ * The class encapsulates the ASN.1 DER encoding/decoding work
* with TBSCertificate structure which is the part of X.509 certificate
* (as specified in RFC 3280 -
* Internet X.509 Public Key Infrastructure.
Index: src/main/java/common/org/apache/harmony/security/x509/ExtendedKeyUsage.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/x509/ExtendedKeyUsage.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/x509/ExtendedKeyUsage.java (working copy)
@@ -29,7 +29,7 @@
/**
* Extended Key Usage Extension (OID == 2.5.29.37).
*
- * The ASN.1 definitionn for Extended Key Usage Extension is:
+ * The ASN.1 definition for Extended Key Usage Extension is:
*
*
* id-ce-extKeyUsage OBJECT IDENTIFIER ::= { id-ce 37 }
Index: src/main/java/common/org/apache/harmony/security/fortress/DefaultPolicyParser.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/fortress/DefaultPolicyParser.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/fortress/DefaultPolicyParser.java (working copy)
@@ -239,8 +239,8 @@
/**
* Translates PermissionEntry token to Permission object.
- * First, it performs general expantion for non-null name and
- * properties expantion for non-null name, action
+ * First, it performs general expansion for non-null name and
+ * properties expansion for non-null name, action
* and signers.
* Then, it obtains signing Certificates(if any), tries to find a class specified by
* klass name and instantiate a corresponding permission object.
Index: src/main/java/common/org/apache/harmony/security/UnresolvedPrincipal.java
===================================================================
--- src/main/java/common/org/apache/harmony/security/UnresolvedPrincipal.java (revision 490317)
+++ src/main/java/common/org/apache/harmony/security/UnresolvedPrincipal.java (working copy)
@@ -55,7 +55,7 @@
/**
* Constructs a a new definition of a Principal with specified
* parameters.
- * @param klass fully qualified class name, may be wilcard
+ * @param klass fully qualified class name, may be wildcard
* @param name name of principal, may be wildcard
* @throws IllegalArgumentException if klass value
* is null or is empty string
@@ -70,7 +70,7 @@
}
/**
- * Returns name of a modelled Principal, or wildcard
+ * Returns name of a modeled Principal, or wildcard
* if any name is acceptable.
*/
public String getName() {
@@ -78,7 +78,7 @@
}
/**
- * Returns fully qualified class name of a modelled Principal,
+ * Returns fully qualified class name of a modeled Principal,
* or wildcard if any class is acceptable.
*/
public String getClassName() {
Index: src/main/java/windows/org/apache/harmony/security/provider/crypto/RandomBitsSupplier.java
===================================================================
--- src/main/java/windows/org/apache/harmony/security/provider/crypto/RandomBitsSupplier.java (revision 490317)
+++ src/main/java/windows/org/apache/harmony/security/provider/crypto/RandomBitsSupplier.java (working copy)
@@ -25,7 +25,7 @@
/**
- * The static class providing access on Windows paltform
+ * The static class providing access on Windows platform
* to system means for generating true random bits.
*
* It uses a native method to get the random bits from CryptGenRandom.