harmony-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From telli...@apache.org
Subject svn commit: r628049 - in /harmony/enhanced/classlib/trunk/modules: lang-management/src/main/java/java/lang/management/ security-kernel/src/main/java/java/security/ security/src/main/java/common/java/security/ text/src/main/java/java/text/
Date Fri, 15 Feb 2008 13:06:42 GMT
Author: tellison
Date: Fri Feb 15 05:06:41 2008
New Revision: 628049

URL: http://svn.apache.org/viewvc?rev=628049&view=rev
Log:
Fixing and formatting JavaDoc comments -- no functional changes.

Modified:
    harmony/enhanced/classlib/trunk/modules/lang-management/src/main/java/java/lang/management/RuntimeMXBean.java
    harmony/enhanced/classlib/trunk/modules/security-kernel/src/main/java/java/security/AccessController.java
    harmony/enhanced/classlib/trunk/modules/security/src/main/java/common/java/security/MessageDigest.java
    harmony/enhanced/classlib/trunk/modules/text/src/main/java/java/text/Bidi.java

Modified: harmony/enhanced/classlib/trunk/modules/lang-management/src/main/java/java/lang/management/RuntimeMXBean.java
URL: http://svn.apache.org/viewvc/harmony/enhanced/classlib/trunk/modules/lang-management/src/main/java/java/lang/management/RuntimeMXBean.java?rev=628049&r1=628048&r2=628049&view=diff
==============================================================================
--- harmony/enhanced/classlib/trunk/modules/lang-management/src/main/java/java/lang/management/RuntimeMXBean.java
(original)
+++ harmony/enhanced/classlib/trunk/modules/lang-management/src/main/java/java/lang/management/RuntimeMXBean.java
Fri Feb 15 05:06:41 2008
@@ -54,7 +54,7 @@
      * 
      * @return The class path.
      * @throws SecurityException if the
-     *         {@link SecurityManager#checkPropertiesAccess(String)} doesn't
+     *         {@link SecurityManager#checkPropertyAccess(String)} doesn't
      *         allow access.
      */
     String getClassPath();
@@ -79,7 +79,7 @@
      * 
      * @return The library path.
      * @throws SecurityException if the
-     *         {@link SecurityManager#checkPropertiesAccess(String)} doesn't
+     *         {@link SecurityManager#checkPropertyAccess(String)} doesn't
      *         allow access.
      */
     String getLibraryPath();
@@ -110,7 +110,7 @@
      * 
      * @return The JVM specification name.
      * @throws SecurityException if the
-     *         {@link SecurityManager#checkPropertiesAccess(String)} doesn't
+     *         {@link SecurityManager#checkPropertyAccess(String)} doesn't
      *         allow access.
      */
     String getSpecName();
@@ -123,7 +123,7 @@
      * 
      * @return The JVM specification vendor.
      * @throws SecurityException if the
-     *         {@link SecurityManager#checkPropertiesAccess(String)} doesn't
+     *         {@link SecurityManager#checkPropertyAccess(String)} doesn't
      *         allow access.
      */
     String getSpecVendor();
@@ -136,7 +136,7 @@
      * 
      * @return The JVM specification version.
      * @throws SecurityException if the
-     *         {@link SecurityManager#checkPropertiesAccess(String)} doesn't
+     *         {@link SecurityManager#checkPropertyAccess(String)} doesn't
      *         allow access.
      */
     String getSpecVersion();
@@ -160,7 +160,7 @@
      * 
      * @return The library path.
      * @throws SecurityException if the
-     *         {@link SecurityManager#checkPropertiesAccess(String)} doesn't
+     *         {@link SecurityManager#checkPropertyAccess(String)} doesn't
      *         allow access.
      */
     Map<String, String> getSystemProperties();
@@ -182,7 +182,7 @@
      * 
      * @return The JVM name.
      * @throws SecurityException if the
-     *         {@link SecurityManager#checkPropertiesAccess(String)} doesn't
+     *         {@link SecurityManager#checkPropertyAccess(String)} doesn't
      *         allow access.
      */
     String getVmName();
@@ -195,7 +195,7 @@
      * 
      * @return The JVM vendor.
      * @throws SecurityException if the
-     *         {@link SecurityManager#checkPropertiesAccess(String)} doesn't
+     *         {@link SecurityManager#checkPropertyAccess(String)} doesn't
      *         allow access.
      */
     String getVmVendor();
@@ -208,7 +208,7 @@
      * 
      * @return The JVM version.
      * @throws SecurityException if the
-     *         {@link SecurityManager#checkPropertiesAccess(String)} doesn't
+     *         {@link SecurityManager#checkPropertyAccess(String)} doesn't
      *         allow access.
      */
     String getVmVersion();

Modified: harmony/enhanced/classlib/trunk/modules/security-kernel/src/main/java/java/security/AccessController.java
URL: http://svn.apache.org/viewvc/harmony/enhanced/classlib/trunk/modules/security-kernel/src/main/java/java/security/AccessController.java?rev=628049&r1=628048&r2=628049&view=diff
==============================================================================
--- harmony/enhanced/classlib/trunk/modules/security-kernel/src/main/java/java/security/AccessController.java
(original)
+++ harmony/enhanced/classlib/trunk/modules/security-kernel/src/main/java/java/security/AccessController.java
Fri Feb 15 05:06:41 2008
@@ -25,244 +25,273 @@
  * Makes context snapshots to allow checking from other contexts.
  */
 public final class AccessController {
-	static {
-		// Initialize vm-internal caches
-		initializeInternal();
-	}
-
-	private static native void initializeInternal();
-
-	/**
-	 * Prevents this class from being instantiated.
-	 */
-	private AccessController() {
-	}
-
-	/**
-	 * This native must be implemented to use the reference implementation of
-	 * this class. It is used by checkPermission() and getContext(), which call
-	 * this native with depth = 1.
-	 * 
-	 * Returns an array of ProtectionDomain from the classes on the stack, from
-	 * the specified depth up to the first privileged frame, or the end of the
-	 * stack if there is not a privileged frame. The array may be larger than
-	 * required, but must be null terminated. As bootstrap classes have all
-	 * permissions, bootstrap class frames SHOULD be skipped. Bootstrap class
-	 * frames MUST be skipped if the ProtectionDomain of bootstrap classes is
-	 * null. Duplicate ProtectionDomains SHOULD be removed.
-	 * 
-	 * The first element of the result is the AccessControlContext, which may be
-	 * null, either from the privileged frame, or from the current Thread if
-	 * there is not a privileged frame.
-	 * 
-	 * A privileged frame is any frame running one of the following methods:
-	 * 
-	 * <code><ul>
-	 * <li>java/security/AccessController.doPrivileged(Ljava/security/PrivilegedAction;)Ljava/lang/Object;</li>
-	 * <li>java/security/AccessController.doPrivileged(Ljava/security/PrivilegedExceptionAction;)Ljava/lang/Object;</li>
-	 * <li>java/security/AccessController.doPrivileged(Ljava/security/PrivilegedAction;Ljava/security/AccessControlContext;)Ljava/lang/Object;</li>
-	 * <li>java/security/AccessController.doPrivileged(Ljava/security/PrivilegedExceptionAction;Ljava/security/AccessControlContext;)Ljava/lang/Object;</li>
-	 * </ul></code>
-	 * 
-	 * @param depth
-	 *            The stack depth at which to start. Depth 0 is the current
-	 *            frame (the caller of this native).
-	 * 
-	 * @return an Object[] where the first element is AccessControlContext, and
-	 *         the other elements are ProtectionsDomain.
-	 */
-
-	private static native Object[] getProtectionDomains(int depth);
-
-	/**
-	 * Checks whether the running program is allowed to access the resource
-	 * being guarded by the given Permission argument.
-	 * 
-	 * 
-	 * @param perm
-	 *            the permission to check
-	 * @exception AccessControlException
-	 *                if access is not allowed.
-	 */
-	public static void checkPermission(Permission perm)
-			throws AccessControlException {
-		if (perm == null)
-			throw new NullPointerException();
-		Object[] domains = getProtectionDomains(1);
-		AccessControlContext acc = (AccessControlContext) domains[0];
-		ProtectionDomain[] pDomains = null;
-		if (acc != null && acc.domainCombiner != null) {
-			pDomains = acc.domainCombiner.combine(toArrayOfProtectionDomains(
-					domains, null), acc.domainsArray);
-		} else {
-			pDomains = toArrayOfProtectionDomains(domains, acc);
-		}
-		for (int i = 0, length = pDomains.length; i < length; i++) {
-			if (!pDomains[i].implies(perm)) {
-				throw new AccessControlException("Access Denied " + perm, perm);
-			}
-		}
-	}
-
-	/**
-	 * Used to keep the context live during doPrivileged().
-	 * 
-	 * 
-	 * @see #doPrivileged(PrivilegedAction<T>, AccessControlContext)
-	 */
-	private static void keepalive(AccessControlContext context) {
-	}
-
-	/**
-	 * Answers the access controller context of the current thread, including
-	 * the inherited ones. It basically retrieves all the protection domains
-	 * from the calling stack and creates an <code>AccessControlContext</code>
-	 * with them.
-	 * 
-	 * 
-	 * @see AccessControlContext
-	 */
-	public static AccessControlContext getContext() {
-		Object[] domains = getProtectionDomains(1);
-		AccessControlContext acc = (AccessControlContext) domains[0];
-		ProtectionDomain[] pDomains = null;
-		if (acc != null && acc.domainCombiner != null) {
-			pDomains = acc.domainCombiner.combine(toArrayOfProtectionDomains(
-					domains, null), acc.domainsArray);
-			AccessControlContext result = new AccessControlContext(pDomains,
-					false);
-			result.domainCombiner = acc.domainCombiner;
-			return result;
-		}
-		return new AccessControlContext(
-				toArrayOfProtectionDomains(domains, acc), false);
-	}
-
-	private static ProtectionDomain[] toArrayOfProtectionDomains(
-			Object[] domains, AccessControlContext acc) {
-		int len = 0, size = domains.length - 1;
-		int extra = acc == null ? 0 : acc.domainsArray.length;
-		ProtectionDomain[] answer = new ProtectionDomain[size + extra];
-		for (int i = 1; i <= size; i++) {
-			boolean found = false;
-			if ((answer[len] = (ProtectionDomain) domains[i]) == null)
-				break;
-			if (acc != null) {
-				for (int j = 0; j < acc.domainsArray.length; j++) {
-					if (answer[len] == acc.domainsArray[j]) {
-						found = true;
-						break;
-					}
-				}
-			}
-			if (!found)
-				len++;
-		}
-		if (len == 0 && acc != null)
-			return acc.domainsArray;
-		else if (len < size) {
-			ProtectionDomain[] copy = new ProtectionDomain[len + extra];
-			System.arraycopy(answer, 0, copy, 0, len);
-			answer = copy;
-		}
-		if (acc != null)
-			System.arraycopy(acc.domainsArray, 0, answer, len,
-					acc.domainsArray.length);
-		return answer;
-	}
-
-	/**
-	 * Performs the privileged action specified by <code>action</code>.
-	 * <p>
-	 * When permission checks are made, if the permission has been granted by
-	 * all frames below and including the one representing the call to this
-	 * method, then the permission is granted. In otherwords, the check stops
-	 * here.
-	 * 
-	 * Any unchecked exception generated by this method will propagate up the
-	 * chain.
-	 * 
-	 * 
-	 * @see #doPrivileged(PrivilegedAction<T>)
-	 */
-	public static <T> T doPrivileged(PrivilegedAction<T> action) {
-		return action.run();
-	}
-
-	/**
-	 * Performs the privileged action specified by <code>action</code>.
-	 * 
-	 * When permission checks are made, if the permission has been granted by
-	 * all frames below and including the one representing the call to this
-	 * method, then the permission is granted iff it is granted by the
-	 * AccessControlContext <code>context</code>. In otherwords, no more
-	 * checking of the current stack is performed. Instead, the passed in
-	 * context is checked.
-	 * 
-	 * Any unchecked exception generated by this method will propagate up the
-	 * chain.
-	 * 
-	 * @see #doPrivileged(PrivilegedAction)
-	 */
-	public static <T> T doPrivileged(PrivilegedAction<T> action,
-			AccessControlContext context) {
-		T result = action.run();
-		keepalive(context);
-		return result;
-	}
-
-	/**
-	 * Performs the privileged action specified by <code>action</code>.
-	 * 
-	 * When permission checks are made, if the permission has been granted by
-	 * all frames below and including the one representing the call to this
-	 * method, then the permission is granted. In otherwords, the check stops
-	 * here.
-	 * 
-	 * Any unchecked exception generated by this method will propagate up the
-	 * chain. However, checked exceptions will be caught an re-thrown as
-	 * PrivilegedActionExceptions
-	 * 
-	 * @see #doPrivileged(PrivilegedAction)
-	 */
-	public static <T> T doPrivileged(PrivilegedExceptionAction<T> action)
-			throws PrivilegedActionException {
-		try {
-			return action.run();
-		} catch (RuntimeException ex) {
-			throw ex;
-		} catch (Exception ex) {
-			throw new PrivilegedActionException(ex);
-		}
-	}
-
-	/**
-	 * Performs the privileged action specified by <code>action</code>.
-	 * 
-	 * When permission checks are made, if the permission has been granted by
-	 * all frames below and including the one representing the call to this
-	 * method, then the permission is granted iff it is granted by the
-	 * AccessControlContext <code>context</code>. In otherwords, no more
-	 * checking of the current stack is performed. Instead, the passed in
-	 * context is checked.
-	 * 
-	 * Any unchecked exception generated by this method will propagate up the
-	 * chain. However, checked exceptions will be caught an re-thrown as
-	 * PrivilegedActionExceptions
-	 * 
-	 * @see #doPrivileged(PrivilegedAction)
-	 */
-	public static <T> T doPrivileged(PrivilegedExceptionAction<T> action,
-			AccessControlContext context) throws PrivilegedActionException {
-		try {
-			T result = action.run();
-			keepalive(context);
-			return result;
-		} catch (RuntimeException ex) {
-			throw ex;
-		} catch (Exception ex) {
-			throw new PrivilegedActionException(ex);
-		}
-	}
+    static {
+        // Initialize vm-internal caches
+        initializeInternal();
+    }
+
+    private static native void initializeInternal();
+
+    /**
+     * Prevents this class from being instantiated.
+     */
+    private AccessController() {
+    }
+
+    /**
+     * This native must be implemented to use the reference implementation of
+     * this class. It is used by checkPermission() and getContext(), which call
+     * this native with depth = 1.
+     * 
+     * Returns an array of ProtectionDomain from the classes on the stack, from
+     * the specified depth up to the first privileged frame, or the end of the
+     * stack if there is not a privileged frame. The array may be larger than
+     * required, but must be null terminated. As bootstrap classes have all
+     * permissions, bootstrap class frames SHOULD be skipped. Bootstrap class
+     * frames MUST be skipped if the ProtectionDomain of bootstrap classes is
+     * null. Duplicate ProtectionDomains SHOULD be removed.
+     * 
+     * The first element of the result is the AccessControlContext, which may be
+     * null, either from the privileged frame, or from the current Thread if
+     * there is not a privileged frame.
+     * 
+     * A privileged frame is any frame running one of the following methods:
+     * 
+     * <code><ul>
+     * <li>java/security/AccessController.doPrivileged(Ljava/security/PrivilegedAction;)Ljava/lang/Object;</li>
+     * <li>java/security/AccessController.doPrivileged(Ljava/security/PrivilegedExceptionAction;)Ljava/lang/Object;</li>
+     * <li>java/security/AccessController.doPrivileged(Ljava/security/PrivilegedAction;Ljava/security/AccessControlContext;)Ljava/lang/Object;</li>
+     * <li>java/security/AccessController.doPrivileged(Ljava/security/PrivilegedExceptionAction;Ljava/security/AccessControlContext;)Ljava/lang/Object;</li>
+     * </ul></code>
+     * 
+     * @param depth
+     *            The stack depth at which to start. Depth 0 is the current
+     *            frame (the caller of this native).
+     * 
+     * @return an Object[] where the first element is AccessControlContext, and
+     *         the other elements are ProtectionsDomain.
+     */
+
+    private static native Object[] getProtectionDomains(int depth);
+
+    /**
+     * Checks whether the running program is allowed to access the resource
+     * being guarded by the given Permission argument.
+     * 
+     * 
+     * @param perm
+     *            the permission to check
+     * @exception AccessControlException
+     *                if access is not allowed.
+     */
+    public static void checkPermission(Permission perm)
+            throws AccessControlException {
+        if (perm == null)
+            throw new NullPointerException();
+        Object[] domains = getProtectionDomains(1);
+        AccessControlContext acc = (AccessControlContext) domains[0];
+        ProtectionDomain[] pDomains = null;
+        if (acc != null && acc.domainCombiner != null) {
+            pDomains = acc.domainCombiner.combine(toArrayOfProtectionDomains(
+                    domains, null), acc.domainsArray);
+        } else {
+            pDomains = toArrayOfProtectionDomains(domains, acc);
+        }
+        for (int i = 0, length = pDomains.length; i < length; i++) {
+            if (!pDomains[i].implies(perm)) {
+                throw new AccessControlException("Access Denied " + perm, perm); //$NON-NLS-1$
+            }
+        }
+    }
+
+    /**
+     * Used to keep the context live during doPrivileged().
+     * 
+     * @see #doPrivileged(PrivilegedAction, AccessControlContext)
+     */
+    private static void keepalive(AccessControlContext context) {
+    }
+
+    /**
+     * Answers the access controller context of the current thread, including
+     * the inherited ones. It basically retrieves all the protection domains
+     * from the calling stack and creates an <code>AccessControlContext</code>
+     * with them.
+     * 
+     * @return the access control context of the current thread
+     * @see AccessControlContext
+     */
+    public static AccessControlContext getContext() {
+        Object[] domains = getProtectionDomains(1);
+        AccessControlContext acc = (AccessControlContext) domains[0];
+        ProtectionDomain[] pDomains = null;
+        if (acc != null && acc.domainCombiner != null) {
+            pDomains = acc.domainCombiner.combine(toArrayOfProtectionDomains(
+                    domains, null), acc.domainsArray);
+            AccessControlContext result = new AccessControlContext(pDomains,
+                    false);
+            result.domainCombiner = acc.domainCombiner;
+            return result;
+        }
+        return new AccessControlContext(
+                toArrayOfProtectionDomains(domains, acc), false);
+    }
+
+    private static ProtectionDomain[] toArrayOfProtectionDomains(
+            Object[] domains, AccessControlContext acc) {
+        int len = 0, size = domains.length - 1;
+        int extra = acc == null ? 0 : acc.domainsArray.length;
+        ProtectionDomain[] answer = new ProtectionDomain[size + extra];
+        for (int i = 1; i <= size; i++) {
+            boolean found = false;
+            if ((answer[len] = (ProtectionDomain) domains[i]) == null)
+                break;
+            if (acc != null) {
+                for (int j = 0; j < acc.domainsArray.length; j++) {
+                    if (answer[len] == acc.domainsArray[j]) {
+                        found = true;
+                        break;
+                    }
+                }
+            }
+            if (!found)
+                len++;
+        }
+        if (len == 0 && acc != null)
+            return acc.domainsArray;
+        else if (len < size) {
+            ProtectionDomain[] copy = new ProtectionDomain[len + extra];
+            System.arraycopy(answer, 0, copy, 0, len);
+            answer = copy;
+        }
+        if (acc != null)
+            System.arraycopy(acc.domainsArray, 0, answer, len,
+                    acc.domainsArray.length);
+        return answer;
+    }
+
+    /**
+     * Performs the privileged action specified by <code>action</code>.
+     * 
+     * When permission checks are made, if the permission has been granted by
+     * all frames below and including the one representing the call to this
+     * method, then the permission is granted. In otherwords, the check stops
+     * here.
+     * 
+     * Any unchecked exception generated by this method will propagate up the
+     * chain.
+     * 
+     * @param action
+     *            the action being performed
+     * @param <T>
+     *            the return type for the privileged action
+     * @return the result of evaluating the action
+     * 
+     * @see #doPrivileged(PrivilegedAction)
+     */
+    public static <T> T doPrivileged(PrivilegedAction<T> action) {
+        return action.run();
+    }
+
+    /**
+     * Performs the privileged action specified by <code>action</code>.
+     * 
+     * When permission checks are made, if the permission has been granted by
+     * all frames below and including the one representing the call to this
+     * method, then the permission is granted iff it is granted by the
+     * AccessControlContext <code>context</code>. In otherwords, no more
+     * checking of the current stack is performed. Instead, the passed in
+     * context is checked.
+     * 
+     * Any unchecked exception generated by this method will propagate up the
+     * chain.
+     * 
+     * @param action
+     *            the action being performed
+     * @param <T>
+     *            the return type for the privileged action
+     * @param context
+     *            the context being checked for the privileged action
+     * @return the result of evaluating the action
+     * 
+     * @see #doPrivileged(PrivilegedAction)
+     */
+    public static <T> T doPrivileged(PrivilegedAction<T> action,
+            AccessControlContext context) {
+        T result = action.run();
+        keepalive(context);
+        return result;
+    }
+
+    /**
+     * Performs the privileged action specified by <code>action</code>.
+     * 
+     * When permission checks are made, if the permission has been granted by
+     * all frames below and including the one representing the call to this
+     * method, then the permission is granted. In otherwords, the check stops
+     * here.
+     * 
+     * Any unchecked exception generated by this method will propagate up the
+     * chain. However, checked exceptions will be caught an re-thrown as
+     * PrivilegedActionExceptions.
+     * 
+     * @param action
+     *            the action being performed
+     * @param <T>
+     *            the return type for the privileged action
+     * @return the result of evaluating the action
+     * @throws PrivilegedActionException
+     *             if a checked exception was thrown
+     * @see #doPrivileged(PrivilegedAction)
+     */
+    public static <T> T doPrivileged(PrivilegedExceptionAction<T> action)
+            throws PrivilegedActionException {
+        try {
+            return action.run();
+        } catch (RuntimeException ex) {
+            throw ex;
+        } catch (Exception ex) {
+            throw new PrivilegedActionException(ex);
+        }
+    }
+
+    /**
+     * Performs the privileged action specified by <code>action</code>.
+     * 
+     * When permission checks are made, if the permission has been granted by
+     * all frames below and including the one representing the call to this
+     * method, then the permission is granted iff it is granted by the
+     * AccessControlContext <code>context</code>. In otherwords, no more
+     * checking of the current stack is performed. Instead, the passed in
+     * context is checked.
+     * 
+     * Any unchecked exception generated by this method will propagate up the
+     * chain. However, checked exceptions will be caught an re-thrown as
+     * PrivilegedActionExceptions
+     * 
+     * @param action
+     *            the action being performed
+     * @param <T>
+     *            the return type for the privileged action
+     * @param context
+     *            the context being checked for the privileged action
+     * @return the result of evaluating the action
+     * @throws PrivilegedActionException
+     *             if a checked exception was thrown
+     * 
+     * @see #doPrivileged(PrivilegedAction)
+     */
+    public static <T> T doPrivileged(PrivilegedExceptionAction<T> action,
+            AccessControlContext context) throws PrivilegedActionException {
+        try {
+            T result = action.run();
+            keepalive(context);
+            return result;
+        } catch (RuntimeException ex) {
+            throw ex;
+        } catch (Exception ex) {
+            throw new PrivilegedActionException(ex);
+        }
+    }
 
 }

Modified: harmony/enhanced/classlib/trunk/modules/security/src/main/java/common/java/security/MessageDigest.java
URL: http://svn.apache.org/viewvc/harmony/enhanced/classlib/trunk/modules/security/src/main/java/common/java/security/MessageDigest.java?rev=628049&r1=628048&r2=628049&view=diff
==============================================================================
--- harmony/enhanced/classlib/trunk/modules/security/src/main/java/common/java/security/MessageDigest.java
(original)
+++ harmony/enhanced/classlib/trunk/modules/security/src/main/java/common/java/security/MessageDigest.java
Fri Feb 15 05:06:41 2008
@@ -15,11 +15,6 @@
  *  limitations under the License.
  */
 
-/**
-* @author Boris V. Kuznetsov
-* @version $Revision$
-*/
-
 package java.security;
 
 import java.nio.ByteBuffer;
@@ -27,14 +22,8 @@
 import org.apache.harmony.security.fortress.Engine;
 import org.apache.harmony.security.internal.nls.Messages;
 
-
-/**
- * @com.intel.drl.spec_ref
- * 
- */
-
 public abstract class MessageDigest extends MessageDigestSpi {
-    
+
     // The service name
     private static final String SERVICE = "MessageDigest"; //$NON-NLS-1$
 
@@ -49,7 +38,7 @@
 
     /**
      * @com.intel.drl.spec_ref
-     *  
+     * 
      */
     protected MessageDigest(String algorithm) {
         this.algorithm = algorithm;
@@ -57,7 +46,7 @@
 
     /**
      * @com.intel.drl.spec_ref
-     *  
+     * 
      */
     public static MessageDigest getInstance(String algorithm)
             throws NoSuchAlgorithmException {
@@ -82,16 +71,18 @@
 
     /**
      * @com.intel.drl.spec_ref
-     *  
+     * 
      */
     public static MessageDigest getInstance(String algorithm, String provider)
             throws NoSuchAlgorithmException, NoSuchProviderException {
         if ((provider == null) || (provider.length() == 0)) {
-            throw new IllegalArgumentException(Messages.getString("security.02")); //$NON-NLS-1$
+            throw new IllegalArgumentException(Messages
+                    .getString("security.02")); //$NON-NLS-1$
         }
         Provider p = Security.getProvider(provider);
         if (p == null) {
-            throw new NoSuchProviderException(Messages.getString("security.03", provider));
//$NON-NLS-1$
+            throw new NoSuchProviderException(Messages.getString(
+                    "security.03", provider)); //$NON-NLS-1$
         }
         return getInstance(algorithm, p);
     }
@@ -115,7 +106,8 @@
     public static MessageDigest getInstance(String algorithm, Provider provider)
             throws NoSuchAlgorithmException {
         if (provider == null) {
-            throw new IllegalArgumentException(Messages.getString("security.04")); //$NON-NLS-1$
+            throw new IllegalArgumentException(Messages
+                    .getString("security.04")); //$NON-NLS-1$
         }
         if (algorithm == null) {
             throw new NullPointerException(Messages.getString("security.01")); //$NON-NLS-1$
@@ -139,20 +131,17 @@
     /**
      * Puts the receiver back in an initial state, such that it is ready to
      * compute a new hash.
-     * 
-     * @see java.security.MessageDigest.Wrapper#engineReset()
      */
     public void reset() {
         engineReset();
     }
 
     /**
-     * Includes the argument in the hash value computed
-     * by the receiver.
-     *
-     * @param arg0 byte
-     *             the byte to feed to the hash algorithm
-     *
+     * Includes the argument in the hash value computed by the receiver.
+     * 
+     * @param arg0
+     *            byte the byte to feed to the hash algorithm
+     * 
      * @see #reset()
      */
     public void update(byte arg0) {
@@ -161,11 +150,11 @@
 
     /**
      * @com.intel.drl.spec_ref
-     *  
+     * 
      */
     public void update(byte[] input, int offset, int len) {
         if (input == null ||
-                // offset < 0 || len < 0 ||
+        // offset < 0 || len < 0 ||
                 // checks for negative values are commented out intentionally
                 // see HARMONY-1120 for details
                 (long) offset + (long) len > input.length) {
@@ -177,7 +166,7 @@
 
     /**
      * @com.intel.drl.spec_ref
-     *  
+     * 
      */
     public void update(byte[] input) {
         if (input == null) {
@@ -200,11 +189,11 @@
 
     /**
      * @com.intel.drl.spec_ref
-     *  
+     * 
      */
     public int digest(byte[] buf, int offset, int len) throws DigestException {
         if (buf == null ||
-                // offset < 0 || len < 0 ||
+        // offset < 0 || len < 0 ||
                 // checks for negative values are commented out intentionally
                 // see HARMONY-1148 for details
                 (long) offset + (long) len > buf.length) {
@@ -216,7 +205,7 @@
 
     /**
      * @com.intel.drl.spec_ref
-     *  
+     * 
      */
     public byte[] digest(byte[] input) {
         update(input);
@@ -299,7 +288,7 @@
 
     /**
      * @com.intel.drl.spec_ref
-     *  
+     * 
      */
     public Object clone() throws CloneNotSupportedException {
         if (this instanceof Cloneable) {
@@ -311,7 +300,7 @@
 
     /**
      * @com.intel.drl.spec_ref
-     *  
+     * 
      */
     public final void update(ByteBuffer input) {
         engineUpdate(input);
@@ -323,7 +312,7 @@
      * 
      */
     private static class MessageDigestImpl extends MessageDigest {
-        
+
         // MessageDigestSpi implementation
         private MessageDigestSpi spiImpl;
 

Modified: harmony/enhanced/classlib/trunk/modules/text/src/main/java/java/text/Bidi.java
URL: http://svn.apache.org/viewvc/harmony/enhanced/classlib/trunk/modules/text/src/main/java/java/text/Bidi.java?rev=628049&r1=628048&r2=628049&view=diff
==============================================================================
--- harmony/enhanced/classlib/trunk/modules/text/src/main/java/java/text/Bidi.java (original)
+++ harmony/enhanced/classlib/trunk/modules/text/src/main/java/java/text/Bidi.java Fri Feb
15 05:06:41 2008
@@ -33,7 +33,6 @@
  * obtained from the run index. The level of any particular run indicates the
  * direction of the text as well as the nesting level. Left-to-right runs have
  * even levels while right-to-left runs have odd levels.
- * 
  */
 public final class Bidi {
     /**
@@ -86,9 +85,9 @@
      * 
      * @param paragraph
      * 
-     * @see TextAttribute.BIDI_EMBEDDING
-     * @see TextAttribute.NUMERIC_SHAPING
-     * @see TextAttribute.RUN_DIRECTION
+     * @see java.awt.font.TextAttribute#BIDI_EMBEDDING
+     * @see java.awt.font.TextAttribute#NUMERIC_SHAPING
+     * @see java.awt.font.TextAttribute#RUN_DIRECTION
      */
     public Bidi(AttributedCharacterIterator paragraph) {
         if (paragraph == null) {



Mime
View raw message