This commit is contained in:
Michael Fang 2013-10-22 14:37:40 -07:00
commit 19ee265b6b
93 changed files with 236 additions and 296 deletions

View File

@ -275,7 +275,6 @@ class ByteArrayInputStream extends InputStream {
* Closing a <tt>ByteArrayInputStream</tt> has no effect. The methods in * Closing a <tt>ByteArrayInputStream</tt> has no effect. The methods in
* this class can be called after the stream has been closed without * this class can be called after the stream has been closed without
* generating an <tt>IOException</tt>. * generating an <tt>IOException</tt>.
* <p>
*/ */
public void close() throws IOException { public void close() throws IOException {
} }

View File

@ -263,8 +263,6 @@ public class ByteArrayOutputStream extends OutputStream {
* Closing a <tt>ByteArrayOutputStream</tt> has no effect. The methods in * Closing a <tt>ByteArrayOutputStream</tt> has no effect. The methods in
* this class can be called after the stream has been closed without * this class can be called after the stream has been closed without
* generating an <tt>IOException</tt>. * generating an <tt>IOException</tt>.
* <p>
*
*/ */
public void close() throws IOException { public void close() throws IOException {
} }

View File

@ -155,7 +155,7 @@ interface DataInput {
* to the length of {@code b}. * to the length of {@code b}.
* <p> * <p>
* This method blocks until one of the * This method blocks until one of the
* following conditions occurs:<p> * following conditions occurs:
* <ul> * <ul>
* <li>{@code b.length} * <li>{@code b.length}
* bytes of input data are available, in which * bytes of input data are available, in which
@ -197,7 +197,7 @@ interface DataInput {
* <p> * <p>
* This method * This method
* blocks until one of the following conditions * blocks until one of the following conditions
* occurs:<p> * occurs:
* <ul> * <ul>
* <li>{@code len} bytes * <li>{@code len} bytes
* of input data are available, in which case * of input data are available, in which case
@ -316,8 +316,8 @@ interface DataInput {
* be the second byte. The value * be the second byte. The value
* returned * returned
* is: * is:
* <p><pre><code>(short)((a &lt;&lt; 8) | (b &amp; 0xff)) * <pre>{@code (short)((a << 8) | (b & 0xff))
* </code></pre> * }</pre>
* This method * This method
* is suitable for reading the bytes written * is suitable for reading the bytes written
* by the {@code writeShort} method of * by the {@code writeShort} method of
@ -337,8 +337,8 @@ interface DataInput {
* be the first byte read and * be the first byte read and
* {@code b} * {@code b}
* be the second byte. The value returned is: * be the second byte. The value returned is:
* <p><pre><code>(((a &amp; 0xff) &lt;&lt; 8) | (b &amp; 0xff)) * <pre>{@code (((a & 0xff) << 8) | (b & 0xff))
* </code></pre> * }</pre>
* This method is suitable for reading the bytes * This method is suitable for reading the bytes
* written by the {@code writeShort} method * written by the {@code writeShort} method
* of interface {@code DataOutput} if * of interface {@code DataOutput} if
@ -359,8 +359,8 @@ interface DataInput {
* be the first byte read and {@code b} * be the first byte read and {@code b}
* be the second byte. The value * be the second byte. The value
* returned is: * returned is:
* <p><pre><code>(char)((a &lt;&lt; 8) | (b &amp; 0xff)) * <pre>{@code (char)((a << 8) | (b & 0xff))
* </code></pre> * }</pre>
* This method * This method
* is suitable for reading bytes written by * is suitable for reading bytes written by
* the {@code writeChar} method of interface * the {@code writeChar} method of interface
@ -377,10 +377,10 @@ interface DataInput {
* Reads four input bytes and returns an * Reads four input bytes and returns an
* {@code int} value. Let {@code a-d} * {@code int} value. Let {@code a-d}
* be the first through fourth bytes read. The value returned is: * be the first through fourth bytes read. The value returned is:
* <p><pre><code> * <pre>{@code
* (((a &amp; 0xff) &lt;&lt; 24) | ((b &amp; 0xff) &lt;&lt; 16) | * (((a & 0xff) << 24) | ((b & 0xff) << 16) |
* &#32;((c &amp; 0xff) &lt;&lt; 8) | (d &amp; 0xff)) * ((c & 0xff) << 8) | (d & 0xff))
* </code></pre> * }</pre>
* This method is suitable * This method is suitable
* for reading bytes written by the {@code writeInt} * for reading bytes written by the {@code writeInt}
* method of interface {@code DataOutput}. * method of interface {@code DataOutput}.
@ -397,16 +397,16 @@ interface DataInput {
* a {@code long} value. Let {@code a-h} * a {@code long} value. Let {@code a-h}
* be the first through eighth bytes read. * be the first through eighth bytes read.
* The value returned is: * The value returned is:
* <p><pre><code> * <pre>{@code
* (((long)(a &amp; 0xff) &lt;&lt; 56) | * (((long)(a & 0xff) << 56) |
* ((long)(b &amp; 0xff) &lt;&lt; 48) | * ((long)(b & 0xff) << 48) |
* ((long)(c &amp; 0xff) &lt;&lt; 40) | * ((long)(c & 0xff) << 40) |
* ((long)(d &amp; 0xff) &lt;&lt; 32) | * ((long)(d & 0xff) << 32) |
* ((long)(e &amp; 0xff) &lt;&lt; 24) | * ((long)(e & 0xff) << 24) |
* ((long)(f &amp; 0xff) &lt;&lt; 16) | * ((long)(f & 0xff) << 16) |
* ((long)(g &amp; 0xff) &lt;&lt; 8) | * ((long)(g & 0xff) << 8) |
* ((long)(h &amp; 0xff))) * ((long)(h & 0xff)))
* </code></pre> * }</pre>
* <p> * <p>
* This method is suitable * This method is suitable
* for reading bytes written by the {@code writeLong} * for reading bytes written by the {@code writeLong}
@ -540,9 +540,9 @@ interface DataInput {
* not match the bit pattern {@code 10xxxxxx}, * not match the bit pattern {@code 10xxxxxx},
* then a {@code UTFDataFormatException} * then a {@code UTFDataFormatException}
* is thrown. Otherwise, the group is converted * is thrown. Otherwise, the group is converted
* to the character:<p> * to the character:
* <pre><code>(char)(((a&amp; 0x1F) &lt;&lt; 6) | (b &amp; 0x3F)) * <pre>{@code (char)(((a & 0x1F) << 6) | (b & 0x3F))
* </code></pre> * }</pre>
* If the first byte of a group * If the first byte of a group
* matches the bit pattern {@code 1110xxxx}, * matches the bit pattern {@code 1110xxxx},
* then the group consists of that byte {@code a} * then the group consists of that byte {@code a}
@ -554,10 +554,10 @@ interface DataInput {
* does not match the bit pattern {@code 10xxxxxx}, * does not match the bit pattern {@code 10xxxxxx},
* then a {@code UTFDataFormatException} * then a {@code UTFDataFormatException}
* is thrown. Otherwise, the group is converted * is thrown. Otherwise, the group is converted
* to the character:<p> * to the character:
* <pre><code> * <pre>{@code
* (char)(((a &amp; 0x0F) &lt;&lt; 12) | ((b &amp; 0x3F) &lt;&lt; 6) | (c &amp; 0x3F)) * (char)(((a & 0x0F) << 12) | ((b & 0x3F) << 6) | (c & 0x3F))
* </code></pre> * }</pre>
* If the first byte of a group matches the * If the first byte of a group matches the
* pattern {@code 1111xxxx} or the pattern * pattern {@code 1111xxxx} or the pattern
* {@code 10xxxxxx}, then a {@code UTFDataFormatException} * {@code 10xxxxxx}, then a {@code UTFDataFormatException}

View File

@ -134,11 +134,11 @@ interface DataOutput {
* Writes two bytes to the output * Writes two bytes to the output
* stream to represent the value of the argument. * stream to represent the value of the argument.
* The byte values to be written, in the order * The byte values to be written, in the order
* shown, are: <p> * shown, are:
* <pre><code> * <pre>{@code
* (byte)(0xff &amp; (v &gt;&gt; 8)) * (byte)(0xff & (v >> 8))
* (byte)(0xff &amp; v) * (byte)(0xff & v)
* </code> </pre> <p> * }</pre> <p>
* The bytes written by this method may be * The bytes written by this method may be
* read by the <code>readShort</code> method * read by the <code>readShort</code> method
* of interface <code>DataInput</code> , which * of interface <code>DataInput</code> , which
@ -156,10 +156,10 @@ interface DataOutput {
* output stream. * output stream.
* The byte values to be written, in the order * The byte values to be written, in the order
* shown, are: * shown, are:
* <p><pre><code> * <pre>{@code
* (byte)(0xff &amp; (v &gt;&gt; 8)) * (byte)(0xff & (v >> 8))
* (byte)(0xff &amp; v) * (byte)(0xff & v)
* </code></pre><p> * }</pre><p>
* The bytes written by this method may be * The bytes written by this method may be
* read by the <code>readChar</code> method * read by the <code>readChar</code> method
* of interface <code>DataInput</code> , which * of interface <code>DataInput</code> , which
@ -176,12 +176,12 @@ interface DataOutput {
* comprised of four bytes, to the output stream. * comprised of four bytes, to the output stream.
* The byte values to be written, in the order * The byte values to be written, in the order
* shown, are: * shown, are:
* <p><pre><code> * <pre>{@code
* (byte)(0xff &amp; (v &gt;&gt; 24)) * (byte)(0xff & (v >> 24))
* (byte)(0xff &amp; (v &gt;&gt; 16)) * (byte)(0xff & (v >> 16))
* (byte)(0xff &amp; (v &gt;&gt; &#32; &#32;8)) * (byte)(0xff & (v >> 8))
* (byte)(0xff &amp; v) * (byte)(0xff & v)
* </code></pre><p> * }</pre><p>
* The bytes written by this method may be read * The bytes written by this method may be read
* by the <code>readInt</code> method of interface * by the <code>readInt</code> method of interface
* <code>DataInput</code> , which will then * <code>DataInput</code> , which will then
@ -197,16 +197,16 @@ interface DataOutput {
* comprised of eight bytes, to the output stream. * comprised of eight bytes, to the output stream.
* The byte values to be written, in the order * The byte values to be written, in the order
* shown, are: * shown, are:
* <p><pre><code> * <pre>{@code
* (byte)(0xff &amp; (v &gt;&gt; 56)) * (byte)(0xff & (v >> 56))
* (byte)(0xff &amp; (v &gt;&gt; 48)) * (byte)(0xff & (v >> 48))
* (byte)(0xff &amp; (v &gt;&gt; 40)) * (byte)(0xff & (v >> 40))
* (byte)(0xff &amp; (v &gt;&gt; 32)) * (byte)(0xff & (v >> 32))
* (byte)(0xff &amp; (v &gt;&gt; 24)) * (byte)(0xff & (v >> 24))
* (byte)(0xff &amp; (v &gt;&gt; 16)) * (byte)(0xff & (v >> 16))
* (byte)(0xff &amp; (v &gt;&gt; 8)) * (byte)(0xff & (v >> 8))
* (byte)(0xff &amp; v) * (byte)(0xff & v)
* </code></pre><p> * }</pre><p>
* The bytes written by this method may be * The bytes written by this method may be
* read by the <code>readLong</code> method * read by the <code>readLong</code> method
* of interface <code>DataInput</code> , which * of interface <code>DataInput</code> , which
@ -314,24 +314,24 @@ interface DataOutput {
* If a character <code>c</code> * If a character <code>c</code>
* is in the range <code>&#92;u0001</code> through * is in the range <code>&#92;u0001</code> through
* <code>&#92;u007f</code>, it is represented * <code>&#92;u007f</code>, it is represented
* by one byte:<p> * by one byte:
* <pre>(byte)c </pre> <p> * <pre>(byte)c </pre> <p>
* If a character <code>c</code> is <code>&#92;u0000</code> * If a character <code>c</code> is <code>&#92;u0000</code>
* or is in the range <code>&#92;u0080</code> * or is in the range <code>&#92;u0080</code>
* through <code>&#92;u07ff</code>, then it is * through <code>&#92;u07ff</code>, then it is
* represented by two bytes, to be written * represented by two bytes, to be written
* in the order shown:<p> <pre><code> * in the order shown: <pre>{@code
* (byte)(0xc0 | (0x1f &amp; (c &gt;&gt; 6))) * (byte)(0xc0 | (0x1f & (c >> 6)))
* (byte)(0x80 | (0x3f &amp; c)) * (byte)(0x80 | (0x3f & c))
* </code></pre> <p> If a character * }</pre> <p> If a character
* <code>c</code> is in the range <code>&#92;u0800</code> * <code>c</code> is in the range <code>&#92;u0800</code>
* through <code>uffff</code>, then it is * through <code>uffff</code>, then it is
* represented by three bytes, to be written * represented by three bytes, to be written
* in the order shown:<p> <pre><code> * in the order shown: <pre>{@code
* (byte)(0xe0 | (0x0f &amp; (c &gt;&gt; 12))) * (byte)(0xe0 | (0x0f & (c >> 12)))
* (byte)(0x80 | (0x3f &amp; (c &gt;&gt; 6))) * (byte)(0x80 | (0x3f & (c >> 6)))
* (byte)(0x80 | (0x3f &amp; c)) * (byte)(0x80 | (0x3f & c))
* </code></pre> <p> First, * }</pre> <p> First,
* the total number of bytes needed to represent * the total number of bytes needed to represent
* all the characters of <code>s</code> is * all the characters of <code>s</code> is
* calculated. If this number is larger than * calculated. If this number is larger than

View File

@ -55,7 +55,7 @@ import sun.security.util.SecurityConstants;
* a list of one or more comma-separated keywords. The possible keywords are * a list of one or more comma-separated keywords. The possible keywords are
* "read", "write", "execute", "delete", and "readlink". Their meaning is * "read", "write", "execute", "delete", and "readlink". Their meaning is
* defined as follows: * defined as follows:
* <P> *
* <DL> * <DL>
* <DT> read <DD> read permission * <DT> read <DD> read permission
* <DT> write <DD> write permission * <DT> write <DD> write permission
@ -297,11 +297,11 @@ public final class FilePermission extends Permission implements Serializable {
/** /**
* Checks if this FilePermission object "implies" the specified permission. * Checks if this FilePermission object "implies" the specified permission.
* <P> * <P>
* More specifically, this method returns true if:<p> * More specifically, this method returns true if:
* <ul> * <ul>
* <li> <i>p</i> is an instanceof FilePermission,<p> * <li> <i>p</i> is an instanceof FilePermission,
* <li> <i>p</i>'s actions are a proper subset of this * <li> <i>p</i>'s actions are a proper subset of this
* object's actions, and <p> * object's actions, and
* <li> <i>p</i>'s pathname is implied by this object's * <li> <i>p</i>'s pathname is implied by this object's
* pathname. For example, "/tmp/*" implies "/tmp/foo", since * pathname. For example, "/tmp/*" implies "/tmp/foo", since
* "/tmp/*" encompasses all files in the "/tmp" directory, * "/tmp/*" encompasses all files in the "/tmp" directory,

View File

@ -306,8 +306,7 @@ public abstract class InputStream implements Closeable {
* *
* <p> The general contract of <code>reset</code> is: * <p> The general contract of <code>reset</code> is:
* *
* <p><ul> * <ul>
*
* <li> If the method <code>markSupported</code> returns * <li> If the method <code>markSupported</code> returns
* <code>true</code>, then: * <code>true</code>, then:
* *

View File

@ -109,7 +109,7 @@ import sun.reflect.misc.ReflectUtil;
* *
* <p>Serializable classes that require special handling during the * <p>Serializable classes that require special handling during the
* serialization and deserialization process should implement the following * serialization and deserialization process should implement the following
* methods:<p> * methods:
* *
* <pre> * <pre>
* private void writeObject(java.io.ObjectOutputStream stream) * private void writeObject(java.io.ObjectOutputStream stream)

View File

@ -172,15 +172,14 @@ public class PipedInputStream extends InputStream {
* unconnected piped output stream and <code>snk</code> * unconnected piped output stream and <code>snk</code>
* is an unconnected piped input stream, they * is an unconnected piped input stream, they
* may be connected by either the call: * may be connected by either the call:
* <p> *
* <pre><code>snk.connect(src)</code> </pre> * <pre><code>snk.connect(src)</code> </pre>
* <p> * <p>
* or the call: * or the call:
* <p> *
* <pre><code>src.connect(snk)</code> </pre> * <pre><code>src.connect(snk)</code> </pre>
* <p> * <p>
* The two * The two calls have the same effect.
* calls have the same effect.
* *
* @param src The piped output stream to connect to. * @param src The piped output stream to connect to.
* @exception IOException if an I/O error occurs. * @exception IOException if an I/O error occurs.

View File

@ -145,15 +145,14 @@ public class PipedReader extends Reader {
* unconnected piped writer and <code>snk</code> * unconnected piped writer and <code>snk</code>
* is an unconnected piped reader, they * is an unconnected piped reader, they
* may be connected by either the call: * may be connected by either the call:
* <p> *
* <pre><code>snk.connect(src)</code> </pre> * <pre><code>snk.connect(src)</code> </pre>
* <p> * <p>
* or the call: * or the call:
* <p> *
* <pre><code>src.connect(snk)</code> </pre> * <pre><code>src.connect(snk)</code> </pre>
* <p> * <p>
* The two * The two calls have the same effect.
* calls have the same effect.
* *
* @param src The piped writer to connect to. * @param src The piped writer to connect to.
* @exception IOException if an I/O error occurs. * @exception IOException if an I/O error occurs.

View File

@ -784,7 +784,7 @@ public class RandomAccessFile implements DataOutput, DataInput, Closeable {
* </pre></blockquote> * </pre></blockquote>
* <p> * <p>
* then the result is equal to: * then the result is equal to:
* <p><blockquote><pre> * <blockquote><pre>
* ((long)b1 &lt;&lt; 56) + ((long)b2 &lt;&lt; 48) * ((long)b1 &lt;&lt; 56) + ((long)b2 &lt;&lt; 48)
* + ((long)b3 &lt;&lt; 40) + ((long)b4 &lt;&lt; 32) * + ((long)b3 &lt;&lt; 40) + ((long)b4 &lt;&lt; 32)
* + ((long)b5 &lt;&lt; 24) + ((long)b6 &lt;&lt; 16) * + ((long)b5 &lt;&lt; 24) + ((long)b6 &lt;&lt; 16)

View File

@ -55,7 +55,7 @@ package java.io;
* *
* Classes that require special handling during the serialization and * Classes that require special handling during the serialization and
* deserialization process must implement special methods with these exact * deserialization process must implement special methods with these exact
* signatures: <p> * signatures:
* *
* <PRE> * <PRE>
* private void writeObject(java.io.ObjectOutputStream out) * private void writeObject(java.io.ObjectOutputStream out)
@ -101,7 +101,7 @@ package java.io;
* *
* <p>Serializable classes that need to designate an alternative object to be * <p>Serializable classes that need to designate an alternative object to be
* used when writing an object to the stream should implement this * used when writing an object to the stream should implement this
* special method with the exact signature: <p> * special method with the exact signature:
* *
* <PRE> * <PRE>
* ANY-ACCESS-MODIFIER Object writeReplace() throws ObjectStreamException; * ANY-ACCESS-MODIFIER Object writeReplace() throws ObjectStreamException;
@ -115,7 +115,7 @@ package java.io;
* *
* Classes that need to designate a replacement when an instance of it * Classes that need to designate a replacement when an instance of it
* is read from the stream should implement this special method with the * is read from the stream should implement this special method with the
* exact signature.<p> * exact signature.
* *
* <PRE> * <PRE>
* ANY-ACCESS-MODIFIER Object readResolve() throws ObjectStreamException; * ANY-ACCESS-MODIFIER Object readResolve() throws ObjectStreamException;
@ -133,7 +133,7 @@ package java.io;
* deserialization will result in an {@link InvalidClassException}. A * deserialization will result in an {@link InvalidClassException}. A
* serializable class can declare its own serialVersionUID explicitly by * serializable class can declare its own serialVersionUID explicitly by
* declaring a field named <code>"serialVersionUID"</code> that must be static, * declaring a field named <code>"serialVersionUID"</code> that must be static,
* final, and of type <code>long</code>:<p> * final, and of type <code>long</code>:
* *
* <PRE> * <PRE>
* ANY-ACCESS-MODIFIER static final long serialVersionUID = 42L; * ANY-ACCESS-MODIFIER static final long serialVersionUID = 42L;

View File

@ -43,7 +43,6 @@ import java.util.StringTokenizer;
* The following table lists all the possible SerializablePermission target names, * The following table lists all the possible SerializablePermission target names,
* and for each provides a description of what the permission allows * and for each provides a description of what the permission allows
* and a discussion of the risks of granting code the permission. * and a discussion of the risks of granting code the permission.
* <P>
* *
* <table border=1 cellpadding=5 summary="Permission target name, what the permission allows, and associated risks"> * <table border=1 cellpadding=5 summary="Permission target name, what the permission allows, and associated risks">
* <tr> * <tr>

View File

@ -330,9 +330,9 @@ abstract class AbstractStringBuilder implements Appendable, CharSequence {
* characters to be copied is {@code srcEnd-srcBegin}. The * characters to be copied is {@code srcEnd-srcBegin}. The
* characters are copied into the subarray of {@code dst} starting * characters are copied into the subarray of {@code dst} starting
* at index {@code dstBegin} and ending at index: * at index {@code dstBegin} and ending at index:
* <p><blockquote><pre> * <pre>{@code
* dstbegin + (srcEnd-srcBegin) - 1 * dstbegin + (srcEnd-srcBegin) - 1
* </pre></blockquote> * }</pre>
* *
* @param srcBegin start copying at this offset. * @param srcBegin start copying at this offset.
* @param srcEnd stop copying at this offset. * @param srcEnd stop copying at this offset.
@ -859,16 +859,16 @@ abstract class AbstractStringBuilder implements Appendable, CharSequence {
* *
* <p> An invocation of this method of the form * <p> An invocation of this method of the form
* *
* <blockquote><pre> * <pre>{@code
* sb.subSequence(begin,&nbsp;end)</pre></blockquote> * sb.subSequence(begin,&nbsp;end)}</pre>
* *
* behaves in exactly the same way as the invocation * behaves in exactly the same way as the invocation
* *
* <blockquote><pre> * <pre>{@code
* sb.substring(begin,&nbsp;end)</pre></blockquote> * sb.substring(begin,&nbsp;end)}</pre>
* *
* This method is provided so that this class can * This method is provided so that this class can
* implement the {@link CharSequence} interface. </p> * implement the {@link CharSequence} interface.
* *
* @param start the start index, inclusive. * @param start the start index, inclusive.
* @param end the end index, exclusive. * @param end the end index, exclusive.
@ -1287,9 +1287,9 @@ abstract class AbstractStringBuilder implements Appendable, CharSequence {
* Returns the index within this string of the first occurrence of the * Returns the index within this string of the first occurrence of the
* specified substring. The integer returned is the smallest value * specified substring. The integer returned is the smallest value
* <i>k</i> such that: * <i>k</i> such that:
* <blockquote><pre> * <pre>{@code
* this.toString().startsWith(str, <i>k</i>) * this.toString().startsWith(str, <i>k</i>)
* </pre></blockquote> * }</pre>
* is {@code true}. * is {@code true}.
* *
* @param str any string. * @param str any string.
@ -1306,10 +1306,10 @@ abstract class AbstractStringBuilder implements Appendable, CharSequence {
* Returns the index within this string of the first occurrence of the * Returns the index within this string of the first occurrence of the
* specified substring, starting at the specified index. The integer * specified substring, starting at the specified index. The integer
* returned is the smallest value {@code k} for which: * returned is the smallest value {@code k} for which:
* <blockquote><pre> * <pre>{@code
* k >= Math.min(fromIndex, this.length()) && * k >= Math.min(fromIndex, this.length()) &&
* this.toString().startsWith(str, k) * this.toString().startsWith(str, k)
* </pre></blockquote> * }</pre>
* If no such value of <i>k</i> exists, then -1 is returned. * If no such value of <i>k</i> exists, then -1 is returned.
* *
* @param str the substring for which to search. * @param str the substring for which to search.
@ -1326,9 +1326,9 @@ abstract class AbstractStringBuilder implements Appendable, CharSequence {
* of the specified substring. The rightmost empty string "" is * of the specified substring. The rightmost empty string "" is
* considered to occur at the index value {@code this.length()}. * considered to occur at the index value {@code this.length()}.
* The returned index is the largest value <i>k</i> such that * The returned index is the largest value <i>k</i> such that
* <blockquote><pre> * <pre>{@code
* this.toString().startsWith(str, k) * this.toString().startsWith(str, k)
* </pre></blockquote> * }</pre>
* is true. * is true.
* *
* @param str the substring to search for. * @param str the substring to search for.
@ -1345,10 +1345,10 @@ abstract class AbstractStringBuilder implements Appendable, CharSequence {
* Returns the index within this string of the last occurrence of the * Returns the index within this string of the last occurrence of the
* specified substring. The integer returned is the largest value <i>k</i> * specified substring. The integer returned is the largest value <i>k</i>
* such that: * such that:
* <blockquote><pre> * <pre>{@code
* k <= Math.min(fromIndex, this.length()) && * k <= Math.min(fromIndex, this.length()) &&
* this.toString().startsWith(str, k) * this.toString().startsWith(str, k)
* </pre></blockquote> * }</pre>
* If no such value of <i>k</i> exists, then -1 is returned. * If no such value of <i>k</i> exists, then -1 is returned.
* *
* @param str the substring to search for. * @param str the substring to search for.

View File

@ -29,7 +29,7 @@ package java.lang;
* Thrown to indicate that an attempt has been made to store the * Thrown to indicate that an attempt has been made to store the
* wrong type of object into an array of objects. For example, the * wrong type of object into an array of objects. For example, the
* following code generates an <code>ArrayStoreException</code>: * following code generates an <code>ArrayStoreException</code>:
* <p><blockquote><pre> * <blockquote><pre>
* Object x[] = new String[3]; * Object x[] = new String[3];
* x[0] = new Integer(0); * x[0] = new Integer(0);
* </pre></blockquote> * </pre></blockquote>

View File

@ -244,7 +244,7 @@ public final class Byte extends Number implements Comparable<Byte> {
* <dd><i>Sign<sub>opt</sub></i> {@code 0X} <i>HexDigits</i> * <dd><i>Sign<sub>opt</sub></i> {@code 0X} <i>HexDigits</i>
* <dd><i>Sign<sub>opt</sub></i> {@code #} <i>HexDigits</i> * <dd><i>Sign<sub>opt</sub></i> {@code #} <i>HexDigits</i>
* <dd><i>Sign<sub>opt</sub></i> {@code 0} <i>OctalDigits</i> * <dd><i>Sign<sub>opt</sub></i> {@code 0} <i>OctalDigits</i>
* <p> *
* <dt><i>Sign:</i> * <dt><i>Sign:</i>
* <dd>{@code -} * <dd>{@code -}
* <dd>{@code +} * <dd>{@code +}

View File

@ -5394,7 +5394,7 @@ class Character implements java.io.Serializable, Comparable<Character> {
* Other_Lowercase as defined by the Unicode Standard. * Other_Lowercase as defined by the Unicode Standard.
* <p> * <p>
* The following are examples of lowercase characters: * The following are examples of lowercase characters:
* <p><blockquote><pre> * <blockquote><pre>
* a b c d e f g h i j k l m n o p q r s t u v w x y z * a b c d e f g h i j k l m n o p q r s t u v w x y z
* '&#92;u00DF' '&#92;u00E0' '&#92;u00E1' '&#92;u00E2' '&#92;u00E3' '&#92;u00E4' '&#92;u00E5' '&#92;u00E6' * '&#92;u00DF' '&#92;u00E0' '&#92;u00E1' '&#92;u00E2' '&#92;u00E3' '&#92;u00E4' '&#92;u00E5' '&#92;u00E6'
* '&#92;u00E7' '&#92;u00E8' '&#92;u00E9' '&#92;u00EA' '&#92;u00EB' '&#92;u00EC' '&#92;u00ED' '&#92;u00EE' * '&#92;u00E7' '&#92;u00E8' '&#92;u00E9' '&#92;u00EA' '&#92;u00EB' '&#92;u00EC' '&#92;u00ED' '&#92;u00EE'
@ -5430,7 +5430,7 @@ class Character implements java.io.Serializable, Comparable<Character> {
* Other_Lowercase as defined by the Unicode Standard. * Other_Lowercase as defined by the Unicode Standard.
* <p> * <p>
* The following are examples of lowercase characters: * The following are examples of lowercase characters:
* <p><blockquote><pre> * <blockquote><pre>
* a b c d e f g h i j k l m n o p q r s t u v w x y z * a b c d e f g h i j k l m n o p q r s t u v w x y z
* '&#92;u00DF' '&#92;u00E0' '&#92;u00E1' '&#92;u00E2' '&#92;u00E3' '&#92;u00E4' '&#92;u00E5' '&#92;u00E6' * '&#92;u00DF' '&#92;u00E0' '&#92;u00E1' '&#92;u00E2' '&#92;u00E3' '&#92;u00E4' '&#92;u00E5' '&#92;u00E6'
* '&#92;u00E7' '&#92;u00E8' '&#92;u00E9' '&#92;u00EA' '&#92;u00EB' '&#92;u00EC' '&#92;u00ED' '&#92;u00EE' * '&#92;u00E7' '&#92;u00E8' '&#92;u00E9' '&#92;u00EA' '&#92;u00EB' '&#92;u00EC' '&#92;u00ED' '&#92;u00EE'
@ -5461,14 +5461,14 @@ class Character implements java.io.Serializable, Comparable<Character> {
* or it has contributory property Other_Uppercase as defined by the Unicode Standard. * or it has contributory property Other_Uppercase as defined by the Unicode Standard.
* <p> * <p>
* The following are examples of uppercase characters: * The following are examples of uppercase characters:
* <p><blockquote><pre> * <blockquote><pre>
* A B C D E F G H I J K L M N O P Q R S T U V W X Y Z * A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
* '&#92;u00C0' '&#92;u00C1' '&#92;u00C2' '&#92;u00C3' '&#92;u00C4' '&#92;u00C5' '&#92;u00C6' '&#92;u00C7' * '&#92;u00C0' '&#92;u00C1' '&#92;u00C2' '&#92;u00C3' '&#92;u00C4' '&#92;u00C5' '&#92;u00C6' '&#92;u00C7'
* '&#92;u00C8' '&#92;u00C9' '&#92;u00CA' '&#92;u00CB' '&#92;u00CC' '&#92;u00CD' '&#92;u00CE' '&#92;u00CF' * '&#92;u00C8' '&#92;u00C9' '&#92;u00CA' '&#92;u00CB' '&#92;u00CC' '&#92;u00CD' '&#92;u00CE' '&#92;u00CF'
* '&#92;u00D0' '&#92;u00D1' '&#92;u00D2' '&#92;u00D3' '&#92;u00D4' '&#92;u00D5' '&#92;u00D6' '&#92;u00D8' * '&#92;u00D0' '&#92;u00D1' '&#92;u00D2' '&#92;u00D3' '&#92;u00D4' '&#92;u00D5' '&#92;u00D6' '&#92;u00D8'
* '&#92;u00D9' '&#92;u00DA' '&#92;u00DB' '&#92;u00DC' '&#92;u00DD' '&#92;u00DE' * '&#92;u00D9' '&#92;u00DA' '&#92;u00DB' '&#92;u00DC' '&#92;u00DD' '&#92;u00DE'
* </pre></blockquote> * </pre></blockquote>
* <p> Many other Unicode characters are uppercase too.<p> * <p> Many other Unicode characters are uppercase too.
* *
* <p><b>Note:</b> This method cannot handle <a * <p><b>Note:</b> This method cannot handle <a
* href="#supplementary"> supplementary characters</a>. To support * href="#supplementary"> supplementary characters</a>. To support
@ -5496,7 +5496,7 @@ class Character implements java.io.Serializable, Comparable<Character> {
* or it has contributory property Other_Uppercase as defined by the Unicode Standard. * or it has contributory property Other_Uppercase as defined by the Unicode Standard.
* <p> * <p>
* The following are examples of uppercase characters: * The following are examples of uppercase characters:
* <p><blockquote><pre> * <blockquote><pre>
* A B C D E F G H I J K L M N O P Q R S T U V W X Y Z * A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
* '&#92;u00C0' '&#92;u00C1' '&#92;u00C2' '&#92;u00C3' '&#92;u00C4' '&#92;u00C5' '&#92;u00C6' '&#92;u00C7' * '&#92;u00C0' '&#92;u00C1' '&#92;u00C2' '&#92;u00C3' '&#92;u00C4' '&#92;u00C5' '&#92;u00C6' '&#92;u00C7'
* '&#92;u00C8' '&#92;u00C9' '&#92;u00CA' '&#92;u00CB' '&#92;u00CC' '&#92;u00CD' '&#92;u00CE' '&#92;u00CF' * '&#92;u00C8' '&#92;u00C9' '&#92;u00CA' '&#92;u00CB' '&#92;u00CC' '&#92;u00CD' '&#92;u00CE' '&#92;u00CF'
@ -5540,7 +5540,7 @@ class Character implements java.io.Serializable, Comparable<Character> {
* <li>{@code LATIN CAPITAL LETTER N WITH SMALL LETTER J} * <li>{@code LATIN CAPITAL LETTER N WITH SMALL LETTER J}
* <li>{@code LATIN CAPITAL LETTER D WITH SMALL LETTER Z} * <li>{@code LATIN CAPITAL LETTER D WITH SMALL LETTER Z}
* </ul> * </ul>
* <p> Many other Unicode characters are titlecase too.<p> * <p> Many other Unicode characters are titlecase too.
* *
* <p><b>Note:</b> This method cannot handle <a * <p><b>Note:</b> This method cannot handle <a
* href="#supplementary"> supplementary characters</a>. To support * href="#supplementary"> supplementary characters</a>. To support

View File

@ -91,7 +91,7 @@ import sun.reflect.misc.ReflectUtil;
* <p> The following example uses a {@code Class} object to print the * <p> The following example uses a {@code Class} object to print the
* class name of an object: * class name of an object:
* *
* <p> <blockquote><pre> * <blockquote><pre>
* void printClassName(Object obj) { * void printClassName(Object obj) {
* System.out.println("The class of " + obj + * System.out.println("The class of " + obj +
* " is " + obj.getClass().getName()); * " is " + obj.getClass().getName());
@ -103,7 +103,7 @@ import sun.reflect.misc.ReflectUtil;
* <cite>The Java&trade; Language Specification</cite>. * <cite>The Java&trade; Language Specification</cite>.
* For example: * For example:
* *
* <p> <blockquote> * <blockquote>
* {@code System.out.println("The name of class Foo is: "+Foo.class.getName());} * {@code System.out.println("The name of class Foo is: "+Foo.class.getName());}
* </blockquote> * </blockquote>
* *

View File

@ -29,7 +29,7 @@ package java.lang;
* Thrown to indicate that the code has attempted to cast an object * Thrown to indicate that the code has attempted to cast an object
* to a subclass of which it is not an instance. For example, the * to a subclass of which it is not an instance. For example, the
* following code generates a <code>ClassCastException</code>: * following code generates a <code>ClassCastException</code>:
* <p><blockquote><pre> * <blockquote><pre>
* Object x = new Integer(0); * Object x = new Integer(0);
* System.out.println((String)x); * System.out.println((String)x);
* </pre></blockquote> * </pre></blockquote>

View File

@ -361,15 +361,11 @@ public final class Double extends Number implements Comparable<Double> {
* <dd><i>SignedInteger</i> * <dd><i>SignedInteger</i>
* </dl> * </dl>
* *
* <p>
*
* <dl> * <dl>
* <dt><i>HexFloatingPointLiteral</i>: * <dt><i>HexFloatingPointLiteral</i>:
* <dd> <i>HexSignificand BinaryExponent FloatTypeSuffix<sub>opt</sub></i> * <dd> <i>HexSignificand BinaryExponent FloatTypeSuffix<sub>opt</sub></i>
* </dl> * </dl>
* *
* <p>
*
* <dl> * <dl>
* <dt><i>HexSignificand:</i> * <dt><i>HexSignificand:</i>
* <dd><i>HexNumeral</i> * <dd><i>HexNumeral</i>
@ -380,15 +376,11 @@ public final class Double extends Number implements Comparable<Double> {
* </i>{@code .} <i>HexDigits</i> * </i>{@code .} <i>HexDigits</i>
* </dl> * </dl>
* *
* <p>
*
* <dl> * <dl>
* <dt><i>BinaryExponent:</i> * <dt><i>BinaryExponent:</i>
* <dd><i>BinaryExponentIndicator SignedInteger</i> * <dd><i>BinaryExponentIndicator SignedInteger</i>
* </dl> * </dl>
* *
* <p>
*
* <dl> * <dl>
* <dt><i>BinaryExponentIndicator:</i> * <dt><i>BinaryExponentIndicator:</i>
* <dd>{@code p} * <dd>{@code p}

View File

@ -321,15 +321,11 @@ public final class Float extends Number implements Comparable<Float> {
* <dd><i>SignedInteger</i> * <dd><i>SignedInteger</i>
* </dl> * </dl>
* *
* <p>
*
* <dl> * <dl>
* <dt><i>HexFloatingPointLiteral</i>: * <dt><i>HexFloatingPointLiteral</i>:
* <dd> <i>HexSignificand BinaryExponent FloatTypeSuffix<sub>opt</sub></i> * <dd> <i>HexSignificand BinaryExponent FloatTypeSuffix<sub>opt</sub></i>
* </dl> * </dl>
* *
* <p>
*
* <dl> * <dl>
* <dt><i>HexSignificand:</i> * <dt><i>HexSignificand:</i>
* <dd><i>HexNumeral</i> * <dd><i>HexNumeral</i>
@ -340,15 +336,11 @@ public final class Float extends Number implements Comparable<Float> {
* </i>{@code .} <i>HexDigits</i> * </i>{@code .} <i>HexDigits</i>
* </dl> * </dl>
* *
* <p>
*
* <dl> * <dl>
* <dt><i>BinaryExponent:</i> * <dt><i>BinaryExponent:</i>
* <dd><i>BinaryExponentIndicator SignedInteger</i> * <dd><i>BinaryExponentIndicator SignedInteger</i>
* </dl> * </dl>
* *
* <p>
*
* <dl> * <dl>
* <dt><i>BinaryExponentIndicator:</i> * <dt><i>BinaryExponentIndicator:</i>
* <dd>{@code p} * <dd>{@code p}

View File

@ -1123,7 +1123,7 @@ public final class Integer extends Number implements Comparable<Integer> {
* <dd><i>Sign<sub>opt</sub></i> {@code 0X} <i>HexDigits</i> * <dd><i>Sign<sub>opt</sub></i> {@code 0X} <i>HexDigits</i>
* <dd><i>Sign<sub>opt</sub></i> {@code #} <i>HexDigits</i> * <dd><i>Sign<sub>opt</sub></i> {@code #} <i>HexDigits</i>
* <dd><i>Sign<sub>opt</sub></i> {@code 0} <i>OctalDigits</i> * <dd><i>Sign<sub>opt</sub></i> {@code 0} <i>OctalDigits</i>
* <p> *
* <dt><i>Sign:</i> * <dt><i>Sign:</i>
* <dd>{@code -} * <dd>{@code -}
* <dd>{@code +} * <dd>{@code +}

View File

@ -99,4 +99,3 @@ public interface Iterable<T> {
return Spliterators.spliteratorUnknownSize(iterator(), 0); return Spliterators.spliteratorUnknownSize(iterator(), 0);
} }
} }

View File

@ -853,7 +853,7 @@ public final class Long extends Number implements Comparable<Long> {
* <dd><i>Sign<sub>opt</sub></i> {@code 0X} <i>HexDigits</i> * <dd><i>Sign<sub>opt</sub></i> {@code 0X} <i>HexDigits</i>
* <dd><i>Sign<sub>opt</sub></i> {@code #} <i>HexDigits</i> * <dd><i>Sign<sub>opt</sub></i> {@code #} <i>HexDigits</i>
* <dd><i>Sign<sub>opt</sub></i> {@code 0} <i>OctalDigits</i> * <dd><i>Sign<sub>opt</sub></i> {@code 0} <i>OctalDigits</i>
* <p> *
* <dt><i>Sign:</i> * <dt><i>Sign:</i>
* <dd>{@code -} * <dd>{@code -}
* <dd>{@code +} * <dd>{@code +}

View File

@ -47,7 +47,6 @@ import java.util.StringTokenizer;
* The following table lists all the possible RuntimePermission target names, * The following table lists all the possible RuntimePermission target names,
* and for each provides a description of what the permission allows * and for each provides a description of what the permission allows
* and a discussion of the risks of granting code the permission. * and a discussion of the risks of granting code the permission.
* <P>
* *
* <table border=1 cellpadding=5 summary="permission target name, * <table border=1 cellpadding=5 summary="permission target name,
* what the target allows,and associated risks"> * what the target allows,and associated risks">

View File

@ -249,7 +249,7 @@ public final class Short extends Number implements Comparable<Short> {
* <dd><i>Sign<sub>opt</sub></i> {@code 0X} <i>HexDigits</i> * <dd><i>Sign<sub>opt</sub></i> {@code 0X} <i>HexDigits</i>
* <dd><i>Sign<sub>opt</sub></i> {@code #} <i>HexDigits</i> * <dd><i>Sign<sub>opt</sub></i> {@code #} <i>HexDigits</i>
* <dd><i>Sign<sub>opt</sub></i> {@code 0} <i>OctalDigits</i> * <dd><i>Sign<sub>opt</sub></i> {@code 0} <i>OctalDigits</i>
* <p> *
* <dt><i>Sign:</i> * <dt><i>Sign:</i>
* <dd>{@code -} * <dd>{@code -}
* <dd>{@code +} * <dd>{@code +}

View File

@ -47,16 +47,16 @@ import java.util.regex.PatternSyntaxException;
* Strings are constant; their values cannot be changed after they * Strings are constant; their values cannot be changed after they
* are created. String buffers support mutable strings. * are created. String buffers support mutable strings.
* Because String objects are immutable they can be shared. For example: * Because String objects are immutable they can be shared. For example:
* <p><blockquote><pre> * <blockquote><pre>
* String str = "abc"; * String str = "abc";
* </pre></blockquote><p> * </pre></blockquote><p>
* is equivalent to: * is equivalent to:
* <p><blockquote><pre> * <blockquote><pre>
* char data[] = {'a', 'b', 'c'}; * char data[] = {'a', 'b', 'c'};
* String str = new String(data); * String str = new String(data);
* </pre></blockquote><p> * </pre></blockquote><p>
* Here are some more examples of how strings can be used: * Here are some more examples of how strings can be used:
* <p><blockquote><pre> * <blockquote><pre>
* System.out.println("abc"); * System.out.println("abc");
* String cde = "cde"; * String cde = "cde";
* System.out.println("abc" + cde); * System.out.println("abc" + cde);
@ -786,7 +786,7 @@ public final class String
* {@code srcEnd-srcBegin}). The characters are copied into the * {@code srcEnd-srcBegin}). The characters are copied into the
* subarray of {@code dst} starting at index {@code dstBegin} * subarray of {@code dst} starting at index {@code dstBegin}
* and ending at index: * and ending at index:
* <p><blockquote><pre> * <blockquote><pre>
* dstbegin + (srcEnd-srcBegin) - 1 * dstbegin + (srcEnd-srcBegin) - 1
* </pre></blockquote> * </pre></blockquote>
* *
@ -2662,7 +2662,7 @@ public final class String
* {@code String} may be a different length than the original {@code String}. * {@code String} may be a different length than the original {@code String}.
* <p> * <p>
* Examples of locale-sensitive and 1:M case mappings are in the following table. * Examples of locale-sensitive and 1:M case mappings are in the following table.
* <p> *
* <table border="1" summary="Examples of locale-sensitive and 1:M case mappings. Shows Language code of locale, lower case, upper case, and description."> * <table border="1" summary="Examples of locale-sensitive and 1:M case mappings. Shows Language code of locale, lower case, upper case, and description.">
* <tr> * <tr>
* <th>Language Code of Locale</th> * <th>Language Code of Locale</th>

View File

@ -76,7 +76,7 @@ import sun.security.util.SecurityConstants;
* <code>Thread</code>. An instance of the subclass can then be * <code>Thread</code>. An instance of the subclass can then be
* allocated and started. For example, a thread that computes primes * allocated and started. For example, a thread that computes primes
* larger than a stated value could be written as follows: * larger than a stated value could be written as follows:
* <p><hr><blockquote><pre> * <hr><blockquote><pre>
* class PrimeThread extends Thread { * class PrimeThread extends Thread {
* long minPrime; * long minPrime;
* PrimeThread(long minPrime) { * PrimeThread(long minPrime) {
@ -91,7 +91,7 @@ import sun.security.util.SecurityConstants;
* </pre></blockquote><hr> * </pre></blockquote><hr>
* <p> * <p>
* The following code would then create a thread and start it running: * The following code would then create a thread and start it running:
* <p><blockquote><pre> * <blockquote><pre>
* PrimeThread p = new PrimeThread(143); * PrimeThread p = new PrimeThread(143);
* p.start(); * p.start();
* </pre></blockquote> * </pre></blockquote>
@ -102,7 +102,7 @@ import sun.security.util.SecurityConstants;
* then be allocated, passed as an argument when creating * then be allocated, passed as an argument when creating
* <code>Thread</code>, and started. The same example in this other * <code>Thread</code>, and started. The same example in this other
* style looks like the following: * style looks like the following:
* <p><hr><blockquote><pre> * <hr><blockquote><pre>
* class PrimeRun implements Runnable { * class PrimeRun implements Runnable {
* long minPrime; * long minPrime;
* PrimeRun(long minPrime) { * PrimeRun(long minPrime) {
@ -117,7 +117,7 @@ import sun.security.util.SecurityConstants;
* </pre></blockquote><hr> * </pre></blockquote><hr>
* <p> * <p>
* The following code would then create a thread and start it running: * The following code would then create a thread and start it running:
* <p><blockquote><pre> * <blockquote><pre>
* PrimeRun p = new PrimeRun(143); * PrimeRun p = new PrimeRun(143);
* new Thread(p).start(); * new Thread(p).start();
* </pre></blockquote> * </pre></blockquote>

View File

@ -60,7 +60,7 @@ import sun.management.ManagementFactoryHelper;
* one or more <i>platform MXBeans</i> representing * one or more <i>platform MXBeans</i> representing
* the management interface of a component of the Java virtual * the management interface of a component of the Java virtual
* machine. * machine.
* <p> *
* <h3><a name="MXBean">Platform MXBeans</a></h3> * <h3><a name="MXBean">Platform MXBeans</a></h3>
* <p> * <p>
* A platform MXBean is a <i>managed bean</i> that * A platform MXBean is a <i>managed bean</i> that

View File

@ -33,10 +33,8 @@ package java.lang.management;
* The following table * The following table
* provides a summary description of what the permission allows, * provides a summary description of what the permission allows,
* and discusses the risks of granting code the permission. * and discusses the risks of granting code the permission.
* <P>
* *
* <table border=1 cellpadding=5 summary="Table shows permission target name, wh * <table border=1 cellpadding=5 summary="Table shows permission target name, what the permission allows, and associated risks">
at the permission allows, and associated risks">
* <tr> * <tr>
* <th>Permission Target Name</th> * <th>Permission Target Name</th>
* <th>What the Permission Allows</th> * <th>What the Permission Allows</th>

View File

@ -79,7 +79,7 @@ import sun.management.MemoryUsageCompositeData;
* </table> * </table>
* *
* Below is a picture showing an example of a memory pool: * Below is a picture showing an example of a memory pool:
* <p> *
* <pre> * <pre>
* +----------------------------------------------+ * +----------------------------------------------+
* +//////////////// | + * +//////////////// | +
@ -250,7 +250,7 @@ public class MemoryUsage {
* Returns a <tt>MemoryUsage</tt> object represented by the * Returns a <tt>MemoryUsage</tt> object represented by the
* given <tt>CompositeData</tt>. The given <tt>CompositeData</tt> * given <tt>CompositeData</tt>. The given <tt>CompositeData</tt>
* must contain the following attributes: * must contain the following attributes:
* <p> *
* <blockquote> * <blockquote>
* <table border summary="The attributes and the types the given CompositeData contains"> * <table border summary="The attributes and the types the given CompositeData contains">
* <tr> * <tr>

View File

@ -82,7 +82,7 @@ Java virtual machine and the runtime in the following ways:
<b>1. Direct access to an MXBean interface</b> <b>1. Direct access to an MXBean interface</b>
<p> <p>
<ul> <ul>
<li>Get an MXBean instance locally in the running Java virtual machine:<p> <li>Get an MXBean instance locally in the running Java virtual machine:
<pre> <pre>
RuntimeMXBean mxbean = ManagementFactory.getRuntimeMXBean(); RuntimeMXBean mxbean = ManagementFactory.getRuntimeMXBean();
@ -103,7 +103,7 @@ Java virtual machine and the runtime in the following ways:
<p> <p>
</li> </li>
<li>Construct an MXBean proxy instance that forwards the <li>Construct an MXBean proxy instance that forwards the
method calls to a given MBeanServer:<p> method calls to a given MBeanServer:
<pre> <pre>
MBeanServerConnection mbs; MBeanServerConnection mbs;

View File

@ -31,7 +31,6 @@ package java.lang.reflect;
* The following table * The following table
* provides a summary description of what the permission allows, * provides a summary description of what the permission allows,
* and discusses the risks of granting code the permission. * and discusses the risks of granting code the permission.
* <P>
* *
* <table border=1 cellpadding=5 summary="Table shows permission target name, what the permission allows, and associated risks"> * <table border=1 cellpadding=5 summary="Table shows permission target name, what the permission allows, and associated risks">
* <tr> * <tr>

View File

@ -196,7 +196,7 @@ class DatagramSocket implements java.io.Closeable {
* socket address. * socket address.
* <p> * <p>
* If, if the address is {@code null}, creates an unbound socket. * If, if the address is {@code null}, creates an unbound socket.
* <p> *
* <p>If there is a security manager, * <p>If there is a security manager,
* its {@code checkListen} method is first called * its {@code checkListen} method is first called
* with the port from the socket address * with the port from the socket address
@ -1109,7 +1109,7 @@ class DatagramSocket implements java.io.Closeable {
* represent the value of the TOS octet in IP packets sent by * represent the value of the TOS octet in IP packets sent by
* the socket. * the socket.
* RFC 1349 defines the TOS values as follows: * RFC 1349 defines the TOS values as follows:
* <p> *
* <UL> * <UL>
* <LI><CODE>IPTOS_LOWCOST (0x02)</CODE></LI> * <LI><CODE>IPTOS_LOWCOST (0x02)</CODE></LI>
* <LI><CODE>IPTOS_RELIABILITY (0x04)</CODE></LI> * <LI><CODE>IPTOS_RELIABILITY (0x04)</CODE></LI>

View File

@ -133,7 +133,7 @@ import java.util.Arrays;
* representation. However, it will be converted into an IPv4 * representation. However, it will be converted into an IPv4
* address.</td></tr> * address.</td></tr>
* </table></blockquote> * </table></blockquote>
* <p> *
* <h4><A NAME="scoped">Textual representation of IPv6 scoped addresses</a></h4> * <h4><A NAME="scoped">Textual representation of IPv6 scoped addresses</a></h4>
* *
* <p> The textual representation of IPv6 addresses as described above can be * <p> The textual representation of IPv6 addresses as described above can be
@ -150,11 +150,11 @@ import java.util.Arrays;
* *
* <p> The general format for specifying the <i>scope_id</i> is the following: * <p> The general format for specifying the <i>scope_id</i> is the following:
* *
* <p><blockquote><i>IPv6-address</i>%<i>scope_id</i></blockquote> * <blockquote><i>IPv6-address</i>%<i>scope_id</i></blockquote>
* <p> The IPv6-address is a literal IPv6 address as described above. * <p> The IPv6-address is a literal IPv6 address as described above.
* The <i>scope_id</i> refers to an interface on the local system, and it can be * The <i>scope_id</i> refers to an interface on the local system, and it can be
* specified in two ways. * specified in two ways.
* <p><ol><li><i>As a numeric identifier.</i> This must be a positive integer * <ol><li><i>As a numeric identifier.</i> This must be a positive integer
* that identifies the particular interface and scope as understood by the * that identifies the particular interface and scope as understood by the
* system. Usually, the numeric values can be determined through administration * system. Usually, the numeric values can be determined through administration
* tools on the system. Each interface may have multiple values, one for each * tools on the system. Each interface may have multiple values, one for each

View File

@ -140,7 +140,7 @@ class MulticastSocket extends DatagramSocket {
* Create a MulticastSocket bound to the specified socket address. * Create a MulticastSocket bound to the specified socket address.
* <p> * <p>
* Or, if the address is {@code null}, create an unbound socket. * Or, if the address is {@code null}, create an unbound socket.
* <p> *
* <p>If there is a security manager, * <p>If there is a security manager,
* its {@code checkListen} method is first called * its {@code checkListen} method is first called
* with the SocketAddress port as its argument to ensure the operation is allowed. * with the SocketAddress port as its argument to ensure the operation is allowed.

View File

@ -46,7 +46,6 @@ import java.util.StringTokenizer;
* The following table lists all the possible NetPermission target names, * The following table lists all the possible NetPermission target names,
* and for each provides a description of what the permission allows * and for each provides a description of what the permission allows
* and a discussion of the risks of granting code the permission. * and a discussion of the risks of granting code the permission.
* <P>
* *
* <table border=1 cellpadding=5 summary="Permission target name, what the permission allows, and associated risks"> * <table border=1 cellpadding=5 summary="Permission target name, what the permission allows, and associated risks">
* <tr> * <tr>

View File

@ -66,8 +66,8 @@ public class Proxy {
* Used, for instance, to create sockets bypassing any other global * Used, for instance, to create sockets bypassing any other global
* proxy settings (like SOCKS): * proxy settings (like SOCKS):
* <P> * <P>
* {@code Socket s = new Socket(Proxy.NO_PROXY);}<br> * {@code Socket s = new Socket(Proxy.NO_PROXY);}
* <P> *
*/ */
public final static Proxy NO_PROXY = new Proxy(); public final static Proxy NO_PROXY = new Proxy();

View File

@ -1230,13 +1230,13 @@ class Socket implements java.io.Closeable {
* Generally, the window size can be modified at any time when a socket is * Generally, the window size can be modified at any time when a socket is
* connected. However, if a receive window larger than 64K is required then * connected. However, if a receive window larger than 64K is required then
* this must be requested <B>before</B> the socket is connected to the * this must be requested <B>before</B> the socket is connected to the
* remote peer. There are two cases to be aware of:<p> * remote peer. There are two cases to be aware of:
* <ol> * <ol>
* <li>For sockets accepted from a ServerSocket, this must be done by calling * <li>For sockets accepted from a ServerSocket, this must be done by calling
* {@link ServerSocket#setReceiveBufferSize(int)} before the ServerSocket * {@link ServerSocket#setReceiveBufferSize(int)} before the ServerSocket
* is bound to a local address.<p></li> * is bound to a local address.<p></li>
* <li>For client sockets, setReceiveBufferSize() must be called before * <li>For client sockets, setReceiveBufferSize() must be called before
* connecting the socket to its remote peer.<p></li></ol> * connecting the socket to its remote peer.</li></ol>
* @param size the size to which to set the receive buffer * @param size the size to which to set the receive buffer
* size. This value must be greater than 0. * size. This value must be greater than 0.
* *
@ -1329,7 +1329,7 @@ class Socket implements java.io.Closeable {
* represent the value of the TOS octet in IP packets sent by * represent the value of the TOS octet in IP packets sent by
* the socket. * the socket.
* RFC 1349 defines the TOS values as follows: * RFC 1349 defines the TOS values as follows:
* <p> *
* <UL> * <UL>
* <LI><CODE>IPTOS_LOWCOST (0x02)</CODE></LI> * <LI><CODE>IPTOS_LOWCOST (0x02)</CODE></LI>
* <LI><CODE>IPTOS_RELIABILITY (0x04)</CODE></LI> * <LI><CODE>IPTOS_RELIABILITY (0x04)</CODE></LI>

View File

@ -134,7 +134,7 @@ public interface SocketOptions {
* previously written data. * previously written data.
*<P> *<P>
* Valid for TCP only: SocketImpl. * Valid for TCP only: SocketImpl.
* <P> *
* @see Socket#setTcpNoDelay * @see Socket#setTcpNoDelay
* @see Socket#getTcpNoDelay * @see Socket#getTcpNoDelay
*/ */
@ -155,7 +155,7 @@ public interface SocketOptions {
* This option <B>must</B> be specified in the constructor. * This option <B>must</B> be specified in the constructor.
* <P> * <P>
* Valid for: SocketImpl, DatagramSocketImpl * Valid for: SocketImpl, DatagramSocketImpl
* <P> *
* @see Socket#getLocalAddress * @see Socket#getLocalAddress
* @see DatagramSocket#getLocalAddress * @see DatagramSocket#getLocalAddress
*/ */
@ -186,7 +186,7 @@ public interface SocketOptions {
* want to use other than the system default. Takes/returns an InetAddress. * want to use other than the system default. Takes/returns an InetAddress.
* <P> * <P>
* Valid for Multicast: DatagramSocketImpl * Valid for Multicast: DatagramSocketImpl
* <P> *
* @see MulticastSocket#setInterface(InetAddress) * @see MulticastSocket#setInterface(InetAddress)
* @see MulticastSocket#getInterface() * @see MulticastSocket#getInterface()
*/ */

View File

@ -779,27 +779,27 @@ public final class SocketPermission extends Permission
* specified permission. * specified permission.
* <P> * <P>
* More specifically, this method first ensures that all of the following * More specifically, this method first ensures that all of the following
* are true (and returns false if any of them are not):<p> * are true (and returns false if any of them are not):
* <ul> * <ul>
* <li> <i>p</i> is an instanceof SocketPermission,<p> * <li> <i>p</i> is an instanceof SocketPermission,
* <li> <i>p</i>'s actions are a proper subset of this * <li> <i>p</i>'s actions are a proper subset of this
* object's actions, and<p> * object's actions, and
* <li> <i>p</i>'s port range is included in this port range. Note: * <li> <i>p</i>'s port range is included in this port range. Note:
* port range is ignored when p only contains the action, 'resolve'.<p> * port range is ignored when p only contains the action, 'resolve'.
* </ul> * </ul>
* *
* Then {@code implies} checks each of the following, in order, * Then {@code implies} checks each of the following, in order,
* and for each returns true if the stated condition is true:<p> * and for each returns true if the stated condition is true:
* <ul> * <ul>
* <li> If this object was initialized with a single IP address and one of <i>p</i>'s * <li> If this object was initialized with a single IP address and one of <i>p</i>'s
* IP addresses is equal to this object's IP address.<p> * IP addresses is equal to this object's IP address.
* <li>If this object is a wildcard domain (such as *.sun.com), and * <li>If this object is a wildcard domain (such as *.sun.com), and
* <i>p</i>'s canonical name (the name without any preceding *) * <i>p</i>'s canonical name (the name without any preceding *)
* ends with this object's canonical host name. For example, *.sun.com * ends with this object's canonical host name. For example, *.sun.com
* implies *.eng.sun.com..<p> * implies *.eng.sun.com.
* <li>If this object was not initialized with a single IP address, and one of this * <li>If this object was not initialized with a single IP address, and one of this
* object's IP addresses equals one of <i>p</i>'s IP addresses.<p> * object's IP addresses equals one of <i>p</i>'s IP addresses.
* <li>If this canonical name equals <i>p</i>'s canonical name.<p> * <li>If this canonical name equals <i>p</i>'s canonical name.
* </ul> * </ul>
* *
* If none of the above are true, {@code implies} returns false. * If none of the above are true, {@code implies} returns false.

View File

@ -389,20 +389,20 @@ import java.lang.NullPointerException; // for javadoc
* colon following a host name but no port (as in * colon following a host name but no port (as in
* {@code http://java.sun.com:}&nbsp;), and that does not encode characters * {@code http://java.sun.com:}&nbsp;), and that does not encode characters
* except those that must be quoted, the following identities also hold: * except those that must be quoted, the following identities also hold:
* <p><pre> * <pre>
* new URI(<i>u</i>.getScheme(), * new URI(<i>u</i>.getScheme(),
* <i>u</i>.getSchemeSpecificPart(), * <i>u</i>.getSchemeSpecificPart(),
* <i>u</i>.getFragment()) * <i>u</i>.getFragment())
* .equals(<i>u</i>)</pre> * .equals(<i>u</i>)</pre>
* in all cases, * in all cases,
* <p><pre> * <pre>
* new URI(<i>u</i>.getScheme(), * new URI(<i>u</i>.getScheme(),
* <i>u</i>.getUserInfo(), <i>u</i>.getAuthority(), * <i>u</i>.getUserInfo(), <i>u</i>.getAuthority(),
* <i>u</i>.getPath(), <i>u</i>.getQuery(), * <i>u</i>.getPath(), <i>u</i>.getQuery(),
* <i>u</i>.getFragment()) * <i>u</i>.getFragment())
* .equals(<i>u</i>)</pre> * .equals(<i>u</i>)</pre>
* if <i>u</i> is hierarchical, and * if <i>u</i> is hierarchical, and
* <p><pre> * <pre>
* new URI(<i>u</i>.getScheme(), * new URI(<i>u</i>.getScheme(),
* <i>u</i>.getUserInfo(), <i>u</i>.getHost(), <i>u</i>.getPort(), * <i>u</i>.getUserInfo(), <i>u</i>.getHost(), <i>u</i>.getPort(),
* <i>u</i>.getPath(), <i>u</i>.getQuery(), * <i>u</i>.getPath(), <i>u</i>.getQuery(),

View File

@ -45,7 +45,7 @@ import sun.net.www.MessageHeader;
* application and a URL. Instances of this class can be used both to * application and a URL. Instances of this class can be used both to
* read from and to write to the resource referenced by the URL. In * read from and to write to the resource referenced by the URL. In
* general, creating a connection to a URL is a multistep process: * general, creating a connection to a URL is a multistep process:
* <p> *
* <center><table border=2 summary="Describes the process of creating a connection to a URL: openConnection() and connect() over time."> * <center><table border=2 summary="Describes the process of creating a connection to a URL: openConnection() and connect() over time.">
* <tr><th>{@code openConnection()}</th> * <tr><th>{@code openConnection()}</th>
* <th>{@code connect()}</th></tr> * <th>{@code connect()}</th></tr>

View File

@ -43,7 +43,7 @@ import java.io.*;
* as the start of a special escaped sequence. * as the start of a special escaped sequence.
* <p> * <p>
* The following rules are applied in the conversion: * The following rules are applied in the conversion:
* <p> *
* <ul> * <ul>
* <li>The alphanumeric characters &quot;{@code a}&quot; through * <li>The alphanumeric characters &quot;{@code a}&quot; through
* &quot;{@code z}&quot;, &quot;{@code A}&quot; through * &quot;{@code z}&quot;, &quot;{@code A}&quot; through

View File

@ -49,7 +49,6 @@ import sun.security.action.GetPropertyAction;
* <p> * <p>
* When encoding a String, the following rules apply: * When encoding a String, the following rules apply:
* *
* <p>
* <ul> * <ul>
* <li>The alphanumeric characters &quot;{@code a}&quot; through * <li>The alphanumeric characters &quot;{@code a}&quot; through
* &quot;{@code z}&quot;, &quot;{@code A}&quot; through * &quot;{@code z}&quot;, &quot;{@code A}&quot; through

View File

@ -45,7 +45,7 @@ import java.security.Permission;
* </pre> * </pre>
* <i>scheme</i> will typically be http or https, but is not restricted by this * <i>scheme</i> will typically be http or https, but is not restricted by this
* class. * class.
* <i>authority</i> is specified as:<p> * <i>authority</i> is specified as:
* <pre> * <pre>
* authority = hostrange [ : portrange ] * authority = hostrange [ : portrange ]
* portrange = portnumber | -portnumber | portnumber-[portnumber] | * * portrange = portnumber | -portnumber | portnumber-[portnumber] | *
@ -223,7 +223,7 @@ public final class URLPermission extends Permission {
* Checks if this URLPermission implies the given permission. * Checks if this URLPermission implies the given permission.
* Specifically, the following checks are done as if in the * Specifically, the following checks are done as if in the
* following sequence: * following sequence:
* <p><ul> * <ul>
* <li>if 'p' is not an instance of URLPermission return false</li> * <li>if 'p' is not an instance of URLPermission return false</li>
* <li>if any of p's methods are not in this's method list, and if * <li>if any of p's methods are not in this's method list, and if
* this's method list is not equal to "*", then return false.</li> * this's method list is not equal to "*", then return false.</li>
@ -242,7 +242,7 @@ public final class URLPermission extends Permission {
* <li>otherwise, return false</li> * <li>otherwise, return false</li>
* </ul> * </ul>
* <p>Some examples of how paths are matched are shown below: * <p>Some examples of how paths are matched are shown below:
* <p><table border> * <table border>
* <caption>Examples of Path Matching</caption> * <caption>Examples of Path Matching</caption>
* <tr><th>this's path</th><th>p's path</th><th>match</th></tr> * <tr><th>this's path</th><th>p's path</th><th>match</th></tr>
* <tr><td>/a/b</td><td>/a/b</td><td>yes</td></tr> * <tr><td>/a/b</td><td>/a/b</td><td>yes</td></tr>

View File

@ -127,9 +127,9 @@
* resources, then convert it into a {@link java.net.URL} when it is time to * resources, then convert it into a {@link java.net.URL} when it is time to
* access the resource. From that URL, you can either get the * access the resource. From that URL, you can either get the
* {@link java.net.URLConnection} for fine control, or get directly the * {@link java.net.URLConnection} for fine control, or get directly the
* InputStream.<p> * InputStream.
* <p>Here is an example:</p> * <p>Here is an example:</p>
* <p><pre> * <pre>
* URI uri = new URI("http://java.sun.com/"); * URI uri = new URI("http://java.sun.com/");
* URL url = uri.toURL(); * URL url = uri.toURL();
* InputStream in = url.openStream(); * InputStream in = url.openStream();
@ -147,7 +147,7 @@
* the {@code java.protocol.handler.pkgs} system property. For instance if * the {@code java.protocol.handler.pkgs} system property. For instance if
* it is set to {@code myapp.protocols}, then the URL code will try, in the * it is set to {@code myapp.protocols}, then the URL code will try, in the
* case of http, first to load {@code myapp.protocols.http.Handler}, then, * case of http, first to load {@code myapp.protocols.http.Handler}, then,
* if this fails, {@code http.Handler} from the default location.<p> * if this fails, {@code http.Handler} from the default location.
* <p>Note that the Handler class <b>has to</b> be a subclass of the abstract * <p>Note that the Handler class <b>has to</b> be a subclass of the abstract
* class {@link java.net.URLStreamHandler}.</p> * class {@link java.net.URLStreamHandler}.</p>
* <h2>Additional Specification</h2> * <h2>Additional Specification</h2>

View File

@ -1129,7 +1129,7 @@ public abstract class $Type$Buffer
* *
* <p> Two $type$ buffers are equal if, and only if, * <p> Two $type$ buffers are equal if, and only if,
* *
* <p><ol> * <ol>
* *
* <li><p> They have the same element type, </p></li> * <li><p> They have the same element type, </p></li>
* *

View File

@ -355,7 +355,7 @@ public abstract class FileSystem
* *
* <p> The following rules are used to interpret glob patterns: * <p> The following rules are used to interpret glob patterns:
* *
* <p> <ul> * <ul>
* <li><p> The {@code *} character matches zero or more {@link Character * <li><p> The {@code *} character matches zero or more {@link Character
* characters} of a {@link Path#getName(int) name} component without * characters} of a {@link Path#getName(int) name} component without
* crossing directory boundaries. </p></li> * crossing directory boundaries. </p></li>

View File

@ -154,21 +154,21 @@ public abstract class ActivationGroup
* active). If the object does not call * active). If the object does not call
* <code>Activatable.inactive</code> when it deactivates, the * <code>Activatable.inactive</code> when it deactivates, the
* object will never be garbage collected since the group keeps * object will never be garbage collected since the group keeps
* strong references to the objects it creates. <p> * strong references to the objects it creates.
* *
* <p>The group's <code>inactiveObject</code> method unexports the * <p>The group's <code>inactiveObject</code> method unexports the
* remote object from the RMI runtime so that the object can no * remote object from the RMI runtime so that the object can no
* longer receive incoming RMI calls. An object will only be unexported * longer receive incoming RMI calls. An object will only be unexported
* if the object has no pending or executing calls. * if the object has no pending or executing calls.
* The subclass of <code>ActivationGroup</code> must override this * The subclass of <code>ActivationGroup</code> must override this
* method and unexport the object. <p> * method and unexport the object.
* *
* <p>After removing the object from the RMI runtime, the group * <p>After removing the object from the RMI runtime, the group
* must inform its <code>ActivationMonitor</code> (via the monitor's * must inform its <code>ActivationMonitor</code> (via the monitor's
* <code>inactiveObject</code> method) that the remote object is * <code>inactiveObject</code> method) that the remote object is
* not currently active so that the remote object will be * not currently active so that the remote object will be
* re-activated by the activator upon a subsequent activation * re-activated by the activator upon a subsequent activation
* request.<p> * request.
* *
* <p>This method simply informs the group's monitor that the object * <p>This method simply informs the group's monitor that the object
* is inactive. It is up to the concrete subclass of ActivationGroup * is inactive. It is up to the concrete subclass of ActivationGroup

View File

@ -67,7 +67,7 @@ public final class VMID implements java.io.Serializable {
* conditions: a) the conditions for uniqueness for objects of * conditions: a) the conditions for uniqueness for objects of
* the class <code>java.rmi.server.UID</code> are satisfied, and b) an * the class <code>java.rmi.server.UID</code> are satisfied, and b) an
* address can be obtained for this host that is unique and constant * address can be obtained for this host that is unique and constant
* for the lifetime of this object. <p> * for the lifetime of this object.
*/ */
public VMID() { public VMID() {
addr = randomBytes; addr = randomBytes;

View File

@ -36,7 +36,7 @@ import sun.rmi.server.UnicastServerRef2;
* below, the stub for a remote object being exported is obtained as * below, the stub for a remote object being exported is obtained as
* follows: * follows:
* *
* <p><ul> * <ul>
* *
* <li>If the remote object is exported using the {@link * <li>If the remote object is exported using the {@link
* #exportObject(Remote) UnicastRemoteObject.exportObject(Remote)} method, * #exportObject(Remote) UnicastRemoteObject.exportObject(Remote)} method,
@ -66,9 +66,8 @@ import sun.rmi.server.UnicastServerRef2;
* could not be loaded, or a problem occurs creating the stub instance, a * could not be loaded, or a problem occurs creating the stub instance, a
* {@link StubNotFoundException} is thrown. * {@link StubNotFoundException} is thrown.
* *
* <p>
* <li>For all other means of exporting: * <li>For all other means of exporting:
* <p><ul> * <ul>
* *
* <li>If the remote object's stub class (as defined above) could not be * <li>If the remote object's stub class (as defined above) could not be
* loaded or the system property * loaded or the system property
@ -93,7 +92,6 @@ import sun.rmi.server.UnicastServerRef2;
* will be thrown. * will be thrown.
* </ul> * </ul>
* *
* <p>
* <li>Otherwise, an instance of the remote object's stub class (as * <li>Otherwise, an instance of the remote object's stub class (as
* described above) is used as the stub. * described above) is used as the stub.
* *

View File

@ -39,9 +39,9 @@ import sun.reflect.Reflection;
* <ul> * <ul>
* <li> to decide whether an access to a critical system * <li> to decide whether an access to a critical system
* resource is to be allowed or denied, based on the security policy * resource is to be allowed or denied, based on the security policy
* currently in effect,<p> * currently in effect,
* <li>to mark code as being "privileged", thus affecting subsequent * <li>to mark code as being "privileged", thus affecting subsequent
* access determinations, and<p> * access determinations, and
* <li>to obtain a "snapshot" of the current calling context so * <li>to obtain a "snapshot" of the current calling context so
* access-control decisions from a different context can be made with * access-control decisions from a different context can be made with
* respect to the saved context. </ul> * respect to the saved context. </ul>

View File

@ -48,7 +48,7 @@ import java.security.spec.AlgorithmParameterSpec;
* of the prime modulus (in bits). * of the prime modulus (in bits).
* When using this approach, algorithm-specific parameter generation * When using this approach, algorithm-specific parameter generation
* values - if any - default to some standard values, unless they can be * values - if any - default to some standard values, unless they can be
* derived from the specified size.<P> * derived from the specified size.
* *
* <li>The other approach initializes a parameter generator object * <li>The other approach initializes a parameter generator object
* using algorithm-specific semantics, which are represented by a set of * using algorithm-specific semantics, which are represented by a set of

View File

@ -57,7 +57,6 @@ import java.io.IOException;
* Subclasses may implement actions on top of BasicPermission, * Subclasses may implement actions on top of BasicPermission,
* if desired. * if desired.
* <p> * <p>
* <P>
* @see java.security.Permission * @see java.security.Permission
* @see java.security.Permissions * @see java.security.Permissions
* @see java.security.PermissionCollection * @see java.security.PermissionCollection
@ -153,9 +152,9 @@ public abstract class BasicPermission extends Permission
* Checks if the specified permission is "implied" by * Checks if the specified permission is "implied" by
* this object. * this object.
* <P> * <P>
* More specifically, this method returns true if:<p> * More specifically, this method returns true if:
* <ul> * <ul>
* <li> <i>p</i>'s class is the same as this object's class, and<p> * <li> <i>p</i>'s class is the same as this object's class, and
* <li> <i>p</i>'s name equals or (in the case of wildcards) * <li> <i>p</i>'s name equals or (in the case of wildcards)
* is implied by this object's * is implied by this object's
* name. For example, "a.b.*" implies "a.b.c". * name. For example, "a.b.*" implies "a.b.c".

View File

@ -234,7 +234,7 @@ public class CodeSource implements java.io.Serializable {
* Returns true if this CodeSource object "implies" the specified CodeSource. * Returns true if this CodeSource object "implies" the specified CodeSource.
* <p> * <p>
* More specifically, this method makes the following checks. * More specifically, this method makes the following checks.
* If any fail, it returns false. If they all succeed, it returns true.<p> * If any fail, it returns false. If they all succeed, it returns true.
* <ul> * <ul>
* <li> <i>codesource</i> must not be null. * <li> <i>codesource</i> must not be null.
* <li> If this object's certificates are not null, then all * <li> If this object's certificates are not null, then all
@ -242,7 +242,7 @@ public class CodeSource implements java.io.Serializable {
* certificates. * certificates.
* <li> If this object's location (getLocation()) is not null, then the * <li> If this object's location (getLocation()) is not null, then the
* following checks are made against this object's location and * following checks are made against this object's location and
* <i>codesource</i>'s:<p> * <i>codesource</i>'s:
* <ul> * <ul>
* <li> <i>codesource</i>'s location must not be null. * <li> <i>codesource</i>'s location must not be null.
* *

View File

@ -39,7 +39,7 @@ package java.security;
* RSA), which will work with those algorithms and with related * RSA), which will work with those algorithms and with related
* algorithms (such as MD5 with RSA, SHA-1 with RSA, Raw DSA, etc.) * algorithms (such as MD5 with RSA, SHA-1 with RSA, Raw DSA, etc.)
* The name of the algorithm of a key is obtained using the * The name of the algorithm of a key is obtained using the
* {@link #getAlgorithm() getAlgorithm} method.<P> * {@link #getAlgorithm() getAlgorithm} method.
* *
* <LI>An Encoded Form * <LI>An Encoded Form
* *
@ -65,12 +65,11 @@ package java.security;
* For more information, see * For more information, see
* <a href="http://www.ietf.org/rfc/rfc3280.txt">RFC 3280: * <a href="http://www.ietf.org/rfc/rfc3280.txt">RFC 3280:
* Internet X.509 Public Key Infrastructure Certificate and CRL Profile</a>. * Internet X.509 Public Key Infrastructure Certificate and CRL Profile</a>.
* <P>
* *
* <LI>A Format * <LI>A Format
* *
* <P>This is the name of the format of the encoded key. It is returned * <P>This is the name of the format of the encoded key. It is returned
* by the {@link #getFormat() getFormat} method.<P> * by the {@link #getFormat() getFormat} method.
* *
* </UL> * </UL>
* *

View File

@ -77,7 +77,6 @@ import sun.security.jca.GetInstance.Instance;
* providers might have precomputed parameter sets for more than just the * providers might have precomputed parameter sets for more than just the
* three modulus sizes mentioned above. Still others might not have a list of * three modulus sizes mentioned above. Still others might not have a list of
* precomputed parameters at all and instead always create new parameter sets. * precomputed parameters at all and instead always create new parameter sets.
* <p>
* *
* <li><b>Algorithm-Specific Initialization</b> * <li><b>Algorithm-Specific Initialization</b>
* <p>For situations where a set of algorithm-specific parameters already * <p>For situations where a set of algorithm-specific parameters already

View File

@ -98,7 +98,6 @@ import javax.security.auth.callback.*;
* KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType()); * KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType());
* </pre> * </pre>
* The system will return a keystore implementation for the default type. * The system will return a keystore implementation for the default type.
* <p>
* *
* <li>To provide a specific keystore type: * <li>To provide a specific keystore type:
* <pre> * <pre>

View File

@ -54,21 +54,21 @@ import java.nio.ByteBuffer;
* *
* <p>Implementations are free to implement the Cloneable interface. * <p>Implementations are free to implement the Cloneable interface.
* Client applications can test cloneability by attempting cloning * Client applications can test cloneability by attempting cloning
* and catching the CloneNotSupportedException: <p> * and catching the CloneNotSupportedException:
* *
* <pre> * <pre>{@code
* MessageDigest md = MessageDigest.getInstance("SHA"); * MessageDigest md = MessageDigest.getInstance("SHA");
* *
* try { * try {
* md.update(toChapter1); * md.update(toChapter1);
* MessageDigest tc1 = md.clone(); * MessageDigest tc1 = md.clone();
* byte[] toChapter1Digest = tc1.digest(); * byte[] toChapter1Digest = tc1.digest();
* md.update(toChapter2); * md.update(toChapter2);
* ...etc. * ...etc.
* } catch (CloneNotSupportedException cnse) { * } catch (CloneNotSupportedException cnse) {
* throw new DigestException("couldn't make digest of partial content"); * throw new DigestException("couldn't make digest of partial content");
* } * }
* </pre> * }</pre>
* *
* <p>Note that if a given implementation is not cloneable, it is * <p>Note that if a given implementation is not cloneable, it is
* still possible to compute intermediate digests by instantiating * still possible to compute intermediate digests by instantiating

View File

@ -138,14 +138,14 @@ public abstract class Permission implements Guard, java.io.Serializable {
* Returns the hash code value for this Permission object. * Returns the hash code value for this Permission object.
* <P> * <P>
* The required {@code hashCode} behavior for Permission Objects is * The required {@code hashCode} behavior for Permission Objects is
* the following: <p> * the following:
* <ul> * <ul>
* <li>Whenever it is invoked on the same Permission object more than * <li>Whenever it is invoked on the same Permission object more than
* once during an execution of a Java application, the * once during an execution of a Java application, the
* {@code hashCode} method * {@code hashCode} method
* must consistently return the same integer. This integer need not * must consistently return the same integer. This integer need not
* remain consistent from one execution of an application to another * remain consistent from one execution of an application to another
* execution of the same application. <p> * execution of the same application.
* <li>If two Permission objects are equal according to the * <li>If two Permission objects are equal according to the
* {@code equals} * {@code equals}
* method, then calling the {@code hashCode} method on each of the * method, then calling the {@code hashCode} method on each of the

View File

@ -37,7 +37,6 @@ import java.util.*;
* collection, using the {@code implies} method. * collection, using the {@code implies} method.
* <LI> enumerate all the permissions, using the {@code elements} method. * <LI> enumerate all the permissions, using the {@code elements} method.
* </UL> * </UL>
* <P>
* *
* <p>When it is desirable to group together a number of Permission objects * <p>When it is desirable to group together a number of Permission objects
* of the same type, the {@code newPermissionCollection} method on that * of the same type, the {@code newPermissionCollection} method on that

View File

@ -44,7 +44,6 @@ import java.util.StringTokenizer;
* The following table lists all the possible SecurityPermission target names, * The following table lists all the possible SecurityPermission target names,
* and for each provides a description of what the permission allows * and for each provides a description of what the permission allows
* and a discussion of the risks of granting code the permission. * and a discussion of the risks of granting code the permission.
* <P>
* *
* <table border=1 cellpadding=5 summary="target name,what the permission allows, and associated risks"> * <table border=1 cellpadding=5 summary="target name,what the permission allows, and associated risks">
* <tr> * <tr>
@ -193,7 +192,6 @@ import java.util.StringTokenizer;
* associated with classes that have been deprecated: {@link Identity}, * associated with classes that have been deprecated: {@link Identity},
* {@link IdentityScope}, {@link Signer}. Use of them is discouraged. See the * {@link IdentityScope}, {@link Signer}. Use of them is discouraged. See the
* applicable classes for more information. * applicable classes for more information.
* <P>
* *
* <table border=1 cellpadding=5 summary="target name,what the permission allows, and associated risks"> * <table border=1 cellpadding=5 summary="target name,what the permission allows, and associated risks">
* <tr> * <tr>

View File

@ -77,13 +77,13 @@ import sun.security.jca.GetInstance.Instance;
* (see {@link #initSign(PrivateKey)} * (see {@link #initSign(PrivateKey)}
* and {@link #initSign(PrivateKey, SecureRandom)}). * and {@link #initSign(PrivateKey, SecureRandom)}).
* *
* </ul><p> * </ul>
* *
* <li>Updating<p> * <li>Updating
* *
* <p>Depending on the type of initialization, this will update the * <p>Depending on the type of initialization, this will update the
* bytes to be signed or verified. See the * bytes to be signed or verified. See the
* {@link #update(byte) update} methods.<p> * {@link #update(byte) update} methods.
* *
* <li>Signing or Verifying a signature on all updated bytes. See the * <li>Signing or Verifying a signature on all updated bytes. See the
* {@link #sign() sign} methods and the {@link #verify(byte[]) verify} * {@link #sign() sign} methods and the {@link #verify(byte[]) verify}

View File

@ -43,7 +43,7 @@ import java.io.*;
* object passed to the constructor and the {@code verify} method. * object passed to the constructor and the {@code verify} method.
* A typical usage for signing is the following: * A typical usage for signing is the following:
* *
* <p> <pre>{@code * <pre>{@code
* Signature signingEngine = Signature.getInstance(algorithm, * Signature signingEngine = Signature.getInstance(algorithm,
* provider); * provider);
* SignedObject so = new SignedObject(myobject, signingKey, * SignedObject so = new SignedObject(myobject, signingKey,
@ -53,7 +53,7 @@ import java.io.*;
* <p> A typical usage for verification is the following (having * <p> A typical usage for verification is the following (having
* received SignedObject {@code so}): * received SignedObject {@code so}):
* *
* <p> <pre>{@code * <pre>{@code
* Signature verificationEngine = * Signature verificationEngine =
* Signature.getInstance(algorithm, provider); * Signature.getInstance(algorithm, provider);
* if (so.verify(publickey, verificationEngine)) * if (so.verify(publickey, verificationEngine))

View File

@ -42,27 +42,27 @@ import java.security.Principal;
* granted to the associated principal. If negative, the permissions * granted to the associated principal. If negative, the permissions
* are to be denied.<p> * are to be denied.<p>
* *
* The ACL Entries in each ACL observe the following rules:<p> * The ACL Entries in each ACL observe the following rules:
* *
* <ul> <li>Each principal can have at most one positive ACL entry and * <ul> <li>Each principal can have at most one positive ACL entry and
* one negative entry; that is, multiple positive or negative ACL * one negative entry; that is, multiple positive or negative ACL
* entries are not allowed for any principal. Each entry specifies * entries are not allowed for any principal. Each entry specifies
* the set of permissions that are to be granted (if positive) or * the set of permissions that are to be granted (if positive) or
* denied (if negative). <p> * denied (if negative).
* *
* <li>If there is no entry for a particular principal, then the * <li>If there is no entry for a particular principal, then the
* principal is considered to have a null (empty) permission set.<p> * principal is considered to have a null (empty) permission set.
* *
* <li>If there is a positive entry that grants a principal a * <li>If there is a positive entry that grants a principal a
* particular permission, and a negative entry that denies the * particular permission, and a negative entry that denies the
* principal the same permission, the result is as though the * principal the same permission, the result is as though the
* permission was never granted or denied. <p> * permission was never granted or denied.
* *
* <li>Individual permissions always override permissions of the * <li>Individual permissions always override permissions of the
* group(s) to which the individual belongs. That is, individual * group(s) to which the individual belongs. That is, individual
* negative permissions (specific denial of permissions) override the * negative permissions (specific denial of permissions) override the
* groups' positive permissions. And individual positive permissions * groups' positive permissions. And individual positive permissions
* override the groups' negative permissions.<p> * override the groups' negative permissions.
* *
* </ul> * </ul>
* *
@ -159,12 +159,12 @@ public interface Acl extends Owner {
* Returns an enumeration for the set of allowed permissions for the * Returns an enumeration for the set of allowed permissions for the
* specified principal (representing an entity such as an individual or * specified principal (representing an entity such as an individual or
* a group). This set of allowed permissions is calculated as * a group). This set of allowed permissions is calculated as
* follows:<p> * follows:
* *
* <ul> * <ul>
* *
* <li>If there is no entry in this Access Control List for the * <li>If there is no entry in this Access Control List for the
* specified principal, an empty permission set is returned.<p> * specified principal, an empty permission set is returned.
* *
* <li>Otherwise, the principal's group permission sets are determined. * <li>Otherwise, the principal's group permission sets are determined.
* (A principal can belong to one or more groups, where a group is a * (A principal can belong to one or more groups, where a group is a

View File

@ -63,7 +63,7 @@ import sun.security.jca.GetInstance.Instance;
* supports those methods), so that each call to * supports those methods), so that each call to
* {@code generateCertificate} consumes only one certificate, and the * {@code generateCertificate} consumes only one certificate, and the
* read position of the input stream is positioned to the next certificate in * read position of the input stream is positioned to the next certificate in
* the file:<p> * the file:
* *
* <pre>{@code * <pre>{@code
* FileInputStream fis = new FileInputStream(filename); * FileInputStream fis = new FileInputStream(filename);
@ -78,7 +78,7 @@ import sun.security.jca.GetInstance.Instance;
* }</pre> * }</pre>
* *
* <p>The following example parses a PKCS#7-formatted certificate reply stored * <p>The following example parses a PKCS#7-formatted certificate reply stored
* in a file and extracts all the certificates from it:<p> * in a file and extracts all the certificates from it:
* *
* <pre> * <pre>
* FileInputStream fis = new FileInputStream(filename); * FileInputStream fis = new FileInputStream(filename);

View File

@ -299,7 +299,7 @@ public abstract class PKIXRevocationChecker extends PKIXCertPathChecker {
/** /**
* Allow revocation check to succeed if the revocation status cannot be * Allow revocation check to succeed if the revocation status cannot be
* determined for one of the following reasons: * determined for one of the following reasons:
* <p><ul> * <ul>
* <li>The CRL or OCSP response cannot be obtained because of a * <li>The CRL or OCSP response cannot be obtained because of a
* network error. * network error.
* <li>The OCSP responder returns one of the following errors * <li>The OCSP responder returns one of the following errors

View File

@ -35,7 +35,7 @@ import sun.security.util.DerValue;
* structure. * structure.
* *
* <p>The ASN.1 definition is as follows: * <p>The ASN.1 definition is as follows:
* <p><pre> * <pre>
* PolicyQualifierInfo ::= SEQUENCE { * PolicyQualifierInfo ::= SEQUENCE {
* policyQualifierId PolicyQualifierId, * policyQualifierId PolicyQualifierId,
* qualifier ANY DEFINED BY policyQualifierId } * qualifier ANY DEFINED BY policyQualifierId }

View File

@ -44,7 +44,6 @@ import sun.security.x509.X500Name;
* individual parameters. * individual parameters.
* <p> * <p>
* <b>Concurrent Access</b> * <b>Concurrent Access</b>
* <p>
* <p>All {@code TrustAnchor} objects must be immutable and * <p>All {@code TrustAnchor} objects must be immutable and
* thread-safe. That is, multiple threads may concurrently invoke the * thread-safe. That is, multiple threads may concurrently invoke the
* methods defined in this class on a single {@code TrustAnchor} * methods defined in this class on a single {@code TrustAnchor}

View File

@ -359,7 +359,7 @@ public class X509CertSelector implements CertSelector {
* criticality setting, and encapsulating OCTET STRING) * criticality setting, and encapsulating OCTET STRING)
* for a SubjectKeyIdentifier extension. * for a SubjectKeyIdentifier extension.
* The ASN.1 notation for this structure follows. * The ASN.1 notation for this structure follows.
* <p> *
* <pre>{@code * <pre>{@code
* SubjectKeyIdentifier ::= KeyIdentifier * SubjectKeyIdentifier ::= KeyIdentifier
* *
@ -399,7 +399,7 @@ public class X509CertSelector implements CertSelector {
* criticality setting, and encapsulating OCTET STRING) * criticality setting, and encapsulating OCTET STRING)
* for an AuthorityKeyIdentifier extension. * for an AuthorityKeyIdentifier extension.
* The ASN.1 notation for this structure follows. * The ASN.1 notation for this structure follows.
* <p> *
* <pre>{@code * <pre>{@code
* AuthorityKeyIdentifier ::= SEQUENCE { * AuthorityKeyIdentifier ::= SEQUENCE {
* keyIdentifier [0] KeyIdentifier OPTIONAL, * keyIdentifier [0] KeyIdentifier OPTIONAL,

View File

@ -43,11 +43,11 @@ import java.security.*;
* *
* <li>Get a key pair generator for the DSA algorithm by calling the * <li>Get a key pair generator for the DSA algorithm by calling the
* KeyPairGenerator {@code getInstance} method with "DSA" * KeyPairGenerator {@code getInstance} method with "DSA"
* as its argument.<p> * as its argument.
* *
* <li>Initialize the generator by casting the result to a DSAKeyPairGenerator * <li>Initialize the generator by casting the result to a DSAKeyPairGenerator
* and calling one of the * and calling one of the
* {@code initialize} methods from this DSAKeyPairGenerator interface.<p> * {@code initialize} methods from this DSAKeyPairGenerator interface.
* *
* <li>Generate a key pair by calling the {@code generateKeyPair} * <li>Generate a key pair by calling the {@code generateKeyPair}
* method from the KeyPairGenerator class. * method from the KeyPairGenerator class.

View File

@ -125,7 +125,6 @@ import java.util.Locale;
* valid patterns, but <code>"ab {0'}' de"</code>, <code>"ab } de"</code> * valid patterns, but <code>"ab {0'}' de"</code>, <code>"ab } de"</code>
* and <code>"''{''"</code> are not. * and <code>"''{''"</code> are not.
* *
* <p>
* <dl><dt><b>Warning:</b><dd>The rules for using quotes within message * <dl><dt><b>Warning:</b><dd>The rules for using quotes within message
* format patterns unfortunately have shown to be somewhat confusing. * format patterns unfortunately have shown to be somewhat confusing.
* In particular, it isn't always obvious to localizers whether single * In particular, it isn't always obvious to localizers whether single
@ -146,7 +145,7 @@ import java.util.Locale;
* table shows how the values map to {@code Format} instances. Combinations not * table shows how the values map to {@code Format} instances. Combinations not
* shown in the table are illegal. A <i>SubformatPattern</i> must * shown in the table are illegal. A <i>SubformatPattern</i> must
* be a valid pattern string for the {@code Format} subclass used. * be a valid pattern string for the {@code Format} subclass used.
* <p> *
* <table border=1 summary="Shows how FormatType and FormatStyle values map to Format instances"> * <table border=1 summary="Shows how FormatType and FormatStyle values map to Format instances">
* <tr> * <tr>
* <th id="ft" class="TableHeadingColor">FormatType * <th id="ft" class="TableHeadingColor">FormatType
@ -215,7 +214,6 @@ import java.util.Locale;
* <td headers="fs"><i>SubformatPattern</i> * <td headers="fs"><i>SubformatPattern</i>
* <td headers="sc">{@code new} {@link ChoiceFormat#ChoiceFormat(String) ChoiceFormat}{@code (subformatPattern)} * <td headers="sc">{@code new} {@link ChoiceFormat#ChoiceFormat(String) ChoiceFormat}{@code (subformatPattern)}
* </table> * </table>
* <p>
* *
* <h4>Usage Information</h4> * <h4>Usage Information</h4>
* *
@ -761,7 +759,7 @@ public class MessageFormat extends Format {
* as indicated by the first matching line of the following table. An * as indicated by the first matching line of the following table. An
* argument is <i>unavailable</i> if <code>arguments</code> is * argument is <i>unavailable</i> if <code>arguments</code> is
* <code>null</code> or has fewer than argumentIndex+1 elements. * <code>null</code> or has fewer than argumentIndex+1 elements.
* <p> *
* <table border=1 summary="Examples of subformat,argument,and formatted text"> * <table border=1 summary="Examples of subformat,argument,and formatted text">
* <tr> * <tr>
* <th>Subformat * <th>Subformat

View File

@ -53,12 +53,12 @@ import sun.text.normalizer.NormalizerImpl;
* several different ways in Unicode. For example, take the character A-acute. * several different ways in Unicode. For example, take the character A-acute.
* In Unicode, this can be encoded as a single character (the "composed" form): * In Unicode, this can be encoded as a single character (the "composed" form):
* *
* <p><pre> * <pre>
* U+00C1 LATIN CAPITAL LETTER A WITH ACUTE</pre> * U+00C1 LATIN CAPITAL LETTER A WITH ACUTE</pre>
* *
* or as two separate characters (the "decomposed" form): * or as two separate characters (the "decomposed" form):
* *
* <p><pre> * <pre>
* U+0041 LATIN CAPITAL LETTER A * U+0041 LATIN CAPITAL LETTER A
* U+0301 COMBINING ACUTE ACCENT</pre> * U+0301 COMBINING ACUTE ACCENT</pre>
* *
@ -72,14 +72,14 @@ import sun.text.normalizer.NormalizerImpl;
* <p> * <p>
* Similarly, the string "ffi" can be encoded as three separate letters: * Similarly, the string "ffi" can be encoded as three separate letters:
* *
* <p><pre> * <pre>
* U+0066 LATIN SMALL LETTER F * U+0066 LATIN SMALL LETTER F
* U+0066 LATIN SMALL LETTER F * U+0066 LATIN SMALL LETTER F
* U+0069 LATIN SMALL LETTER I</pre> * U+0069 LATIN SMALL LETTER I</pre>
* *
* or as the single character * or as the single character
* *
* <p><pre> * <pre>
* U+FB03 LATIN SMALL LIGATURE FFI</pre> * U+FB03 LATIN SMALL LIGATURE FFI</pre>
* *
* The ffi ligature is not a distinct semantic character, and strictly speaking * The ffi ligature is not a distinct semantic character, and strictly speaking

View File

@ -356,7 +356,6 @@ import sun.util.locale.provider.LocaleProviderAdapter;
* may be replaced with other, locale dependent, pattern letters. * may be replaced with other, locale dependent, pattern letters.
* <code>SimpleDateFormat</code> does not deal with the localization of text * <code>SimpleDateFormat</code> does not deal with the localization of text
* other than the pattern letters; that's up to the client of the class. * other than the pattern letters; that's up to the client of the class.
* <p>
* *
* <h4>Examples</h4> * <h4>Examples</h4>
* *

View File

@ -40,7 +40,6 @@ import java.nio.charset.StandardCharsets;
* <a href="http://www.ietf.org/rfc/rfc4648.txt">RFC 4648</a> and * <a href="http://www.ietf.org/rfc/rfc4648.txt">RFC 4648</a> and
* <a href="http://www.ietf.org/rfc/rfc2045.txt">RFC 2045</a>. * <a href="http://www.ietf.org/rfc/rfc2045.txt">RFC 2045</a>.
* *
* <p>
* <ul> * <ul>
* <li><a name="basic"><b>Basic</b></a> * <li><a name="basic"><b>Basic</b></a>
* <p> Uses "The Base64 Alphabet" as specified in Table 1 of * <p> Uses "The Base64 Alphabet" as specified in Table 1 of

View File

@ -1164,10 +1164,10 @@ public class BitSet implements Cloneable, java.io.Serializable {
* <p>Example: * <p>Example:
* <pre> * <pre>
* BitSet drPepper = new BitSet();</pre> * BitSet drPepper = new BitSet();</pre>
* Now {@code drPepper.toString()} returns "{@code {}}".<p> * Now {@code drPepper.toString()} returns "{@code {}}".
* <pre> * <pre>
* drPepper.set(2);</pre> * drPepper.set(2);</pre>
* Now {@code drPepper.toString()} returns "{@code {2}}".<p> * Now {@code drPepper.toString()} returns "{@code {2}}".
* <pre> * <pre>
* drPepper.set(4); * drPepper.set(4);
* drPepper.set(10);</pre> * drPepper.set(10);</pre>

View File

@ -56,7 +56,6 @@ package java.util;
* <p>The twelve methods described above are summarized in the * <p>The twelve methods described above are summarized in the
* following table: * following table:
* *
* <p>
* <table BORDER CELLPADDING=3 CELLSPACING=1> * <table BORDER CELLPADDING=3 CELLSPACING=1>
* <caption>Summary of Deque methods</caption> * <caption>Summary of Deque methods</caption>
* <tr> * <tr>
@ -100,7 +99,6 @@ package java.util;
* inherited from the {@code Queue} interface are precisely equivalent to * inherited from the {@code Queue} interface are precisely equivalent to
* {@code Deque} methods as indicated in the following table: * {@code Deque} methods as indicated in the following table:
* *
* <p>
* <table BORDER CELLPADDING=3 CELLSPACING=1> * <table BORDER CELLPADDING=3 CELLSPACING=1>
* <caption>Comparison of Queue and Deque methods</caption> * <caption>Comparison of Queue and Deque methods</caption>
* <tr> * <tr>
@ -139,7 +137,6 @@ package java.util;
* beginning of the deque. Stack methods are precisely equivalent to * beginning of the deque. Stack methods are precisely equivalent to
* {@code Deque} methods as indicated in the table below: * {@code Deque} methods as indicated in the table below:
* *
* <p>
* <table BORDER CELLPADDING=3 CELLSPACING=1> * <table BORDER CELLPADDING=3 CELLSPACING=1>
* <caption>Comparison of Stack and Deque methods</caption> * <caption>Comparison of Stack and Deque methods</caption>
* <tr> * <tr>

View File

@ -1248,7 +1248,7 @@ public final class Locale implements Cloneable, Serializable {
* Returns a string representation of this <code>Locale</code> * Returns a string representation of this <code>Locale</code>
* object, consisting of language, country, variant, script, * object, consisting of language, country, variant, script,
* and extensions as below: * and extensions as below:
* <p><blockquote> * <blockquote>
* language + "_" + country + "_" + (variant + "_#" | "#") + script + "-" + extensions * language + "_" + country + "_" + (variant + "_#" | "#") + script + "-" + extensions
* </blockquote> * </blockquote>
* *
@ -2199,7 +2199,7 @@ public final class Locale implements Cloneable, Serializable {
* are exactly "ja", "JP", "JP" or "th", "TH", "TH" and script/extensions * are exactly "ja", "JP", "JP" or "th", "TH", "TH" and script/extensions
* fields are empty, this method supplies <code>UNICODE_LOCALE_EXTENSION</code> * fields are empty, this method supplies <code>UNICODE_LOCALE_EXTENSION</code>
* "ca"/"japanese" (calendar type is "japanese") or "nu"/"thai" (number script * "ca"/"japanese" (calendar type is "japanese") or "nu"/"thai" (number script
* type is "thai"). See <a href="Locale.html#special_cases_constructor"/>Special Cases</a> * type is "thai"). See <a href="Locale.html#special_cases_constructor">Special Cases</a>
* for more information. * for more information.
* *
* @return an instance of <code>Locale</code> equivalent to * @return an instance of <code>Locale</code> equivalent to

View File

@ -244,7 +244,6 @@ class Properties extends Hashtable<Object,Object> {
* As an example, each of the following three lines specifies the key * As an example, each of the following three lines specifies the key
* {@code "Truth"} and the associated element value * {@code "Truth"} and the associated element value
* {@code "Beauty"}: * {@code "Beauty"}:
* <p>
* <pre> * <pre>
* Truth = Beauty * Truth = Beauty
* Truth:Beauty * Truth:Beauty
@ -252,14 +251,12 @@ class Properties extends Hashtable<Object,Object> {
* </pre> * </pre>
* As another example, the following three lines specify a single * As another example, the following three lines specify a single
* property: * property:
* <p>
* <pre> * <pre>
* fruits apple, banana, pear, \ * fruits apple, banana, pear, \
* cantaloupe, watermelon, \ * cantaloupe, watermelon, \
* kiwi, mango * kiwi, mango
* </pre> * </pre>
* The key is {@code "fruits"} and the associated element is: * The key is {@code "fruits"} and the associated element is:
* <p>
* <pre>"apple, banana, pear, cantaloupe, watermelon, kiwi, mango"</pre> * <pre>"apple, banana, pear, cantaloupe, watermelon, kiwi, mango"</pre>
* Note that a space appears before each {@code \} so that a space * Note that a space appears before each {@code \} so that a space
* will appear after each comma in the final result; the {@code \}, * will appear after each comma in the final result; the {@code \},
@ -268,13 +265,11 @@ class Properties extends Hashtable<Object,Object> {
* characters. * characters.
* <p> * <p>
* As a third example, the line: * As a third example, the line:
* <p>
* <pre>cheeses * <pre>cheeses
* </pre> * </pre>
* specifies that the key is {@code "cheeses"} and the associated * specifies that the key is {@code "cheeses"} and the associated
* element is the empty string {@code ""}.<p> * element is the empty string {@code ""}.
* <p> * <p>
*
* <a name="unicodeescapes"></a> * <a name="unicodeescapes"></a>
* Characters in keys and elements can be represented in escape * Characters in keys and elements can be represented in escape
* sequences similar to those used for character and string literals * sequences similar to those used for character and string literals

View File

@ -51,11 +51,10 @@ import sun.security.util.SecurityConstants;
* signify a wildcard match. For example: "java.*" and "*" signify a wildcard * signify a wildcard match. For example: "java.*" and "*" signify a wildcard
* match, while "*java" and "a*b" do not. * match, while "*java" and "a*b" do not.
* <P> * <P>
* <P>
* The actions to be granted are passed to the constructor in a string containing * The actions to be granted are passed to the constructor in a string containing
* a list of one or more comma-separated keywords. The possible keywords are * a list of one or more comma-separated keywords. The possible keywords are
* "read" and "write". Their meaning is defined as follows: * "read" and "write". Their meaning is defined as follows:
* <P> *
* <DL> * <DL>
* <DT> read * <DT> read
* <DD> read permission. Allows <code>System.getProperty</code> to * <DD> read permission. Allows <code>System.getProperty</code> to
@ -166,11 +165,11 @@ public final class PropertyPermission extends BasicPermission {
* Checks if this PropertyPermission object "implies" the specified * Checks if this PropertyPermission object "implies" the specified
* permission. * permission.
* <P> * <P>
* More specifically, this method returns true if:<p> * More specifically, this method returns true if:
* <ul> * <ul>
* <li> <i>p</i> is an instanceof PropertyPermission,<p> * <li> <i>p</i> is an instanceof PropertyPermission,
* <li> <i>p</i>'s actions are a subset of this * <li> <i>p</i>'s actions are a subset of this
* object's actions, and <p> * object's actions, and
* <li> <i>p</i>'s name is implied by this object's * <li> <i>p</i>'s name is implied by this object's
* name. For example, "java.*" implies "java.home". * name. For example, "java.*" implies "java.home".
* </ul> * </ul>

View File

@ -47,7 +47,6 @@ package java.util;
* implementations; in most implementations, insert operations cannot * implementations; in most implementations, insert operations cannot
* fail. * fail.
* *
* <p>
* <table BORDER CELLPADDING=3 CELLSPACING=1> * <table BORDER CELLPADDING=3 CELLSPACING=1>
* <caption>Summary of Queue methods</caption> * <caption>Summary of Queue methods</caption>
* <tr> * <tr>

View File

@ -1084,7 +1084,6 @@ public abstract class ResourceBundle {
* bundles. Conceptually, the bundle loading process with the given * bundles. Conceptually, the bundle loading process with the given
* <code>control</code> is performed in the following steps. * <code>control</code> is performed in the following steps.
* *
* <p>
* <ol> * <ol>
* <li>This factory method looks up the resource bundle in the cache for * <li>This factory method looks up the resource bundle in the cache for
* the specified <code>baseName</code>, <code>targetLocale</code> and * the specified <code>baseName</code>, <code>targetLocale</code> and

View File

@ -216,7 +216,6 @@ import sun.misc.LRUCache;
* are specified in terms of the following regular-expression grammar, where * are specified in terms of the following regular-expression grammar, where
* Rmax is the highest digit in the radix being used (for example, Rmax is 9 in base 10). * Rmax is the highest digit in the radix being used (for example, Rmax is 9 in base 10).
* *
* <p>
* <dl> * <dl>
* <dt><i>NonAsciiDigit</i>: * <dt><i>NonAsciiDigit</i>:
* <dd>A non-ASCII character c for which * <dd>A non-ASCII character c for which

View File

@ -606,7 +606,7 @@ abstract public class TimeZone implements Serializable, Cloneable {
* Otherwise, the method takes the following steps to determine the default * Otherwise, the method takes the following steps to determine the default
* time zone. * time zone.
* *
* <p><ul> * <ul>
* <li>Use the {@code user.timezone} property value as the default * <li>Use the {@code user.timezone} property value as the default
* time zone ID if it's available.</li> * time zone ID if it's available.</li>
* <li>Detect the platform time zone ID. The source of the * <li>Detect the platform time zone ID. The source of the

View File

@ -233,7 +233,7 @@ public final class UUID implements java.io.Serializable, Comparable<UUID> {
* number describes how this {@code UUID} was generated. * number describes how this {@code UUID} was generated.
* *
* The version number has the following meaning: * The version number has the following meaning:
* <p><ul> * <ul>
* <li>1 Time-based UUID * <li>1 Time-based UUID
* <li>2 DCE security UUID * <li>2 DCE security UUID
* <li>3 Name-based UUID * <li>3 Name-based UUID
@ -252,7 +252,7 @@ public final class UUID implements java.io.Serializable, Comparable<UUID> {
* number describes the layout of the {@code UUID}. * number describes the layout of the {@code UUID}.
* *
* The variant number has the following meaning: * The variant number has the following meaning:
* <p><ul> * <ul>
* <li>0 Reserved for NCS backward compatibility * <li>0 Reserved for NCS backward compatibility
* <li>2 <a href="http://www.ietf.org/rfc/rfc4122.txt">IETF&nbsp;RFC&nbsp;4122</a> * <li>2 <a href="http://www.ietf.org/rfc/rfc4122.txt">IETF&nbsp;RFC&nbsp;4122</a>
* (Leach-Salz), used by this class * (Leach-Salz), used by this class

View File

@ -50,7 +50,6 @@ import java.util.*;
* and the fourth blocks for only a given maximum time limit before giving * and the fourth blocks for only a given maximum time limit before giving
* up. These methods are summarized in the following table: * up. These methods are summarized in the following table:
* *
* <p>
* <table BORDER CELLPADDING=3 CELLSPACING=1> * <table BORDER CELLPADDING=3 CELLSPACING=1>
* <caption>Summary of BlockingDeque methods</caption> * <caption>Summary of BlockingDeque methods</caption>
* <tr> * <tr>
@ -126,7 +125,6 @@ import java.util.*;
* {@code BlockingQueue} interface are precisely equivalent to * {@code BlockingQueue} interface are precisely equivalent to
* {@code BlockingDeque} methods as indicated in the following table: * {@code BlockingDeque} methods as indicated in the following table:
* *
* <p>
* <table BORDER CELLPADDING=3 CELLSPACING=1> * <table BORDER CELLPADDING=3 CELLSPACING=1>
* <caption>Comparison of BlockingQueue and BlockingDeque methods</caption> * <caption>Comparison of BlockingQueue and BlockingDeque methods</caption>
* <tr> * <tr>

View File

@ -53,7 +53,6 @@ import java.util.Queue;
* and the fourth blocks for only a given maximum time limit before giving * and the fourth blocks for only a given maximum time limit before giving
* up. These methods are summarized in the following table: * up. These methods are summarized in the following table:
* *
* <p>
* <table BORDER CELLPADDING=3 CELLSPACING=1> * <table BORDER CELLPADDING=3 CELLSPACING=1>
* <caption>Summary of BlockingQueue methods</caption> * <caption>Summary of BlockingQueue methods</caption>
* <tr> * <tr>

View File

@ -52,8 +52,8 @@ package java.util.concurrent;
* *
* <p> * <p>
* <b>Sample Usage</b> (Note that the following classes are all * <b>Sample Usage</b> (Note that the following classes are all
* made-up.) <p> * made-up.)
* <pre> {@code * <pre> {@code
* interface ArchiveSearcher { String search(String target); } * interface ArchiveSearcher { String search(String target); }
* class App { * class App {
* ExecutorService executor = ... * ExecutorService executor = ...

View File

@ -56,7 +56,6 @@ import java.util.Collection;
* constraints. A nonfair lock that is continuously contended may * constraints. A nonfair lock that is continuously contended may
* indefinitely postpone one or more reader or writer threads, but * indefinitely postpone one or more reader or writer threads, but
* will normally have higher throughput than a fair lock. * will normally have higher throughput than a fair lock.
* <p>
* *
* <dt><b><i>Fair mode</i></b> * <dt><b><i>Fair mode</i></b>
* <dd>When constructed as fair, threads contend for entry using an * <dd>When constructed as fair, threads contend for entry using an

View File

@ -44,7 +44,7 @@ import java.beans.PropertyChangeListener;
* The unpacker engine is used by deployment applications to * The unpacker engine is used by deployment applications to
* transform the byte-stream back to JAR format. * transform the byte-stream back to JAR format.
* <p> * <p>
* Here is an example using packer and unpacker:<p> * Here is an example using packer and unpacker:
* <pre>{@code * <pre>{@code
* import java.util.jar.Pack200; * import java.util.jar.Pack200;
* import java.util.jar.Pack200.*; * import java.util.jar.Pack200.*;

View File

@ -150,7 +150,7 @@ import sun.reflect.Reflection;
* has or inherited a resource bundle name, then that resource bundle name * has or inherited a resource bundle name, then that resource bundle name
* will be mapped to a {@code ResourceBundle} object, using the default Locale * will be mapped to a {@code ResourceBundle} object, using the default Locale
* at the time of logging. * at the time of logging.
* <br><a name="ResourceBundleMapping"/>When mapping resource bundle names to * <br id="ResourceBundleMapping">When mapping resource bundle names to
* {@code ResourceBundle} objects, the logger will first try to use the * {@code ResourceBundle} objects, the logger will first try to use the
* Thread's {@linkplain java.lang.Thread#getContextClassLoader() context class * Thread's {@linkplain java.lang.Thread#getContextClassLoader() context class
* loader} to map the given resource bundle name to a {@code ResourceBundle}. * loader} to map the given resource bundle name to a {@code ResourceBundle}.

View File

@ -618,7 +618,7 @@ import java.util.stream.StreamSupport;
* are in conformance with the recommendation of <i>Annex C: Compatibility Properties</i> * are in conformance with the recommendation of <i>Annex C: Compatibility Properties</i>
* of <a href="http://www.unicode.org/reports/tr18/"><i>Unicode Regular Expression * of <a href="http://www.unicode.org/reports/tr18/"><i>Unicode Regular Expression
* </i></a>, when {@link #UNICODE_CHARACTER_CLASS} flag is specified. * </i></a>, when {@link #UNICODE_CHARACTER_CLASS} flag is specified.
* <p> *
* <table border="0" cellpadding="1" cellspacing="0" * <table border="0" cellpadding="1" cellspacing="0"
* summary="predefined and posix character classes in Unicode mode"> * summary="predefined and posix character classes in Unicode mode">
* <tr align="left"> * <tr align="left">

View File

@ -41,7 +41,7 @@ import java.util.Locale;
* <code>java.util</code> packages use implementations of the provider * <code>java.util</code> packages use implementations of the provider
* interfaces to offer support for locales beyond the set of locales * interfaces to offer support for locales beyond the set of locales
* supported by the Java runtime environment itself. * supported by the Java runtime environment itself.
* <p> *
* <h3>Packaging of Locale Sensitive Service Provider Implementations</h3> * <h3>Packaging of Locale Sensitive Service Provider Implementations</h3>
* Implementations of these locale sensitive services are packaged using the * Implementations of these locale sensitive services are packaged using the
* <a href="../../../../technotes/guides/extensions/index.html">Java Extension Mechanism</a> * <a href="../../../../technotes/guides/extensions/index.html">Java Extension Mechanism</a>