8200381: Typos in javadoc - missing verb "be" and alike
Reviewed-by: lancea, darcy, wetmore
This commit is contained in:
parent
c7e3654a5c
commit
2ae27da3bc
@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (c) 2008, 2016, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 2008, 2018, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
@ -505,7 +505,7 @@ class Invokers {
|
||||
* => checkcast(A)* & MH.invokeBasic(a*) & checkcast(R)
|
||||
* if a big adapter BA can be pulled out of (MT0,MT1)
|
||||
* => BA.invokeBasic(MT0,MH,a*)
|
||||
* if a local adapter LA can cached on static CS0 = new GICS(MT0)
|
||||
* if a local adapter LA can be cached on static CS0 = new GICS(MT0)
|
||||
* => CS0.LA.invokeBasic(MH,a*)
|
||||
* else
|
||||
* => MH.asType(MT0).invokeBasic(A*)
|
||||
|
@ -384,7 +384,7 @@ mh.invokeExact(System.out, "Hello, world.");
|
||||
* A method handle can be obtained on a method, constructor, or field
|
||||
* which is declared with Java generic types.
|
||||
* As with the Core Reflection API, the type of the method handle
|
||||
* will constructed from the erasure of the source-level type.
|
||||
* will be constructed from the erasure of the source-level type.
|
||||
* When a method handle is invoked, the types of its arguments
|
||||
* or the return value cast type may be generic types or type instances.
|
||||
* If this occurs, the compiler will replace those
|
||||
|
@ -4629,7 +4629,7 @@ assertEquals("boojum", (String) catTrace.invokeExact("boo", "jum"));
|
||||
* <li>Examine and collect the suffixes of the step, pred, and fini parameter lists, after removing the iteration variable types.
|
||||
* (They must have the form {@code (V... A*)}; collect the {@code (A*)} parts only.)
|
||||
* <li>Do not collect suffixes from step, pred, and fini parameter lists that do not begin with all the iteration variable types.
|
||||
* (These types will checked in step 2, along with all the clause function types.)
|
||||
* (These types will be checked in step 2, along with all the clause function types.)
|
||||
* <li>Omitted clause functions are ignored. (Equivalently, they are deemed to have empty parameter lists.)
|
||||
* <li>All of the collected parameter lists must be effectively identical.
|
||||
* <li>The longest parameter list (which is necessarily unique) is called the "external parameter list" ({@code (A...)}).
|
||||
|
@ -100,7 +100,7 @@ import static java.lang.invoke.MethodHandleStatics.newInternalError;
|
||||
* is {@code String}. The access mode type for {@code compareAndSet} on this
|
||||
* VarHandle instance would be
|
||||
* {@code (String[] c1, int c2, String expectedValue, String newValue)boolean}.
|
||||
* Such a VarHandle instance may produced by the
|
||||
* Such a VarHandle instance may be produced by the
|
||||
* {@link MethodHandles#arrayElementVarHandle(Class) array factory method} and
|
||||
* access array elements as follows:
|
||||
* <pre> {@code
|
||||
|
@ -1414,7 +1414,7 @@ class ProxyGenerator {
|
||||
* Generate code to invoke the Class.forName with the name of the given
|
||||
* class to get its Class object at runtime. The code is written to
|
||||
* the supplied stream. Note that the code generated by this method
|
||||
* may caused the checked ClassNotFoundException to be thrown.
|
||||
* may cause the checked ClassNotFoundException to be thrown.
|
||||
*/
|
||||
private void codeClassForName(Class<?> cl, DataOutputStream out)
|
||||
throws IOException
|
||||
|
@ -80,8 +80,8 @@ import java.util.function.Consumer;
|
||||
* <p> A key is added to its selector's cancelled-key set when it is cancelled,
|
||||
* whether by closing its channel or by invoking its {@link SelectionKey#cancel
|
||||
* cancel} method. Cancelling a key will cause its channel to be deregistered
|
||||
* during the next selection operation, at which time the key will removed from
|
||||
* all of the selector's key sets.
|
||||
* during the next selection operation, at which time the key will be removed
|
||||
* from all of the selector's key sets.
|
||||
*
|
||||
* <a id="sks"></a><p> Keys are added to the selected-key set by selection
|
||||
* operations. A key may be removed directly from the selected-key set by
|
||||
|
@ -1013,7 +1013,7 @@ public abstract class SSLEngine {
|
||||
* an instance of this class, but before the {@code SSLSession} has
|
||||
* been completely initialized and made available via {@code getSession}.
|
||||
* For example, the list of valid signature algorithms may restrict
|
||||
* the type of certificates that can used during TrustManager
|
||||
* the type of certificates that can be used during TrustManager
|
||||
* decisions, or the maximum TLS/DTLS fragment packet sizes can be
|
||||
* resized to better support the network environment.
|
||||
* <p>
|
||||
|
@ -421,7 +421,7 @@ public abstract class SSLSocket extends Socket
|
||||
* an instance of this class, but before the {@code SSLSession} has
|
||||
* been completely initialized and made available via {@code getSession}.
|
||||
* For example, the list of valid signature algorithms may restrict
|
||||
* the type of certificates that can used during TrustManager
|
||||
* the type of certificates that can be used during TrustManager
|
||||
* decisions, or the maximum TLS fragment packet sizes can be
|
||||
* resized to better support the network environment.
|
||||
* <p>
|
||||
|
@ -105,7 +105,7 @@ abstract class DSA extends SignatureSpi {
|
||||
* Construct a blank DSA object that will use the specified
|
||||
* signature format. {@code p1363Format} should be {@code true} to
|
||||
* use the IEEE P1363 format. If {@code p1363Format} is {@code false},
|
||||
* the DER-encoded ASN.1 format will used. The DSA object must be
|
||||
* the DER-encoded ASN.1 format will be used. The DSA object must be
|
||||
* initialized before being usable for signing or verifying.
|
||||
*/
|
||||
DSA(MessageDigest md, boolean p1363Format) {
|
||||
|
@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (c) 2002, 2012, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 2002, 2018, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
@ -49,7 +49,7 @@ import javax.security.auth.x500.X500Principal;
|
||||
* are as fast (or marginally faster) than for the standard
|
||||
* CollectionCertStore. Certificate subjects and CRL issuers
|
||||
* were found to be specified in most searches used internally by the
|
||||
* CertPath provider. Additional attributes could indexed if there are
|
||||
* CertPath provider. Additional attributes could be indexed if there are
|
||||
* queries that justify the effort.
|
||||
*
|
||||
* <li>Changes to the specified Collection after construction time are
|
||||
|
@ -849,8 +849,7 @@ public final class SSLSocketImpl
|
||||
*
|
||||
* This implementation is somewhat less efficient than possible, but
|
||||
* not badly so (redundant copy). We reuse the read() code to keep
|
||||
* things simpler. Note that SKIP_ARRAY is static and may garbled by
|
||||
* concurrent use, but we are not interested in the data anyway.
|
||||
* things simpler.
|
||||
*/
|
||||
@Override
|
||||
public synchronized long skip(long n) throws IOException {
|
||||
|
@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (c) 2009, Oracle and/or its affiliates. All rights reserved.
|
||||
* Copyright (c) 2009, 2018, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
@ -38,8 +38,8 @@ import sun.security.util.*;
|
||||
* lifetime of the responder's certificate. The CA does so by including
|
||||
* the extension id-pkix-ocsp-nocheck. This SHOULD be a non-critical
|
||||
* extension. The value of the extension should be NULL. CAs issuing
|
||||
* such a certificate should realized that a compromise of the
|
||||
* responder's key, is as serious as the compromise of a CA key used to
|
||||
* such a certificate should realize that a compromise of the
|
||||
* responder's key is as serious as the compromise of a CA key used to
|
||||
* sign CRLs, at least for the validity period of this certificate. CA's
|
||||
* may choose to issue this type of certificate with a very short
|
||||
* lifetime and renew it frequently.
|
||||
|
Loading…
x
Reference in New Issue
Block a user