提交 7d09db22 编写于 作者: A alanb

8000269: Cleanup javadoc warnings

Reviewed-by: lancea, darcy, ulfzibis, iris, naoto, dholmes
上级 07bda3a3
......@@ -76,7 +76,7 @@ import sun.security.util.SecurityConstants;
* <P>
* Be careful when granting FilePermissions. Think about the implications
* of granting read and especially write access to various files and
* directories. The "&lt;&lt;ALL FILES>>" permission with write action is
* directories. The "&lt;&lt;ALL FILES&gt;&gt;" permission with write action is
* especially dangerous. This grants permission to write to the entire
* file system. One thing this effectively allows is replacement of the
* system binary, including the JVM runtime environment.
......@@ -180,9 +180,7 @@ public final class FilePermission extends Permission implements Serializable {
* @param mask the actions mask to use.
*
*/
private void init(int mask)
{
private void init(int mask) {
if ((mask & ALL) != mask)
throw new IllegalArgumentException("invalid actions mask");
......@@ -274,9 +272,7 @@ public final class FilePermission extends Permission implements Serializable {
* If actions is <code>null</code>, empty or contains an action
* other than the specified possible actions.
*/
public FilePermission(String path, String actions)
{
public FilePermission(String path, String actions) {
super(path);
init(getMask(actions));
}
......@@ -293,8 +289,7 @@ public final class FilePermission extends Permission implements Serializable {
*/
// package private for use by the FilePermissionCollection add method
FilePermission(String path, int mask)
{
FilePermission(String path, int mask) {
super(path);
init(mask);
}
......@@ -337,7 +332,6 @@ public final class FilePermission extends Permission implements Serializable {
* this FilePermission's path also implies that FilePermission's path.
*
* @param that the FilePermission to check against.
* @param exact return immediately if the masks are not equal
* @return the effective mask
*/
boolean impliesIgnoreMask(FilePermission that) {
......@@ -412,7 +406,6 @@ public final class FilePermission extends Permission implements Serializable {
*
* @return a hash code value for this object.
*/
public int hashCode() {
return this.cpath.hashCode();
}
......@@ -424,7 +417,6 @@ public final class FilePermission extends Permission implements Serializable {
* @return the actions mask.
*/
private static int getMask(String actions) {
int mask = NONE;
// Null action valid?
......@@ -552,7 +544,6 @@ public final class FilePermission extends Permission implements Serializable {
*
* @return the actions mask.
*/
int getMask() {
return mask;
}
......@@ -564,8 +555,7 @@ public final class FilePermission extends Permission implements Serializable {
*
* @return the canonical string representation of the actions.
*/
private static String getActions(int mask)
{
private static String getActions(int mask) {
StringBuilder sb = new StringBuilder();
boolean comma = false;
......@@ -610,15 +600,13 @@ public final class FilePermission extends Permission implements Serializable {
*
* @return the canonical string representation of the actions.
*/
public String getActions()
{
public String getActions() {
if (actions == null)
actions = getActions(this.mask);
return actions;
}
/**
* Returns a new PermissionCollection object for storing FilePermission
* objects.
......@@ -650,7 +638,6 @@ public final class FilePermission extends Permission implements Serializable {
* @return a new PermissionCollection object suitable for storing
* FilePermissions.
*/
public PermissionCollection newPermissionCollection() {
return new FilePermissionCollection();
}
......@@ -712,22 +699,20 @@ public final class FilePermission extends Permission implements Serializable {
*/
final class FilePermissionCollection extends PermissionCollection
implements Serializable {
implements Serializable
{
// Not serialized; see serialization section at end of class
private transient List<Permission> perms;
/**
* Create an empty FilePermissions object.
*
* Create an empty FilePermissionCollection object.
*/
public FilePermissionCollection() {
perms = new ArrayList<>();
}
/**
* Adds a permission to the FilePermissions. The key for the hash is
* Adds a permission to the FilePermissionCollection. The key for the hash is
* permission.path.
*
* @param permission the Permission object to add.
......@@ -738,9 +723,7 @@ implements Serializable {
* @exception SecurityException - if this FilePermissionCollection object
* has been marked readonly
*/
public void add(Permission permission)
{
public void add(Permission permission) {
if (! (permission instanceof FilePermission))
throw new IllegalArgumentException("invalid permission: "+
permission);
......@@ -757,14 +740,12 @@ implements Serializable {
* Check and see if this set of permissions implies the permissions
* expressed in "permission".
*
* @param p the Permission object to compare
* @param permission the Permission object to compare
*
* @return true if "permission" is a proper subset of a permission in
* the set, false if not.
*/
public boolean implies(Permission permission)
{
public boolean implies(Permission permission) {
if (! (permission instanceof FilePermission))
return false;
......@@ -795,7 +776,6 @@ implements Serializable {
*
* @return an enumeration of all the FilePermission objects.
*/
public Enumeration<Permission> elements() {
// Convert Iterator into Enumeration
synchronized (this) {
......@@ -841,8 +821,9 @@ implements Serializable {
/*
* Reads in a Vector of FilePermissions and saves them in the perms field.
*/
private void readObject(ObjectInputStream in) throws IOException,
ClassNotFoundException {
private void readObject(ObjectInputStream in)
throws IOException, ClassNotFoundException
{
// Don't call defaultReadObject()
// Read in serialized fields
......
......@@ -784,7 +784,7 @@ public class PrintWriter extends Writer {
* <tt>null</tt> argument depends on the <a
* href="../util/Formatter.html#syntax">conversion</a>.
*
* @throws IllegalFormatException
* @throws java.util.IllegalFormatException
* If a format string contains an illegal syntax, a format
* specifier that is incompatible with the given arguments,
* insufficient arguments given the format string, or other
......@@ -835,7 +835,7 @@ public class PrintWriter extends Writer {
* <tt>null</tt> argument depends on the <a
* href="../util/Formatter.html#syntax">conversion</a>.
*
* @throws IllegalFormatException
* @throws java.util.IllegalFormatException
* If a format string contains an illegal syntax, a format
* specifier that is incompatible with the given arguments,
* insufficient arguments given the format string, or other
......@@ -879,7 +879,7 @@ public class PrintWriter extends Writer {
* <tt>null</tt> argument depends on the <a
* href="../util/Formatter.html#syntax">conversion</a>.
*
* @throws IllegalFormatException
* @throws java.util.IllegalFormatException
* If a format string contains an illegal syntax, a format
* specifier that is incompatible with the given arguments,
* insufficient arguments given the format string, or other
......@@ -939,7 +939,7 @@ public class PrintWriter extends Writer {
* <tt>null</tt> argument depends on the <a
* href="../util/Formatter.html#syntax">conversion</a>.
*
* @throws IllegalFormatException
* @throws java.util.IllegalFormatException
* If a format string contains an illegal syntax, a format
* specifier that is incompatible with the given arguments,
* insufficient arguments given the format string, or other
......
......@@ -91,7 +91,7 @@ public abstract class Reader implements Readable, Closeable {
* -1 if this source of characters is at its end
* @throws IOException if an I/O error occurs
* @throws NullPointerException if target is null
* @throws ReadOnlyBufferException if target is a read only buffer
* @throws java.nio.ReadOnlyBufferException if target is a read only buffer
* @since 1.5
*/
public int read(java.nio.CharBuffer target) throws IOException {
......
......@@ -2970,7 +2970,7 @@ public final
/**
* Returns a map from simple name to enum constant. This package-private
* method is used internally by Enum to implement
* public static <T extends Enum<T>> T valueOf(Class<T>, String)
* {@code public static <T extends Enum<T>> T valueOf(Class<T>, String)}
* efficiently. Note that the map is returned by this method is
* created lazily on first use. Typically it won't ever get created.
*/
......
......@@ -76,7 +76,6 @@ public class InheritableThreadLocal<T> extends ThreadLocal<T> {
*
* @param t the current thread
* @param firstValue value for the initial entry of the table.
* @param map the map to store.
*/
void createMap(Thread t, T firstValue) {
t.inheritableThreadLocals = new ThreadLocalMap(this, firstValue);
......
......@@ -752,7 +752,7 @@ public final class Integer extends Number implements Comparable<Integer> {
* -128 and 127 (inclusive) as required by JLS.
*
* The cache is initialized on first usage. The size of the cache
* may be controlled by the -XX:AutoBoxCacheMax=<size> option.
* may be controlled by the {@code -XX:AutoBoxCacheMax=<size>} option.
* During VM initialization, java.lang.Integer.IntegerCache.high property
* may be set and saved in the private system properties in the
* sun.misc.VM class.
......
......@@ -316,7 +316,7 @@ public class Package implements java.lang.reflect.AnnotatedElement {
* attributes are defined in the manifests that accompany
* the classes.
*
* @param class the class to get the package of.
* @param c the class to get the package of.
* @return the package of the class. It may be null if no package
* information is available from the archive or codebase. */
static Package getPackage(Class<?> c) {
......@@ -411,14 +411,13 @@ public class Package implements java.lang.reflect.AnnotatedElement {
/**
* Construct a package instance with the specified version
* information.
* @param pkgName the name of the package
* @param name the name of the package
* @param spectitle the title of the specification
* @param specversion the version of the specification
* @param specvendor the organization that maintains the specification
* @param impltitle the title of the implementation
* @param implversion the version of the implementation
* @param implvendor the organization that maintains the implementation
* @return a new package for containing the specified information.
*/
Package(String name,
String spectitle, String specversion, String specvendor,
......
......@@ -365,7 +365,7 @@ public final class StrictMath {
* @param a the value to be floored or ceiled
* @param negativeBoundary result for values in (-1, 0)
* @param positiveBoundary result for values in (0, 1)
* @param increment value to add when the argument is non-integral
* @param sign the sign of the result
*/
private static double floorOrCeil(double a,
double negativeBoundary,
......@@ -811,7 +811,7 @@ public final class StrictMath {
* @param value the long value
* @return the argument as an int
* @throws ArithmeticException if the {@code argument} overflows an int
* @see Math#toIntExact(int)
* @see Math#toIntExact(long)
* @since 1.8
*/
public static int toIntExact(long value) {
......
......@@ -2782,7 +2782,7 @@ public final class String
* <tt>null</tt> argument depends on the <a
* href="../util/Formatter.html#syntax">conversion</a>.
*
* @throws IllegalFormatException
* @throws java.util.IllegalFormatException
* If a format string contains an illegal syntax, a format
* specifier that is incompatible with the given arguments,
* insufficient arguments given the format string, or other
......@@ -2826,7 +2826,7 @@ public final class String
* <tt>null</tt> argument depends on the <a
* href="../util/Formatter.html#syntax">conversion</a>.
*
* @throws IllegalFormatException
* @throws java.util.IllegalFormatException
* If a format string contains an illegal syntax, a format
* specifier that is incompatible with the given arguments,
* insufficient arguments given the format string, or other
......
......@@ -545,7 +545,7 @@ public final class System {
* <tr><td><code>java.version</code></td>
* <td>Java Runtime Environment version</td></tr>
* <tr><td><code>java.vendor</code></td>
* <td>Java Runtime Environment vendor</td></tr
* <td>Java Runtime Environment vendor</td></tr>
* <tr><td><code>java.vendor.url</code></td>
* <td>Java vendor URL</td></tr>
* <tr><td><code>java.home</code></td>
......
......@@ -918,9 +918,6 @@ class ThreadGroup implements Thread.UncaughtExceptionHandler {
*
* @param t
* the Thread whose start method was invoked
*
* @param failed
* true if the thread could not be started successfully
*/
void threadStartFailed(Thread t) {
synchronized(this) {
......
......@@ -47,8 +47,8 @@ import java.util.concurrent.atomic.AtomicInteger;
* private static final AtomicInteger nextId = new AtomicInteger(0);
*
* // Thread local variable containing each thread's ID
* private static final ThreadLocal&lt;Integer> threadId =
* new ThreadLocal&lt;Integer>() {
* private static final ThreadLocal&lt;Integer&gt; threadId =
* new ThreadLocal&lt;Integer&gt;() {
* &#64;Override protected Integer initialValue() {
* return nextId.getAndIncrement();
* }
......@@ -222,7 +222,6 @@ public class ThreadLocal<T> {
*
* @param t the current thread
* @param firstValue value for the initial entry of the map
* @param map the map to store.
*/
void createMap(Thread t, T firstValue) {
t.threadLocals = new ThreadLocalMap(this, firstValue);
......
......@@ -147,8 +147,9 @@ public class ThreadInfo {
* @param waitedCount Number of times waited on a lock
* @param waitedTime Approx time waited on a lock
* @param stackTrace Thread stack trace
* @param lockedMonitors List of locked monitors
* @param lockedSynchronizers List of locked synchronizers
* @param monitors List of locked monitors
* @param stackDepths List of stack depths
* @param synchronizers List of locked synchronizers
*/
private ThreadInfo(Thread t, int state, Object lockObj, Thread lockOwner,
long blockedCount, long blockedTime,
......
......@@ -99,7 +99,7 @@ abstract class AbstractPlainDatagramSocketImpl extends DatagramSocketImpl
/**
* Sends a datagram packet. The packet contains the data and the
* destination address to send the packet to.
* @param packet to be sent.
* @param p the packet to be sent.
*/
protected abstract void send(DatagramPacket p) throws IOException;
......@@ -130,13 +130,13 @@ abstract class AbstractPlainDatagramSocketImpl extends DatagramSocketImpl
/**
* Peek at the packet to see who it is from.
* @param return the address which the packet came from.
* @param i the address to populate with the sender address
*/
protected abstract int peek(InetAddress i) throws IOException;
protected abstract int peekData(DatagramPacket p) throws IOException;
/**
* Receive the datagram packet.
* @param Packet Received.
* @param p the packet to receive into
*/
protected synchronized void receive(DatagramPacket p)
throws IOException {
......@@ -148,7 +148,7 @@ abstract class AbstractPlainDatagramSocketImpl extends DatagramSocketImpl
/**
* Set the TTL (time-to-live) option.
* @param TTL to be set.
* @param ttl TTL to be set.
*/
protected abstract void setTimeToLive(int ttl) throws IOException;
......@@ -159,7 +159,7 @@ abstract class AbstractPlainDatagramSocketImpl extends DatagramSocketImpl
/**
* Set the TTL (time-to-live) option.
* @param TTL to be set.
* @param ttl TTL to be set.
*/
@Deprecated
protected abstract void setTTL(byte ttl) throws IOException;
......@@ -172,7 +172,7 @@ abstract class AbstractPlainDatagramSocketImpl extends DatagramSocketImpl
/**
* Join the multicast group.
* @param multicast address to join.
* @param inetaddr multicast address to join.
*/
protected void join(InetAddress inetaddr) throws IOException {
join(inetaddr, null);
......@@ -180,14 +180,14 @@ abstract class AbstractPlainDatagramSocketImpl extends DatagramSocketImpl
/**
* Leave the multicast group.
* @param multicast address to leave.
* @param inetaddr multicast address to leave.
*/
protected void leave(InetAddress inetaddr) throws IOException {
leave(inetaddr, null);
}
/**
* Join the multicast group.
* @param multicast address to join.
* @param mcastaddr multicast address to join.
* @param netIf specifies the local interface to receive multicast
* datagram packets
* @throws IllegalArgumentException if mcastaddr is null or is a
......@@ -207,7 +207,7 @@ abstract class AbstractPlainDatagramSocketImpl extends DatagramSocketImpl
/**
* Leave the multicast group.
* @param multicast address to leave.
* @param mcastaddr multicast address to leave.
* @param netIf specified the local interface to leave the group at
* @throws IllegalArgumentException if mcastaddr is null or is a
* SocketAddress subclass not supported by this socket
......
......@@ -368,7 +368,7 @@ abstract class AbstractPlainSocketImpl extends SocketImpl
/**
* Binds the socket to the specified address of the specified local port.
* @param address the address
* @param port the port
* @param lport the port
*/
protected synchronized void bind(InetAddress address, int lport)
throws IOException
......
......@@ -105,7 +105,7 @@ class DatagramSocket implements java.io.Closeable {
* Connects this socket to a remote socket address (IP address + port number).
* Binds socket if not already bound.
* <p>
* @param addr The remote address.
* @param address The remote address.
* @param port The remote port
* @throws SocketException if binding the socket fails.
*/
......
......@@ -177,7 +177,6 @@ class Inet4Address extends InetAddress {
* a loopback address; or false otherwise.
* @since 1.4
*/
private static final int loopback = 2130706433; /* 127.0.0.1 */
public boolean isLoopbackAddress() {
/* 127.x.x.x */
byte[] byteAddr = getAddress();
......
......@@ -112,7 +112,7 @@ class SocketInputStream extends FileInputStream
* <i>length</i> bytes of data.
* @param b the buffer into which the data is read
* @param off the start offset of the data
* @param len the maximum number of bytes read
* @param length the maximum number of bytes read
* @return the actual number of bytes read, -1 is
* returned when the end of the stream is reached.
* @exception IOException If an I/O error has occurred.
......@@ -209,7 +209,7 @@ class SocketInputStream extends FileInputStream
/**
* Skips n bytes of input.
* @param n the number of bytes to skip
* @param numbytes the number of bytes to skip
* @return the actual number of bytes skipped.
* @exception IOException If an I/O error has occurred.
*/
......
......@@ -138,7 +138,7 @@ import sun.security.util.Debug;
*/
public final class SocketPermission extends Permission
implements java.io.Serializable
implements java.io.Serializable
{
private static final long serialVersionUID = -7204263841984476862L;
......@@ -232,8 +232,7 @@ implements java.io.Serializable
trustNameService = tmp.booleanValue();
}
private static synchronized Debug getDebug()
{
private static synchronized Debug getDebug() {
if (!debugInit) {
debug = Debug.getInstance("access");
debugInit = true;
......@@ -288,8 +287,7 @@ implements java.io.Serializable
defaultDeny = true;
}
private static String getHost(String host)
{
private static String getHost(String host) {
if (host.equals("")) {
return "localhost";
} else {
......@@ -810,7 +808,6 @@ implements java.io.Serializable
* @return true if the specified permission is implied by this object,
* false if not.
*/
public boolean implies(Permission p) {
int i,j;
......@@ -844,12 +841,11 @@ implements java.io.Serializable
* to find a match based on the IP addresses in both objects.
* <li> Attempt to match on the canonical hostnames of both objects.
* </ul>
* @param p the incoming permission request
* @param that the incoming permission request
*
* @return true if "permission" is a proper subset of the current object,
* false if not.
*/
boolean impliesIgnoreMask(SocketPermission that) {
int i,j;
......@@ -1229,7 +1225,7 @@ else its the cname?
*/
final class SocketPermissionCollection extends PermissionCollection
implements Serializable
implements Serializable
{
// Not serialized; see serialization section at end of class
private transient List<SocketPermission> perms;
......@@ -1255,9 +1251,7 @@ implements Serializable
* @exception SecurityException - if this SocketPermissionCollection object
* has been marked readonly
*/
public void add(Permission permission)
{
public void add(Permission permission) {
if (! (permission instanceof SocketPermission))
throw new IllegalArgumentException("invalid permission: "+
permission);
......@@ -1276,7 +1270,7 @@ implements Serializable
* Check and see if this collection of permissions implies the permissions
* expressed in "permission".
*
* @param p the Permission object to compare
* @param permission the Permission object to compare
*
* @return true if "permission" is a proper subset of a permission in
* the collection, false if not.
......@@ -1369,8 +1363,9 @@ implements Serializable
/*
* Reads in a Vector of SocketPermissions and saves them in the perms field.
*/
private void readObject(ObjectInputStream in) throws IOException,
ClassNotFoundException {
private void readObject(ObjectInputStream in)
throws IOException, ClassNotFoundException
{
// Don't call in.defaultReadObject()
// Read in serialized fields
......
......@@ -644,7 +644,7 @@ class SocksSocketImpl extends PlainSocketImpl implements SocksConsts {
* means "accept incoming connection from", so the SocketAddress is the
* the one of the host we do accept connection from.
*
* @param addr the Socket address of the remote host.
* @param saddr the Socket address of the remote host.
* @exception IOException if an I/O error occurs when binding this socket.
*/
protected synchronized void socksBind(InetSocketAddress saddr) throws IOException {
......
......@@ -1241,7 +1241,6 @@ public abstract class URLConnection {
/**
* Gets the Content Handler appropriate for this connection.
* @param connection the connection to use.
*/
synchronized ContentHandler getContentHandler()
throws UnknownServiceException
......
......@@ -84,7 +84,7 @@ public final class Channels {
/**
* Write all remaining bytes in buffer to the given channel.
*
* @throws IllegalBlockingException
* @throws IllegalBlockingModeException
* If the channel is selectable and configured non-blocking.
*/
private static void writeFully(WritableByteChannel ch, ByteBuffer bb)
......
......@@ -347,7 +347,7 @@ public abstract class FileSystem
* <td><tt>C:&#92;&#92;*</tt>
* <td>Matches <tt>C:&#92;foo</tt> and <tt>C:&#92;bar</tt> on the Windows
* platform (note that the backslash is escaped; as a string literal in the
* Java Language the pattern would be <tt>"C:&#92;&#92;&#92;&#92*"</tt>) </td>
* Java Language the pattern would be <tt>"C:&#92;&#92;&#92;&#92;*"</tt>) </td>
* </tr>
*
* </table>
......
......@@ -510,7 +510,7 @@ public final class Files {
* <pre>
* DirectoryStream.Filter&lt;Path&gt; filter = new DirectoryStream.Filter&lt;Path&gt;() {
* public boolean accept(Path file) throws IOException {
* return (Files.size(file) > 8192L);
* return (Files.size(file) &gt; 8192L);
* }
* };
* Path dir = ...
......@@ -1592,7 +1592,7 @@ public final class Files {
* Path path = ...
* AclFileAttributeView view = Files.getFileAttributeView(path, AclFileAttributeView.class);
* if (view != null) {
* List&lt;AclEntry&gt acl = view.getAcl();
* List&lt;AclEntry&gt; acl = view.getAcl();
* :
* }
* </pre>
......
......@@ -522,7 +522,7 @@ public interface Path
*
* @return a {@code Path} object representing the absolute path
*
* @throws IOError
* @throws java.io.IOError
* if an I/O error occurs
* @throws SecurityException
* In the case of the default provider, a security manager
......
......@@ -85,7 +85,7 @@ import java.io.IOException;
* .build();
*
* // read ACL, insert ACE, re-write ACL
* List&lt;AclEntry&gt acl = view.getAcl();
* List&lt;AclEntry&gt; acl = view.getAcl();
* acl.add(0, entry); // insert before any DENY entries
* view.setAcl(acl);
* </pre>
......
......@@ -310,7 +310,7 @@ public final class FileTime
private final long days;
/**
* The excess (in nanoseconds); can be negative if days <= 0.
* The excess (in nanoseconds); can be negative if days &lt;= 0.
*/
private final long excessNanos;
......
......@@ -62,9 +62,7 @@ public final class AllPermission extends Permission {
/**
* Creates a new AllPermission object.
*/
public AllPermission()
{
public AllPermission() {
super("<all permissions>");
}
......@@ -77,8 +75,7 @@ public final class AllPermission extends Permission {
* @param name ignored
* @param actions ignored.
*/
public AllPermission(String name, String actions)
{
public AllPermission(String name, String actions) {
this();
}
......@@ -120,8 +117,7 @@ public final class AllPermission extends Permission {
*
* @return the actions.
*/
public String getActions()
{
public String getActions() {
return "<all actions>";
}
......@@ -133,7 +129,6 @@ public final class AllPermission extends Permission {
* @return a new PermissionCollection object suitable for
* storing AllPermissions.
*/
public PermissionCollection newPermissionCollection() {
return new AllPermissionCollection();
}
......@@ -157,8 +152,8 @@ public final class AllPermission extends Permission {
*/
final class AllPermissionCollection
extends PermissionCollection
implements java.io.Serializable
extends PermissionCollection
implements java.io.Serializable
{
// use serialVersionUID from JDK 1.2.2 for interoperability
......@@ -188,8 +183,7 @@ implements java.io.Serializable
* has been marked readonly
*/
public void add(Permission permission)
{
public void add(Permission permission) {
if (! (permission instanceof AllPermission))
throw new IllegalArgumentException("invalid permission: "+
permission);
......@@ -203,13 +197,12 @@ implements java.io.Serializable
* Check and see if this set of permissions implies the permissions
* expressed in "permission".
*
* @param p the Permission object to compare
* @param permission the Permission object to compare
*
* @return always returns true.
*/
public boolean implies(Permission permission)
{
public boolean implies(Permission permission) {
return all_allowed; // No sync; staleness OK
}
......@@ -219,8 +212,7 @@ implements java.io.Serializable
*
* @return an enumeration of all the AllPermission objects.
*/
public Enumeration<Permission> elements()
{
public Enumeration<Permission> elements() {
return new Enumeration<Permission>() {
private boolean hasMore = all_allowed;
......
......@@ -68,7 +68,7 @@ import java.io.IOException;
*/
public abstract class BasicPermission extends Permission
implements java.io.Serializable
implements java.io.Serializable
{
private static final long serialVersionUID = 6279438298436773498L;
......@@ -84,10 +84,8 @@ implements java.io.Serializable
/**
* initialize a BasicPermission object. Common to all constructors.
*
*/
private void init(String name)
{
private void init(String name) {
if (name == null)
throw new NullPointerException("name can't be null");
......@@ -129,9 +127,7 @@ implements java.io.Serializable
* @throws NullPointerException if <code>name</code> is <code>null</code>.
* @throws IllegalArgumentException if <code>name</code> is empty.
*/
public BasicPermission(String name)
{
public BasicPermission(String name) {
super(name);
init(name);
}
......@@ -148,8 +144,7 @@ implements java.io.Serializable
* @throws NullPointerException if <code>name</code> is <code>null</code>.
* @throws IllegalArgumentException if <code>name</code> is empty.
*/
public BasicPermission(String name, String actions)
{
public BasicPermission(String name, String actions) {
super(name);
init(name);
}
......@@ -238,8 +233,7 @@ implements java.io.Serializable
*
* @return the empty string "".
*/
public String getActions()
{
public String getActions() {
return "";
}
......@@ -296,7 +290,6 @@ implements java.io.Serializable
*
* @see java.security.Permission
* @see java.security.Permissions
* @see java.security.PermissionsImpl
*
*
* @author Roland Schemers
......@@ -305,8 +298,8 @@ implements java.io.Serializable
*/
final class BasicPermissionCollection
extends PermissionCollection
implements java.io.Serializable
extends PermissionCollection
implements java.io.Serializable
{
private static final long serialVersionUID = 739301742472979399L;
......@@ -360,9 +353,7 @@ implements java.io.Serializable
* @exception SecurityException - if this BasicPermissionCollection object
* has been marked readonly
*/
public void add(Permission permission)
{
public void add(Permission permission) {
if (! (permission instanceof BasicPermission))
throw new IllegalArgumentException("invalid permission: "+
permission);
......@@ -398,14 +389,12 @@ implements java.io.Serializable
* Check and see if this set of permissions implies the permissions
* expressed in "permission".
*
* @param p the Permission object to compare
* @param permission the Permission object to compare
*
* @return true if "permission" is a proper subset of a permission in
* the set, false if not.
*/
public boolean implies(Permission permission)
{
public boolean implies(Permission permission) {
if (! (permission instanceof BasicPermission))
return false;
......@@ -468,7 +457,6 @@ implements java.io.Serializable
*
* @return an enumeration of all the BasicPermission objects.
*/
public Enumeration<Permission> elements() {
// Convert Iterator of Map values into an Enumeration
synchronized (this) {
......
......@@ -207,7 +207,7 @@ public class CodeSource implements java.io.Serializable {
* Returns the code signers associated with this CodeSource.
* <p>
* If this CodeSource object was created using the
* {@link #CodeSource(URL url, Certificate[] certs)}
* {@link #CodeSource(URL url, java.security.cert.Certificate[] certs)}
* constructor then its certificate chains are extracted and used to
* create an array of CodeSigner objects. Note that only X.509 certificates
* are examined - all other certificate types are ignored.
......
......@@ -32,6 +32,7 @@ import java.security.cert.CertificateException;
import java.util.*;
import javax.crypto.SecretKey;
import javax.security.auth.DestroyFailedException;
import javax.security.auth.callback.*;
/**
......@@ -278,8 +279,7 @@ public class KeyStore {
* @exception DestroyFailedException if this method was unable
* to clear the password
*/
public synchronized void destroy()
throws javax.security.auth.DestroyFailedException {
public synchronized void destroy() throws DestroyFailedException {
destroyed = true;
if (password != null) {
Arrays.fill(password, ' ');
......
......@@ -50,7 +50,7 @@ import java.util.Set;
* status of certificates with OCSP and CRLs. By default, OCSP is the
* preferred mechanism for checking revocation status, with CRLs as the
* fallback mechanism. However, this preference can be switched to CRLs with
* the {@link Option.PREFER_CRLS} option.
* the {@link Option#PREFER_CRLS PREFER_CRLS} option.
*
* <p>A {@code PKIXRevocationChecker} is obtained by calling the
* {@link CertPathValidator#getRevocationChecker getRevocationChecker} method
......
......@@ -1562,7 +1562,7 @@ public interface CallableStatement extends PreparedStatement {
* @param parameterName the name of the parameter
* @return the parameter value in full precision. If the value is
* SQL <code>NULL</code>, the result is <code>null</code>.
* @exception SQLExceptionif parameterName does not correspond to a named
* @exception SQLException if parameterName does not correspond to a named
* parameter; if a database access error occurs or
* this method is called on a closed <code>CallableStatement</code>
* @exception SQLFeatureNotSupportedException if the JDBC driver does not support
......
......@@ -119,7 +119,7 @@ public final class CollationElementIterator
* on the predefined collation rules. If the source string is empty,
* NULLORDER will be returned on the calls to next().
* @param sourceText the source string.
* @param order the collation object.
* @param owner the collation object.
*/
CollationElementIterator(String sourceText, RuleBasedCollator owner) {
this.owner = owner;
......@@ -137,7 +137,7 @@ public final class CollationElementIterator
* on the predefined collation rules. If the source string is empty,
* NULLORDER will be returned on the calls to next().
* @param sourceText the source string.
* @param order the collation object.
* @param owner the collation object.
*/
CollationElementIterator(CharacterIterator sourceText, RuleBasedCollator owner) {
this.owner = owner;
......
......@@ -62,7 +62,7 @@ import java.math.RoundingMode;
* derived by placing all the digits of the list to the right of the
* decimal point, by 10^exponent.
*
* @see Locale
* @see java.util.Locale
* @see Format
* @see NumberFormat
* @see DecimalFormat
......
......@@ -370,7 +370,7 @@ public abstract class Format implements Serializable, Cloneable {
* Delegates should NOT assume that the <code>Format</code> will notify
* the delegate of fields in any particular order.
*
* @see FieldPosition.Delegate
* @see FieldPosition#getFieldDelegate
* @see CharacterIteratorFieldDelegate
*/
interface FieldDelegate {
......
......@@ -192,13 +192,12 @@ final class RBCollationTables {
*
* @see CollationElementIterator#getMaxExpansion
*/
int getMaxExpansion(int order)
{
int getMaxExpansion(int order) {
int result = 1;
if (expandTable != null) {
// Right now this does a linear search through the entire
// expandsion table. If a collator had a large number of expansions,
// expansion table. If a collator had a large number of expansions,
// this could cause a performance problem, but in practise that
// rarely happens
for (int i = 0; i < expandTable.size(); i++) {
......@@ -219,16 +218,15 @@ final class RBCollationTables {
* table.
* @param idx the index of the expanding string value list
*/
final int[] getExpandValueList(int order) {
return expandTable.elementAt(order - EXPANDCHARINDEX);
final int[] getExpandValueList(int idx) {
return expandTable.elementAt(idx - EXPANDCHARINDEX);
}
/**
* Get the comarison order of a character from the collation table.
* @return the comparison order of a character.
*/
int getUnicodeOrder(int ch)
{
int getUnicodeOrder(int ch) {
return mapping.elementAt(ch);
}
......
......@@ -71,7 +71,7 @@ final class RBTableBuilder {
* This is the main function that actually builds the tables and
* stores them back in the RBCollationTables object. It is called
* ONLY by the RBCollationTables constructor.
* @see java.util.RuleBasedCollator#RuleBasedCollator
* @see RuleBasedCollator#RuleBasedCollator
* @exception ParseException If the rules format is incorrect.
*/
......
......@@ -1787,7 +1787,7 @@ public class SimpleDateFormat extends DateFormat {
* timeFields. Returns -start (for ParsePosition) if failed.
* @param text the time text to be parsed.
* @param start where to start parsing.
* @param ch the pattern character for the date field text to be parsed.
* @param patternCharIndex the index of the pattern character.
* @param count the count of a pattern character.
* @param obeyCount if true, then the next field directly abuts this one,
* and we should use the count to know when to stop parsing.
......
......@@ -1788,7 +1788,6 @@ public abstract class Calendar implements Serializable, Cloneable, Comparable<Ca
*
* @return a bit mask of selected fields
* @see #isExternallySet(int)
* @see #setInternallySetState(int)
*/
final int selectFields() {
// This implementation has been taken from the GregorianCalendar class.
......
......@@ -665,7 +665,7 @@ public final class Currency implements Serializable {
*
* @param pattern regex pattern for the properties
* @param ctry country code
* @param data currency data. This is a comma separated string that
* @param curdata currency data. This is a comma separated string that
* consists of "three-letter alphabet code", "three-digit numeric code",
* and "one-digit (0,1,2, or 3) default fraction digit".
* For example, "JPZ,392,0".
......
......@@ -918,7 +918,7 @@ import sun.misc.FormattedFloatingDecimal;
* <p> If the {@code '0'} flag is given then the output will be padded
* with leading zeros to the field width following any indication of sign.
*
* <p> If {@code '('}, {@code '+'}, '&nbsp&nbsp;', or {@code ','} flags
* <p> If {@code '('}, {@code '+'}, '&nbsp;&nbsp;', or {@code ','} flags
* are given then a {@link FormatFlagsConversionMismatchException} will be
* thrown.
*
......
......@@ -1932,7 +1932,7 @@ class JapaneseImperialCalendar extends Calendar {
* Computes the fixed date under either the Gregorian or the
* Julian calendar, using the given year and the specified calendar fields.
*
* @param cal the CalendarSystem to be used for the date calculation
* @param era era index
* @param year the normalized year number, with 0 indicating the
* year 1 BCE, -1 indicating 2 BCE, etc.
* @param fieldMask the calendar fields to be used for the date calculation
......@@ -2141,7 +2141,7 @@ class JapaneseImperialCalendar extends Calendar {
* Returns the length of the specified month in the specified
* Gregorian year. The year number must be normalized.
*
* @see #isLeapYear(int)
* @see GregorianCalendar#isLeapYear(int)
*/
private int monthLength(int month, int gregorianYear) {
return CalendarUtils.isGregorianLeapYear(gregorianYear) ?
......@@ -2152,7 +2152,7 @@ class JapaneseImperialCalendar extends Calendar {
* Returns the length of the specified month in the year provided
* by internalGet(YEAR).
*
* @see #isLeapYear(int)
* @see GregorianCalendar#isLeapYear(int)
*/
private int monthLength(int month) {
assert jdate.isNormalized();
......
......@@ -345,7 +345,7 @@ class JumboEnumSet<E extends Enum<E>> extends EnumSet<E> {
* the same size, and every member of the given set is contained in
* this set.
*
* @param e object to be compared for equality with this set
* @param o object to be compared for equality with this set
* @return <tt>true</tt> if the specified object is equal to this set
*/
public boolean equals(Object o) {
......
......@@ -1492,7 +1492,7 @@ public final class Locale implements Cloneable, Serializable {
* // returns "ja-JP-u-ca-japanese-x-lvariant-JP"
* Locale.forLanguageTag("th-TH-x-lvariant-TH").toLanguageTag();
* // returns "th-TH-u-nu-thai-x-lvariant-TH"
* <pre></ul>
* </pre></ul>
*
* <p>This implements the 'Language-Tag' production of BCP47, and
* so supports grandfathered (regular and irregular) as well as
......@@ -2143,7 +2143,7 @@ public final class Locale implements Cloneable, Serializable {
* @param in the <code>ObjectInputStream</code> to read
* @throws IOException
* @throws ClassNotFoundException
* @throws IllformdLocaleException
* @throws IllformedLocaleException
* @since 1.7
*/
private void readObject(ObjectInputStream in) throws IOException, ClassNotFoundException {
......
......@@ -130,10 +130,7 @@ public final class PropertyPermission extends BasicPermission {
* @param mask the actions mask to use.
*
*/
private void init(int mask)
{
private void init(int mask) {
if ((mask & ALL) != mask)
throw new IllegalArgumentException("invalid actions mask");
......@@ -160,9 +157,7 @@ public final class PropertyPermission extends BasicPermission {
* @throws IllegalArgumentException if <code>name</code> is empty or if
* <code>actions</code> is invalid.
*/
public PropertyPermission(String name, String actions)
{
public PropertyPermission(String name, String actions) {
super(name,actions);
init(getMask(actions));
}
......@@ -196,7 +191,6 @@ public final class PropertyPermission extends BasicPermission {
return ((this.mask & that.mask) == that.mask) && super.implies(that);
}
/**
* Checks two PropertyPermission objects for equality. Checks that <i>obj</i> is
* a PropertyPermission, and has the same name and actions as this object.
......@@ -226,16 +220,14 @@ public final class PropertyPermission extends BasicPermission {
*
* @return a hash code value for this object.
*/
public int hashCode() {
return this.getName().hashCode();
}
/**
* Converts an actions String to an actions mask.
*
* @param action the action string.
* @param actions the action string.
* @return the actions mask.
*/
private static int getMask(String actions) {
......@@ -332,8 +324,7 @@ public final class PropertyPermission extends BasicPermission {
*
* @return the canonical string representation of the actions.
*/
static String getActions(int mask)
{
static String getActions(int mask) {
StringBuilder sb = new StringBuilder();
boolean comma = false;
......@@ -359,8 +350,7 @@ public final class PropertyPermission extends BasicPermission {
*
* @return the canonical string representation of the actions.
*/
public String getActions()
{
public String getActions() {
if (actions == null)
actions = getActions(this.mask);
......@@ -373,7 +363,6 @@ public final class PropertyPermission extends BasicPermission {
*
* @return the actions mask.
*/
int getMask() {
return mask;
}
......@@ -386,7 +375,6 @@ public final class PropertyPermission extends BasicPermission {
* @return a new PermissionCollection object suitable for storing
* PropertyPermissions.
*/
public PermissionCollection newPermissionCollection() {
return new PropertyPermissionCollection();
}
......@@ -436,7 +424,7 @@ public final class PropertyPermission extends BasicPermission {
* @serial include
*/
final class PropertyPermissionCollection extends PermissionCollection
implements Serializable
implements Serializable
{
/**
......@@ -454,10 +442,8 @@ implements Serializable
private boolean all_allowed;
/**
* Create an empty PropertyPermissions object.
*
* Create an empty PropertyPermissionCollection object.
*/
public PropertyPermissionCollection() {
perms = new HashMap<>(32); // Capacity for default policy
all_allowed = false;
......@@ -475,9 +461,7 @@ implements Serializable
* @exception SecurityException - if this PropertyPermissionCollection
* object has been marked readonly
*/
public void add(Permission permission)
{
public void add(Permission permission) {
if (! (permission instanceof PropertyPermission))
throw new IllegalArgumentException("invalid permission: "+
permission);
......@@ -514,14 +498,12 @@ implements Serializable
* Check and see if this set of permissions implies the permissions
* expressed in "permission".
*
* @param p the Permission object to compare
* @param permission the Permission object to compare
*
* @return true if "permission" is a proper subset of a permission in
* the set, false if not.
*/
public boolean implies(Permission permission)
{
public boolean implies(Permission permission) {
if (! (permission instanceof PropertyPermission))
return false;
......@@ -655,8 +637,9 @@ implements Serializable
* Reads in a Hashtable of PropertyPermissions and saves them in the
* perms field. Reads in all_allowed.
*/
private void readObject(ObjectInputStream in) throws IOException,
ClassNotFoundException {
private void readObject(ObjectInputStream in)
throws IOException, ClassNotFoundException
{
// Don't call defaultReadObject()
// Read in serialized fields
......
......@@ -289,7 +289,7 @@ class RegularEnumSet<E extends Enum<E>> extends EnumSet<E> {
* the same size, and every member of the given set is contained in
* this set.
*
* @param e object to be compared for equality with this set
* @param o object to be compared for equality with this set
* @return <tt>true</tt> if the specified object is equal to this set
*/
public boolean equals(Object o) {
......
......@@ -570,7 +570,6 @@ public final class Scanner implements Iterator<String>, Closeable {
*
* @param source A character source implementing the Readable interface
* @param pattern A delimiting pattern
* @return A scanner with the specified source and pattern
*/
private Scanner(Readable source, Pattern pattern) {
assert source != null : "source should not be null";
......
......@@ -221,7 +221,7 @@ abstract public class TimeZone implements Serializable, Cloneable {
* @param date the milliseconds (since January 1, 1970,
* 00:00:00.000 GMT) at which the time zone offset and daylight
* saving amount are found
* @param offset an array of int where the raw GMT offset
* @param offsets an array of int where the raw GMT offset
* (offset[0]) and daylight saving amount (offset[1]) are stored,
* or null if those values are not needed. The method assumes that
* the length of the given array is two or larger.
......
......@@ -41,8 +41,8 @@ import java.util.ArrayList;
* @since 1.5
*
* @see javax.management
* @see java.util.Logger
* @see java.util.LogManager
* @see Logger
* @see LogManager
*/
class Logging implements LoggingMXBean {
......
......@@ -92,7 +92,7 @@ class XmlSupport {
* @throws BackingStoreException if preference data cannot be read from
* backing store.
* @throws IllegalStateException if this node (or an ancestor) has been
* removed with the {@link #removeNode()} method.
* removed with the {@link Preferences#removeNode()} method.
*/
static void export(OutputStream os, final Preferences p, boolean subTree)
throws IOException, BackingStoreException {
......
......@@ -136,8 +136,7 @@ final class CryptoAllPermissionCollection extends PermissionCollection
* @exception SecurityException - if this CryptoAllPermissionCollection
* object has been marked readonly
*/
public void add(Permission permission)
{
public void add(Permission permission) {
if (isReadOnly())
throw new SecurityException("attempt to add a Permission to " +
"a readonly PermissionCollection");
......@@ -152,13 +151,12 @@ final class CryptoAllPermissionCollection extends PermissionCollection
* Check and see if this set of permissions implies the permissions
* expressed in "permission".
*
* @param p the Permission object to compare
* @param permission the Permission object to compare
*
* @return true if the given permission is implied by this
* CryptoAllPermissionCollection.
*/
public boolean implies(Permission permission)
{
public boolean implies(Permission permission) {
if (!(permission instanceof CryptoPermission)) {
return false;
}
......
......@@ -471,8 +471,8 @@ class CryptoPermission extends java.security.Permission {
* @author Sharon Liu
*/
final class CryptoPermissionCollection extends PermissionCollection
implements Serializable {
implements Serializable
{
private static final long serialVersionUID = -511215555898802763L;
private Vector<Permission> permissions;
......@@ -493,8 +493,7 @@ implements Serializable {
* @exception SecurityException - if this CryptoPermissionCollection
* object has been marked <i>readOnly</i>.
*/
public void add(Permission permission)
{
public void add(Permission permission) {
if (isReadOnly())
throw new SecurityException("attempt to add a Permission " +
"to a readonly PermissionCollection");
......@@ -509,7 +508,7 @@ implements Serializable {
* Check and see if this CryptoPermission object implies
* the given Permission object.
*
* @param p the Permission object to compare
* @param permission the Permission object to compare
*
* @return true if the given permission is implied by this
* CryptoPermissionCollection, false if not.
......@@ -538,8 +537,7 @@ implements Serializable {
* @return an enumeration of all the CryptoPermission objects.
*/
public Enumeration<Permission> elements()
{
public Enumeration<Permission> elements() {
return permissions.elements();
}
}
......@@ -54,7 +54,7 @@ import java.lang.reflect.*;
* @author Sharon Liu
*
* @see java.security.Permissions
* @see java.security.spec.AlgrithomParameterSpec
* @see java.security.spec.AlgorithmParameterSpec
* @see javax.crypto.CryptoPermission
* @see javax.crypto.CryptoAllPermission
* @see javax.crypto.CryptoPermissions
......
......@@ -33,7 +33,7 @@ import java.security.spec.*;
* tranform the plaintext.
*
* @author Li Gong
* @see Nullcipher
* @see NullCipher
*
* @since 1.4
*/
......
......@@ -798,7 +798,7 @@ public class MLet extends java.net.URLClassLoader
* Allows the m-let to perform any operations it needs before being unregistered
* by the MBean server.
*
* @exception java.langException This exception should be caught
* @exception java.lang.Exception This exception should be caught
* by the MBean server and re-thrown as an
* MBeanRegistrationException.
*/
......
......@@ -189,7 +189,7 @@ public class ModelMBeanAttributeInfo
* May be null if the property is write-only.
* @param setter The method used for writing the attribute value.
* May be null if the attribute is read-only.
* @exception IntrospectionException There is a consistency
* @exception javax.management.IntrospectionException There is a consistency
* problem in the definition of this attribute.
*
*/
......@@ -233,7 +233,7 @@ public class ModelMBeanAttributeInfo
* it is null, then a default descriptor will be created. If
* the descriptor does not contain the field "displayName" this field is added
* in the descriptor with its default value.
* @exception IntrospectionException There is a consistency
* @exception javax.management.IntrospectionException There is a consistency
* problem in the definition of this attribute.
* @exception RuntimeOperationsException Wraps an
* IllegalArgumentException. The descriptor is invalid, or descriptor
......
......@@ -124,11 +124,6 @@ public class CompositeDataInvocationHandler implements InvocationHandler {
<p>Construct a handler backed by the given {@code
CompositeData}.</p>
@param mbsc the {@code MBeanServerConnection} related to this
{@code CompositeData}. This is only relevant if a method in
the interface for which this is an invocation handler returns
a type that is an MXBean interface. Otherwise, it can be null.
@param compositeData the {@code CompositeData} that will supply
information to getters.
......
......@@ -416,7 +416,7 @@ public class NamingManager {
* specified.
* See the <code>getObjectInstance</code> method for
* details.
* @param ctx The context relative to which <code>name</code> is
* @param nameCtx The context relative to which <code>name</code> is
* specified, or null for the default initial context.
* See the <code>getObjectInstance</code> method for
* details.
......
......@@ -178,7 +178,6 @@ public final class DelegationPermission extends BasicPermission
*
* @return a hash code value for this object.
*/
public int hashCode() {
return getName().hashCode();
}
......@@ -278,12 +277,11 @@ final class KrbDelegationPermissionCollection extends PermissionCollection
* Check and see if this collection of permissions implies the permissions
* expressed in "permission".
*
* @param p the Permission object to compare
* @param permission the Permission object to compare
*
* @return true if "permission" is a proper subset of a permission in
* the collection, false if not.
*/
public boolean implies(Permission permission) {
if (! (permission instanceof DelegationPermission))
return false;
......@@ -310,7 +308,6 @@ final class KrbDelegationPermissionCollection extends PermissionCollection
* @exception SecurityException - if this PermissionCollection object
* has been marked readonly
*/
public void add(Permission permission) {
if (! (permission instanceof DelegationPermission))
throw new IllegalArgumentException("invalid permission: "+
......@@ -329,7 +326,6 @@ final class KrbDelegationPermissionCollection extends PermissionCollection
*
* @return an enumeration of all the DelegationPermission objects.
*/
public Enumeration<Permission> elements() {
// Convert Iterator into Enumeration
synchronized (this) {
......@@ -376,8 +372,9 @@ final class KrbDelegationPermissionCollection extends PermissionCollection
* Reads in a Vector of DelegationPermissions and saves them in the perms field.
*/
@SuppressWarnings("unchecked")
private void readObject(ObjectInputStream in) throws IOException,
ClassNotFoundException {
private void readObject(ObjectInputStream in)
throws IOException, ClassNotFoundException
{
// Don't call defaultReadObject()
// Read in serialized fields
......
......@@ -259,7 +259,6 @@ public final class ServicePermission extends Permission
* Always returns present actions in the following order:
* initiate, accept.
*/
public String getActions() {
if (actions == null)
actions = getActions(this.mask);
......@@ -280,7 +279,6 @@ public final class ServicePermission extends Permission
* @return a new PermissionCollection object suitable for storing
* ServicePermissions.
*/
public PermissionCollection newPermissionCollection() {
return new KrbServicePermissionCollection();
}
......@@ -290,7 +288,6 @@ public final class ServicePermission extends Permission
*
* @return the actions mask.
*/
int getMask() {
return mask;
}
......@@ -301,7 +298,6 @@ public final class ServicePermission extends Permission
* @param action the action string
* @return the action mask
*/
private static int getMask(String action) {
if (action == null) {
......@@ -468,12 +464,11 @@ final class KrbServicePermissionCollection extends PermissionCollection
* Check and see if this collection of permissions implies the permissions
* expressed in "permission".
*
* @param p the Permission object to compare
* @param permission the Permission object to compare
*
* @return true if "permission" is a proper subset of a permission in
* the collection, false if not.
*/
public boolean implies(Permission permission) {
if (! (permission instanceof ServicePermission))
return false;
......@@ -517,7 +512,6 @@ final class KrbServicePermissionCollection extends PermissionCollection
* @exception SecurityException - if this PermissionCollection object
* has been marked readonly
*/
public void add(Permission permission) {
if (! (permission instanceof ServicePermission))
throw new IllegalArgumentException("invalid permission: "+
......@@ -584,8 +578,9 @@ final class KrbServicePermissionCollection extends PermissionCollection
* Reads in a Vector of ServicePermissions and saves them in the perms field.
*/
@SuppressWarnings("unchecked")
private void readObject(ObjectInputStream in) throws IOException,
ClassNotFoundException {
private void readObject(ObjectInputStream in)
throws IOException, ClassNotFoundException
{
// Don't call defaultReadObject()
// Read in serialized fields
......
......@@ -48,7 +48,7 @@ public interface ConnectionPoolDataSource extends CommonDataSource {
* connection to the database that this
* <code>ConnectionPoolDataSource</code> object represents
* @exception SQLException if a database access error occurs
* @exception SQLFeatureNotSupportedException if the JDBC driver does not support
* @exception java.sql.SQLFeatureNotSupportedException if the JDBC driver does not support
* this method
* @since 1.4
*/
......@@ -64,7 +64,7 @@ public interface ConnectionPoolDataSource extends CommonDataSource {
* connection to the database that this
* <code>ConnectionPoolDataSource</code> object represents
* @exception SQLException if a database access error occurs
* @exception SQLFeatureNotSupportedException if the JDBC driver does not support
* @exception java.sql.SQLFeatureNotSupportedException if the JDBC driver does not support
* this method
* @since 1.4
*/
......
......@@ -102,7 +102,7 @@ public interface PooledConnection {
* @return a <code>Connection</code> object that is a handle to
* this <code>PooledConnection</code> object
* @exception SQLException if a database access error occurs
* @exception SQLFeatureNotSupportedException if the JDBC driver does not support
* @exception java.sql.SQLFeatureNotSupportedException if the JDBC driver does not support
* this method
* @since 1.4
*/
......@@ -117,7 +117,7 @@ public interface PooledConnection {
* information.
*
* @exception SQLException if a database access error occurs
* @exception SQLFeatureNotSupportedException if the JDBC driver does not support
* @exception java.sql.SQLFeatureNotSupportedException if the JDBC driver does not support
* this method
* @since 1.4
*/
......
......@@ -293,7 +293,7 @@ public abstract class SyncProvider {
* SyncProvider.DATASOURCE_TABLE_LOCK,
* SyncProvider.DATASOURCE_DB_LOCK
* </pre>
* @throws SyncProviderExceptiom if an error occurs determining the data
* @throws SyncProviderException if an error occurs determining the data
* source locking level.
* @see #setDataSourceLock
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册