diff --git a/src/share/classes/javax/crypto/Cipher.java b/src/share/classes/javax/crypto/Cipher.java
index d16c579469cedef8983cd6e04559067b43d1038d..ffcc7cf329ca3091e649a93041d7010d30432ae6 100644
--- a/src/share/classes/javax/crypto/Cipher.java
+++ b/src/share/classes/javax/crypto/Cipher.java
@@ -62,17 +62,17 @@ import sun.security.jca.*;
* algorithm (e.g., DES), and may be followed by a feedback mode and
* padding scheme.
*
- *
A transformation is of the form:
+ *
A transformation is of the form:
*
*
* - "algorithm/mode/padding" or
- *
+ *
*
- "algorithm"
*
*
* (in the latter case,
* provider-specific default values for the mode and padding scheme are used).
- * For example, the following is a valid transformation:
+ * For example, the following is a valid transformation:
*
*
* Cipher c = Cipher.getInstance("DES/CBC/PKCS5Padding");
diff --git a/src/share/classes/javax/crypto/CipherSpi.java b/src/share/classes/javax/crypto/CipherSpi.java
index aae33318d1cb8022657aca5280c589a33d4f8298..ce7258157d57e3d01bce14a4939941cf1a7c361a 100644
--- a/src/share/classes/javax/crypto/CipherSpi.java
+++ b/src/share/classes/javax/crypto/CipherSpi.java
@@ -62,17 +62,17 @@ import java.nio.ByteBuffer;
* algorithm (e.g., DES), and may be followed by a feedback mode and
* padding scheme.
*
- * A transformation is of the form:
+ *
A transformation is of the form:
*
*
* - "algorithm/mode/padding" or
- *
+ *
*
- "algorithm"
*
*
* (in the latter case,
* provider-specific default values for the mode and padding scheme are used).
- * For example, the following is a valid transformation:
+ * For example, the following is a valid transformation:
*
*
* Cipher c = Cipher.getInstance("DES/CBC/PKCS5Padding");
@@ -129,7 +129,7 @@ import java.nio.ByteBuffer;
* DES/CBC/PKCS5Padding, one that implements
* DES/CFB/PKCS5Padding, and yet another one that implements
* DES/OFB/PKCS5Padding. That provider would have the following
- * Cipher
properties in its master class:
+ * Cipher
properties in its master class:
*
*
*
@@ -160,7 +160,7 @@ import java.nio.ByteBuffer;
* and one for OFB), one class for PKCS5Padding,
* and a generic DES class that subclasses from CipherSpi
.
* That provider would have the following
- * Cipher
properties in its master class:
+ * Cipher
properties in its master class:
*
*
*
@@ -197,20 +197,20 @@ import java.nio.ByteBuffer;
* Check if the provider has registered a subclass of CipherSpi
* for the specified "algorithm/mode/padding" transformation.
* If the answer is YES, instantiate it.
- *
If the answer is NO, go to the next step.
+ *
If the answer is NO, go to the next step.
*
-
* Check if the provider has registered a subclass of
CipherSpi
* for the sub-transformation "algorithm/mode".
* If the answer is YES, instantiate it, and call
* engineSetPadding(padding)
on the new instance.
- *
If the answer is NO, go to the next step.
+ *
If the answer is NO, go to the next step.
*
-
* Check if the provider has registered a subclass of
CipherSpi
* for the sub-transformation "algorithm//padding" (note the double
* slashes).
* If the answer is YES, instantiate it, and call
* engineSetMode(mode)
on the new instance.
- *
If the answer is NO, go to the next step.
+ *
If the answer is NO, go to the next step.
*
-
* Check if the provider has registered a subclass of
CipherSpi
* for the sub-transformation "algorithm".
diff --git a/src/share/classes/javax/crypto/KeyGenerator.java b/src/share/classes/javax/crypto/KeyGenerator.java
index 961f0ea9eb3c33517b1ac46765709cf5a523262a..030207eab519742efd74dd446784e2946342cbba 100644
--- a/src/share/classes/javax/crypto/KeyGenerator.java
+++ b/src/share/classes/javax/crypto/KeyGenerator.java
@@ -66,7 +66,6 @@ import sun.security.jca.GetInstance.Instance;
* algorithm-independent init
methods, it is up to the
* provider what to do about the algorithm-specific parameters (if any) to be
* associated with each of the keys.
- *
*
*
- Algorithm-Specific Initialization
*
For situations where a set of algorithm-specific parameters already
diff --git a/src/share/classes/javax/crypto/SealedObject.java b/src/share/classes/javax/crypto/SealedObject.java
index 9166c28d10c1f51edf6bd3f456ff8de6ad038c64..9cee4d070f1d206fed288c56cd3fa7d7bf0db854 100644
--- a/src/share/classes/javax/crypto/SealedObject.java
+++ b/src/share/classes/javax/crypto/SealedObject.java
@@ -1,5 +1,5 @@
/*
- * Copyright (c) 1997, 2011, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 1997, 2013, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
@@ -50,7 +50,7 @@ import java.security.NoSuchProviderException;
* to a SealedObject.
*
*
The original object that was sealed can be recovered in two different
- * ways:
+ * ways:
*
*
*
@@ -68,8 +68,6 @@ import java.security.NoSuchProviderException;
* decryption key, it could hand over the cipher object to
* another party who then unseals the sealed object.
*
- *
- *
*
- by using one of the
* {@link #getObject(java.security.Key) getObject} methods
* that take a
Key
object.
diff --git a/src/share/classes/javax/net/ssl/SSLEngine.java b/src/share/classes/javax/net/ssl/SSLEngine.java
index 92e838623f4aa3c7d50ab29cf3b5df899b0af101..641108802589bbe09c15084f7c6066f57d62849a 100644
--- a/src/share/classes/javax/net/ssl/SSLEngine.java
+++ b/src/share/classes/javax/net/ssl/SSLEngine.java
@@ -1,5 +1,5 @@
/*
- * Copyright (c) 2003, 2012, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 2003, 2013, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
@@ -329,7 +329,7 @@ import java.nio.ReadOnlyBufferException;
* is saved. All future delegated tasks will be processed using this
* context: that is, all access control decisions will be made using the
* context captured at engine creation.
- *
+ *
*
*
* Concurrency Notes:
@@ -345,7 +345,7 @@ import java.nio.ReadOnlyBufferException;
* out-of-order, unexpected or fatal results may occur.
*
* For example:
- *
+ *
*
* synchronized (outboundLock) {
* sslEngine.wrap(src, dst);
diff --git a/src/share/classes/javax/net/ssl/SSLPermission.java b/src/share/classes/javax/net/ssl/SSLPermission.java
index bac011d6579762dcb790645d02ad28212edcffb9..b27142128ae2d97e5202532e12c9aeebdcbb9cd9 100644
--- a/src/share/classes/javax/net/ssl/SSLPermission.java
+++ b/src/share/classes/javax/net/ssl/SSLPermission.java
@@ -1,5 +1,5 @@
/*
- * Copyright (c) 2000, 2012, Oracle and/or its affiliates. All rights reserved.
+ * Copyright (c) 2000, 2013, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
@@ -43,7 +43,6 @@ import java.security.*;
* The following table lists all the possible SSLPermission target names,
* and for each provides a description of what the permission allows
* and a discussion of the risks of granting code the permission.
- *
*
*
diff --git a/src/share/classes/javax/security/auth/PrivateCredentialPermission.java b/src/share/classes/javax/security/auth/PrivateCredentialPermission.java
index 810cff2228a523f0c229489c8d33c22c1b29850a..37a2660cb0389ec28d1f98d70c51256967123899 100644
--- a/src/share/classes/javax/security/auth/PrivateCredentialPermission.java
+++ b/src/share/classes/javax/security/auth/PrivateCredentialPermission.java
@@ -228,8 +228,8 @@ public final class PrivateCredentialPermission extends Permission {
*
*
* This method returns true if:
- *
- * - p is an instanceof PrivateCredentialPermission and
+ *
+ * - p is an instanceof PrivateCredentialPermission and
*
- the target name for p is implied by this object's
* target name. For example:
*
diff --git a/src/share/classes/javax/security/auth/kerberos/DelegationPermission.java b/src/share/classes/javax/security/auth/kerberos/DelegationPermission.java
index 77aabb8b9d680e2a09c2aca9a530fd87b63e09c0..bdd3ff9c4a99a4857561daa13cb6d37be5f8497a 100644
--- a/src/share/classes/javax/security/auth/kerberos/DelegationPermission.java
+++ b/src/share/classes/javax/security/auth/kerberos/DelegationPermission.java
@@ -48,14 +48,14 @@ import java.io.IOException;
*
* For example, to specify the "host" service use of a forwardable TGT the
* target permission is specified as follows:
- *
+ *
*
* DelegationPermission("\"host/foo.example.com@EXAMPLE.COM\" \"krbtgt/EXAMPLE.COM@EXAMPLE.COM\"");
*
*
* To give the "backup" service a proxiable nfs service ticket the target permission
* might be specified:
- *
+ *
*
* DelegationPermission("\"backup/bar.example.com@EXAMPLE.COM\" \"nfs/home.EXAMPLE.COM@EXAMPLE.COM\"");
*
diff --git a/src/share/classes/javax/security/auth/kerberos/ServicePermission.java b/src/share/classes/javax/security/auth/kerberos/ServicePermission.java
index 50a0517fa44726d13005f864520d471a3428a36b..893284e548c05aafc524c974ac75891391e46e35 100644
--- a/src/share/classes/javax/security/auth/kerberos/ServicePermission.java
+++ b/src/share/classes/javax/security/auth/kerberos/ServicePermission.java
@@ -62,7 +62,7 @@ import java.io.IOException;
* Authentication Service exchange.
*
* The possible actions are:
- *
+ *
*
* initiate - allow the caller to use the credential to
* initiate a security context with a service
@@ -75,7 +75,7 @@ import java.io.IOException;
*
* For example, to specify the permission to access to the TGT to
* initiate a security context the permission is constructed as follows:
- *
+ *
*
* ServicePermission("krbtgt/EXAMPLE.COM@EXAMPLE.COM", "initiate");
*
@@ -89,7 +89,7 @@ import java.io.IOException;
* For a Kerberized server the action is "accept". For example, the permission
* necessary to access and use the secret key of the Kerberized "host"
* service (telnet and the likes) would be constructed as follows:
- *
+ *
*
* ServicePermission("host/foo.example.com@EXAMPLE.COM", "accept");
*
diff --git a/src/share/classes/javax/security/auth/login/LoginContext.java b/src/share/classes/javax/security/auth/login/LoginContext.java
index a9685bca811eada1c02960d6851bd73a03910a7f..ba18e5ce6a0c8dd0bb8d52e5661dbd4221f5a680 100644
--- a/src/share/classes/javax/security/auth/login/LoginContext.java
+++ b/src/share/classes/javax/security/auth/login/LoginContext.java
@@ -101,11 +101,11 @@ import sun.security.util.ResourcesMgr;
*
- If the constructor has a Subject
* input parameter, the LoginContext uses the caller-specified
* Subject object.
- *
+ *
*
- If the caller specifies a {@code null} Subject
* and a {@code null} value is permitted,
* the LoginContext instantiates a new Subject.
- *
+ *
*
- If the constructor does not have a Subject
* input parameter, the LoginContext instantiates a new Subject.
*
@@ -132,7 +132,7 @@ import sun.security.util.ResourcesMgr;
* {@code getAppConfigurationEntry} with the name, "other"
* (the default entry name). If there is no entry for "other",
* then a {@code LoginException} is thrown.
- *
+ *
*
- When LoginContext uses the installed Configuration, the caller
* requires the createLoginContext.name and possibly
* createLoginContext.other AuthPermissions. Furthermore, the
@@ -141,7 +141,7 @@ import sun.security.util.ResourcesMgr;
* perform security-sensitive tasks (such as connecting to remote hosts,
* and updating the Subject) will require the respective permissions, but
* the callers of the LoginContext will not require those permissions.
- *
+ *
*
- When LoginContext uses a caller-specified Configuration, the caller
* does not require any createLoginContext AuthPermission. The LoginContext
* saves the {@code AccessControlContext} for the caller,
@@ -158,7 +158,7 @@ import sun.security.util.ResourcesMgr;
*
- If the constructor has a CallbackHandler
* input parameter, the LoginContext uses the caller-specified
* CallbackHandler object.
- *
+ *
*
- If the constructor does not have a CallbackHandler
* input parameter, or if the caller specifies a {@code null}
* CallbackHandler object (and a {@code null} value is permitted),
@@ -171,7 +171,7 @@ import sun.security.util.ResourcesMgr;
* with users. The caller thus assumes that the configured
* modules have alternative means for authenticating the user.
*
- *
+ *
*
- When the LoginContext uses the installed Configuration (instead of
* a caller-specified Configuration, see above),
* then this LoginContext must wrap any
diff --git a/src/share/classes/javax/security/auth/x500/X500Principal.java b/src/share/classes/javax/security/auth/x500/X500Principal.java
index 5c0a56212614f3f4be59e3761f1cef0069ce6ce5..77292b0be22f29ce7cde390d8cdf5f4a7ea225d6 100644
--- a/src/share/classes/javax/security/auth/x500/X500Principal.java
+++ b/src/share/classes/javax/security/auth/x500/X500Principal.java
@@ -314,7 +314,7 @@ public final class X500Principal implements Principal, java.io.Serializable {
* this method returns an RFC 2253 conformant string representation
* with the following additional canonicalizations:
*
- *
+ *
* - Leading zeros are removed from attribute types
* that are encoded as dotted decimal OIDs
*
- DirectoryString attribute values of type