OpenJDK / loom / loom
changeset 7799:8cd7dc04cd85
7006265: Javadoc warnings
Reviewed-by: weijun
author | xuelei |
---|---|
date | Wed, 15 Dec 2010 22:42:37 -0800 |
parents | be6c7160f8fc |
children | cf50efba2e1d |
files | jdk/src/share/classes/javax/net/ssl/X509ExtendedTrustManager.java |
diffstat | 1 files changed, 12 insertions(+), 12 deletions(-) [+] |
line wrap: on
line diff
--- a/jdk/src/share/classes/javax/net/ssl/X509ExtendedTrustManager.java Wed Dec 15 09:15:20 2010 +0000 +++ b/jdk/src/share/classes/javax/net/ssl/X509ExtendedTrustManager.java Wed Dec 15 22:42:37 2010 -0800 @@ -63,7 +63,7 @@ * should be "RSA". Checking is case-sensitive. * <p> * If the <code>socket</code> parameter is an instance of - * {@link javax.net.SSLSocket}, and the endpoint identification + * {@link javax.net.ssl.SSLSocket}, and the endpoint identification * algorithm of the <code>SSLParameters</code> is non-empty, to prevent * man-in-the-middle attacks, the address that the <code>socket</code> * connected to should be checked against the peer's identity presented @@ -71,7 +71,7 @@ * identification algorithm. * <p> * If the <code>socket</code> parameter is an instance of - * {@link javax.net.SSLSocket}, and the algorithm constraints of the + * {@link javax.net.ssl.SSLSocket}, and the algorithm constraints of the * <code>SSLParameters</code> is non-null, for every certificate in the * certification path, fields such as subject public key, the signature * algorithm, key usage, extended key usage, etc. need to conform to the @@ -88,8 +88,8 @@ * @throws CertificateException if the certificate chain is not trusted * by this TrustManager * - * @see SSLParameters#getEndpointIdentificationProtocol - * @see SSLParameters#setEndpointIdentificationProtocol(String) + * @see SSLParameters#getEndpointIdentificationAlgorithm + * @see SSLParameters#setEndpointIdentificationAlgorithm(String) * @see SSLParameters#getAlgorithmConstraints * @see SSLParameters#setAlgorithmConstraints(AlgorithmConstraints) */ @@ -111,7 +111,7 @@ * certificate is used. Checking is case-sensitive. * <p> * If the <code>socket</code> parameter is an instance of - * {@link javax.net.SSLSocket}, and the endpoint identification + * {@link javax.net.ssl.SSLSocket}, and the endpoint identification * algorithm of the <code>SSLParameters</code> is non-empty, to prevent * man-in-the-middle attacks, the address that the <code>socket</code> * connected to should be checked against the peer's identity presented @@ -119,7 +119,7 @@ * identification algorithm. * <p> * If the <code>socket</code> parameter is an instance of - * {@link javax.net.SSLSocket}, and the algorithm constraints of the + * {@link javax.net.ssl.SSLSocket}, and the algorithm constraints of the * <code>SSLParameters</code> is non-null, for every certificate in the * certification path, fields such as subject public key, the signature * algorithm, key usage, extended key usage, etc. need to conform to the @@ -136,8 +136,8 @@ * @throws CertificateException if the certificate chain is not trusted * by this TrustManager * - * @see SSLParameters#getEndpointIdentificationProtocol - * @see SSLParameters#setEndpointIdentificationProtocol(String) + * @see SSLParameters#getEndpointIdentificationAlgorithm + * @see SSLParameters#setEndpointIdentificationAlgorithm(String) * @see SSLParameters#getAlgorithmConstraints * @see SSLParameters#setAlgorithmConstraints(AlgorithmConstraints) */ @@ -177,8 +177,8 @@ * @throws CertificateException if the certificate chain is not trusted * by this TrustManager * - * @see SSLParameters#getEndpointIdentificationProtocol - * @see SSLParameters#setEndpointIdentificationProtocol(String) + * @see SSLParameters#getEndpointIdentificationAlgorithm + * @see SSLParameters#setEndpointIdentificationAlgorithm(String) * @see SSLParameters#getAlgorithmConstraints * @see SSLParameters#setAlgorithmConstraints(AlgorithmConstraints) */ @@ -223,8 +223,8 @@ * @throws CertificateException if the certificate chain is not trusted * by this TrustManager * - * @see SSLParameters#getEndpointIdentificationProtocol - * @see SSLParameters#setEndpointIdentificationProtocol(String) + * @see SSLParameters#getEndpointIdentificationAlgorithm + * @see SSLParameters#setEndpointIdentificationAlgorithm(String) * @see SSLParameters#getAlgorithmConstraints * @see SSLParameters#setAlgorithmConstraints(AlgorithmConstraints) */