diff --git a/jdk/src/share/classes/com/sun/org/apache/xml/internal/security/utils/Base64.java b/jdk/src/share/classes/com/sun/org/apache/xml/internal/security/utils/Base64.java index 4ed945ec3b5..9e9c7de8b0f 100644 --- a/jdk/src/share/classes/com/sun/org/apache/xml/internal/security/utils/Base64.java +++ b/jdk/src/share/classes/com/sun/org/apache/xml/internal/security/utils/Base64.java @@ -41,7 +41,7 @@ import org.w3c.dom.Text; * @author Raul Benito(Of the xerces copy, and little adaptations). * @author Anli Shundi * @author Christian Geuer-Pollmann - * @see RFC 2045 + * @see RFC 2045 * @see com.sun.org.apache.xml.internal.security.transforms.implementations.TransformBase64Decode */ public class Base64 { diff --git a/jdk/src/share/classes/com/sun/security/auth/LdapPrincipal.java b/jdk/src/share/classes/com/sun/security/auth/LdapPrincipal.java index 25cef88e619..78a9e7ce522 100644 --- a/jdk/src/share/classes/com/sun/security/auth/LdapPrincipal.java +++ b/jdk/src/share/classes/com/sun/security/auth/LdapPrincipal.java @@ -31,7 +31,7 @@ import javax.naming.ldap.LdapName; /** * A principal identified by a distinguished name as specified by - * RFC 2253. + * RFC 2253. * *
* After successful authentication, a user {@link java.security.Principal}
@@ -122,7 +122,7 @@ public final class LdapPrincipal implements Principal, java.io.Serializable {
/**
* Creates a string representation of this principal's name in the format
- * defined by RFC 2253.
+ * defined by RFC 2253.
* If the name has zero components an empty string is returned.
*
* @return The principal's string name.
diff --git a/jdk/src/share/classes/com/sun/security/sasl/CramMD5Client.java b/jdk/src/share/classes/com/sun/security/sasl/CramMD5Client.java
index 3c032ded31e..2ed055b7ad3 100644
--- a/jdk/src/share/classes/com/sun/security/sasl/CramMD5Client.java
+++ b/jdk/src/share/classes/com/sun/security/sasl/CramMD5Client.java
@@ -33,7 +33,7 @@ import java.util.logging.Level;
/**
* Implements the CRAM-MD5 SASL client-side mechanism.
- * (RFC 2195).
+ * (RFC 2195).
* CRAM-MD5 has no initial response. It receives bytes from
* the server as a challenge, which it hashes by using MD5 and the password.
* It concatenates the authentication ID with this result and returns it
diff --git a/jdk/src/share/classes/com/sun/security/sasl/CramMD5Server.java b/jdk/src/share/classes/com/sun/security/sasl/CramMD5Server.java
index 2e8c69b94c1..c2e360c4986 100644
--- a/jdk/src/share/classes/com/sun/security/sasl/CramMD5Server.java
+++ b/jdk/src/share/classes/com/sun/security/sasl/CramMD5Server.java
@@ -38,7 +38,7 @@ import java.util.logging.Level;
/**
* Implements the CRAM-MD5 SASL server-side mechanism.
- * (RFC 2195).
+ * (RFC 2195).
* CRAM-MD5 has no initial response.
*
* client <---- M={random, timestamp, server-fqdn} ------- server
diff --git a/jdk/src/share/classes/com/sun/security/sasl/ExternalClient.java b/jdk/src/share/classes/com/sun/security/sasl/ExternalClient.java
index 0048ebc62cb..8c492e886db 100644
--- a/jdk/src/share/classes/com/sun/security/sasl/ExternalClient.java
+++ b/jdk/src/share/classes/com/sun/security/sasl/ExternalClient.java
@@ -29,7 +29,7 @@ import javax.security.sasl.*;
/**
* Implements the EXTERNAL SASL client mechanism.
- * (RFC 2222).
+ * (RFC 2222).
* The EXTERNAL mechanism returns the optional authorization ID as
* the initial response. It processes no challenges.
*
diff --git a/jdk/src/share/classes/com/sun/security/sasl/gsskerb/GssKrb5Client.java b/jdk/src/share/classes/com/sun/security/sasl/gsskerb/GssKrb5Client.java
index 636541f6584..f0e04aa16cb 100644
--- a/jdk/src/share/classes/com/sun/security/sasl/gsskerb/GssKrb5Client.java
+++ b/jdk/src/share/classes/com/sun/security/sasl/gsskerb/GssKrb5Client.java
@@ -39,10 +39,10 @@ import org.ietf.jgss.*;
/**
* Implements the GSSAPI SASL client mechanism for Kerberos V5.
- * (RFC 2222,
+ * (RFC 2222,
* draft-ietf-cat-sasl-gssapi-04.txt).
* It uses the Java Bindings for GSSAPI
- * (RFC 2853)
+ * (RFC 2853)
* for getting GSSAPI/Kerberos V5 support.
*
* The client/server interactions are:
diff --git a/jdk/src/share/classes/com/sun/security/sasl/gsskerb/GssKrb5Server.java b/jdk/src/share/classes/com/sun/security/sasl/gsskerb/GssKrb5Server.java
index d5b0a40668d..474f4303195 100644
--- a/jdk/src/share/classes/com/sun/security/sasl/gsskerb/GssKrb5Server.java
+++ b/jdk/src/share/classes/com/sun/security/sasl/gsskerb/GssKrb5Server.java
@@ -39,7 +39,7 @@ import org.ietf.jgss.*;
/**
* Implements the GSSAPI SASL server mechanism for Kerberos V5.
- * (RFC 2222,
+ * (RFC 2222,
* draft-ietf-cat-sasl-gssapi-00.txt).
*
* Expects thread's Subject to contain server's Kerberos credentials
diff --git a/jdk/src/share/classes/java/net/URI.java b/jdk/src/share/classes/java/net/URI.java
index ed8c27b12ea..c05b7b2abaa 100644
--- a/jdk/src/share/classes/java/net/URI.java
+++ b/jdk/src/share/classes/java/net/URI.java
@@ -457,7 +457,7 @@ import java.lang.NullPointerException; // for javadoc
* @author Mark Reinhold
* @since 1.4
*
- * @see RFC 2279: UTF-8, a
+ * @see RFC 2279: UTF-8, a
* transformation format of ISO 10646,
RFC 2373: IPv6 Addressing
* Architecture,
A charset is named mapping between sequences of sixteen-bit Unicode
characters and sequences of bytes, in the sense defined in RFC 2278. A
+href="http://www.ietf.org/rfc/rfc2278.txt">RFC 2278. A
decoder is an engine which transforms bytes in a specific charset into
characters, and an encoder is an engine which transforms characters into
bytes. Encoders and decoders operate on byte and character buffers. They are
diff --git a/jdk/src/share/classes/javax/management/remote/JMXServiceURL.java b/jdk/src/share/classes/javax/management/remote/JMXServiceURL.java
index 61297c85065..6e2c08a5030 100644
--- a/jdk/src/share/classes/javax/management/remote/JMXServiceURL.java
+++ b/jdk/src/share/classes/javax/management/remote/JMXServiceURL.java
@@ -107,10 +107,10 @@ import java.util.StringTokenizer;
* significant in the url-path
.
Service:
Schemes"
* @see RFC 3111,
+ * href="http://www.ietf.org/rfc/rfc3111.txt">RFC 3111,
* "Service Location Protocol Modifications for IPv6"
*
* @since 1.5
diff --git a/jdk/src/share/classes/javax/naming/ldap/LdapName.java b/jdk/src/share/classes/javax/naming/ldap/LdapName.java
index ecb61eded66..852f544f43c 100644
--- a/jdk/src/share/classes/javax/naming/ldap/LdapName.java
+++ b/jdk/src/share/classes/javax/naming/ldap/LdapName.java
@@ -42,7 +42,7 @@ import java.io.IOException;
/**
* This class represents a distinguished name as specified by
- * RFC 2253.
+ * RFC 2253.
* A distinguished name, or DN, is composed of an ordered list of
* components called relative distinguished names, or RDNs.
* Details of a DN's syntax are described in RFC 2253.
@@ -115,7 +115,7 @@ public class LdapName implements Name {
*
* @param name This is a non-null distinguished name formatted
* according to the rules defined in
- * RFC 2253.
+ * RFC 2253.
*
* @throws InvalidNameException if a syntax violation is detected.
* @see Rdn#escapeValue(Object value)
@@ -614,7 +614,7 @@ public class LdapName implements Name {
/**
* Returns a string representation of this LDAP name in a format
- * defined by RFC 2253
+ * defined by RFC 2253
* and described in the class description. If the name has zero
* components an empty string is returned.
*
diff --git a/jdk/src/share/classes/javax/naming/ldap/Rdn.java b/jdk/src/share/classes/javax/naming/ldap/Rdn.java
index 20227003578..a705fee6864 100644
--- a/jdk/src/share/classes/javax/naming/ldap/Rdn.java
+++ b/jdk/src/share/classes/javax/naming/ldap/Rdn.java
@@ -45,7 +45,7 @@ import java.io.IOException;
/**
* This class represents a relative distinguished name, or RDN, which is a
* component of a distinguished name as specified by
- * RFC 2253.
+ * RFC 2253.
* An example of an RDN is "OU=Sales+CN=J.Smith". In this example,
* the RDN consist of multiple attribute type/value pairs. The
* RDN is parsed as described in the class description for
@@ -117,7 +117,7 @@ public class Rdn implements Serializable, Comparable