8279043: Some Security Exception Messages Miss Spaces

Reviewed-by: weijun
This commit is contained in:
Daniel Jelinski 2021-12-21 18:24:31 +00:00 committed by Weijun Wang
parent f7309060de
commit f31dead6c5
16 changed files with 21 additions and 21 deletions

View file

@ -1304,7 +1304,7 @@ abstract class GaloisCounterMode extends CipherSpi {
// 'len' includes ibuffer data
checkDataLength(len, tagLenBytes);
if (dst.remaining() < len + tagLenBytes) {
throw new ShortBufferException("Output buffer too small, must" +
throw new ShortBufferException("Output buffer too small, must " +
"be at least " + (len + tagLenBytes) + " bytes long");
}
@ -1472,7 +1472,7 @@ abstract class GaloisCounterMode extends CipherSpi {
}
if (len - tagLenBytes > out.length - outOfs) {
throw new ShortBufferException("Output buffer too small, must" +
throw new ShortBufferException("Output buffer too small, must " +
"be at least " + (len - tagLenBytes) + " bytes long");
}

View file

@ -213,7 +213,7 @@ public final class TlsKeyMaterialGenerator extends KeyGeneratorSpi {
if (protocolVersion >= 0x0302) {
// TLS 1.1+
throw new RuntimeException(
"Internal Error: TLS 1.1+ should not be negotiating" +
"Internal Error: TLS 1.1+ should not be negotiating " +
"exportable ciphersuites");
} else if (protocolVersion == 0x0301) {
// TLS 1.0

View file

@ -340,7 +340,7 @@ public class Cipher {
"format:" + transformation);
}
if ((parts[0] == null) || (parts[0].isEmpty())) {
throw new NoSuchAlgorithmException("Invalid transformation:" +
throw new NoSuchAlgorithmException("Invalid transformation: " +
"algorithm not specified-"
+ transformation);
}

View file

@ -481,12 +481,12 @@ public class PKCS9Attribute implements DerEncoder {
"attribute not supported.");
// break unnecessary
case 10: // issuerAndserialNumber attribute -- not supported
throw new IOException("PKCS9 IssuerAndSerialNumber" +
throw new IOException("PKCS9 IssuerAndSerialNumber " +
"attribute not supported.");
// break unnecessary
case 11: // RSA DSI proprietary
case 12: // RSA DSI proprietary
throw new IOException("PKCS9 RSA DSI attributes" +
throw new IOException("PKCS9 RSA DSI attributes " +
"11 and 12, not supported.");
// break unnecessary
case 13: // S/MIME unused attribute
@ -604,12 +604,12 @@ public class PKCS9Attribute implements DerEncoder {
"attribute not supported.");
// break unnecessary
case 10: // issuerAndserialNumber attribute -- not supported
throw new IOException("PKCS9 IssuerAndSerialNumber" +
throw new IOException("PKCS9 IssuerAndSerialNumber " +
"attribute not supported.");
// break unnecessary
case 11: // RSA DSI proprietary
case 12: // RSA DSI proprietary
throw new IOException("PKCS9 RSA DSI attributes" +
throw new IOException("PKCS9 RSA DSI attributes " +
"11 and 12, not supported.");
// break unnecessary
case 13: // S/MIME unused attribute

View file

@ -635,7 +635,7 @@ public final class PKCS12KeyStore extends KeyStoreSpi {
}
}
} else {
throw new KeyStoreException("Private key is not encoded" +
throw new KeyStoreException("Private key is not encoded " +
"as PKCS#8");
}

View file

@ -270,7 +270,7 @@ public final class RSAPadding {
*/
public byte[] unpad(byte[] padded) throws BadPaddingException {
if (padded.length != paddedSize) {
throw new BadPaddingException("Decryption error." +
throw new BadPaddingException("Decryption error. " +
"The padded array length (" + padded.length +
") is not the specified padded size (" + paddedSize + ")");
}

View file

@ -211,7 +211,7 @@ final class CertificateAuthoritiesExtension {
if (encodedCAs.isEmpty()) {
if (SSLLogger.isOn && SSLLogger.isOn("ssl,handshake")) {
SSLLogger.warning(
"The number of CAs exceeds the maximum size" +
"The number of CAs exceeds the maximum size " +
"of the certificate_authorities extension");
}

View file

@ -451,7 +451,7 @@ public class DisabledAlgorithmConstraints extends AbstractAlgorithmConstraints {
for (Constraint constraint : list) {
if (!constraint.permits(key)) {
if (debug != null) {
debug.println("Constraints: failed key size" +
debug.println("Constraints: failed key size " +
"constraint check " + KeyUtil.getKeySize(key));
}
return false;

View file

@ -154,7 +154,7 @@ implements CertAttrSet<String> {
if (next.isContextSpecific(TAG_REQUIRE) && !next.isConstructed()) {
if (this.require != -1)
throw new IOException("Duplicate requireExplicitPolicy" +
throw new IOException("Duplicate requireExplicitPolicy " +
"found in the PolicyConstraintsExtension");
next.resetTag(DerValue.tag_Integer);
this.require = next.getInteger();
@ -162,7 +162,7 @@ implements CertAttrSet<String> {
} else if (next.isContextSpecific(TAG_INHIBIT) &&
!next.isConstructed()) {
if (this.inhibit != -1)
throw new IOException("Duplicate inhibitPolicyMapping" +
throw new IOException("Duplicate inhibitPolicyMapping " +
"found in the PolicyConstraintsExtension");
next.resetTag(DerValue.tag_Integer);
this.inhibit = next.getInteger();

View file

@ -202,7 +202,7 @@ public class PolicyInformation {
if (obj instanceof Set) {
for (Object obj1 : (Set<?>) obj) {
if (!(obj1 instanceof PolicyQualifierInfo)) {
throw new IOException("Attribute value must be a" +
throw new IOException("Attribute value must be a " +
"Set of PolicyQualifierInfo objects.");
}
}