summaryrefslogtreecommitdiffstats
path: root/pki/base/util/src/netscape/security/x509/X509Cert.java
diff options
context:
space:
mode:
authorAde Lee <alee@redhat.com>2012-01-11 13:01:06 -0500
committerAde Lee <alee@redhat.com>2012-01-11 13:49:51 -0500
commitf31ce3a1378071cc413bb01a65ae6e206f0ce4ff (patch)
treef327e4e0eb989037aba599f07a70905a84485963 /pki/base/util/src/netscape/security/x509/X509Cert.java
parent357d48b4f9897d09244f655d9b1836711947cc32 (diff)
downloadpki-f31ce3a1378071cc413bb01a65ae6e206f0ce4ff.tar.gz
pki-f31ce3a1378071cc413bb01a65ae6e206f0ce4ff.tar.xz
pki-f31ce3a1378071cc413bb01a65ae6e206f0ce4ff.zip
Formatting (line wrap > 120 in comments
Diffstat (limited to 'pki/base/util/src/netscape/security/x509/X509Cert.java')
-rw-r--r--pki/base/util/src/netscape/security/x509/X509Cert.java12
1 files changed, 9 insertions, 3 deletions
diff --git a/pki/base/util/src/netscape/security/x509/X509Cert.java b/pki/base/util/src/netscape/security/x509/X509Cert.java
index 4675741a9..b524f779b 100644
--- a/pki/base/util/src/netscape/security/x509/X509Cert.java
+++ b/pki/base/util/src/netscape/security/x509/X509Cert.java
@@ -133,10 +133,14 @@ public class X509Cert implements Certificate, Serializable {
* and are sometimes used as certificate requests.
*
* <P>
- * Until the certificate has been signed and encoded, some of the mandatory fields in the certificate will not be available via accessor functions: the serial number, issuer name and signing algorithm, and of course the signed certificate. The fields passed to this constructor are available, and must be non-null.
+ * Until the certificate has been signed and encoded, some of the mandatory fields in the certificate will not be
+ * available via accessor functions: the serial number, issuer name and signing algorithm, and of course the signed
+ * certificate. The fields passed to this constructor are available, and must be non-null.
*
* <P>
- * Note that the public key being signed is generally independent of the signature algorithm being used. So for example Diffie-Hellman keys (which do not support signatures) can be placed in X.509 certificates when some other signature algorithm (e.g. DSS/DSA, or one of the RSA based algorithms) is used.
+ * Note that the public key being signed is generally independent of the signature algorithm being used. So for
+ * example Diffie-Hellman keys (which do not support signatures) can be placed in X.509 certificates when some other
+ * signature algorithm (e.g. DSS/DSA, or one of the RSA based algorithms) is used.
*
* @see CertAndKeyGen
*
@@ -511,7 +515,9 @@ public class X509Cert implements Certificate, Serializable {
* chose not to place in the certificate.
*
* <P>
- * Two such public key algorithms are: DSS/DSA, where algorithm parameters could be acquired from a CA certificate in the chain of issuers; and Diffie-Hellman, with a similar solution although the CA then needs both a Diffie-Hellman certificate and a signature capable certificate.
+ * Two such public key algorithms are: DSS/DSA, where algorithm parameters could be acquired from a CA certificate
+ * in the chain of issuers; and Diffie-Hellman, with a similar solution although the CA then needs both a
+ * Diffie-Hellman certificate and a signature capable certificate.
*/
public PublicKey getPublicKey() {
return pubkey;