Skip to content

Commit 6677554

Browse files
turbanoffRoger Riggs
authored and
Roger Riggs
committedNov 19, 2021
8274949: Use String.contains() instead of String.indexOf() in java.base
Reviewed-by: weijun, dfuchs, vtewari, lancea
1 parent 09e8c8c commit 6677554

File tree

17 files changed

+35
-38
lines changed

17 files changed

+35
-38
lines changed
 

‎src/java.base/share/classes/java/net/HttpCookie.java

+3-3
Original file line numberDiff line numberDiff line change
@@ -1078,13 +1078,13 @@ private static int guessCookieVersion(String header) {
10781078
int version = 0;
10791079

10801080
header = header.toLowerCase();
1081-
if (header.indexOf("expires=") != -1) {
1081+
if (header.contains("expires=")) {
10821082
// only netscape cookie using 'expires'
10831083
version = 0;
1084-
} else if (header.indexOf("version=") != -1) {
1084+
} else if (header.contains("version=")) {
10851085
// version is mandatory for rfc 2965/2109 cookie
10861086
version = 1;
1087-
} else if (header.indexOf("max-age") != -1) {
1087+
} else if (header.contains("max-age")) {
10881088
// rfc 2965/2109 use 'max-age'
10891089
version = 1;
10901090
} else if (startsWithIgnoreCase(header, SET_COOKIE2)) {

‎src/java.base/share/classes/java/net/HttpURLConnection.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -600,7 +600,7 @@ public String getResponseMessage() throws IOException {
600600
public long getHeaderFieldDate(String name, long Default) {
601601
String dateString = getHeaderField(name);
602602
try {
603-
if (dateString.indexOf("GMT") == -1) {
603+
if (!dateString.contains("GMT")) {
604604
dateString = dateString+" GMT";
605605
}
606606
return Date.parse(dateString);

‎src/java.base/share/classes/java/net/SocketPermission.java

+1-3
Original file line numberDiff line numberDiff line change
@@ -30,12 +30,10 @@
3030
import java.io.ObjectOutputStream;
3131
import java.io.ObjectStreamField;
3232
import java.io.Serializable;
33-
import java.net.InetAddress;
3433
import java.security.AccessController;
3534
import java.security.Permission;
3635
import java.security.PermissionCollection;
3736
import java.security.PrivilegedAction;
38-
import java.security.Security;
3937
import java.util.Collections;
4038
import java.util.Enumeration;
4139
import java.util.Map;
@@ -333,7 +331,7 @@ private static String getHost(String host) {
333331
ind = host.lastIndexOf(':');
334332
host = "[" + host.substring(0, ind) + "]" +
335333
host.substring(ind);
336-
} else if (tokens == 8 && host.indexOf("::") == -1) {
334+
} else if (tokens == 8 && !host.contains("::")) {
337335
// IPv6 address only, not followed by port
338336
host = "[" + host + "]";
339337
} else {

‎src/java.base/share/classes/jdk/internal/jrtfs/JrtPath.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 2015, 2017, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 2015, 2021, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -485,7 +485,7 @@ private static String normalize(String path, int off) {
485485
// Remove DotSlash(./) and resolve DotDot (..) components
486486
private String getResolved() {
487487
int length = path.length();
488-
if (length == 0 || (path.indexOf("./") == -1 && path.charAt(length - 1) != '.')) {
488+
if (length == 0 || (!path.contains("./") && path.charAt(length - 1) != '.')) {
489489
return path;
490490
} else {
491491
return resolvePath();

‎src/java.base/share/classes/jdk/internal/loader/URLClassPath.java

+3-3
Original file line numberDiff line numberDiff line change
@@ -561,11 +561,11 @@ public static void check(URL url) throws IOException {
561561
// fallback to checkRead/checkConnect for pre 1.2
562562
// security managers
563563
if ((perm instanceof java.io.FilePermission) &&
564-
perm.getActions().indexOf("read") != -1) {
564+
perm.getActions().contains("read")) {
565565
security.checkRead(perm.getName());
566566
} else if ((perm instanceof
567567
java.net.SocketPermission) &&
568-
perm.getActions().indexOf("connect") != -1) {
568+
perm.getActions().contains("connect")) {
569569
URL locUrl = url;
570570
if (urlConnection instanceof JarURLConnection) {
571571
locUrl = ((JarURLConnection)urlConnection).getJarFileURL();
@@ -1254,7 +1254,7 @@ Resource getResource(final String name, boolean check) {
12541254
URLClassPath.check(url);
12551255

12561256
final File file;
1257-
if (name.indexOf("..") != -1) {
1257+
if (name.contains("..")) {
12581258
file = (new File(dir, name.replace('/', File.separatorChar)))
12591259
.getCanonicalFile();
12601260
if ( !((file.getPath()).startsWith(dir.getPath())) ) {

‎src/java.base/share/classes/sun/net/www/http/HttpCapture.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@ public static HttpCapture getCapture(java.net.URL url) {
157157
if (p.matcher(s).find()) {
158158
String f = capFiles.get(i);
159159
File fi;
160-
if (f.indexOf("%d") >= 0) {
160+
if (f.contains("%d")) {
161161
java.util.Random rand = new java.util.Random();
162162
do {
163163
String f2 = f.replace("%d", Integer.toString(rand.nextInt()));

‎src/java.base/share/classes/sun/net/www/protocol/https/HttpsClient.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -645,7 +645,7 @@ private void checkURLSpoofing(HostnameVerifier hostnameVerifier)
645645
// ignore
646646
}
647647

648-
if ((cipher != null) && (cipher.indexOf("_anon_") != -1)) {
648+
if ((cipher != null) && (cipher.contains("_anon_"))) {
649649
return;
650650
} else if ((hostnameVerifier != null) &&
651651
(hostnameVerifier.verify(host, session))) {

‎src/java.base/share/classes/sun/security/provider/PolicyFile.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -723,7 +723,7 @@ private void addGrantEntry(PolicyParser.GrantEntry ge,
723723
+ SELF;
724724
}
725725
// check for self
726-
if (pe.name != null && pe.name.indexOf(SELF) != -1) {
726+
if (pe.name != null && pe.name.contains(SELF)) {
727727
// Create a "SelfPermission" , it could be an
728728
// an unresolved permission which will be resolved
729729
// when implies is called

‎src/java.base/share/classes/sun/security/rsa/RSAPSSSignature.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ public class RSAPSSSignature extends SignatureSpi {
5959
private boolean isDigestEqual(String stdAlg, String givenAlg) {
6060
if (stdAlg == null || givenAlg == null) return false;
6161

62-
if (givenAlg.indexOf("-") != -1) {
62+
if (givenAlg.contains("-")) {
6363
return stdAlg.equalsIgnoreCase(givenAlg);
6464
} else {
6565
if (stdAlg.equals("SHA-1")) {

‎src/java.base/share/classes/sun/security/rsa/RSAUtil.java

+4-5
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 2018, 2020, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 2018, 2021, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -25,7 +25,6 @@
2525

2626
package sun.security.rsa;
2727

28-
import java.io.IOException;
2928
import java.security.*;
3029
import java.security.spec.*;
3130
import sun.security.util.ObjectIdentifier;
@@ -61,9 +60,9 @@ public static KeyType lookup(String name) throws ProviderException {
6160

6261
// match loosely in order to work with 3rd party providers which
6362
// may not follow the standard names
64-
if (name.indexOf("PSS") != -1) {
63+
if (name.contains("PSS")) {
6564
return PSS;
66-
} else if (name.indexOf("RSA") != -1) {
65+
} else if (name.contains("RSA")) {
6766
return RSA;
6867
} else { // no match
6968
throw new ProviderException("Unsupported algorithm " + name);
@@ -151,7 +150,7 @@ public static Object[] getTypeAndParamSpec(AlgorithmId algid)
151150
} catch (ProviderException pe) {
152151
// accommodate RSA keys encoded with various RSA signature oids
153152
// for backward compatibility
154-
if (algName.indexOf("RSA") != -1) {
153+
if (algName.contains("RSA")) {
155154
result[0] = KeyType.RSA;
156155
} else {
157156
// pass it up

‎src/java.base/share/classes/sun/security/tools/keytool/Main.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -1473,10 +1473,10 @@ private void doGenCert(String alias, String sigAlgName, InputStream in, PrintStr
14731473
if (s == null) break;
14741474
// OpenSSL does not use NEW
14751475
//if (s.startsWith("-----BEGIN NEW CERTIFICATE REQUEST-----")) {
1476-
if (s.startsWith("-----BEGIN") && s.indexOf("REQUEST") >= 0) {
1476+
if (s.startsWith("-----BEGIN") && s.contains("REQUEST")) {
14771477
canRead = true;
14781478
//} else if (s.startsWith("-----END NEW CERTIFICATE REQUEST-----")) {
1479-
} else if (s.startsWith("-----END") && s.indexOf("REQUEST") >= 0) {
1479+
} else if (s.startsWith("-----END") && s.contains("REQUEST")) {
14801480
break;
14811481
} else if (canRead) {
14821482
sb.append(s);

‎src/java.base/share/classes/sun/security/util/Debug.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -161,10 +161,10 @@ public static boolean isOn(String option)
161161
if (args == null)
162162
return false;
163163
else {
164-
if (args.indexOf("all") != -1)
164+
if (args.contains("all"))
165165
return true;
166166
else
167-
return (args.indexOf(option) != -1);
167+
return (args.contains(option));
168168
}
169169
}
170170

‎src/java.base/share/classes/sun/security/util/SignatureUtil.java

+6-6
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ public class SignatureUtil {
5454
* form of an OID, or the OID value if no match is found.
5555
*/
5656
private static String checkName(String algName) {
57-
if (algName.indexOf(".") == -1) {
57+
if (!algName.contains(".")) {
5858
return algName;
5959
} else {
6060
// convert oid to String
@@ -100,7 +100,7 @@ public static AlgorithmParameterSpec getParamSpec(String sigName,
100100
// AlgorithmParameters.getAlgorithm() may returns oid if it's
101101
// created during DER decoding. Convert to use the standard name
102102
// before passing it to RSAUtil
103-
if (params.getAlgorithm().indexOf(".") != -1) {
103+
if (params.getAlgorithm().contains(".")) {
104104
try {
105105
params = createAlgorithmParameters(sigName,
106106
params.getEncoded());
@@ -109,9 +109,9 @@ public static AlgorithmParameterSpec getParamSpec(String sigName,
109109
}
110110
}
111111

112-
if (sigName.indexOf("RSA") != -1) {
112+
if (sigName.contains("RSA")) {
113113
paramSpec = RSAUtil.getParamSpec(params);
114-
} else if (sigName.indexOf("ECDSA") != -1) {
114+
} else if (sigName.contains("ECDSA")) {
115115
try {
116116
paramSpec = params.getParameterSpec(ECParameterSpec.class);
117117
} catch (Exception e) {
@@ -141,11 +141,11 @@ public static AlgorithmParameterSpec getParamSpec(String sigName,
141141

142142
if (paramBytes != null) {
143143
sigName = checkName(sigName).toUpperCase(Locale.ENGLISH);
144-
if (sigName.indexOf("RSA") != -1) {
144+
if (sigName.contains("RSA")) {
145145
AlgorithmParameters params =
146146
createAlgorithmParameters(sigName, paramBytes);
147147
paramSpec = RSAUtil.getParamSpec(params);
148-
} else if (sigName.indexOf("ECDSA") != -1) {
148+
} else if (sigName.contains("ECDSA")) {
149149
try {
150150
Provider p = Signature.getInstance(sigName).getProvider();
151151
paramSpec = ECUtil.getECParameterSpec(p, paramBytes);

‎src/java.base/share/classes/sun/security/x509/AlgorithmId.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -520,7 +520,7 @@ private static ObjectIdentifier algOID(String name) throws IOException {
520520
}
521521

522522
// unknown algorithm oids
523-
if (name.indexOf(".") == -1) {
523+
if (!name.contains(".")) {
524524
// see if there is a matching oid string alias mapping from
525525
// 3rd party providers
526526
name = name.toUpperCase(Locale.ENGLISH);

‎src/java.base/share/classes/sun/util/locale/LocaleMatcher.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright (c) 2012, 2017, Oracle and/or its affiliates. All rights reserved.
2+
* Copyright (c) 2012, 2021, Oracle and/or its affiliates. All rights reserved.
33
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
44
*
55
* This code is free software; you can redistribute it and/or modify it
@@ -83,7 +83,7 @@ public static List<String> filterTags(List<LanguageRange> priorityList,
8383
for (LanguageRange lr : priorityList) {
8484
String range = lr.getRange();
8585
if (range.startsWith("*-")
86-
|| range.indexOf("-*") != -1) { // Extended range
86+
|| range.contains("-*")) { // Extended range
8787
if (mode == AUTOSELECT_FILTERING) {
8888
return filterExtended(priorityList, tags);
8989
} else if (mode == MAP_EXTENDED_RANGES) {

‎src/java.base/unix/classes/sun/net/www/protocol/jar/JarFileFactory.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -203,11 +203,11 @@ private JarFile getCachedJarFile(URL url) {
203203
// fallback to checkRead/checkConnect for pre 1.2
204204
// security managers
205205
if ((perm instanceof java.io.FilePermission) &&
206-
perm.getActions().indexOf("read") != -1) {
206+
perm.getActions().contains("read")) {
207207
sm.checkRead(perm.getName());
208208
} else if ((perm instanceof
209209
java.net.SocketPermission) &&
210-
perm.getActions().indexOf("connect") != -1) {
210+
perm.getActions().contains("connect")) {
211211
sm.checkConnect(url.getHost(), url.getPort());
212212
} else {
213213
throw se;

‎src/java.base/windows/classes/sun/net/www/protocol/jar/JarFileFactory.java

+2-2
Original file line numberDiff line numberDiff line change
@@ -226,11 +226,11 @@ private JarFile getCachedJarFile(URL url) {
226226
// fallback to checkRead/checkConnect for pre 1.2
227227
// security managers
228228
if ((perm instanceof java.io.FilePermission) &&
229-
perm.getActions().indexOf("read") != -1) {
229+
perm.getActions().contains("read")) {
230230
sm.checkRead(perm.getName());
231231
} else if ((perm instanceof
232232
java.net.SocketPermission) &&
233-
perm.getActions().indexOf("connect") != -1) {
233+
perm.getActions().contains("connect")) {
234234
sm.checkConnect(url.getHost(), url.getPort());
235235
} else {
236236
throw se;

0 commit comments

Comments
 (0)
Please sign in to comment.