# HG changeset patch
# User martin
# Date 1239592903 25200
# Node ID af4853bc7e878bfb34a1be56c91bf91d61c0f24c
# Parent ec64fd74aa6999b8b6cbe2209a1d911536f93ea7
6827153: Miscellaneous typos in javadoc
Reviewed-by: alanb
diff -r ec64fd74aa69 -r af4853bc7e87 jdk/src/share/classes/java/lang/NoSuchFieldError.java
--- a/jdk/src/share/classes/java/lang/NoSuchFieldError.java Fri Apr 10 11:21:31 2009 +0800
+++ b/jdk/src/share/classes/java/lang/NoSuchFieldError.java Sun Apr 12 20:21:43 2009 -0700
@@ -41,14 +41,14 @@
private static final long serialVersionUID = -3456430195886129035L;
/**
- * Constructs a NoSuchFieldException
with no detail message.
+ * Constructs a NoSuchFieldError
with no detail message.
*/
public NoSuchFieldError() {
super();
}
/**
- * Constructs a NoSuchFieldException
with the specified
+ * Constructs a NoSuchFieldError
with the specified
* detail message.
*
* @param s the detail message.
diff -r ec64fd74aa69 -r af4853bc7e87 jdk/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java
--- a/jdk/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java Fri Apr 10 11:21:31 2009 +0800
+++ b/jdk/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java Sun Apr 12 20:21:43 2009 -0700
@@ -443,7 +443,7 @@
* at least care must be taken to ensure that the buffer is not accessed
* while the channel remains open.
*
- *
If there is a security manager installed and the the channel is not + *
If there is a security manager installed and the channel is not
* connected then this method verifies that the target address and port number
* are permitted by the security manager's {@link SecurityManager#checkConnect
* checkConnect} method. The overhead of this security check can be avoided
diff -r ec64fd74aa69 -r af4853bc7e87 jdk/src/share/classes/java/nio/file/Path.java
--- a/jdk/src/share/classes/java/nio/file/Path.java Fri Apr 10 11:21:31 2009 +0800
+++ b/jdk/src/share/classes/java/nio/file/Path.java Sun Apr 12 20:21:43 2009 -0700
@@ -494,7 +494,7 @@
* @throws IOException
* if an I/O error occurs
* @throws SecurityException
- * In the case of the the default provider, and a security manager
+ * In the case of the default provider, and a security manager
* is installed, it denies {@link LinkPermission}("symbolic")
* or its {@link SecurityManager#checkWrite(String) checkWrite}
* method denies write access to the path of the symbolic link.
@@ -531,7 +531,7 @@
* @throws IOException
* if an I/O error occurs
* @throws SecurityException
- * In the case of the the default provider, and a security manager
+ * In the case of the default provider, and a security manager
* is installed, it denies {@link LinkPermission}("hard")
* or its {@link SecurityManager#checkWrite(String) checkWrite}
* method denies write access to both this path and the path of the
@@ -560,7 +560,7 @@
* @throws IOException
* if an I/O error occurs
* @throws SecurityException
- * In the case of the the default provider, and a security manager
+ * In the case of the default provider, and a security manager
* is installed, it checks that {@code FilePermission} has been
* granted with the "{@code readlink}" action to read the link.
*/
@@ -615,7 +615,7 @@
* obtained
*
* @throws SecurityException
- * In the case of the the default provider, and a security manager
+ * In the case of the default provider, and a security manager
* is installed, the {@link #toAbsolutePath toAbsolutePath} method
* throws a security exception.
*/
@@ -636,7 +636,7 @@
* @throws IOError
* if an I/O error occurs
* @throws SecurityException
- * In the case of the the default provider, and a security manager
+ * In the case of the default provider, and a security manager
* is installed, its {@link SecurityManager#checkPropertyAccess(String)
* checkPropertyAccess} method is invoked to check access to the
* system property {@code user.dir}
@@ -677,7 +677,7 @@
* @throws IOException
* if the file does not exist or an I/O error occurs
* @throws SecurityException
- * In the case of the the default provider, and a security manager
+ * In the case of the default provider, and a security manager
* is installed, its {@link SecurityManager#checkRead(String) checkRead}
* method is invoked to check read access to the file, and where
* this path is not absolute, its {@link SecurityManager#checkPropertyAccess(String)
diff -r ec64fd74aa69 -r af4853bc7e87 jdk/src/share/classes/java/nio/file/SecureDirectoryStream.java
--- a/jdk/src/share/classes/java/nio/file/SecureDirectoryStream.java Fri Apr 10 11:21:31 2009 +0800
+++ b/jdk/src/share/classes/java/nio/file/SecureDirectoryStream.java Sun Apr 12 20:21:43 2009 -0700
@@ -208,7 +208,7 @@
* @throws ClosedDirectoryStreamException
* if the directory stream is closed
* @throws NoSuchFileException
- * if the the directory does not exist (optional specific exception)
+ * if the directory does not exist (optional specific exception)
* @throws DirectoryNotEmptyException
* if the directory could not otherwise be deleted because it is
* not empty (optional specific exception)
diff -r ec64fd74aa69 -r af4853bc7e87 jdk/src/share/classes/java/security/AccessController.java
--- a/jdk/src/share/classes/java/security/AccessController.java Fri Apr 10 11:21:31 2009 +0800
+++ b/jdk/src/share/classes/java/security/AccessController.java Sun Apr 12 20:21:43 2009 -0700
@@ -425,7 +425,7 @@
* Performs the specified PrivilegedExceptionAction
with
* privileges enabled and restricted by the specified
* AccessControlContext
. The action is performed with the
- * intersection of the the permissions possessed by the caller's
+ * intersection of the permissions possessed by the caller's
* protection domain, and those possessed by the domains represented by the
* specified AccessControlContext
.
*
diff -r ec64fd74aa69 -r af4853bc7e87 jdk/src/share/classes/java/security/AlgorithmParametersSpi.java
--- a/jdk/src/share/classes/java/security/AlgorithmParametersSpi.java Fri Apr 10 11:21:31 2009 +0800
+++ b/jdk/src/share/classes/java/security/AlgorithmParametersSpi.java Sun Apr 12 20:21:43 2009 -0700
@@ -102,7 +102,7 @@
* parameters should be returned in an instance of the
* DSAParameterSpec
class.
*
- * @param paramSpec the the specification class in which
+ * @param paramSpec the specification class in which
* the parameters should be returned.
*
* @return the parameter specification.
diff -r ec64fd74aa69 -r af4853bc7e87 jdk/src/share/classes/java/security/PrivilegedActionException.java
--- a/jdk/src/share/classes/java/security/PrivilegedActionException.java Fri Apr 10 11:21:31 2009 +0800
+++ b/jdk/src/share/classes/java/security/PrivilegedActionException.java Sun Apr 12 20:21:43 2009 -0700
@@ -87,7 +87,7 @@
}
/**
- * Returns the the cause of this exception (the exception thrown by
+ * Returns the cause of this exception (the exception thrown by
* the privileged computation that resulted in this
* PrivilegedActionException
).
*
diff -r ec64fd74aa69 -r af4853bc7e87 jdk/src/share/classes/java/security/Security.java
--- a/jdk/src/share/classes/java/security/Security.java Fri Apr 10 11:21:31 2009 +0800
+++ b/jdk/src/share/classes/java/security/Security.java Sun Apr 12 20:21:43 2009 -0700
@@ -501,7 +501,7 @@
*
The cryptographic service name must not contain any dots. There - * must be one or more space charaters between the the + * must be one or more space charaters between the * <algorithm_or_type> and the <attribute_name>. *
A provider satisfies this selection criterion iff the * provider implements the specified algorithm or type for the specified diff -r ec64fd74aa69 -r af4853bc7e87 jdk/src/share/classes/java/security/SecurityPermission.java --- a/jdk/src/share/classes/java/security/SecurityPermission.java Fri Apr 10 11:21:31 2009 +0800 +++ b/jdk/src/share/classes/java/security/SecurityPermission.java Sun Apr 12 20:21:43 2009 -0700 @@ -118,7 +118,7 @@ *