# HG changeset patch # User martin # Date 1239592903 25200 # Node ID af4853bc7e878bfb34a1be56c91bf91d61c0f24c # Parent ec64fd74aa6999b8b6cbe2209a1d911536f93ea7 6827153: Miscellaneous typos in javadoc Reviewed-by: alanb diff -r ec64fd74aa69 -r af4853bc7e87 jdk/src/share/classes/java/lang/NoSuchFieldError.java --- a/jdk/src/share/classes/java/lang/NoSuchFieldError.java Fri Apr 10 11:21:31 2009 +0800 +++ b/jdk/src/share/classes/java/lang/NoSuchFieldError.java Sun Apr 12 20:21:43 2009 -0700 @@ -41,14 +41,14 @@ private static final long serialVersionUID = -3456430195886129035L; /** - * Constructs a NoSuchFieldException with no detail message. + * Constructs a NoSuchFieldError with no detail message. */ public NoSuchFieldError() { super(); } /** - * Constructs a NoSuchFieldException with the specified + * Constructs a NoSuchFieldError with the specified * detail message. * * @param s the detail message. diff -r ec64fd74aa69 -r af4853bc7e87 jdk/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java --- a/jdk/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java Fri Apr 10 11:21:31 2009 +0800 +++ b/jdk/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java Sun Apr 12 20:21:43 2009 -0700 @@ -443,7 +443,7 @@ * at least care must be taken to ensure that the buffer is not accessed * while the channel remains open. * - *

If there is a security manager installed and the the channel is not + *

If there is a security manager installed and the channel is not * connected then this method verifies that the target address and port number * are permitted by the security manager's {@link SecurityManager#checkConnect * checkConnect} method. The overhead of this security check can be avoided diff -r ec64fd74aa69 -r af4853bc7e87 jdk/src/share/classes/java/nio/file/Path.java --- a/jdk/src/share/classes/java/nio/file/Path.java Fri Apr 10 11:21:31 2009 +0800 +++ b/jdk/src/share/classes/java/nio/file/Path.java Sun Apr 12 20:21:43 2009 -0700 @@ -494,7 +494,7 @@ * @throws IOException * if an I/O error occurs * @throws SecurityException - * In the case of the the default provider, and a security manager + * In the case of the default provider, and a security manager * is installed, it denies {@link LinkPermission}("symbolic") * or its {@link SecurityManager#checkWrite(String) checkWrite} * method denies write access to the path of the symbolic link. @@ -531,7 +531,7 @@ * @throws IOException * if an I/O error occurs * @throws SecurityException - * In the case of the the default provider, and a security manager + * In the case of the default provider, and a security manager * is installed, it denies {@link LinkPermission}("hard") * or its {@link SecurityManager#checkWrite(String) checkWrite} * method denies write access to both this path and the path of the @@ -560,7 +560,7 @@ * @throws IOException * if an I/O error occurs * @throws SecurityException - * In the case of the the default provider, and a security manager + * In the case of the default provider, and a security manager * is installed, it checks that {@code FilePermission} has been * granted with the "{@code readlink}" action to read the link. */ @@ -615,7 +615,7 @@ * obtained * * @throws SecurityException - * In the case of the the default provider, and a security manager + * In the case of the default provider, and a security manager * is installed, the {@link #toAbsolutePath toAbsolutePath} method * throws a security exception. */ @@ -636,7 +636,7 @@ * @throws IOError * if an I/O error occurs * @throws SecurityException - * In the case of the the default provider, and a security manager + * In the case of the default provider, and a security manager * is installed, its {@link SecurityManager#checkPropertyAccess(String) * checkPropertyAccess} method is invoked to check access to the * system property {@code user.dir} @@ -677,7 +677,7 @@ * @throws IOException * if the file does not exist or an I/O error occurs * @throws SecurityException - * In the case of the the default provider, and a security manager + * In the case of the default provider, and a security manager * is installed, its {@link SecurityManager#checkRead(String) checkRead} * method is invoked to check read access to the file, and where * this path is not absolute, its {@link SecurityManager#checkPropertyAccess(String) diff -r ec64fd74aa69 -r af4853bc7e87 jdk/src/share/classes/java/nio/file/SecureDirectoryStream.java --- a/jdk/src/share/classes/java/nio/file/SecureDirectoryStream.java Fri Apr 10 11:21:31 2009 +0800 +++ b/jdk/src/share/classes/java/nio/file/SecureDirectoryStream.java Sun Apr 12 20:21:43 2009 -0700 @@ -208,7 +208,7 @@ * @throws ClosedDirectoryStreamException * if the directory stream is closed * @throws NoSuchFileException - * if the the directory does not exist (optional specific exception) + * if the directory does not exist (optional specific exception) * @throws DirectoryNotEmptyException * if the directory could not otherwise be deleted because it is * not empty (optional specific exception) diff -r ec64fd74aa69 -r af4853bc7e87 jdk/src/share/classes/java/security/AccessController.java --- a/jdk/src/share/classes/java/security/AccessController.java Fri Apr 10 11:21:31 2009 +0800 +++ b/jdk/src/share/classes/java/security/AccessController.java Sun Apr 12 20:21:43 2009 -0700 @@ -425,7 +425,7 @@ * Performs the specified PrivilegedExceptionAction with * privileges enabled and restricted by the specified * AccessControlContext. The action is performed with the - * intersection of the the permissions possessed by the caller's + * intersection of the permissions possessed by the caller's * protection domain, and those possessed by the domains represented by the * specified AccessControlContext. *

diff -r ec64fd74aa69 -r af4853bc7e87 jdk/src/share/classes/java/security/AlgorithmParametersSpi.java --- a/jdk/src/share/classes/java/security/AlgorithmParametersSpi.java Fri Apr 10 11:21:31 2009 +0800 +++ b/jdk/src/share/classes/java/security/AlgorithmParametersSpi.java Sun Apr 12 20:21:43 2009 -0700 @@ -102,7 +102,7 @@ * parameters should be returned in an instance of the * DSAParameterSpec class. * - * @param paramSpec the the specification class in which + * @param paramSpec the specification class in which * the parameters should be returned. * * @return the parameter specification. diff -r ec64fd74aa69 -r af4853bc7e87 jdk/src/share/classes/java/security/PrivilegedActionException.java --- a/jdk/src/share/classes/java/security/PrivilegedActionException.java Fri Apr 10 11:21:31 2009 +0800 +++ b/jdk/src/share/classes/java/security/PrivilegedActionException.java Sun Apr 12 20:21:43 2009 -0700 @@ -87,7 +87,7 @@ } /** - * Returns the the cause of this exception (the exception thrown by + * Returns the cause of this exception (the exception thrown by * the privileged computation that resulted in this * PrivilegedActionException). * diff -r ec64fd74aa69 -r af4853bc7e87 jdk/src/share/classes/java/security/Security.java --- a/jdk/src/share/classes/java/security/Security.java Fri Apr 10 11:21:31 2009 +0800 +++ b/jdk/src/share/classes/java/security/Security.java Sun Apr 12 20:21:43 2009 -0700 @@ -501,7 +501,7 @@ *

  • <crypto_service>.<algorithm_or_type> * <attribute_name>:< attribute_value> *

    The cryptographic service name must not contain any dots. There - * must be one or more space charaters between the the + * must be one or more space charaters between the * <algorithm_or_type> and the <attribute_name>. *

    A provider satisfies this selection criterion iff the * provider implements the specified algorithm or type for the specified diff -r ec64fd74aa69 -r af4853bc7e87 jdk/src/share/classes/java/security/SecurityPermission.java --- a/jdk/src/share/classes/java/security/SecurityPermission.java Fri Apr 10 11:21:31 2009 +0800 +++ b/jdk/src/share/classes/java/security/SecurityPermission.java Sun Apr 12 20:21:43 2009 -0700 @@ -118,7 +118,7 @@ * setProperty.{key} * Setting of the security property with the specified key * This could include setting a security provider or defining - * the location of the the system-wide security policy. Malicious + * the location of the system-wide security policy. Malicious * code that has permission to set a new security provider may * set a rogue provider that steals confidential information such * as cryptographic private keys. In addition, malicious code with diff -r ec64fd74aa69 -r af4853bc7e87 jdk/src/share/classes/java/security/SignatureSpi.java --- a/jdk/src/share/classes/java/security/SignatureSpi.java Fri Apr 10 11:21:31 2009 +0800 +++ b/jdk/src/share/classes/java/security/SignatureSpi.java Sun Apr 12 20:21:43 2009 -0700 @@ -316,7 +316,7 @@ * overridden by a provider * * @exception InvalidAlgorithmParameterException if this method is - * overridden by a provider and the the given parameters + * overridden by a provider and the given parameters * are inappropriate for this signature engine */ protected void engineSetParameter(AlgorithmParameterSpec params) diff -r ec64fd74aa69 -r af4853bc7e87 jdk/src/share/classes/java/security/cert/CertificateFactory.java --- a/jdk/src/share/classes/java/security/cert/CertificateFactory.java Fri Apr 10 11:21:31 2009 +0800 +++ b/jdk/src/share/classes/java/security/cert/CertificateFactory.java Sun Apr 12 20:21:43 2009 -0700 @@ -460,7 +460,7 @@ * {@link java.io.InputStream#reset() reset}, this method will * consume the entire input stream. Otherwise, each call to this * method consumes one CRL and the read position of the input stream - * is positioned to the next available byte after the the inherent + * is positioned to the next available byte after the inherent * end-of-CRL marker. If the data in the * input stream does not contain an inherent end-of-CRL marker (other * than EOF) and there is trailing data after the CRL is parsed, a diff -r ec64fd74aa69 -r af4853bc7e87 jdk/src/share/classes/java/security/cert/CertificateFactorySpi.java --- a/jdk/src/share/classes/java/security/cert/CertificateFactorySpi.java Fri Apr 10 11:21:31 2009 +0800 +++ b/jdk/src/share/classes/java/security/cert/CertificateFactorySpi.java Sun Apr 12 20:21:43 2009 -0700 @@ -88,7 +88,7 @@ * {@link java.io.InputStream#reset() reset}, this method will * consume the entire input stream. Otherwise, each call to this * method consumes one certificate and the read position of the input stream - * is positioned to the next available byte after the the inherent + * is positioned to the next available byte after the inherent * end-of-certificate marker. If the data in the * input stream does not contain an inherent end-of-certificate marker (other * than EOF) and there is trailing data after the certificate is parsed, a @@ -261,7 +261,7 @@ * {@link java.io.InputStream#reset() reset}, this method will * consume the entire input stream. Otherwise, each call to this * method consumes one CRL and the read position of the input stream - * is positioned to the next available byte after the the inherent + * is positioned to the next available byte after the inherent * end-of-CRL marker. If the data in the * input stream does not contain an inherent end-of-CRL marker (other * than EOF) and there is trailing data after the CRL is parsed, a