--- a/jdk/src/share/classes/java/lang/NoSuchFieldError.java Fri Apr 10 11:21:31 2009 +0800
+++ b/jdk/src/share/classes/java/lang/NoSuchFieldError.java Sun Apr 12 20:21:43 2009 -0700
@@ -41,14 +41,14 @@
private static final long serialVersionUID = -3456430195886129035L;
/**
- * Constructs a <code>NoSuchFieldException</code> with no detail message.
+ * Constructs a <code>NoSuchFieldError</code> with no detail message.
*/
public NoSuchFieldError() {
super();
}
/**
- * Constructs a <code>NoSuchFieldException</code> with the specified
+ * Constructs a <code>NoSuchFieldError</code> with the specified
* detail message.
*
* @param s the detail message.
--- a/jdk/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java Fri Apr 10 11:21:31 2009 +0800
+++ b/jdk/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java Sun Apr 12 20:21:43 2009 -0700
@@ -443,7 +443,7 @@
* at least care must be taken to ensure that the buffer is not accessed
* while the channel remains open.
*
- * <p> If there is a security manager installed and the the channel is not
+ * <p> If there is a security manager installed and the channel is not
* connected then this method verifies that the target address and port number
* are permitted by the security manager's {@link SecurityManager#checkConnect
* checkConnect} method. The overhead of this security check can be avoided
--- a/jdk/src/share/classes/java/nio/file/Path.java Fri Apr 10 11:21:31 2009 +0800
+++ b/jdk/src/share/classes/java/nio/file/Path.java Sun Apr 12 20:21:43 2009 -0700
@@ -494,7 +494,7 @@
* @throws IOException
* if an I/O error occurs
* @throws SecurityException
- * In the case of the the default provider, and a security manager
+ * In the case of the default provider, and a security manager
* is installed, it denies {@link LinkPermission}<tt>("symbolic")</tt>
* or its {@link SecurityManager#checkWrite(String) checkWrite}
* method denies write access to the path of the symbolic link.
@@ -531,7 +531,7 @@
* @throws IOException
* if an I/O error occurs
* @throws SecurityException
- * In the case of the the default provider, and a security manager
+ * In the case of the default provider, and a security manager
* is installed, it denies {@link LinkPermission}<tt>("hard")</tt>
* or its {@link SecurityManager#checkWrite(String) checkWrite}
* method denies write access to both this path and the path of the
@@ -560,7 +560,7 @@
* @throws IOException
* if an I/O error occurs
* @throws SecurityException
- * In the case of the the default provider, and a security manager
+ * In the case of the default provider, and a security manager
* is installed, it checks that {@code FilePermission} has been
* granted with the "{@code readlink}" action to read the link.
*/
@@ -615,7 +615,7 @@
* obtained
*
* @throws SecurityException
- * In the case of the the default provider, and a security manager
+ * In the case of the default provider, and a security manager
* is installed, the {@link #toAbsolutePath toAbsolutePath} method
* throws a security exception.
*/
@@ -636,7 +636,7 @@
* @throws IOError
* if an I/O error occurs
* @throws SecurityException
- * In the case of the the default provider, and a security manager
+ * In the case of the default provider, and a security manager
* is installed, its {@link SecurityManager#checkPropertyAccess(String)
* checkPropertyAccess} method is invoked to check access to the
* system property {@code user.dir}
@@ -677,7 +677,7 @@
* @throws IOException
* if the file does not exist or an I/O error occurs
* @throws SecurityException
- * In the case of the the default provider, and a security manager
+ * In the case of the default provider, and a security manager
* is installed, its {@link SecurityManager#checkRead(String) checkRead}
* method is invoked to check read access to the file, and where
* this path is not absolute, its {@link SecurityManager#checkPropertyAccess(String)
--- a/jdk/src/share/classes/java/nio/file/SecureDirectoryStream.java Fri Apr 10 11:21:31 2009 +0800
+++ b/jdk/src/share/classes/java/nio/file/SecureDirectoryStream.java Sun Apr 12 20:21:43 2009 -0700
@@ -208,7 +208,7 @@
* @throws ClosedDirectoryStreamException
* if the directory stream is closed
* @throws NoSuchFileException
- * if the the directory does not exist <i>(optional specific exception)</i>
+ * if the directory does not exist <i>(optional specific exception)</i>
* @throws DirectoryNotEmptyException
* if the directory could not otherwise be deleted because it is
* not empty <i>(optional specific exception)</i>
--- a/jdk/src/share/classes/java/security/AccessController.java Fri Apr 10 11:21:31 2009 +0800
+++ b/jdk/src/share/classes/java/security/AccessController.java Sun Apr 12 20:21:43 2009 -0700
@@ -425,7 +425,7 @@
* Performs the specified <code>PrivilegedExceptionAction</code> with
* privileges enabled and restricted by the specified
* <code>AccessControlContext</code>. The action is performed with the
- * intersection of the the permissions possessed by the caller's
+ * intersection of the permissions possessed by the caller's
* protection domain, and those possessed by the domains represented by the
* specified <code>AccessControlContext</code>.
* <p>
--- a/jdk/src/share/classes/java/security/AlgorithmParametersSpi.java Fri Apr 10 11:21:31 2009 +0800
+++ b/jdk/src/share/classes/java/security/AlgorithmParametersSpi.java Sun Apr 12 20:21:43 2009 -0700
@@ -102,7 +102,7 @@
* parameters should be returned in an instance of the
* <code>DSAParameterSpec</code> class.
*
- * @param paramSpec the the specification class in which
+ * @param paramSpec the specification class in which
* the parameters should be returned.
*
* @return the parameter specification.
--- a/jdk/src/share/classes/java/security/PrivilegedActionException.java Fri Apr 10 11:21:31 2009 +0800
+++ b/jdk/src/share/classes/java/security/PrivilegedActionException.java Sun Apr 12 20:21:43 2009 -0700
@@ -87,7 +87,7 @@
}
/**
- * Returns the the cause of this exception (the exception thrown by
+ * Returns the cause of this exception (the exception thrown by
* the privileged computation that resulted in this
* <code>PrivilegedActionException</code>).
*
--- a/jdk/src/share/classes/java/security/Security.java Fri Apr 10 11:21:31 2009 +0800
+++ b/jdk/src/share/classes/java/security/Security.java Sun Apr 12 20:21:43 2009 -0700
@@ -501,7 +501,7 @@
* <li> <i><crypto_service>.<algorithm_or_type>
* <attribute_name>:< attribute_value></i>
* <p> The cryptographic service name must not contain any dots. There
- * must be one or more space charaters between the the
+ * must be one or more space charaters between the
* <i><algorithm_or_type></i> and the <i><attribute_name></i>.
* <p> A provider satisfies this selection criterion iff the
* provider implements the specified algorithm or type for the specified
--- a/jdk/src/share/classes/java/security/SecurityPermission.java Fri Apr 10 11:21:31 2009 +0800
+++ b/jdk/src/share/classes/java/security/SecurityPermission.java Sun Apr 12 20:21:43 2009 -0700
@@ -118,7 +118,7 @@
* <td>setProperty.{key}</td>
* <td>Setting of the security property with the specified key</td>
* <td>This could include setting a security provider or defining
- * the location of the the system-wide security policy. Malicious
+ * the location of the system-wide security policy. Malicious
* code that has permission to set a new security provider may
* set a rogue provider that steals confidential information such
* as cryptographic private keys. In addition, malicious code with
--- a/jdk/src/share/classes/java/security/SignatureSpi.java Fri Apr 10 11:21:31 2009 +0800
+++ b/jdk/src/share/classes/java/security/SignatureSpi.java Sun Apr 12 20:21:43 2009 -0700
@@ -316,7 +316,7 @@
* overridden by a provider
*
* @exception InvalidAlgorithmParameterException if this method is
- * overridden by a provider and the the given parameters
+ * overridden by a provider and the given parameters
* are inappropriate for this signature engine
*/
protected void engineSetParameter(AlgorithmParameterSpec params)
--- a/jdk/src/share/classes/java/security/cert/CertificateFactory.java Fri Apr 10 11:21:31 2009 +0800
+++ b/jdk/src/share/classes/java/security/cert/CertificateFactory.java Sun Apr 12 20:21:43 2009 -0700
@@ -460,7 +460,7 @@
* {@link java.io.InputStream#reset() reset}, this method will
* consume the entire input stream. Otherwise, each call to this
* method consumes one CRL and the read position of the input stream
- * is positioned to the next available byte after the the inherent
+ * is positioned to the next available byte after the inherent
* end-of-CRL marker. If the data in the
* input stream does not contain an inherent end-of-CRL marker (other
* than EOF) and there is trailing data after the CRL is parsed, a
--- a/jdk/src/share/classes/java/security/cert/CertificateFactorySpi.java Fri Apr 10 11:21:31 2009 +0800
+++ b/jdk/src/share/classes/java/security/cert/CertificateFactorySpi.java Sun Apr 12 20:21:43 2009 -0700
@@ -88,7 +88,7 @@
* {@link java.io.InputStream#reset() reset}, this method will
* consume the entire input stream. Otherwise, each call to this
* method consumes one certificate and the read position of the input stream
- * is positioned to the next available byte after the the inherent
+ * is positioned to the next available byte after the inherent
* end-of-certificate marker. If the data in the
* input stream does not contain an inherent end-of-certificate marker (other
* than EOF) and there is trailing data after the certificate is parsed, a
@@ -261,7 +261,7 @@
* {@link java.io.InputStream#reset() reset}, this method will
* consume the entire input stream. Otherwise, each call to this
* method consumes one CRL and the read position of the input stream
- * is positioned to the next available byte after the the inherent
+ * is positioned to the next available byte after the inherent
* end-of-CRL marker. If the data in the
* input stream does not contain an inherent end-of-CRL marker (other
* than EOF) and there is trailing data after the CRL is parsed, a