From 96d68a8c65f913a9c7a0ff34e49136379445d795 Mon Sep 17 00:00:00 2001 From: martin Date: Sun, 12 Apr 2009 20:21:43 -0700 Subject: [PATCH] 6827153: Miscellaneous typos in javadoc Reviewed-by: alanb --- src/share/classes/java/lang/NoSuchFieldError.java | 4 ++-- .../nio/channels/AsynchronousDatagramChannel.java | 2 +- src/share/classes/java/nio/file/Path.java | 12 ++++++------ .../classes/java/nio/file/SecureDirectoryStream.java | 2 +- .../classes/java/security/AccessController.java | 2 +- .../java/security/AlgorithmParametersSpi.java | 2 +- .../java/security/PrivilegedActionException.java | 2 +- src/share/classes/java/security/Security.java | 2 +- .../classes/java/security/SecurityPermission.java | 2 +- src/share/classes/java/security/SignatureSpi.java | 2 +- .../java/security/cert/CertificateFactory.java | 2 +- .../java/security/cert/CertificateFactorySpi.java | 4 ++-- 12 files changed, 19 insertions(+), 19 deletions(-) diff --git a/src/share/classes/java/lang/NoSuchFieldError.java b/src/share/classes/java/lang/NoSuchFieldError.java index 8b77c71b1..8adebca0d 100644 --- a/src/share/classes/java/lang/NoSuchFieldError.java +++ b/src/share/classes/java/lang/NoSuchFieldError.java @@ -41,14 +41,14 @@ class NoSuchFieldError extends IncompatibleClassChangeError { private static final long serialVersionUID = -3456430195886129035L; /** - * Constructs a NoSuchFieldException with no detail message. + * Constructs a NoSuchFieldError with no detail message. */ public NoSuchFieldError() { super(); } /** - * Constructs a NoSuchFieldException with the specified + * Constructs a NoSuchFieldError with the specified * detail message. * * @param s the detail message. diff --git a/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java b/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java index 6a9d9f097..65b90d0f2 100644 --- a/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java +++ b/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java @@ -443,7 +443,7 @@ public abstract class AsynchronousDatagramChannel * at least care must be taken to ensure that the buffer is not accessed * while the channel remains open. * - *

If there is a security manager installed and the the channel is not + *

If there is a security manager installed and the channel is not * connected then this method verifies that the target address and port number * are permitted by the security manager's {@link SecurityManager#checkConnect * checkConnect} method. The overhead of this security check can be avoided diff --git a/src/share/classes/java/nio/file/Path.java b/src/share/classes/java/nio/file/Path.java index 55bf8fd26..8f796b6c3 100644 --- a/src/share/classes/java/nio/file/Path.java +++ b/src/share/classes/java/nio/file/Path.java @@ -494,7 +494,7 @@ public abstract class Path * @throws IOException * if an I/O error occurs * @throws SecurityException - * In the case of the the default provider, and a security manager + * In the case of the default provider, and a security manager * is installed, it denies {@link LinkPermission}("symbolic") * or its {@link SecurityManager#checkWrite(String) checkWrite} * method denies write access to the path of the symbolic link. @@ -531,7 +531,7 @@ public abstract class Path * @throws IOException * if an I/O error occurs * @throws SecurityException - * In the case of the the default provider, and a security manager + * In the case of the default provider, and a security manager * is installed, it denies {@link LinkPermission}("hard") * or its {@link SecurityManager#checkWrite(String) checkWrite} * method denies write access to both this path and the path of the @@ -560,7 +560,7 @@ public abstract class Path * @throws IOException * if an I/O error occurs * @throws SecurityException - * In the case of the the default provider, and a security manager + * In the case of the default provider, and a security manager * is installed, it checks that {@code FilePermission} has been * granted with the "{@code readlink}" action to read the link. */ @@ -615,7 +615,7 @@ public abstract class Path * obtained * * @throws SecurityException - * In the case of the the default provider, and a security manager + * In the case of the default provider, and a security manager * is installed, the {@link #toAbsolutePath toAbsolutePath} method * throws a security exception. */ @@ -636,7 +636,7 @@ public abstract class Path * @throws IOError * if an I/O error occurs * @throws SecurityException - * In the case of the the default provider, and a security manager + * In the case of the default provider, and a security manager * is installed, its {@link SecurityManager#checkPropertyAccess(String) * checkPropertyAccess} method is invoked to check access to the * system property {@code user.dir} @@ -677,7 +677,7 @@ public abstract class Path * @throws IOException * if the file does not exist or an I/O error occurs * @throws SecurityException - * In the case of the the default provider, and a security manager + * In the case of the default provider, and a security manager * is installed, its {@link SecurityManager#checkRead(String) checkRead} * method is invoked to check read access to the file, and where * this path is not absolute, its {@link SecurityManager#checkPropertyAccess(String) diff --git a/src/share/classes/java/nio/file/SecureDirectoryStream.java b/src/share/classes/java/nio/file/SecureDirectoryStream.java index b2555c141..7268c41c5 100644 --- a/src/share/classes/java/nio/file/SecureDirectoryStream.java +++ b/src/share/classes/java/nio/file/SecureDirectoryStream.java @@ -208,7 +208,7 @@ public abstract class SecureDirectoryStream * @throws ClosedDirectoryStreamException * if the directory stream is closed * @throws NoSuchFileException - * if the the directory does not exist (optional specific exception) + * if the directory does not exist (optional specific exception) * @throws DirectoryNotEmptyException * if the directory could not otherwise be deleted because it is * not empty (optional specific exception) diff --git a/src/share/classes/java/security/AccessController.java b/src/share/classes/java/security/AccessController.java index dd49271ef..47b8a93dc 100644 --- a/src/share/classes/java/security/AccessController.java +++ b/src/share/classes/java/security/AccessController.java @@ -425,7 +425,7 @@ public final class AccessController { * Performs the specified PrivilegedExceptionAction with * privileges enabled and restricted by the specified * AccessControlContext. The action is performed with the - * intersection of the the permissions possessed by the caller's + * intersection of the permissions possessed by the caller's * protection domain, and those possessed by the domains represented by the * specified AccessControlContext. *

diff --git a/src/share/classes/java/security/AlgorithmParametersSpi.java b/src/share/classes/java/security/AlgorithmParametersSpi.java index 4bff86ded..a70faf376 100644 --- a/src/share/classes/java/security/AlgorithmParametersSpi.java +++ b/src/share/classes/java/security/AlgorithmParametersSpi.java @@ -102,7 +102,7 @@ public abstract class AlgorithmParametersSpi { * parameters should be returned in an instance of the * DSAParameterSpec class. * - * @param paramSpec the the specification class in which + * @param paramSpec the specification class in which * the parameters should be returned. * * @return the parameter specification. diff --git a/src/share/classes/java/security/PrivilegedActionException.java b/src/share/classes/java/security/PrivilegedActionException.java index 4f42c02b2..d17d21a52 100644 --- a/src/share/classes/java/security/PrivilegedActionException.java +++ b/src/share/classes/java/security/PrivilegedActionException.java @@ -87,7 +87,7 @@ public class PrivilegedActionException extends Exception { } /** - * Returns the the cause of this exception (the exception thrown by + * Returns the cause of this exception (the exception thrown by * the privileged computation that resulted in this * PrivilegedActionException). * diff --git a/src/share/classes/java/security/Security.java b/src/share/classes/java/security/Security.java index 7ed79566a..c7d695017 100644 --- a/src/share/classes/java/security/Security.java +++ b/src/share/classes/java/security/Security.java @@ -501,7 +501,7 @@ public final class Security { *

  • <crypto_service>.<algorithm_or_type> * <attribute_name>:< attribute_value> *

    The cryptographic service name must not contain any dots. There - * must be one or more space charaters between the the + * must be one or more space charaters between the * <algorithm_or_type> and the <attribute_name>. *

    A provider satisfies this selection criterion iff the * provider implements the specified algorithm or type for the specified diff --git a/src/share/classes/java/security/SecurityPermission.java b/src/share/classes/java/security/SecurityPermission.java index 41744ae73..1d9049d5b 100644 --- a/src/share/classes/java/security/SecurityPermission.java +++ b/src/share/classes/java/security/SecurityPermission.java @@ -118,7 +118,7 @@ import java.util.StringTokenizer; * setProperty.{key} * Setting of the security property with the specified key * This could include setting a security provider or defining - * the location of the the system-wide security policy. Malicious + * the location of the system-wide security policy. Malicious * code that has permission to set a new security provider may * set a rogue provider that steals confidential information such * as cryptographic private keys. In addition, malicious code with diff --git a/src/share/classes/java/security/SignatureSpi.java b/src/share/classes/java/security/SignatureSpi.java index 4b6049c19..b6bf347d6 100644 --- a/src/share/classes/java/security/SignatureSpi.java +++ b/src/share/classes/java/security/SignatureSpi.java @@ -316,7 +316,7 @@ public abstract class SignatureSpi { * overridden by a provider * * @exception InvalidAlgorithmParameterException if this method is - * overridden by a provider and the the given parameters + * overridden by a provider and the given parameters * are inappropriate for this signature engine */ protected void engineSetParameter(AlgorithmParameterSpec params) diff --git a/src/share/classes/java/security/cert/CertificateFactory.java b/src/share/classes/java/security/cert/CertificateFactory.java index 961e15de3..f1059d1c5 100644 --- a/src/share/classes/java/security/cert/CertificateFactory.java +++ b/src/share/classes/java/security/cert/CertificateFactory.java @@ -460,7 +460,7 @@ public class CertificateFactory { * {@link java.io.InputStream#reset() reset}, this method will * consume the entire input stream. Otherwise, each call to this * method consumes one CRL and the read position of the input stream - * is positioned to the next available byte after the the inherent + * is positioned to the next available byte after the inherent * end-of-CRL marker. If the data in the * input stream does not contain an inherent end-of-CRL marker (other * than EOF) and there is trailing data after the CRL is parsed, a diff --git a/src/share/classes/java/security/cert/CertificateFactorySpi.java b/src/share/classes/java/security/cert/CertificateFactorySpi.java index 5c24027a4..29eb74bfa 100644 --- a/src/share/classes/java/security/cert/CertificateFactorySpi.java +++ b/src/share/classes/java/security/cert/CertificateFactorySpi.java @@ -88,7 +88,7 @@ public abstract class CertificateFactorySpi { * {@link java.io.InputStream#reset() reset}, this method will * consume the entire input stream. Otherwise, each call to this * method consumes one certificate and the read position of the input stream - * is positioned to the next available byte after the the inherent + * is positioned to the next available byte after the inherent * end-of-certificate marker. If the data in the * input stream does not contain an inherent end-of-certificate marker (other * than EOF) and there is trailing data after the certificate is parsed, a @@ -261,7 +261,7 @@ public abstract class CertificateFactorySpi { * {@link java.io.InputStream#reset() reset}, this method will * consume the entire input stream. Otherwise, each call to this * method consumes one CRL and the read position of the input stream - * is positioned to the next available byte after the the inherent + * is positioned to the next available byte after the inherent * end-of-CRL marker. If the data in the * input stream does not contain an inherent end-of-CRL marker (other * than EOF) and there is trailing data after the CRL is parsed, a -- GitLab