changeset 1104:572d3f36c8a9

6827153: Miscellaneous typos in javadoc Reviewed-by: alanb
author martin
date Sun, 12 Apr 2009 20:21:43 -0700
parents 897b2d42995a
children 6f99dbd58123 e51956c74e5c
files src/share/classes/java/lang/NoSuchFieldError.java src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java src/share/classes/java/nio/file/Path.java src/share/classes/java/nio/file/SecureDirectoryStream.java src/share/classes/java/security/AccessController.java src/share/classes/java/security/AlgorithmParametersSpi.java src/share/classes/java/security/PrivilegedActionException.java src/share/classes/java/security/Security.java src/share/classes/java/security/SecurityPermission.java src/share/classes/java/security/SignatureSpi.java src/share/classes/java/security/cert/CertificateFactory.java src/share/classes/java/security/cert/CertificateFactorySpi.java
diffstat 12 files changed, 19 insertions(+), 19 deletions(-) [+]
line wrap: on
line diff
--- a/src/share/classes/java/lang/NoSuchFieldError.java	Fri Apr 10 11:21:31 2009 +0800
+++ b/src/share/classes/java/lang/NoSuchFieldError.java	Sun Apr 12 20:21:43 2009 -0700
@@ -41,14 +41,14 @@
     private static final long serialVersionUID = -3456430195886129035L;
 
     /**
-     * Constructs a <code>NoSuchFieldException</code> with no detail  message.
+     * Constructs a <code>NoSuchFieldError</code> with no detail message.
      */
     public NoSuchFieldError() {
         super();
     }
 
     /**
-     * Constructs a <code>NoSuchFieldException</code> with the specified
+     * Constructs a <code>NoSuchFieldError</code> with the specified
      * detail message.
      *
      * @param   s   the detail message.
--- a/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java	Fri Apr 10 11:21:31 2009 +0800
+++ b/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java	Sun Apr 12 20:21:43 2009 -0700
@@ -443,7 +443,7 @@
      * at least care must be taken to ensure that the buffer is not accessed
      * while the channel remains open.
      *
-     * <p> If there is a security manager installed and the the channel is not
+     * <p> If there is a security manager installed and the channel is not
      * connected then this method verifies that the target address and port number
      * are permitted by the security manager's {@link SecurityManager#checkConnect
      * checkConnect} method.  The overhead of this security check can be avoided
--- a/src/share/classes/java/nio/file/Path.java	Fri Apr 10 11:21:31 2009 +0800
+++ b/src/share/classes/java/nio/file/Path.java	Sun Apr 12 20:21:43 2009 -0700
@@ -494,7 +494,7 @@
      * @throws  IOException
      *          if an I/O error occurs
      * @throws  SecurityException
-     *          In the case of the the default provider, and a security manager
+     *          In the case of the default provider, and a security manager
      *          is installed, it denies {@link LinkPermission}<tt>("symbolic")</tt>
      *          or its {@link SecurityManager#checkWrite(String) checkWrite}
      *          method denies write access to the path of the symbolic link.
@@ -531,7 +531,7 @@
      * @throws  IOException
      *          if an I/O error occurs
      * @throws  SecurityException
-     *          In the case of the the default provider, and a security manager
+     *          In the case of the default provider, and a security manager
      *          is installed, it denies {@link LinkPermission}<tt>("hard")</tt>
      *          or its {@link SecurityManager#checkWrite(String) checkWrite}
      *          method denies write access to both this path and the path of the
@@ -560,7 +560,7 @@
      * @throws  IOException
      *          if an I/O error occurs
      * @throws  SecurityException
-     *          In the case of the the default provider, and a security manager
+     *          In the case of the default provider, and a security manager
      *          is installed, it checks that {@code FilePermission} has been
      *          granted with the "{@code readlink}" action to read the link.
      */
@@ -615,7 +615,7 @@
      *          obtained
      *
      * @throws  SecurityException
-     *          In the case of the the default provider, and a security manager
+     *          In the case of the default provider, and a security manager
      *          is installed, the {@link #toAbsolutePath toAbsolutePath} method
      *          throws a security exception.
      */
@@ -636,7 +636,7 @@
      * @throws  IOError
      *          if an I/O error occurs
      * @throws  SecurityException
-     *          In the case of the the default provider, and a security manager
+     *          In the case of the default provider, and a security manager
      *          is installed, its {@link SecurityManager#checkPropertyAccess(String)
      *          checkPropertyAccess} method is invoked to check access to the
      *          system property {@code user.dir}
@@ -677,7 +677,7 @@
      * @throws  IOException
      *          if the file does not exist or an I/O error occurs
      * @throws  SecurityException
-     *          In the case of the the default provider, and a security manager
+     *          In the case of the default provider, and a security manager
      *          is installed, its {@link SecurityManager#checkRead(String) checkRead}
      *          method is invoked to check read access to the file, and where
      *          this path is not absolute, its {@link SecurityManager#checkPropertyAccess(String)
--- a/src/share/classes/java/nio/file/SecureDirectoryStream.java	Fri Apr 10 11:21:31 2009 +0800
+++ b/src/share/classes/java/nio/file/SecureDirectoryStream.java	Sun Apr 12 20:21:43 2009 -0700
@@ -208,7 +208,7 @@
      * @throws  ClosedDirectoryStreamException
      *          if the directory stream is closed
      * @throws  NoSuchFileException
-     *          if the the directory does not exist <i>(optional specific exception)</i>
+     *          if the directory does not exist <i>(optional specific exception)</i>
      * @throws  DirectoryNotEmptyException
      *          if the directory could not otherwise be deleted because it is
      *          not empty <i>(optional specific exception)</i>
--- a/src/share/classes/java/security/AccessController.java	Fri Apr 10 11:21:31 2009 +0800
+++ b/src/share/classes/java/security/AccessController.java	Sun Apr 12 20:21:43 2009 -0700
@@ -425,7 +425,7 @@
      * Performs the specified <code>PrivilegedExceptionAction</code> with
      * privileges enabled and restricted by the specified
      * <code>AccessControlContext</code>.  The action is performed with the
-     * intersection of the the permissions possessed by the caller's
+     * intersection of the permissions possessed by the caller's
      * protection domain, and those possessed by the domains represented by the
      * specified <code>AccessControlContext</code>.
      * <p>
--- a/src/share/classes/java/security/AlgorithmParametersSpi.java	Fri Apr 10 11:21:31 2009 +0800
+++ b/src/share/classes/java/security/AlgorithmParametersSpi.java	Sun Apr 12 20:21:43 2009 -0700
@@ -102,7 +102,7 @@
      * parameters should be returned in an instance of the
      * <code>DSAParameterSpec</code> class.
      *
-     * @param paramSpec the the specification class in which
+     * @param paramSpec the specification class in which
      * the parameters should be returned.
      *
      * @return the parameter specification.
--- a/src/share/classes/java/security/PrivilegedActionException.java	Fri Apr 10 11:21:31 2009 +0800
+++ b/src/share/classes/java/security/PrivilegedActionException.java	Sun Apr 12 20:21:43 2009 -0700
@@ -87,7 +87,7 @@
     }
 
     /**
-     * Returns the the cause of this exception (the exception thrown by
+     * Returns the cause of this exception (the exception thrown by
      * the privileged computation that resulted in this
      * <code>PrivilegedActionException</code>).
      *
--- a/src/share/classes/java/security/Security.java	Fri Apr 10 11:21:31 2009 +0800
+++ b/src/share/classes/java/security/Security.java	Sun Apr 12 20:21:43 2009 -0700
@@ -501,7 +501,7 @@
      * <li> <i>&lt;crypto_service>.&lt;algorithm_or_type>
      * &lt;attribute_name>:&lt attribute_value></i>
      * <p> The cryptographic service name must not contain any dots. There
-     * must be one or more space charaters between the the
+     * must be one or more space charaters between the
      * <i>&lt;algorithm_or_type></i> and the <i>&lt;attribute_name></i>.
      *  <p> A provider satisfies this selection criterion iff the
      * provider implements the specified algorithm or type for the specified
--- a/src/share/classes/java/security/SecurityPermission.java	Fri Apr 10 11:21:31 2009 +0800
+++ b/src/share/classes/java/security/SecurityPermission.java	Sun Apr 12 20:21:43 2009 -0700
@@ -118,7 +118,7 @@
  *   <td>setProperty.{key}</td>
  *   <td>Setting of the security property with the specified key</td>
  *   <td>This could include setting a security provider or defining
- * the location of the the system-wide security policy.  Malicious
+ * the location of the system-wide security policy.  Malicious
  * code that has permission to set a new security provider may
  * set a rogue provider that steals confidential information such
  * as cryptographic private keys. In addition, malicious code with
--- a/src/share/classes/java/security/SignatureSpi.java	Fri Apr 10 11:21:31 2009 +0800
+++ b/src/share/classes/java/security/SignatureSpi.java	Sun Apr 12 20:21:43 2009 -0700
@@ -316,7 +316,7 @@
      * overridden by a provider
      *
      * @exception InvalidAlgorithmParameterException if this method is
-     * overridden by a provider and the the given parameters
+     * overridden by a provider and the given parameters
      * are inappropriate for this signature engine
      */
     protected void engineSetParameter(AlgorithmParameterSpec params)
--- a/src/share/classes/java/security/cert/CertificateFactory.java	Fri Apr 10 11:21:31 2009 +0800
+++ b/src/share/classes/java/security/cert/CertificateFactory.java	Sun Apr 12 20:21:43 2009 -0700
@@ -460,7 +460,7 @@
      * {@link java.io.InputStream#reset() reset}, this method will
      * consume the entire input stream. Otherwise, each call to this
      * method consumes one CRL and the read position of the input stream
-     * is positioned to the next available byte after the the inherent
+     * is positioned to the next available byte after the inherent
      * end-of-CRL marker. If the data in the
      * input stream does not contain an inherent end-of-CRL marker (other
      * than EOF) and there is trailing data after the CRL is parsed, a
--- a/src/share/classes/java/security/cert/CertificateFactorySpi.java	Fri Apr 10 11:21:31 2009 +0800
+++ b/src/share/classes/java/security/cert/CertificateFactorySpi.java	Sun Apr 12 20:21:43 2009 -0700
@@ -88,7 +88,7 @@
      * {@link java.io.InputStream#reset() reset}, this method will
      * consume the entire input stream. Otherwise, each call to this
      * method consumes one certificate and the read position of the input stream
-     * is positioned to the next available byte after the the inherent
+     * is positioned to the next available byte after the inherent
      * end-of-certificate marker. If the data in the
      * input stream does not contain an inherent end-of-certificate marker (other
      * than EOF) and there is trailing data after the certificate is parsed, a
@@ -261,7 +261,7 @@
      * {@link java.io.InputStream#reset() reset}, this method will
      * consume the entire input stream. Otherwise, each call to this
      * method consumes one CRL and the read position of the input stream
-     * is positioned to the next available byte after the the inherent
+     * is positioned to the next available byte after the inherent
      * end-of-CRL marker. If the data in the
      * input stream does not contain an inherent end-of-CRL marker (other
      * than EOF) and there is trailing data after the CRL is parsed, a