Hi Alan, Could you review the typo fixes below, and file a bug for me to use in my commit?
Thanks, Martin # HG changeset patch # User martin # Date 1239065306 25200 # Node ID ad231fe99cf21cc042cd0cdfad632a59992cc730 # Parent d89688532509e8782bf7b61a3aa02dfcf073bda8 [mq]: typos diff --git a/src/share/classes/java/lang/NoSuchFieldError.java b/src/share/classes/java/lang/NoSuchFieldError.java --- a/src/share/classes/java/lang/NoSuchFieldError.java +++ b/src/share/classes/java/lang/NoSuchFieldError.java @@ -41,14 +41,14 @@ private static final long serialVersionUID = -3456430195886129035L; /** - * Constructs a <code>NoSuchFieldException</code> with no detail message. + * Constructs a <code>NoSuchFieldError</code> with no detail message. */ public NoSuchFieldError() { super(); } /** - * Constructs a <code>NoSuchFieldException</code> with the specified + * Constructs a <code>NoSuchFieldError</code> with the specified * detail message. * * @param s the detail message. diff --git a/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java b/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java --- a/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java +++ b/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java @@ -443,7 +443,7 @@ * at least care must be taken to ensure that the buffer is not accessed * while the channel remains open. * - * <p> If there is a security manager installed and the the channel is not + * <p> If there is a security manager installed and the channel is not * connected then this method verifies that the target address and port number * are permitted by the security manager's {...@link SecurityManager#checkConnect * checkConnect} method. The overhead of this security check can be avoided diff --git a/src/share/classes/java/nio/file/Path.java b/src/share/classes/java/nio/file/Path.java --- a/src/share/classes/java/nio/file/Path.java +++ b/src/share/classes/java/nio/file/Path.java @@ -494,7 +494,7 @@ * @throws IOException * if an I/O error occurs * @throws SecurityException - * In the case of the the default provider, and a security manager + * In the case of the default provider, and a security manager * is installed, it denies {...@link LinkPermission}<tt>("symbolic")</tt> * or its {...@link SecurityManager#checkWrite(String) checkWrite} * method denies write access to the path of the symbolic link. @@ -531,7 +531,7 @@ * @throws IOException * if an I/O error occurs * @throws SecurityException - * In the case of the the default provider, and a security manager + * In the case of the default provider, and a security manager * is installed, it denies {...@link LinkPermission}<tt>("hard")</tt> * or its {...@link SecurityManager#checkWrite(String) checkWrite} * method denies write access to both this path and the path of the @@ -560,7 +560,7 @@ * @throws IOException * if an I/O error occurs * @throws SecurityException - * In the case of the the default provider, and a security manager + * In the case of the default provider, and a security manager * is installed, it checks that {...@code FilePermission} has been * granted with the "{...@code readlink}" action to read the link. */ @@ -615,7 +615,7 @@ * obtained * * @throws SecurityException - * In the case of the the default provider, and a security manager + * In the case of the default provider, and a security manager * is installed, the {...@link #toAbsolutePath toAbsolutePath} method * throws a security exception. */ @@ -636,7 +636,7 @@ * @throws IOError * if an I/O error occurs * @throws SecurityException - * In the case of the the default provider, and a security manager + * In the case of the default provider, and a security manager * is installed, its {...@link SecurityManager#checkPropertyAccess(String) * checkPropertyAccess} method is invoked to check access to the * system property {...@code user.dir} @@ -677,7 +677,7 @@ * @throws IOException * if the file does not exist or an I/O error occurs * @throws SecurityException - * In the case of the the default provider, and a security manager + * In the case of the default provider, and a security manager * is installed, its {...@link SecurityManager#checkRead(String) checkRead} * method is invoked to check read access to the file, and where * this path is not absolute, its {...@link SecurityManager#checkPropertyAccess(String) diff --git a/src/share/classes/java/nio/file/SecureDirectoryStream.java b/src/share/classes/java/nio/file/SecureDirectoryStream.java --- a/src/share/classes/java/nio/file/SecureDirectoryStream.java +++ b/src/share/classes/java/nio/file/SecureDirectoryStream.java @@ -208,7 +208,7 @@ * @throws ClosedDirectoryStreamException * if the directory stream is closed * @throws NoSuchFileException - * if the the directory does not exist <i>(optional specific exception)</i> + * if the directory does not exist <i>(optional specific exception)</i> * @throws DirectoryNotEmptyException * if the directory could not otherwise be deleted because it is * not empty <i>(optional specific exception)</i> diff --git a/src/share/classes/java/security/AccessController.java b/src/share/classes/java/security/AccessController.java --- a/src/share/classes/java/security/AccessController.java +++ b/src/share/classes/java/security/AccessController.java @@ -425,7 +425,7 @@ * Performs the specified <code>PrivilegedExceptionAction</code> with * privileges enabled and restricted by the specified * <code>AccessControlContext</code>. The action is performed with the - * intersection of the the permissions possessed by the caller's + * intersection of the permissions possessed by the caller's * protection domain, and those possessed by the domains represented by the * specified <code>AccessControlContext</code>. * <p> diff --git a/src/share/classes/java/security/AlgorithmParametersSpi.java b/src/share/classes/java/security/AlgorithmParametersSpi.java --- a/src/share/classes/java/security/AlgorithmParametersSpi.java +++ b/src/share/classes/java/security/AlgorithmParametersSpi.java @@ -102,7 +102,7 @@ * parameters should be returned in an instance of the * <code>DSAParameterSpec</code> class. * - * @param paramSpec the the specification class in which + * @param paramSpec the specification class in which * the parameters should be returned. * * @return the parameter specification. diff --git a/src/share/classes/java/security/PrivilegedActionException.java b/src/share/classes/java/security/PrivilegedActionException.java --- a/src/share/classes/java/security/PrivilegedActionException.java +++ b/src/share/classes/java/security/PrivilegedActionException.java @@ -87,7 +87,7 @@ } /** - * Returns the the cause of this exception (the exception thrown by + * Returns the cause of this exception (the exception thrown by * the privileged computation that resulted in this * <code>PrivilegedActionException</code>). * diff --git a/src/share/classes/java/security/Security.java b/src/share/classes/java/security/Security.java --- a/src/share/classes/java/security/Security.java +++ b/src/share/classes/java/security/Security.java @@ -501,7 +501,7 @@ * <li> <i><crypto_service>.<algorithm_or_type> * <attribute_name>:< attribute_value></i> * <p> The cryptographic service name must not contain any dots. There - * must be one or more space charaters between the the + * must be one or more space charaters between the * <i><algorithm_or_type></i> and the <i><attribute_name></i>. * <p> A provider satisfies this selection criterion iff the * provider implements the specified algorithm or type for the specified diff --git a/src/share/classes/java/security/SecurityPermission.java b/src/share/classes/java/security/SecurityPermission.java --- a/src/share/classes/java/security/SecurityPermission.java +++ b/src/share/classes/java/security/SecurityPermission.java @@ -118,7 +118,7 @@ * <td>setProperty.{key}</td> * <td>Setting of the security property with the specified key</td> * <td>This could include setting a security provider or defining - * the location of the the system-wide security policy. Malicious + * the location of the system-wide security policy. Malicious * code that has permission to set a new security provider may * set a rogue provider that steals confidential information such * as cryptographic private keys. In addition, malicious code with diff --git a/src/share/classes/java/security/SignatureSpi.java b/src/share/classes/java/security/SignatureSpi.java --- a/src/share/classes/java/security/SignatureSpi.java +++ b/src/share/classes/java/security/SignatureSpi.java @@ -316,7 +316,7 @@ * overridden by a provider * * @exception InvalidAlgorithmParameterException if this method is - * overridden by a provider and the the given parameters + * overridden by a provider and the given parameters * are inappropriate for this signature engine */ protected void engineSetParameter(AlgorithmParameterSpec params) diff --git a/src/share/classes/java/security/cert/CertificateFactory.java b/src/share/classes/java/security/cert/CertificateFactory.java --- a/src/share/classes/java/security/cert/CertificateFactory.java +++ b/src/share/classes/java/security/cert/CertificateFactory.java @@ -460,7 +460,7 @@ * {...@link java.io.InputStream#reset() reset}, this method will * consume the entire input stream. Otherwise, each call to this * method consumes one CRL and the read position of the input stream - * is positioned to the next available byte after the the inherent + * is positioned to the next available byte after the inherent * end-of-CRL marker. If the data in the * input stream does not contain an inherent end-of-CRL marker (other * than EOF) and there is trailing data after the CRL is parsed, a diff --git a/src/share/classes/java/security/cert/CertificateFactorySpi.java b/src/share/classes/java/security/cert/CertificateFactorySpi.java --- a/src/share/classes/java/security/cert/CertificateFactorySpi.java +++ b/src/share/classes/java/security/cert/CertificateFactorySpi.java @@ -88,7 +88,7 @@ * {...@link java.io.InputStream#reset() reset}, this method will * consume the entire input stream. Otherwise, each call to this * method consumes one certificate and the read position of the input stream - * is positioned to the next available byte after the the inherent + * is positioned to the next available byte after the inherent * end-of-certificate marker. If the data in the * input stream does not contain an inherent end-of-certificate marker (other * than EOF) and there is trailing data after the certificate is parsed, a @@ -261,7 +261,7 @@ * {...@link java.io.InputStream#reset() reset}, this method will * consume the entire input stream. Otherwise, each call to this * method consumes one CRL and the read position of the input stream - * is positioned to the next available byte after the the inherent + * is positioned to the next available byte after the inherent * end-of-CRL marker. If the data in the * input stream does not contain an inherent end-of-CRL marker (other * than EOF) and there is trailing data after the CRL is parsed, a