diff --git a/jdk/src/share/classes/java/lang/NoSuchFieldError.java b/jdk/src/share/classes/java/lang/NoSuchFieldError.java
index 8b77c71b18c..8adebca0dfd 100644
--- a/jdk/src/share/classes/java/lang/NoSuchFieldError.java
+++ b/jdk/src/share/classes/java/lang/NoSuchFieldError.java
@@ -41,14 +41,14 @@ class NoSuchFieldError extends IncompatibleClassChangeError {
private static final long serialVersionUID = -3456430195886129035L;
/**
- * Constructs a NoSuchFieldException
with no detail message.
+ * Constructs a NoSuchFieldError
with no detail message.
*/
public NoSuchFieldError() {
super();
}
/**
- * Constructs a NoSuchFieldException
with the specified
+ * Constructs a NoSuchFieldError
with the specified
* detail message.
*
* @param s the detail message.
diff --git a/jdk/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java b/jdk/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java
index 6a9d9f09715..65b90d0f29d 100644
--- a/jdk/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java
+++ b/jdk/src/share/classes/java/nio/channels/AsynchronousDatagramChannel.java
@@ -443,7 +443,7 @@ public abstract class AsynchronousDatagramChannel
* at least care must be taken to ensure that the buffer is not accessed
* while the channel remains open.
*
- *
If there is a security manager installed and the the channel is not + *
If there is a security manager installed and the channel is not
* connected then this method verifies that the target address and port number
* are permitted by the security manager's {@link SecurityManager#checkConnect
* checkConnect} method. The overhead of this security check can be avoided
diff --git a/jdk/src/share/classes/java/nio/file/Path.java b/jdk/src/share/classes/java/nio/file/Path.java
index 55bf8fd2675..8f796b6c32e 100644
--- a/jdk/src/share/classes/java/nio/file/Path.java
+++ b/jdk/src/share/classes/java/nio/file/Path.java
@@ -494,7 +494,7 @@ public abstract class Path
* @throws IOException
* if an I/O error occurs
* @throws SecurityException
- * In the case of the the default provider, and a security manager
+ * In the case of the default provider, and a security manager
* is installed, it denies {@link LinkPermission}("symbolic")
* or its {@link SecurityManager#checkWrite(String) checkWrite}
* method denies write access to the path of the symbolic link.
@@ -531,7 +531,7 @@ public abstract class Path
* @throws IOException
* if an I/O error occurs
* @throws SecurityException
- * In the case of the the default provider, and a security manager
+ * In the case of the default provider, and a security manager
* is installed, it denies {@link LinkPermission}("hard")
* or its {@link SecurityManager#checkWrite(String) checkWrite}
* method denies write access to both this path and the path of the
@@ -560,7 +560,7 @@ public abstract class Path
* @throws IOException
* if an I/O error occurs
* @throws SecurityException
- * In the case of the the default provider, and a security manager
+ * In the case of the default provider, and a security manager
* is installed, it checks that {@code FilePermission} has been
* granted with the "{@code readlink}" action to read the link.
*/
@@ -615,7 +615,7 @@ public abstract class Path
* obtained
*
* @throws SecurityException
- * In the case of the the default provider, and a security manager
+ * In the case of the default provider, and a security manager
* is installed, the {@link #toAbsolutePath toAbsolutePath} method
* throws a security exception.
*/
@@ -636,7 +636,7 @@ public abstract class Path
* @throws IOError
* if an I/O error occurs
* @throws SecurityException
- * In the case of the the default provider, and a security manager
+ * In the case of the default provider, and a security manager
* is installed, its {@link SecurityManager#checkPropertyAccess(String)
* checkPropertyAccess} method is invoked to check access to the
* system property {@code user.dir}
@@ -677,7 +677,7 @@ public abstract class Path
* @throws IOException
* if the file does not exist or an I/O error occurs
* @throws SecurityException
- * In the case of the the default provider, and a security manager
+ * In the case of the default provider, and a security manager
* is installed, its {@link SecurityManager#checkRead(String) checkRead}
* method is invoked to check read access to the file, and where
* this path is not absolute, its {@link SecurityManager#checkPropertyAccess(String)
diff --git a/jdk/src/share/classes/java/nio/file/SecureDirectoryStream.java b/jdk/src/share/classes/java/nio/file/SecureDirectoryStream.java
index b2555c14185..7268c41c54d 100644
--- a/jdk/src/share/classes/java/nio/file/SecureDirectoryStream.java
+++ b/jdk/src/share/classes/java/nio/file/SecureDirectoryStream.java
@@ -208,7 +208,7 @@ public abstract class SecureDirectoryStream
* @throws ClosedDirectoryStreamException
* if the directory stream is closed
* @throws NoSuchFileException
- * if the the directory does not exist (optional specific exception)
+ * if the directory does not exist (optional specific exception)
* @throws DirectoryNotEmptyException
* if the directory could not otherwise be deleted because it is
* not empty (optional specific exception)
diff --git a/jdk/src/share/classes/java/security/AccessController.java b/jdk/src/share/classes/java/security/AccessController.java
index dd49271ef87..47b8a93dc0e 100644
--- a/jdk/src/share/classes/java/security/AccessController.java
+++ b/jdk/src/share/classes/java/security/AccessController.java
@@ -425,7 +425,7 @@ public final class AccessController {
* Performs the specified PrivilegedExceptionAction
with
* privileges enabled and restricted by the specified
* AccessControlContext
. The action is performed with the
- * intersection of the the permissions possessed by the caller's
+ * intersection of the permissions possessed by the caller's
* protection domain, and those possessed by the domains represented by the
* specified AccessControlContext
.
*
diff --git a/jdk/src/share/classes/java/security/AlgorithmParametersSpi.java b/jdk/src/share/classes/java/security/AlgorithmParametersSpi.java
index 4bff86ded5c..a70faf376c3 100644
--- a/jdk/src/share/classes/java/security/AlgorithmParametersSpi.java
+++ b/jdk/src/share/classes/java/security/AlgorithmParametersSpi.java
@@ -102,7 +102,7 @@ public abstract class AlgorithmParametersSpi {
* parameters should be returned in an instance of the
* DSAParameterSpec
class.
*
- * @param paramSpec the the specification class in which
+ * @param paramSpec the specification class in which
* the parameters should be returned.
*
* @return the parameter specification.
diff --git a/jdk/src/share/classes/java/security/PrivilegedActionException.java b/jdk/src/share/classes/java/security/PrivilegedActionException.java
index 4f42c02b2f8..d17d21a528a 100644
--- a/jdk/src/share/classes/java/security/PrivilegedActionException.java
+++ b/jdk/src/share/classes/java/security/PrivilegedActionException.java
@@ -87,7 +87,7 @@ public class PrivilegedActionException extends Exception {
}
/**
- * Returns the the cause of this exception (the exception thrown by
+ * Returns the cause of this exception (the exception thrown by
* the privileged computation that resulted in this
* PrivilegedActionException
).
*
diff --git a/jdk/src/share/classes/java/security/Security.java b/jdk/src/share/classes/java/security/Security.java
index 7ed79566a1c..c7d69501711 100644
--- a/jdk/src/share/classes/java/security/Security.java
+++ b/jdk/src/share/classes/java/security/Security.java
@@ -501,7 +501,7 @@ public final class Security {
*
The cryptographic service name must not contain any dots. There - * must be one or more space charaters between the the + * must be one or more space charaters between the * <algorithm_or_type> and the <attribute_name>. *
A provider satisfies this selection criterion iff the * provider implements the specified algorithm or type for the specified diff --git a/jdk/src/share/classes/java/security/SecurityPermission.java b/jdk/src/share/classes/java/security/SecurityPermission.java index 41744ae73e8..1d9049d5bec 100644 --- a/jdk/src/share/classes/java/security/SecurityPermission.java +++ b/jdk/src/share/classes/java/security/SecurityPermission.java @@ -118,7 +118,7 @@ import java.util.StringTokenizer; *