6827153: Miscellaneous typos in javadoc
Reviewed-by: alanb
This commit is contained in:
parent
23d8c5ddc1
commit
e8f11acb07
@ -41,14 +41,14 @@ class NoSuchFieldError extends IncompatibleClassChangeError {
|
||||
private static final long serialVersionUID = -3456430195886129035L;
|
||||
|
||||
/**
|
||||
* Constructs a <code>NoSuchFieldException</code> with no detail message.
|
||||
* Constructs a <code>NoSuchFieldError</code> with no detail message.
|
||||
*/
|
||||
public NoSuchFieldError() {
|
||||
super();
|
||||
}
|
||||
|
||||
/**
|
||||
* Constructs a <code>NoSuchFieldException</code> with the specified
|
||||
* Constructs a <code>NoSuchFieldError</code> with the specified
|
||||
* detail message.
|
||||
*
|
||||
* @param s the detail message.
|
||||
|
@ -443,7 +443,7 @@ public abstract class AsynchronousDatagramChannel
|
||||
* at least care must be taken to ensure that the buffer is not accessed
|
||||
* while the channel remains open.
|
||||
*
|
||||
* <p> If there is a security manager installed and the the channel is not
|
||||
* <p> If there is a security manager installed and the channel is not
|
||||
* connected then this method verifies that the target address and port number
|
||||
* are permitted by the security manager's {@link SecurityManager#checkConnect
|
||||
* checkConnect} method. The overhead of this security check can be avoided
|
||||
|
@ -494,7 +494,7 @@ public abstract class Path
|
||||
* @throws IOException
|
||||
* if an I/O error occurs
|
||||
* @throws SecurityException
|
||||
* In the case of the the default provider, and a security manager
|
||||
* In the case of the default provider, and a security manager
|
||||
* is installed, it denies {@link LinkPermission}<tt>("symbolic")</tt>
|
||||
* or its {@link SecurityManager#checkWrite(String) checkWrite}
|
||||
* method denies write access to the path of the symbolic link.
|
||||
@ -531,7 +531,7 @@ public abstract class Path
|
||||
* @throws IOException
|
||||
* if an I/O error occurs
|
||||
* @throws SecurityException
|
||||
* In the case of the the default provider, and a security manager
|
||||
* In the case of the default provider, and a security manager
|
||||
* is installed, it denies {@link LinkPermission}<tt>("hard")</tt>
|
||||
* or its {@link SecurityManager#checkWrite(String) checkWrite}
|
||||
* method denies write access to both this path and the path of the
|
||||
@ -560,7 +560,7 @@ public abstract class Path
|
||||
* @throws IOException
|
||||
* if an I/O error occurs
|
||||
* @throws SecurityException
|
||||
* In the case of the the default provider, and a security manager
|
||||
* In the case of the default provider, and a security manager
|
||||
* is installed, it checks that {@code FilePermission} has been
|
||||
* granted with the "{@code readlink}" action to read the link.
|
||||
*/
|
||||
@ -615,7 +615,7 @@ public abstract class Path
|
||||
* obtained
|
||||
*
|
||||
* @throws SecurityException
|
||||
* In the case of the the default provider, and a security manager
|
||||
* In the case of the default provider, and a security manager
|
||||
* is installed, the {@link #toAbsolutePath toAbsolutePath} method
|
||||
* throws a security exception.
|
||||
*/
|
||||
@ -636,7 +636,7 @@ public abstract class Path
|
||||
* @throws IOError
|
||||
* if an I/O error occurs
|
||||
* @throws SecurityException
|
||||
* In the case of the the default provider, and a security manager
|
||||
* In the case of the default provider, and a security manager
|
||||
* is installed, its {@link SecurityManager#checkPropertyAccess(String)
|
||||
* checkPropertyAccess} method is invoked to check access to the
|
||||
* system property {@code user.dir}
|
||||
@ -677,7 +677,7 @@ public abstract class Path
|
||||
* @throws IOException
|
||||
* if the file does not exist or an I/O error occurs
|
||||
* @throws SecurityException
|
||||
* In the case of the the default provider, and a security manager
|
||||
* In the case of the default provider, and a security manager
|
||||
* is installed, its {@link SecurityManager#checkRead(String) checkRead}
|
||||
* method is invoked to check read access to the file, and where
|
||||
* this path is not absolute, its {@link SecurityManager#checkPropertyAccess(String)
|
||||
|
@ -208,7 +208,7 @@ public abstract class SecureDirectoryStream
|
||||
* @throws ClosedDirectoryStreamException
|
||||
* if the directory stream is closed
|
||||
* @throws NoSuchFileException
|
||||
* if the the directory does not exist <i>(optional specific exception)</i>
|
||||
* if the directory does not exist <i>(optional specific exception)</i>
|
||||
* @throws DirectoryNotEmptyException
|
||||
* if the directory could not otherwise be deleted because it is
|
||||
* not empty <i>(optional specific exception)</i>
|
||||
|
@ -425,7 +425,7 @@ public final class AccessController {
|
||||
* Performs the specified <code>PrivilegedExceptionAction</code> with
|
||||
* privileges enabled and restricted by the specified
|
||||
* <code>AccessControlContext</code>. The action is performed with the
|
||||
* intersection of the the permissions possessed by the caller's
|
||||
* intersection of the permissions possessed by the caller's
|
||||
* protection domain, and those possessed by the domains represented by the
|
||||
* specified <code>AccessControlContext</code>.
|
||||
* <p>
|
||||
|
@ -102,7 +102,7 @@ public abstract class AlgorithmParametersSpi {
|
||||
* parameters should be returned in an instance of the
|
||||
* <code>DSAParameterSpec</code> class.
|
||||
*
|
||||
* @param paramSpec the the specification class in which
|
||||
* @param paramSpec the specification class in which
|
||||
* the parameters should be returned.
|
||||
*
|
||||
* @return the parameter specification.
|
||||
|
@ -87,7 +87,7 @@ public class PrivilegedActionException extends Exception {
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns the the cause of this exception (the exception thrown by
|
||||
* Returns the cause of this exception (the exception thrown by
|
||||
* the privileged computation that resulted in this
|
||||
* <code>PrivilegedActionException</code>).
|
||||
*
|
||||
|
@ -501,7 +501,7 @@ public final class Security {
|
||||
* <li> <i><crypto_service>.<algorithm_or_type>
|
||||
* <attribute_name>:< attribute_value></i>
|
||||
* <p> The cryptographic service name must not contain any dots. There
|
||||
* must be one or more space charaters between the the
|
||||
* must be one or more space charaters between the
|
||||
* <i><algorithm_or_type></i> and the <i><attribute_name></i>.
|
||||
* <p> A provider satisfies this selection criterion iff the
|
||||
* provider implements the specified algorithm or type for the specified
|
||||
|
@ -118,7 +118,7 @@ import java.util.StringTokenizer;
|
||||
* <td>setProperty.{key}</td>
|
||||
* <td>Setting of the security property with the specified key</td>
|
||||
* <td>This could include setting a security provider or defining
|
||||
* the location of the the system-wide security policy. Malicious
|
||||
* the location of the system-wide security policy. Malicious
|
||||
* code that has permission to set a new security provider may
|
||||
* set a rogue provider that steals confidential information such
|
||||
* as cryptographic private keys. In addition, malicious code with
|
||||
|
@ -316,7 +316,7 @@ public abstract class SignatureSpi {
|
||||
* overridden by a provider
|
||||
*
|
||||
* @exception InvalidAlgorithmParameterException if this method is
|
||||
* overridden by a provider and the the given parameters
|
||||
* overridden by a provider and the given parameters
|
||||
* are inappropriate for this signature engine
|
||||
*/
|
||||
protected void engineSetParameter(AlgorithmParameterSpec params)
|
||||
|
@ -460,7 +460,7 @@ public class CertificateFactory {
|
||||
* {@link java.io.InputStream#reset() reset}, this method will
|
||||
* consume the entire input stream. Otherwise, each call to this
|
||||
* method consumes one CRL and the read position of the input stream
|
||||
* is positioned to the next available byte after the the inherent
|
||||
* is positioned to the next available byte after the inherent
|
||||
* end-of-CRL marker. If the data in the
|
||||
* input stream does not contain an inherent end-of-CRL marker (other
|
||||
* than EOF) and there is trailing data after the CRL is parsed, a
|
||||
|
@ -88,7 +88,7 @@ public abstract class CertificateFactorySpi {
|
||||
* {@link java.io.InputStream#reset() reset}, this method will
|
||||
* consume the entire input stream. Otherwise, each call to this
|
||||
* method consumes one certificate and the read position of the input stream
|
||||
* is positioned to the next available byte after the the inherent
|
||||
* is positioned to the next available byte after the inherent
|
||||
* end-of-certificate marker. If the data in the
|
||||
* input stream does not contain an inherent end-of-certificate marker (other
|
||||
* than EOF) and there is trailing data after the certificate is parsed, a
|
||||
@ -261,7 +261,7 @@ public abstract class CertificateFactorySpi {
|
||||
* {@link java.io.InputStream#reset() reset}, this method will
|
||||
* consume the entire input stream. Otherwise, each call to this
|
||||
* method consumes one CRL and the read position of the input stream
|
||||
* is positioned to the next available byte after the the inherent
|
||||
* is positioned to the next available byte after the inherent
|
||||
* end-of-CRL marker. If the data in the
|
||||
* input stream does not contain an inherent end-of-CRL marker (other
|
||||
* than EOF) and there is trailing data after the CRL is parsed, a
|
||||
|
Loading…
Reference in New Issue
Block a user