diff options
author | Dimitri Papadopoulos <3234522+DimitriPapadopoulos@users.noreply.github.com> | 2023-07-16 09:09:31 +0200 |
---|---|---|
committer | Tomas Mraz <tomas@openssl.org> | 2023-09-11 10:15:30 +0200 |
commit | ad31628cfef5893b2198077752302a7d9b58135c (patch) | |
tree | 3d95d6074b1c4f272a60aa95b2dfedf24ddd85d0 /crypto/rsa/rsa_sp800_56b_gen.c | |
parent | 84f371a130dbe7a46595fbabd274f152a0e6385f (diff) |
Remove repeated words
Found by running the checkpatch.pl Linux script to enforce coding style.
Reviewed-by: Paul Dale <pauli@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/21468)
Diffstat (limited to 'crypto/rsa/rsa_sp800_56b_gen.c')
-rw-r--r-- | crypto/rsa/rsa_sp800_56b_gen.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/crypto/rsa/rsa_sp800_56b_gen.c b/crypto/rsa/rsa_sp800_56b_gen.c index 04fbe5e86e..9fa85bfdf3 100644 --- a/crypto/rsa/rsa_sp800_56b_gen.c +++ b/crypto/rsa/rsa_sp800_56b_gen.c @@ -423,7 +423,7 @@ err: * See SP800-56Br1 6.3.1.3 (Step 6) Perform a pair-wise consistency test by * verifying that: k = (k^e)^d mod n for some integer k where 1 < k < n-1. * - * Returns 1 if the RSA key passes the pairwise test or 0 it it fails. + * Returns 1 if the RSA key passes the pairwise test or 0 if it fails. */ int ossl_rsa_sp800_56b_pairwise_test(RSA *rsa, BN_CTX *ctx) { |