summaryrefslogtreecommitdiffstats
path: root/crypto
diff options
context:
space:
mode:
Diffstat (limited to 'crypto')
-rw-r--r--crypto/cpuid.c4
-rw-r--r--crypto/ec/ecp_s390x_nistp.c2
-rw-r--r--crypto/http/http_client.c2
-rw-r--r--crypto/pem/pvkfmt.c2
-rw-r--r--crypto/rsa/rsa_sp800_56b_gen.c2
-rw-r--r--crypto/store/store_lib.c2
-rw-r--r--crypto/x509/x509_trust.c2
7 files changed, 8 insertions, 8 deletions
diff --git a/crypto/cpuid.c b/crypto/cpuid.c
index f3d966dbf0..a7c4f97fb4 100644
--- a/crypto/cpuid.c
+++ b/crypto/cpuid.c
@@ -34,7 +34,7 @@ static variant_char *ossl_getenv(const char *name)
{
/*
* Since we pull only one environment variable, it's simpler to
- * to just ignore |name| and use equivalent wide-char L-literal.
+ * just ignore |name| and use equivalent wide-char L-literal.
* As well as to ignore excessively long values...
*/
static WCHAR value[48];
@@ -173,7 +173,7 @@ void OPENSSL_cpuid_setup(void)
*/
/*
- * The volatile is used to to ensure that the compiler generates code that reads
+ * The volatile is used to ensure that the compiler generates code that reads
* all values from the array and doesn't try to optimize this away. The standard
* doesn't actually require this behavior if the original data pointed to is
* not volatile, but compilers do this in practice anyway.
diff --git a/crypto/ec/ecp_s390x_nistp.c b/crypto/ec/ecp_s390x_nistp.c
index 6bf2da9b4b..eae0b52c4e 100644
--- a/crypto/ec/ecp_s390x_nistp.c
+++ b/crypto/ec/ecp_s390x_nistp.c
@@ -178,7 +178,7 @@ static ECDSA_SIG *ecdsa_s390x_nistp_sign_sig(const unsigned char *dgst,
goto ret;
}
/*
- * Generate random k and copy to param param block. RAND_priv_bytes_ex
+ * Generate random k and copy to param block. RAND_priv_bytes_ex
* is used instead of BN_priv_rand_range or BN_generate_dsa_nonce
* because kdsa instruction constructs an in-range, invertible nonce
* internally implementing counter-measures for RNG weakness.
diff --git a/crypto/http/http_client.c b/crypto/http/http_client.c
index 615d48a724..474a6e59e3 100644
--- a/crypto/http/http_client.c
+++ b/crypto/http/http_client.c
@@ -1473,7 +1473,7 @@ int OSSL_HTTP_proxy_connect(BIO *bio, const char *server, const char *port,
do {
/*
* This does not necessarily catch the case when the full
- * HTTP response came in in more than a single TCP message.
+ * HTTP response came in more than a single TCP message.
*/
read_len = BIO_gets(fbio, mbuf, BUF_SIZE);
} while (read_len > 2);
diff --git a/crypto/pem/pvkfmt.c b/crypto/pem/pvkfmt.c
index 8931386fae..d8aaebe72f 100644
--- a/crypto/pem/pvkfmt.c
+++ b/crypto/pem/pvkfmt.c
@@ -150,7 +150,7 @@ static EVP_PKEY *evp_pkey_new0_key(void *key, int evp_type)
* Read the MSBLOB header and get relevant data from it.
*
* |pisdss| and |pispub| have a double role, as they can be used for
- * discovery as well as to check the the blob meets expectations.
+ * discovery as well as to check the blob meets expectations.
* |*pisdss| is the indicator for whether the key is a DSA key or not.
* |*pispub| is the indicator for whether the key is public or not.
* In both cases, the following input values apply:
diff --git a/crypto/rsa/rsa_sp800_56b_gen.c b/crypto/rsa/rsa_sp800_56b_gen.c
index 04fbe5e86e..9fa85bfdf3 100644
--- a/crypto/rsa/rsa_sp800_56b_gen.c
+++ b/crypto/rsa/rsa_sp800_56b_gen.c
@@ -423,7 +423,7 @@ err:
* See SP800-56Br1 6.3.1.3 (Step 6) Perform a pair-wise consistency test by
* verifying that: k = (k^e)^d mod n for some integer k where 1 < k < n-1.
*
- * Returns 1 if the RSA key passes the pairwise test or 0 it it fails.
+ * Returns 1 if the RSA key passes the pairwise test or 0 if it fails.
*/
int ossl_rsa_sp800_56b_pairwise_test(RSA *rsa, BN_CTX *ctx)
{
diff --git a/crypto/store/store_lib.c b/crypto/store/store_lib.c
index 0e805062ac..df3180c048 100644
--- a/crypto/store/store_lib.c
+++ b/crypto/store/store_lib.c
@@ -1013,7 +1013,7 @@ OSSL_STORE_CTX *OSSL_STORE_attach(BIO *bp, const char *scheme,
ctx->post_process_data = post_process_data;
/*
- * ossl_store_get0_loader_int will raise an error if the loader for the
+ * ossl_store_get0_loader_int will raise an error if the loader for
* the scheme cannot be retrieved. But if a loader was successfully
* fetched then we remove this error from the error stack.
*/
diff --git a/crypto/x509/x509_trust.c b/crypto/x509/x509_trust.c
index 3143de0d74..1a4345f2fe 100644
--- a/crypto/x509/x509_trust.c
+++ b/crypto/x509/x509_trust.c
@@ -275,7 +275,7 @@ static int obj_trust(int id, X509 *x, int flags)
/*
* Reject when explicit trust EKU are set and none match.
*
- * Returning untrusted is enough for for full chains that end in
+ * Returning untrusted is enough for full chains that end in
* self-signed roots, because when explicit trust is specified it
* suppresses the default blanket trust of self-signed objects.
*