From 00e4bf088f852d4f64c5c95ba3154245ca8c9994 Mon Sep 17 00:00:00 2001 From: evenevent Date: Wed, 14 Aug 2024 00:28:36 +0800 Subject: [PATCH] chore: remove repetitive words Signed-off-by: evenevent --- src/qt/messagemodel.cpp | 2 +- src/secp256k1/src/modinv32_impl.h | 2 +- src/secp256k1/src/modinv64_impl.h | 2 +- src/secp256k1/src/secp256k1.c | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-) diff --git a/src/qt/messagemodel.cpp b/src/qt/messagemodel.cpp index f00059014..357b99c2b 100644 --- a/src/qt/messagemodel.cpp +++ b/src/qt/messagemodel.cpp @@ -328,7 +328,7 @@ class MessageTablePriv return FailedErrorShown; }; - // Add addresses / update labels that we've sent to to the address book + // Add addresses / update labels that we've sent to the address book std::string strAddress = rcp.address.toStdString(); CTxDestination dest = CDarkSilkAddress(strAddress).Get(); std::string strLabel = rcp.label.toStdString(); diff --git a/src/secp256k1/src/modinv32_impl.h b/src/secp256k1/src/modinv32_impl.h index 8e400b697..2b23ebf1e 100644 --- a/src/secp256k1/src/modinv32_impl.h +++ b/src/secp256k1/src/modinv32_impl.h @@ -80,7 +80,7 @@ static void secp256k1_modinv32_normalize_30(secp256k1_modinv32_signed30 *r, int3 /* In a first step, add the modulus if the input is negative, and then negate if requested. * This brings r from range (-2*modulus,modulus) to range (-modulus,modulus). As all input * limbs are in range (-2^30,2^30), this cannot overflow an int32_t. Note that the right - * shifts below are signed sign-extending shifts (see assumptions.h for tests that that is + * shifts below are signed sign-extending shifts (see assumptions.h for tests that is * indeed the behavior of the right shift operator). */ cond_add = r8 >> 31; r0 += modinfo->modulus.v[0] & cond_add; diff --git a/src/secp256k1/src/modinv64_impl.h b/src/secp256k1/src/modinv64_impl.h index e33727d38..1275d372b 100644 --- a/src/secp256k1/src/modinv64_impl.h +++ b/src/secp256k1/src/modinv64_impl.h @@ -104,7 +104,7 @@ static void secp256k1_modinv64_normalize_62(secp256k1_modinv64_signed62 *r, int6 /* In a first step, add the modulus if the input is negative, and then negate if requested. * This brings r from range (-2*modulus,modulus) to range (-modulus,modulus). As all input * limbs are in range (-2^62,2^62), this cannot overflow an int64_t. Note that the right - * shifts below are signed sign-extending shifts (see assumptions.h for tests that that is + * shifts below are signed sign-extending shifts (see assumptions.h for tests that is * indeed the behavior of the right shift operator). */ cond_add = r4 >> 63; r0 += modinfo->modulus.v[0] & cond_add; diff --git a/src/secp256k1/src/secp256k1.c b/src/secp256k1/src/secp256k1.c index 7af333ca9..4b488c472 100644 --- a/src/secp256k1/src/secp256k1.c +++ b/src/secp256k1/src/secp256k1.c @@ -526,7 +526,7 @@ static int secp256k1_ecdsa_sign_inner(const secp256k1_context* ctx, secp256k1_sc break; } is_nonce_valid = secp256k1_scalar_set_b32_seckey(&non, nonce32); - /* The nonce is still secret here, but it being invalid is is less likely than 1:2^255. */ + /* The nonce is still secret here, but it being invalid is less likely than 1:2^255. */ secp256k1_declassify(ctx, &is_nonce_valid, sizeof(is_nonce_valid)); if (is_nonce_valid) { ret = secp256k1_ecdsa_sig_sign(&ctx->ecmult_gen_ctx, r, s, &sec, &msg, &non, recid);