diff --git a/algebra.h b/algebra.h index fed8e85f..9326ec6f 100644 --- a/algebra.h +++ b/algebra.h @@ -294,7 +294,7 @@ public: /// \brief Calculates the greatest common denominator in the ring /// \param a the first element /// \param b the second element - /// \return the the greatest common denominator of a and b. + /// \return the greatest common denominator of a and b. virtual const Element& Gcd(const Element &a, const Element &b) const; protected: diff --git a/arm_simd.h b/arm_simd.h index c2ccdacd..c7f2127e 100644 --- a/arm_simd.h +++ b/arm_simd.h @@ -28,7 +28,7 @@ /// The 0x00 indicates the low 64-bits of a and b /// are multiplied. /// \note An Intel XMM register is composed of 128-bits. The leftmost bit -/// is MSB and numbered 127, while the the rightmost bit is LSB and +/// is MSB and numbered 127, while the rightmost bit is LSB and /// numbered 0. /// \since Crypto++ 8.0 inline uint64x2_t PMULL_00(const uint64x2_t a, const uint64x2_t b) @@ -58,7 +58,7 @@ inline uint64x2_t PMULL_00(const uint64x2_t a, const uint64x2_t b) /// The 0x01 indicates the low 64-bits of a and high /// 64-bits of b are multiplied. /// \note An Intel XMM register is composed of 128-bits. The leftmost bit -/// is MSB and numbered 127, while the the rightmost bit is LSB and +/// is MSB and numbered 127, while the rightmost bit is LSB and /// numbered 0. /// \since Crypto++ 8.0 inline uint64x2_t PMULL_01(const uint64x2_t a, const uint64x2_t b) @@ -88,7 +88,7 @@ inline uint64x2_t PMULL_01(const uint64x2_t a, const uint64x2_t b) /// The 0x10 indicates the high 64-bits of a and low /// 64-bits of b are multiplied. /// \note An Intel XMM register is composed of 128-bits. The leftmost bit -/// is MSB and numbered 127, while the the rightmost bit is LSB and +/// is MSB and numbered 127, while the rightmost bit is LSB and /// numbered 0. /// \since Crypto++ 8.0 inline uint64x2_t PMULL_10(const uint64x2_t a, const uint64x2_t b) @@ -118,7 +118,7 @@ inline uint64x2_t PMULL_10(const uint64x2_t a, const uint64x2_t b) /// The 0x11 indicates the high 64-bits of a and b /// are multiplied. /// \note An Intel XMM register is composed of 128-bits. The leftmost bit -/// is MSB and numbered 127, while the the rightmost bit is LSB and +/// is MSB and numbered 127, while the rightmost bit is LSB and /// numbered 0. /// \since Crypto++ 8.0 inline uint64x2_t PMULL_11(const uint64x2_t a, const uint64x2_t b) diff --git a/cryptlib.h b/cryptlib.h index d86931a7..ba957f1f 100644 --- a/cryptlib.h +++ b/cryptlib.h @@ -1340,7 +1340,7 @@ public: /// \return the maximum length of encrypted data virtual lword MaxMessageLength() const =0; - /// \brief Provides the the maximum length of AAD + /// \brief Provides the maximum length of AAD /// \return the maximum length of AAD that can be input after the encrypted data virtual lword MaxFooterLength() const {return 0;} @@ -2725,7 +2725,7 @@ public: /// \param parameters a set of NameValuePairs to initialize this object /// \return the result of the decryption operation /// \details If DecodingResult::isValidCoding is true, then DecodingResult::messageLength - /// is valid and holds the the actual length of the plaintext recovered. The result is undefined + /// is valid and holds the actual length of the plaintext recovered. The result is undefined /// if decryption failed. If DecodingResult::isValidCoding is false, then DecodingResult::messageLength /// is undefined. /// \pre COUNTOF(plaintext) == MaxPlaintextLength(ciphertextLength) ensures the output @@ -2751,7 +2751,7 @@ public: /// \param parameters a set of NameValuePairs to initialize this object /// \return the result of the decryption operation /// \details If DecodingResult::isValidCoding is true, then DecodingResult::messageLength - /// is valid and holds the the actual length of the plaintext recovered. The result is undefined + /// is valid and holds the actual length of the plaintext recovered. The result is undefined /// if decryption failed. If DecodingResult::isValidCoding is false, then DecodingResult::messageLength /// is undefined. /// \pre COUNTOF(plaintext) == MaxPlaintextLength(ciphertextLength) ensures the output diff --git a/ec2n.h b/ec2n.h index b05377bb..1da17842 100644 --- a/ec2n.h +++ b/ec2n.h @@ -44,7 +44,7 @@ public: /// \brief Construct an EC2N from BER encoded parameters /// \param bt BufferedTransformation derived object - /// \details This constructor will decode and extract the the fields fieldID and curve of the sequence ECParameters + /// \details This constructor will decode and extract the fields fieldID and curve of the sequence ECParameters EC2N(BufferedTransformation &bt); /// \brief Encode the fields fieldID and curve of the sequence ECParameters diff --git a/ecp.h b/ecp.h index a5bdcd94..1dc02ab0 100644 --- a/ecp.h +++ b/ecp.h @@ -54,7 +54,7 @@ public: /// \brief Construct an ECP from BER encoded parameters /// \param bt BufferedTransformation derived object - /// \details This constructor will decode and extract the the fields + /// \details This constructor will decode and extract the fields /// fieldID and curve of the sequence ECParameters ECP(BufferedTransformation &bt); diff --git a/eprecomp.h b/eprecomp.h index d91d41d3..737a1569 100644 --- a/eprecomp.h +++ b/eprecomp.h @@ -90,14 +90,14 @@ public: virtual void Precompute(const DL_GroupPrecomputation &group, unsigned int maxExpBits, unsigned int storage) =0; /// \brief Retrieve previously saved precomputation - /// \param group the the group + /// \param group the group /// \param storedPrecomputation BufferedTransformation with the saved precomputation /// \throw NotImplemented /// \sa SupportsPrecomputation(), Precompute() virtual void Load(const DL_GroupPrecomputation &group, BufferedTransformation &storedPrecomputation) =0; /// \brief Save precomputation for later use - /// \param group the the group + /// \param group the group /// \param storedPrecomputation BufferedTransformation to write the precomputation /// \throw NotImplemented /// \sa SupportsPrecomputation(), Precompute() diff --git a/nbtheory.h b/nbtheory.h index 22bafa3c..2b29c4db 100644 --- a/nbtheory.h +++ b/nbtheory.h @@ -181,7 +181,7 @@ CRYPTOPP_DLL Integer CRYPTOPP_API CRT(const Integer &xp, const Integer &p, const /// \brief Calculate the Jacobi symbol /// \param a the first term /// \param b the second term -/// \return the the Jacobi symbol. +/// \return the Jacobi symbol. /// \details Jacobi symbols are calculated using the following rules: /// -# if b is prime, then Jacobi(a, b), then return 0 /// -# if a%b==0 AND a is quadratic residue mod b, then return 1 @@ -305,7 +305,7 @@ public: const Integer& SubPrime() const {return q;} /// \brief Retrieve the generator - /// \return Generator() returns the the generator g. + /// \return Generator() returns the generator g. const Integer& Generator() const {return g;} private: diff --git a/ossig.h b/ossig.h index 3b48af5d..ce9789b7 100644 --- a/ossig.h +++ b/ossig.h @@ -29,7 +29,7 @@ extern "C" { /// \brief Null signal handler function /// \param unused the signal number /// \details NullSignalHandler is provided as a stand alone function with external "C" linkage -/// and not a static member function due to the the member function's implicit +/// and not a static member function due to the member function's implicit /// external "C++" linkage. /// \sa SignalHandler, SignalHandlerFn extern "C" { diff --git a/ppc_simd.h b/ppc_simd.h index 65008066..84085618 100644 --- a/ppc_simd.h +++ b/ppc_simd.h @@ -2510,7 +2510,7 @@ inline uint64x2_p VecPolyMultiply(const uint64x2_p& a, const uint64x2_p& b) /// The 0x00 indicates the low 64-bits of a and b /// are multiplied. /// \note An Intel XMM register is composed of 128-bits. The leftmost bit -/// is MSB and numbered 127, while the the rightmost bit is LSB and numbered 0. +/// is MSB and numbered 127, while the rightmost bit is LSB and numbered 0. /// \par Wraps /// __vpmsumd, __builtin_altivec_crypto_vpmsumd and __builtin_crypto_vpmsumd. /// \since Crypto++ 8.0 @@ -2532,7 +2532,7 @@ inline uint64x2_p VecIntelMultiply00(const uint64x2_p& a, const uint64x2_p& b) /// The 0x01 indicates the low 64-bits of a and high /// 64-bits of b are multiplied. /// \note An Intel XMM register is composed of 128-bits. The leftmost bit -/// is MSB and numbered 127, while the the rightmost bit is LSB and numbered 0. +/// is MSB and numbered 127, while the rightmost bit is LSB and numbered 0. /// \par Wraps /// __vpmsumd, __builtin_altivec_crypto_vpmsumd and __builtin_crypto_vpmsumd. /// \since Crypto++ 8.0 @@ -2554,7 +2554,7 @@ inline uint64x2_p VecIntelMultiply01(const uint64x2_p& a, const uint64x2_p& b) /// The 0x10 indicates the high 64-bits of a and low /// 64-bits of b are multiplied. /// \note An Intel XMM register is composed of 128-bits. The leftmost bit -/// is MSB and numbered 127, while the the rightmost bit is LSB and numbered 0. +/// is MSB and numbered 127, while the rightmost bit is LSB and numbered 0. /// \par Wraps /// __vpmsumd, __builtin_altivec_crypto_vpmsumd and __builtin_crypto_vpmsumd. /// \since Crypto++ 8.0 @@ -2576,7 +2576,7 @@ inline uint64x2_p VecIntelMultiply10(const uint64x2_p& a, const uint64x2_p& b) /// The 0x11 indicates the high 64-bits of a and b /// are multiplied. /// \note An Intel XMM register is composed of 128-bits. The leftmost bit -/// is MSB and numbered 127, while the the rightmost bit is LSB and numbered 0. +/// is MSB and numbered 127, while the rightmost bit is LSB and numbered 0. /// \par Wraps /// __vpmsumd, __builtin_altivec_crypto_vpmsumd and __builtin_crypto_vpmsumd. /// \since Crypto++ 8.0 diff --git a/pssr.h b/pssr.h index 7122549d..ab34d899 100644 --- a/pssr.h +++ b/pssr.h @@ -66,8 +66,8 @@ template<> class PSSR_MEM_BaseWithHashId : public PSSR_MEM_Base {}; /// \tparam SALT_LEN length of the salt /// \tparam MIN_PAD_LEN minimum length of the pad /// \tparam USE_HASH_ID flag indicating whether the HashId is used -/// \details If ALLOW_RECOVERY is true, the the signature scheme provides message recovery. If -/// ALLOW_RECOVERY is false, the the signature scheme is appendix, and the message must be +/// \details If ALLOW_RECOVERY is true, the signature scheme provides message recovery. If +/// ALLOW_RECOVERY is false, the signature scheme is appendix, and the message must be /// provided during verification. /// \since Crypto++ 2.1 template diff --git a/pubkey.h b/pubkey.h index b959cd00..ca72bd19 100644 --- a/pubkey.h +++ b/pubkey.h @@ -87,7 +87,7 @@ public: /// \details The default implementation returns PreimageBound() - 1. virtual Integer MaxPreimage() const {return --PreimageBound();} /// \brief Returns the maximum size of a message after the trapdoor function is applied bound to a public key - /// \return the the maximum size of a message after the trapdoor function is applied bound to a public key + /// \return the maximum size of a message after the trapdoor function is applied bound to a public key /// \details The default implementation returns ImageBound() - 1. virtual Integer MaxImage() const {return --ImageBound();} }; @@ -692,7 +692,7 @@ public: /// \brief Generate and apply mask /// \param hash HashTransformation derived class /// \param output the destination byte array - /// \param outputLength the size fo the the destination byte array + /// \param outputLength the size fo the destination byte array /// \param input the message to hash /// \param inputLength the size of the message /// \param mask flag indicating whether to apply the mask @@ -703,7 +703,7 @@ public: /// \brief P1363 mask generation function /// \param hash HashTransformation derived class /// \param output the destination byte array -/// \param outputLength the size fo the the destination byte array +/// \param outputLength the size fo the destination byte array /// \param input the message to hash /// \param inputLength the size of the message /// \param derivationParams additional derivation parameters @@ -727,7 +727,7 @@ public: /// \brief P1363 mask generation function /// \param hash HashTransformation derived class /// \param output the destination byte array - /// \param outputLength the size fo the the destination byte array + /// \param outputLength the size fo the destination byte array /// \param input the message to hash /// \param inputLength the size of the message /// \param mask flag indicating whether to apply the mask @@ -751,7 +751,7 @@ class P1363_KDF2 public: /// \brief P1363 key derivation function /// \param output the destination byte array - /// \param outputLength the size fo the the destination byte array + /// \param outputLength the size fo the destination byte array /// \param input the message to hash /// \param inputLength the size of the message /// \param derivationParams additional derivation parameters diff --git a/rdrand.h b/rdrand.h index 93614a62..11d29ca9 100644 --- a/rdrand.h +++ b/rdrand.h @@ -20,7 +20,7 @@ // GenerateBlock unconditionally retries and always fulfills the request. // Throughput varies wildly depending on processor and manufacturer. A Core i5 or -// Core i7 RDRAND can generate at over 200 MiB/s. It is below the theroetical +// Core i7 RDRAND can generate at over 200 MiB/s. It is below theroetical // maximum, but it takes about 5 instructions to generate, retry and store a // result. A low-end Celeron may perform RDRAND at about 7 MiB/s. RDSEED // performs at about 1/4 to 1/2 the rate of RDRAND. AMD RDRAND performed poorly