Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion crypto/include/sodium/crypto_vrf_ietfdraft03.h
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@ int crypto_vrf_ietfdraft03_keypair(unsigned char *pk, unsigned char *sk);
// we call vrf_prove, the "secret key" our keygen function returns to the user
// will actually be the secret key with the public key appended. To avoid
// confusion, we'll use "seed" to refer to the 32-byte string called the "secret
// key" in the IETF spec, and "augmented secret key" to refer to the the 64-byte
// key" in the IETF spec, and "augmented secret key" to refer to the 64-byte
// string returned by our keygen function. libsodium's crypto_sign_ed25519
// takes the same approach.
//
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@ int crypto_vrf_ietfdraft03_keypair(unsigned char *pk, unsigned char *sk);
// we call vrf_prove, the "secret key" our keygen function returns to the user
// will actually be the secret key with the public key appended. To avoid
// confusion, we'll use "seed" to refer to the 32-byte string called the "secret
// key" in the IETF spec, and "augmented secret key" to refer to the the 64-byte
// key" in the IETF spec, and "augmented secret key" to refer to the 64-byte
// string returned by our keygen function. libsodium's crypto_sign_ed25519
// takes the same approach.
//
Expand Down
2 changes: 1 addition & 1 deletion crypto/secp256k1/libsecp256k1/src/asm/field_10x26_arm.s
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ Note:

- To avoid unnecessary loads and make use of available registers, two
'passes' have every time been interleaved, with the odd passes accumulating c' and d'
which will be added to c and d respectively in the the even passes
which will be added to c and d respectively in the even passes

*/

Expand Down
2 changes: 1 addition & 1 deletion daemon/kmd/config/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -104,7 +104,7 @@ func (k KMDConfig) Validate() error {
return nil
}

// LoadKMDConfig tries to read the the kmd configuration from disk, merging the
// LoadKMDConfig tries to read the kmd configuration from disk, merging the
// default kmd configuration with what it finds
func LoadKMDConfig(dataDir string) (cfg KMDConfig, err error) {
cfg = defaultConfig(dataDir)
Expand Down
2 changes: 1 addition & 1 deletion daemon/kmd/wallet/driver/sqlite_crypto.go
Original file line number Diff line number Diff line change
Expand Up @@ -232,7 +232,7 @@ func decryptBlobWithPassword(blob []byte, ptType plaintextType, password []byte)
// extractKeyWithIndex accepts the master derivation key and an index which
// specifies the key to be derived
func extractKeyWithIndex(derivationKey []byte, index uint64) (pk crypto.PublicKey, sk crypto.PrivateKey, err error) {
// The info tag is just the the utf-8 string representation of the index
// The info tag is just the utf-8 string representation of the index
info := []byte(fmt.Sprintf(hkdfInfoFormat, index))

// We can skip hkdf.Extract since our key is long and uniformly random
Expand Down
2 changes: 1 addition & 1 deletion data/pools/transactionPool.go
Original file line number Diff line number Diff line change
Expand Up @@ -640,7 +640,7 @@ func (pool *TransactionPool) addToPendingBlockEvaluatorOnce(txgroup []transactio
pool.assemblyMu.Lock()
defer pool.assemblyMu.Unlock()
if evalRnd := pool.pendingBlockEvaluator.Round(); pool.assemblyRound > evalRnd {
// the block we're assembling now isn't the one the the AssembleBlock is waiting for. While it would be really cool
// the block we're assembling now isn't the one the AssembleBlock is waiting for. While it would be really cool
// to finish generating the block, it would also be pointless to spend time on it.
// we're going to set the ok and assemblyCompletedOrAbandoned to "true" so we can complete this loop asap
pool.assemblyResults.ok = true
Expand Down
2 changes: 1 addition & 1 deletion data/transactions/logic/evalStateful_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -1107,7 +1107,7 @@ int 4141
==
`
// check that even during application creation (Txn.ApplicationID == 0)
// we will use the the kvCow if the exact application ID (100) is
// we will use the kvCow if the exact application ID (100) is
// specified in the transaction
now.TxnGroup[0].Txn.ApplicationID = 0
now.TxnGroup[0].Txn.ForeignApps = []basics.AppIndex{100}
Expand Down
2 changes: 1 addition & 1 deletion ledger/boxtxn_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -772,7 +772,7 @@ func testNewAppBoxCreate(t *testing.T, requestedTealVersion int) {
// transaction counter, so it can know what the later create will be,
// and compute it's app address.

// 2) a) Use the the predicted appID to name the box ref.
// 2) a) Use the predicted appID to name the box ref.
// or b) Use 0 as the app in the box ref, meaning "this app"
// or c) EnableUnnamedBoxCreate will allow such a creation if there are empty box refs.

Expand Down
2 changes: 1 addition & 1 deletion ledger/catchpointtracker_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -2110,7 +2110,7 @@ func TestMakeCatchpointFilePath(t *testing.T) {
// deadlock detection) and concurrent reads (from transaction evaluation, stake lookups, etc) can
// cause the SQLite implementation in util/db/dbutil.go to retry the function looping over all
// tracker commitRound implementations. Since catchpointtracker' commitRound updates a merkle trie's
// DB storage and its in-memory cache, the retry can cause the the balancesTrie's cache to become
// DB storage and its in-memory cache, the retry can cause the balancesTrie's cache to become
// corrupted and out of sync with the DB (which uses transaction rollback between retries). The
// merkle trie corruption manifests as error log messages like:
// - "attempted to add duplicate hash 'X' to merkle trie for account Y"
Expand Down
2 changes: 1 addition & 1 deletion ledger/simulation/simulation_eval_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -9033,7 +9033,7 @@ func TestFixSigners(t *testing.T) {
txn ApplicationID
bz end

// Rekey to the the innerRekeyAddr
// Rekey to the innerRekeyAddr
itxn_begin
int pay
itxn_field TypeEnum
Expand Down
2 changes: 1 addition & 1 deletion logging/cyclicWriter.go
Original file line number Diff line number Diff line change
Expand Up @@ -118,7 +118,7 @@ func procWait(cmd *exec.Cmd, cause string) {
}
}

// Write ensures the the underlying file can store an additional len(p) bytes. If there is not enough room left it seeks
// Write ensures the underlying file can store an additional len(p) bytes. If there is not enough room left it seeks
// to the beginning of the file.
func (cyclic *CyclicFileWriter) Write(p []byte) (n int, err error) {
cyclic.mu.Lock()
Expand Down
2 changes: 1 addition & 1 deletion logging/telemetry.go
Original file line number Diff line number Diff line change
Expand Up @@ -115,7 +115,7 @@ func ReadTelemetryConfigOrDefault(dataDir string, globalDir string) (cfg Telemet
// Create an ephemeral config
cfg = createTelemetryConfig()

// If the error was that the the config wasn't there then it wasn't really an error
// If the error was that the config wasn't there then it wasn't really an error
if os.IsNotExist(err) {
err = nil
} else {
Expand Down
4 changes: 2 additions & 2 deletions shared/algoh/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -83,13 +83,13 @@ func LoadConfigFromFile(file string) (cfg HostConfig, err error) {
return cfg, err
}

// Save pretty-prints the configuration into the the specified file.
// Save pretty-prints the configuration into the specified file.
func (cfg HostConfig) Save(file string) error {
prettyPrint := true
return codecs.SaveObjectToFile(file, cfg, prettyPrint)
}

// Dump pretty-prints the configuration into the the specified stream.
// Dump pretty-prints the configuration into the specified stream.
func (cfg HostConfig) Dump(stream io.Writer) {
enc := codecs.NewFormattedJSONEncoder(stream)
enc.Encode(cfg)
Expand Down
2 changes: 1 addition & 1 deletion test/e2e-go/features/catchup/basicCatchup_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -332,7 +332,7 @@ func shutdownClonedNode(nodeDataDir string, f *fixtures.RestClientFixture, t *te
}
}

// TestBasicCatchupCompletes confirms the the catchup eventually completes and stops.
// TestBasicCatchupCompletes confirms the catchup eventually completes and stops.
func TestBasicCatchupCompletes(t *testing.T) {
partitiontest.PartitionTest(t)
defer fixtures.ShutdownSynchronizedTest(t)
Expand Down
2 changes: 1 addition & 1 deletion test/scripts/e2e_subs/asset-misc.sh
Original file line number Diff line number Diff line change
Expand Up @@ -112,7 +112,7 @@ else
echo ok
fi

# case 3b: Reserve address opts into the the asset, and gets asset info successfully.
# case 3b: Reserve address opts into the asset, and gets asset info successfully.
${gcmd} asset optin --creator "${ACCOUNT}" --asset dma --account ${ACCOUNTC}
DIFF_MANAGER_ASSET_ID=$(${gcmd} asset info --creator $ACCOUNT --unitname dma|grep 'Asset ID'|awk '{ print $3 }')

Expand Down
2 changes: 1 addition & 1 deletion tools/network/dnssec/client.go
Original file line number Diff line number Diff line change
Expand Up @@ -87,7 +87,7 @@ func (r *dnsClient) query(ctx context.Context, name string, qtype uint16) (resp
return nil, fmt.Errorf("no answer for (%s, %d) from DNS servers %v", name, qtype, r.servers)
}

// QueryRRSet returns resource records of qtype for name and and its signatures
// QueryRRSet returns resource records of qtype for name and its signatures
func (r *dnsClient) QueryRRSet(ctx context.Context, name string, qtype uint16) ([]dns.RR, []dns.RRSIG, error) {
msg, err := r.query(ctx, name, qtype)
if err != nil {
Expand Down
2 changes: 1 addition & 1 deletion tools/network/resolver.go
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ const (

// Resolver provides equivalent functionality to the net.Resolver with one exception - it allows to use a provided DNS server instead of relying on the existing default resolver.
type Resolver struct {
// DNSAddress is the the DNS server that we'll be trying to connect to.
// DNSAddress is the DNS server that we'll be trying to connect to.
dnsAddress net.IPAddr
resolver ResolverIf
}
Expand Down
6 changes: 3 additions & 3 deletions util/metrics/counter_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -66,7 +66,7 @@ func TestMetricCounter(t *testing.T) {

test.Lock()
defer test.Unlock()
// the the loop above we've created a single metric name with five different labels set ( host0, host1 .. host 4)
// the loop above we've created a single metric name with five different labels set ( host0, host1 .. host 4)
// let's see if we received all the 5 different labels.
require.Equal(t, 5, len(test.metrics), "Missing metric counts were reported: %+v", test.metrics)

Expand Down Expand Up @@ -113,7 +113,7 @@ func TestMetricCounterFastInts(t *testing.T) {

test.Lock()
defer test.Unlock()
// the the loop above we've created a single metric name with five different labels set ( host0, host1 .. host 4)
// the loop above we've created a single metric name with five different labels set ( host0, host1 .. host 4)
// let's see if we received all the 5 different labels.
require.Equal(t, 1, len(test.metrics), "Missing metric counts were reported: %+v", test.metrics)

Expand Down Expand Up @@ -162,7 +162,7 @@ func TestMetricCounterMixed(t *testing.T) {

test.Lock()
defer test.Unlock()
// the the loop above we've created a single metric name with five different labels set ( host0, host1 .. host 4)
// the loop above we've created a single metric name with five different labels set ( host0, host1 .. host 4)
// let's see if we received all the 5 different labels.
require.Equal(t, 1, len(test.metrics), "Missing metric counts were reported: %+v", test.metrics)

Expand Down
2 changes: 1 addition & 1 deletion util/metrics/gauge_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -68,7 +68,7 @@ func TestMetricGauge(t *testing.T) {

test.Lock()
defer test.Unlock()
// the the loop above we've created 3 separate gauges
// the loop above we've created 3 separate gauges
// let's see if we received all 3 metrics
require.Equal(t, 3, len(test.metrics), "Missing metric counts were reported: %+v", test.metrics)

Expand Down
Loading