Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: remove repetitive words #4004

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion common/src/lru.rs
Original file line number Diff line number Diff line change
Expand Up @@ -123,7 +123,7 @@ impl<K: PartialEq + Eq + Hash, V> LruCache<K, V> {
self.key_to_entry_index
.remove(&self.entries[index].as_ref().unwrap().0);

// Replace it with the new entry and put at at the front.
// Replace it with the new entry and put at the front.
self.entries[index] = Some((key.clone(), val));
self.key_to_entry_index.insert(key, index);
self.used_indexes.push_front(index);
Expand Down
2 changes: 1 addition & 1 deletion crypto/box/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ Decryption takes the private key and the cryptogram and repoduces the message.
Properties
----------

The `VersionedCryptoBox` object aims for semantic security at at least 128-bit security level,
The `VersionedCryptoBox` object aims for semantic security at least 128-bit security level,
and non-malleability of the cryptograms. The primitives used at current version are:

- Ristretto elliptic curve (`curve25519-dalek` crate) for key exchange
Expand Down
2 changes: 1 addition & 1 deletion fog/ocall_oram_storage/trusted/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -242,7 +242,7 @@ it is suitable for this purpose.

This AEAD-based ORAM memory interface idea seems novel and elegant, somewhat reducing the number of cryptographic components in the described design.

The two major implementation difficulties with the AEAD approach are are:
The two major implementation difficulties with the AEAD approach are:
- While the AES IV is 16 bytes, the AES-GCM IV is only 12 bytes. Neither of the values `block_idx` and `block_ctr` can be comfortably restricted to 4 bytes.
- An implementation might split the difference and truncate to 6 bytes, which might be okay.
- Alternatively, the implementation might hash `block_idx || block_ctr` down from 16 bytes to 12 bytes.
Expand Down
2 changes: 1 addition & 1 deletion util/ffi/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@
//! an allocated "owned" object is allocated by Rust code and passed back to
//! foreign code, that foreign code takes ownership (takes over responsibility
//! for disposing of the object), with the caveat that the actual memory
//! deallocation needs be be performed by the original allocator. In practice,
//! deallocation needs be performed by the original allocator. In practice,
//! this usually means that any time foreign code calls a Rust FFI function that
//! returns an owned object, the foreign code becomes responsible for later
//! calling the corresponding "free" function, usually taking the form of
Expand Down