aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorwellweek2024-03-08 15:01:12 +0100
committerGert Doering2024-03-08 16:46:24 +0100
commitad39f99f27522e622f408cc1a3323ba7d80907e8 (patch)
treee069a5f4471a0c0e208449b4061f65aba25e8998
parentbea088cf8ae3382aeed420da2a39f2a9f52df4cd (diff)
downloadopenvpn-ad39f99f27522e622f408cc1a3323ba7d80907e8.zip
openvpn-ad39f99f27522e622f408cc1a3323ba7d80907e8.tar.gz
remove repetitive words in documentation and comments
github: OpenVPN/openvpn/pull/517 Change-Id: I4f349963b41ebe155d3866da8955f2d7245d0394 Signed-off-by: wellweek <xiezitai@outlook.com> Acked-by: Frank Lichtenheld <frank@lichtenheld.com> Message-Id: <20240308140112.4015131-1-frank@lichtenheld.com> URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg28368.html Signed-off-by: Gert Doering <gert@greenie.muc.de>
-rw-r--r--Changes.rst2
-rw-r--r--contrib/OCSP_check/OCSP_check.sh2
-rw-r--r--doc/man-sections/cipher-negotiation.rst2
-rw-r--r--doc/man-sections/vpn-network-options.rst4
-rw-r--r--sample/sample-config-files/server.conf2
-rw-r--r--src/openvpn/fragment.h2
-rw-r--r--src/openvpn/misc.c2
-rw-r--r--src/openvpnserv/interactive.c2
8 files changed, 9 insertions, 9 deletions
diff --git a/Changes.rst b/Changes.rst
index 4cded98..54e5980 100644
--- a/Changes.rst
+++ b/Changes.rst
@@ -794,7 +794,7 @@ Control channel encryption (``--tls-crypt``)
Asynchronous push reply
Plug-ins providing support for deferred authentication can benefit from a more
responsive authentication where the server sends PUSH_REPLY immediately once
- the authentication result is ready, instead of waiting for the the client to
+ the authentication result is ready, instead of waiting for the client to
to send PUSH_REQUEST once more. This requires OpenVPN to be built with
``./configure --enable-async-push``. This is a compile-time only switch.
diff --git a/contrib/OCSP_check/OCSP_check.sh b/contrib/OCSP_check/OCSP_check.sh
index 2675788..e4fec83 100644
--- a/contrib/OCSP_check/OCSP_check.sh
+++ b/contrib/OCSP_check/OCSP_check.sh
@@ -89,7 +89,7 @@ if [ $check_depth -eq -1 ] || [ $cur_depth -eq $check_depth ]; then
#
# NOTE: It is needed to check the exit code of OpenSSL explicitly. OpenSSL
# can in some circumstances give a "good" result if it could not
- # reach the the OSCP server. In this case, the exit code will indicate
+ # reach the OSCP server. In this case, the exit code will indicate
# if OpenSSL itself failed or not. If OpenSSL's exit code is not 0,
# don't trust the OpenSSL status.
diff --git a/doc/man-sections/cipher-negotiation.rst b/doc/man-sections/cipher-negotiation.rst
index 888ffa6..949ff86 100644
--- a/doc/man-sections/cipher-negotiation.rst
+++ b/doc/man-sections/cipher-negotiation.rst
@@ -8,7 +8,7 @@ different backwards compatibility mechanism with older server and clients.
OpenVPN 2.5 and later behaviour
--------------------------------
When both client and server are at least running OpenVPN 2.5, that the order of
-the ciphers of the server's ``--data-ciphers`` is used to pick the the data cipher.
+the ciphers of the server's ``--data-ciphers`` is used to pick the data cipher.
That means that the first cipher in that list that is also in the client's
``--data-ciphers`` list is chosen. If no common cipher is found the client is rejected
with a AUTH_FAILED message (as seen in client log):
diff --git a/doc/man-sections/vpn-network-options.rst b/doc/man-sections/vpn-network-options.rst
index 41d367b..abe474f 100644
--- a/doc/man-sections/vpn-network-options.rst
+++ b/doc/man-sections/vpn-network-options.rst
@@ -235,7 +235,7 @@ routing.
address and subnet mask just as a physical ethernet adapter would be
similarly configured. If you are attempting to connect to a remote
ethernet bridge, the IP address and subnet should be set to values which
- would be valid on the the bridged ethernet segment (note also that DHCP
+ would be valid on the bridged ethernet segment (note also that DHCP
can be used for the same purpose).
This option, while primarily a proxy for the ``ifconfig``\(8) command,
@@ -584,7 +584,7 @@ These two standalone operations will require ``--dev`` and optionally
One of the advantages of persistent tunnels is that they eliminate the
need for separate ``--up`` and ``--down`` scripts to run the appropriate
``ifconfig``\(8) and ``route``\(8) commands. These commands can be
- placed in the the same shell script which starts or terminates an
+ placed in the same shell script which starts or terminates an
OpenVPN session.
Another advantage is that open connections through the TUN/TAP-based
diff --git a/sample/sample-config-files/server.conf b/sample/sample-config-files/server.conf
index 009fe56..97732c6 100644
--- a/sample/sample-config-files/server.conf
+++ b/sample/sample-config-files/server.conf
@@ -42,7 +42,7 @@ proto udp
# and bridged it with your ethernet interface.
# If you want to control access policies
# over the VPN, you must create firewall
-# rules for the the TUN/TAP interface.
+# rules for the TUN/TAP interface.
# On non-Windows systems, you can give
# an explicit unit number, such as tun0.
# On Windows, use "dev-node" for this.
diff --git a/src/openvpn/fragment.h b/src/openvpn/fragment.h
index cc6829a..2d13dbb 100644
--- a/src/openvpn/fragment.h
+++ b/src/openvpn/fragment.h
@@ -314,7 +314,7 @@ void fragment_free(struct fragment_master *f);
* reassembly buffer. If the incoming part completes the packet being
* reassembled, the \a buf argument is modified to point to the fully
* reassembled packet. If, on the other hand, reassembly is not yet
- * complete, then the the \a buf buffer is set to empty.
+ * complete, then the \a buf buffer is set to empty.
* - Any other value: error.
*
* If an error occurs during processing, an error message is logged and
diff --git a/src/openvpn/misc.c b/src/openvpn/misc.c
index 08f274d..ac6df65 100644
--- a/src/openvpn/misc.c
+++ b/src/openvpn/misc.c
@@ -129,7 +129,7 @@ auth_user_pass_mgmt(struct user_pass *up, const char *prefix, const unsigned int
* Parses an authentication challenge string and returns an auth_challenge_info structure.
* The authentication challenge string should follow the dynamic challenge/response protocol.
*
- * See doc/management-notes.txt for more info on the the dynamic challenge/response protocol
+ * See doc/management-notes.txt for more info on the dynamic challenge/response protocol
* implemented here.
*
* @param auth_challenge The authentication challenge string to parse. Can't be NULL.
diff --git a/src/openvpnserv/interactive.c b/src/openvpnserv/interactive.c
index 32c8996..a6a2c7c 100644
--- a/src/openvpnserv/interactive.c
+++ b/src/openvpnserv/interactive.c
@@ -1207,7 +1207,7 @@ CmpWString(LPVOID item, LPVOID str)
/**
* Set interface specific DNS domain suffix
- * @param if_name name of the the interface
+ * @param if_name name of the interface
* @param domain a single domain name
* @param lists pointer to the undo lists. If NULL
* undo lists are not altered.