diff --git a/doc/man-sections/connection-profiles.rst b/doc/man-sections/connection-profiles.rst index c8816e10a82..eb0532f4952 100644 --- a/doc/man-sections/connection-profiles.rst +++ b/doc/man-sections/connection-profiles.rst @@ -6,7 +6,7 @@ it will attempt to connect against. But there are some configuration options which are related to specific ``--remote`` options. For these use cases, connection profiles are the solution. -By enacpulating the ``--remote`` option and related options within +By encapsulating the ``--remote`` option and related options within ```` and ````, these options are handled as a group. diff --git a/sample/sample-config-files/server.conf b/sample/sample-config-files/server.conf index 84c1bfea89b..2f1962d7195 100644 --- a/sample/sample-config-files/server.conf +++ b/sample/sample-config-files/server.conf @@ -199,7 +199,7 @@ ifconfig-pool-persist ipp.txt # all clients to redirect their default # network gateway through the VPN, causing # all IP traffic such as web browsing and -# and DNS lookups to go through the VPN +# DNS lookups to go through the VPN # (The OpenVPN server machine may need to NAT # or bridge the TUN/TAP interface to the internet # in order for this to work properly). diff --git a/src/openvpn/options.c b/src/openvpn/options.c index c16124e13f6..d23c1797c4c 100644 --- a/src/openvpn/options.c +++ b/src/openvpn/options.c @@ -888,7 +888,7 @@ init_options(struct options *o, const bool init_gc) o->pkcs11_pin_cache_period = -1; #endif /* ENABLE_PKCS11 */ -/* P2MP server context features */ + /* P2MP server context features */ o->auth_token_generate = false; /* Set default --tmp-dir */ @@ -2969,7 +2969,7 @@ options_postprocess_verify_ce(const struct options *options, if (options->pkcs12_file) { #ifdef ENABLE_CRYPTO_MBEDTLS - msg(M_USAGE, "Parameter --pkcs12 cannot be used with the mbed TLS version version of OpenVPN."); + msg(M_USAGE, "Parameter --pkcs12 cannot be used with the mbed TLS version of OpenVPN."); #else if (options->ca_path) { @@ -2998,7 +2998,7 @@ options_postprocess_verify_ce(const struct options *options, #ifdef ENABLE_CRYPTO_MBEDTLS if (options->ca_path) { - msg(M_USAGE, "Parameter --capath cannot be used with the mbed TLS version version of OpenVPN."); + msg(M_USAGE, "Parameter --capath cannot be used with the mbed TLS version of OpenVPN."); } #endif /* ifdef ENABLE_CRYPTO_MBEDTLS */ if (pull)