0
0
mirror of https://github.com/OpenVPN/openvpn.git synced 2024-09-19 19:42:30 +02:00

Fix missing spaces in various messages

These result from broken up literals where it
is easy to miss the missing space.

Change-Id: Ic27d84c74c1dd6ff7973ca6966d186f475c67e21
Signed-off-by: Frank Lichtenheld <frank@lichtenheld.com>
Acked-by: Gert Doering <gert@greenie.muc.de>
Message-Id: <20240722121034.10816-1-gert@greenie.muc.de>
URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg28950.html
Signed-off-by: Gert Doering <gert@greenie.muc.de>
This commit is contained in:
Frank Lichtenheld 2024-07-22 14:10:34 +02:00 committed by Gert Doering
parent 37b696a207
commit 824fe9ce49
4 changed files with 10 additions and 10 deletions

View File

@ -185,7 +185,7 @@ dco_update_keys(dco_context_t *dco, struct tls_multi *multi)
}
else
{
msg(D_DCO_DEBUG, "Swapping primary and secondary keys to"
msg(D_DCO_DEBUG, "Swapping primary and secondary keys to "
"primary-id=%d secondary-id=(to be deleted)",
primary->key_id);
}

View File

@ -1804,7 +1804,7 @@ multi_client_set_protocol_options(struct context *c)
}
else if (dco_enabled(o))
{
msg(M_INFO, "Client does not support DATA_V2. Data channel offloaing "
msg(M_INFO, "Client does not support DATA_V2. Data channel offloading "
"requires DATA_V2. Dropping client.");
auth_set_client_reason(tls_multi, "Data channel negotiation "
"failed (missing DATA_V2)");
@ -1815,7 +1815,7 @@ multi_client_set_protocol_options(struct context *c)
* not accept our pushed ciphers */
if (proto & IV_PROTO_NCP_P2P)
{
msg(M_WARN, "Note: peer reports running in P2P mode (no --pull/--client"
msg(M_WARN, "Note: peer reports running in P2P mode (no --pull/--client "
"option). It will not negotiate ciphers with this server. "
"Expect this connection to fail.");
}
@ -2027,7 +2027,7 @@ ccs_test_deferred_ret_file(struct multi_instance *mi)
/* Not EOF but other error -> fall through to error state */
default:
/* We received an unknown/unexpected value. Assume failure. */
msg(M_WARN, "WARNING: Unknown/unexpected value in deferred"
msg(M_WARN, "WARNING: Unknown/unexpected value in deferred "
"client-connect resultfile");
ret = CC_RET_FAILED;
}
@ -2427,7 +2427,7 @@ multi_client_connect_late_setup(struct multi_context *m,
*/
if (!mi->context.c2.push_ifconfig_defined)
{
msg(D_MULTI_ERRORS, "MULTI: no dynamic or static remote"
msg(D_MULTI_ERRORS, "MULTI: no dynamic or static remote "
"--ifconfig address is available for %s",
multi_instance_string(mi, false, &gc));
}
@ -2443,7 +2443,7 @@ multi_client_connect_late_setup(struct multi_context *m,
print_in_addr_t(mi->context.options.push_ifconfig_constraint_netmask, 0, &gc);
/* JYFIXME -- this should cause the connection to fail */
msg(D_MULTI_ERRORS, "MULTI ERROR: primary virtual IP for %s (%s)"
msg(D_MULTI_ERRORS, "MULTI ERROR: primary virtual IP for %s (%s) "
"violates tunnel network/netmask constraint (%s/%s)",
multi_instance_string(mi, false, &gc),
print_in_addr_t(mi->context.c2.push_ifconfig_local, 0, &gc),
@ -2492,7 +2492,7 @@ multi_client_connect_late_setup(struct multi_context *m,
}
else if (mi->context.options.iroutes)
{
msg(D_MULTI_ERRORS, "MULTI: --iroute options rejected for %s -- iroute"
msg(D_MULTI_ERRORS, "MULTI: --iroute options rejected for %s -- iroute "
"only works with tun-style tunnels",
multi_instance_string(mi, false, &gc));
}

View File

@ -7033,7 +7033,7 @@ add_option(struct options *options,
}
else if (streq(p[0], "max-routes") && !p[2])
{
msg(M_WARN, "DEPRECATED OPTION: --max-routes option ignored."
msg(M_WARN, "DEPRECATED OPTION: --max-routes option ignored. "
"The number of routes is unlimited as of OpenVPN 2.4. "
"This option will be removed in a future version, "
"please remove it from your configuration.");
@ -9328,7 +9328,7 @@ add_option(struct options *options,
s++;
}
msg(M_WARN, "DEPRECATED FEATURE: automatically upcased the "
"--x509-username-field parameter to '%s'; please update your"
"--x509-username-field parameter to '%s'; please update your "
"configuration", p[j]);
}
}

View File

@ -717,7 +717,7 @@ verify_cert(struct tls_session *session, openvpn_x509_cert_t *cert, int cert_dep
{
const char *hex_fp = format_hex_ex(BPTR(&cert_fp), BLEN(&cert_fp),
0, 1, ":", &gc);
msg(D_TLS_ERRORS, "TLS Error: --tls-verify/--peer-fingerprint"
msg(D_TLS_ERRORS, "TLS Error: --tls-verify/--peer-fingerprint "
"certificate hash verification failed. (got certificate "
"fingerprint: %s)", hex_fp);
goto cleanup;