* "monitor\x00\x00pan ha 0123456789:;<=>? !\"#$%&\'()*+,-./\x10\x11\x12\x13\x14\x15\x16\x17";
*
* 2) The ping packets are addressed to the IP supplied in the
- * config XML as as <gw-address>. In most cases, this is the
+ * config XML as <gw-address>. In most cases, this is the
* same as the *external* IP address of the VPN gateway
* (vpninfo->ip_info.gateway_addr), but in some cases it is a
* separate address.
if (srclen < 2) \
return -EINVAL; \
/* Explicit comparison with 8 to optimise it into a tautology \
- * in the the bits == 9 case, because the compiler doesn't \
+ * in the bits == 9 case, because the compiler doesn't
* know that bits_left can never be larger than 8. */ \
if (bits >= 8 || bits >= bits_left) { \
/* We need *all* the bits that are left in the current \
/* This string is static, valid only while the connection lasts. If you
* are going to cache this to remember which certs the user has accepted,
* make sure you also store the host/port for which it was accepted and
- * don't just accept this cert from *anywhere*. Also use use the check
+ * don't just accept this cert from *anywhere*. Also use the check
* function below instead of manually comparing. When this function
* returns a string which *doesn't* match the previously-stored hash
* matched with openconnect_check_peer_cert_hash(), you should store
}
/* If we aren't going to have one more turn around the mainloop,
- * set the wake event indices. And if we find the the rings have
+ * set the wake event indices. And if we find the rings have
* moved on while we're doing that, take one more turn around
* the mainloop... */
return did_work || set_ring_wake(vpninfo, 1) || set_ring_wake(vpninfo, 0);