with_vpnc_script="$(echo "${with_vpnc_script}" | sed s/\\\\/\\\\\\\\/g)"
fi
-AC_DEFINE_UNQUOTED(DEFAULT_VPNCSCRIPT, "${with_vpnc_script}", [Default vpnc-script locatin])
+AC_DEFINE_UNQUOTED(DEFAULT_VPNCSCRIPT, "${with_vpnc_script}", [Default vpnc-script location])
AC_SUBST(DEFAULT_VPNCSCRIPT, "${with_vpnc_script}")
AC_CHECK_FUNC(fdevname_r, [AC_DEFINE(HAVE_FDEVNAME_R, 1, [Have fdevname_r() function])], [])
printf("\n%s:\n", _("Server bugs"));
printf(" --no-external-auth %s\n", _("Do not offer or use auth methods requiring external browser"));
- printf(" --no-http-keepalive %s\n", _("Disable HTTP connection re-use"));
+ printf(" --no-http-keepalive %s\n", _("Disable HTTP connection reuse"));
printf(" --no-xmlpost %s\n", _("Do not attempt XML POST authentication"));
printf(" --allow-insecure-crypto %s\n", _("Allow use of the ancient, insecure 3DES and RC4 ciphers"));
static int next_option(int argc, char **argv, char **config_arg)
{
- /* These get re-used */
+ /* These get reused */
static char *line_buf; /* static variable initialised to NULL */
static size_t line_size; /* static variable initialised to 0 */
break;
case OPT_NO_HTTP_KEEPALIVE:
fprintf(stderr,
- _("Disabling all HTTP connection re-use due to --no-http-keepalive option.\n"
+ _("Disabling all HTTP connection reuse due to --no-http-keepalive option.\n"
"If this helps, please report to <%s>.\n"),
"openconnect-devel@lists.infradead.org");
vpninfo->no_http_keepalive = 1;
address range is in bytes 8-11 (starting address) and the highest address
of the range (traditionally a broadcast address) is in bytes 12-15.
- After the routing inforamation (in this example at 0xa4) comes another
+ After the routing information (in this example at 0xa4) comes another
length field, this time for the information elements which comprise
the rest of the packet. Not sure what the 03 00 00 00 at 0xa8 means;
it *could* be an element type 0x3000 with payload length zero but if it
int err;
/* If we're talking to a server which told us it has dynamic DNS, don't
- just re-use its previous IP address. If we're talking to a proxy, we
- can use *its* previous IP address. We expect it'll re-do the DNS
+ just reuse its previous IP address. If we're talking to a proxy, we
+ can use *its* previous IP address. We expect it'll redo the DNS
lookup for the server anyway. */
if (vpninfo->peer_addr && (!vpninfo->is_dyndns || vpninfo->proxy)) {
reconnect:
} while ( (len < (MAX_ADAPTER_NAME - 1)) && (ret == VALID_WINTUN_HANDLE) );
if (ret != VALID_WINTUN_HANDLE) {
- /* last test was not succesful*/
+ /* last test was not successful */
FreeLibrary(Wintun);
return 1;
}
such as <a href="https://savannah.nongnu.org/projects/lwip/">lwip</a>
to provide SOCKS access to the VPN, without requiring root privileges
at all.</p>
-<p>SOCKS proxy implementions suitable for being used from OpenConnect
+<p>SOCKS proxy implementations suitable for being used from OpenConnect
include:</p>
<ul>
<li><a href="https://github.com/cernekee/ocproxy">ocproxy</a></li>