]> www.infradead.org Git - users/dwmw2/openconnect.git/commitdiff
Fix typos not found by codespell
authorDimitri Papadopoulos <3350651-DimitriPapadopoulos@users.noreply.gitlab.com>
Sat, 12 Feb 2022 10:12:24 +0000 (11:12 +0100)
committerDimitri Papadopoulos <3350651-DimitriPapadopoulos@users.noreply.gitlab.com>
Sat, 12 Feb 2022 10:17:48 +0000 (11:17 +0100)
Signed-off-by: Dimitri Papadopoulos <3350651-DimitriPapadopoulos@users.noreply.gitlab.com>
README.md
gnutls.h
main.c
oncp.c
openssl-dtls.c
ssl.c
www/contribute.xml
yubikey.c

index 864270f039c43f22105c42cea13c3da2925c555a..492176d02d9bd165709bfbabb2c555c8503da807 100644 (file)
--- a/README.md
+++ b/README.md
@@ -5,7 +5,7 @@ OpenConnect is an SSL VPN client initially created to support [Cisco's AnyConnec
 It has since been ported to support the Juniper SSL VPN (which is now known as [Pulse Connect Secure](https://www.pulsesecure.net/products/connect-secure/)),
 the [Palo Alto Networks GlobalProtect SSL VPN](https://www.paloaltonetworks.com/features/vpn)
 the [F5 Big-IP SSL VPN](https://www.f5.com/products/big-ip-services),
-and the [Fortinet Fortigate SSL VPN](https://www.fortinet.com/products/vpn).</p>
+and the [Fortinet FortiGate SSL VPN](https://www.fortinet.com/products/vpn).</p>
 
 An openconnect VPN server (ocserv), which implements an improved version of the Cisco AnyConnect protocol, has also been written.
 You can find it on Gitlab at [https://gitlab.com/openconnect/ocserv](https://gitlab.com/openconnect/ocserv).
index 94262cfa0569004db5f05d5e039340605105496d..e2f1fbe0342dde204333287bb4b5562963838f2c 100644 (file)
--- a/gnutls.h
+++ b/gnutls.h
@@ -64,7 +64,7 @@ char *get_gnutls_cipher(gnutls_session_t session);
  * were built again, but we might be run against a version which is
  * newer. So some ancient compatibility code *can* be dropped at
  * compile time. Likewise, if building against GnuTLS 2.x then we
- * can never be running agsinst a 3.x library — the soname changed.
+ * can never be running against a 3.x library — the soname changed.
  *
  * This macro was added upstream, gnutls_check_version_numeric,
  * in 3.5.0 (see https://gitlab.com/gnutls/gnutls/commit/c8b40aeb) */
diff --git a/main.c b/main.c
index e9398ca932b66009c29b9823ad999c795a0a8f8f..65be6a2f1e1d791567dfddde9cf1de7c1feb2ca4 100644 (file)
--- a/main.c
+++ b/main.c
@@ -1453,7 +1453,7 @@ static int autocomplete(int argc, char **argv)
                                 * connect, then return the result? */
                                break;
 
-                       /* No autocmplete for these but handle them explicitly so that
+                       /* No autocomplete for these but handle them explicitly so that
                         * we can have automatic checking for *accidentally* unhandled
                         * options. Right after we do automated checking of man page
                         * entries and --help output for all supported options too. */
diff --git a/oncp.c b/oncp.c
index 8fbb1b4f4a7fcc709bfa86a04509019d76309ce4..9ff1b22e49f930dfcd9357df1eb0d2b56bb7e071 100644 (file)
--- a/oncp.c
+++ b/oncp.c
@@ -858,7 +858,7 @@ int oncp_mainloop(struct openconnect_info *vpninfo, int *timeout, int readable)
        while (readable) {
                int len, kmp, kmplen, iplen;
                /* Some servers send us packets that are larger than
-                  negitiated MTU. We reserve some estra space to
+                  negotiated MTU. We reserve some extra space to
                   handle that */
                int receive_mtu = MAX(16384, vpninfo->ip_info.mtu);
 
index 059e4ba7c5b7008c37fb40ee277027c6060c96ab..f9b728c17dbb29132448d18ac42553df9bd41488 100644 (file)
@@ -734,7 +734,7 @@ int dtls_try_handshake(struct openconnect_info *vpninfo, int *timeout)
                         &(vpninfo->dtls_ssl->d1->next_timeout));
 #elif defined(BIO_CTRL_DGRAM_SET_TIMEOUT)
                /*
-                * OK, here it gets more fun... this shoul handle the case
+                * OK, here it gets more fun... this should handle the case
                 * of older OpenSSL which has the Cisco DTLS compatibility
                 * backported, but *not* the fix for RT#1922.
                 */
diff --git a/ssl.c b/ssl.c
index 69895aad13357db4351ea02f3a967d5eeae687d2..9e223504274d0e63a1e1d4a9c1422eb92c87617e 100644 (file)
--- a/ssl.c
+++ b/ssl.c
@@ -349,7 +349,7 @@ int connect_https_socket(struct openconnect_info *vpninfo)
                        if (hints.ai_flags & AI_NUMERICHOST)
                                free(hostname);
                        ssl_sock = -EINVAL;
-                       /* If we were just retrying for dynamic DNS, reconnct using
+                       /* If we were just retrying for dynamic DNS, reconnect using
                           the previously-known IP address */
                        if (vpninfo->peer_addr) {
                                vpn_progress(vpninfo, PRG_ERR,
index c9153b4bdd0dd1d50842e46d67b33e3553c3083a..22b275c9f83727841b1d0b0e9b9458a5dcbe08ff 100644 (file)
@@ -84,7 +84,7 @@ to say that we don't have documentation. But if a user finds something non-obvio
 in the documentation, then that in itself is a little bit of a usability failure. Software should Just Work™.</p>
 
 <p>So if you find something that is more complex than it needs to be, and you think it should
-Just Work™ then please don't hesistate to
+Just Work™ then please don't hesitate to
 <a href="mailto:openconnect-devel@lists.infradead.org?subject=Usability improvement suggestion">tell us</a>
 bout it.</p>
 
index dbe6fbf25dfbff51ac67f39c578a5a55be86fc80..7def1bd1c8ddbcafa0d18c655177f83f2297a5c4 100644 (file)
--- a/yubikey.c
+++ b/yubikey.c
@@ -212,7 +212,7 @@ static int select_yubioath_applet(struct openconnect_info *vpninfo,
                chall_len = tlvlen;
 
                /* On later invocations, we know there must have been a
-                * successfui authentication in the past. So try the same
+                * successful authentication in the past. So try the same
                 * hash first, and only retry in the loop on failure. */
                if (!vpninfo->pcsc) {
                        struct oc_auth_form f;