It has since been ported to support the Juniper SSL VPN (which is now known as [Pulse Connect Secure](https://www.pulsesecure.net/products/connect-secure/)),
the [Palo Alto Networks GlobalProtect SSL VPN](https://www.paloaltonetworks.com/features/vpn)
the [F5 Big-IP SSL VPN](https://www.f5.com/products/big-ip-services),
-and the [Fortinet Fortigate SSL VPN](https://www.fortinet.com/products/vpn).</p>
+and the [Fortinet FortiGate SSL VPN](https://www.fortinet.com/products/vpn).</p>
An openconnect VPN server (ocserv), which implements an improved version of the Cisco AnyConnect protocol, has also been written.
You can find it on Gitlab at [https://gitlab.com/openconnect/ocserv](https://gitlab.com/openconnect/ocserv).
* were built again, but we might be run against a version which is
* newer. So some ancient compatibility code *can* be dropped at
* compile time. Likewise, if building against GnuTLS 2.x then we
- * can never be running agsinst a 3.x library — the soname changed.
+ * can never be running against a 3.x library — the soname changed.
*
* This macro was added upstream, gnutls_check_version_numeric,
* in 3.5.0 (see https://gitlab.com/gnutls/gnutls/commit/c8b40aeb) */
* connect, then return the result? */
break;
- /* No autocmplete for these but handle them explicitly so that
+ /* No autocomplete for these but handle them explicitly so that
* we can have automatic checking for *accidentally* unhandled
* options. Right after we do automated checking of man page
* entries and --help output for all supported options too. */
while (readable) {
int len, kmp, kmplen, iplen;
/* Some servers send us packets that are larger than
- negitiated MTU. We reserve some estra space to
+ negotiated MTU. We reserve some extra space to
handle that */
int receive_mtu = MAX(16384, vpninfo->ip_info.mtu);
&(vpninfo->dtls_ssl->d1->next_timeout));
#elif defined(BIO_CTRL_DGRAM_SET_TIMEOUT)
/*
- * OK, here it gets more fun... this shoul handle the case
+ * OK, here it gets more fun... this should handle the case
* of older OpenSSL which has the Cisco DTLS compatibility
* backported, but *not* the fix for RT#1922.
*/
if (hints.ai_flags & AI_NUMERICHOST)
free(hostname);
ssl_sock = -EINVAL;
- /* If we were just retrying for dynamic DNS, reconnct using
+ /* If we were just retrying for dynamic DNS, reconnect using
the previously-known IP address */
if (vpninfo->peer_addr) {
vpn_progress(vpninfo, PRG_ERR,
in the documentation, then that in itself is a little bit of a usability failure. Software should Just Work™.</p>
<p>So if you find something that is more complex than it needs to be, and you think it should
-Just Work™ then please don't hesistate to
+Just Work™ then please don't hesitate to
<a href="mailto:openconnect-devel@lists.infradead.org?subject=Usability improvement suggestion">tell us</a>
bout it.</p>
chall_len = tlvlen;
/* On later invocations, we know there must have been a
- * successfui authentication in the past. So try the same
+ * successful authentication in the past. So try the same
* hash first, and only retry in the loop on failure. */
if (!vpninfo->pcsc) {
struct oc_auth_form f;