| 
 Copyright (C) 2012, 2013 James McLaughlin et al.  All rights reserved.
- 
+
 Redistribution and use in source and binary forms, with or without
 modification, are permitted provided that the following conditions
 are met:
diff --git a/www/mail.xml b/www/mail.xml
index f2b8cc50..7d40f3c2 100644
--- a/www/mail.xml
+++ b/www/mail.xml
@@ -47,7 +47,7 @@
 	  If you are posting debugging output from openconnect to the mailing list, do not include a line which looks like this:
 	  sha256:0x53656372657453656372657421
   sha512:0x53656372657453656372657421Set-Cookie: webvpn=835278264@921600@1221512527@6B9EC24DEB2F59E242F75B424D42F223D0912984;PATH=/
 That HTTP cookie is all that's needed to grant access to the VPN session you just logged in to —
-	  it's almost as bad as giving your password away. Version 2.26 or later of OpenConnect will 
+	  it's almost as bad as giving your password away. Version 2.26 or later of OpenConnect will
 	  automatically filter this out of the debugging output for you.
 For Juniper VPN, the equivalent is a DSID cookie, which is not yet filtered
diff --git a/www/platforms.xml b/www/platforms.xml
index 2b2d1764..3812c42b 100644
--- a/www/platforms.xml
+++ b/www/platforms.xml
@@ -14,7 +14,7 @@
  OpenConnect is known to work, with both IPv6 and Legacy IP, on Linux
 (including
 Android), OpenBSD, FreeBSD (including Debian GNU/kFreeBSD), NetBSD,
-DragonFly BSD, OpenIndiana/OpenSolaris, Solaris 10/11, Windows and 
+DragonFly BSD, OpenIndiana/OpenSolaris, Solaris 10/11, Windows and
 Mac OS X platforms, and should be trivially portable to any other platform
 supporting TUN/TAP devices
 and on which GnuTLS or
diff --git a/www/styles/main.css b/www/styles/main.css
index 43ea8bb9..b9465d8b 100644
--- a/www/styles/main.css
+++ b/www/styles/main.css
@@ -1,7 +1,7 @@
 body {
     background: white;
     font-family: 'Raleway', Sans, Arial, Helvetica, Geneva, Swiss, SunSans-Regular;
-    font-size: 12px; 
+    font-size: 12px;
 }
 
 #logo {
@@ -56,9 +56,9 @@ body {
 }
 
 #menu1 .nonsel a:hover span {
-    color: Black;    
-    text-decoration: underline; 
-    background: url(../images/rightsel.png) top right no-repeat transparent;    
+    color: Black;
+    text-decoration: underline;
+    background: url(../images/rightsel.png) top right no-repeat transparent;
 }
 
 #menu1 .sel a {
@@ -67,7 +67,7 @@ body {
     padding-top: 0.2em;
     background: url(../images/leftsel.png) top left no-repeat #e6e6e6;
     margin-top: 0.2em;
-    margin-left: 5px;    
+    margin-left: 5px;
     height: 2em;
     text-decoration: none;
 }
@@ -106,9 +106,9 @@ body {
 }
 
 #menu2 .nonsel a:hover span {
-    color: Black;    
-    text-decoration: underline; 
-    background: url(../images/rightsel2.png) top right no-repeat transparent;    
+    color: Black;
+    text-decoration: underline;
+    background: url(../images/rightsel2.png) top right no-repeat transparent;
 }
 
 #menu2 .sel a {
@@ -116,7 +116,7 @@ body {
     float: left;
     padding: 0.2em 1em 0 1em;
     margin-top: 0.2em;
-    margin-left: 0px;    
+    margin-left: 0px;
     height: 2em;
     text-decoration: none;
 }
@@ -130,13 +130,13 @@ body {
     padding-left: 20px;
     padding-right: 120px;	
     padding-bottom: 20px;	
-    font-size: 14px; 
+    font-size: 14px;
 }
 
 #text {
     margin: 0;
     border-color: #e6e6e6;
-    font-size: 14px; 
+    font-size: 14px;
     background: #ffffff;
 }
 
diff --git a/www/token.xml b/www/token.xml
index d484173a..d3d2fa24 100644
--- a/www/token.xml
+++ b/www/token.xml
@@ -30,7 +30,7 @@ argument, and the precise form it takes is dependent on the type of
 token as described below. For the openconnect command line program, if the first character of
 the --token-secret value is / or @, the argument is interpreted as a
-filename. The secret data will be loaded from (and potentially saved back 
+filename. The secret data will be loaded from (and potentially saved back
 to, in the case of HOTP tokens) the specifed file. In each case, the automatic token generation will be tried twice before it
@@ -46,7 +46,7 @@ in which it is not appropriate, please let us know. If no --token-secret argument is provided in SecurID mode, the
 default .stokenrc file from the user's home directory will be used.
 For the NetworkManager integration, this is a separate choice for the token
-type â the UI has separate choices for "RSA SecurID - read from ~/.stokenrc" vs. 
+type â the UI has separate choices for "RSA SecurID - read from ~/.stokenrc" vs.
 "RSA SecurID - manually entered". If a token is provided â either directly on the command line, as the contents
@@ -126,13 +126,13 @@ They may be specified in one of the following forms: This is the hexadecimal form which (without the leading 0x) is
-  accepted by default by the 
+  accepted by default by the
   oathtool
   program.
   base32:KNSWG4TFORJWKY3SMV2CC===
   sha256:base32:KNSWG4TFORJWKY3SMV2CC===
   sha512:base32:KNSWG4TFORJWKY3SMV2CC===
 -  This is the base32 form which is accepted by the 
+  This is the base32 form which is accepted by the
   oathtool
   program with its -b option..
   <?xml version=...
 
 |