* of the system. Even if the other end accepts, if GENSEC
* claims 'MORE_PROCESSING_REQUIRED' then you must keep
* feeding it blobs, or else the remote host/attacker might
- * avoid mutal authentication requirements.
+ * avoid mutual authentication requirements.
*
* Likewise, you must not feed GENSEC too much (after the OK),
* it doesn't like that either
* of the system. Even if the other end accepts, if GENSEC
* claims 'MORE_PROCESSING_REQUIRED' then you must keep
* feeding it blobs, or else the remote host/attacker might
- * avoid mutal authentication requirements.
+ * avoid mutual authentication requirements.
*
* Likewise, you must not feed GENSEC too much (after the OK),
* it doesn't like that either