diff options
author | Sebastian Lackner | 2018-12-27 13:40:28 +0100 |
---|---|---|
committer | rfjakob | 2018-12-27 18:34:26 +0100 |
commit | bf602f531a934cceddff16d73f853cf1d489f694 (patch) | |
tree | c4c9a5699da4087f638c2db830fcc1445cd2ff32 | |
parent | 29de895ef717e87548e7f8cad8fc8b7cebb4110e (diff) |
Assorted spelling fixes.
Detected with the 'codespell' utility.
-rw-r--r-- | docs/comparison.md | 4 | ||||
-rw-r--r-- | docs/forward_mode_crypto.md | 2 | ||||
-rw-r--r-- | docs/index.md | 2 | ||||
-rw-r--r-- | docs/reverse_mode_crypto.md | 2 | ||||
-rw-r--r-- | docs/threat_model.md | 2 |
5 files changed, 6 insertions, 6 deletions
diff --git a/docs/comparison.md b/docs/comparison.md index bbef3ae..cfc470c 100644 --- a/docs/comparison.md +++ b/docs/comparison.md @@ -80,7 +80,7 @@ which is why I converted it to html. <tr> <td>Lifecycle</td> <!-- gocryptfs --><td>Active</td> -<!-- encfs --><td>Maintainance</td> +<!-- encfs --><td>Maintenance</td> <!-- ecryptfs --><td>Active (<a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/log/fs/ecryptfs">ref</a>) </td> <!-- cryptomtr --><td>Active</td> <!-- securefs --><td>Active</td> @@ -206,7 +206,7 @@ The exact command lines for running the tests are defined in | Delete linux-3.0 | 3.0 s | 4.2 s | 4.4 s | 0.7 s | 145 s {2} | 2.2 s | 21 s | Notes: -{1} All file acesses to cryptomator go through the WebDAV protocol, which is less performance-oriented than FUSE. +{1} All file accesses to cryptomator go through the WebDAV protocol, which is less performance-oriented than FUSE.<br> However, an optimized WebDAV client may be able to significantly speed up small-file workloads.<br> {2} Tested using using wdfs, where I got the fastest results: <http://noedler.de/projekte/wdfs/>. davfs2 is very slow, fusedav does not compile on current Fedora.<br> diff --git a/docs/forward_mode_crypto.md b/docs/forward_mode_crypto.md index 77fdddc..1aa4065 100644 --- a/docs/forward_mode_crypto.md +++ b/docs/forward_mode_crypto.md @@ -62,7 +62,7 @@ directory as `gocryptfs.diriv`. File names are encrypted using AES-256-EME (ECB-Mix-ECB wide-block encryption, see [github.com/rfjakob/eme](https://github.com/rfjakob/eme) for details) with the directory IV -as initialization vector. EME fixes the prefix leak that occours with CBC +as initialization vector. EME fixes the prefix leak that occurs with CBC encryption.  diff --git a/docs/index.md b/docs/index.md index 9868645..c84c4d1 100644 --- a/docs/index.md +++ b/docs/index.md @@ -51,7 +51,7 @@ Release [v1.6.1](https://github.com/rfjakob/gocryptfs/releases) ([changelog](https://github.com/rfjakob/gocryptfs#changelog)) 2018-12-01 -gocryptfs is added to the offical Arch Linux repo +gocryptfs is added to the official Arch Linux repo ([commit](https://git.archlinux.org/svntogit/community.git/commit/trunk?h=packages/gocryptfs&id=1714dd305acbe2ada823f34fbaa390af11633086), [package info](https://www.archlinux.org/packages/community/x86_64/gocryptfs/)) diff --git a/docs/reverse_mode_crypto.md b/docs/reverse_mode_crypto.md index 758adb2..1bd5495 100644 --- a/docs/reverse_mode_crypto.md +++ b/docs/reverse_mode_crypto.md @@ -30,7 +30,7 @@ is hashed with SHA256 and truncated to 128 bits (source code  -All derived values are explicitely stored in the ciphertext, +All derived values are explicitly stored in the ciphertext, so that decryption requires no knowledge of the derivation algorithm. diff --git a/docs/threat_model.md b/docs/threat_model.md index ef1df7a..e70d805 100644 --- a/docs/threat_model.md +++ b/docs/threat_model.md @@ -109,7 +109,7 @@ As the file content is not tied to the file name in any way, Dragon can rename an encrypted file name to another valid encrypted file name. This effectively means that he can swap files. -gocryptfs has explicitely chosen not to tie the file content to +gocryptfs has explicitly chosen not to tie the file content to the file name to provide fast and reliable renames (renames are atomic in gocryptfs). |