aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSebastian Lackner2019-01-03 21:08:49 +0100
committerrfjakob2019-01-04 01:23:44 +0100
commitab169443fde9c6697b5b9dc010691cbc61cd5206 (patch)
tree1222df3b156bb665a0128ee80598a0dbd5c4f8bd
parentc1bd2626008ca1c27bcd139bac1d79792d9b1f20 (diff)
A few more spelling fixes.
Found with the 'codespell' utility.
-rw-r--r--README.md2
-rw-r--r--internal/fusefrontend/fs.go2
-rw-r--r--internal/nametransform/longnames.go2
3 files changed, 3 insertions, 3 deletions
diff --git a/README.md b/README.md
index cdd61e1..4552646 100644
--- a/README.md
+++ b/README.md
@@ -163,7 +163,7 @@ Changelog
v1.7-beta1, 2019-01-03
* **Fix possible symlink race attacks in forward mode** when using allow_other + plaintextnames
* If you use *both* `-allow_other` *and* `-plaintextnames`, you should upgrade.
- Malicous users could trick gocryptfs into modifying files outside of `CIPHERDIR`,
+ Malicious users could trick gocryptfs into modifying files outside of `CIPHERDIR`,
or reading files inside `CIPHERDIR` that they should not have access to.
* If you do not use `-plaintextnames` (disabled per default), these attacks do
not work as symlinks are encrypted.
diff --git a/internal/fusefrontend/fs.go b/internal/fusefrontend/fs.go
index c0a275f..af97333 100644
--- a/internal/fusefrontend/fs.go
+++ b/internal/fusefrontend/fs.go
@@ -269,7 +269,7 @@ func (fs *FS) Create(path string, flags uint32, mode uint32, context *fuse.Conte
return NewFile(f, fs)
}
-// Chmod - FUSE call. Change permissons on "path".
+// Chmod - FUSE call. Change permissions on "path".
//
// Symlink-safe through use of Fchmodat().
func (fs *FS) Chmod(path string, mode uint32, context *fuse.Context) (code fuse.Status) {
diff --git a/internal/nametransform/longnames.go b/internal/nametransform/longnames.go
index c17f121..fc97a26 100644
--- a/internal/nametransform/longnames.go
+++ b/internal/nametransform/longnames.go
@@ -101,7 +101,7 @@ func ReadLongNameAt(dirfd int, cName string) (string, error) {
return string(buf[0:n]), nil
}
-// DeleteLongName deletes "hashName.name" in the directory openend at "dirfd".
+// DeleteLongName deletes "hashName.name" in the directory opened at "dirfd".
//
// This function is symlink-safe through the use of Unlinkat().
func DeleteLongNameAt(dirfd int, hashName string) error {