diff options
author | Sebastian Lackner | 2019-01-03 21:08:49 +0100 |
---|---|---|
committer | rfjakob | 2019-01-04 01:23:44 +0100 |
commit | ab169443fde9c6697b5b9dc010691cbc61cd5206 (patch) | |
tree | 1222df3b156bb665a0128ee80598a0dbd5c4f8bd | |
parent | c1bd2626008ca1c27bcd139bac1d79792d9b1f20 (diff) |
A few more spelling fixes.
Found with the 'codespell' utility.
-rw-r--r-- | README.md | 2 | ||||
-rw-r--r-- | internal/fusefrontend/fs.go | 2 | ||||
-rw-r--r-- | internal/nametransform/longnames.go | 2 |
3 files changed, 3 insertions, 3 deletions
@@ -163,7 +163,7 @@ Changelog v1.7-beta1, 2019-01-03 * **Fix possible symlink race attacks in forward mode** when using allow_other + plaintextnames * If you use *both* `-allow_other` *and* `-plaintextnames`, you should upgrade. - Malicous users could trick gocryptfs into modifying files outside of `CIPHERDIR`, + Malicious users could trick gocryptfs into modifying files outside of `CIPHERDIR`, or reading files inside `CIPHERDIR` that they should not have access to. * If you do not use `-plaintextnames` (disabled per default), these attacks do not work as symlinks are encrypted. diff --git a/internal/fusefrontend/fs.go b/internal/fusefrontend/fs.go index c0a275f..af97333 100644 --- a/internal/fusefrontend/fs.go +++ b/internal/fusefrontend/fs.go @@ -269,7 +269,7 @@ func (fs *FS) Create(path string, flags uint32, mode uint32, context *fuse.Conte return NewFile(f, fs) } -// Chmod - FUSE call. Change permissons on "path". +// Chmod - FUSE call. Change permissions on "path". // // Symlink-safe through use of Fchmodat(). func (fs *FS) Chmod(path string, mode uint32, context *fuse.Context) (code fuse.Status) { diff --git a/internal/nametransform/longnames.go b/internal/nametransform/longnames.go index c17f121..fc97a26 100644 --- a/internal/nametransform/longnames.go +++ b/internal/nametransform/longnames.go @@ -101,7 +101,7 @@ func ReadLongNameAt(dirfd int, cName string) (string, error) { return string(buf[0:n]), nil } -// DeleteLongName deletes "hashName.name" in the directory openend at "dirfd". +// DeleteLongName deletes "hashName.name" in the directory opened at "dirfd". // // This function is symlink-safe through the use of Unlinkat(). func DeleteLongNameAt(dirfd int, hashName string) error { |