diff options
author | Jakob Unterwurzacher | 2017-08-21 21:06:05 +0200 |
---|---|---|
committer | Jakob Unterwurzacher | 2017-08-21 21:06:05 +0200 |
commit | ed046aa35978c835d79f9cb3ee359349ee9145c5 (patch) | |
tree | 3ec6fc4aa796648738ec15a4aee652c2a2afb502 | |
parent | 26a6e61a46b9d14dbfaa0b1ba6b99caa86155037 (diff) |
Fix misspellings reported by goreportcard.com
https://goreportcard.com/report/github.com/rfjakob/gocryptfs#misspell
-rw-r--r-- | README.md | 2 | ||||
-rw-r--r-- | cli_args.go | 2 | ||||
-rw-r--r-- | internal/contentenc/content.go | 2 | ||||
-rw-r--r-- | internal/cryptocore/cryptocore.go | 2 |
4 files changed, 4 insertions, 4 deletions
@@ -283,7 +283,7 @@ v1.0, 2016-07-17 * Allows to pass mount options directly to the kernel * Add support for device files and suid binaries * Only works when running as root - * Must be explicitely enabled by passing "-o dev" or "-o suid" or "-o suid,dev" + * Must be explicitly enabled by passing "-o dev" or "-o suid" or "-o suid,dev" * Experimental Mac OS X support. See [ticket #15](https://github.com/rfjakob/gocryptfs/issues/15) for details. diff --git a/cli_args.go b/cli_args.go index 7f67fe3..836d29c 100644 --- a/cli_args.go +++ b/cli_args.go @@ -187,7 +187,7 @@ func parseCliOpts() (args argContainer) { tlog.Fatal.Printf("The reverse mode and the -forcedecode option are not compatible") os.Exit(exitcodes.Usage) } - // Has the user explicitely disabled openssl using "-openssl=false/0"? + // Has the user explicitly disabled openssl using "-openssl=false/0"? if !args.openssl && opensslAuto != "auto" { tlog.Fatal.Printf("-forcedecode requires openssl, but is disabled via command-line option") os.Exit(exitcodes.Usage) diff --git a/internal/contentenc/content.go b/internal/contentenc/content.go index 5d0ff49..6524ad4 100644 --- a/internal/contentenc/content.go +++ b/internal/contentenc/content.go @@ -108,7 +108,7 @@ func (be *ContentEnc) DecryptBlocks(ciphertext []byte, firstBlockNo uint64, file pBlock, err = be.DecryptBlock(cBlock, firstBlockNo, fileID) if err != nil { if be.forceDecode && err == stupidgcm.ErrAuth { - tlog.Warn.Printf("DecryptBlocks: authentication failure in block #%d, overriden by forcedecode", firstBlockNo) + tlog.Warn.Printf("DecryptBlocks: authentication failure in block #%d, overridden by forcedecode", firstBlockNo) } else { break } diff --git a/internal/cryptocore/cryptocore.go b/internal/cryptocore/cryptocore.go index aafe12b..9e25bfa 100644 --- a/internal/cryptocore/cryptocore.go +++ b/internal/cryptocore/cryptocore.go @@ -86,7 +86,7 @@ func New(key []byte, aeadType AEADTypeEnum, IVBitLen int, useHKDF bool, forceDec } // stupidgcm does not create a private copy of the key, so things // break when initFuseFrontend() overwrites it with zeros. Create - // a copy here. This is unneccessary when useHKDF == true, but + // a copy here. This is unnecessary when useHKDF == true, but // does no harm. var stupidgcmKey []byte stupidgcmKey = append(stupidgcmKey, gcmKey...) |