diff options
| -rw-r--r-- | .gitignore | 2 | ||||
| -rw-r--r-- | Documentation/CLI_ABI.md | 2 | ||||
| -rw-r--r-- | Documentation/extractloop.md | 4 | ||||
| -rw-r--r-- | README.md | 4 | ||||
| -rw-r--r-- | fsck.go | 6 | ||||
| -rw-r--r-- | internal/contentenc/content.go | 2 | ||||
| -rw-r--r-- | internal/contentenc/intrablock.go | 4 | ||||
| -rw-r--r-- | internal/exitcodes/exitcodes.go | 4 | ||||
| -rw-r--r-- | internal/nametransform/dirivcache/dirivcache.go | 6 | ||||
| -rw-r--r-- | internal/nametransform/names.go | 2 | ||||
| -rw-r--r-- | internal/stupidgcm/stupidgcm_test.go | 2 | ||||
| -rw-r--r-- | tests/defaults/main_test.go | 2 | ||||
| -rw-r--r-- | tests/example_filesystems/example_filesystems_test.go | 2 | ||||
| -rwxr-xr-x | tests/fuse-unmount.bash | 2 | ||||
| -rw-r--r-- | tests/reverse/correctness_test.go | 2 | 
15 files changed, 23 insertions, 23 deletions
| @@ -18,5 +18,5 @@ gocryptfs.1  /vendor  /_vendor-* -# Source tarball version. Should never be commited to git. +# Source tarball version. Should never be committed to git.  /VERSION diff --git a/Documentation/CLI_ABI.md b/Documentation/CLI_ABI.md index 979280b..9581556 100644 --- a/Documentation/CLI_ABI.md +++ b/Documentation/CLI_ABI.md @@ -98,5 +98,5 @@ Content of "change.txt":  Further Reading  --------------- -Additional exit codes that are unlikely to occour are defined in +Additional exit codes that are unlikely to occur are defined in  [exitcodes.go](../internal/exitcodes/exitcodes.go). diff --git a/Documentation/extractloop.md b/Documentation/extractloop.md index ee8c0ae..62f9939 100644 --- a/Documentation/extractloop.md +++ b/Documentation/extractloop.md @@ -13,8 +13,8 @@ What the extractloop stress test does is (top comment in `extractloop.bash`):  # huge numbers of files.  ``` -Memory usage stabilises at 119MiB, we do not run of fds, -and the interation time is stable at 37 seconds. The test +Memory usage stabilises at 119MiB, we do not run out of fds, +and the iteration time is stable at 37 seconds. The test  runs slower in the beginning due to xfstests running in  parallel on the test machine. @@ -454,7 +454,7 @@ v0.7.2, 2016-01-19  v0.7.1, 2016-01-09  * Make the `build.bash` script compatible with Go 1.3 -* Disable fallocate on OSX (system call not availabe) +* Disable fallocate on OSX (system call not available)  * Introduce pre-built binaries for Fedora 23 and Debian 8  v0.7, 2015-12-20 @@ -502,7 +502,7 @@ v0.4, 2015-11-15    * `-plaintextnames`: disables filename encryption, added on user request    * `-extpass`: calls an external program for prompting for the password    * `-config`: allows to specify a custom gocryptfs.conf path -* Add `FeatureFlags` gocryptfs.conf paramter +* Add `FeatureFlags` gocryptfs.conf parameter    * This is a config format change, hence the on-disk format is incremented    * Used for ext4-style filesystem feature flags. This should help avoid future      format changes. The first user is `-plaintextnames`. @@ -36,7 +36,7 @@ func (ck *fsckObj) markCorrupt(path string) {  	ck.corruptListLock.Unlock()  } -// Watch for mitigated corruptions that occour during OpenDir() +// Watch for mitigated corruptions that occur during OpenDir()  func (ck *fsckObj) watchMitigatedCorruptionsOpenDir(path string) {  	for {  		select { @@ -95,7 +95,7 @@ func (ck *fsckObj) symlink(path string) {  	}  } -// Watch for mitigated corruptions that occour during Read() +// Watch for mitigated corruptions that occur during Read()  func (ck *fsckObj) watchMitigatedCorruptionsRead(path string) {  	for {  		select { @@ -165,7 +165,7 @@ func (ck *fsckObj) file(path string) {  	}  } -// Watch for mitigated corruptions that occour during ListXAttr() +// Watch for mitigated corruptions that occur during ListXAttr()  func (ck *fsckObj) watchMitigatedCorruptionsListXAttr(path string) {  	for {  		select { diff --git a/internal/contentenc/content.go b/internal/contentenc/content.go index 57ad489..bda3fdc 100644 --- a/internal/contentenc/content.go +++ b/internal/contentenc/content.go @@ -151,7 +151,7 @@ func concatAD(blockNo uint64, fileID []byte) (aData []byte) {  // DecryptBlock - Verify and decrypt GCM block  //  // Corner case: A full-sized block of all-zero ciphertext bytes is translated -// to an all-zero plaintext block, i.e. file hole passtrough. +// to an all-zero plaintext block, i.e. file hole passthrough.  func (be *ContentEnc) DecryptBlock(ciphertext []byte, blockNo uint64, fileID []byte) ([]byte, error) {  	// Empty block? diff --git a/internal/contentenc/intrablock.go b/internal/contentenc/intrablock.go index 3714e37..55b0841 100644 --- a/internal/contentenc/intrablock.go +++ b/internal/contentenc/intrablock.go @@ -5,12 +5,12 @@ type IntraBlock struct {  	// BlockNo is the block number in the file  	BlockNo uint64  	// Skip is an offset into the block payload -	// In forwared mode: block plaintext +	// In forward mode: block plaintext  	// In reverse mode: offset into block ciphertext. Takes the header into  	// account.  	Skip uint64  	// Length of payload data in this block -	// In forwared mode: length of the plaintext +	// In forward mode: length of the plaintext  	// In reverse mode: length of the ciphertext. Takes header and trailer into  	// account.  	Length uint64 diff --git a/internal/exitcodes/exitcodes.go b/internal/exitcodes/exitcodes.go index b8173c7..c4e18df 100644 --- a/internal/exitcodes/exitcodes.go +++ b/internal/exitcodes/exitcodes.go @@ -58,7 +58,7 @@ const (  	OpenConf = 23  	// WriteConf - could not write the gocryptfs.conf  	WriteConf = 24 -	// Profiler - error occoured when trying to write cpu or memory profile or +	// Profiler - error occurred when trying to write cpu or memory profile or  	// execution trace  	Profiler = 25  	// FsckErrors - the filesystem check found errors @@ -68,7 +68,7 @@ const (  	// TrezorError - an error was encountered while interacting with a Trezor  	// device  	TrezorError = 28 -	// ExcludeError - an error occoured while processing "-exclude" +	// ExcludeError - an error occurred while processing "-exclude"  	ExcludeError = 29  ) diff --git a/internal/nametransform/dirivcache/dirivcache.go b/internal/nametransform/dirivcache/dirivcache.go index c0eca6d..962ae37 100644 --- a/internal/nametransform/dirivcache/dirivcache.go +++ b/internal/nametransform/dirivcache/dirivcache.go @@ -31,9 +31,9 @@ type DirIVCache struct {  	rootDirIV []byte  	// expiry is the time when the whole cache expires. -	// The cached entry my become out-of-date if the ciphertext directory is -	// modifed behind the back of gocryptfs. Having an expiry time limits the -	// inconstency to one second, like attr_timeout does for the kernel +	// The cached entry might become out-of-date if the ciphertext directory is +	// modified behind the back of gocryptfs. Having an expiry time limits the +	// inconstancy to one second, like attr_timeout does for the kernel  	// getattr cache.  	expiry time.Time diff --git a/internal/nametransform/names.go b/internal/nametransform/names.go index 65e6f06..22e639a 100644 --- a/internal/nametransform/names.go +++ b/internal/nametransform/names.go @@ -18,7 +18,7 @@ type NameTransform struct {  	emeCipher  *eme.EMECipher  	longNames  bool  	DirIVCache dirivcache.DirIVCache -	// B64 = either base64.URLEncoding or base64.RawURLEncoding, depeding +	// B64 = either base64.URLEncoding or base64.RawURLEncoding, depending  	// on the Raw64 feature flag  	B64 *base64.Encoding  } diff --git a/internal/stupidgcm/stupidgcm_test.go b/internal/stupidgcm/stupidgcm_test.go index b340179..18732df 100644 --- a/internal/stupidgcm/stupidgcm_test.go +++ b/internal/stupidgcm/stupidgcm_test.go @@ -26,7 +26,7 @@ func randBytes(n int) []byte {  }  // TestEncryptDecrypt encrypts and decrypts using both stupidgcm and Go's built-in -// GCM implemenatation and verifies that the results are identical. +// GCM implementation and verifies that the results are identical.  func TestEncryptDecrypt(t *testing.T) {  	key := randBytes(32)  	sGCM := New(key, false) diff --git a/tests/defaults/main_test.go b/tests/defaults/main_test.go index 3eae919..171b3be 100644 --- a/tests/defaults/main_test.go +++ b/tests/defaults/main_test.go @@ -47,7 +47,7 @@ func Test1980Tar(t *testing.T) {  // The sequence below caused an I/O error to be returned.  func TestOpenTruncateRead(t *testing.T) {  	fn := test_helpers.DefaultPlainDir + "/TestTruncateWrite" -	// First FD is used for write and trucate. +	// First FD is used for write and truncate.  	writeFd, err := os.Create(fn)  	if err != nil {  		t.Fatal(err) diff --git a/tests/example_filesystems/example_filesystems_test.go b/tests/example_filesystems/example_filesystems_test.go index a7788e7..b1e0fda 100644 --- a/tests/example_filesystems/example_filesystems_test.go +++ b/tests/example_filesystems/example_filesystems_test.go @@ -316,7 +316,7 @@ func TestExampleFSv13MasterkeyStdin(t *testing.T) {  // gocryptfs v1.3 introduced HKDF.  // We check the md5 sum of the encrypted version of a file to make sure we don't -// accidentially change the ciphertext generation. +// accidentally change the ciphertext generation.  // Create a full crypto round-trip by mounting two times:  // dirA -> reverse mount -> dirB -> forward mount -> dirC  func TestExampleFSv13reverse(t *testing.T) { diff --git a/tests/fuse-unmount.bash b/tests/fuse-unmount.bash index 087b6fe..debae29 100755 --- a/tests/fuse-unmount.bash +++ b/tests/fuse-unmount.bash @@ -1,6 +1,6 @@  #!/bin/bash -eu  # -# Compatability wrapper around "fusermount" on Linux and "umount" on +# Compatibility wrapper around "fusermount" on Linux and "umount" on  # Mac OS X and friends.  #  # This script can be sourced or executed directly. diff --git a/tests/reverse/correctness_test.go b/tests/reverse/correctness_test.go index 246936b..931be42 100644 --- a/tests/reverse/correctness_test.go +++ b/tests/reverse/correctness_test.go @@ -171,7 +171,7 @@ func TestAccess(t *testing.T) {  	}  } -// Opening a nonexistant file name should return ENOENT +// Opening a nonexistent file name should return ENOENT  // and not EBADMSG or EIO or anything else.  func TestEnoent(t *testing.T) {  	fn := dirB + "/TestEnoent" | 
