commit 8db05ae8e15fefa81df8366cdabe53f9bbcab721
parent dfdc2c8465e59eea63d45903eedc5b20339e1f6c
Author: Jaromil <jaromil@dyne.org>
Date: Mon, 21 Sep 2015 13:11:37 +0200
Merge pull request #218 from Narrat/optim/docs
Correct spelling and whitespaces
Diffstat:
M | tomb | | | 42 | +++++++++++++++++++++--------------------- |
1 file changed, 21 insertions(+), 21 deletions(-)
diff --git a/tomb b/tomb
@@ -180,7 +180,7 @@ _cat() { local -a _arr;
}
_is_found() {
- # returns 0 if binary if found in path
+ # returns 0 if binary is found in path
[[ "$1" = "" ]] && return 1
command -v "$1" 1>/dev/null 2>/dev/null
return $?
@@ -209,7 +209,7 @@ _whoami() {
_verbose "Identified caller: ::1 username:: (::2 UID:::::3 GID::)" $_USER $_UID $_GID
- # Update USERNAME accordingly if we can
+ # Update USERNAME accordingly if possible
[[ EUID == 0 && $_USER != $USERNAME ]] && {
_verbose "Updating USERNAME from '::1 USERNAME::' to '::2 _USER::')" $USERNAME $_USER
USERNAME=$_USER
@@ -258,7 +258,7 @@ _tmp_create() {
[[ $? == 0 ]] || _failure "Fatal error creating the temporary directory: ::1 temp dir::" "$TMPPREFIX"
}
- # We're going to add one more $RANDOM for each time someone complain
+ # We're going to add one more $RANDOM for each time someone complains
# about this being too weak of a random.
tfile="${TMPPREFIX}/$RANDOM$RANDOM$RANDOM$RANDOM" # Temporary file
umask 066
@@ -302,7 +302,7 @@ _is_encrypted_block() {
# Return 0 if NO swap is used, 1 if swap is used.
# Return 1 if any of the swaps is not encrypted.
# Return 2 if swap(s) is(are) used, but ALL encrypted.
-# Use _check_swap in functions, that will call this function but will
+# Use _check_swap in functions. It will call this function and
# exit if unsafe swap is present.
_ensure_safe_swap() {
@@ -316,16 +316,16 @@ _ensure_safe_swap() {
_message "An active swap partition is detected..."
for s in $=swaps; do
{ _is_encrypted_block $s } && { r=2 } || {
- # We're dealing with unencrypted stuff.
- # Maybe it lives on an encrypted filesystem anyway.
- # @todo: verify it's actually on an encrypted FS (see #163 and !189)
- # Well, no: bail out.
- r=1; break
- }
+ # We're dealing with unencrypted stuff.
+ # Maybe it lives on an encrypted filesystem anyway.
+ # @todo: verify it's actually on an encrypted FS (see #163 and !189)
+ # Well, no: bail out.
+ r=1; break
+ }
done
if [[ $r -eq 2 ]]; then
- _success "All your swaps are belong to crypt. Good."
+ _success "All your swaps are belong to crypt. Good."
else
_warning "This poses a security risk."
_warning "You can deactivate all swap partitions using the command:"
@@ -338,7 +338,7 @@ _ensure_safe_swap() {
}
# Wrapper to allow encrypted swap and remind the user about possible
-# data leaks to disk if swap is on, and not to be ignored. It could
+# data leaks to disk if swap is on, which shouldn't be ignored. It could
# be run once in main(), but as swap evolves, it's better to run it
# whenever swap may be needed.
# Exit if unencrypted swap is active on the system.
@@ -502,7 +502,7 @@ is_valid_tomb() {
_failure "Tomb file is missing from arguments." }
_fail=0
- # Tomb file must be a readable, writable, not-empty regular file.
+ # Tomb file must be a readable, writable, non-empty regular file.
[[ ! -w "$1" ]] && {
_warning "Tomb file is not writable: ::1 tomb file::" $1
_fail=1
@@ -535,7 +535,7 @@ is_valid_tomb() {
_plot $1 # Set TOMB{PATH,DIR,FILE,NAME}
- # Tomb cannot be already mounted (or we cannot alter it)
+ # Tomb already mounted (or we cannot alter it)
[[ "`mount -l`" -regex-match "${TOMBFILE}.*\[$TOMBNAME\]$" ]] && {
_failure "Tomb is currently in use: ::1 tomb name::" $TOMBNAME
}
@@ -1103,7 +1103,7 @@ change_passwd() {
# takes care to encrypt a key
# honored options: --kdf --tomb-pwd -o
gen_key() {
- # $1 the password to use, if not set then ask user
+ # $1 the password to use; if not set ask user
# -o is the --cipher-algo to use (string taken by GnuPG)
local algopt="`option_value -o`"
local algo="${algopt:-AES256}"
@@ -1218,7 +1218,7 @@ bury_key() {
# We ask the password and test if it is the same encoding the
# base key, to insure that the same password is used for the
# encryption and the steganography. This is a standard enforced
- # by Tomb, but its not strictly necessary (and having different
+ # by Tomb, but it isn't strictly necessary (and having different
# password would enhance security). Nevertheless here we prefer
# usability.
@@ -1329,8 +1329,8 @@ exhume_key() {
return $r
}
-# Produces a printable image of the key contents so that it can be
-# backuped on paper and hidden in books etc.
+# Produces a printable image of the key contents so a backup on paper
+# can be made and hidden in books etc.
engrave_key() {
_load_key # Try loading key from option -k and set TOMBKEYFILE
@@ -1721,7 +1721,7 @@ mount_tomb() {
tombmount="$2"
[[ "$tombmount" = "" ]] && {
tombmount=/media/$TOMBNAME
- [[ -d /media ]] || { # no /media found, adopting /run/media/$USER (udisk2 compat)
+ [[ -d /media ]] || { # no /media found, adopting /run/media/$USER (udisks2 compat)
tombmount=/run/media/$_USER/$TOMBNAME
}
_message "Mountpoint not specified, using default: ::1 mount point::" $tombmount
@@ -1822,7 +1822,7 @@ mount_tomb() {
local tombtty tombhost tombuid tombuser
- # print out when was opened the last time, by whom and where
+ # print out when it was opened the last time, by whom and where
[[ -r ${tombmount}/.last ]] && {
tombtty=$(_cat ${tombmount}/.tty)
tombhost=$(_cat ${tombmount}/.host)
@@ -2586,7 +2586,7 @@ main() {
for arg in $*; do
if [[ $arg == '--' || $arg == '-' ]]; then
ok=1
- continue #it shouldnt be appended to PARAM
+ continue #it shouldn't be appended to PARAM
elif [[ $arg[1] == '-' ]]; then
if [[ $ok == 0 ]]; then
exitv=127 _failure "Unrecognized option ::1 arg:: for subcommand ::2 subcommand::" $arg $subcommand