From f377d34dffa4b74c4991883e7b03b18ec9aa0141 Mon Sep 17 00:00:00 2001 From: Sam Gleske Date: Fri, 25 Jul 2014 00:00:17 -0400 Subject: [PATCH] doc: encfs spelling and grammar corrections --- encfs/encfs.pod | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/encfs/encfs.pod b/encfs/encfs.pod index d264b83..3136d2e 100644 --- a/encfs/encfs.pod +++ b/encfs/encfs.pod @@ -272,7 +272,7 @@ to decode filenames if desired. B is not a true filesystem. It does not deal with any of the actual storage or maintenance of files. It translates requests (encrypting or decrypting as necessary) and passes the requests through to the underlying -host filesystem. Therefor any limitations of the host filesystem will be +host filesystem. Therefore any limitations of the host filesystem will be inherited by B (or possibly be further limited). One such limitation is filename length. If your underlying filesystem limits @@ -328,7 +328,7 @@ in the keying function is selected based on wall clock time to generate the key. In standard mode, a target time of 0.5 seconds is used, and in paranoia mode a target of 3.0 seconds is used. -On a 1.6Ghz AMD 64 system, it rougly 64k iterations of the key derivation +On a 1.6Ghz AMD 64 system, roughly 64k iterations of the key derivation function can be handled in half a second. The exact number of iterations to use is stored in the configuration file, as it is needed to remount the filesystem.