aboutsummaryrefslogtreecommitdiffstats
path: root/security/ccrypt
diff options
context:
space:
mode:
authorolgeni <olgeni@FreeBSD.org>2015-09-21 05:12:20 +0800
committerolgeni <olgeni@FreeBSD.org>2015-09-21 05:12:20 +0800
commit17e7fc67581455cb59254396c15101637e865cfe (patch)
tree57382a57c3855282ce9c594d06d512afc17afa45 /security/ccrypt
parent2894bb3628fb82566301fef9eb2c2ea04a803e09 (diff)
downloadfreebsd-ports-gnome-17e7fc67581455cb59254396c15101637e865cfe.tar.gz
freebsd-ports-gnome-17e7fc67581455cb59254396c15101637e865cfe.tar.zst
freebsd-ports-gnome-17e7fc67581455cb59254396c15101637e865cfe.zip
Typos, whitespace and capitalization fixes (S-X).
Diffstat (limited to 'security/ccrypt')
-rw-r--r--security/ccrypt/pkg-descr6
1 files changed, 3 insertions, 3 deletions
diff --git a/security/ccrypt/pkg-descr b/security/ccrypt/pkg-descr
index b5036bcbddbf..3bc24e61b2cd 100644
--- a/security/ccrypt/pkg-descr
+++ b/security/ccrypt/pkg-descr
@@ -1,16 +1,16 @@
ccrypt is a utility for encrypting and decrypting files and streams. It was
-designed to replace the standard unix crypt utility, which is notorious for
+designed to replace the standard Unix crypt utility, which is notorious for
using a very weak encryption algorithm. ccrypt is based on the Rijndael
cipher, which is the U.S. government's chosen candidate for the Advanced
Encryption Standard (AES, see http://www.nist.gov/aes/). This cipher is
believed to provide very strong security.
-Unlike unix crypt, the algorithm provided by ccrypt is not symmetric, i.e.,
+Unlike Unix crypt, the algorithm provided by ccrypt is not symmetric, i.e.,
one must specify whether to encrypt or decrypt. The most common way to invoke
ccrypt is via the commands ccencrypt and ccdecrypt. There is also a ccat
command for decrypting a file directly to the terminal, thus reducing the
likelihood of leaving temporary plaintext files around. In addition, there
-is a compatibility mode for decrypting legacy unix crypt files.
+is a compatibility mode for decrypting legacy Unix crypt files.
Encryption and decryption depends on a keyword (or key phrase) supplied by
the user. By default, the user is prompted to enter a keyword from the