encrypted files from other users on the same system (that's the job of OS-level
access control, such as UNIX file permissions), or from the cloud provider you
may be running a virtual machine on. By themselves, they also do not protect
-from "evil maid" attacks, i.e. non-permanant offline compromises of the disk.
+from "evil maid" attacks, i.e. non-permanent offline compromises of the disk.
## Features
return data, h.err()
}
-// ClearData remotes the PAM data with the specified name.
+// ClearData removes the PAM data with the specified name.
func (h *Handle) ClearData(name string) error {
return h.setData(name, unsafe.Pointer(C.CString("")), C.CleanupFunc(C.freeData))
}
}
// GetSecret returns a pointer to the C string PAM data with the specified name.
-// This a pointer directory to the data, so it shouldn't be modified. It should
-// have been previously set with SetSecret().
+// This is a pointer directly to the data, so it shouldn't be modified. It
+// should have been previously set with SetSecret().
func (h *Handle) GetSecret(name string) (unsafe.Pointer, error) {
return h.getData(name)
}
}
// Transaction represents a wrapped pam_handle_t type created with pam_start
-// form an application.
+// from an application.
type Transaction Handle
// Start initializes a pam Transaction. End() should be called after the