@file{FILE}.
@file{.nncp.meta} contains information about file/chunk
-size and their hash checksums. It is
+size and their hash checksums. This is
@url{https://tools.ietf.org/html/rfc4506, XDR}-encoded structure:
@verbatim
Whole reassembled file's size
@item Chunk size @tab
unsigned hyper integer @tab
- Size of each chunks (except for the last one, that could be smaller).
+ Size of each chunk (except for the last one, that could be smaller)
@item Checksums @tab
variable length array of 32 byte fixed length opaque data @tab
BLAKE2b-256 checksum of each chunk
Perform @ref{Spool, spool} directory integrity check. Read all files
that has Base32-encoded filenames and compare it with recalculated
-BLAKE2b hash output of their contents. This supplementary command is
+BLAKE2b hash output of their contents. That supplementary command is
not used often in practice, if ever.
@node nncp-daemon
filesystems with deduplication capability should be rather lightweight.
If @option{-dryrun} option is specified, then only existence and
-integrity checking is performed.
+integrity checking are performed.
If @option{-keep} option is specified, then no
@file{.nncp.meta}/@file{.nncp.chunkXXX} files are deleted during
SP works on top of
@url{http://noiseprotocol.org/noise.html#interactive-patterns,
@code{Noise_IK_25519_ChaChaPoly_BLAKE2b}} protocol. Each Noise packet
-are sent inside @url{https://tools.ietf.org/html/rfc4506, XDR} envelope:
+is sent inside an @url{https://tools.ietf.org/html/rfc4506, XDR} envelope:
@verbatim
+-----------------+
@end table
-Typical peers behaviour is following:
+Typical peer's behaviour is following:
@enumerate
@item Perform Noise-IK handshake.
@item When @emph{HALT} packet received, empty file sending queue.
@item @emph{FILE} sending is performed only if no other outgoing packets
are queued.
-@item Each second node check are there any new @emph{tx} packets
+@item Each second, node checks: are there any new @emph{tx} packets
appeared and queues corresponding @emph{INFO} packets.
@item If no packets are sent and received during @ref{CfgOnlineDeadline,
onlinedeadline} duration, then close the connection. There is no
The most popular cryptographic protocol in Internet is
@url{https://en.wikipedia.org/wiki/Transport_Layer_Security, TLS} that
-is very hard to implement right and hard to configure for mutual
+is very hard to implement correctly and hard to configure for mutual
participants authentication. Not all TLS configurations and related
protocols provide @url{https://en.wikipedia.org/wiki/Forward_secrecy,
forward secrecy} property -- all previously intercepted packets could be