Implement changes proposed by gosimple.

Also delete the unused "dirIVNameStruct", found by deadcode.
This commit is contained in:
Jakob Unterwurzacher 2016-09-25 19:48:21 +02:00
parent 166ba74a05
commit 5f4b16c00f
7 changed files with 14 additions and 26 deletions

View File

@ -198,9 +198,5 @@ func (cf *ConfFile) WriteFile() error {
return err return err
} }
err = os.Rename(tmp, cf.filename) err = os.Rename(tmp, cf.filename)
if err != nil { return err
return err
}
return nil
} }

View File

@ -12,10 +12,7 @@ import (
func (f *file) createsHole(plainSize uint64, off int64) bool { func (f *file) createsHole(plainSize uint64, off int64) bool {
nextBlock := f.contentEnc.PlainOffToBlockNo(plainSize) nextBlock := f.contentEnc.PlainOffToBlockNo(plainSize)
targetBlock := f.contentEnc.PlainOffToBlockNo(uint64(off)) targetBlock := f.contentEnc.PlainOffToBlockNo(uint64(off))
if targetBlock > nextBlock { return targetBlock > nextBlock
return true
}
return false
} }
// Zero-pad the file of size plainSize to the next block boundary // Zero-pad the file of size plainSize to the next block boundary

View File

@ -17,11 +17,6 @@ const (
shortNameMax = 176 shortNameMax = 176
) )
type dirIVNameStruct struct {
dirIV [nametransform.DirIVLen]byte
name string
}
var longnameParentCache map[string]string var longnameParentCache map[string]string
var longnameCacheLock sync.Mutex var longnameCacheLock sync.Mutex

View File

@ -10,14 +10,14 @@ func TestCurrentCPU(t *testing.T) {
// Has AES instructions // Has AES instructions
func TestXeonE312xx(t *testing.T) { func TestXeonE312xx(t *testing.T) {
if filePreferOpenSSL("cpuinfo.xeon_e312xx.txt") == true { if filePreferOpenSSL("cpuinfo.xeon_e312xx.txt") {
t.Fail() t.Fail()
} }
} }
// Pentium G do not have AES instructions // Pentium G do not have AES instructions
func TestPentiumG630(t *testing.T) { func TestPentiumG630(t *testing.T) {
if filePreferOpenSSL("cpuinfo.pentium_g630.txt") == false { if !filePreferOpenSSL("cpuinfo.pentium_g630.txt") {
t.Fail() t.Fail()
} }
} }

View File

@ -52,7 +52,7 @@ func TestEncryptDecrypt(t *testing.T) {
gOut := gGCM.Seal(dst, iv, in, authData) gOut := gGCM.Seal(dst, iv, in, authData)
// Ciphertext must be identical to Go GCM // Ciphertext must be identical to Go GCM
if bytes.Compare(sOut, gOut) != 0 { if !bytes.Equal(sOut, gOut) {
t.Fatalf("Compare failed for encryption, size %d", i) t.Fatalf("Compare failed for encryption, size %d", i)
t.Log("sOut:") t.Log("sOut:")
t.Log("\n" + hex.Dump(sOut)) t.Log("\n" + hex.Dump(sOut))
@ -70,7 +70,7 @@ func TestEncryptDecrypt(t *testing.T) {
} }
// Plaintext must be identical to Go GCM // Plaintext must be identical to Go GCM
if bytes.Compare(sOut2, gOut2) != 0 { if !bytes.Equal(sOut2, gOut2) {
t.Fatalf("Compare failed for decryption, size %d", i) t.Fatalf("Compare failed for decryption, size %d", i)
} }
} }
@ -90,7 +90,7 @@ func TestCorruption(t *testing.T) {
if sErr != nil { if sErr != nil {
t.Fatal(sErr) t.Fatal(sErr)
} }
if bytes.Compare(in, sOut2) != 0 { if !bytes.Equal(in, sOut2) {
t.Fatalf("Compare failed") t.Fatalf("Compare failed")
} }

View File

@ -198,7 +198,7 @@ func main() {
tlog.Info.Printf("Note: You must unmount gracefully, otherwise the profile file(s) will stay empty!\n") tlog.Info.Printf("Note: You must unmount gracefully, otherwise the profile file(s) will stay empty!\n")
} }
// "-openssl" // "-openssl"
if args.openssl == false { if !args.openssl {
tlog.Debug.Printf("OpenSSL disabled, using Go GCM") tlog.Debug.Printf("OpenSSL disabled, using Go GCM")
} else { } else {
tlog.Debug.Printf("OpenSSL enabled") tlog.Debug.Printf("OpenSSL enabled")

View File

@ -414,17 +414,17 @@ func TestRmwRace(t *testing.T) {
func TestFiltered(t *testing.T) { func TestFiltered(t *testing.T) {
filteredFile := test_helpers.DefaultPlainDir + "/gocryptfs.conf" filteredFile := test_helpers.DefaultPlainDir + "/gocryptfs.conf"
file, err := os.Create(filteredFile) file, err := os.Create(filteredFile)
if plaintextnames == true && err == nil { if plaintextnames && err == nil {
t.Errorf("should have failed but didn't") t.Errorf("should have failed but didn't")
} else if plaintextnames == false && err != nil { } else if !plaintextnames && err != nil {
t.Error(err) t.Error(err)
} }
file.Close() file.Close()
err = os.Remove(filteredFile) err = os.Remove(filteredFile)
if plaintextnames == true && err == nil { if plaintextnames && err == nil {
t.Errorf("should have failed but didn't") t.Errorf("should have failed but didn't")
} else if plaintextnames == false && err != nil { } else if !plaintextnames && err != nil {
t.Error(err) t.Error(err)
} }
} }
@ -436,9 +436,9 @@ func TestFilenameEncryption(t *testing.T) {
t.Fatal(err) t.Fatal(err)
} }
_, err = os.Stat(test_helpers.DefaultCipherDir + "/TestFilenameEncryption.txt") _, err = os.Stat(test_helpers.DefaultCipherDir + "/TestFilenameEncryption.txt")
if plaintextnames == true && err != nil { if plaintextnames && err != nil {
t.Errorf("plaintextnames not working: %v", err) t.Errorf("plaintextnames not working: %v", err)
} else if plaintextnames == false && err == nil { } else if !plaintextnames && err == nil {
t.Errorf("file name encryption not working") t.Errorf("file name encryption not working")
} }
} }