aboutsummaryrefslogtreecommitdiff
path: root/internal/configfile
diff options
context:
space:
mode:
authorJakob Unterwurzacher2021-10-21 14:47:29 +0200
committerJakob Unterwurzacher2021-10-21 14:55:30 +0200
commita652be805e1562948aff4dc232bd1c516ff01d00 (patch)
tree0f0bca9e3eaaa7493b50fcb17bd9050dc110fc67 /internal/configfile
parent4ba0ced3c704c1cc8696ea76d96822efdd1c7157 (diff)
configfile: replace broken switch/case logic with if
Because switch only matches once, we could have missed invalid cases. Replace the switch statements with a straight if rake.
Diffstat (limited to 'internal/configfile')
-rw-r--r--internal/configfile/validate.go26
1 files changed, 14 insertions, 12 deletions
diff --git a/internal/configfile/validate.go b/internal/configfile/validate.go
index 511f704..1611ab0 100644
--- a/internal/configfile/validate.go
+++ b/internal/configfile/validate.go
@@ -23,22 +23,23 @@ func (cf *ConfFile) Validate() error {
}
// File content encryption
{
- switch {
- case cf.IsFeatureFlagSet(FlagXChaCha20Poly1305) && cf.IsFeatureFlagSet(FlagAESSIV):
+ if cf.IsFeatureFlagSet(FlagXChaCha20Poly1305) && cf.IsFeatureFlagSet(FlagAESSIV) {
return fmt.Errorf("Can't have both XChaCha20Poly1305 and AESSIV feature flags")
- case cf.IsFeatureFlagSet(FlagAESSIV):
- if !cf.IsFeatureFlagSet(FlagGCMIV128) {
- return fmt.Errorf("AESSIV requires GCMIV128 feature flag")
- }
- case cf.IsFeatureFlagSet(FlagXChaCha20Poly1305):
+ }
+ if cf.IsFeatureFlagSet(FlagAESSIV) && !cf.IsFeatureFlagSet(FlagGCMIV128) {
+
+ return fmt.Errorf("AESSIV requires GCMIV128 feature flag")
+ }
+ if cf.IsFeatureFlagSet(FlagXChaCha20Poly1305) {
if cf.IsFeatureFlagSet(FlagGCMIV128) {
return fmt.Errorf("XChaCha20Poly1305 conflicts with GCMIV128 feature flag")
}
if !cf.IsFeatureFlagSet(FlagHKDF) {
return fmt.Errorf("XChaCha20Poly1305 requires HKDF feature flag")
}
+ }
// The absence of other flags means AES-GCM (oldest algorithm)
- case !cf.IsFeatureFlagSet(FlagXChaCha20Poly1305) && !cf.IsFeatureFlagSet(FlagAESSIV):
+ if !cf.IsFeatureFlagSet(FlagXChaCha20Poly1305) && !cf.IsFeatureFlagSet(FlagAESSIV) {
if !cf.IsFeatureFlagSet(FlagGCMIV128) {
return fmt.Errorf("AES-GCM requires GCMIV128 feature flag")
}
@@ -46,10 +47,10 @@ func (cf *ConfFile) Validate() error {
}
// Filename encryption
{
- switch {
- case cf.IsFeatureFlagSet(FlagPlaintextNames) && cf.IsFeatureFlagSet(FlagEMENames):
+ if cf.IsFeatureFlagSet(FlagPlaintextNames) && cf.IsFeatureFlagSet(FlagEMENames) {
return fmt.Errorf("Can't have both PlaintextNames and EMENames feature flags")
- case cf.IsFeatureFlagSet(FlagPlaintextNames):
+ }
+ if cf.IsFeatureFlagSet(FlagPlaintextNames) {
if cf.IsFeatureFlagSet(FlagDirIV) {
return fmt.Errorf("PlaintextNames conflicts with DirIV feature flag")
}
@@ -59,7 +60,8 @@ func (cf *ConfFile) Validate() error {
if cf.IsFeatureFlagSet(FlagRaw64) {
return fmt.Errorf("PlaintextNames conflicts with Raw64 feature flag")
}
- case cf.IsFeatureFlagSet(FlagEMENames):
+ }
+ if cf.IsFeatureFlagSet(FlagEMENames) {
// All combinations of DirIV, LongNames, Raw64 allowed
}
}