Housekeeping CL.
Make variable names and formatting more consistent. Also, add doxygen comments to Serializable.
Change-Id: I24ff138611111acf96112be74a04cc35f04908e0
diff --git a/authorization_set.cpp b/authorization_set.cpp
index 5fbf608..a0ca571 100644
--- a/authorization_set.cpp
+++ b/authorization_set.cpp
@@ -205,23 +205,23 @@
static uint8_t* serialize(const keymaster_key_param_t& param, uint8_t* buf, const uint8_t* end,
const uint8_t* indirect_base) {
- buf = append_to_buf(buf, end, static_cast<uint32_t>(param.tag));
+ buf = append_uint32_to_buf(buf, end, param.tag);
switch (keymaster_tag_get_type(param.tag)) {
case KM_INVALID:
break;
case KM_ENUM:
case KM_ENUM_REP:
- buf = append_to_buf(buf, end, param.enumerated);
+ buf = append_uint32_to_buf(buf, end, param.enumerated);
break;
case KM_INT:
case KM_INT_REP:
- buf = append_to_buf(buf, end, param.integer);
+ buf = append_uint32_to_buf(buf, end, param.integer);
break;
case KM_LONG:
- buf = append_to_buf(buf, end, param.long_integer);
+ buf = append_uint64_to_buf(buf, end, param.long_integer);
break;
case KM_DATE:
- buf = append_to_buf(buf, end, param.date_time);
+ buf = append_uint64_to_buf(buf, end, param.date_time);
break;
case KM_BOOL:
if (buf < end)
@@ -230,19 +230,17 @@
break;
case KM_BIGNUM:
case KM_BYTES:
- buf = append_to_buf(buf, end, static_cast<uint32_t>(param.blob.data_length));
- buf = append_to_buf(buf, end, static_cast<uint32_t>(param.blob.data - indirect_base));
+ buf = append_uint32_to_buf(buf, end, param.blob.data_length);
+ buf = append_uint32_to_buf(buf, end, param.blob.data - indirect_base);
break;
}
return buf;
}
-static bool deserialize(keymaster_key_param_t* param, const uint8_t** buf, const uint8_t* end,
+static bool deserialize(keymaster_key_param_t* param, const uint8_t** buf_ptr, const uint8_t* end,
const uint8_t* indirect_base, const uint8_t* indirect_end) {
- uint32_t tag_val;
- if (!copy_from_buf(buf, end, &tag_val))
+ if (!copy_uint32_from_buf(buf_ptr, end, ¶m->tag))
return false;
- param->tag = static_cast<keymaster_tag_t>(tag_val);
switch (keymaster_tag_get_type(param->tag)) {
default:
@@ -250,33 +248,32 @@
return false;
case KM_ENUM:
case KM_ENUM_REP:
- return copy_from_buf(buf, end, ¶m->enumerated);
+ return copy_uint32_from_buf(buf_ptr, end, ¶m->enumerated);
case KM_INT:
case KM_INT_REP:
- return copy_from_buf(buf, end, ¶m->integer);
+ return copy_uint32_from_buf(buf_ptr, end, ¶m->integer);
case KM_LONG:
- return copy_from_buf(buf, end, ¶m->long_integer);
+ return copy_uint64_from_buf(buf_ptr, end, ¶m->long_integer);
case KM_DATE:
- return copy_from_buf(buf, end, ¶m->date_time);
+ return copy_uint64_from_buf(buf_ptr, end, ¶m->date_time);
break;
case KM_BOOL:
- if (*buf < end) {
- param->boolean = static_cast<bool>(**buf);
- (*buf)++;
+ if (*buf_ptr < end) {
+ param->boolean = static_cast<bool>(**buf_ptr);
+ (*buf_ptr)++;
return true;
}
return false;
case KM_BIGNUM:
case KM_BYTES: {
- uint32_t length;
uint32_t offset;
- if (!copy_from_buf(buf, end, &length) || !copy_from_buf(buf, end, &offset))
+ if (!copy_uint32_from_buf(buf_ptr, end, ¶m->blob.data_length) ||
+ !copy_uint32_from_buf(buf_ptr, end, &offset))
return false;
if (static_cast<ptrdiff_t>(offset) > indirect_end - indirect_base ||
- static_cast<ptrdiff_t>(offset + length) > indirect_end - indirect_base)
+ static_cast<ptrdiff_t>(offset + param->blob.data_length) > indirect_end - indirect_base)
return false;
- param->blob.data_length = length;
param->blob.data = indirect_base + offset;
return true;
}
@@ -301,28 +298,29 @@
uint8_t* AuthorizationSet::Serialize(uint8_t* buf, const uint8_t* end) const {
buf = append_size_and_data_to_buf(buf, end, indirect_data_, indirect_data_size_);
- buf = append_to_buf(buf, end, static_cast<uint32_t>(elems_size_));
- buf = append_to_buf(buf, end, static_cast<uint32_t>(SerializedSizeOfElements()));
+ buf = append_uint32_to_buf(buf, end, elems_size_);
+ buf = append_uint32_to_buf(buf, end, SerializedSizeOfElements());
for (size_t i = 0; i < elems_size_; ++i) {
buf = serialize(elems_[i], buf, end, indirect_data_);
}
return buf;
}
-bool AuthorizationSet::Deserialize(const uint8_t** buf, const uint8_t* end) {
+bool AuthorizationSet::Deserialize(const uint8_t** buf_ptr, const uint8_t* end) {
FreeData();
uint32_t elements_count;
uint32_t elements_size;
- if (!copy_size_and_data_from_buf(buf, end, &indirect_data_size_, &indirect_data_) ||
- !copy_from_buf(buf, end, &elements_count) || !copy_from_buf(buf, end, &elements_size)) {
+ if (!copy_size_and_data_from_buf(buf_ptr, end, &indirect_data_size_, &indirect_data_) ||
+ !copy_uint32_from_buf(buf_ptr, end, &elements_count) ||
+ !copy_uint32_from_buf(buf_ptr, end, &elements_size)) {
set_invalid(MALFORMED_DATA);
return false;
}
// Note that the following validation of elements_count is weak, but it prevents allocation of
// elems_ arrays which are clearly too large to be reasonable.
- if (elements_size > end - *buf || elements_count * sizeof(uint32_t) > elements_size) {
+ if (elements_size > end - *buf_ptr || elements_count * sizeof(uint32_t) > elements_size) {
set_invalid(MALFORMED_DATA);
return false;
}
@@ -334,9 +332,9 @@
}
uint8_t* indirect_end = indirect_data_ + indirect_data_size_;
- const uint8_t* elements_end = *buf + elements_size;
+ const uint8_t* elements_end = *buf_ptr + elements_size;
for (size_t i = 0; i < elements_count; ++i) {
- if (!deserialize(elems_ + i, buf, elements_end, indirect_data_, indirect_end)) {
+ if (!deserialize(elems_ + i, buf_ptr, elements_end, indirect_data_, indirect_end)) {
set_invalid(MALFORMED_DATA);
return false;
}