Run clang-format on missed files
It turnes out I missed a few files when doing the
merge (crrev.com/c/2363183). Hopefully these are the last of them. No
manual changes. Just clang-format on a copy in platform2/verity and
rsynced back to platform/verity.
BUG=chromium:886953
TEST=CQ passes
Change-Id: Ib28f34bd23f19185770873dca9c5ef0b9549e634
Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/dm-verity/+/2363568
Tested-by: Amin Hassani <ahassani@chromium.org>
Auto-Submit: Amin Hassani <ahassani@chromium.org>
Reviewed-by: Mike Frysinger <vapier@chromium.org>
Reviewed-by: Jorge Lucangeli Obes <jorgelo@chromium.org>
Commit-Queue: Amin Hassani <ahassani@chromium.org>
diff --git a/dm-bht.h b/dm-bht.h
index eac9663..0a4b2b2 100644
--- a/dm-bht.h
+++ b/dm-bht.h
@@ -20,14 +20,14 @@
* max to use for now.
*/
#define DM_BHT_MAX_DIGEST_SIZE 128 /* 1k hashes are unlikely for now */
-#define DM_BHT_SALT_SIZE 32 /* 256 bits of salt is a lot */
+#define DM_BHT_SALT_SIZE 32 /* 256 bits of salt is a lot */
/* UNALLOCATED, PENDING, READY, and VERIFIED are valid states. All other
* values are entry-related return codes.
*/
-#define DM_BHT_ENTRY_VERIFIED 8 /* 'nodes' has been checked against parent */
-#define DM_BHT_ENTRY_READY 4 /* 'nodes' is loaded and available */
-#define DM_BHT_ENTRY_PENDING 2 /* 'nodes' is being loaded */
+#define DM_BHT_ENTRY_VERIFIED 8 /* 'nodes' has been checked against parent */
+#define DM_BHT_ENTRY_READY 4 /* 'nodes' is loaded and available */
+#define DM_BHT_ENTRY_PENDING 2 /* 'nodes' is being loaded */
#define DM_BHT_ENTRY_UNALLOCATED 0 /* untouched */
#define DM_BHT_ENTRY_ERROR -1 /* entry is unsuitable for use */
#define DM_BHT_ENTRY_ERROR_IO -2 /* I/O error on load */
diff --git a/file_hasher_unittest.cc b/file_hasher_unittest.cc
index 84b2360..f13b054 100644
--- a/file_hasher_unittest.cc
+++ b/file_hasher_unittest.cc
@@ -12,8 +12,8 @@
#include "verity/simple_file/mock_file.h"
#include "verity/utils.h"
-using ::testing::_; // wildcard mock matcher
-using ::testing::AtLeast; // Times modifier
+using ::testing::_; // wildcard mock matcher
+using ::testing::AtLeast; // Times modifier
using ::testing::DefaultValue; // allow for easy default return value change
using ::testing::InSequence;
using ::testing::Invoke; // mock Invoke action
@@ -21,9 +21,8 @@
class FileHasherTest : public ::testing::Test {
public:
- FileHasherTest() :
- src_(new simple_file::MockFile()),
- dst_(new simple_file::MockFile()) { }
+ FileHasherTest()
+ : src_(new simple_file::MockFile()), dst_(new simple_file::MockFile()) {}
~FileHasherTest() {
delete src_;
delete dst_;
@@ -35,24 +34,24 @@
delete hasher_;
hasher_ = new verity::FileHasher();
}
+
protected:
- simple_file::MockFile *src_;
- simple_file::MockFile *dst_;
- verity::FileHasher *hasher_;
+ simple_file::MockFile* src_;
+ simple_file::MockFile* dst_;
+ verity::FileHasher* hasher_;
};
MATCHER_P(DigestMatch, a, "given hexdigest matches binary digest arg") {
- static char last_digest_match[256] = { 0 };
- char *hexdigest = new char[strlen(a) + 1];
- verity_utils::to_hex(hexdigest, arg, strlen(a)/2);
+ static char last_digest_match[256] = {0};
+ char* hexdigest = new char[strlen(a) + 1];
+ verity_utils::to_hex(hexdigest, arg, strlen(a) / 2);
bool ok = !strcmp(a, hexdigest);
- LOG(INFO) << "DigestMatcher: "
- << hexdigest << (ok? " == " : " != ") << a;
- delete [] hexdigest;
+ LOG(INFO) << "DigestMatcher: " << hexdigest << (ok ? " == " : " != ") << a;
+ delete[] hexdigest;
// Store this away globally so we can easily re use it.
// Later this needs to be supported by a MockFile.
- if (sizeof(last_digest_match) > strlen(a)/2) {
- memcpy(last_digest_match, arg, strlen(a)/2);
+ if (sizeof(last_digest_match) > strlen(a) / 2) {
+ memcpy(last_digest_match, arg, strlen(a) / 2);
}
return ok;
}
diff --git a/simple_file/env.cc b/simple_file/env.cc
index bb8b0a6..5ecaee9 100644
--- a/simple_file/env.cc
+++ b/simple_file/env.cc
@@ -7,6 +7,6 @@
namespace simple_file {
-Env::Env() { }
+Env::Env() {}
} // namespace simple_file
diff --git a/simple_file/file.cc b/simple_file/file.cc
index c4a672b..ed3dca3 100644
--- a/simple_file/file.cc
+++ b/simple_file/file.cc
@@ -7,16 +7,14 @@
namespace simple_file {
-const Env *File::env() const {
+const Env* File::env() const {
if (env_) {
return env_;
}
return default_env_;
}
-bool File::Initialize(const char *path,
- int flags,
- const Env *new_env) {
+bool File::Initialize(const char* path, int flags, const Env* new_env) {
if (fd_ >= 0) {
LOG(ERROR) << "Attempted to Initialize while in use";
return false;
@@ -30,7 +28,7 @@
if (flags & O_CREAT) {
// TODO(wad) less hacky
- fd_ = env()->Create(path, flags, S_IRUSR|S_IWUSR);
+ fd_ = env()->Create(path, flags, S_IRUSR | S_IWUSR);
} else {
fd_ = env()->Open(path, flags);
}
@@ -72,7 +70,7 @@
return offset_;
}
-bool File::Read(int bytes, uint8_t *buf) {
+bool File::Read(int bytes, uint8_t* buf) {
if (!ReadAt(bytes, buf, offset_)) {
return false;
}
@@ -80,7 +78,7 @@
return true;
}
-bool File::ReadAt(int bytes, uint8_t *buf, off_t offset) {
+bool File::ReadAt(int bytes, uint8_t* buf, off_t offset) {
if (fd_ < 0) {
LOG(ERROR) << "Read called with an invalid fd";
return false;
@@ -102,7 +100,7 @@
return false;
}
-int64_t File::Size() const {
+int64_t File::Size() const {
if (fd_ < 0) {
LOG(ERROR) << "Size called with an invalid fd";
return false;
@@ -124,7 +122,7 @@
return size;
}
-bool File::WriteAt(int bytes, const uint8_t *buf, off_t offset) {
+bool File::WriteAt(int bytes, const uint8_t* buf, off_t offset) {
if (fd_ < 0) {
LOG(ERROR) << "Write called with an invalid fd";
return false;
@@ -145,7 +143,7 @@
return false;
}
-bool File::Write(int bytes, const uint8_t *buf) {
+bool File::Write(int bytes, const uint8_t* buf) {
if (!WriteAt(bytes, buf, offset_)) {
return false;
}
diff --git a/utils.cc b/utils.cc
index 5ffb1a3..5f6c826 100644
--- a/utils.cc
+++ b/utils.cc
@@ -9,12 +9,12 @@
namespace verity_utils {
-void to_hex(char *hexdigest,
- const uint8_t *digest,
+void to_hex(char* hexdigest,
+ const uint8_t* digest,
unsigned int digest_length) {
- for (unsigned int i = 0; i < digest_length ; i++) {
+ for (unsigned int i = 0; i < digest_length; i++) {
// NOLINTNEXTLINE(runtime/printf)
- sprintf(hexdigest+(2*i), "%02x", static_cast<int>(digest[i]));
+ sprintf(hexdigest + (2 * i), "%02x", static_cast<int>(digest[i]));
}
}
diff --git a/verity_main.cc b/verity_main.cc
index 97e042c..0fb1dca 100644
--- a/verity_main.cc
+++ b/verity_main.cc
@@ -13,49 +13,51 @@
#include "verity/utils.h"
namespace {
-void print_usage(const char *name) {
+void print_usage(const char* name) {
// We used to advertise more algorithms, but they've never been implemented:
// sha512 sha384 sha mdc2 ripemd160 md4 md2
- fprintf(stderr,
-"Usage:\n"
-" %s <arg>=<value>...\n"
-"Options:\n"
-" mode One of 'create' or 'verify'\n"
-" alg Hash algorithm to use. One of:\n"
-" sha256 sha224 sha1 md5\n"
-" payload Path to the image to hash\n"
-" payload_blocks Size of the image, in blocks (4096 bytes)\n"
-" hashtree Path to a hash tree to create or read from\n"
-" root_hexdigest Digest of the root node (in hex) for verification\n"
-" salt Salt (in hex)\n"
-"\n", name);
+ fprintf(
+ stderr,
+ "Usage:\n"
+ " %s <arg>=<value>...\n"
+ "Options:\n"
+ " mode One of 'create' or 'verify'\n"
+ " alg Hash algorithm to use. One of:\n"
+ " sha256 sha224 sha1 md5\n"
+ " payload Path to the image to hash\n"
+ " payload_blocks Size of the image, in blocks (4096 bytes)\n"
+ " hashtree Path to a hash tree to create or read from\n"
+ " root_hexdigest Digest of the root node (in hex) for verification\n"
+ " salt Salt (in hex)\n"
+ "\n",
+ name);
}
typedef enum { VERITY_NONE = 0, VERITY_CREATE, VERITY_VERIFY } verity_mode_t;
-static unsigned int parse_blocks(const char *block_s) {
+static unsigned int parse_blocks(const char* block_s) {
return (unsigned int)strtoul(block_s, NULL, 0);
}
} // namespace
-static int verity_create(const char *alg,
- const char *image_path,
+static int verity_create(const char* alg,
+ const char* image_path,
unsigned int image_blocks,
- const char *hash_path,
- const char *salt);
+ const char* hash_path,
+ const char* salt);
-void splitarg(char *arg, char **key, char **val) {
- char *sp = NULL;
+void splitarg(char* arg, char** key, char** val) {
+ char* sp = NULL;
*key = strtok_r(arg, "=", &sp);
*val = strtok_r(NULL, "=", &sp);
}
-int main(int argc, char **argv) {
+int main(int argc, char** argv) {
verity_mode_t mode = VERITY_CREATE;
- const char *alg = NULL;
- const char *payload = NULL;
- const char *hashtree = NULL;
- const char *salt = NULL;
+ const char* alg = NULL;
+ const char* payload = NULL;
+ const char* hashtree = NULL;
+ const char* salt = NULL;
unsigned int payload_blocks = 0;
int i;
char *key, *val;
@@ -91,10 +93,8 @@
}
if (!alg || !payload || !hashtree) {
- fprintf(stderr, "missing data: %s%s%s\n",
- alg ? "" : "alg ",
- payload ? "" : "payload ",
- hashtree ? "" : "hashtree");
+ fprintf(stderr, "missing data: %s%s%s\n", alg ? "" : "alg ",
+ payload ? "" : "payload ", hashtree ? "" : "hashtree");
print_usage(argv[0]);
return -1;
}
@@ -107,36 +107,30 @@
return -1;
}
-static int verity_create(const char *alg,
- const char *image_path,
+static int verity_create(const char* alg,
+ const char* image_path,
unsigned int image_blocks,
- const char *hash_path,
- const char *salt) {
+ const char* hash_path,
+ const char* salt) {
// Configure files
simple_file::Env env;
simple_file::File source;
LOG_IF(FATAL, !source.Initialize(image_path, O_RDONLY, &env))
- << "Failed to open the source file: " << image_path;
+ << "Failed to open the source file: " << image_path;
simple_file::File destination;
- LOG_IF(FATAL, !destination.Initialize(hash_path,
- O_CREAT|O_RDWR|O_TRUNC,
- &env))
- << "Failed to open destination file: " << hash_path;
+ LOG_IF(FATAL,
+ !destination.Initialize(hash_path, O_CREAT | O_RDWR | O_TRUNC, &env))
+ << "Failed to open destination file: " << hash_path;
// Create the actual worker and create the hash image.
verity::FileHasher hasher;
- LOG_IF(FATAL, !hasher.Initialize(&source,
- &destination,
- image_blocks,
- alg))
- << "Failed to initialize hasher";
+ LOG_IF(FATAL, !hasher.Initialize(&source, &destination, image_blocks, alg))
+ << "Failed to initialize hasher";
if (salt)
hasher.set_salt(salt);
- LOG_IF(FATAL, !hasher.Hash())
- << "Failed to hash hasher";
- LOG_IF(FATAL, !hasher.Store())
- << "Failed to store hasher";
+ LOG_IF(FATAL, !hasher.Hash()) << "Failed to hash hasher";
+ LOG_IF(FATAL, !hasher.Store()) << "Failed to store hasher";
hasher.PrintTable(true);
return 0;
}