mirror of
https://github.com/Telecominfraproject/OpenCellular.git
synced 2025-11-26 19:25:02 +00:00
Use uint64_t and avoid down casting as much as possible.
Change-Id: I231d1b3a059907c3806feced7e1b8f1c06575ba5 BUG=chromeos-partner:2912 TEST=make clean all && make runtests Review URL: http://codereview.chromium.org/6733018
This commit is contained in:
@@ -9,9 +9,9 @@
|
||||
#include "stateful_util.h"
|
||||
#include "utility.h"
|
||||
|
||||
int RSAProcessedKeySize(unsigned int algorithm, int* out_size) {
|
||||
int key_len; /* Key length in bytes. */
|
||||
if (algorithm < (unsigned int)kNumAlgorithms) {
|
||||
uint64_t RSAProcessedKeySize(uint64_t algorithm, uint64_t* out_size) {
|
||||
uint64_t key_len; /* Key length in bytes. */
|
||||
if (algorithm < kNumAlgorithms) {
|
||||
key_len = siglen_map[algorithm];
|
||||
/* Total size needed by a RSAPublicKey structure is =
|
||||
* 2 * key_len bytes for the n and rr arrays
|
||||
@@ -38,10 +38,10 @@ void RSAPublicKeyFree(RSAPublicKey* key) {
|
||||
}
|
||||
}
|
||||
|
||||
RSAPublicKey* RSAPublicKeyFromBuf(const uint8_t* buf, int len) {
|
||||
RSAPublicKey* RSAPublicKeyFromBuf(const uint8_t* buf, uint64_t len) {
|
||||
RSAPublicKey* key = RSAPublicKeyNew();
|
||||
MemcpyState st;
|
||||
int key_len;
|
||||
uint64_t key_len;
|
||||
|
||||
st.remaining_buf = (uint8_t*) buf;
|
||||
st.remaining_len = len;
|
||||
@@ -81,7 +81,7 @@ int RSAVerifyBinary_f(const uint8_t* key_blob,
|
||||
unsigned int algorithm) {
|
||||
RSAPublicKey* verification_key = NULL;
|
||||
uint8_t* digest = NULL;
|
||||
int key_size;
|
||||
uint64_t key_size;
|
||||
int sig_size;
|
||||
int success;
|
||||
|
||||
@@ -120,7 +120,7 @@ int RSAVerifyBinaryWithDigest_f(const uint8_t* key_blob,
|
||||
const uint8_t* sig,
|
||||
unsigned int algorithm) {
|
||||
RSAPublicKey* verification_key = NULL;
|
||||
int key_size;
|
||||
uint64_t key_size;
|
||||
int sig_size;
|
||||
int success;
|
||||
|
||||
|
||||
Reference in New Issue
Block a user