Reformat the WebRTC code base

Running clang-format with chromium's style guide.

The goal is n-fold:
 * providing consistency and readability (that's what code guidelines are for)
 * preventing noise with presubmit checks and git cl format
 * building on the previous point: making it easier to automatically fix format issues
 * you name it

Please consider using git-hyper-blame to ignore this commit.

Bug: webrtc:9340
Change-Id: I694567c4cdf8cee2860958cfe82bfaf25848bb87
Reviewed-on: https://webrtc-review.googlesource.com/81185
Reviewed-by: Patrik Höglund <phoglund@webrtc.org>
Cr-Commit-Position: refs/heads/master@{#23660}
This commit is contained in:
Yves Gerey
2018-06-19 15:03:05 +02:00
parent b602123a5a
commit 665174fdbb
1569 changed files with 30495 additions and 30309 deletions

View File

@ -8,7 +8,6 @@
* be found in the AUTHORS file in the root of the source tree.
*/
#include <algorithm>
#include <memory>
#include <set>
@ -135,22 +134,20 @@ class SSLDummyStreamBase : public rtc::StreamInterface,
public sigslot::has_slots<> {
public:
SSLDummyStreamBase(SSLStreamAdapterTestBase* test,
const std::string &side,
const std::string& side,
rtc::StreamInterface* in,
rtc::StreamInterface* out) :
test_base_(test),
side_(side),
in_(in),
out_(out),
first_packet_(true) {
rtc::StreamInterface* out)
: test_base_(test), side_(side), in_(in), out_(out), first_packet_(true) {
in_->SignalEvent.connect(this, &SSLDummyStreamBase::OnEventIn);
out_->SignalEvent.connect(this, &SSLDummyStreamBase::OnEventOut);
}
rtc::StreamState GetState() const override { return rtc::SS_OPEN; }
rtc::StreamResult Read(void* buffer, size_t buffer_len,
size_t* read, int* error) override {
rtc::StreamResult Read(void* buffer,
size_t buffer_len,
size_t* read,
int* error) override {
rtc::StreamResult r;
r = in_->Read(buffer, buffer_len, read, error);
@ -189,13 +186,17 @@ class SSLDummyStreamBase : public rtc::StreamInterface,
}
// Write to the outgoing FifoBuffer
rtc::StreamResult WriteData(const void* data, size_t data_len,
size_t* written, int* error) {
rtc::StreamResult WriteData(const void* data,
size_t data_len,
size_t* written,
int* error) {
return out_->Write(data, data_len, written, error);
}
rtc::StreamResult Write(const void* data, size_t data_len,
size_t* written, int* error) override;
rtc::StreamResult Write(const void* data,
size_t data_len,
size_t* written,
int* error) override;
void Close() override {
RTC_LOG(LS_INFO) << "Closing outbound stream";
@ -215,17 +216,14 @@ class SSLDummyStreamTLS : public SSLDummyStreamBase {
SSLDummyStreamTLS(SSLStreamAdapterTestBase* test,
const std::string& side,
rtc::FifoBuffer* in,
rtc::FifoBuffer* out) :
SSLDummyStreamBase(test, side, in, out) {
}
rtc::FifoBuffer* out)
: SSLDummyStreamBase(test, side, in, out) {}
};
class BufferQueueStream : public rtc::BufferQueue,
public rtc::StreamInterface {
class BufferQueueStream : public rtc::BufferQueue, public rtc::StreamInterface {
public:
BufferQueueStream(size_t capacity, size_t default_size)
: rtc::BufferQueue(capacity, default_size) {
}
: rtc::BufferQueue(capacity, default_size) {}
// Implementation of abstract StreamInterface methods.
@ -233,8 +231,10 @@ class BufferQueueStream : public rtc::BufferQueue,
rtc::StreamState GetState() const override { return rtc::SS_OPEN; }
// Reading a buffer queue stream will either succeed or block.
rtc::StreamResult Read(void* buffer, size_t buffer_len,
size_t* read, int* error) override {
rtc::StreamResult Read(void* buffer,
size_t buffer_len,
size_t* read,
int* error) override {
if (!ReadFront(buffer, buffer_len, read)) {
return rtc::SR_BLOCK;
}
@ -242,8 +242,10 @@ class BufferQueueStream : public rtc::BufferQueue,
}
// Writing to a buffer queue stream will either succeed or block.
rtc::StreamResult Write(const void* data, size_t data_len,
size_t* written, int* error) override {
rtc::StreamResult Write(const void* data,
size_t data_len,
size_t* written,
int* error) override {
if (!WriteBack(data, data_len, written)) {
return rtc::SR_BLOCK;
}
@ -254,13 +256,9 @@ class BufferQueueStream : public rtc::BufferQueue,
void Close() override {}
protected:
void NotifyReadableForTest() override {
PostEvent(rtc::SE_READ, 0);
}
void NotifyReadableForTest() override { PostEvent(rtc::SE_READ, 0); }
void NotifyWritableForTest() override {
PostEvent(rtc::SE_WRITE, 0);
}
void NotifyWritableForTest() override { PostEvent(rtc::SE_WRITE, 0); }
};
class SSLDummyStreamDTLS : public SSLDummyStreamBase {
@ -268,9 +266,8 @@ class SSLDummyStreamDTLS : public SSLDummyStreamBase {
SSLDummyStreamDTLS(SSLStreamAdapterTestBase* test,
const std::string& side,
BufferQueueStream* in,
BufferQueueStream* out) :
SSLDummyStreamBase(test, side, in, out) {
}
BufferQueueStream* out)
: SSLDummyStreamBase(test, side, in, out) {}
};
static const int kFifoBufferSize = 4096;
@ -372,7 +369,7 @@ class SSLStreamAdapterTestBase : public testing::Test,
server_ssl_->SetIdentity(server_identity_);
}
virtual void OnEvent(rtc::StreamInterface *stream, int sig, int err) {
virtual void OnEvent(rtc::StreamInterface* stream, int sig, int err) {
RTC_LOG(LS_VERBOSE) << "SSLStreamAdapterTestBase::OnEvent sig=" << sig;
if (sig & rtc::SE_READ) {
@ -433,10 +430,8 @@ class SSLStreamAdapterTestBase : public testing::Test,
}
void TestHandshake(bool expect_success = true) {
server_ssl_->SetMode(dtls_ ? rtc::SSL_MODE_DTLS :
rtc::SSL_MODE_TLS);
client_ssl_->SetMode(dtls_ ? rtc::SSL_MODE_DTLS :
rtc::SSL_MODE_TLS);
server_ssl_->SetMode(dtls_ ? rtc::SSL_MODE_DTLS : rtc::SSL_MODE_TLS);
client_ssl_->SetMode(dtls_ ? rtc::SSL_MODE_DTLS : rtc::SSL_MODE_TLS);
if (!dtls_) {
// Make sure we simulate a reliable network for TLS.
@ -462,8 +457,8 @@ class SSLStreamAdapterTestBase : public testing::Test,
// Now run the handshake
if (expect_success) {
EXPECT_TRUE_WAIT((client_ssl_->GetState() == rtc::SS_OPEN)
&& (server_ssl_->GetState() == rtc::SS_OPEN),
EXPECT_TRUE_WAIT((client_ssl_->GetState() == rtc::SS_OPEN) &&
(server_ssl_->GetState() == rtc::SS_OPEN),
handshake_wait_);
} else {
EXPECT_TRUE_WAIT(client_ssl_->GetState() == rtc::SS_CLOSED,
@ -524,9 +519,11 @@ class SSLStreamAdapterTestBase : public testing::Test,
}
}
rtc::StreamResult DataWritten(SSLDummyStreamBase *from, const void *data,
size_t data_len, size_t *written,
int *error) {
rtc::StreamResult DataWritten(SSLDummyStreamBase* from,
const void* data,
size_t data_len,
size_t* written,
int* error) {
// Randomly drop loss_ percent of packets
if (rtc::CreateRandomId() % 100 < static_cast<uint32_t>(loss_)) {
RTC_LOG(LS_VERBOSE) << "Randomly dropping packet, size=" << data_len;
@ -542,7 +539,7 @@ class SSLStreamAdapterTestBase : public testing::Test,
// Optionally damage application data (type 23). Note that we don't damage
// handshake packets and we damage the last byte to keep the header
// intact but break the MAC.
if (damage_ && (*static_cast<const unsigned char *>(data) == 23)) {
if (damage_ && (*static_cast<const unsigned char*>(data) == 23)) {
std::vector<char> buf(data_len);
RTC_LOG(LS_VERBOSE) << "Damaging packet";
@ -556,31 +553,19 @@ class SSLStreamAdapterTestBase : public testing::Test,
return from->WriteData(data, data_len, written, error);
}
void SetDelay(int delay) {
delay_ = delay;
}
void SetDelay(int delay) { delay_ = delay; }
int GetDelay() { return delay_; }
void SetLoseFirstPacket(bool lose) {
lose_first_packet_ = lose;
}
void SetLoseFirstPacket(bool lose) { lose_first_packet_ = lose; }
bool GetLoseFirstPacket() { return lose_first_packet_; }
void SetLoss(int percent) {
loss_ = percent;
}
void SetLoss(int percent) { loss_ = percent; }
void SetDamage() {
damage_ = true;
}
void SetDamage() { damage_ = true; }
void SetMtu(size_t mtu) {
mtu_ = mtu;
}
void SetMtu(size_t mtu) { mtu_ = mtu; }
void SetHandshakeWait(int wait) {
handshake_wait_ = wait;
}
void SetHandshakeWait(int wait) { handshake_wait_ = wait; }
void SetDtlsSrtpCryptoSuites(const std::vector<int>& ciphers, bool client) {
if (client)
@ -620,28 +605,24 @@ class SSLStreamAdapterTestBase : public testing::Test,
return server_ssl_->GetSslVersion();
}
bool ExportKeyingMaterial(const char *label,
const unsigned char *context,
bool ExportKeyingMaterial(const char* label,
const unsigned char* context,
size_t context_len,
bool use_context,
bool client,
unsigned char *result,
unsigned char* result,
size_t result_len) {
if (client)
return client_ssl_->ExportKeyingMaterial(label,
context, context_len,
use_context,
result, result_len);
return client_ssl_->ExportKeyingMaterial(label, context, context_len,
use_context, result, result_len);
else
return server_ssl_->ExportKeyingMaterial(label,
context, context_len,
use_context,
result, result_len);
return server_ssl_->ExportKeyingMaterial(label, context, context_len,
use_context, result, result_len);
}
// To be implemented by subclasses.
virtual void WriteData() = 0;
virtual void ReadData(rtc::StreamInterface *stream) = 0;
virtual void ReadData(rtc::StreamInterface* stream) = 0;
virtual void TestTransfer(int size) = 0;
protected:
@ -649,12 +630,12 @@ class SSLStreamAdapterTestBase : public testing::Test,
std::string client_private_key_pem_;
rtc::KeyParams client_key_type_;
rtc::KeyParams server_key_type_;
SSLDummyStreamBase *client_stream_; // freed by client_ssl_ destructor
SSLDummyStreamBase *server_stream_; // freed by server_ssl_ destructor
SSLDummyStreamBase* client_stream_; // freed by client_ssl_ destructor
SSLDummyStreamBase* server_stream_; // freed by server_ssl_ destructor
std::unique_ptr<rtc::SSLStreamAdapter> client_ssl_;
std::unique_ptr<rtc::SSLStreamAdapter> server_ssl_;
rtc::SSLIdentity *client_identity_; // freed by client_ssl_ destructor
rtc::SSLIdentity *server_identity_; // freed by server_ssl_ destructor
rtc::SSLIdentity* client_identity_; // freed by client_ssl_ destructor
rtc::SSLIdentity* server_identity_; // freed by server_ssl_ destructor
int delay_;
size_t mtu_;
int loss_;
@ -676,8 +657,7 @@ class SSLStreamAdapterTestTLS
::testing::get<0>(GetParam()),
::testing::get<1>(GetParam())),
client_buffer_(kFifoBufferSize),
server_buffer_(kFifoBufferSize) {
}
server_buffer_(kFifoBufferSize) {}
void CreateStreams() override {
client_stream_ =
@ -712,8 +692,8 @@ class SSLStreamAdapterTestTLS
recv_stream_.GetSize(&received);
EXPECT_EQ(static_cast<size_t>(size), received);
EXPECT_EQ(0, memcmp(send_stream_.GetBuffer(),
recv_stream_.GetBuffer(), size));
EXPECT_EQ(0,
memcmp(send_stream_.GetBuffer(), recv_stream_.GetBuffer(), size));
}
void WriteData() override {
@ -752,7 +732,7 @@ class SSLStreamAdapterTestTLS
}
};
void ReadData(rtc::StreamInterface *stream) override {
void ReadData(rtc::StreamInterface* stream) override {
char buffer[1600];
size_t bread;
int err2;
@ -802,12 +782,13 @@ class SSLStreamAdapterTestDTLS
sent_(0) {}
SSLStreamAdapterTestDTLS(const std::string& cert_pem,
const std::string& private_key_pem) :
SSLStreamAdapterTestBase(cert_pem, private_key_pem, true),
client_buffer_(kBufferCapacity, kDefaultBufferSize),
server_buffer_(kBufferCapacity, kDefaultBufferSize),
packet_size_(1000), count_(0), sent_(0) {
}
const std::string& private_key_pem)
: SSLStreamAdapterTestBase(cert_pem, private_key_pem, true),
client_buffer_(kBufferCapacity, kDefaultBufferSize),
server_buffer_(kBufferCapacity, kDefaultBufferSize),
packet_size_(1000),
count_(0),
sent_(0) {}
void CreateStreams() override {
client_stream_ =
@ -817,7 +798,7 @@ class SSLStreamAdapterTestDTLS
}
void WriteData() override {
unsigned char *packet = new unsigned char[1600];
unsigned char* packet = new unsigned char[1600];
while (sent_ < count_) {
unsigned int rand_state = sent_;
@ -842,10 +823,10 @@ class SSLStreamAdapterTestDTLS
}
}
delete [] packet;
delete[] packet;
}
void ReadData(rtc::StreamInterface *stream) override {
void ReadData(rtc::StreamInterface* stream) override {
unsigned char buffer[2000];
size_t bread;
int err2;
@ -893,7 +874,7 @@ class SSLStreamAdapterTestDTLS
WAIT(false, 2000);
EXPECT_EQ(0U, received_.size());
} else if (loss_ == 0) {
EXPECT_EQ_WAIT(static_cast<size_t>(sent_), received_.size(), 1000);
EXPECT_EQ_WAIT(static_cast<size_t>(sent_), received_.size(), 1000);
} else {
RTC_LOG(LS_INFO) << "Sent " << sent_ << " packets; received "
<< received_.size();
@ -909,9 +890,10 @@ class SSLStreamAdapterTestDTLS
std::set<int> received_;
};
rtc::StreamResult SSLDummyStreamBase::Write(const void* data, size_t data_len,
size_t* written, int* error) {
rtc::StreamResult SSLDummyStreamBase::Write(const void* data,
size_t data_len,
size_t* written,
int* error) {
RTC_LOG(LS_VERBOSE) << "Writing to loopback " << data_len;
if (first_packet_) {
@ -928,9 +910,8 @@ rtc::StreamResult SSLDummyStreamBase::Write(const void* data, size_t data_len,
class SSLStreamAdapterTestDTLSFromPEMStrings : public SSLStreamAdapterTestDTLS {
public:
SSLStreamAdapterTestDTLSFromPEMStrings() :
SSLStreamAdapterTestDTLS(kCERT_PEM, kRSA_PRIVATE_KEY_PEM) {
}
SSLStreamAdapterTestDTLSFromPEMStrings()
: SSLStreamAdapterTestDTLS(kCERT_PEM, kRSA_PRIVATE_KEY_PEM) {}
};
// Test fixture for certificate chaining. Server will push more than one
@ -1305,28 +1286,28 @@ TEST_P(SSLStreamAdapterTestDTLS, TestDTLSSrtpKeyAndSaltLengths) {
int key_len;
int salt_len;
ASSERT_FALSE(rtc::GetSrtpKeyAndSaltLengths(
rtc::SRTP_INVALID_CRYPTO_SUITE, &key_len, &salt_len));
ASSERT_FALSE(rtc::GetSrtpKeyAndSaltLengths(rtc::SRTP_INVALID_CRYPTO_SUITE,
&key_len, &salt_len));
ASSERT_TRUE(rtc::GetSrtpKeyAndSaltLengths(
rtc::SRTP_AES128_CM_SHA1_32, &key_len, &salt_len));
ASSERT_EQ(128/8, key_len);
ASSERT_EQ(112/8, salt_len);
ASSERT_TRUE(rtc::GetSrtpKeyAndSaltLengths(rtc::SRTP_AES128_CM_SHA1_32,
&key_len, &salt_len));
ASSERT_EQ(128 / 8, key_len);
ASSERT_EQ(112 / 8, salt_len);
ASSERT_TRUE(rtc::GetSrtpKeyAndSaltLengths(
rtc::SRTP_AES128_CM_SHA1_80, &key_len, &salt_len));
ASSERT_EQ(128/8, key_len);
ASSERT_EQ(112/8, salt_len);
ASSERT_TRUE(rtc::GetSrtpKeyAndSaltLengths(rtc::SRTP_AES128_CM_SHA1_80,
&key_len, &salt_len));
ASSERT_EQ(128 / 8, key_len);
ASSERT_EQ(112 / 8, salt_len);
ASSERT_TRUE(rtc::GetSrtpKeyAndSaltLengths(
rtc::SRTP_AEAD_AES_128_GCM, &key_len, &salt_len));
ASSERT_EQ(128/8, key_len);
ASSERT_EQ(96/8, salt_len);
ASSERT_TRUE(rtc::GetSrtpKeyAndSaltLengths(rtc::SRTP_AEAD_AES_128_GCM,
&key_len, &salt_len));
ASSERT_EQ(128 / 8, key_len);
ASSERT_EQ(96 / 8, salt_len);
ASSERT_TRUE(rtc::GetSrtpKeyAndSaltLengths(
rtc::SRTP_AEAD_AES_256_GCM, &key_len, &salt_len));
ASSERT_EQ(256/8, key_len);
ASSERT_EQ(96/8, salt_len);
ASSERT_TRUE(rtc::GetSrtpKeyAndSaltLengths(rtc::SRTP_AEAD_AES_256_GCM,
&key_len, &salt_len));
ASSERT_EQ(256 / 8, key_len);
ASSERT_EQ(96 / 8, salt_len);
};
// Test an exporter
@ -1336,16 +1317,14 @@ TEST_P(SSLStreamAdapterTestDTLS, TestDTLSExporter) {
unsigned char server_out[20];
bool result;
result = ExportKeyingMaterial(kExporterLabel,
kExporterContext, kExporterContextLen,
true, true,
client_out, sizeof(client_out));
result = ExportKeyingMaterial(kExporterLabel, kExporterContext,
kExporterContextLen, true, true, client_out,
sizeof(client_out));
ASSERT_TRUE(result);
result = ExportKeyingMaterial(kExporterLabel,
kExporterContext, kExporterContextLen,
true, false,
server_out, sizeof(server_out));
result = ExportKeyingMaterial(kExporterLabel, kExporterContext,
kExporterContextLen, true, false, server_out,
sizeof(server_out));
ASSERT_TRUE(result);
ASSERT_TRUE(!memcmp(client_out, server_out, sizeof(client_out)));