Merge pull request #716 from gavinandresen/cleanup

Cleanups suggested by genjix
This commit is contained in:
Gavin Andresen 2011-12-20 08:52:22 -08:00
commit 74f5435e10
15 changed files with 35 additions and 78 deletions

View File

@ -115,9 +115,9 @@ public:
{ {
unsigned long n = BN_get_word(this); unsigned long n = BN_get_word(this);
if (!BN_is_negative(this)) if (!BN_is_negative(this))
return (n > INT_MAX ? INT_MAX : n); return (n > std::numeric_limits<int>::max() ? std::numeric_limits<int>::max() : n);
else else
return (n > INT_MAX ? INT_MIN : -(int)n); return (n > std::numeric_limits<int>::max() ? std::numeric_limits<int>::min() : -(int)n);
} }
void setint64(int64 n) void setint64(int64 n)

View File

@ -950,7 +950,7 @@ struct tallyitem
tallyitem() tallyitem()
{ {
nAmount = 0; nAmount = 0;
nConf = INT_MAX; nConf = std::numeric_limits<int>::max();
} }
}; };
@ -1002,7 +1002,7 @@ Value ListReceived(const Array& params, bool fByAccounts)
continue; continue;
int64 nAmount = 0; int64 nAmount = 0;
int nConf = INT_MAX; int nConf = std::numeric_limits<int>::max();
if (it != mapTally.end()) if (it != mapTally.end())
{ {
nAmount = (*it).second.nAmount; nAmount = (*it).second.nAmount;
@ -1021,7 +1021,7 @@ Value ListReceived(const Array& params, bool fByAccounts)
obj.push_back(Pair("address", address.ToString())); obj.push_back(Pair("address", address.ToString()));
obj.push_back(Pair("account", strAccount)); obj.push_back(Pair("account", strAccount));
obj.push_back(Pair("amount", ValueFromAmount(nAmount))); obj.push_back(Pair("amount", ValueFromAmount(nAmount)));
obj.push_back(Pair("confirmations", (nConf == INT_MAX ? 0 : nConf))); obj.push_back(Pair("confirmations", (nConf == std::numeric_limits<int>::max() ? 0 : nConf)));
ret.push_back(obj); ret.push_back(obj);
} }
} }
@ -1035,7 +1035,7 @@ Value ListReceived(const Array& params, bool fByAccounts)
Object obj; Object obj;
obj.push_back(Pair("account", (*it).first)); obj.push_back(Pair("account", (*it).first));
obj.push_back(Pair("amount", ValueFromAmount(nAmount))); obj.push_back(Pair("amount", ValueFromAmount(nAmount)));
obj.push_back(Pair("confirmations", (nConf == INT_MAX ? 0 : nConf))); obj.push_back(Pair("confirmations", (nConf == std::numeric_limits<int>::max() ? 0 : nConf)));
ret.push_back(obj); ret.push_back(obj);
} }
} }

View File

@ -21,9 +21,6 @@
// Include boost/foreach here as it defines __STDC_LIMIT_MACROS on some systems. // Include boost/foreach here as it defines __STDC_LIMIT_MACROS on some systems.
#include <boost/foreach.hpp> #include <boost/foreach.hpp>
#ifndef __STDC_LIMIT_MACROS
#define __STDC_LIMIT_MACROS // to enable UINT64_MAX from stdint.h
#endif
#if (defined(__unix__) || defined(unix)) && !defined(USG) #if (defined(__unix__) || defined(unix)) && !defined(USG)
#include <sys/param.h> // to get BSD define #include <sys/param.h> // to get BSD define
@ -44,7 +41,6 @@
#include <stdlib.h> #include <stdlib.h>
#include <time.h> #include <time.h>
#include <math.h> #include <math.h>
#include <limits.h>
#include <float.h> #include <float.h>
#include <assert.h> #include <assert.h>
#include <iostream> #include <iostream>

View File

@ -177,14 +177,15 @@ public:
} }
bool Sign(uint256 hash, std::vector<unsigned char>& vchSig) bool Sign(uint256 hash, std::vector<unsigned char>& vchSig)
{
unsigned int nSize = ECDSA_size(pkey);
vchSig.resize(nSize); // Make sure it is big enough
if (!ECDSA_sign(0, (unsigned char*)&hash, sizeof(hash), &vchSig[0], &nSize, pkey))
{ {
vchSig.clear(); vchSig.clear();
unsigned char pchSig[10000];
unsigned int nSize = 0;
if (!ECDSA_sign(0, (unsigned char*)&hash, sizeof(hash), pchSig, &nSize, pkey))
return false; return false;
vchSig.resize(nSize); }
memcpy(&vchSig[0], pchSig, nSize); vchSig.resize(nSize); // Shrink to fit actual size
return true; return true;
} }

View File

@ -366,7 +366,7 @@ bool CTransaction::AcceptToMemoryPool(CTxDB& txdb, bool fCheckInputs, bool* pfMi
return DoS(100, error("AcceptToMemoryPool() : coinbase as individual tx")); return DoS(100, error("AcceptToMemoryPool() : coinbase as individual tx"));
// To help v0.1.5 clients who would see it as a negative number // To help v0.1.5 clients who would see it as a negative number
if ((int64)nLockTime > INT_MAX) if ((int64)nLockTime > std::numeric_limits<int>::max())
return error("AcceptToMemoryPool() : not accepting nLockTime beyond 2038 yet"); return error("AcceptToMemoryPool() : not accepting nLockTime beyond 2038 yet");
// Safety limits // Safety limits
@ -1875,7 +1875,7 @@ bool static ProcessMessage(CNode* pfrom, string strCommand, CDataStream& vRecv)
} }
// Ask the first connected node for block updates // Ask the first connected node for block updates
static int nAskedForBlocks; static int nAskedForBlocks = 0;
if (!pfrom->fClient && if (!pfrom->fClient &&
(pfrom->nVersion < 32000 || pfrom->nVersion >= 32400) && (pfrom->nVersion < 32000 || pfrom->nVersion >= 32400) &&
(nAskedForBlocks < 1 || vNodes.size() <= 1)) (nAskedForBlocks < 1 || vNodes.size() <= 1))

View File

@ -258,17 +258,17 @@ public:
CTxIn() CTxIn()
{ {
nSequence = UINT_MAX; nSequence = std::numeric_limits<unsigned int>::max();
} }
explicit CTxIn(COutPoint prevoutIn, CScript scriptSigIn=CScript(), unsigned int nSequenceIn=UINT_MAX) explicit CTxIn(COutPoint prevoutIn, CScript scriptSigIn=CScript(), unsigned int nSequenceIn=std::numeric_limits<unsigned int>::max())
{ {
prevout = prevoutIn; prevout = prevoutIn;
scriptSig = scriptSigIn; scriptSig = scriptSigIn;
nSequence = nSequenceIn; nSequence = nSequenceIn;
} }
CTxIn(uint256 hashPrevTx, unsigned int nOut, CScript scriptSigIn=CScript(), unsigned int nSequenceIn=UINT_MAX) CTxIn(uint256 hashPrevTx, unsigned int nOut, CScript scriptSigIn=CScript(), unsigned int nSequenceIn=std::numeric_limits<unsigned int>::max())
{ {
prevout = COutPoint(hashPrevTx, nOut); prevout = COutPoint(hashPrevTx, nOut);
scriptSig = scriptSigIn; scriptSig = scriptSigIn;
@ -284,7 +284,7 @@ public:
bool IsFinal() const bool IsFinal() const
{ {
return (nSequence == UINT_MAX); return (nSequence == std::numeric_limits<unsigned int>::max());
} }
friend bool operator==(const CTxIn& a, const CTxIn& b) friend bool operator==(const CTxIn& a, const CTxIn& b)
@ -308,7 +308,7 @@ public:
str += strprintf(", coinbase %s", HexStr(scriptSig).c_str()); str += strprintf(", coinbase %s", HexStr(scriptSig).c_str());
else else
str += strprintf(", scriptSig=%s", scriptSig.ToString().substr(0,24).c_str()); str += strprintf(", scriptSig=%s", scriptSig.ToString().substr(0,24).c_str());
if (nSequence != UINT_MAX) if (nSequence != std::numeric_limits<unsigned int>::max())
str += strprintf(", nSequence=%u", nSequence); str += strprintf(", nSequence=%u", nSequence);
str += ")"; str += ")";
return str; return str;
@ -468,7 +468,7 @@ public:
return false; return false;
bool fNewer = false; bool fNewer = false;
unsigned int nLowest = UINT_MAX; unsigned int nLowest = std::numeric_limits<unsigned int>::max();
for (int i = 0; i < vin.size(); i++) for (int i = 0; i < vin.size(); i++)
{ {
if (vin[i].nSequence != old.vin[i].nSequence) if (vin[i].nSequence != old.vin[i].nSequence)

View File

@ -249,8 +249,8 @@ bool Lookup(const char *pszName, vector<CAddress>& vaddr, int nServices, int nMa
else else
pszColon[0] = 0; pszColon[0] = 0;
port = portParsed; port = portParsed;
if (port < 0 || port > USHRT_MAX) if (port < 0 || port > std::numeric_limits<unsigned short>::max())
port = USHRT_MAX; port = std::numeric_limits<unsigned short>::max();
} }
} }
@ -1488,7 +1488,7 @@ void ThreadOpenConnections2(void* parg)
// Choose an address to connect to based on most recently seen // Choose an address to connect to based on most recently seen
// //
CAddress addrConnect; CAddress addrConnect;
int64 nBest = INT64_MIN; int64 nBest = std::numeric_limits<int64>::min();
// Only connect to one address per a.b.?.? range. // Only connect to one address per a.b.?.? range.
// Do this here so we don't have to critsect vNodes inside mapAddresses critsect. // Do this here so we don't have to critsect vNodes inside mapAddresses critsect.

View File

@ -223,7 +223,7 @@ bool CAddress::IsValid() const
if (memcmp(pchReserved, pchIPv4+3, sizeof(pchIPv4)-3) == 0) if (memcmp(pchReserved, pchIPv4+3, sizeof(pchIPv4)-3) == 0)
return false; return false;
return (ip != 0 && ip != INADDR_NONE && port != htons(USHRT_MAX)); return (ip != 0 && ip != INADDR_NONE && port != htons(std::numeric_limits<unsigned short>::max()));
} }
unsigned char CAddress::GetByte(int n) const unsigned char CAddress::GetByte(int n) const

View File

@ -101,7 +101,7 @@ bool OptionsModel::setData(const QModelIndex & index, const QVariant & value, in
case ProxyPort: case ProxyPort:
{ {
int nPort = atoi(value.toString().toAscii().data()); int nPort = atoi(value.toString().toAscii().data());
if (nPort > 0 && nPort < USHRT_MAX) if (nPort > 0 && nPort < std::numeric_limits<unsigned short>::max())
{ {
addrProxy.port = htons(nPort); addrProxy.port = htons(nPort);
walletdb.WriteSetting("addrProxy", addrProxy); walletdb.WriteSetting("addrProxy", addrProxy);

View File

@ -187,7 +187,7 @@ void TransactionRecord::updateStatus(const CWalletTx &wtx)
// Sort order, unrecorded transactions sort to the top // Sort order, unrecorded transactions sort to the top
status.sortKey = strprintf("%010d-%01d-%010u-%03d", status.sortKey = strprintf("%010d-%01d-%010u-%03d",
(pindex ? pindex->nHeight : INT_MAX), (pindex ? pindex->nHeight : std::numeric_limits<int>::max()),
(wtx.IsCoinBase() ? 1 : 0), (wtx.IsCoinBase() ? 1 : 0),
wtx.nTimeReceived, wtx.nTimeReceived,
idx); idx);

View File

@ -19,16 +19,8 @@
#include <boost/tuple/tuple_comparison.hpp> #include <boost/tuple/tuple_comparison.hpp>
#include <boost/tuple/tuple_io.hpp> #include <boost/tuple/tuple_io.hpp>
#if defined(_MSC_VER) || defined(__BORLANDC__)
typedef __int64 int64;
typedef unsigned __int64 uint64;
#else
typedef long long int64; typedef long long int64;
typedef unsigned long long uint64; typedef unsigned long long uint64;
#endif
#if defined(_MSC_VER) && _MSC_VER < 1300
#define for if (false) ; else for
#endif
#ifdef WIN32 #ifdef WIN32
#include <windows.h> #include <windows.h>
@ -197,8 +189,8 @@ template<typename Stream> inline void Unserialize(Stream& s, bool& a, int, int=0
inline unsigned int GetSizeOfCompactSize(uint64 nSize) inline unsigned int GetSizeOfCompactSize(uint64 nSize)
{ {
if (nSize < 253) return sizeof(unsigned char); if (nSize < 253) return sizeof(unsigned char);
else if (nSize <= USHRT_MAX) return sizeof(unsigned char) + sizeof(unsigned short); else if (nSize <= std::numeric_limits<unsigned short>::max()) return sizeof(unsigned char) + sizeof(unsigned short);
else if (nSize <= UINT_MAX) return sizeof(unsigned char) + sizeof(unsigned int); else if (nSize <= std::numeric_limits<unsigned int>::max()) return sizeof(unsigned char) + sizeof(unsigned int);
else return sizeof(unsigned char) + sizeof(uint64); else return sizeof(unsigned char) + sizeof(uint64);
} }
@ -210,14 +202,14 @@ void WriteCompactSize(Stream& os, uint64 nSize)
unsigned char chSize = nSize; unsigned char chSize = nSize;
WRITEDATA(os, chSize); WRITEDATA(os, chSize);
} }
else if (nSize <= USHRT_MAX) else if (nSize <= std::numeric_limits<unsigned short>::max())
{ {
unsigned char chSize = 253; unsigned char chSize = 253;
unsigned short xSize = nSize; unsigned short xSize = nSize;
WRITEDATA(os, chSize); WRITEDATA(os, chSize);
WRITEDATA(os, xSize); WRITEDATA(os, xSize);
} }
else if (nSize <= UINT_MAX) else if (nSize <= std::numeric_limits<unsigned int>::max())
{ {
unsigned char chSize = 254; unsigned char chSize = 254;
unsigned int xSize = nSize; unsigned int xSize = nSize;

View File

@ -11,16 +11,8 @@
#include <string> #include <string>
#include <vector> #include <vector>
#if defined(_MSC_VER) || defined(__BORLANDC__)
typedef __int64 int64;
typedef unsigned __int64 uint64;
#else
typedef long long int64; typedef long long int64;
typedef unsigned long long uint64; typedef unsigned long long uint64;
#endif
#if defined(_MSC_VER) && _MSC_VER < 1300
#define for if (false) ; else for
#endif
inline int Testuint256AdHoc(std::vector<std::string> vArg); inline int Testuint256AdHoc(std::vector<std::string> vArg);

View File

@ -133,7 +133,7 @@ uint64 GetRand(uint64 nMax)
// The range of the random source must be a multiple of the modulus // The range of the random source must be a multiple of the modulus
// to give every possible output value an equal possibility // to give every possible output value an equal possibility
uint64 nRange = (UINT64_MAX / nMax) * nMax; uint64 nRange = (std::numeric_limits<uint64>::max() / nMax) * nMax;
uint64 nRand = 0; uint64 nRand = 0;
do do
RAND_bytes((unsigned char*)&nRand, sizeof(nRand)); RAND_bytes((unsigned char*)&nRand, sizeof(nRand));

View File

@ -25,19 +25,8 @@
#include <openssl/ripemd.h> #include <openssl/ripemd.h>
#if defined(_MSC_VER) || defined(__BORLANDC__)
typedef __int64 int64;
typedef unsigned __int64 uint64;
#else
typedef long long int64; typedef long long int64;
typedef unsigned long long uint64; typedef unsigned long long uint64;
#endif
#if defined(_MSC_VER) && _MSC_VER < 1300
#define for if (false) ; else for
#endif
#ifndef _MSC_VER
#define __forceinline inline
#endif
#define loop for (;;) #define loop for (;;)
#define BEGIN(a) ((char*)&(a)) #define BEGIN(a) ((char*)&(a))
@ -53,7 +42,7 @@ typedef unsigned long long uint64;
#define snprintf my_snprintf #define snprintf my_snprintf
#ifndef PRI64d #ifndef PRI64d
#if defined(_MSC_VER) || defined(__BORLANDC__) || defined(__MSVCRT__) #if defined(_MSC_VER) || defined(__MSVCRT__)
#define PRI64d "I64d" #define PRI64d "I64d"
#define PRI64u "I64u" #define PRI64u "I64u"
#define PRI64x "I64x" #define PRI64x "I64x"
@ -84,11 +73,7 @@ T* alignup(T* p)
#ifdef WIN32 #ifdef WIN32
#define MSG_NOSIGNAL 0 #define MSG_NOSIGNAL 0
#define MSG_DONTWAIT 0 #define MSG_DONTWAIT 0
#ifndef UINT64_MAX
#define UINT64_MAX _UI64_MAX
#define INT64_MAX _I64_MAX
#define INT64_MIN _I64_MIN
#endif
#ifndef S_IRUSR #ifndef S_IRUSR
#define S_IRUSR 0400 #define S_IRUSR 0400
#define S_IWUSR 0200 #define S_IWUSR 0200
@ -474,15 +459,6 @@ inline bool GetBoolArg(const std::string& strArg)
inline void heapchk()
{
#ifdef WIN32
/// for debugging
//if (_heapchk() != _HEAPOK)
// DebugBreak();
#endif
}
// Randomize the stack to help protect against buffer overrun exploits // Randomize the stack to help protect against buffer overrun exploits
#define IMPLEMENT_RANDOMIZE_STACK(ThreadFn) \ #define IMPLEMENT_RANDOMIZE_STACK(ThreadFn) \
{ \ { \

View File

@ -782,7 +782,7 @@ bool CWallet::SelectCoinsMinConf(int64 nTargetValue, int nConfMine, int nConfThe
// List of values less than target // List of values less than target
pair<int64, pair<const CWalletTx*,unsigned int> > coinLowestLarger; pair<int64, pair<const CWalletTx*,unsigned int> > coinLowestLarger;
coinLowestLarger.first = INT64_MAX; coinLowestLarger.first = std::numeric_limits<int64>::max();
coinLowestLarger.second.first = NULL; coinLowestLarger.second.first = NULL;
vector<pair<int64, pair<const CWalletTx*,unsigned int> > > vValue; vector<pair<int64, pair<const CWalletTx*,unsigned int> > > vValue;
int64 nTotalLower = 0; int64 nTotalLower = 0;