mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-07-28 00:21:48 +03:00
Replace MBEDTLS_CHAR_x with MBEDTLS_BYTE_x
The CHAR macros casted to an unsigned char which in this project is garunteed to be 8 bits - the same as uint8_t (which BYTE casts to) therefore, instances of CHAR have been swapped with BYTE and the number of macros have been cut down Signed-off-by: Joe Subbiani <joe.subbiani@arm.com>
This commit is contained in:
@ -1971,11 +1971,11 @@ static void ssl_write_cid_ext( mbedtls_ssl_context *ssl,
|
||||
* } ConnectionId;
|
||||
*/
|
||||
|
||||
*p++ = MBEDTLS_CHAR_1( MBEDTLS_TLS_EXT_CID );
|
||||
*p++ = MBEDTLS_CHAR_0( MBEDTLS_TLS_EXT_CID );
|
||||
*p++ = MBEDTLS_BYTE_1( MBEDTLS_TLS_EXT_CID );
|
||||
*p++ = MBEDTLS_BYTE_0( MBEDTLS_TLS_EXT_CID );
|
||||
ext_len = (size_t) ssl->own_cid_len + 1;
|
||||
*p++ = MBEDTLS_CHAR_1( ext_len );
|
||||
*p++ = MBEDTLS_CHAR_0( ext_len );
|
||||
*p++ = MBEDTLS_BYTE_1( ext_len );
|
||||
*p++ = MBEDTLS_BYTE_0( ext_len );
|
||||
|
||||
*p++ = (uint8_t) ssl->own_cid_len;
|
||||
memcpy( p, ssl->own_cid, ssl->own_cid_len );
|
||||
@ -2016,8 +2016,8 @@ static void ssl_write_encrypt_then_mac_ext( mbedtls_ssl_context *ssl,
|
||||
|
||||
MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, adding encrypt then mac extension" ) );
|
||||
|
||||
*p++ = MBEDTLS_CHAR_1( MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC );
|
||||
*p++ = MBEDTLS_CHAR_0( MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC );
|
||||
*p++ = MBEDTLS_BYTE_1( MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC );
|
||||
*p++ = MBEDTLS_BYTE_0( MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC );
|
||||
|
||||
*p++ = 0x00;
|
||||
*p++ = 0x00;
|
||||
@ -2042,8 +2042,8 @@ static void ssl_write_extended_ms_ext( mbedtls_ssl_context *ssl,
|
||||
MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, adding extended master secret "
|
||||
"extension" ) );
|
||||
|
||||
*p++ = MBEDTLS_CHAR_1( MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET );
|
||||
*p++ = MBEDTLS_CHAR_0( MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET );
|
||||
*p++ = MBEDTLS_BYTE_1( MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET );
|
||||
*p++ = MBEDTLS_BYTE_0( MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET );
|
||||
|
||||
*p++ = 0x00;
|
||||
*p++ = 0x00;
|
||||
@ -2067,8 +2067,8 @@ static void ssl_write_session_ticket_ext( mbedtls_ssl_context *ssl,
|
||||
|
||||
MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, adding session ticket extension" ) );
|
||||
|
||||
*p++ = MBEDTLS_CHAR_1( MBEDTLS_TLS_EXT_SESSION_TICKET );
|
||||
*p++ = MBEDTLS_CHAR_0( MBEDTLS_TLS_EXT_SESSION_TICKET );
|
||||
*p++ = MBEDTLS_BYTE_1( MBEDTLS_TLS_EXT_SESSION_TICKET );
|
||||
*p++ = MBEDTLS_BYTE_0( MBEDTLS_TLS_EXT_SESSION_TICKET );
|
||||
|
||||
*p++ = 0x00;
|
||||
*p++ = 0x00;
|
||||
@ -2091,8 +2091,8 @@ static void ssl_write_renegotiation_ext( mbedtls_ssl_context *ssl,
|
||||
|
||||
MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, secure renegotiation extension" ) );
|
||||
|
||||
*p++ = MBEDTLS_CHAR_1( MBEDTLS_TLS_EXT_RENEGOTIATION_INFO );
|
||||
*p++ = MBEDTLS_CHAR_0( MBEDTLS_TLS_EXT_RENEGOTIATION_INFO );
|
||||
*p++ = MBEDTLS_BYTE_1( MBEDTLS_TLS_EXT_RENEGOTIATION_INFO );
|
||||
*p++ = MBEDTLS_BYTE_0( MBEDTLS_TLS_EXT_RENEGOTIATION_INFO );
|
||||
|
||||
#if defined(MBEDTLS_SSL_RENEGOTIATION)
|
||||
if( ssl->renego_status != MBEDTLS_SSL_INITIAL_HANDSHAKE )
|
||||
@ -2132,8 +2132,8 @@ static void ssl_write_max_fragment_length_ext( mbedtls_ssl_context *ssl,
|
||||
|
||||
MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, max_fragment_length extension" ) );
|
||||
|
||||
*p++ = MBEDTLS_CHAR_1( MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH );
|
||||
*p++ = MBEDTLS_CHAR_0( MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH );
|
||||
*p++ = MBEDTLS_BYTE_1( MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH );
|
||||
*p++ = MBEDTLS_BYTE_0( MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH );
|
||||
|
||||
*p++ = 0x00;
|
||||
*p++ = 1;
|
||||
@ -2162,8 +2162,8 @@ static void ssl_write_supported_point_formats_ext( mbedtls_ssl_context *ssl,
|
||||
|
||||
MBEDTLS_SSL_DEBUG_MSG( 3, ( "server hello, supported_point_formats extension" ) );
|
||||
|
||||
*p++ = MBEDTLS_CHAR_1( MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS );
|
||||
*p++ = MBEDTLS_CHAR_0( MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS );
|
||||
*p++ = MBEDTLS_BYTE_1( MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS );
|
||||
*p++ = MBEDTLS_BYTE_0( MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS );
|
||||
|
||||
*p++ = 0x00;
|
||||
*p++ = 2;
|
||||
@ -2200,8 +2200,8 @@ static void ssl_write_ecjpake_kkpp_ext( mbedtls_ssl_context *ssl,
|
||||
return;
|
||||
}
|
||||
|
||||
*p++ = MBEDTLS_CHAR_1( MBEDTLS_TLS_EXT_ECJPAKE_KKPP );
|
||||
*p++ = MBEDTLS_CHAR_0( MBEDTLS_TLS_EXT_ECJPAKE_KKPP );
|
||||
*p++ = MBEDTLS_BYTE_1( MBEDTLS_TLS_EXT_ECJPAKE_KKPP );
|
||||
*p++ = MBEDTLS_BYTE_0( MBEDTLS_TLS_EXT_ECJPAKE_KKPP );
|
||||
|
||||
ret = mbedtls_ecjpake_write_round_one( &ssl->handshake->ecjpake_ctx,
|
||||
p + 2, end - p - 2, &kkpp_len,
|
||||
@ -2212,8 +2212,8 @@ static void ssl_write_ecjpake_kkpp_ext( mbedtls_ssl_context *ssl,
|
||||
return;
|
||||
}
|
||||
|
||||
*p++ = MBEDTLS_CHAR_1( kkpp_len );
|
||||
*p++ = MBEDTLS_CHAR_0( kkpp_len );
|
||||
*p++ = MBEDTLS_BYTE_1( kkpp_len );
|
||||
*p++ = MBEDTLS_BYTE_0( kkpp_len );
|
||||
|
||||
*olen = kkpp_len + 4;
|
||||
}
|
||||
@ -2238,18 +2238,18 @@ static void ssl_write_alpn_ext( mbedtls_ssl_context *ssl,
|
||||
* 6 . 6 protocol name length
|
||||
* 7 . 7+n protocol name
|
||||
*/
|
||||
buf[0] = MBEDTLS_CHAR_1( MBEDTLS_TLS_EXT_ALPN );
|
||||
buf[1] = MBEDTLS_CHAR_0( MBEDTLS_TLS_EXT_ALPN );
|
||||
buf[0] = MBEDTLS_BYTE_1( MBEDTLS_TLS_EXT_ALPN );
|
||||
buf[1] = MBEDTLS_BYTE_0( MBEDTLS_TLS_EXT_ALPN );
|
||||
|
||||
*olen = 7 + strlen( ssl->alpn_chosen );
|
||||
|
||||
buf[2] = MBEDTLS_CHAR_1( *olen - 4 );
|
||||
buf[3] = MBEDTLS_CHAR_0( *olen - 4 );
|
||||
buf[2] = MBEDTLS_BYTE_1( *olen - 4 );
|
||||
buf[3] = MBEDTLS_BYTE_0( *olen - 4 );
|
||||
|
||||
buf[4] = MBEDTLS_CHAR_1( *olen - 6 );
|
||||
buf[5] = MBEDTLS_CHAR_0( *olen - 6 );
|
||||
buf[4] = MBEDTLS_BYTE_1( *olen - 6 );
|
||||
buf[5] = MBEDTLS_BYTE_0( *olen - 6 );
|
||||
|
||||
buf[6] = MBEDTLS_CHAR_0( *olen - 7 );
|
||||
buf[6] = MBEDTLS_BYTE_0( *olen - 7 );
|
||||
|
||||
memcpy( buf + 7, ssl->alpn_chosen, *olen - 7 );
|
||||
}
|
||||
@ -2294,15 +2294,15 @@ static void ssl_write_use_srtp_ext( mbedtls_ssl_context *ssl,
|
||||
}
|
||||
|
||||
/* extension */
|
||||
buf[0] = MBEDTLS_CHAR_1( MBEDTLS_TLS_EXT_USE_SRTP );
|
||||
buf[1] = MBEDTLS_CHAR_0( MBEDTLS_TLS_EXT_USE_SRTP );
|
||||
buf[0] = MBEDTLS_BYTE_1( MBEDTLS_TLS_EXT_USE_SRTP );
|
||||
buf[1] = MBEDTLS_BYTE_0( MBEDTLS_TLS_EXT_USE_SRTP );
|
||||
/*
|
||||
* total length 5 and mki value: only one profile(2 bytes)
|
||||
* and length(2 bytes) and srtp_mki )
|
||||
*/
|
||||
ext_len = 5 + mki_len;
|
||||
buf[2] = MBEDTLS_CHAR_1( ext_len );
|
||||
buf[3] = MBEDTLS_CHAR_0( ext_len );
|
||||
buf[2] = MBEDTLS_BYTE_1( ext_len );
|
||||
buf[3] = MBEDTLS_BYTE_0( ext_len );
|
||||
|
||||
/* protection profile length: 2 */
|
||||
buf[4] = 0x00;
|
||||
@ -2311,8 +2311,8 @@ static void ssl_write_use_srtp_ext( mbedtls_ssl_context *ssl,
|
||||
ssl->dtls_srtp_info.chosen_dtls_srtp_profile );
|
||||
if( profile_value != MBEDTLS_TLS_SRTP_UNSET )
|
||||
{
|
||||
buf[6] = MBEDTLS_CHAR_1( profile_value );
|
||||
buf[7] = MBEDTLS_CHAR_0( profile_value );
|
||||
buf[6] = MBEDTLS_BYTE_1( profile_value );
|
||||
buf[7] = MBEDTLS_BYTE_0( profile_value );
|
||||
}
|
||||
else
|
||||
{
|
||||
@ -2648,8 +2648,8 @@ static int ssl_write_server_hello( mbedtls_ssl_context *ssl )
|
||||
|
||||
if( ext_len > 0 )
|
||||
{
|
||||
*p++ = MBEDTLS_CHAR_1( ext_len );
|
||||
*p++ = MBEDTLS_CHAR_0( ext_len );
|
||||
*p++ = MBEDTLS_BYTE_1( ext_len );
|
||||
*p++ = MBEDTLS_BYTE_0( ext_len );
|
||||
p += ext_len;
|
||||
}
|
||||
|
||||
@ -3478,8 +3478,8 @@ static int ssl_decrypt_encrypted_pms( mbedtls_ssl_context *ssl,
|
||||
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) );
|
||||
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
||||
}
|
||||
if( *p++ != MBEDTLS_CHAR_1( len ) ||
|
||||
*p++ != MBEDTLS_CHAR_0( len ) )
|
||||
if( *p++ != MBEDTLS_BYTE_1( len ) ||
|
||||
*p++ != MBEDTLS_BYTE_0( len ) )
|
||||
{
|
||||
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad client key exchange message" ) );
|
||||
return( MBEDTLS_ERR_SSL_DECODE_ERROR );
|
||||
@ -4223,13 +4223,13 @@ static int ssl_write_new_session_ticket( mbedtls_ssl_context *ssl )
|
||||
tlen = 0;
|
||||
}
|
||||
|
||||
ssl->out_msg[4] = MBEDTLS_CHAR_3( lifetime );
|
||||
ssl->out_msg[5] = MBEDTLS_CHAR_2( lifetime );
|
||||
ssl->out_msg[6] = MBEDTLS_CHAR_1( lifetime );
|
||||
ssl->out_msg[7] = MBEDTLS_CHAR_0( lifetime );
|
||||
ssl->out_msg[4] = MBEDTLS_BYTE_3( lifetime );
|
||||
ssl->out_msg[5] = MBEDTLS_BYTE_2( lifetime );
|
||||
ssl->out_msg[6] = MBEDTLS_BYTE_1( lifetime );
|
||||
ssl->out_msg[7] = MBEDTLS_BYTE_0( lifetime );
|
||||
|
||||
ssl->out_msg[8] = MBEDTLS_CHAR_1( tlen );
|
||||
ssl->out_msg[9] = MBEDTLS_CHAR_0( tlen );
|
||||
ssl->out_msg[8] = MBEDTLS_BYTE_1( tlen );
|
||||
ssl->out_msg[9] = MBEDTLS_BYTE_0( tlen );
|
||||
|
||||
ssl->out_msglen = 10 + tlen;
|
||||
|
||||
|
Reference in New Issue
Block a user