Tidy up grouped MBEDTLS_BYTE_x macros
exchange groups of the byte reading macros with MBEDTLS_PUT_UINTxyz
and then shift the pointer afterwards. Easier to read as you can
see how big the data is that you are putting in, and in the case of
UINT32 AND UINT64 it saves some vertical space.
Signed-off-by: Joe Subbiani <joe.subbiani@arm.com>
diff --git a/library/ctr_drbg.c b/library/ctr_drbg.c
index 68b32a3..93a7cdc 100644
--- a/library/ctr_drbg.c
+++ b/library/ctr_drbg.c
@@ -152,11 +152,8 @@
* (Total is padded to a multiple of 16-bytes with zeroes)
*/
p = buf + MBEDTLS_CTR_DRBG_BLOCKSIZE;
- *p++ = MBEDTLS_BYTE_3( data_len );
- *p++ = MBEDTLS_BYTE_2( data_len );
- *p++ = MBEDTLS_BYTE_1( data_len );
- *p++ = MBEDTLS_BYTE_0( data_len );
- p += 3;
+ MBEDTLS_PUT_UINT32_BE( data_len, p, 0);
+ p += 4 + 3;
*p++ = MBEDTLS_CTR_DRBG_SEEDLEN;
memcpy( p, data, data_len );
p[data_len] = 0x80;
diff --git a/library/ecjpake.c b/library/ecjpake.c
index a599b1b..738a977 100644
--- a/library/ecjpake.c
+++ b/library/ecjpake.c
@@ -180,10 +180,7 @@
if( ret != 0 )
return( ret );
- (*p)[0] = MBEDTLS_BYTE_3( len );
- (*p)[1] = MBEDTLS_BYTE_2( len );
- (*p)[2] = MBEDTLS_BYTE_1( len );
- (*p)[3] = MBEDTLS_BYTE_0( len );
+ MBEDTLS_PUT_UINT32_BE( len, *p, 0 );
*p += 4 + len;
@@ -223,10 +220,8 @@
if( end - p < 4 )
return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL );
- *p++ = MBEDTLS_BYTE_3( id_len );
- *p++ = MBEDTLS_BYTE_2( id_len );
- *p++ = MBEDTLS_BYTE_1( id_len );
- *p++ = MBEDTLS_BYTE_0( id_len );
+ MBEDTLS_PUT_UINT32_BE( id_len, p, 0 );
+ p += 4;
if( end < p || (size_t)( end - p ) < id_len )
return( MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL );
diff --git a/library/ssl_tls.c b/library/ssl_tls.c
index abf4c0f..5cd47e6 100644
--- a/library/ssl_tls.c
+++ b/library/ssl_tls.c
@@ -1487,8 +1487,8 @@
if( end - p < 2 )
return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA );
- *(p++) = MBEDTLS_BYTE_1( psk_len );
- *(p++) = MBEDTLS_BYTE_0( psk_len );
+ MBEDTLS_PUT_UINT16_BE( psk_len, p, 0 );
+ p += 2;
if( end < p || (size_t)( end - p ) < psk_len )
return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA );
@@ -1528,9 +1528,8 @@
MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_dhm_calc_secret", ret );
return( ret );
}
- *(p++) = MBEDTLS_BYTE_1( len );
- *(p++) = MBEDTLS_BYTE_0( len );
- p += len;
+ MBEDTLS_PUT_UINT16_BE( len, p, 0 );
+ p += 2 + len;
MBEDTLS_SSL_DEBUG_MPI( 3, "DHM: K ", &ssl->handshake->dhm_ctx.K );
}
@@ -1550,9 +1549,8 @@
return( ret );
}
- *(p++) = MBEDTLS_BYTE_1( zlen );
- *(p++) = MBEDTLS_BYTE_0( zlen );
- p += zlen;
+ MBEDTLS_PUT_UINT16_BE( zlen, p, 0 );
+ p += 2 + zlen;
MBEDTLS_SSL_DEBUG_ECDH( 3, &ssl->handshake->ecdh_ctx,
MBEDTLS_DEBUG_ECDH_Z );
@@ -1568,8 +1566,8 @@
if( end - p < 2 )
return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA );
- *(p++) = MBEDTLS_BYTE_1( psk_len );
- *(p++) = MBEDTLS_BYTE_0( psk_len );
+ MBEDTLS_PUT_UINT16_BE( psk_len, p, 0 );
+ p += 2;
if( end < p || (size_t)( end - p ) < psk_len )
return( MBEDTLS_ERR_SSL_BAD_INPUT_DATA );