2017-10-24 22:27:43 +02:00
|
|
|
/*
|
2018-04-17 16:16:30 +02:00
|
|
|
* Common and shared functions used by multiple modules in the Mbed TLS
|
|
|
|
* library.
|
2017-10-24 22:27:43 +02:00
|
|
|
*
|
2018-03-08 22:25:25 +01:00
|
|
|
* Copyright (C) 2018, Arm Limited, All Rights Reserved
|
2017-10-24 22:27:43 +02:00
|
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
|
|
* not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*
|
2018-03-08 22:25:25 +01:00
|
|
|
* This file is part of Mbed TLS (https://tls.mbed.org)
|
2017-10-24 22:27:43 +02:00
|
|
|
*/
|
|
|
|
|
2018-08-16 22:42:09 +02:00
|
|
|
/*
|
2018-09-05 16:22:22 +02:00
|
|
|
* Ensure gmtime_r is available even with -std=c99; must be defined before
|
2018-08-16 22:42:09 +02:00
|
|
|
* config.h, which pulls in glibc's features.h. Harmless on other platforms.
|
|
|
|
*/
|
2018-09-05 13:27:32 +02:00
|
|
|
#if !defined(_POSIX_C_SOURCE)
|
2018-08-16 22:42:09 +02:00
|
|
|
#define _POSIX_C_SOURCE 200112L
|
2018-09-05 13:27:32 +02:00
|
|
|
#endif
|
2018-08-16 22:42:09 +02:00
|
|
|
|
2017-10-25 10:51:14 +02:00
|
|
|
#if !defined(MBEDTLS_CONFIG_FILE)
|
|
|
|
#include "mbedtls/config.h"
|
|
|
|
#else
|
|
|
|
#include MBEDTLS_CONFIG_FILE
|
|
|
|
#endif
|
|
|
|
|
2018-04-17 16:51:09 +02:00
|
|
|
#include "mbedtls/platform_util.h"
|
2018-12-06 18:36:34 +01:00
|
|
|
#include "mbedtls/platform.h"
|
2018-08-16 22:42:09 +02:00
|
|
|
#include "mbedtls/threading.h"
|
2017-10-24 22:27:43 +02:00
|
|
|
|
2020-06-05 16:33:24 +02:00
|
|
|
#if !defined(MBEDTLS_PLATFORM_C)
|
|
|
|
#include <stdlib.h>
|
|
|
|
#define mbedtls_calloc calloc
|
|
|
|
#define mbedtls_free free
|
|
|
|
#endif
|
|
|
|
|
2019-10-03 10:06:35 +02:00
|
|
|
#if defined(MBEDTLS_ENTROPY_HARDWARE_ALT)
|
|
|
|
#include "mbedtls/entropy_poll.h"
|
|
|
|
#endif
|
|
|
|
|
2017-10-24 22:27:43 +02:00
|
|
|
#include <stddef.h>
|
2017-10-26 23:43:41 +02:00
|
|
|
#include <string.h>
|
2017-10-24 22:27:43 +02:00
|
|
|
|
2020-07-31 16:11:06 +02:00
|
|
|
/* Max number of loops for mbedtls_platform_random_delay. */
|
2020-01-09 10:11:23 +01:00
|
|
|
#define MAX_RAND_DELAY 100
|
2020-01-09 09:11:20 +01:00
|
|
|
|
2020-07-31 16:11:06 +02:00
|
|
|
/* Parameters for the linear congruential generator used as a non-cryptographic
|
|
|
|
* random number generator. The same parameters are used by e.g. ANSI C. */
|
|
|
|
#define RAND_MULTIPLIER 1103515245
|
|
|
|
#define RAND_INCREMENT 12345
|
|
|
|
#define RAND_MODULUS 0x80000000
|
|
|
|
|
|
|
|
/* The number of iterations after which the seed of the non-cryptographic
|
|
|
|
* random number generator will be changed. This is used only if the
|
|
|
|
* MBEDTLS_ENTROPY_HARDWARE_ALT option is enabled. */
|
|
|
|
#define RAND_SEED_LIFE 10000
|
|
|
|
|
2018-04-17 16:16:30 +02:00
|
|
|
#if !defined(MBEDTLS_PLATFORM_ZEROIZE_ALT)
|
2017-10-26 23:43:41 +02:00
|
|
|
/*
|
|
|
|
* This implementation should never be optimized out by the compiler
|
|
|
|
*
|
2018-04-17 16:16:30 +02:00
|
|
|
* This implementation for mbedtls_platform_zeroize() was inspired from Colin
|
|
|
|
* Percival's blog article at:
|
2018-03-08 21:46:39 +01:00
|
|
|
*
|
|
|
|
* http://www.daemonology.net/blog/2014-09-04-how-to-zero-a-buffer.html
|
|
|
|
*
|
|
|
|
* It uses a volatile function pointer to the standard memset(). Because the
|
|
|
|
* pointer is volatile the compiler expects it to change at
|
|
|
|
* any time and will not optimize out the call that could potentially perform
|
|
|
|
* other operations on the input buffer instead of just setting it to 0.
|
|
|
|
* Nevertheless, as pointed out by davidtgoldblatt on Hacker News
|
|
|
|
* (refer to http://www.daemonology.net/blog/2014-09-05-erratum.html for
|
|
|
|
* details), optimizations of the following form are still possible:
|
2017-10-26 23:43:41 +02:00
|
|
|
*
|
|
|
|
* if( memset_func != memset )
|
|
|
|
* memset_func( buf, 0, len );
|
|
|
|
*
|
2018-04-17 16:16:30 +02:00
|
|
|
* Note that it is extremely difficult to guarantee that
|
|
|
|
* mbedtls_platform_zeroize() will not be optimized out by aggressive compilers
|
|
|
|
* in a portable way. For this reason, Mbed TLS also provides the configuration
|
|
|
|
* option MBEDTLS_PLATFORM_ZEROIZE_ALT, which allows users to configure
|
|
|
|
* mbedtls_platform_zeroize() to use a suitable implementation for their
|
|
|
|
* platform and needs.
|
2017-10-26 23:43:41 +02:00
|
|
|
*/
|
2019-10-02 16:23:52 +02:00
|
|
|
void *mbedtls_platform_memset( void *, int, size_t );
|
|
|
|
static void * (* const volatile memset_func)( void *, int, size_t ) = mbedtls_platform_memset;
|
2017-10-26 23:43:41 +02:00
|
|
|
|
2018-04-17 16:16:30 +02:00
|
|
|
void mbedtls_platform_zeroize( void *buf, size_t len )
|
2017-10-24 22:27:43 +02:00
|
|
|
{
|
2019-08-15 15:24:20 +02:00
|
|
|
MBEDTLS_INTERNAL_VALIDATE( len == 0 || buf != NULL );
|
|
|
|
|
|
|
|
if( len > 0 )
|
|
|
|
memset_func( buf, 0, len );
|
2017-10-24 22:27:43 +02:00
|
|
|
}
|
2018-04-17 16:16:30 +02:00
|
|
|
#endif /* MBEDTLS_PLATFORM_ZEROIZE_ALT */
|
2018-08-16 22:42:09 +02:00
|
|
|
|
2019-10-02 16:01:14 +02:00
|
|
|
void *mbedtls_platform_memset( void *ptr, int value, size_t num )
|
2019-09-27 15:20:11 +02:00
|
|
|
{
|
|
|
|
/* Randomize start offset. */
|
2020-06-23 12:30:40 +02:00
|
|
|
size_t start_offset = (size_t) mbedtls_platform_random_in_range( (uint32_t) num );
|
2019-09-27 15:20:11 +02:00
|
|
|
/* Randomize data */
|
2019-10-02 11:44:36 +02:00
|
|
|
uint32_t data = mbedtls_platform_random_in_range( 256 );
|
2019-09-27 15:20:11 +02:00
|
|
|
|
|
|
|
/* Perform a pair of memset operations from random locations with
|
|
|
|
* random data */
|
2019-10-02 07:25:57 +02:00
|
|
|
memset( (void *) ( (unsigned char *) ptr + start_offset ), data,
|
2019-10-02 07:18:29 +02:00
|
|
|
( num - start_offset ) );
|
|
|
|
memset( (void *) ptr, data, start_offset );
|
2019-09-27 15:20:11 +02:00
|
|
|
|
|
|
|
/* Perform the original memset */
|
2019-10-02 16:01:14 +02:00
|
|
|
return( memset( ptr, value, num ) );
|
2019-09-27 15:20:11 +02:00
|
|
|
}
|
|
|
|
|
2019-10-02 16:01:14 +02:00
|
|
|
void *mbedtls_platform_memcpy( void *dst, const void *src, size_t num )
|
2019-09-27 15:20:11 +02:00
|
|
|
{
|
|
|
|
/* Randomize start offset. */
|
2020-06-23 12:30:40 +02:00
|
|
|
size_t start_offset = (size_t) mbedtls_platform_random_in_range( (uint32_t) num );
|
2019-09-27 15:20:11 +02:00
|
|
|
/* Randomize initial data to prevent leakage while copying */
|
2019-10-02 11:44:36 +02:00
|
|
|
uint32_t data = mbedtls_platform_random_in_range( 256 );
|
2019-09-27 15:20:11 +02:00
|
|
|
|
2020-05-25 12:48:30 +02:00
|
|
|
/* Use memset with random value at first to increase security - memset is
|
|
|
|
not normally part of the memcpy function and here can be useed
|
|
|
|
with regular, unsecured implementation */
|
2019-10-02 07:18:29 +02:00
|
|
|
memset( (void *) dst, data, num );
|
|
|
|
memcpy( (void *) ( (unsigned char *) dst + start_offset ),
|
|
|
|
(void *) ( (unsigned char *) src + start_offset ),
|
|
|
|
( num - start_offset ) );
|
2019-10-02 16:01:14 +02:00
|
|
|
return( memcpy( (void *) dst, (void *) src, start_offset ) );
|
2019-09-27 15:20:11 +02:00
|
|
|
}
|
|
|
|
|
2020-06-05 16:33:24 +02:00
|
|
|
int mbedtls_platform_memmove( void *dst, const void *src, size_t num )
|
|
|
|
{
|
|
|
|
/* The buffers can have a common part, so we cannot do a copy from a random
|
|
|
|
* location. By using a temporary buffer we can do so, but the cost of it
|
|
|
|
* is using more memory and longer transfer time. */
|
|
|
|
void *tmp = mbedtls_calloc( 1, num );
|
|
|
|
if( tmp != NULL )
|
|
|
|
{
|
|
|
|
mbedtls_platform_memcpy( tmp, src, num );
|
|
|
|
mbedtls_platform_memcpy( dst, tmp, num );
|
|
|
|
mbedtls_free( tmp );
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-06-08 14:08:49 +02:00
|
|
|
return MBEDTLS_ERR_PLATFORM_ALLOC_FAILED;
|
2020-06-05 16:33:24 +02:00
|
|
|
}
|
|
|
|
|
2020-06-23 12:59:56 +02:00
|
|
|
int mbedtls_platform_memequal( const void *buf1, const void *buf2, size_t num )
|
2019-09-27 15:20:11 +02:00
|
|
|
{
|
2019-10-02 07:32:51 +02:00
|
|
|
volatile const unsigned char *A = (volatile const unsigned char *) buf1;
|
|
|
|
volatile const unsigned char *B = (volatile const unsigned char *) buf2;
|
|
|
|
volatile unsigned char diff = 0;
|
2019-09-27 15:20:11 +02:00
|
|
|
|
2020-05-25 12:48:30 +02:00
|
|
|
/* Start from a random location and check the correct number of iterations */
|
|
|
|
size_t i, flow_counter = 0;
|
2020-06-23 12:30:40 +02:00
|
|
|
size_t start_offset = (size_t) mbedtls_platform_random_in_range( (uint32_t) num );
|
2019-09-27 15:20:11 +02:00
|
|
|
|
2019-10-02 07:18:29 +02:00
|
|
|
for( i = start_offset; i < num; i++ )
|
2019-09-27 15:20:11 +02:00
|
|
|
{
|
2019-10-02 07:32:51 +02:00
|
|
|
unsigned char x = A[i], y = B[i];
|
2020-05-20 13:57:38 +02:00
|
|
|
flow_counter++;
|
2019-10-02 07:32:51 +02:00
|
|
|
diff |= x ^ y;
|
2019-09-27 15:20:11 +02:00
|
|
|
}
|
|
|
|
|
2019-10-02 07:18:29 +02:00
|
|
|
for( i = 0; i < start_offset; i++ )
|
2019-09-27 15:20:11 +02:00
|
|
|
{
|
2019-10-02 07:32:51 +02:00
|
|
|
unsigned char x = A[i], y = B[i];
|
2020-05-20 13:57:38 +02:00
|
|
|
flow_counter++;
|
2019-10-02 07:32:51 +02:00
|
|
|
diff |= x ^ y;
|
2019-09-27 15:20:11 +02:00
|
|
|
}
|
|
|
|
|
2020-05-20 13:57:38 +02:00
|
|
|
/* Return 0 only when diff is 0 and flow_counter is equal to num */
|
|
|
|
return( (int) diff | (int) ( flow_counter ^ num ) );
|
2019-09-27 15:20:11 +02:00
|
|
|
}
|
|
|
|
|
2020-07-31 16:11:06 +02:00
|
|
|
/* This function implements a non-cryptographic random number generator based
|
|
|
|
* on the linear congruential generator algorithm. Additionally, if the
|
|
|
|
* MBEDTLS_ENTROPY_HARDWARE_ALT flag is defined, the seed is set at the first
|
|
|
|
* call of this function with using a hardware random number generator and
|
|
|
|
* changed every RAND_SEED_LIFE number of iterations.
|
|
|
|
*
|
|
|
|
* The value of the returned number is in the range [0; 0xffff].
|
|
|
|
*
|
|
|
|
* Note: The range of values with a 16-bit precision is related to the modulo
|
|
|
|
* parameter of the generator and the fact that the function does not return the
|
|
|
|
* full value of the internal state of the generator.
|
|
|
|
*/
|
|
|
|
static uint32_t mbedtls_platform_random_uint16( void )
|
2020-06-24 23:28:31 +02:00
|
|
|
{
|
2020-07-31 16:11:06 +02:00
|
|
|
/* Set random_state - the first random value should not be zero. */
|
|
|
|
static uint32_t random_state = RAND_INCREMENT;
|
2020-06-24 23:28:31 +02:00
|
|
|
|
2020-07-31 16:11:06 +02:00
|
|
|
#if defined(MBEDTLS_ENTROPY_HARDWARE_ALT)
|
|
|
|
|
|
|
|
static uint32_t random_seed_life = 0;
|
|
|
|
|
|
|
|
if( 0 < random_seed_life )
|
|
|
|
{
|
|
|
|
--random_seed_life;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
size_t olen = 0;
|
|
|
|
uint32_t hw_random;
|
|
|
|
mbedtls_hardware_poll( NULL,
|
|
|
|
(unsigned char *) &hw_random, sizeof( hw_random ),
|
|
|
|
&olen );
|
|
|
|
if( olen == sizeof( hw_random ) )
|
|
|
|
{
|
|
|
|
random_state ^= hw_random;
|
|
|
|
random_seed_life = RAND_SEED_LIFE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* MBEDTLS_ENTROPY_HARDWARE_ALT */
|
|
|
|
|
|
|
|
random_state = ( ( random_state * RAND_MULTIPLIER ) + RAND_INCREMENT ) % RAND_MODULUS;
|
|
|
|
|
|
|
|
/* Do not return the entire random_state to hide generator predictability for
|
|
|
|
* the next iteration */
|
|
|
|
return( ( random_state >> 15 ) & 0xffff );
|
2020-06-24 23:28:31 +02:00
|
|
|
}
|
|
|
|
|
2020-07-31 16:11:06 +02:00
|
|
|
uint32_t mbedtls_platform_random_uint32( void )
|
2019-09-27 15:20:11 +02:00
|
|
|
{
|
2020-07-31 16:11:06 +02:00
|
|
|
return( ( mbedtls_platform_random_uint16() << 16 ) |
|
|
|
|
mbedtls_platform_random_uint16() );
|
|
|
|
}
|
2019-10-03 10:06:35 +02:00
|
|
|
|
2020-07-31 16:11:06 +02:00
|
|
|
uint32_t mbedtls_platform_random_in_range( uint32_t num )
|
|
|
|
{
|
|
|
|
uint32_t result;
|
2019-10-03 10:46:30 +02:00
|
|
|
|
2020-07-31 16:11:06 +02:00
|
|
|
if( num <= 1 )
|
2019-10-03 10:46:30 +02:00
|
|
|
{
|
|
|
|
result = 0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2020-07-31 16:11:06 +02:00
|
|
|
result = mbedtls_platform_random_uint32() % num;
|
2019-10-03 10:46:30 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return( result );
|
2019-09-27 15:20:11 +02:00
|
|
|
}
|
|
|
|
|
2020-01-09 09:11:20 +01:00
|
|
|
void mbedtls_platform_random_delay( void )
|
2019-12-02 14:01:41 +01:00
|
|
|
{
|
2020-06-23 12:30:40 +02:00
|
|
|
uint32_t rn_1, rn_2, rn_3;
|
2019-12-02 14:01:41 +01:00
|
|
|
volatile size_t i = 0;
|
2019-12-30 11:55:30 +01:00
|
|
|
uint8_t shift;
|
2019-12-02 14:01:41 +01:00
|
|
|
|
2020-01-09 10:11:23 +01:00
|
|
|
rn_1 = mbedtls_platform_random_in_range( MAX_RAND_DELAY );
|
2019-12-30 11:55:30 +01:00
|
|
|
rn_2 = mbedtls_platform_random_in_range( 0xffffffff ) + 1;
|
|
|
|
rn_3 = mbedtls_platform_random_in_range( 0xffffffff ) + 1;
|
2019-12-02 14:01:41 +01:00
|
|
|
|
2019-12-05 16:32:05 +01:00
|
|
|
do
|
|
|
|
{
|
2019-12-02 14:01:41 +01:00
|
|
|
i++;
|
2020-06-03 15:59:59 +02:00
|
|
|
/* Dummy calculations to increase the time between iterations and
|
|
|
|
* make side channel attack more difficult by reducing predictability
|
|
|
|
* of its behaviour */
|
2019-12-30 11:55:30 +01:00
|
|
|
shift = rn_2 & 0x07;
|
|
|
|
if ( i % 2 )
|
2020-06-23 12:30:40 +02:00
|
|
|
rn_2 = ( rn_2 >> shift ) | ( rn_2 << ( 32 - shift ) );
|
2019-12-30 11:55:30 +01:00
|
|
|
else
|
2020-06-23 12:30:40 +02:00
|
|
|
rn_3 = ( rn_3 << shift ) | ( rn_3 >> ( 32 - shift ) );
|
2019-12-30 11:55:30 +01:00
|
|
|
rn_2 ^= rn_3;
|
|
|
|
} while( i < rn_1 || rn_2 == 0 || rn_3 == 0 );
|
2019-12-02 14:01:41 +01:00
|
|
|
}
|
|
|
|
|
2018-09-05 16:06:19 +02:00
|
|
|
#if defined(MBEDTLS_HAVE_TIME_DATE) && !defined(MBEDTLS_PLATFORM_GMTIME_R_ALT)
|
2018-08-16 22:42:09 +02:00
|
|
|
#include <time.h>
|
2018-09-05 14:50:22 +02:00
|
|
|
#if !defined(_WIN32) && (defined(unix) || \
|
2018-09-05 13:01:57 +02:00
|
|
|
defined(__unix) || defined(__unix__) || (defined(__APPLE__) && \
|
|
|
|
defined(__MACH__)))
|
2018-08-16 22:42:09 +02:00
|
|
|
#include <unistd.h>
|
2018-09-06 12:30:57 +02:00
|
|
|
#endif /* !_WIN32 && (unix || __unix || __unix__ ||
|
|
|
|
* (__APPLE__ && __MACH__)) */
|
2018-09-06 10:06:33 +02:00
|
|
|
|
|
|
|
#if !( ( defined(_POSIX_VERSION) && _POSIX_VERSION >= 200809L ) || \
|
|
|
|
( defined(_POSIX_THREAD_SAFE_FUNCTIONS ) && \
|
|
|
|
_POSIX_THREAD_SAFE_FUNCTIONS >= 20112L ) )
|
2018-09-05 12:43:57 +02:00
|
|
|
/*
|
|
|
|
* This is a convenience shorthand macro to avoid checking the long
|
|
|
|
* preprocessor conditions above. Ideally, we could expose this macro in
|
2018-09-05 17:25:50 +02:00
|
|
|
* platform_util.h and simply use it in platform_util.c, threading.c and
|
2018-09-05 12:43:57 +02:00
|
|
|
* threading.h. However, this macro is not part of the Mbed TLS public API, so
|
2018-09-05 12:52:07 +02:00
|
|
|
* we keep it private by only defining it in this file
|
2018-09-05 12:43:57 +02:00
|
|
|
*/
|
2018-09-06 13:09:56 +02:00
|
|
|
#if ! ( defined(_WIN32) && !defined(EFIX64) && !defined(EFI32) )
|
2018-08-16 22:42:09 +02:00
|
|
|
#define PLATFORM_UTIL_USE_GMTIME
|
2018-09-06 13:09:56 +02:00
|
|
|
#endif /* ! ( defined(_WIN32) && !defined(EFIX64) && !defined(EFI32) ) */
|
|
|
|
|
2018-09-06 10:06:33 +02:00
|
|
|
#endif /* !( ( defined(_POSIX_VERSION) && _POSIX_VERSION >= 200809L ) || \
|
|
|
|
( defined(_POSIX_THREAD_SAFE_FUNCTIONS ) && \
|
|
|
|
_POSIX_THREAD_SAFE_FUNCTIONS >= 20112L ) ) */
|
2018-08-16 22:42:09 +02:00
|
|
|
|
2018-09-05 16:06:19 +02:00
|
|
|
struct tm *mbedtls_platform_gmtime_r( const mbedtls_time_t *tt,
|
|
|
|
struct tm *tm_buf )
|
2018-08-16 22:42:09 +02:00
|
|
|
{
|
|
|
|
#if defined(_WIN32) && !defined(EFIX64) && !defined(EFI32)
|
2018-08-21 20:33:02 +02:00
|
|
|
return( ( gmtime_s( tm_buf, tt ) == 0 ) ? tm_buf : NULL );
|
2018-08-16 22:42:09 +02:00
|
|
|
#elif !defined(PLATFORM_UTIL_USE_GMTIME)
|
2018-08-21 20:33:02 +02:00
|
|
|
return( gmtime_r( tt, tm_buf ) );
|
2018-08-16 22:42:09 +02:00
|
|
|
#else
|
|
|
|
struct tm *lt;
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_THREADING_C)
|
|
|
|
if( mbedtls_mutex_lock( &mbedtls_threading_gmtime_mutex ) != 0 )
|
|
|
|
return( NULL );
|
|
|
|
#endif /* MBEDTLS_THREADING_C */
|
|
|
|
|
|
|
|
lt = gmtime( tt );
|
|
|
|
|
|
|
|
if( lt != NULL )
|
|
|
|
{
|
|
|
|
memcpy( tm_buf, lt, sizeof( struct tm ) );
|
|
|
|
}
|
|
|
|
|
|
|
|
#if defined(MBEDTLS_THREADING_C)
|
|
|
|
if( mbedtls_mutex_unlock( &mbedtls_threading_gmtime_mutex ) != 0 )
|
|
|
|
return( NULL );
|
|
|
|
#endif /* MBEDTLS_THREADING_C */
|
|
|
|
|
2018-08-21 20:33:02 +02:00
|
|
|
return( ( lt == NULL ) ? NULL : tm_buf );
|
|
|
|
#endif /* _WIN32 && !EFIX64 && !EFI32 */
|
2018-08-16 22:42:09 +02:00
|
|
|
}
|
2018-09-05 16:06:19 +02:00
|
|
|
#endif /* MBEDTLS_HAVE_TIME_DATE && MBEDTLS_PLATFORM_GMTIME_R_ALT */
|
2019-09-04 13:04:57 +02:00
|
|
|
|
2019-09-06 15:59:00 +02:00
|
|
|
unsigned char* mbedtls_platform_put_uint32_be( unsigned char *buf,
|
2019-09-09 09:21:18 +02:00
|
|
|
size_t num )
|
2019-09-04 13:04:57 +02:00
|
|
|
{
|
|
|
|
*buf++ = (unsigned char) ( num >> 24 );
|
|
|
|
*buf++ = (unsigned char) ( num >> 16 );
|
|
|
|
*buf++ = (unsigned char) ( num >> 8 );
|
|
|
|
*buf++ = (unsigned char) ( num );
|
|
|
|
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
2019-09-06 15:59:00 +02:00
|
|
|
unsigned char* mbedtls_platform_put_uint24_be( unsigned char *buf,
|
2019-09-09 09:21:18 +02:00
|
|
|
size_t num )
|
2019-09-04 13:04:57 +02:00
|
|
|
{
|
|
|
|
*buf++ = (unsigned char) ( num >> 16 );
|
|
|
|
*buf++ = (unsigned char) ( num >> 8 );
|
|
|
|
*buf++ = (unsigned char) ( num );
|
|
|
|
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
2019-09-06 15:59:00 +02:00
|
|
|
unsigned char* mbedtls_platform_put_uint16_be( unsigned char *buf,
|
2019-09-09 09:21:18 +02:00
|
|
|
size_t num )
|
2019-09-04 13:04:57 +02:00
|
|
|
{
|
|
|
|
*buf++ = (unsigned char) ( num >> 8 );
|
|
|
|
*buf++ = (unsigned char) ( num );
|
|
|
|
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
2019-09-09 09:21:18 +02:00
|
|
|
size_t mbedtls_platform_get_uint32_be( const unsigned char *buf )
|
2019-09-04 13:04:57 +02:00
|
|
|
{
|
|
|
|
return ( ( (unsigned int) buf[0] << 24 ) |
|
|
|
|
( (unsigned int) buf[1] << 16 ) |
|
|
|
|
( (unsigned int) buf[2] << 8 ) |
|
|
|
|
( (unsigned int) buf[3] ) );
|
|
|
|
}
|
|
|
|
|
2019-09-09 09:21:18 +02:00
|
|
|
size_t mbedtls_platform_get_uint24_be( const unsigned char *buf )
|
2019-09-04 13:04:57 +02:00
|
|
|
{
|
|
|
|
return ( ( buf[0] << 16 ) |
|
|
|
|
( buf[1] << 8) |
|
|
|
|
( buf[2] ) );
|
|
|
|
}
|
|
|
|
|
2019-09-09 09:21:18 +02:00
|
|
|
size_t mbedtls_platform_get_uint16_be( const unsigned char *buf )
|
2019-09-04 13:04:57 +02:00
|
|
|
{
|
|
|
|
return ( ( buf[0] << 8 ) |
|
|
|
|
( buf[1] ) );
|
|
|
|
}
|