Use plain memset() for public data in ssl_tls.c

- out_ctr is public because it's transmited over the wire in DTLS (and in TLS
  it can be inferred by a passive network attacker just by counting records).
- handshake mask is not a secret because it can be inferred by a passive
  network attacker just logging record sequence number seen so far.
diff --git a/library/ssl_tls.c b/library/ssl_tls.c
index e9102a7..46ef06b 100644
--- a/library/ssl_tls.c
+++ b/library/ssl_tls.c
@@ -4712,7 +4712,7 @@
             mask[last_byte_idx] |= 1 << ( 8 - end_bits );
     }
 
-    mbedtls_platform_memset( mask + offset / 8, 0xFF, len / 8 );
+    memset( mask + offset / 8, 0xFF, len / 8 );
 }
 
 /*
@@ -7799,7 +7799,7 @@
         memcpy( ssl->handshake->alt_out_ctr, ssl->cur_out_ctr, 8 );
 
         /* Set sequence_number to zero */
-        mbedtls_platform_memset( ssl->cur_out_ctr + 2, 0, 6 );
+        memset( ssl->cur_out_ctr + 2, 0, 6 );
 
         /* Increment epoch */
         for( i = 2; i > 0; i-- )
@@ -8379,7 +8379,7 @@
         ssl->split_done = 0;
 #endif
 
-    mbedtls_platform_memset( ssl->cur_out_ctr, 0, sizeof( ssl->cur_out_ctr ) );
+    memset( ssl->cur_out_ctr, 0, sizeof( ssl->cur_out_ctr ) );
 
     ssl->transform_in = NULL;
     ssl->transform_out = NULL;