Andres Amaya Garcia | 614d9c0 | 2017-10-24 21:27:43 +0100 | [diff] [blame] | 1 | /* |
Andres Amaya Garcia | 904e1ef | 2018-04-17 09:16:30 -0500 | [diff] [blame] | 2 | * Common and shared functions used by multiple modules in the Mbed TLS |
| 3 | * library. |
Andres Amaya Garcia | 614d9c0 | 2017-10-24 21:27:43 +0100 | [diff] [blame] | 4 | * |
Andres Amaya Garcia | 757cd72 | 2018-03-08 21:25:25 +0000 | [diff] [blame] | 5 | * Copyright (C) 2018, Arm Limited, All Rights Reserved |
Andres Amaya Garcia | 614d9c0 | 2017-10-24 21:27:43 +0100 | [diff] [blame] | 6 | * SPDX-License-Identifier: Apache-2.0 |
| 7 | * |
| 8 | * Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 9 | * not use this file except in compliance with the License. |
| 10 | * You may obtain a copy of the License at |
| 11 | * |
| 12 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 13 | * |
| 14 | * Unless required by applicable law or agreed to in writing, software |
| 15 | * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 16 | * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 17 | * See the License for the specific language governing permissions and |
| 18 | * limitations under the License. |
| 19 | * |
Andres Amaya Garcia | 757cd72 | 2018-03-08 21:25:25 +0000 | [diff] [blame] | 20 | * This file is part of Mbed TLS (https://tls.mbed.org) |
Andres Amaya Garcia | 614d9c0 | 2017-10-24 21:27:43 +0100 | [diff] [blame] | 21 | */ |
| 22 | |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 23 | /* |
Hanno Becker | 48a816f | 2018-09-05 15:22:22 +0100 | [diff] [blame] | 24 | * Ensure gmtime_r is available even with -std=c99; must be defined before |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 25 | * config.h, which pulls in glibc's features.h. Harmless on other platforms. |
| 26 | */ |
Andres Amaya Garcia | 94b540a | 2018-09-05 12:27:32 +0100 | [diff] [blame] | 27 | #if !defined(_POSIX_C_SOURCE) |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 28 | #define _POSIX_C_SOURCE 200112L |
Andres Amaya Garcia | 94b540a | 2018-09-05 12:27:32 +0100 | [diff] [blame] | 29 | #endif |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 30 | |
Andres Amaya Garcia | b1262a3 | 2017-10-25 09:51:14 +0100 | [diff] [blame] | 31 | #if !defined(MBEDTLS_CONFIG_FILE) |
| 32 | #include "mbedtls/config.h" |
| 33 | #else |
| 34 | #include MBEDTLS_CONFIG_FILE |
| 35 | #endif |
| 36 | |
Andres Amaya Garcia | 1f6301b | 2018-04-17 09:51:09 -0500 | [diff] [blame] | 37 | #include "mbedtls/platform_util.h" |
Simon Butcher | b486803 | 2018-12-06 17:36:34 +0000 | [diff] [blame] | 38 | #include "mbedtls/platform.h" |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 39 | #include "mbedtls/threading.h" |
Andres Amaya Garcia | 614d9c0 | 2017-10-24 21:27:43 +0100 | [diff] [blame] | 40 | |
Jarno Lamsa | e29e8a4 | 2019-10-03 11:06:35 +0300 | [diff] [blame] | 41 | #if defined(MBEDTLS_ENTROPY_HARDWARE_ALT) |
| 42 | #include "mbedtls/entropy_poll.h" |
| 43 | #endif |
| 44 | |
Andres Amaya Garcia | 614d9c0 | 2017-10-24 21:27:43 +0100 | [diff] [blame] | 45 | #include <stddef.h> |
Andres Amaya Garcia | ecd1891 | 2017-10-26 22:43:41 +0100 | [diff] [blame] | 46 | #include <string.h> |
Andres Amaya Garcia | 614d9c0 | 2017-10-24 21:27:43 +0100 | [diff] [blame] | 47 | |
Arto Kinnunen | ac6d226 | 2020-01-09 10:11:20 +0200 | [diff] [blame] | 48 | /* Max number of loops for mbedtls_platform_random_delay */ |
Arto Kinnunen | b148651 | 2020-01-09 11:11:23 +0200 | [diff] [blame] | 49 | #define MAX_RAND_DELAY 100 |
Arto Kinnunen | ac6d226 | 2020-01-09 10:11:20 +0200 | [diff] [blame] | 50 | |
Andres Amaya Garcia | 904e1ef | 2018-04-17 09:16:30 -0500 | [diff] [blame] | 51 | #if !defined(MBEDTLS_PLATFORM_ZEROIZE_ALT) |
Andres Amaya Garcia | ecd1891 | 2017-10-26 22:43:41 +0100 | [diff] [blame] | 52 | /* |
| 53 | * This implementation should never be optimized out by the compiler |
| 54 | * |
Andres Amaya Garcia | 904e1ef | 2018-04-17 09:16:30 -0500 | [diff] [blame] | 55 | * This implementation for mbedtls_platform_zeroize() was inspired from Colin |
| 56 | * Percival's blog article at: |
Andres Amaya Garcia | 1e8ea5f | 2018-03-08 20:46:39 +0000 | [diff] [blame] | 57 | * |
| 58 | * http://www.daemonology.net/blog/2014-09-04-how-to-zero-a-buffer.html |
| 59 | * |
| 60 | * It uses a volatile function pointer to the standard memset(). Because the |
| 61 | * pointer is volatile the compiler expects it to change at |
| 62 | * any time and will not optimize out the call that could potentially perform |
| 63 | * other operations on the input buffer instead of just setting it to 0. |
| 64 | * Nevertheless, as pointed out by davidtgoldblatt on Hacker News |
| 65 | * (refer to http://www.daemonology.net/blog/2014-09-05-erratum.html for |
| 66 | * details), optimizations of the following form are still possible: |
Andres Amaya Garcia | ecd1891 | 2017-10-26 22:43:41 +0100 | [diff] [blame] | 67 | * |
| 68 | * if( memset_func != memset ) |
| 69 | * memset_func( buf, 0, len ); |
| 70 | * |
Andres Amaya Garcia | 904e1ef | 2018-04-17 09:16:30 -0500 | [diff] [blame] | 71 | * Note that it is extremely difficult to guarantee that |
| 72 | * mbedtls_platform_zeroize() will not be optimized out by aggressive compilers |
| 73 | * in a portable way. For this reason, Mbed TLS also provides the configuration |
| 74 | * option MBEDTLS_PLATFORM_ZEROIZE_ALT, which allows users to configure |
| 75 | * mbedtls_platform_zeroize() to use a suitable implementation for their |
| 76 | * platform and needs. |
Andres Amaya Garcia | ecd1891 | 2017-10-26 22:43:41 +0100 | [diff] [blame] | 77 | */ |
Manuel Pégourié-Gonnard | 14f33e7 | 2019-10-02 16:23:52 +0200 | [diff] [blame] | 78 | void *mbedtls_platform_memset( void *, int, size_t ); |
| 79 | static void * (* const volatile memset_func)( void *, int, size_t ) = mbedtls_platform_memset; |
Andres Amaya Garcia | ecd1891 | 2017-10-26 22:43:41 +0100 | [diff] [blame] | 80 | |
Andres Amaya Garcia | 904e1ef | 2018-04-17 09:16:30 -0500 | [diff] [blame] | 81 | void mbedtls_platform_zeroize( void *buf, size_t len ) |
Andres Amaya Garcia | 614d9c0 | 2017-10-24 21:27:43 +0100 | [diff] [blame] | 82 | { |
Vikas Katariya | 0c34499 | 2019-08-15 14:24:20 +0100 | [diff] [blame] | 83 | MBEDTLS_INTERNAL_VALIDATE( len == 0 || buf != NULL ); |
| 84 | |
| 85 | if( len > 0 ) |
| 86 | memset_func( buf, 0, len ); |
Andres Amaya Garcia | 614d9c0 | 2017-10-24 21:27:43 +0100 | [diff] [blame] | 87 | } |
Andres Amaya Garcia | 904e1ef | 2018-04-17 09:16:30 -0500 | [diff] [blame] | 88 | #endif /* MBEDTLS_PLATFORM_ZEROIZE_ALT */ |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 89 | |
Manuel Pégourié-Gonnard | 51f65e4 | 2019-10-02 16:01:14 +0200 | [diff] [blame] | 90 | void *mbedtls_platform_memset( void *ptr, int value, size_t num ) |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 91 | { |
| 92 | /* Randomize start offset. */ |
Jarno Lamsa | 0ff7109 | 2019-10-02 08:18:29 +0300 | [diff] [blame] | 93 | size_t start_offset = (size_t) mbedtls_platform_random_in_range( num ); |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 94 | /* Randomize data */ |
Jarno Lamsa | a1e5054 | 2019-10-02 12:44:36 +0300 | [diff] [blame] | 95 | uint32_t data = mbedtls_platform_random_in_range( 256 ); |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 96 | |
| 97 | /* Perform a pair of memset operations from random locations with |
| 98 | * random data */ |
Jarno Lamsa | 32db938 | 2019-10-02 08:25:57 +0300 | [diff] [blame] | 99 | memset( (void *) ( (unsigned char *) ptr + start_offset ), data, |
Jarno Lamsa | 0ff7109 | 2019-10-02 08:18:29 +0300 | [diff] [blame] | 100 | ( num - start_offset ) ); |
| 101 | memset( (void *) ptr, data, start_offset ); |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 102 | |
| 103 | /* Perform the original memset */ |
Manuel Pégourié-Gonnard | 51f65e4 | 2019-10-02 16:01:14 +0200 | [diff] [blame] | 104 | return( memset( ptr, value, num ) ); |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 105 | } |
| 106 | |
Manuel Pégourié-Gonnard | 51f65e4 | 2019-10-02 16:01:14 +0200 | [diff] [blame] | 107 | void *mbedtls_platform_memcpy( void *dst, const void *src, size_t num ) |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 108 | { |
| 109 | /* Randomize start offset. */ |
Jarno Lamsa | 0ff7109 | 2019-10-02 08:18:29 +0300 | [diff] [blame] | 110 | size_t start_offset = (size_t) mbedtls_platform_random_in_range( num ); |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 111 | /* Randomize initial data to prevent leakage while copying */ |
Jarno Lamsa | a1e5054 | 2019-10-02 12:44:36 +0300 | [diff] [blame] | 112 | uint32_t data = mbedtls_platform_random_in_range( 256 ); |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 113 | |
Piotr Nowicki | f0ab6d6 | 2020-05-25 12:48:30 +0200 | [diff] [blame] | 114 | /* Use memset with random value at first to increase security - memset is |
| 115 | not normally part of the memcpy function and here can be useed |
| 116 | with regular, unsecured implementation */ |
Jarno Lamsa | 0ff7109 | 2019-10-02 08:18:29 +0300 | [diff] [blame] | 117 | memset( (void *) dst, data, num ); |
| 118 | memcpy( (void *) ( (unsigned char *) dst + start_offset ), |
| 119 | (void *) ( (unsigned char *) src + start_offset ), |
| 120 | ( num - start_offset ) ); |
Manuel Pégourié-Gonnard | 51f65e4 | 2019-10-02 16:01:14 +0200 | [diff] [blame] | 121 | return( memcpy( (void *) dst, (void *) src, start_offset ) ); |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 122 | } |
| 123 | |
| 124 | int mbedtls_platform_memcmp( const void *buf1, const void *buf2, size_t num ) |
| 125 | { |
Jarno Lamsa | 7cb9027 | 2019-10-02 08:32:51 +0300 | [diff] [blame] | 126 | volatile const unsigned char *A = (volatile const unsigned char *) buf1; |
| 127 | volatile const unsigned char *B = (volatile const unsigned char *) buf2; |
| 128 | volatile unsigned char diff = 0; |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 129 | |
Piotr Nowicki | f0ab6d6 | 2020-05-25 12:48:30 +0200 | [diff] [blame] | 130 | /* Start from a random location and check the correct number of iterations */ |
| 131 | size_t i, flow_counter = 0; |
Jarno Lamsa | 0ff7109 | 2019-10-02 08:18:29 +0300 | [diff] [blame] | 132 | size_t start_offset = (size_t) mbedtls_platform_random_in_range( num ); |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 133 | |
Jarno Lamsa | 0ff7109 | 2019-10-02 08:18:29 +0300 | [diff] [blame] | 134 | for( i = start_offset; i < num; i++ ) |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 135 | { |
Jarno Lamsa | 7cb9027 | 2019-10-02 08:32:51 +0300 | [diff] [blame] | 136 | unsigned char x = A[i], y = B[i]; |
Piotr Nowicki | 4aaa34c | 2020-05-20 13:57:38 +0200 | [diff] [blame] | 137 | flow_counter++; |
Jarno Lamsa | 7cb9027 | 2019-10-02 08:32:51 +0300 | [diff] [blame] | 138 | diff |= x ^ y; |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 139 | } |
| 140 | |
Jarno Lamsa | 0ff7109 | 2019-10-02 08:18:29 +0300 | [diff] [blame] | 141 | for( i = 0; i < start_offset; i++ ) |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 142 | { |
Jarno Lamsa | 7cb9027 | 2019-10-02 08:32:51 +0300 | [diff] [blame] | 143 | unsigned char x = A[i], y = B[i]; |
Piotr Nowicki | 4aaa34c | 2020-05-20 13:57:38 +0200 | [diff] [blame] | 144 | flow_counter++; |
Jarno Lamsa | 7cb9027 | 2019-10-02 08:32:51 +0300 | [diff] [blame] | 145 | diff |= x ^ y; |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 146 | } |
| 147 | |
Piotr Nowicki | 4aaa34c | 2020-05-20 13:57:38 +0200 | [diff] [blame] | 148 | /* Return 0 only when diff is 0 and flow_counter is equal to num */ |
| 149 | return( (int) diff | (int) ( flow_counter ^ num ) ); |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 150 | } |
| 151 | |
Jarno Lamsa | f65e9de | 2019-10-01 16:09:35 +0300 | [diff] [blame] | 152 | uint32_t mbedtls_platform_random_in_range( size_t num ) |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 153 | { |
Arto Kinnunen | de657fc | 2019-12-04 16:30:54 +0200 | [diff] [blame] | 154 | #if !defined(MBEDTLS_ENTROPY_HARDWARE_ALT) |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 155 | (void) num; |
| 156 | return 0; |
Jarno Lamsa | e29e8a4 | 2019-10-03 11:06:35 +0300 | [diff] [blame] | 157 | #else |
| 158 | uint32_t result = 0; |
| 159 | size_t olen = 0; |
| 160 | |
| 161 | mbedtls_hardware_poll( NULL, (unsigned char *) &result, sizeof( result ), |
| 162 | &olen ); |
Jarno Lamsa | 436d18d | 2019-10-03 11:46:30 +0300 | [diff] [blame] | 163 | |
| 164 | if( num == 0 ) |
| 165 | { |
| 166 | result = 0; |
| 167 | } |
| 168 | else |
| 169 | { |
| 170 | result %= num; |
| 171 | } |
| 172 | |
| 173 | return( result ); |
Jarno Lamsa | e29e8a4 | 2019-10-03 11:06:35 +0300 | [diff] [blame] | 174 | #endif |
Jarno Lamsa | 0736325 | 2019-09-27 16:20:11 +0300 | [diff] [blame] | 175 | } |
| 176 | |
Arto Kinnunen | ac6d226 | 2020-01-09 10:11:20 +0200 | [diff] [blame] | 177 | void mbedtls_platform_random_delay( void ) |
Arto Kinnunen | 4c63b98 | 2019-12-02 15:01:41 +0200 | [diff] [blame] | 178 | { |
| 179 | #if !defined(MBEDTLS_ENTROPY_HARDWARE_ALT) |
Arto Kinnunen | ac6d226 | 2020-01-09 10:11:20 +0200 | [diff] [blame] | 180 | return; |
Arto Kinnunen | 4c63b98 | 2019-12-02 15:01:41 +0200 | [diff] [blame] | 181 | #else |
Arto Kinnunen | dbf2b43 | 2019-12-30 12:55:30 +0200 | [diff] [blame] | 182 | size_t rn_1, rn_2, rn_3; |
Arto Kinnunen | 4c63b98 | 2019-12-02 15:01:41 +0200 | [diff] [blame] | 183 | volatile size_t i = 0; |
Arto Kinnunen | dbf2b43 | 2019-12-30 12:55:30 +0200 | [diff] [blame] | 184 | uint8_t shift; |
Arto Kinnunen | 4c63b98 | 2019-12-02 15:01:41 +0200 | [diff] [blame] | 185 | |
Arto Kinnunen | b148651 | 2020-01-09 11:11:23 +0200 | [diff] [blame] | 186 | rn_1 = mbedtls_platform_random_in_range( MAX_RAND_DELAY ); |
Arto Kinnunen | dbf2b43 | 2019-12-30 12:55:30 +0200 | [diff] [blame] | 187 | rn_2 = mbedtls_platform_random_in_range( 0xffffffff ) + 1; |
| 188 | rn_3 = mbedtls_platform_random_in_range( 0xffffffff ) + 1; |
Arto Kinnunen | 4c63b98 | 2019-12-02 15:01:41 +0200 | [diff] [blame] | 189 | |
Arto Kinnunen | b47b105 | 2019-12-05 17:32:05 +0200 | [diff] [blame] | 190 | do |
| 191 | { |
Arto Kinnunen | 4c63b98 | 2019-12-02 15:01:41 +0200 | [diff] [blame] | 192 | i++; |
Arto Kinnunen | dbf2b43 | 2019-12-30 12:55:30 +0200 | [diff] [blame] | 193 | shift = rn_2 & 0x07; |
| 194 | if ( i % 2 ) |
| 195 | rn_2 = (uint32_t)( rn_2 >> shift | rn_2 << ( 32 - shift ) ); |
| 196 | else |
| 197 | rn_3 = (uint32_t)( rn_3 << shift | rn_3 >> ( 32 - shift ) ); |
| 198 | rn_2 ^= rn_3; |
| 199 | } while( i < rn_1 || rn_2 == 0 || rn_3 == 0 ); |
Arto Kinnunen | 4c63b98 | 2019-12-02 15:01:41 +0200 | [diff] [blame] | 200 | |
Arto Kinnunen | ac6d226 | 2020-01-09 10:11:20 +0200 | [diff] [blame] | 201 | return; |
Arto Kinnunen | 4c63b98 | 2019-12-02 15:01:41 +0200 | [diff] [blame] | 202 | #endif /* !MBEDTLS_ENTROPY_HARDWARE_ALT */ |
| 203 | } |
| 204 | |
Hanno Becker | 6a73978 | 2018-09-05 15:06:19 +0100 | [diff] [blame] | 205 | #if defined(MBEDTLS_HAVE_TIME_DATE) && !defined(MBEDTLS_PLATFORM_GMTIME_R_ALT) |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 206 | #include <time.h> |
Hanno Becker | cfeb70c | 2018-09-05 13:50:22 +0100 | [diff] [blame] | 207 | #if !defined(_WIN32) && (defined(unix) || \ |
Andres Amaya Garcia | 433f911 | 2018-09-05 12:01:57 +0100 | [diff] [blame] | 208 | defined(__unix) || defined(__unix__) || (defined(__APPLE__) && \ |
| 209 | defined(__MACH__))) |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 210 | #include <unistd.h> |
Hanno Becker | 323d801 | 2018-09-06 11:30:57 +0100 | [diff] [blame] | 211 | #endif /* !_WIN32 && (unix || __unix || __unix__ || |
| 212 | * (__APPLE__ && __MACH__)) */ |
Hanno Becker | 6f70581 | 2018-09-06 09:06:33 +0100 | [diff] [blame] | 213 | |
| 214 | #if !( ( defined(_POSIX_VERSION) && _POSIX_VERSION >= 200809L ) || \ |
| 215 | ( defined(_POSIX_THREAD_SAFE_FUNCTIONS ) && \ |
| 216 | _POSIX_THREAD_SAFE_FUNCTIONS >= 20112L ) ) |
Andres Amaya Garcia | ca04a01 | 2018-09-05 11:43:57 +0100 | [diff] [blame] | 217 | /* |
| 218 | * This is a convenience shorthand macro to avoid checking the long |
| 219 | * preprocessor conditions above. Ideally, we could expose this macro in |
Hanno Becker | 7dd82b4 | 2018-09-05 16:25:50 +0100 | [diff] [blame] | 220 | * platform_util.h and simply use it in platform_util.c, threading.c and |
Andres Amaya Garcia | ca04a01 | 2018-09-05 11:43:57 +0100 | [diff] [blame] | 221 | * threading.h. However, this macro is not part of the Mbed TLS public API, so |
Andres Amaya Garcia | 3c9733a | 2018-09-05 11:52:07 +0100 | [diff] [blame] | 222 | * we keep it private by only defining it in this file |
Andres Amaya Garcia | ca04a01 | 2018-09-05 11:43:57 +0100 | [diff] [blame] | 223 | */ |
Hanno Becker | f5106d5 | 2018-09-06 12:09:56 +0100 | [diff] [blame] | 224 | #if ! ( defined(_WIN32) && !defined(EFIX64) && !defined(EFI32) ) |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 225 | #define PLATFORM_UTIL_USE_GMTIME |
Hanno Becker | f5106d5 | 2018-09-06 12:09:56 +0100 | [diff] [blame] | 226 | #endif /* ! ( defined(_WIN32) && !defined(EFIX64) && !defined(EFI32) ) */ |
| 227 | |
Hanno Becker | 6f70581 | 2018-09-06 09:06:33 +0100 | [diff] [blame] | 228 | #endif /* !( ( defined(_POSIX_VERSION) && _POSIX_VERSION >= 200809L ) || \ |
| 229 | ( defined(_POSIX_THREAD_SAFE_FUNCTIONS ) && \ |
| 230 | _POSIX_THREAD_SAFE_FUNCTIONS >= 20112L ) ) */ |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 231 | |
Hanno Becker | 6a73978 | 2018-09-05 15:06:19 +0100 | [diff] [blame] | 232 | struct tm *mbedtls_platform_gmtime_r( const mbedtls_time_t *tt, |
| 233 | struct tm *tm_buf ) |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 234 | { |
| 235 | #if defined(_WIN32) && !defined(EFIX64) && !defined(EFI32) |
Andres Amaya Garcia | a658d7d | 2018-08-21 19:33:02 +0100 | [diff] [blame] | 236 | return( ( gmtime_s( tm_buf, tt ) == 0 ) ? tm_buf : NULL ); |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 237 | #elif !defined(PLATFORM_UTIL_USE_GMTIME) |
Andres Amaya Garcia | a658d7d | 2018-08-21 19:33:02 +0100 | [diff] [blame] | 238 | return( gmtime_r( tt, tm_buf ) ); |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 239 | #else |
| 240 | struct tm *lt; |
| 241 | |
| 242 | #if defined(MBEDTLS_THREADING_C) |
| 243 | if( mbedtls_mutex_lock( &mbedtls_threading_gmtime_mutex ) != 0 ) |
| 244 | return( NULL ); |
| 245 | #endif /* MBEDTLS_THREADING_C */ |
| 246 | |
| 247 | lt = gmtime( tt ); |
| 248 | |
| 249 | if( lt != NULL ) |
| 250 | { |
| 251 | memcpy( tm_buf, lt, sizeof( struct tm ) ); |
| 252 | } |
| 253 | |
| 254 | #if defined(MBEDTLS_THREADING_C) |
| 255 | if( mbedtls_mutex_unlock( &mbedtls_threading_gmtime_mutex ) != 0 ) |
| 256 | return( NULL ); |
| 257 | #endif /* MBEDTLS_THREADING_C */ |
| 258 | |
Andres Amaya Garcia | a658d7d | 2018-08-21 19:33:02 +0100 | [diff] [blame] | 259 | return( ( lt == NULL ) ? NULL : tm_buf ); |
| 260 | #endif /* _WIN32 && !EFIX64 && !EFI32 */ |
Andres Amaya Garcia | 1abb368 | 2018-08-16 21:42:09 +0100 | [diff] [blame] | 261 | } |
Hanno Becker | 6a73978 | 2018-09-05 15:06:19 +0100 | [diff] [blame] | 262 | #endif /* MBEDTLS_HAVE_TIME_DATE && MBEDTLS_PLATFORM_GMTIME_R_ALT */ |
Arto Kinnunen | 0b62ce8 | 2019-09-04 14:04:57 +0300 | [diff] [blame] | 263 | |
Arto Kinnunen | ee9bfca | 2019-09-06 16:59:00 +0300 | [diff] [blame] | 264 | unsigned char* mbedtls_platform_put_uint32_be( unsigned char *buf, |
Arto Kinnunen | 4f4849a | 2019-09-09 10:21:18 +0300 | [diff] [blame] | 265 | size_t num ) |
Arto Kinnunen | 0b62ce8 | 2019-09-04 14:04:57 +0300 | [diff] [blame] | 266 | { |
| 267 | *buf++ = (unsigned char) ( num >> 24 ); |
| 268 | *buf++ = (unsigned char) ( num >> 16 ); |
| 269 | *buf++ = (unsigned char) ( num >> 8 ); |
| 270 | *buf++ = (unsigned char) ( num ); |
| 271 | |
| 272 | return buf; |
| 273 | } |
| 274 | |
Arto Kinnunen | ee9bfca | 2019-09-06 16:59:00 +0300 | [diff] [blame] | 275 | unsigned char* mbedtls_platform_put_uint24_be( unsigned char *buf, |
Arto Kinnunen | 4f4849a | 2019-09-09 10:21:18 +0300 | [diff] [blame] | 276 | size_t num ) |
Arto Kinnunen | 0b62ce8 | 2019-09-04 14:04:57 +0300 | [diff] [blame] | 277 | { |
| 278 | *buf++ = (unsigned char) ( num >> 16 ); |
| 279 | *buf++ = (unsigned char) ( num >> 8 ); |
| 280 | *buf++ = (unsigned char) ( num ); |
| 281 | |
| 282 | return buf; |
| 283 | } |
| 284 | |
Arto Kinnunen | ee9bfca | 2019-09-06 16:59:00 +0300 | [diff] [blame] | 285 | unsigned char* mbedtls_platform_put_uint16_be( unsigned char *buf, |
Arto Kinnunen | 4f4849a | 2019-09-09 10:21:18 +0300 | [diff] [blame] | 286 | size_t num ) |
Arto Kinnunen | 0b62ce8 | 2019-09-04 14:04:57 +0300 | [diff] [blame] | 287 | { |
| 288 | *buf++ = (unsigned char) ( num >> 8 ); |
| 289 | *buf++ = (unsigned char) ( num ); |
| 290 | |
| 291 | return buf; |
| 292 | } |
| 293 | |
Arto Kinnunen | 4f4849a | 2019-09-09 10:21:18 +0300 | [diff] [blame] | 294 | size_t mbedtls_platform_get_uint32_be( const unsigned char *buf ) |
Arto Kinnunen | 0b62ce8 | 2019-09-04 14:04:57 +0300 | [diff] [blame] | 295 | { |
| 296 | return ( ( (unsigned int) buf[0] << 24 ) | |
| 297 | ( (unsigned int) buf[1] << 16 ) | |
| 298 | ( (unsigned int) buf[2] << 8 ) | |
| 299 | ( (unsigned int) buf[3] ) ); |
| 300 | } |
| 301 | |
Arto Kinnunen | 4f4849a | 2019-09-09 10:21:18 +0300 | [diff] [blame] | 302 | size_t mbedtls_platform_get_uint24_be( const unsigned char *buf ) |
Arto Kinnunen | 0b62ce8 | 2019-09-04 14:04:57 +0300 | [diff] [blame] | 303 | { |
| 304 | return ( ( buf[0] << 16 ) | |
| 305 | ( buf[1] << 8) | |
| 306 | ( buf[2] ) ); |
| 307 | } |
| 308 | |
Arto Kinnunen | 4f4849a | 2019-09-09 10:21:18 +0300 | [diff] [blame] | 309 | size_t mbedtls_platform_get_uint16_be( const unsigned char *buf ) |
Arto Kinnunen | 0b62ce8 | 2019-09-04 14:04:57 +0300 | [diff] [blame] | 310 | { |
| 311 | return ( ( buf[0] << 8 ) | |
| 312 | ( buf[1] ) ); |
| 313 | } |