[164] | 1 | /* port.c
|
---|
| 2 | *
|
---|
| 3 | * Copyright (C) 2006-2015 wolfSSL Inc.
|
---|
| 4 | *
|
---|
| 5 | * This file is part of wolfSSL. (formerly known as CyaSSL)
|
---|
| 6 | *
|
---|
| 7 | * wolfSSL is free software; you can redistribute it and/or modify
|
---|
| 8 | * it under the terms of the GNU General Public License as published by
|
---|
| 9 | * the Free Software Foundation; either version 2 of the License, or
|
---|
| 10 | * (at your option) any later version.
|
---|
| 11 | *
|
---|
| 12 | * wolfSSL is distributed in the hope that it will be useful,
|
---|
| 13 | * but WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
| 14 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
---|
| 15 | * GNU General Public License for more details.
|
---|
| 16 | *
|
---|
| 17 | * You should have received a copy of the GNU General Public License
|
---|
| 18 | * along with this program; if not, write to the Free Software
|
---|
| 19 | * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA
|
---|
| 20 | */
|
---|
| 21 |
|
---|
| 22 | #ifdef HAVE_CONFIG_H
|
---|
| 23 | #include <config.h>
|
---|
| 24 | #endif
|
---|
| 25 |
|
---|
| 26 | #include <wolfssl/wolfcrypt/settings.h>
|
---|
| 27 | #include <wolfssl/wolfcrypt/types.h>
|
---|
| 28 | #include <wolfssl/wolfcrypt/error-crypt.h>
|
---|
| 29 | #include <wolfssl/wolfcrypt/logging.h>
|
---|
| 30 |
|
---|
| 31 | /* IPP header files for library initialization */
|
---|
| 32 | #ifdef HAVE_FAST_RSA
|
---|
| 33 | #include <ipp.h>
|
---|
| 34 | #include <ippcp.h>
|
---|
| 35 | #endif
|
---|
| 36 |
|
---|
| 37 | #ifdef _MSC_VER
|
---|
| 38 | /* 4996 warning to use MS extensions e.g., strcpy_s instead of strncpy */
|
---|
| 39 | #pragma warning(disable: 4996)
|
---|
| 40 | #endif
|
---|
| 41 |
|
---|
| 42 |
|
---|
| 43 | /* Used to initialize state for wolfcrypt
|
---|
| 44 | return 0 on success
|
---|
| 45 | */
|
---|
| 46 | int wolfcrypt_Init()
|
---|
| 47 | {
|
---|
| 48 | /* if defined have fast RSA then initialize Intel IPP */
|
---|
| 49 | #ifdef HAVE_FAST_RSA
|
---|
| 50 | WOLFSSL_MSG("Setting up IPP Library");
|
---|
| 51 | if (ippInit() != ippStsNoErr) {
|
---|
| 52 | WOLFSSL_MSG("Error setting up optimized Intel library to use!");
|
---|
| 53 | return -1;
|
---|
| 54 | }
|
---|
| 55 | #endif
|
---|
| 56 |
|
---|
| 57 | return 0;
|
---|
| 58 | }
|
---|
| 59 |
|
---|
| 60 |
|
---|
| 61 | #if WOLFSSL_CRYPT_HW_MUTEX
|
---|
| 62 | /* Mutex for protection of cryptograpghy hardware */
|
---|
| 63 | static wolfSSL_Mutex wcCryptHwMutex;
|
---|
| 64 | static int wcCryptHwMutexInit = 0;
|
---|
| 65 |
|
---|
| 66 | int wolfSSL_CryptHwMutexInit(void) {
|
---|
| 67 | int ret = 0;
|
---|
| 68 | if(wcCryptHwMutexInit == 0) {
|
---|
| 69 | ret = InitMutex(&wcCryptHwMutex);
|
---|
| 70 | if(ret == 0) {
|
---|
| 71 | wcCryptHwMutexInit = 1;
|
---|
| 72 | }
|
---|
| 73 | }
|
---|
| 74 | return ret;
|
---|
| 75 | }
|
---|
| 76 |
|
---|
| 77 | int wolfSSL_CryptHwMutexLock(void) {
|
---|
| 78 | int ret = BAD_MUTEX_E;
|
---|
| 79 |
|
---|
| 80 | /* Make sure HW Mutex has been initialized */
|
---|
| 81 | wolfSSL_CryptHwMutexInit();
|
---|
| 82 |
|
---|
| 83 | if(wcCryptHwMutexInit) {
|
---|
| 84 | ret = LockMutex(&wcCryptHwMutex);
|
---|
| 85 | }
|
---|
| 86 | return ret;
|
---|
| 87 | }
|
---|
| 88 |
|
---|
| 89 | int wolfSSL_CryptHwMutexUnLock(void) {
|
---|
| 90 | int ret = BAD_MUTEX_E;
|
---|
| 91 |
|
---|
| 92 | if(wcCryptHwMutexInit) {
|
---|
| 93 | ret = UnLockMutex(&wcCryptHwMutex);
|
---|
| 94 | }
|
---|
| 95 | return ret;
|
---|
| 96 | }
|
---|
| 97 | #endif /* WOLFSSL_CRYPT_HW_MUTEX */
|
---|
| 98 |
|
---|
| 99 |
|
---|
| 100 | #ifdef SINGLE_THREADED
|
---|
| 101 |
|
---|
| 102 | int InitMutex(wolfSSL_Mutex* m)
|
---|
| 103 | {
|
---|
| 104 | (void)m;
|
---|
| 105 | return 0;
|
---|
| 106 | }
|
---|
| 107 |
|
---|
| 108 |
|
---|
| 109 | int FreeMutex(wolfSSL_Mutex *m)
|
---|
| 110 | {
|
---|
| 111 | (void)m;
|
---|
| 112 | return 0;
|
---|
| 113 | }
|
---|
| 114 |
|
---|
| 115 |
|
---|
| 116 | int LockMutex(wolfSSL_Mutex *m)
|
---|
| 117 | {
|
---|
| 118 | (void)m;
|
---|
| 119 | return 0;
|
---|
| 120 | }
|
---|
| 121 |
|
---|
| 122 |
|
---|
| 123 | int UnLockMutex(wolfSSL_Mutex *m)
|
---|
| 124 | {
|
---|
| 125 | (void)m;
|
---|
| 126 | return 0;
|
---|
| 127 | }
|
---|
| 128 |
|
---|
| 129 | #else /* MULTI_THREAD */
|
---|
| 130 |
|
---|
| 131 | #if defined(FREERTOS) || defined(FREERTOS_TCP)
|
---|
| 132 |
|
---|
| 133 | int InitMutex(wolfSSL_Mutex* m)
|
---|
| 134 | {
|
---|
| 135 | int iReturn;
|
---|
| 136 |
|
---|
| 137 | *m = ( wolfSSL_Mutex ) xSemaphoreCreateMutex();
|
---|
| 138 | if( *m != NULL )
|
---|
| 139 | iReturn = 0;
|
---|
| 140 | else
|
---|
| 141 | iReturn = BAD_MUTEX_E;
|
---|
| 142 |
|
---|
| 143 | return iReturn;
|
---|
| 144 | }
|
---|
| 145 |
|
---|
| 146 | int FreeMutex(wolfSSL_Mutex* m)
|
---|
| 147 | {
|
---|
| 148 | vSemaphoreDelete( *m );
|
---|
| 149 | return 0;
|
---|
| 150 | }
|
---|
| 151 |
|
---|
| 152 | int LockMutex(wolfSSL_Mutex* m)
|
---|
| 153 | {
|
---|
| 154 | /* Assume an infinite block, or should there be zero block? */
|
---|
| 155 | xSemaphoreTake( *m, portMAX_DELAY );
|
---|
| 156 | return 0;
|
---|
| 157 | }
|
---|
| 158 |
|
---|
| 159 | int UnLockMutex(wolfSSL_Mutex* m)
|
---|
| 160 | {
|
---|
| 161 | xSemaphoreGive( *m );
|
---|
| 162 | return 0;
|
---|
| 163 | }
|
---|
| 164 |
|
---|
| 165 | #elif defined(WOLFSSL_SAFERTOS)
|
---|
| 166 |
|
---|
| 167 | int InitMutex(wolfSSL_Mutex* m)
|
---|
| 168 | {
|
---|
| 169 | vSemaphoreCreateBinary(m->mutexBuffer, m->mutex);
|
---|
| 170 | if (m->mutex == NULL)
|
---|
| 171 | return BAD_MUTEX_E;
|
---|
| 172 |
|
---|
| 173 | return 0;
|
---|
| 174 | }
|
---|
| 175 |
|
---|
| 176 | int FreeMutex(wolfSSL_Mutex* m)
|
---|
| 177 | {
|
---|
| 178 | (void)m;
|
---|
| 179 | return 0;
|
---|
| 180 | }
|
---|
| 181 |
|
---|
| 182 | int LockMutex(wolfSSL_Mutex* m)
|
---|
| 183 | {
|
---|
| 184 | /* Assume an infinite block */
|
---|
| 185 | xSemaphoreTake(m->mutex, portMAX_DELAY);
|
---|
| 186 | return 0;
|
---|
| 187 | }
|
---|
| 188 |
|
---|
| 189 | int UnLockMutex(wolfSSL_Mutex* m)
|
---|
| 190 | {
|
---|
| 191 | xSemaphoreGive(m->mutex);
|
---|
| 192 | return 0;
|
---|
| 193 | }
|
---|
| 194 |
|
---|
| 195 |
|
---|
| 196 | #elif defined(USE_WINDOWS_API)
|
---|
| 197 |
|
---|
| 198 | int InitMutex(wolfSSL_Mutex* m)
|
---|
| 199 | {
|
---|
| 200 | InitializeCriticalSection(m);
|
---|
| 201 | return 0;
|
---|
| 202 | }
|
---|
| 203 |
|
---|
| 204 |
|
---|
| 205 | int FreeMutex(wolfSSL_Mutex* m)
|
---|
| 206 | {
|
---|
| 207 | DeleteCriticalSection(m);
|
---|
| 208 | return 0;
|
---|
| 209 | }
|
---|
| 210 |
|
---|
| 211 |
|
---|
| 212 | int LockMutex(wolfSSL_Mutex* m)
|
---|
| 213 | {
|
---|
| 214 | EnterCriticalSection(m);
|
---|
| 215 | return 0;
|
---|
| 216 | }
|
---|
| 217 |
|
---|
| 218 |
|
---|
| 219 | int UnLockMutex(wolfSSL_Mutex* m)
|
---|
| 220 | {
|
---|
| 221 | LeaveCriticalSection(m);
|
---|
| 222 | return 0;
|
---|
| 223 | }
|
---|
| 224 |
|
---|
| 225 | #elif defined(WOLFSSL_PTHREADS)
|
---|
| 226 |
|
---|
| 227 | int InitMutex(wolfSSL_Mutex* m)
|
---|
| 228 | {
|
---|
| 229 | if (pthread_mutex_init(m, 0) == 0)
|
---|
| 230 | return 0;
|
---|
| 231 | else
|
---|
| 232 | return BAD_MUTEX_E;
|
---|
| 233 | }
|
---|
| 234 |
|
---|
| 235 |
|
---|
| 236 | int FreeMutex(wolfSSL_Mutex* m)
|
---|
| 237 | {
|
---|
| 238 | if (pthread_mutex_destroy(m) == 0)
|
---|
| 239 | return 0;
|
---|
| 240 | else
|
---|
| 241 | return BAD_MUTEX_E;
|
---|
| 242 | }
|
---|
| 243 |
|
---|
| 244 |
|
---|
| 245 | int LockMutex(wolfSSL_Mutex* m)
|
---|
| 246 | {
|
---|
| 247 | if (pthread_mutex_lock(m) == 0)
|
---|
| 248 | return 0;
|
---|
| 249 | else
|
---|
| 250 | return BAD_MUTEX_E;
|
---|
| 251 | }
|
---|
| 252 |
|
---|
| 253 |
|
---|
| 254 | int UnLockMutex(wolfSSL_Mutex* m)
|
---|
| 255 | {
|
---|
| 256 | if (pthread_mutex_unlock(m) == 0)
|
---|
| 257 | return 0;
|
---|
| 258 | else
|
---|
| 259 | return BAD_MUTEX_E;
|
---|
| 260 | }
|
---|
| 261 |
|
---|
| 262 | #elif defined(THREADX)
|
---|
| 263 |
|
---|
| 264 | int InitMutex(wolfSSL_Mutex* m)
|
---|
| 265 | {
|
---|
| 266 | if (tx_mutex_create(m, "wolfSSL Mutex", TX_NO_INHERIT) == 0)
|
---|
| 267 | return 0;
|
---|
| 268 | else
|
---|
| 269 | return BAD_MUTEX_E;
|
---|
| 270 | }
|
---|
| 271 |
|
---|
| 272 |
|
---|
| 273 | int FreeMutex(wolfSSL_Mutex* m)
|
---|
| 274 | {
|
---|
| 275 | if (tx_mutex_delete(m) == 0)
|
---|
| 276 | return 0;
|
---|
| 277 | else
|
---|
| 278 | return BAD_MUTEX_E;
|
---|
| 279 | }
|
---|
| 280 |
|
---|
| 281 |
|
---|
| 282 | int LockMutex(wolfSSL_Mutex* m)
|
---|
| 283 | {
|
---|
| 284 | if (tx_mutex_get(m, TX_WAIT_FOREVER) == 0)
|
---|
| 285 | return 0;
|
---|
| 286 | else
|
---|
| 287 | return BAD_MUTEX_E;
|
---|
| 288 | }
|
---|
| 289 |
|
---|
| 290 |
|
---|
| 291 | int UnLockMutex(wolfSSL_Mutex* m)
|
---|
| 292 | {
|
---|
| 293 | if (tx_mutex_put(m) == 0)
|
---|
| 294 | return 0;
|
---|
| 295 | else
|
---|
| 296 | return BAD_MUTEX_E;
|
---|
| 297 | }
|
---|
| 298 |
|
---|
| 299 | #elif defined(MICRIUM)
|
---|
| 300 |
|
---|
| 301 | int InitMutex(wolfSSL_Mutex* m)
|
---|
| 302 | {
|
---|
| 303 | #if (NET_SECURE_MGR_CFG_EN == DEF_ENABLED)
|
---|
| 304 | if (NetSecure_OS_MutexCreate(m) == 0)
|
---|
| 305 | return 0;
|
---|
| 306 | else
|
---|
| 307 | return BAD_MUTEX_E;
|
---|
| 308 | #else
|
---|
| 309 | return 0;
|
---|
| 310 | #endif
|
---|
| 311 | }
|
---|
| 312 |
|
---|
| 313 |
|
---|
| 314 | int FreeMutex(wolfSSL_Mutex* m)
|
---|
| 315 | {
|
---|
| 316 | #if (NET_SECURE_MGR_CFG_EN == DEF_ENABLED)
|
---|
| 317 | if (NetSecure_OS_FreeMutex(m) == 0)
|
---|
| 318 | return 0;
|
---|
| 319 | else
|
---|
| 320 | return BAD_MUTEX_E;
|
---|
| 321 | #else
|
---|
| 322 | return 0;
|
---|
| 323 | #endif
|
---|
| 324 | }
|
---|
| 325 |
|
---|
| 326 |
|
---|
| 327 | int LockMutex(wolfSSL_Mutex* m)
|
---|
| 328 | {
|
---|
| 329 | #if (NET_SECURE_MGR_CFG_EN == DEF_ENABLED)
|
---|
| 330 | if (NetSecure_OS_LockMutex(m) == 0)
|
---|
| 331 | return 0;
|
---|
| 332 | else
|
---|
| 333 | return BAD_MUTEX_E;
|
---|
| 334 | #else
|
---|
| 335 | return 0;
|
---|
| 336 | #endif
|
---|
| 337 | }
|
---|
| 338 |
|
---|
| 339 |
|
---|
| 340 | int UnLockMutex(wolfSSL_Mutex* m)
|
---|
| 341 | {
|
---|
| 342 | #if (NET_SECURE_MGR_CFG_EN == DEF_ENABLED)
|
---|
| 343 | if (NetSecure_OS_UnLockMutex(m) == 0)
|
---|
| 344 | return 0;
|
---|
| 345 | else
|
---|
| 346 | return BAD_MUTEX_E;
|
---|
| 347 | #else
|
---|
| 348 | return 0;
|
---|
| 349 | #endif
|
---|
| 350 |
|
---|
| 351 | }
|
---|
| 352 |
|
---|
| 353 | #elif defined(EBSNET)
|
---|
| 354 |
|
---|
| 355 | int InitMutex(wolfSSL_Mutex* m)
|
---|
| 356 | {
|
---|
| 357 | if (rtp_sig_mutex_alloc(m, "wolfSSL Mutex") == -1)
|
---|
| 358 | return BAD_MUTEX_E;
|
---|
| 359 | else
|
---|
| 360 | return 0;
|
---|
| 361 | }
|
---|
| 362 |
|
---|
| 363 | int FreeMutex(wolfSSL_Mutex* m)
|
---|
| 364 | {
|
---|
| 365 | rtp_sig_mutex_free(*m);
|
---|
| 366 | return 0;
|
---|
| 367 | }
|
---|
| 368 |
|
---|
| 369 | int LockMutex(wolfSSL_Mutex* m)
|
---|
| 370 | {
|
---|
| 371 | if (rtp_sig_mutex_claim_timed(*m, RTIP_INF) == 0)
|
---|
| 372 | return 0;
|
---|
| 373 | else
|
---|
| 374 | return BAD_MUTEX_E;
|
---|
| 375 | }
|
---|
| 376 |
|
---|
| 377 | int UnLockMutex(wolfSSL_Mutex* m)
|
---|
| 378 | {
|
---|
| 379 | rtp_sig_mutex_release(*m);
|
---|
| 380 | return 0;
|
---|
| 381 | }
|
---|
| 382 |
|
---|
| 383 | #elif defined(FREESCALE_MQX)
|
---|
| 384 |
|
---|
| 385 | int InitMutex(wolfSSL_Mutex* m)
|
---|
| 386 | {
|
---|
| 387 | if (_mutex_init(m, NULL) == MQX_EOK)
|
---|
| 388 | return 0;
|
---|
| 389 | else
|
---|
| 390 | return BAD_MUTEX_E;
|
---|
| 391 | }
|
---|
| 392 |
|
---|
| 393 | int FreeMutex(wolfSSL_Mutex* m)
|
---|
| 394 | {
|
---|
| 395 | if (_mutex_destroy(m) == MQX_EOK)
|
---|
| 396 | return 0;
|
---|
| 397 | else
|
---|
| 398 | return BAD_MUTEX_E;
|
---|
| 399 | }
|
---|
| 400 |
|
---|
| 401 | int LockMutex(wolfSSL_Mutex* m)
|
---|
| 402 | {
|
---|
| 403 | if (_mutex_lock(m) == MQX_EOK)
|
---|
| 404 | return 0;
|
---|
| 405 | else
|
---|
| 406 | return BAD_MUTEX_E;
|
---|
| 407 | }
|
---|
| 408 |
|
---|
| 409 | int UnLockMutex(wolfSSL_Mutex* m)
|
---|
| 410 | {
|
---|
| 411 | if (_mutex_unlock(m) == MQX_EOK)
|
---|
| 412 | return 0;
|
---|
| 413 | else
|
---|
| 414 | return BAD_MUTEX_E;
|
---|
| 415 | }
|
---|
| 416 |
|
---|
| 417 | #elif defined (WOLFSSL_TIRTOS)
|
---|
| 418 | #include <xdc/runtime/Error.h>
|
---|
| 419 | int InitMutex(wolfSSL_Mutex* m)
|
---|
| 420 | {
|
---|
| 421 | Semaphore_Params params;
|
---|
| 422 | Error_Block eb;
|
---|
| 423 | Error_init(&eb);
|
---|
| 424 | Semaphore_Params_init(¶ms);
|
---|
| 425 | params.mode = Semaphore_Mode_BINARY;
|
---|
| 426 |
|
---|
| 427 | *m = Semaphore_create(1, ¶ms, &eb);
|
---|
| 428 | if( Error_check( &eb ) )
|
---|
| 429 | {
|
---|
| 430 | Error_raise( &eb, Error_E_generic, "Failed to Create the semaphore.",NULL);
|
---|
| 431 | } else return 0;
|
---|
| 432 | }
|
---|
| 433 |
|
---|
| 434 | int FreeMutex(wolfSSL_Mutex* m)
|
---|
| 435 | {
|
---|
| 436 | Semaphore_delete(m);
|
---|
| 437 |
|
---|
| 438 | return 0;
|
---|
| 439 | }
|
---|
| 440 |
|
---|
| 441 | int LockMutex(wolfSSL_Mutex* m)
|
---|
| 442 | {
|
---|
| 443 | Semaphore_pend(*m, BIOS_WAIT_FOREVER);
|
---|
| 444 |
|
---|
| 445 | return 0;
|
---|
| 446 | }
|
---|
| 447 |
|
---|
| 448 | int UnLockMutex(wolfSSL_Mutex* m)
|
---|
| 449 | {
|
---|
| 450 | Semaphore_post(*m);
|
---|
| 451 |
|
---|
| 452 | return 0;
|
---|
| 453 | }
|
---|
| 454 |
|
---|
| 455 | #elif defined(WOLFSSL_LWIP)
|
---|
| 456 |
|
---|
| 457 | int InitMutex(wolfSSL_Mutex* m)
|
---|
| 458 | {
|
---|
| 459 | err_t err;
|
---|
| 460 | err = sys_mutex_new(m);
|
---|
| 461 | return (err == ERR_OK) ? 0 : -1;
|
---|
| 462 | }
|
---|
| 463 |
|
---|
| 464 | int FreeMutex(wolfSSL_Mutex* m)
|
---|
| 465 | {
|
---|
| 466 | sys_mutex_free(m);
|
---|
| 467 | return 0;
|
---|
| 468 | }
|
---|
| 469 |
|
---|
| 470 | int LockMutex(wolfSSL_Mutex* m)
|
---|
| 471 | {
|
---|
| 472 | sys_mutex_lock(m);
|
---|
| 473 | return 0;
|
---|
| 474 | }
|
---|
| 475 |
|
---|
| 476 | int UnLockMutex(wolfSSL_Mutex* m)
|
---|
| 477 | {
|
---|
| 478 | sys_mutex_unlock(m);
|
---|
| 479 | return 0;
|
---|
| 480 | }
|
---|
| 481 |
|
---|
| 482 | int uITRON4_minit(size_t poolsz)
|
---|
| 483 | {
|
---|
| 484 | return 0;
|
---|
| 485 | }
|
---|
| 486 |
|
---|
| 487 | void *uITRON4_malloc(size_t sz)
|
---|
| 488 | {
|
---|
| 489 | return sys_malloc(sz);
|
---|
| 490 | }
|
---|
| 491 |
|
---|
| 492 | void *uITRON4_realloc(void *p, size_t sz)
|
---|
| 493 | {
|
---|
| 494 | return sys_realloc(p, sz);
|
---|
| 495 | }
|
---|
| 496 |
|
---|
| 497 | void uITRON4_free(void *p)
|
---|
| 498 | {
|
---|
| 499 | sys_free(p);
|
---|
| 500 | }
|
---|
| 501 |
|
---|
| 502 | #elif defined(WOLFSSL_uITRON4)
|
---|
| 503 | #include "stddef.h"
|
---|
| 504 | #include "kernel.h"
|
---|
| 505 | int InitMutex(wolfSSL_Mutex* m)
|
---|
| 506 | {
|
---|
| 507 | int iReturn;
|
---|
| 508 | m->sem.sematr = TA_TFIFO ;
|
---|
| 509 | m->sem.isemcnt = 1 ;
|
---|
| 510 | m->sem.maxsem = 1 ;
|
---|
| 511 | m->sem.name = NULL ;
|
---|
| 512 |
|
---|
| 513 | m->id = acre_sem(&m->sem);
|
---|
| 514 | if( m->id != E_OK )
|
---|
| 515 | iReturn = 0;
|
---|
| 516 | else
|
---|
| 517 | iReturn = BAD_MUTEX_E;
|
---|
| 518 |
|
---|
| 519 | return iReturn;
|
---|
| 520 | }
|
---|
| 521 |
|
---|
| 522 | int FreeMutex(wolfSSL_Mutex* m)
|
---|
| 523 | {
|
---|
| 524 | del_sem( m->id );
|
---|
| 525 | return 0;
|
---|
| 526 | }
|
---|
| 527 |
|
---|
| 528 | int LockMutex(wolfSSL_Mutex* m)
|
---|
| 529 | {
|
---|
| 530 | wai_sem(m->id);
|
---|
| 531 | return 0;
|
---|
| 532 | }
|
---|
| 533 |
|
---|
| 534 | int UnLockMutex(wolfSSL_Mutex* m)
|
---|
| 535 | {
|
---|
| 536 | sig_sem(m->id);
|
---|
| 537 | return 0;
|
---|
| 538 | }
|
---|
| 539 |
|
---|
| 540 | /**** uITRON malloc/free ***/
|
---|
| 541 | static ID ID_wolfssl_MPOOL = 0 ;
|
---|
| 542 | static T_CMPL wolfssl_MPOOL = {TA_TFIFO, 0, NULL, "wolfSSL_MPOOL"};
|
---|
| 543 |
|
---|
| 544 | int uITRON4_minit(size_t poolsz) {
|
---|
| 545 | ER ercd;
|
---|
| 546 | wolfssl_MPOOL.mplsz = poolsz ;
|
---|
| 547 | ercd = acre_mpl(&wolfssl_MPOOL);
|
---|
| 548 | if (ercd > 0) {
|
---|
| 549 | ID_wolfssl_MPOOL = ercd;
|
---|
| 550 | return 0;
|
---|
| 551 | } else {
|
---|
| 552 | return -1;
|
---|
| 553 | }
|
---|
| 554 | }
|
---|
| 555 |
|
---|
| 556 | void *uITRON4_malloc(size_t sz) {
|
---|
| 557 | ER ercd;
|
---|
| 558 | void *p ;
|
---|
| 559 | ercd = get_mpl(ID_wolfssl_MPOOL, sz, (VP)&p);
|
---|
| 560 | if (ercd == E_OK) {
|
---|
| 561 | return p;
|
---|
| 562 | } else {
|
---|
| 563 | return 0 ;
|
---|
| 564 | }
|
---|
| 565 | }
|
---|
| 566 |
|
---|
| 567 | void *uITRON4_realloc(void *p, size_t sz) {
|
---|
| 568 | ER ercd;
|
---|
| 569 | void *newp ;
|
---|
| 570 | if(p) {
|
---|
| 571 | ercd = get_mpl(ID_wolfssl_MPOOL, sz, (VP)&newp);
|
---|
| 572 | if (ercd == E_OK) {
|
---|
| 573 | XMEMCPY(newp, p, sz) ;
|
---|
| 574 | ercd = rel_mpl(ID_wolfssl_MPOOL, (VP)p);
|
---|
| 575 | if (ercd == E_OK) {
|
---|
| 576 | return newp;
|
---|
| 577 | }
|
---|
| 578 | }
|
---|
| 579 | }
|
---|
| 580 | return 0 ;
|
---|
| 581 | }
|
---|
| 582 |
|
---|
| 583 | void uITRON4_free(void *p) {
|
---|
| 584 | ER ercd;
|
---|
| 585 | ercd = rel_mpl(ID_wolfssl_MPOOL, (VP)p);
|
---|
| 586 | if (ercd == E_OK) {
|
---|
| 587 | return ;
|
---|
| 588 | } else {
|
---|
| 589 | return ;
|
---|
| 590 | }
|
---|
| 591 | }
|
---|
| 592 |
|
---|
| 593 | #elif defined(WOLFSSL_uTKERNEL2)
|
---|
| 594 | #include "tk/tkernel.h"
|
---|
| 595 | int InitMutex(wolfSSL_Mutex* m)
|
---|
| 596 | {
|
---|
| 597 | int iReturn;
|
---|
| 598 | m->sem.sematr = TA_TFIFO ;
|
---|
| 599 | m->sem.isemcnt = 1 ;
|
---|
| 600 | m->sem.maxsem = 1 ;
|
---|
| 601 |
|
---|
| 602 | m->id = tk_cre_sem(&m->sem);
|
---|
| 603 | if( m->id != NULL )
|
---|
| 604 | iReturn = 0;
|
---|
| 605 | else
|
---|
| 606 | iReturn = BAD_MUTEX_E;
|
---|
| 607 |
|
---|
| 608 | return iReturn;
|
---|
| 609 | }
|
---|
| 610 |
|
---|
| 611 | int FreeMutex(wolfSSL_Mutex* m)
|
---|
| 612 | {
|
---|
| 613 | tk_del_sem( m->id );
|
---|
| 614 | return 0;
|
---|
| 615 | }
|
---|
| 616 |
|
---|
| 617 | int LockMutex(wolfSSL_Mutex* m)
|
---|
| 618 | {
|
---|
| 619 | tk_wai_sem(m->id, 1, TMO_FEVR);
|
---|
| 620 | return 0;
|
---|
| 621 | }
|
---|
| 622 |
|
---|
| 623 | int UnLockMutex(wolfSSL_Mutex* m)
|
---|
| 624 | {
|
---|
| 625 | tk_sig_sem(m->id, 1);
|
---|
| 626 | return 0;
|
---|
| 627 | }
|
---|
| 628 |
|
---|
| 629 | /**** uT-Kernel malloc/free ***/
|
---|
| 630 | static ID ID_wolfssl_MPOOL = 0 ;
|
---|
| 631 | static T_CMPL wolfssl_MPOOL =
|
---|
| 632 | {(void *)NULL,
|
---|
| 633 | TA_TFIFO , 0, "wolfSSL_MPOOL"};
|
---|
| 634 |
|
---|
| 635 | int uTKernel_init_mpool(unsigned int sz) {
|
---|
| 636 | ER ercd;
|
---|
| 637 | wolfssl_MPOOL.mplsz = sz ;
|
---|
| 638 | ercd = tk_cre_mpl(&wolfssl_MPOOL);
|
---|
| 639 | if (ercd > 0) {
|
---|
| 640 | ID_wolfssl_MPOOL = ercd;
|
---|
| 641 | return 0;
|
---|
| 642 | } else {
|
---|
| 643 | return -1;
|
---|
| 644 | }
|
---|
| 645 | }
|
---|
| 646 |
|
---|
| 647 | void *uTKernel_malloc(unsigned int sz) {
|
---|
| 648 | ER ercd;
|
---|
| 649 | void *p ;
|
---|
| 650 | ercd = tk_get_mpl(ID_wolfssl_MPOOL, sz, (VP)&p, TMO_FEVR);
|
---|
| 651 | if (ercd == E_OK) {
|
---|
| 652 | return p;
|
---|
| 653 | } else {
|
---|
| 654 | return 0 ;
|
---|
| 655 | }
|
---|
| 656 | }
|
---|
| 657 |
|
---|
| 658 | void *uTKernel_realloc(void *p, unsigned int sz) {
|
---|
| 659 | ER ercd;
|
---|
| 660 | void *newp ;
|
---|
| 661 | if(p) {
|
---|
| 662 | ercd = tk_get_mpl(ID_wolfssl_MPOOL, sz, (VP)&newp, TMO_FEVR);
|
---|
| 663 | if (ercd == E_OK) {
|
---|
| 664 | XMEMCPY(newp, p, sz) ;
|
---|
| 665 | ercd = tk_rel_mpl(ID_wolfssl_MPOOL, (VP)p);
|
---|
| 666 | if (ercd == E_OK) {
|
---|
| 667 | return newp;
|
---|
| 668 | }
|
---|
| 669 | }
|
---|
| 670 | }
|
---|
| 671 | return 0 ;
|
---|
| 672 | }
|
---|
| 673 |
|
---|
| 674 | void uTKernel_free(void *p) {
|
---|
| 675 | ER ercd;
|
---|
| 676 | ercd = tk_rel_mpl(ID_wolfssl_MPOOL, (VP)p);
|
---|
| 677 | if (ercd == E_OK) {
|
---|
| 678 | return ;
|
---|
| 679 | } else {
|
---|
| 680 | return ;
|
---|
| 681 | }
|
---|
| 682 | }
|
---|
| 683 |
|
---|
| 684 | #elif defined(WOLFSSL_MDK_ARM)|| defined(WOLFSSL_CMSIS_RTOS)
|
---|
| 685 |
|
---|
| 686 | #if defined(WOLFSSL_CMSIS_RTOS)
|
---|
| 687 | #include "cmsis_os.h"
|
---|
| 688 | #define CMSIS_NMUTEX 10
|
---|
| 689 | osMutexDef(wolfSSL_mt0) ; osMutexDef(wolfSSL_mt1) ; osMutexDef(wolfSSL_mt2) ;
|
---|
| 690 | osMutexDef(wolfSSL_mt3) ; osMutexDef(wolfSSL_mt4) ; osMutexDef(wolfSSL_mt5) ;
|
---|
| 691 | osMutexDef(wolfSSL_mt6) ; osMutexDef(wolfSSL_mt7) ; osMutexDef(wolfSSL_mt8) ;
|
---|
| 692 | osMutexDef(wolfSSL_mt9) ;
|
---|
| 693 |
|
---|
| 694 | static const osMutexDef_t *CMSIS_mutex[] = { osMutex(wolfSSL_mt0),
|
---|
| 695 | osMutex(wolfSSL_mt1), osMutex(wolfSSL_mt2), osMutex(wolfSSL_mt3),
|
---|
| 696 | osMutex(wolfSSL_mt4), osMutex(wolfSSL_mt5), osMutex(wolfSSL_mt6),
|
---|
| 697 | osMutex(wolfSSL_mt7), osMutex(wolfSSL_mt8), osMutex(wolfSSL_mt9) } ;
|
---|
| 698 |
|
---|
| 699 | static osMutexId CMSIS_mutexID[CMSIS_NMUTEX] = {0} ;
|
---|
| 700 |
|
---|
| 701 | int InitMutex(wolfSSL_Mutex* m)
|
---|
| 702 | {
|
---|
| 703 | int i ;
|
---|
| 704 | for (i=0; i<CMSIS_NMUTEX; i++) {
|
---|
| 705 | if(CMSIS_mutexID[i] == 0) {
|
---|
| 706 | CMSIS_mutexID[i] = osMutexCreate(CMSIS_mutex[i]) ;
|
---|
| 707 | (*m) = CMSIS_mutexID[i] ;
|
---|
| 708 | return 0 ;
|
---|
| 709 | }
|
---|
| 710 | }
|
---|
| 711 | return -1 ;
|
---|
| 712 | }
|
---|
| 713 |
|
---|
| 714 | int FreeMutex(wolfSSL_Mutex* m)
|
---|
| 715 | {
|
---|
| 716 | int i ;
|
---|
| 717 | osMutexDelete (*m) ;
|
---|
| 718 | for (i=0; i<CMSIS_NMUTEX; i++) {
|
---|
| 719 | if(CMSIS_mutexID[i] == (*m)) {
|
---|
| 720 | CMSIS_mutexID[i] = 0 ;
|
---|
| 721 | return(0) ;
|
---|
| 722 | }
|
---|
| 723 | }
|
---|
| 724 | return(-1) ;
|
---|
| 725 | }
|
---|
| 726 |
|
---|
| 727 | int LockMutex(wolfSSL_Mutex* m)
|
---|
| 728 | {
|
---|
| 729 | osMutexWait(*m, osWaitForever) ;
|
---|
| 730 | return(0) ;
|
---|
| 731 | }
|
---|
| 732 |
|
---|
| 733 | int UnLockMutex(wolfSSL_Mutex* m)
|
---|
| 734 | {
|
---|
| 735 | osMutexRelease (*m);
|
---|
| 736 | return 0;
|
---|
| 737 | }
|
---|
| 738 | #else
|
---|
| 739 | int InitMutex(wolfSSL_Mutex* m)
|
---|
| 740 | {
|
---|
| 741 | os_mut_init (m);
|
---|
| 742 | return 0;
|
---|
| 743 | }
|
---|
| 744 |
|
---|
| 745 | int FreeMutex(wolfSSL_Mutex* m)
|
---|
| 746 | {
|
---|
| 747 | return(0) ;
|
---|
| 748 | }
|
---|
| 749 |
|
---|
| 750 | int LockMutex(wolfSSL_Mutex* m)
|
---|
| 751 | {
|
---|
| 752 | os_mut_wait (m, 0xffff);
|
---|
| 753 | return(0) ;
|
---|
| 754 | }
|
---|
| 755 |
|
---|
| 756 | int UnLockMutex(wolfSSL_Mutex* m)
|
---|
| 757 | {
|
---|
| 758 | os_mut_release (m);
|
---|
| 759 | return 0;
|
---|
| 760 | }
|
---|
| 761 | #endif
|
---|
| 762 | #endif /* USE_WINDOWS_API */
|
---|
| 763 |
|
---|
| 764 | #endif /* SINGLE_THREADED */
|
---|
| 765 |
|
---|
| 766 | #if defined(WOLFSSL_TI_CRYPT) || defined(WOLFSSL_TI_HASH)
|
---|
| 767 | #include <wolfcrypt/src/port/ti/ti-ccm.c> /* initialize and Mutex for TI Crypt Engine */
|
---|
| 768 | #include <wolfcrypt/src/port/ti/ti-hash.c> /* md5, sha1, sha224, sha256 */
|
---|
| 769 | #endif
|
---|