2019-09-11 13:39:11 +02:00
|
|
|
/**
|
|
|
|
* \file common.h
|
|
|
|
*
|
|
|
|
* \brief Utility macros for internal use in the library
|
|
|
|
*/
|
|
|
|
/*
|
2020-08-07 13:07:28 +02:00
|
|
|
* Copyright The Mbed TLS Contributors
|
2023-11-02 20:47:20 +01:00
|
|
|
* SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
|
2019-09-11 13:39:11 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef MBEDTLS_LIBRARY_COMMON_H
|
|
|
|
#define MBEDTLS_LIBRARY_COMMON_H
|
|
|
|
|
2021-05-27 11:25:03 +02:00
|
|
|
#include "mbedtls/build_info.h"
|
2022-11-24 19:07:37 +01:00
|
|
|
#include "alignment.h"
|
2019-09-11 13:39:11 +02:00
|
|
|
|
2023-03-08 15:19:51 +01:00
|
|
|
#include <assert.h>
|
2022-11-23 14:15:57 +01:00
|
|
|
#include <stddef.h>
|
2021-07-14 13:31:31 +02:00
|
|
|
#include <stdint.h>
|
2022-11-22 16:01:39 +01:00
|
|
|
#include <stddef.h>
|
2021-07-14 13:31:31 +02:00
|
|
|
|
2023-05-23 17:11:22 +02:00
|
|
|
#if defined(__ARM_NEON)
|
2023-05-22 19:21:20 +02:00
|
|
|
#include <arm_neon.h>
|
2023-09-05 12:43:02 +02:00
|
|
|
#define MBEDTLS_HAVE_NEON_INTRINSICS
|
2023-09-15 12:52:06 +02:00
|
|
|
#elif defined(MBEDTLS_PLATFORM_IS_WINDOWS_ON_ARM64)
|
2023-09-05 12:43:02 +02:00
|
|
|
#include <arm64_neon.h>
|
|
|
|
#define MBEDTLS_HAVE_NEON_INTRINSICS
|
|
|
|
#endif
|
|
|
|
|
2019-09-11 13:39:11 +02:00
|
|
|
/** Helper to define a function as static except when building invasive tests.
|
|
|
|
*
|
|
|
|
* If a function is only used inside its own source file and should be
|
|
|
|
* declared `static` to allow the compiler to optimize for code size,
|
|
|
|
* but that function has unit tests, define it with
|
|
|
|
* ```
|
|
|
|
* MBEDTLS_STATIC_TESTABLE int mbedtls_foo(...) { ... }
|
|
|
|
* ```
|
|
|
|
* and declare it in a header in the `library/` directory with
|
|
|
|
* ```
|
|
|
|
* #if defined(MBEDTLS_TEST_HOOKS)
|
|
|
|
* int mbedtls_foo(...);
|
|
|
|
* #endif
|
|
|
|
* ```
|
|
|
|
*/
|
|
|
|
#if defined(MBEDTLS_TEST_HOOKS)
|
|
|
|
#define MBEDTLS_STATIC_TESTABLE
|
|
|
|
#else
|
|
|
|
#define MBEDTLS_STATIC_TESTABLE static
|
|
|
|
#endif
|
|
|
|
|
2021-07-07 17:29:43 +02:00
|
|
|
#if defined(MBEDTLS_TEST_HOOKS)
|
2023-01-11 14:50:10 +01:00
|
|
|
extern void (*mbedtls_test_hook_test_fail)(const char *test, int line, const char *file);
|
|
|
|
#define MBEDTLS_TEST_HOOK_TEST_ASSERT(TEST) \
|
|
|
|
do { \
|
|
|
|
if ((!(TEST)) && ((*mbedtls_test_hook_test_fail) != NULL)) \
|
|
|
|
{ \
|
|
|
|
(*mbedtls_test_hook_test_fail)( #TEST, __LINE__, __FILE__); \
|
|
|
|
} \
|
|
|
|
} while (0)
|
2021-07-07 17:29:43 +02:00
|
|
|
#else
|
2023-01-11 14:50:10 +01:00
|
|
|
#define MBEDTLS_TEST_HOOK_TEST_ASSERT(TEST)
|
2021-07-07 17:29:43 +02:00
|
|
|
#endif /* defined(MBEDTLS_TEST_HOOKS) */
|
|
|
|
|
2023-05-30 15:44:20 +02:00
|
|
|
/** \def ARRAY_LENGTH
|
|
|
|
* Return the number of elements of a static or stack array.
|
|
|
|
*
|
|
|
|
* \param array A value of array (not pointer) type.
|
|
|
|
*
|
|
|
|
* \return The number of elements of the array.
|
|
|
|
*/
|
|
|
|
/* A correct implementation of ARRAY_LENGTH, but which silently gives
|
|
|
|
* a nonsensical result if called with a pointer rather than an array. */
|
|
|
|
#define ARRAY_LENGTH_UNSAFE(array) \
|
|
|
|
(sizeof(array) / sizeof(*(array)))
|
|
|
|
|
|
|
|
#if defined(__GNUC__)
|
|
|
|
/* Test if arg and &(arg)[0] have the same type. This is true if arg is
|
|
|
|
* an array but not if it's a pointer. */
|
|
|
|
#define IS_ARRAY_NOT_POINTER(arg) \
|
|
|
|
(!__builtin_types_compatible_p(__typeof__(arg), \
|
|
|
|
__typeof__(&(arg)[0])))
|
|
|
|
/* A compile-time constant with the value 0. If `const_expr` is not a
|
|
|
|
* compile-time constant with a nonzero value, cause a compile-time error. */
|
|
|
|
#define STATIC_ASSERT_EXPR(const_expr) \
|
|
|
|
(0 && sizeof(struct { unsigned int STATIC_ASSERT : 1 - 2 * !(const_expr); }))
|
|
|
|
|
|
|
|
/* Return the scalar value `value` (possibly promoted). This is a compile-time
|
|
|
|
* constant if `value` is. `condition` must be a compile-time constant.
|
|
|
|
* If `condition` is false, arrange to cause a compile-time error. */
|
|
|
|
#define STATIC_ASSERT_THEN_RETURN(condition, value) \
|
|
|
|
(STATIC_ASSERT_EXPR(condition) ? 0 : (value))
|
|
|
|
|
|
|
|
#define ARRAY_LENGTH(array) \
|
|
|
|
(STATIC_ASSERT_THEN_RETURN(IS_ARRAY_NOT_POINTER(array), \
|
|
|
|
ARRAY_LENGTH_UNSAFE(array)))
|
|
|
|
|
|
|
|
#else
|
|
|
|
/* If we aren't sure the compiler supports our non-standard tricks,
|
|
|
|
* fall back to the unsafe implementation. */
|
|
|
|
#define ARRAY_LENGTH(array) ARRAY_LENGTH_UNSAFE(array)
|
|
|
|
#endif
|
2021-05-27 14:39:53 +02:00
|
|
|
/** Allow library to access its structs' private members.
|
2021-05-14 22:20:10 +02:00
|
|
|
*
|
|
|
|
* Although structs defined in header files are publicly available,
|
|
|
|
* their members are private and should not be accessed by the user.
|
|
|
|
*/
|
|
|
|
#define MBEDTLS_ALLOW_PRIVATE_ACCESS
|
|
|
|
|
2023-07-17 16:17:40 +02:00
|
|
|
/**
|
|
|
|
* \brief Securely zeroize a buffer then free it.
|
|
|
|
*
|
2023-07-18 17:26:29 +02:00
|
|
|
* Similar to making consecutive calls to
|
|
|
|
* \c mbedtls_platform_zeroize() and \c mbedtls_free(), but has
|
2023-07-17 16:17:40 +02:00
|
|
|
* code size savings, and potential for optimisation in the future.
|
|
|
|
*
|
2023-07-18 17:26:29 +02:00
|
|
|
* Guaranteed to be a no-op if \p buf is \c NULL and \p len is 0.
|
|
|
|
*
|
|
|
|
* \param buf Buffer to be zeroized then freed.
|
2023-07-17 16:17:40 +02:00
|
|
|
* \param len Length of the buffer in bytes
|
|
|
|
*/
|
|
|
|
void mbedtls_zeroize_and_free(void *buf, size_t len);
|
|
|
|
|
2022-11-23 14:15:57 +01:00
|
|
|
/** Return an offset into a buffer.
|
|
|
|
*
|
|
|
|
* This is just the addition of an offset to a pointer, except that this
|
|
|
|
* function also accepts an offset of 0 into a buffer whose pointer is null.
|
2022-11-25 13:34:59 +01:00
|
|
|
* (`p + n` has undefined behavior when `p` is null, even when `n == 0`.
|
|
|
|
* A null pointer is a valid buffer pointer when the size is 0, for example
|
|
|
|
* as the result of `malloc(0)` on some platforms.)
|
2022-11-23 14:15:57 +01:00
|
|
|
*
|
|
|
|
* \param p Pointer to a buffer of at least n bytes.
|
|
|
|
* This may be \p NULL if \p n is zero.
|
|
|
|
* \param n An offset in bytes.
|
|
|
|
* \return Pointer to offset \p n in the buffer \p p.
|
|
|
|
* Note that this is only a valid pointer if the size of the
|
|
|
|
* buffer is at least \p n + 1.
|
|
|
|
*/
|
|
|
|
static inline unsigned char *mbedtls_buffer_offset(
|
2023-01-11 14:50:10 +01:00
|
|
|
unsigned char *p, size_t n)
|
2022-11-23 14:15:57 +01:00
|
|
|
{
|
2023-01-11 14:50:10 +01:00
|
|
|
return p == NULL ? NULL : p + n;
|
2022-11-23 14:15:57 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/** Return an offset into a read-only buffer.
|
|
|
|
*
|
2022-11-25 13:34:59 +01:00
|
|
|
* Similar to mbedtls_buffer_offset(), but for const pointers.
|
2022-11-23 14:15:57 +01:00
|
|
|
*
|
|
|
|
* \param p Pointer to a buffer of at least n bytes.
|
|
|
|
* This may be \p NULL if \p n is zero.
|
|
|
|
* \param n An offset in bytes.
|
|
|
|
* \return Pointer to offset \p n in the buffer \p p.
|
|
|
|
* Note that this is only a valid pointer if the size of the
|
|
|
|
* buffer is at least \p n + 1.
|
|
|
|
*/
|
|
|
|
static inline const unsigned char *mbedtls_buffer_offset_const(
|
2023-01-11 14:50:10 +01:00
|
|
|
const unsigned char *p, size_t n)
|
2022-11-23 14:15:57 +01:00
|
|
|
{
|
2023-01-11 14:50:10 +01:00
|
|
|
return p == NULL ? NULL : p + n;
|
2022-11-23 14:15:57 +01:00
|
|
|
}
|
|
|
|
|
2024-01-19 17:06:41 +01:00
|
|
|
/* Always inline mbedtls_xor() for similar reasons as mbedtls_xor_no_simd(). */
|
2024-01-19 15:08:04 +01:00
|
|
|
#if defined(__IAR_SYSTEMS_ICC__)
|
|
|
|
#pragma inline = forced
|
|
|
|
#elif defined(__GNUC__)
|
|
|
|
__attribute__((always_inline))
|
|
|
|
#endif
|
2022-11-22 16:01:39 +01:00
|
|
|
/**
|
|
|
|
* Perform a fast block XOR operation, such that
|
|
|
|
* r[i] = a[i] ^ b[i] where 0 <= i < n
|
|
|
|
*
|
|
|
|
* \param r Pointer to result (buffer of at least \p n bytes). \p r
|
|
|
|
* may be equal to either \p a or \p b, but behaviour when
|
|
|
|
* it overlaps in other ways is undefined.
|
|
|
|
* \param a Pointer to input (buffer of at least \p n bytes)
|
|
|
|
* \param b Pointer to input (buffer of at least \p n bytes)
|
|
|
|
* \param n Number of bytes to process.
|
2024-01-19 15:08:17 +01:00
|
|
|
*
|
2024-01-19 17:06:41 +01:00
|
|
|
* \note Depending on the situation, it may be faster to use either mbedtls_xor() or
|
|
|
|
* mbedtls_xor_no_simd() (these are functionally equivalent).
|
2024-01-19 15:08:17 +01:00
|
|
|
* If the result is used immediately after the xor operation in non-SIMD code (e.g, in
|
|
|
|
* AES-CBC), there may be additional latency to transfer the data from SIMD to scalar
|
2024-01-19 17:06:41 +01:00
|
|
|
* registers, and in this case, mbedtls_xor_no_simd() may be faster. In other cases where
|
|
|
|
* the result is not used immediately (e.g., in AES-CTR), mbedtls_xor() may be faster.
|
2024-01-19 15:08:17 +01:00
|
|
|
* For targets without SIMD support, they will behave the same.
|
2022-11-22 16:01:39 +01:00
|
|
|
*/
|
2024-01-19 15:08:04 +01:00
|
|
|
static inline void mbedtls_xor(unsigned char *r,
|
|
|
|
const unsigned char *a,
|
|
|
|
const unsigned char *b,
|
|
|
|
size_t n)
|
2022-11-22 16:01:39 +01:00
|
|
|
{
|
2022-12-30 22:32:03 +01:00
|
|
|
size_t i = 0;
|
|
|
|
#if defined(MBEDTLS_EFFICIENT_UNALIGNED_ACCESS)
|
2023-11-30 10:31:26 +01:00
|
|
|
#if defined(MBEDTLS_HAVE_NEON_INTRINSICS) && \
|
2023-11-30 10:35:14 +01:00
|
|
|
(!(defined(MBEDTLS_COMPILER_IS_GCC) && MBEDTLS_GCC_VERSION < 70300))
|
|
|
|
/* Old GCC versions generate a warning here, so disable the NEON path for these compilers */
|
2023-05-22 19:21:20 +02:00
|
|
|
for (; (i + 16) <= n; i += 16) {
|
2023-06-09 17:25:49 +02:00
|
|
|
uint8x16_t v1 = vld1q_u8(a + i);
|
|
|
|
uint8x16_t v2 = vld1q_u8(b + i);
|
2023-06-07 17:25:58 +02:00
|
|
|
uint8x16_t x = veorq_u8(v1, v2);
|
2023-06-09 17:25:49 +02:00
|
|
|
vst1q_u8(r + i, x);
|
2023-05-22 19:21:20 +02:00
|
|
|
}
|
2024-01-23 10:36:34 +01:00
|
|
|
#if defined(__IAR_SYSTEMS_ICC__)
|
2024-01-19 17:06:41 +01:00
|
|
|
/* This if statement helps some compilers (e.g., IAR) optimise out the byte-by-byte tail case
|
|
|
|
* where n is a constant multiple of 16.
|
2024-01-23 10:36:34 +01:00
|
|
|
* For other compilers (e.g. recent gcc and clang) it makes no difference if n is a compile-time
|
|
|
|
* constant, and is a very small perf regression if n is not a compile-time constant. */
|
|
|
|
if (n % 16 == 0) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
2023-09-15 12:41:17 +02:00
|
|
|
#elif defined(MBEDTLS_ARCH_IS_X64) || defined(MBEDTLS_ARCH_IS_ARM64)
|
2023-05-19 12:48:10 +02:00
|
|
|
/* This codepath probably only makes sense on architectures with 64-bit registers */
|
|
|
|
for (; (i + 8) <= n; i += 8) {
|
|
|
|
uint64_t x = mbedtls_get_unaligned_uint64(a + i) ^ mbedtls_get_unaligned_uint64(b + i);
|
|
|
|
mbedtls_put_unaligned_uint64(r + i, x);
|
|
|
|
}
|
2024-01-23 10:36:34 +01:00
|
|
|
#if defined(__IAR_SYSTEMS_ICC__)
|
|
|
|
if (n % 8 == 0) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
2023-06-09 21:10:36 +02:00
|
|
|
#else
|
2022-12-30 22:32:03 +01:00
|
|
|
for (; (i + 4) <= n; i += 4) {
|
2023-01-11 14:50:10 +01:00
|
|
|
uint32_t x = mbedtls_get_unaligned_uint32(a + i) ^ mbedtls_get_unaligned_uint32(b + i);
|
|
|
|
mbedtls_put_unaligned_uint32(r + i, x);
|
2022-11-22 16:01:39 +01:00
|
|
|
}
|
2024-01-23 10:36:34 +01:00
|
|
|
#if defined(__IAR_SYSTEMS_ICC__)
|
|
|
|
if (n % 4 == 0) {
|
|
|
|
return;
|
|
|
|
}
|
2023-06-09 21:10:36 +02:00
|
|
|
#endif
|
2022-12-30 22:32:03 +01:00
|
|
|
#endif
|
2024-01-23 10:36:34 +01:00
|
|
|
#endif
|
|
|
|
for (; i < n; i++) {
|
|
|
|
r[i] = a[i] ^ b[i];
|
2022-11-22 16:01:39 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-01-19 17:06:41 +01:00
|
|
|
/* Always inline mbedtls_xor_no_simd() as we see significant perf regressions when it does not get
|
2024-01-19 15:08:04 +01:00
|
|
|
* inlined (e.g., observed about 3x perf difference in gcm_mult_largetable with gcc 7 - 12) */
|
|
|
|
#if defined(__IAR_SYSTEMS_ICC__)
|
|
|
|
#pragma inline = forced
|
|
|
|
#elif defined(__GNUC__)
|
|
|
|
__attribute__((always_inline))
|
|
|
|
#endif
|
2023-06-15 19:43:24 +02:00
|
|
|
/**
|
|
|
|
* Perform a fast block XOR operation, such that
|
|
|
|
* r[i] = a[i] ^ b[i] where 0 <= i < n
|
|
|
|
*
|
2024-01-19 17:06:41 +01:00
|
|
|
* In some situations, this can perform better than mbedtls_xor() (e.g., it's about 5%
|
2023-06-15 19:43:24 +02:00
|
|
|
* better in AES-CBC).
|
|
|
|
*
|
|
|
|
* \param r Pointer to result (buffer of at least \p n bytes). \p r
|
|
|
|
* may be equal to either \p a or \p b, but behaviour when
|
|
|
|
* it overlaps in other ways is undefined.
|
|
|
|
* \param a Pointer to input (buffer of at least \p n bytes)
|
|
|
|
* \param b Pointer to input (buffer of at least \p n bytes)
|
|
|
|
* \param n Number of bytes to process.
|
2024-01-19 15:08:17 +01:00
|
|
|
*
|
2024-01-19 17:06:41 +01:00
|
|
|
* \note Depending on the situation, it may be faster to use either mbedtls_xor() or
|
|
|
|
* mbedtls_xor_no_simd() (these are functionally equivalent).
|
2024-01-19 15:08:17 +01:00
|
|
|
* If the result is used immediately after the xor operation in non-SIMD code (e.g, in
|
|
|
|
* AES-CBC), there may be additional latency to transfer the data from SIMD to scalar
|
2024-01-19 17:06:41 +01:00
|
|
|
* registers, and in this case, mbedtls_xor_no_simd() may be faster. In other cases where
|
|
|
|
* the result is not used immediately (e.g., in AES-CTR), mbedtls_xor() may be faster.
|
2024-01-19 15:08:17 +01:00
|
|
|
* For targets without SIMD support, they will behave the same.
|
2023-06-15 19:43:24 +02:00
|
|
|
*/
|
2023-06-15 21:27:53 +02:00
|
|
|
static inline void mbedtls_xor_no_simd(unsigned char *r,
|
|
|
|
const unsigned char *a,
|
|
|
|
const unsigned char *b,
|
|
|
|
size_t n)
|
2023-06-15 19:43:24 +02:00
|
|
|
{
|
|
|
|
size_t i = 0;
|
|
|
|
#if defined(MBEDTLS_EFFICIENT_UNALIGNED_ACCESS)
|
2023-09-15 12:41:17 +02:00
|
|
|
#if defined(MBEDTLS_ARCH_IS_X64) || defined(MBEDTLS_ARCH_IS_ARM64)
|
2023-06-15 19:43:24 +02:00
|
|
|
/* This codepath probably only makes sense on architectures with 64-bit registers */
|
|
|
|
for (; (i + 8) <= n; i += 8) {
|
|
|
|
uint64_t x = mbedtls_get_unaligned_uint64(a + i) ^ mbedtls_get_unaligned_uint64(b + i);
|
|
|
|
mbedtls_put_unaligned_uint64(r + i, x);
|
|
|
|
}
|
2024-01-23 10:36:34 +01:00
|
|
|
#if defined(__IAR_SYSTEMS_ICC__)
|
2024-01-19 17:06:41 +01:00
|
|
|
/* This if statement helps some compilers (e.g., IAR) optimise out the byte-by-byte tail case
|
2024-01-23 11:03:22 +01:00
|
|
|
* where n is a constant multiple of 8.
|
2024-01-23 10:36:34 +01:00
|
|
|
* For other compilers (e.g. recent gcc and clang) it makes no difference if n is a compile-time
|
|
|
|
* constant, and is a very small perf regression if n is not a compile-time constant. */
|
|
|
|
if (n % 8 == 0) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
2023-06-09 21:10:36 +02:00
|
|
|
#else
|
2022-12-30 22:32:03 +01:00
|
|
|
for (; (i + 4) <= n; i += 4) {
|
2023-01-11 14:50:10 +01:00
|
|
|
uint32_t x = mbedtls_get_unaligned_uint32(a + i) ^ mbedtls_get_unaligned_uint32(b + i);
|
|
|
|
mbedtls_put_unaligned_uint32(r + i, x);
|
2022-11-22 16:01:39 +01:00
|
|
|
}
|
2024-01-23 10:36:34 +01:00
|
|
|
#if defined(__IAR_SYSTEMS_ICC__)
|
|
|
|
if (n % 4 == 0) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
2023-06-09 21:10:36 +02:00
|
|
|
#endif
|
2022-12-30 22:32:03 +01:00
|
|
|
#endif
|
2024-01-23 10:36:34 +01:00
|
|
|
for (; i < n; i++) {
|
|
|
|
r[i] = a[i] ^ b[i];
|
2022-11-22 16:01:39 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-09-24 06:45:36 +02:00
|
|
|
/* Fix MSVC C99 compatible issue
|
|
|
|
* MSVC support __func__ from visual studio 2015( 1900 )
|
|
|
|
* Use MSVC predefine macro to avoid name check fail.
|
|
|
|
*/
|
2023-01-11 14:50:10 +01:00
|
|
|
#if (defined(_MSC_VER) && (_MSC_VER <= 1900))
|
2021-09-28 10:13:44 +02:00
|
|
|
#define /*no-check-names*/ __func__ __FUNCTION__
|
2021-09-24 06:45:36 +02:00
|
|
|
#endif
|
|
|
|
|
2023-01-10 12:14:02 +01:00
|
|
|
/* Define `asm` for compilers which don't define it. */
|
|
|
|
/* *INDENT-OFF* */
|
|
|
|
#ifndef asm
|
2023-07-14 17:59:36 +02:00
|
|
|
#if defined(__IAR_SYSTEMS_ICC__)
|
|
|
|
#define asm __asm
|
|
|
|
#else
|
2023-01-10 12:14:02 +01:00
|
|
|
#define asm __asm__
|
|
|
|
#endif
|
2023-07-14 17:59:36 +02:00
|
|
|
#endif
|
2023-01-10 12:14:02 +01:00
|
|
|
/* *INDENT-ON* */
|
|
|
|
|
2023-06-21 17:14:46 +02:00
|
|
|
/*
|
2023-06-27 16:25:38 +02:00
|
|
|
* Define the constraint used for read-only pointer operands to aarch64 asm.
|
2023-06-21 17:14:46 +02:00
|
|
|
*
|
|
|
|
* This is normally the usual "r", but for aarch64_32 (aka ILP32,
|
|
|
|
* as found in watchos), "p" is required to avoid warnings from clang.
|
2023-06-21 22:16:23 +02:00
|
|
|
*
|
|
|
|
* Note that clang does not recognise '+p' or '=p', and armclang
|
2023-06-27 16:25:38 +02:00
|
|
|
* does not recognise 'p' at all. Therefore, to update a pointer from
|
|
|
|
* aarch64 assembly, it is necessary to use something like:
|
|
|
|
*
|
|
|
|
* uintptr_t uptr = (uintptr_t) ptr;
|
|
|
|
* asm( "ldr x4, [%x0], #8" ... : "+r" (uptr) : : )
|
|
|
|
* ptr = (void*) uptr;
|
|
|
|
*
|
|
|
|
* Note that the "x" in "%x0" is neccessary; writing "%0" will cause warnings.
|
2023-06-21 17:14:46 +02:00
|
|
|
*/
|
|
|
|
#if defined(__aarch64__) && defined(MBEDTLS_HAVE_ASM)
|
|
|
|
#if UINTPTR_MAX == 0xfffffffful
|
|
|
|
/* ILP32: Specify the pointer operand slightly differently, as per #7787. */
|
|
|
|
#define MBEDTLS_ASM_AARCH64_PTR_CONSTRAINT "p"
|
|
|
|
#elif UINTPTR_MAX == 0xfffffffffffffffful
|
|
|
|
/* Normal case (64-bit pointers): use "r" as the constraint for pointer operands to asm */
|
|
|
|
#define MBEDTLS_ASM_AARCH64_PTR_CONSTRAINT "r"
|
|
|
|
#else
|
2023-08-16 13:26:37 +02:00
|
|
|
#error "Unrecognised pointer size for aarch64"
|
2023-06-21 17:14:46 +02:00
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
2023-03-08 15:19:51 +01:00
|
|
|
/* Always provide a static assert macro, so it can be used unconditionally.
|
2023-03-14 13:03:47 +01:00
|
|
|
* It will expand to nothing on some systems.
|
2023-03-08 15:19:51 +01:00
|
|
|
* Can be used outside functions (but don't add a trailing ';' in that case:
|
|
|
|
* the semicolon is included here to avoid triggering -Wextra-semi when
|
|
|
|
* MBEDTLS_STATIC_ASSERT() expands to nothing).
|
|
|
|
* Can't use the C11-style `defined(static_assert)` on FreeBSD, since it
|
|
|
|
* defines static_assert even with -std=c99, but then complains about it.
|
|
|
|
*/
|
|
|
|
#if defined(static_assert) && !defined(__FreeBSD__)
|
|
|
|
#define MBEDTLS_STATIC_ASSERT(expr, msg) static_assert(expr, msg);
|
|
|
|
#else
|
|
|
|
#define MBEDTLS_STATIC_ASSERT(expr, msg)
|
|
|
|
#endif
|
|
|
|
|
2023-06-09 18:18:32 +02:00
|
|
|
#if defined(__has_builtin)
|
2023-11-01 00:30:09 +01:00
|
|
|
#define MBEDTLS_HAS_BUILTIN(x) __has_builtin(x)
|
|
|
|
#else
|
|
|
|
#define MBEDTLS_HAS_BUILTIN(x) 0
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Define compiler branch hints */
|
|
|
|
#if MBEDTLS_HAS_BUILTIN(__builtin_expect)
|
2023-07-19 16:42:19 +02:00
|
|
|
#define MBEDTLS_LIKELY(x) __builtin_expect(!!(x), 1)
|
|
|
|
#define MBEDTLS_UNLIKELY(x) __builtin_expect(!!(x), 0)
|
2023-11-01 00:30:09 +01:00
|
|
|
#else
|
2023-06-09 18:18:32 +02:00
|
|
|
#define MBEDTLS_LIKELY(x) x
|
|
|
|
#define MBEDTLS_UNLIKELY(x) x
|
|
|
|
#endif
|
|
|
|
|
2023-07-12 14:16:49 +02:00
|
|
|
/* MBEDTLS_ASSUME may be used to provide additional information to the compiler
|
|
|
|
* which can result in smaller code-size. */
|
2023-11-01 00:30:09 +01:00
|
|
|
#if MBEDTLS_HAS_BUILTIN(__builtin_assume)
|
2023-11-01 00:26:44 +01:00
|
|
|
/* clang provides __builtin_assume */
|
2023-07-12 14:16:49 +02:00
|
|
|
#define MBEDTLS_ASSUME(x) __builtin_assume(x)
|
2023-11-01 00:30:09 +01:00
|
|
|
#elif MBEDTLS_HAS_BUILTIN(__builtin_unreachable)
|
2023-11-02 11:36:38 +01:00
|
|
|
/* gcc and IAR can use __builtin_unreachable */
|
2023-07-12 14:16:49 +02:00
|
|
|
#define MBEDTLS_ASSUME(x) do { if (!(x)) __builtin_unreachable(); } while (0)
|
2023-11-01 00:30:09 +01:00
|
|
|
#elif defined(_MSC_VER)
|
2023-11-01 00:27:24 +01:00
|
|
|
/* Supported by MSVC since VS 2005 */
|
|
|
|
#define MBEDTLS_ASSUME(x) __assume(x)
|
|
|
|
#else
|
2023-11-01 00:27:04 +01:00
|
|
|
#define MBEDTLS_ASSUME(x) do { } while (0)
|
2023-06-15 19:42:25 +02:00
|
|
|
#endif
|
|
|
|
|
2023-06-16 10:41:21 +02:00
|
|
|
/* For gcc -Os, override with -O2 for a given function.
|
|
|
|
*
|
|
|
|
* This will not affect behaviour for other optimisation settings, e.g. -O0.
|
|
|
|
*/
|
2023-06-15 19:42:59 +02:00
|
|
|
#if defined(MBEDTLS_COMPILER_IS_GCC) && defined(__OPTIMIZE_SIZE__)
|
2023-06-16 10:41:21 +02:00
|
|
|
#define MBEDTLS_OPTIMIZE_FOR_PERFORMANCE __attribute__((optimize("-O2")))
|
2023-06-15 19:42:59 +02:00
|
|
|
#else
|
2023-06-16 10:41:21 +02:00
|
|
|
#define MBEDTLS_OPTIMIZE_FOR_PERFORMANCE
|
2023-06-15 19:42:59 +02:00
|
|
|
#endif
|
|
|
|
|
2023-10-04 14:50:54 +02:00
|
|
|
/* Suppress compiler warnings for unused functions and variables. */
|
2023-10-13 13:31:45 +02:00
|
|
|
#if !defined(MBEDTLS_MAYBE_UNUSED) && defined(__has_attribute)
|
|
|
|
# if __has_attribute(unused)
|
|
|
|
# define MBEDTLS_MAYBE_UNUSED __attribute__((unused))
|
|
|
|
# endif
|
2023-10-04 16:38:58 +02:00
|
|
|
#endif
|
2023-10-13 13:31:45 +02:00
|
|
|
#if !defined(MBEDTLS_MAYBE_UNUSED) && defined(__GNUC__)
|
|
|
|
# define MBEDTLS_MAYBE_UNUSED __attribute__((unused))
|
2023-10-04 16:27:33 +02:00
|
|
|
#endif
|
2023-10-13 13:31:45 +02:00
|
|
|
#if !defined(MBEDTLS_MAYBE_UNUSED) && defined(__IAR_SYSTEMS_ICC__) && defined(__VER__)
|
2023-10-24 15:18:38 +02:00
|
|
|
/* IAR does support __attribute__((unused)), but only if the -e flag (extended language support)
|
|
|
|
* is given; the pragma always works.
|
2023-10-25 16:07:35 +02:00
|
|
|
* Unfortunately the pragma affects the rest of the file where it is used, but this is harmless.
|
|
|
|
* Check for version 5.2 or later - this pragma may be supported by earlier versions, but I wasn't
|
|
|
|
* able to find documentation).
|
|
|
|
*/
|
|
|
|
# if (__VER__ >= 5020000)
|
2023-10-24 15:18:38 +02:00
|
|
|
# define MBEDTLS_MAYBE_UNUSED _Pragma("diag_suppress=Pe177")
|
2023-10-13 13:31:45 +02:00
|
|
|
# endif
|
2023-10-04 16:38:58 +02:00
|
|
|
#endif
|
|
|
|
#if !defined(MBEDTLS_MAYBE_UNUSED) && defined(_MSC_VER)
|
2023-10-13 13:31:45 +02:00
|
|
|
# define MBEDTLS_MAYBE_UNUSED __pragma(warning(suppress:4189))
|
2023-10-04 16:38:58 +02:00
|
|
|
#endif
|
|
|
|
#if !defined(MBEDTLS_MAYBE_UNUSED)
|
2023-10-13 13:31:45 +02:00
|
|
|
# define MBEDTLS_MAYBE_UNUSED
|
2023-10-04 14:50:54 +02:00
|
|
|
#endif
|
|
|
|
|
2019-09-11 13:39:11 +02:00
|
|
|
#endif /* MBEDTLS_LIBRARY_COMMON_H */
|