Path: blob/main/contrib/bearssl/src/int/i32_encode.c
39488 views
/*1* Copyright (c) 2016 Thomas Pornin <[email protected]>2*3* Permission is hereby granted, free of charge, to any person obtaining4* a copy of this software and associated documentation files (the5* "Software"), to deal in the Software without restriction, including6* without limitation the rights to use, copy, modify, merge, publish,7* distribute, sublicense, and/or sell copies of the Software, and to8* permit persons to whom the Software is furnished to do so, subject to9* the following conditions:10*11* The above copyright notice and this permission notice shall be12* included in all copies or substantial portions of the Software.13*14* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,15* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF16* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND17* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS18* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN19* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN20* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE21* SOFTWARE.22*/2324#include "inner.h"2526/* see inner.h */27void28br_i32_encode(void *dst, size_t len, const uint32_t *x)29{30unsigned char *buf;31size_t k;3233buf = dst;3435/*36* Compute the announced size of x in bytes; extra bytes are37* filled with zeros.38*/39k = (x[0] + 7) >> 3;40while (len > k) {41*buf ++ = 0;42len --;43}4445/*46* Now we use k as index within x[]. That index starts at 1;47* we initialize it to the topmost complete word, and process48* any remaining incomplete word.49*/50k = (len + 3) >> 2;51switch (len & 3) {52case 3:53*buf ++ = x[k] >> 16;54/* fall through */55case 2:56*buf ++ = x[k] >> 8;57/* fall through */58case 1:59*buf ++ = x[k];60k --;61}6263/*64* Encode all complete words.65*/66while (k > 0) {67br_enc32be(buf, x[k]);68k --;69buf += 4;70}71}727374