1*62c56f98SSadaf Ebrahimi /*
2*62c56f98SSadaf Ebrahimi * Simple DTLS client demonstration program
3*62c56f98SSadaf Ebrahimi *
4*62c56f98SSadaf Ebrahimi * Copyright The Mbed TLS Contributors
5*62c56f98SSadaf Ebrahimi * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
6*62c56f98SSadaf Ebrahimi */
7*62c56f98SSadaf Ebrahimi
8*62c56f98SSadaf Ebrahimi #include "mbedtls/build_info.h"
9*62c56f98SSadaf Ebrahimi
10*62c56f98SSadaf Ebrahimi #include "mbedtls/platform.h"
11*62c56f98SSadaf Ebrahimi
12*62c56f98SSadaf Ebrahimi #if !defined(MBEDTLS_SSL_CLI_C) || !defined(MBEDTLS_SSL_PROTO_DTLS) || \
13*62c56f98SSadaf Ebrahimi !defined(MBEDTLS_NET_C) || !defined(MBEDTLS_TIMING_C) || \
14*62c56f98SSadaf Ebrahimi !defined(MBEDTLS_ENTROPY_C) || !defined(MBEDTLS_CTR_DRBG_C) || \
15*62c56f98SSadaf Ebrahimi !defined(MBEDTLS_X509_CRT_PARSE_C) || !defined(MBEDTLS_RSA_C) || \
16*62c56f98SSadaf Ebrahimi !defined(MBEDTLS_PEM_PARSE_C)
main(void)17*62c56f98SSadaf Ebrahimi int main(void)
18*62c56f98SSadaf Ebrahimi {
19*62c56f98SSadaf Ebrahimi mbedtls_printf("MBEDTLS_SSL_CLI_C and/or MBEDTLS_SSL_PROTO_DTLS and/or "
20*62c56f98SSadaf Ebrahimi "MBEDTLS_NET_C and/or MBEDTLS_TIMING_C and/or "
21*62c56f98SSadaf Ebrahimi "MBEDTLS_ENTROPY_C and/or MBEDTLS_CTR_DRBG_C and/or "
22*62c56f98SSadaf Ebrahimi "MBEDTLS_X509_CRT_PARSE_C and/or MBEDTLS_RSA_C and/or "
23*62c56f98SSadaf Ebrahimi "MBEDTLS_PEM_PARSE_C not defined.\n");
24*62c56f98SSadaf Ebrahimi mbedtls_exit(0);
25*62c56f98SSadaf Ebrahimi }
26*62c56f98SSadaf Ebrahimi #else
27*62c56f98SSadaf Ebrahimi
28*62c56f98SSadaf Ebrahimi #include <string.h>
29*62c56f98SSadaf Ebrahimi
30*62c56f98SSadaf Ebrahimi #include "mbedtls/net_sockets.h"
31*62c56f98SSadaf Ebrahimi #include "mbedtls/debug.h"
32*62c56f98SSadaf Ebrahimi #include "mbedtls/ssl.h"
33*62c56f98SSadaf Ebrahimi #include "mbedtls/entropy.h"
34*62c56f98SSadaf Ebrahimi #include "mbedtls/ctr_drbg.h"
35*62c56f98SSadaf Ebrahimi #include "mbedtls/error.h"
36*62c56f98SSadaf Ebrahimi #include "mbedtls/timing.h"
37*62c56f98SSadaf Ebrahimi #include "test/certs.h"
38*62c56f98SSadaf Ebrahimi
39*62c56f98SSadaf Ebrahimi /* Uncomment out the following line to default to IPv4 and disable IPv6 */
40*62c56f98SSadaf Ebrahimi //#define FORCE_IPV4
41*62c56f98SSadaf Ebrahimi
42*62c56f98SSadaf Ebrahimi #define SERVER_PORT "4433"
43*62c56f98SSadaf Ebrahimi #define SERVER_NAME "localhost"
44*62c56f98SSadaf Ebrahimi
45*62c56f98SSadaf Ebrahimi #ifdef FORCE_IPV4
46*62c56f98SSadaf Ebrahimi #define SERVER_ADDR "127.0.0.1" /* Forces IPv4 */
47*62c56f98SSadaf Ebrahimi #else
48*62c56f98SSadaf Ebrahimi #define SERVER_ADDR "::1"
49*62c56f98SSadaf Ebrahimi #endif
50*62c56f98SSadaf Ebrahimi
51*62c56f98SSadaf Ebrahimi #define MESSAGE "Echo this"
52*62c56f98SSadaf Ebrahimi
53*62c56f98SSadaf Ebrahimi #define READ_TIMEOUT_MS 1000
54*62c56f98SSadaf Ebrahimi #define MAX_RETRY 5
55*62c56f98SSadaf Ebrahimi
56*62c56f98SSadaf Ebrahimi #define DEBUG_LEVEL 0
57*62c56f98SSadaf Ebrahimi
58*62c56f98SSadaf Ebrahimi
my_debug(void * ctx,int level,const char * file,int line,const char * str)59*62c56f98SSadaf Ebrahimi static void my_debug(void *ctx, int level,
60*62c56f98SSadaf Ebrahimi const char *file, int line,
61*62c56f98SSadaf Ebrahimi const char *str)
62*62c56f98SSadaf Ebrahimi {
63*62c56f98SSadaf Ebrahimi ((void) level);
64*62c56f98SSadaf Ebrahimi
65*62c56f98SSadaf Ebrahimi mbedtls_fprintf((FILE *) ctx, "%s:%04d: %s", file, line, str);
66*62c56f98SSadaf Ebrahimi fflush((FILE *) ctx);
67*62c56f98SSadaf Ebrahimi }
68*62c56f98SSadaf Ebrahimi
main(int argc,char * argv[])69*62c56f98SSadaf Ebrahimi int main(int argc, char *argv[])
70*62c56f98SSadaf Ebrahimi {
71*62c56f98SSadaf Ebrahimi int ret, len;
72*62c56f98SSadaf Ebrahimi mbedtls_net_context server_fd;
73*62c56f98SSadaf Ebrahimi uint32_t flags;
74*62c56f98SSadaf Ebrahimi unsigned char buf[1024];
75*62c56f98SSadaf Ebrahimi const char *pers = "dtls_client";
76*62c56f98SSadaf Ebrahimi int retry_left = MAX_RETRY;
77*62c56f98SSadaf Ebrahimi
78*62c56f98SSadaf Ebrahimi mbedtls_entropy_context entropy;
79*62c56f98SSadaf Ebrahimi mbedtls_ctr_drbg_context ctr_drbg;
80*62c56f98SSadaf Ebrahimi mbedtls_ssl_context ssl;
81*62c56f98SSadaf Ebrahimi mbedtls_ssl_config conf;
82*62c56f98SSadaf Ebrahimi mbedtls_x509_crt cacert;
83*62c56f98SSadaf Ebrahimi mbedtls_timing_delay_context timer;
84*62c56f98SSadaf Ebrahimi
85*62c56f98SSadaf Ebrahimi ((void) argc);
86*62c56f98SSadaf Ebrahimi ((void) argv);
87*62c56f98SSadaf Ebrahimi
88*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_DEBUG_C)
89*62c56f98SSadaf Ebrahimi mbedtls_debug_set_threshold(DEBUG_LEVEL);
90*62c56f98SSadaf Ebrahimi #endif
91*62c56f98SSadaf Ebrahimi
92*62c56f98SSadaf Ebrahimi /*
93*62c56f98SSadaf Ebrahimi * 0. Initialize the RNG and the session data
94*62c56f98SSadaf Ebrahimi */
95*62c56f98SSadaf Ebrahimi mbedtls_net_init(&server_fd);
96*62c56f98SSadaf Ebrahimi mbedtls_ssl_init(&ssl);
97*62c56f98SSadaf Ebrahimi mbedtls_ssl_config_init(&conf);
98*62c56f98SSadaf Ebrahimi mbedtls_x509_crt_init(&cacert);
99*62c56f98SSadaf Ebrahimi mbedtls_ctr_drbg_init(&ctr_drbg);
100*62c56f98SSadaf Ebrahimi mbedtls_entropy_init(&entropy);
101*62c56f98SSadaf Ebrahimi
102*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_USE_PSA_CRYPTO)
103*62c56f98SSadaf Ebrahimi psa_status_t status = psa_crypto_init();
104*62c56f98SSadaf Ebrahimi if (status != PSA_SUCCESS) {
105*62c56f98SSadaf Ebrahimi mbedtls_fprintf(stderr, "Failed to initialize PSA Crypto implementation: %d\n",
106*62c56f98SSadaf Ebrahimi (int) status);
107*62c56f98SSadaf Ebrahimi ret = MBEDTLS_ERR_SSL_HW_ACCEL_FAILED;
108*62c56f98SSadaf Ebrahimi goto exit;
109*62c56f98SSadaf Ebrahimi }
110*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_USE_PSA_CRYPTO */
111*62c56f98SSadaf Ebrahimi
112*62c56f98SSadaf Ebrahimi mbedtls_printf("\n . Seeding the random number generator...");
113*62c56f98SSadaf Ebrahimi fflush(stdout);
114*62c56f98SSadaf Ebrahimi
115*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_ctr_drbg_seed(&ctr_drbg, mbedtls_entropy_func, &entropy,
116*62c56f98SSadaf Ebrahimi (const unsigned char *) pers,
117*62c56f98SSadaf Ebrahimi strlen(pers))) != 0) {
118*62c56f98SSadaf Ebrahimi mbedtls_printf(" failed\n ! mbedtls_ctr_drbg_seed returned %d\n", ret);
119*62c56f98SSadaf Ebrahimi goto exit;
120*62c56f98SSadaf Ebrahimi }
121*62c56f98SSadaf Ebrahimi
122*62c56f98SSadaf Ebrahimi mbedtls_printf(" ok\n");
123*62c56f98SSadaf Ebrahimi
124*62c56f98SSadaf Ebrahimi /*
125*62c56f98SSadaf Ebrahimi * 0. Load certificates
126*62c56f98SSadaf Ebrahimi */
127*62c56f98SSadaf Ebrahimi mbedtls_printf(" . Loading the CA root certificate ...");
128*62c56f98SSadaf Ebrahimi fflush(stdout);
129*62c56f98SSadaf Ebrahimi
130*62c56f98SSadaf Ebrahimi ret = mbedtls_x509_crt_parse(&cacert, (const unsigned char *) mbedtls_test_cas_pem,
131*62c56f98SSadaf Ebrahimi mbedtls_test_cas_pem_len);
132*62c56f98SSadaf Ebrahimi if (ret < 0) {
133*62c56f98SSadaf Ebrahimi mbedtls_printf(" failed\n ! mbedtls_x509_crt_parse returned -0x%x\n\n",
134*62c56f98SSadaf Ebrahimi (unsigned int) -ret);
135*62c56f98SSadaf Ebrahimi goto exit;
136*62c56f98SSadaf Ebrahimi }
137*62c56f98SSadaf Ebrahimi
138*62c56f98SSadaf Ebrahimi mbedtls_printf(" ok (%d skipped)\n", ret);
139*62c56f98SSadaf Ebrahimi
140*62c56f98SSadaf Ebrahimi /*
141*62c56f98SSadaf Ebrahimi * 1. Start the connection
142*62c56f98SSadaf Ebrahimi */
143*62c56f98SSadaf Ebrahimi mbedtls_printf(" . Connecting to udp/%s/%s...", SERVER_NAME, SERVER_PORT);
144*62c56f98SSadaf Ebrahimi fflush(stdout);
145*62c56f98SSadaf Ebrahimi
146*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_net_connect(&server_fd, SERVER_ADDR,
147*62c56f98SSadaf Ebrahimi SERVER_PORT, MBEDTLS_NET_PROTO_UDP)) != 0) {
148*62c56f98SSadaf Ebrahimi mbedtls_printf(" failed\n ! mbedtls_net_connect returned %d\n\n", ret);
149*62c56f98SSadaf Ebrahimi goto exit;
150*62c56f98SSadaf Ebrahimi }
151*62c56f98SSadaf Ebrahimi
152*62c56f98SSadaf Ebrahimi mbedtls_printf(" ok\n");
153*62c56f98SSadaf Ebrahimi
154*62c56f98SSadaf Ebrahimi /*
155*62c56f98SSadaf Ebrahimi * 2. Setup stuff
156*62c56f98SSadaf Ebrahimi */
157*62c56f98SSadaf Ebrahimi mbedtls_printf(" . Setting up the DTLS structure...");
158*62c56f98SSadaf Ebrahimi fflush(stdout);
159*62c56f98SSadaf Ebrahimi
160*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_ssl_config_defaults(&conf,
161*62c56f98SSadaf Ebrahimi MBEDTLS_SSL_IS_CLIENT,
162*62c56f98SSadaf Ebrahimi MBEDTLS_SSL_TRANSPORT_DATAGRAM,
163*62c56f98SSadaf Ebrahimi MBEDTLS_SSL_PRESET_DEFAULT)) != 0) {
164*62c56f98SSadaf Ebrahimi mbedtls_printf(" failed\n ! mbedtls_ssl_config_defaults returned %d\n\n", ret);
165*62c56f98SSadaf Ebrahimi goto exit;
166*62c56f98SSadaf Ebrahimi }
167*62c56f98SSadaf Ebrahimi
168*62c56f98SSadaf Ebrahimi /* OPTIONAL is usually a bad choice for security, but makes interop easier
169*62c56f98SSadaf Ebrahimi * in this simplified example, in which the ca chain is hardcoded.
170*62c56f98SSadaf Ebrahimi * Production code should set a proper ca chain and use REQUIRED. */
171*62c56f98SSadaf Ebrahimi mbedtls_ssl_conf_authmode(&conf, MBEDTLS_SSL_VERIFY_OPTIONAL);
172*62c56f98SSadaf Ebrahimi mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL);
173*62c56f98SSadaf Ebrahimi mbedtls_ssl_conf_rng(&conf, mbedtls_ctr_drbg_random, &ctr_drbg);
174*62c56f98SSadaf Ebrahimi mbedtls_ssl_conf_dbg(&conf, my_debug, stdout);
175*62c56f98SSadaf Ebrahimi mbedtls_ssl_conf_read_timeout(&conf, READ_TIMEOUT_MS);
176*62c56f98SSadaf Ebrahimi
177*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_ssl_setup(&ssl, &conf)) != 0) {
178*62c56f98SSadaf Ebrahimi mbedtls_printf(" failed\n ! mbedtls_ssl_setup returned %d\n\n", ret);
179*62c56f98SSadaf Ebrahimi goto exit;
180*62c56f98SSadaf Ebrahimi }
181*62c56f98SSadaf Ebrahimi
182*62c56f98SSadaf Ebrahimi if ((ret = mbedtls_ssl_set_hostname(&ssl, SERVER_NAME)) != 0) {
183*62c56f98SSadaf Ebrahimi mbedtls_printf(" failed\n ! mbedtls_ssl_set_hostname returned %d\n\n", ret);
184*62c56f98SSadaf Ebrahimi goto exit;
185*62c56f98SSadaf Ebrahimi }
186*62c56f98SSadaf Ebrahimi
187*62c56f98SSadaf Ebrahimi mbedtls_ssl_set_bio(&ssl, &server_fd,
188*62c56f98SSadaf Ebrahimi mbedtls_net_send, mbedtls_net_recv, mbedtls_net_recv_timeout);
189*62c56f98SSadaf Ebrahimi
190*62c56f98SSadaf Ebrahimi mbedtls_ssl_set_timer_cb(&ssl, &timer, mbedtls_timing_set_delay,
191*62c56f98SSadaf Ebrahimi mbedtls_timing_get_delay);
192*62c56f98SSadaf Ebrahimi
193*62c56f98SSadaf Ebrahimi mbedtls_printf(" ok\n");
194*62c56f98SSadaf Ebrahimi
195*62c56f98SSadaf Ebrahimi /*
196*62c56f98SSadaf Ebrahimi * 4. Handshake
197*62c56f98SSadaf Ebrahimi */
198*62c56f98SSadaf Ebrahimi mbedtls_printf(" . Performing the DTLS handshake...");
199*62c56f98SSadaf Ebrahimi fflush(stdout);
200*62c56f98SSadaf Ebrahimi
201*62c56f98SSadaf Ebrahimi do {
202*62c56f98SSadaf Ebrahimi ret = mbedtls_ssl_handshake(&ssl);
203*62c56f98SSadaf Ebrahimi } while (ret == MBEDTLS_ERR_SSL_WANT_READ ||
204*62c56f98SSadaf Ebrahimi ret == MBEDTLS_ERR_SSL_WANT_WRITE);
205*62c56f98SSadaf Ebrahimi
206*62c56f98SSadaf Ebrahimi if (ret != 0) {
207*62c56f98SSadaf Ebrahimi mbedtls_printf(" failed\n ! mbedtls_ssl_handshake returned -0x%x\n\n",
208*62c56f98SSadaf Ebrahimi (unsigned int) -ret);
209*62c56f98SSadaf Ebrahimi goto exit;
210*62c56f98SSadaf Ebrahimi }
211*62c56f98SSadaf Ebrahimi
212*62c56f98SSadaf Ebrahimi mbedtls_printf(" ok\n");
213*62c56f98SSadaf Ebrahimi
214*62c56f98SSadaf Ebrahimi /*
215*62c56f98SSadaf Ebrahimi * 5. Verify the server certificate
216*62c56f98SSadaf Ebrahimi */
217*62c56f98SSadaf Ebrahimi mbedtls_printf(" . Verifying peer X.509 certificate...");
218*62c56f98SSadaf Ebrahimi
219*62c56f98SSadaf Ebrahimi /* In real life, we would have used MBEDTLS_SSL_VERIFY_REQUIRED so that the
220*62c56f98SSadaf Ebrahimi * handshake would not succeed if the peer's cert is bad. Even if we used
221*62c56f98SSadaf Ebrahimi * MBEDTLS_SSL_VERIFY_OPTIONAL, we would bail out here if ret != 0 */
222*62c56f98SSadaf Ebrahimi if ((flags = mbedtls_ssl_get_verify_result(&ssl)) != 0) {
223*62c56f98SSadaf Ebrahimi #if !defined(MBEDTLS_X509_REMOVE_INFO)
224*62c56f98SSadaf Ebrahimi char vrfy_buf[512];
225*62c56f98SSadaf Ebrahimi #endif
226*62c56f98SSadaf Ebrahimi
227*62c56f98SSadaf Ebrahimi mbedtls_printf(" failed\n");
228*62c56f98SSadaf Ebrahimi
229*62c56f98SSadaf Ebrahimi #if !defined(MBEDTLS_X509_REMOVE_INFO)
230*62c56f98SSadaf Ebrahimi mbedtls_x509_crt_verify_info(vrfy_buf, sizeof(vrfy_buf), " ! ", flags);
231*62c56f98SSadaf Ebrahimi
232*62c56f98SSadaf Ebrahimi mbedtls_printf("%s\n", vrfy_buf);
233*62c56f98SSadaf Ebrahimi #endif
234*62c56f98SSadaf Ebrahimi } else {
235*62c56f98SSadaf Ebrahimi mbedtls_printf(" ok\n");
236*62c56f98SSadaf Ebrahimi }
237*62c56f98SSadaf Ebrahimi
238*62c56f98SSadaf Ebrahimi /*
239*62c56f98SSadaf Ebrahimi * 6. Write the echo request
240*62c56f98SSadaf Ebrahimi */
241*62c56f98SSadaf Ebrahimi send_request:
242*62c56f98SSadaf Ebrahimi mbedtls_printf(" > Write to server:");
243*62c56f98SSadaf Ebrahimi fflush(stdout);
244*62c56f98SSadaf Ebrahimi
245*62c56f98SSadaf Ebrahimi len = sizeof(MESSAGE) - 1;
246*62c56f98SSadaf Ebrahimi
247*62c56f98SSadaf Ebrahimi do {
248*62c56f98SSadaf Ebrahimi ret = mbedtls_ssl_write(&ssl, (unsigned char *) MESSAGE, len);
249*62c56f98SSadaf Ebrahimi } while (ret == MBEDTLS_ERR_SSL_WANT_READ ||
250*62c56f98SSadaf Ebrahimi ret == MBEDTLS_ERR_SSL_WANT_WRITE);
251*62c56f98SSadaf Ebrahimi
252*62c56f98SSadaf Ebrahimi if (ret < 0) {
253*62c56f98SSadaf Ebrahimi mbedtls_printf(" failed\n ! mbedtls_ssl_write returned %d\n\n", ret);
254*62c56f98SSadaf Ebrahimi goto exit;
255*62c56f98SSadaf Ebrahimi }
256*62c56f98SSadaf Ebrahimi
257*62c56f98SSadaf Ebrahimi len = ret;
258*62c56f98SSadaf Ebrahimi mbedtls_printf(" %d bytes written\n\n%s\n\n", len, MESSAGE);
259*62c56f98SSadaf Ebrahimi
260*62c56f98SSadaf Ebrahimi /*
261*62c56f98SSadaf Ebrahimi * 7. Read the echo response
262*62c56f98SSadaf Ebrahimi */
263*62c56f98SSadaf Ebrahimi mbedtls_printf(" < Read from server:");
264*62c56f98SSadaf Ebrahimi fflush(stdout);
265*62c56f98SSadaf Ebrahimi
266*62c56f98SSadaf Ebrahimi len = sizeof(buf) - 1;
267*62c56f98SSadaf Ebrahimi memset(buf, 0, sizeof(buf));
268*62c56f98SSadaf Ebrahimi
269*62c56f98SSadaf Ebrahimi do {
270*62c56f98SSadaf Ebrahimi ret = mbedtls_ssl_read(&ssl, buf, len);
271*62c56f98SSadaf Ebrahimi } while (ret == MBEDTLS_ERR_SSL_WANT_READ ||
272*62c56f98SSadaf Ebrahimi ret == MBEDTLS_ERR_SSL_WANT_WRITE);
273*62c56f98SSadaf Ebrahimi
274*62c56f98SSadaf Ebrahimi if (ret <= 0) {
275*62c56f98SSadaf Ebrahimi switch (ret) {
276*62c56f98SSadaf Ebrahimi case MBEDTLS_ERR_SSL_TIMEOUT:
277*62c56f98SSadaf Ebrahimi mbedtls_printf(" timeout\n\n");
278*62c56f98SSadaf Ebrahimi if (retry_left-- > 0) {
279*62c56f98SSadaf Ebrahimi goto send_request;
280*62c56f98SSadaf Ebrahimi }
281*62c56f98SSadaf Ebrahimi goto exit;
282*62c56f98SSadaf Ebrahimi
283*62c56f98SSadaf Ebrahimi case MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY:
284*62c56f98SSadaf Ebrahimi mbedtls_printf(" connection was closed gracefully\n");
285*62c56f98SSadaf Ebrahimi goto close_notify;
286*62c56f98SSadaf Ebrahimi
287*62c56f98SSadaf Ebrahimi default:
288*62c56f98SSadaf Ebrahimi mbedtls_printf(" mbedtls_ssl_read returned -0x%x\n\n", (unsigned int) -ret);
289*62c56f98SSadaf Ebrahimi goto exit;
290*62c56f98SSadaf Ebrahimi }
291*62c56f98SSadaf Ebrahimi }
292*62c56f98SSadaf Ebrahimi
293*62c56f98SSadaf Ebrahimi len = ret;
294*62c56f98SSadaf Ebrahimi mbedtls_printf(" %d bytes read\n\n%s\n\n", len, buf);
295*62c56f98SSadaf Ebrahimi
296*62c56f98SSadaf Ebrahimi /*
297*62c56f98SSadaf Ebrahimi * 8. Done, cleanly close the connection
298*62c56f98SSadaf Ebrahimi */
299*62c56f98SSadaf Ebrahimi close_notify:
300*62c56f98SSadaf Ebrahimi mbedtls_printf(" . Closing the connection...");
301*62c56f98SSadaf Ebrahimi
302*62c56f98SSadaf Ebrahimi /* No error checking, the connection might be closed already */
303*62c56f98SSadaf Ebrahimi do {
304*62c56f98SSadaf Ebrahimi ret = mbedtls_ssl_close_notify(&ssl);
305*62c56f98SSadaf Ebrahimi } while (ret == MBEDTLS_ERR_SSL_WANT_WRITE);
306*62c56f98SSadaf Ebrahimi ret = 0;
307*62c56f98SSadaf Ebrahimi
308*62c56f98SSadaf Ebrahimi mbedtls_printf(" done\n");
309*62c56f98SSadaf Ebrahimi
310*62c56f98SSadaf Ebrahimi /*
311*62c56f98SSadaf Ebrahimi * 9. Final clean-ups and exit
312*62c56f98SSadaf Ebrahimi */
313*62c56f98SSadaf Ebrahimi exit:
314*62c56f98SSadaf Ebrahimi
315*62c56f98SSadaf Ebrahimi #ifdef MBEDTLS_ERROR_C
316*62c56f98SSadaf Ebrahimi if (ret != 0) {
317*62c56f98SSadaf Ebrahimi char error_buf[100];
318*62c56f98SSadaf Ebrahimi mbedtls_strerror(ret, error_buf, 100);
319*62c56f98SSadaf Ebrahimi mbedtls_printf("Last error was: %d - %s\n\n", ret, error_buf);
320*62c56f98SSadaf Ebrahimi }
321*62c56f98SSadaf Ebrahimi #endif
322*62c56f98SSadaf Ebrahimi
323*62c56f98SSadaf Ebrahimi mbedtls_net_free(&server_fd);
324*62c56f98SSadaf Ebrahimi mbedtls_x509_crt_free(&cacert);
325*62c56f98SSadaf Ebrahimi mbedtls_ssl_free(&ssl);
326*62c56f98SSadaf Ebrahimi mbedtls_ssl_config_free(&conf);
327*62c56f98SSadaf Ebrahimi mbedtls_ctr_drbg_free(&ctr_drbg);
328*62c56f98SSadaf Ebrahimi mbedtls_entropy_free(&entropy);
329*62c56f98SSadaf Ebrahimi #if defined(MBEDTLS_USE_PSA_CRYPTO)
330*62c56f98SSadaf Ebrahimi mbedtls_psa_crypto_free();
331*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_USE_PSA_CRYPTO */
332*62c56f98SSadaf Ebrahimi
333*62c56f98SSadaf Ebrahimi /* Shell can not handle large exit numbers -> 1 for errors */
334*62c56f98SSadaf Ebrahimi if (ret < 0) {
335*62c56f98SSadaf Ebrahimi ret = 1;
336*62c56f98SSadaf Ebrahimi }
337*62c56f98SSadaf Ebrahimi
338*62c56f98SSadaf Ebrahimi mbedtls_exit(ret);
339*62c56f98SSadaf Ebrahimi }
340*62c56f98SSadaf Ebrahimi #endif /* MBEDTLS_SSL_CLI_C && MBEDTLS_SSL_PROTO_DTLS && MBEDTLS_NET_C &&
341*62c56f98SSadaf Ebrahimi MBEDTLS_TIMING_C && MBEDTLS_ENTROPY_C && MBEDTLS_CTR_DRBG_C &&
342*62c56f98SSadaf Ebrahimi MBEDTLS_X509_CRT_PARSE_C && MBEDTLS_RSA_C && MBEDTLS_PEM_PARSE_C */
343