2014-11-24 14:05:25 +01:00
|
|
|
/*
|
|
|
|
* Minimal SSL client, used for memory measurements.
|
2014-12-01 11:18:00 +01:00
|
|
|
* (meant to be used with config-suite-b.h or config-ccm-psk-tls1_2.h)
|
2014-11-24 14:05:25 +01:00
|
|
|
*
|
2020-08-07 13:07:28 +02:00
|
|
|
* Copyright The Mbed TLS Contributors
|
2015-09-04 14:21:07 +02:00
|
|
|
* SPDX-License-Identifier: Apache-2.0
|
2014-11-24 14:05:25 +01:00
|
|
|
*
|
2015-09-04 14:21:07 +02:00
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
|
|
* not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
2014-11-24 14:05:25 +01:00
|
|
|
*
|
2015-09-04 14:21:07 +02:00
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
2014-11-24 14:05:25 +01:00
|
|
|
*
|
2015-09-04 14:21:07 +02:00
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
2014-11-24 14:05:25 +01:00
|
|
|
*/
|
|
|
|
|
2021-05-27 11:25:03 +02:00
|
|
|
#include "mbedtls/build_info.h"
|
2014-11-24 14:05:25 +01:00
|
|
|
|
2018-12-10 14:31:45 +01:00
|
|
|
#include "mbedtls/platform.h"
|
|
|
|
|
2014-11-24 14:05:25 +01:00
|
|
|
/*
|
|
|
|
* We're creating and connecting the socket "manually" rather than using the
|
|
|
|
* NET module, in order to avoid the overhead of getaddrinfo() which tends to
|
|
|
|
* dominate memory usage in small configurations. For the sake of simplicity,
|
|
|
|
* only a Unix version is implemented.
|
2015-06-30 15:40:39 +02:00
|
|
|
*
|
2021-12-21 06:14:10 +01:00
|
|
|
* Warning: we are breaking some of the abstractions from the NET layer here.
|
2015-06-30 15:40:39 +02:00
|
|
|
* This is not a good example for general use. This programs has the specific
|
|
|
|
* goal of minimizing use of the libc functions on full-blown OSes.
|
2014-11-24 14:05:25 +01:00
|
|
|
*/
|
2016-02-22 10:47:43 +01:00
|
|
|
#if defined(unix) || defined(__unix__) || defined(__unix) || defined(__APPLE__)
|
2014-11-24 14:05:25 +01:00
|
|
|
#define UNIX
|
|
|
|
#endif
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if !defined(MBEDTLS_CTR_DRBG_C) || !defined(MBEDTLS_ENTROPY_C) || \
|
|
|
|
!defined(MBEDTLS_NET_C) || !defined(MBEDTLS_SSL_CLI_C) || \
|
2014-11-24 14:05:25 +01:00
|
|
|
!defined(UNIX)
|
2016-04-26 08:43:27 +02:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
int main(void)
|
2014-11-24 14:05:25 +01:00
|
|
|
{
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_printf("MBEDTLS_CTR_DRBG_C and/or MBEDTLS_ENTROPY_C and/or "
|
|
|
|
"MBEDTLS_NET_C and/or MBEDTLS_SSL_CLI_C and/or UNIX "
|
|
|
|
"not defined.\n");
|
|
|
|
mbedtls_exit(0);
|
2014-11-24 14:05:25 +01:00
|
|
|
}
|
|
|
|
#else
|
|
|
|
|
|
|
|
#include <string.h>
|
|
|
|
|
2016-09-14 15:32:09 +02:00
|
|
|
#include "mbedtls/net_sockets.h"
|
2015-03-09 18:05:11 +01:00
|
|
|
#include "mbedtls/ssl.h"
|
|
|
|
#include "mbedtls/entropy.h"
|
|
|
|
#include "mbedtls/ctr_drbg.h"
|
2014-11-24 14:05:25 +01:00
|
|
|
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Hardcoded values for server host and port
|
|
|
|
*/
|
|
|
|
#define PORT_BE 0x1151 /* 4433 */
|
|
|
|
#define PORT_LE 0x5111
|
|
|
|
#define ADDR_BE 0x7f000001 /* 127.0.0.1 */
|
|
|
|
#define ADDR_LE 0x0100007f
|
2014-12-01 11:18:00 +01:00
|
|
|
#define HOSTNAME "localhost" /* for cert verification if enabled */
|
2014-11-24 14:05:25 +01:00
|
|
|
|
|
|
|
#define GET_REQUEST "GET / HTTP/1.0\r\n\r\n"
|
|
|
|
|
2014-12-01 11:18:00 +01:00
|
|
|
const char *pers = "mini_client";
|
|
|
|
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
|
2014-11-24 14:05:25 +01:00
|
|
|
const unsigned char psk[] = {
|
|
|
|
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
|
|
|
|
0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f
|
|
|
|
};
|
|
|
|
const char psk_id[] = "Client_identity";
|
2014-12-01 11:18:00 +01:00
|
|
|
#endif
|
2014-11-24 14:05:25 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_X509_CRT_PARSE_C)
|
2014-12-01 11:18:00 +01:00
|
|
|
/* This is tests/data_files/test-ca2.crt, a CA using EC secp384r1 */
|
|
|
|
const unsigned char ca_cert[] = {
|
|
|
|
0x30, 0x82, 0x02, 0x52, 0x30, 0x82, 0x01, 0xd7, 0xa0, 0x03, 0x02, 0x01,
|
|
|
|
0x02, 0x02, 0x09, 0x00, 0xc1, 0x43, 0xe2, 0x7e, 0x62, 0x43, 0xcc, 0xe8,
|
|
|
|
0x30, 0x0a, 0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x04, 0x03, 0x02,
|
|
|
|
0x30, 0x3e, 0x31, 0x0b, 0x30, 0x09, 0x06, 0x03, 0x55, 0x04, 0x06, 0x13,
|
|
|
|
0x02, 0x4e, 0x4c, 0x31, 0x11, 0x30, 0x0f, 0x06, 0x03, 0x55, 0x04, 0x0a,
|
|
|
|
0x13, 0x08, 0x50, 0x6f, 0x6c, 0x61, 0x72, 0x53, 0x53, 0x4c, 0x31, 0x1c,
|
|
|
|
0x30, 0x1a, 0x06, 0x03, 0x55, 0x04, 0x03, 0x13, 0x13, 0x50, 0x6f, 0x6c,
|
|
|
|
0x61, 0x72, 0x73, 0x73, 0x6c, 0x20, 0x54, 0x65, 0x73, 0x74, 0x20, 0x45,
|
|
|
|
0x43, 0x20, 0x43, 0x41, 0x30, 0x1e, 0x17, 0x0d, 0x31, 0x33, 0x30, 0x39,
|
|
|
|
0x32, 0x34, 0x31, 0x35, 0x34, 0x39, 0x34, 0x38, 0x5a, 0x17, 0x0d, 0x32,
|
|
|
|
0x33, 0x30, 0x39, 0x32, 0x32, 0x31, 0x35, 0x34, 0x39, 0x34, 0x38, 0x5a,
|
|
|
|
0x30, 0x3e, 0x31, 0x0b, 0x30, 0x09, 0x06, 0x03, 0x55, 0x04, 0x06, 0x13,
|
|
|
|
0x02, 0x4e, 0x4c, 0x31, 0x11, 0x30, 0x0f, 0x06, 0x03, 0x55, 0x04, 0x0a,
|
|
|
|
0x13, 0x08, 0x50, 0x6f, 0x6c, 0x61, 0x72, 0x53, 0x53, 0x4c, 0x31, 0x1c,
|
|
|
|
0x30, 0x1a, 0x06, 0x03, 0x55, 0x04, 0x03, 0x13, 0x13, 0x50, 0x6f, 0x6c,
|
|
|
|
0x61, 0x72, 0x73, 0x73, 0x6c, 0x20, 0x54, 0x65, 0x73, 0x74, 0x20, 0x45,
|
|
|
|
0x43, 0x20, 0x43, 0x41, 0x30, 0x76, 0x30, 0x10, 0x06, 0x07, 0x2a, 0x86,
|
|
|
|
0x48, 0xce, 0x3d, 0x02, 0x01, 0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x22,
|
|
|
|
0x03, 0x62, 0x00, 0x04, 0xc3, 0xda, 0x2b, 0x34, 0x41, 0x37, 0x58, 0x2f,
|
|
|
|
0x87, 0x56, 0xfe, 0xfc, 0x89, 0xba, 0x29, 0x43, 0x4b, 0x4e, 0xe0, 0x6e,
|
|
|
|
0xc3, 0x0e, 0x57, 0x53, 0x33, 0x39, 0x58, 0xd4, 0x52, 0xb4, 0x91, 0x95,
|
|
|
|
0x39, 0x0b, 0x23, 0xdf, 0x5f, 0x17, 0x24, 0x62, 0x48, 0xfc, 0x1a, 0x95,
|
|
|
|
0x29, 0xce, 0x2c, 0x2d, 0x87, 0xc2, 0x88, 0x52, 0x80, 0xaf, 0xd6, 0x6a,
|
|
|
|
0xab, 0x21, 0xdd, 0xb8, 0xd3, 0x1c, 0x6e, 0x58, 0xb8, 0xca, 0xe8, 0xb2,
|
|
|
|
0x69, 0x8e, 0xf3, 0x41, 0xad, 0x29, 0xc3, 0xb4, 0x5f, 0x75, 0xa7, 0x47,
|
|
|
|
0x6f, 0xd5, 0x19, 0x29, 0x55, 0x69, 0x9a, 0x53, 0x3b, 0x20, 0xb4, 0x66,
|
|
|
|
0x16, 0x60, 0x33, 0x1e, 0xa3, 0x81, 0xa0, 0x30, 0x81, 0x9d, 0x30, 0x1d,
|
|
|
|
0x06, 0x03, 0x55, 0x1d, 0x0e, 0x04, 0x16, 0x04, 0x14, 0x9d, 0x6d, 0x20,
|
|
|
|
0x24, 0x49, 0x01, 0x3f, 0x2b, 0xcb, 0x78, 0xb5, 0x19, 0xbc, 0x7e, 0x24,
|
|
|
|
0xc9, 0xdb, 0xfb, 0x36, 0x7c, 0x30, 0x6e, 0x06, 0x03, 0x55, 0x1d, 0x23,
|
|
|
|
0x04, 0x67, 0x30, 0x65, 0x80, 0x14, 0x9d, 0x6d, 0x20, 0x24, 0x49, 0x01,
|
|
|
|
0x3f, 0x2b, 0xcb, 0x78, 0xb5, 0x19, 0xbc, 0x7e, 0x24, 0xc9, 0xdb, 0xfb,
|
|
|
|
0x36, 0x7c, 0xa1, 0x42, 0xa4, 0x40, 0x30, 0x3e, 0x31, 0x0b, 0x30, 0x09,
|
|
|
|
0x06, 0x03, 0x55, 0x04, 0x06, 0x13, 0x02, 0x4e, 0x4c, 0x31, 0x11, 0x30,
|
|
|
|
0x0f, 0x06, 0x03, 0x55, 0x04, 0x0a, 0x13, 0x08, 0x50, 0x6f, 0x6c, 0x61,
|
|
|
|
0x72, 0x53, 0x53, 0x4c, 0x31, 0x1c, 0x30, 0x1a, 0x06, 0x03, 0x55, 0x04,
|
|
|
|
0x03, 0x13, 0x13, 0x50, 0x6f, 0x6c, 0x61, 0x72, 0x73, 0x73, 0x6c, 0x20,
|
|
|
|
0x54, 0x65, 0x73, 0x74, 0x20, 0x45, 0x43, 0x20, 0x43, 0x41, 0x82, 0x09,
|
|
|
|
0x00, 0xc1, 0x43, 0xe2, 0x7e, 0x62, 0x43, 0xcc, 0xe8, 0x30, 0x0c, 0x06,
|
|
|
|
0x03, 0x55, 0x1d, 0x13, 0x04, 0x05, 0x30, 0x03, 0x01, 0x01, 0xff, 0x30,
|
|
|
|
0x0a, 0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x04, 0x03, 0x02, 0x03,
|
|
|
|
0x69, 0x00, 0x30, 0x66, 0x02, 0x31, 0x00, 0xc3, 0xb4, 0x62, 0x73, 0x56,
|
|
|
|
0x28, 0x95, 0x00, 0x7d, 0x78, 0x12, 0x26, 0xd2, 0x71, 0x7b, 0x19, 0xf8,
|
|
|
|
0x8a, 0x98, 0x3e, 0x92, 0xfe, 0x33, 0x9e, 0xe4, 0x79, 0xd2, 0xfe, 0x7a,
|
|
|
|
0xb7, 0x87, 0x74, 0x3c, 0x2b, 0xb8, 0xd7, 0x69, 0x94, 0x0b, 0xa3, 0x67,
|
|
|
|
0x77, 0xb8, 0xb3, 0xbe, 0xd1, 0x36, 0x32, 0x02, 0x31, 0x00, 0xfd, 0x67,
|
|
|
|
0x9c, 0x94, 0x23, 0x67, 0xc0, 0x56, 0xba, 0x4b, 0x33, 0x15, 0x00, 0xc6,
|
|
|
|
0xe3, 0xcc, 0x31, 0x08, 0x2c, 0x9c, 0x8b, 0xda, 0xa9, 0x75, 0x23, 0x2f,
|
|
|
|
0xb8, 0x28, 0xe7, 0xf2, 0x9c, 0x14, 0x3a, 0x40, 0x01, 0x5c, 0xaf, 0x0c,
|
|
|
|
0xb2, 0xcf, 0x74, 0x7f, 0x30, 0x9f, 0x08, 0x43, 0xad, 0x20,
|
|
|
|
};
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_X509_CRT_PARSE_C */
|
2014-12-01 11:18:00 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
enum exit_codes {
|
2014-12-01 11:18:00 +01:00
|
|
|
exit_ok = 0,
|
2015-04-28 22:52:30 +02:00
|
|
|
ctr_drbg_seed_failed,
|
2015-05-11 12:40:45 +02:00
|
|
|
ssl_config_defaults_failed,
|
2015-04-29 00:48:22 +02:00
|
|
|
ssl_setup_failed,
|
2015-05-06 12:14:19 +02:00
|
|
|
hostname_failed,
|
2014-12-01 11:18:00 +01:00
|
|
|
socket_failed,
|
|
|
|
connect_failed,
|
|
|
|
x509_crt_parse_failed,
|
|
|
|
ssl_handshake_failed,
|
|
|
|
ssl_write_failed,
|
|
|
|
};
|
2014-11-24 14:05:25 +01:00
|
|
|
|
2018-12-06 18:43:31 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
int main(void)
|
2014-11-24 14:05:25 +01:00
|
|
|
{
|
2014-12-01 11:18:00 +01:00
|
|
|
int ret = exit_ok;
|
2015-06-30 15:40:39 +02:00
|
|
|
mbedtls_net_context server_fd;
|
2014-11-24 14:05:25 +01:00
|
|
|
struct sockaddr_in addr;
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_X509_CRT_PARSE_C)
|
|
|
|
mbedtls_x509_crt ca;
|
2014-12-01 11:18:00 +01:00
|
|
|
#endif
|
2014-11-24 14:05:25 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_entropy_context entropy;
|
|
|
|
mbedtls_ctr_drbg_context ctr_drbg;
|
|
|
|
mbedtls_ssl_context ssl;
|
2015-05-04 14:56:36 +02:00
|
|
|
mbedtls_ssl_config conf;
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_ctr_drbg_init(&ctr_drbg);
|
2014-11-24 14:05:25 +01:00
|
|
|
|
|
|
|
/*
|
2014-12-01 11:18:00 +01:00
|
|
|
* 0. Initialize and setup stuff
|
2014-11-24 14:05:25 +01:00
|
|
|
*/
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_net_init(&server_fd);
|
|
|
|
mbedtls_ssl_init(&ssl);
|
|
|
|
mbedtls_ssl_config_init(&conf);
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_X509_CRT_PARSE_C)
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_x509_crt_init(&ca);
|
2014-12-01 11:18:00 +01:00
|
|
|
#endif
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_entropy_init(&entropy);
|
2023-04-17 11:10:05 +02:00
|
|
|
|
|
|
|
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
|
|
|
psa_status_t status = psa_crypto_init();
|
|
|
|
if (status != PSA_SUCCESS) {
|
|
|
|
ret = MBEDTLS_ERR_SSL_HW_ACCEL_FAILED;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
#endif /* MBEDTLS_USE_PSA_CRYPTO */
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (mbedtls_ctr_drbg_seed(&ctr_drbg, mbedtls_entropy_func, &entropy,
|
|
|
|
(const unsigned char *) pers, strlen(pers)) != 0) {
|
2015-04-29 00:48:22 +02:00
|
|
|
ret = ctr_drbg_seed_failed;
|
2014-11-24 14:05:25 +01:00
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (mbedtls_ssl_config_defaults(&conf,
|
|
|
|
MBEDTLS_SSL_IS_CLIENT,
|
|
|
|
MBEDTLS_SSL_TRANSPORT_STREAM,
|
|
|
|
MBEDTLS_SSL_PRESET_DEFAULT) != 0) {
|
2015-05-04 14:56:36 +02:00
|
|
|
ret = ssl_config_defaults_failed;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_ssl_conf_rng(&conf, mbedtls_ctr_drbg_random, &ctr_drbg);
|
2014-11-24 14:05:25 +01:00
|
|
|
|
2020-03-10 12:19:08 +01:00
|
|
|
#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_ssl_conf_psk(&conf, psk, sizeof(psk),
|
|
|
|
(const unsigned char *) psk_id, sizeof(psk_id) - 1);
|
2014-12-01 11:18:00 +01:00
|
|
|
#endif
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_X509_CRT_PARSE_C)
|
2023-01-11 14:50:10 +01:00
|
|
|
if (mbedtls_x509_crt_parse_der(&ca, ca_cert, sizeof(ca_cert)) != 0) {
|
2014-12-01 11:18:00 +01:00
|
|
|
ret = x509_crt_parse_failed;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_ssl_conf_ca_chain(&conf, &ca, NULL);
|
|
|
|
mbedtls_ssl_conf_authmode(&conf, MBEDTLS_SSL_VERIFY_REQUIRED);
|
2015-05-11 11:25:46 +02:00
|
|
|
#endif
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (mbedtls_ssl_setup(&ssl, &conf) != 0) {
|
2015-05-11 11:25:46 +02:00
|
|
|
ret = ssl_setup_failed;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
2015-05-11 16:15:19 +02:00
|
|
|
#if defined(MBEDTLS_X509_CRT_PARSE_C)
|
2023-01-11 14:50:10 +01:00
|
|
|
if (mbedtls_ssl_set_hostname(&ssl, HOSTNAME) != 0) {
|
2015-05-06 12:14:19 +02:00
|
|
|
ret = hostname_failed;
|
|
|
|
goto exit;
|
|
|
|
}
|
2015-05-11 16:15:19 +02:00
|
|
|
#endif
|
2014-11-24 14:05:25 +01:00
|
|
|
|
|
|
|
/*
|
|
|
|
* 1. Start the connection
|
|
|
|
*/
|
2023-01-11 14:50:10 +01:00
|
|
|
memset(&addr, 0, sizeof(addr));
|
2014-11-24 14:05:25 +01:00
|
|
|
addr.sin_family = AF_INET;
|
|
|
|
|
|
|
|
ret = 1; /* for endianness detection */
|
|
|
|
addr.sin_port = *((char *) &ret) == ret ? PORT_LE : PORT_BE;
|
|
|
|
addr.sin_addr.s_addr = *((char *) &ret) == ret ? ADDR_LE : ADDR_BE;
|
|
|
|
ret = 0;
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if ((server_fd.fd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
|
2014-12-01 11:18:00 +01:00
|
|
|
ret = socket_failed;
|
2014-11-24 14:05:25 +01:00
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (connect(server_fd.fd,
|
|
|
|
(const struct sockaddr *) &addr, sizeof(addr)) < 0) {
|
2014-12-01 11:18:00 +01:00
|
|
|
ret = connect_failed;
|
2014-11-24 14:05:25 +01:00
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_ssl_set_bio(&ssl, &server_fd, mbedtls_net_send, mbedtls_net_recv, NULL);
|
2014-11-24 14:05:25 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
if (mbedtls_ssl_handshake(&ssl) != 0) {
|
2014-12-01 11:18:00 +01:00
|
|
|
ret = ssl_handshake_failed;
|
2014-11-24 14:05:25 +01:00
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* 2. Write the GET request and close the connection
|
|
|
|
*/
|
2023-01-11 14:50:10 +01:00
|
|
|
if (mbedtls_ssl_write(&ssl, (const unsigned char *) GET_REQUEST,
|
|
|
|
sizeof(GET_REQUEST) - 1) <= 0) {
|
2014-12-01 11:18:00 +01:00
|
|
|
ret = ssl_write_failed;
|
2014-11-24 14:05:25 +01:00
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_ssl_close_notify(&ssl);
|
2014-11-24 14:05:25 +01:00
|
|
|
|
|
|
|
exit:
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_net_free(&server_fd);
|
|
|
|
mbedtls_ssl_free(&ssl);
|
|
|
|
mbedtls_ssl_config_free(&conf);
|
|
|
|
mbedtls_ctr_drbg_free(&ctr_drbg);
|
|
|
|
mbedtls_entropy_free(&entropy);
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_X509_CRT_PARSE_C)
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_x509_crt_free(&ca);
|
2014-12-01 11:18:00 +01:00
|
|
|
#endif
|
2023-04-19 13:47:43 +02:00
|
|
|
#if defined(MBEDTLS_USE_PSA_CRYPTO)
|
2023-04-19 10:15:26 +02:00
|
|
|
mbedtls_psa_crypto_free();
|
2023-04-19 13:47:43 +02:00
|
|
|
#endif /* MBEDTLS_USE_PSA_CRYPTO */
|
2014-11-24 14:05:25 +01:00
|
|
|
|
2023-01-11 14:50:10 +01:00
|
|
|
mbedtls_exit(ret);
|
2014-11-24 14:05:25 +01:00
|
|
|
}
|
|
|
|
#endif
|