blob: 9e53107626c2192b5ee2e143e2195d73b51075d3 [file] [log] [blame]
Paul Bakker33b43f12013-08-20 11:48:36 +02001/* BEGIN_HEADER */
Valerio Settib4f50762024-01-17 10:24:52 +01002#include "debug_internal.h"
Mohammad Azim Khan67735d52017-04-06 11:55:43 +01003#include "string.h"
Valerio Setti1b08d422023-02-13 11:33:26 +01004#include "mbedtls/pk.h"
Yanray Wang5b60b422023-12-01 17:20:22 +08005#include <test/ssl_helpers.h>
Paul Bakker1f761152010-02-18 18:16:31 +00006
Bence Szépkúti1e62c952025-03-02 01:17:02 +01007#if defined(_WIN32)
8# include <stdlib.h>
9# include <crtdbg.h>
10#endif
11
Bence Szépkútia0293872025-03-12 16:43:38 +010012// Dummy type for builds without MBEDTLS_HAVE_TIME
13#if !defined(MBEDTLS_HAVE_TIME)
14typedef int64_t mbedtls_ms_time_t;
Bence Szépkúti9cde9d42025-03-02 00:58:11 +010015#endif
16
Bence Szépkútic64b7bc2025-03-12 17:08:46 +010017typedef enum {
18 PRINTF_SIZET,
19 PRINTF_LONGLONG,
20 PRINTF_MS_TIME,
21} printf_format_indicator_t;
22
23const char *const printf_formats[] = {
24 [PRINTF_SIZET] = "%" MBEDTLS_PRINTF_SIZET,
25 [PRINTF_LONGLONG] = "%" MBEDTLS_PRINTF_LONGLONG,
26 [PRINTF_MS_TIME] = "%" MBEDTLS_PRINTF_MS_TIME,
27};
28
Gilles Peskine449bd832023-01-11 14:50:10 +010029struct buffer_data {
Paul Bakker1f761152010-02-18 18:16:31 +000030 char buf[2000];
31 char *ptr;
32};
33
Bence Szépkútid5102c92025-02-28 16:22:33 +010034#if defined(MBEDTLS_SSL_TLS_C)
Michael Schusterb1e33fb2024-06-04 02:30:22 +020035static void string_debug(void *data, int level, const char *file, int line, const char *str)
Paul Bakker1f761152010-02-18 18:16:31 +000036{
37 struct buffer_data *buffer = (struct buffer_data *) data;
Manuel Pégourié-Gonnardfd474232015-06-23 16:34:24 +020038 char *p = buffer->ptr;
Paul Bakker26b41a82011-07-13 14:53:58 +000039 ((void) level);
Paul Bakker1f761152010-02-18 18:16:31 +000040
Gilles Peskine449bd832023-01-11 14:50:10 +010041 memcpy(p, file, strlen(file));
42 p += strlen(file);
Manuel Pégourié-Gonnardfd474232015-06-23 16:34:24 +020043
44 *p++ = '(';
Gilles Peskine449bd832023-01-11 14:50:10 +010045 *p++ = '0' + (line / 1000) % 10;
46 *p++ = '0' + (line / 100) % 10;
47 *p++ = '0' + (line / 10) % 10;
48 *p++ = '0' + (line / 1) % 10;
Manuel Pégourié-Gonnardfd474232015-06-23 16:34:24 +020049 *p++ = ')';
50 *p++ = ':';
51 *p++ = ' ';
52
Manuel Pégourié-Gonnard7b23c512015-08-31 16:11:00 +020053#if defined(MBEDTLS_THREADING_C)
54 /* Skip "thread ID" (up to the first space) as it is not predictable */
Gilles Peskine449bd832023-01-11 14:50:10 +010055 while (*str++ != ' ') {
56 ;
57 }
Manuel Pégourié-Gonnard7b23c512015-08-31 16:11:00 +020058#endif
59
Gilles Peskine449bd832023-01-11 14:50:10 +010060 memcpy(p, str, strlen(str));
61 p += strlen(str);
Paul Bakker92478c32014-04-25 15:18:34 +020062
63 /* Detect if debug messages output partial lines and mark them */
Gilles Peskine449bd832023-01-11 14:50:10 +010064 if (p[-1] != '\n') {
Manuel Pégourié-Gonnardfd474232015-06-23 16:34:24 +020065 *p++ = '*';
Gilles Peskine449bd832023-01-11 14:50:10 +010066 }
Manuel Pégourié-Gonnardfd474232015-06-23 16:34:24 +020067
68 buffer->ptr = p;
Paul Bakker1f761152010-02-18 18:16:31 +000069}
Bence Szépkútid5102c92025-02-28 16:22:33 +010070#endif /* MBEDTLS_SSL_TLS_C */
Bence Szépkúti1e62c952025-03-02 01:17:02 +010071
72#if defined(_WIN32)
73static void noop_invalid_parameter_handler(
74 const wchar_t *expression,
75 const wchar_t *function,
76 const wchar_t *file,
77 unsigned int line,
78 uintptr_t pReserved)
79{
80 (void) expression;
81 (void) function;
82 (void) file;
83 (void) line;
84 (void) pReserved;
85}
86#endif /* _WIN32 */
87
Paul Bakker33b43f12013-08-20 11:48:36 +020088/* END_HEADER */
Paul Bakker1f761152010-02-18 18:16:31 +000089
Paul Bakker33b43f12013-08-20 11:48:36 +020090/* BEGIN_DEPENDENCIES
Bence Szépkútid5102c92025-02-28 16:22:33 +010091 * depends_on:MBEDTLS_DEBUG_C
Paul Bakker33b43f12013-08-20 11:48:36 +020092 * END_DEPENDENCIES
93 */
Paul Bakker5690efc2011-05-26 13:16:06 +000094
Bence Szépkúti85d92ec2025-02-28 22:32:15 +010095/* BEGIN_CASE */
Bence Szépkútic64b7bc2025-03-12 17:08:46 +010096void printf_int_expr(int format_indicator, intmax_t sizeof_x, intmax_t x, char *result)
Bence Szépkúti85d92ec2025-02-28 22:32:15 +010097{
Bence Szépkúti1e62c952025-03-02 01:17:02 +010098#if defined(_WIN32)
99 /* Windows treats any invalid format specifiers passsed to the CRT as fatal assertion failures.
100 Disable this behaviour temporarily, so the rest of the test cases can complete. */
101 _invalid_parameter_handler saved_handler =
102 _set_invalid_parameter_handler(noop_invalid_parameter_handler);
103
104 // Disable assertion pop-up window in Debug builds
105 int saved_report_mode = _CrtSetReportMode(_CRT_ASSERT, _CRTDBG_REPORT_MODE);
106 _CrtSetReportMode(_CRT_ASSERT, _CRTDBG_MODE_DEBUG);
107#endif
108
Bence Szépkútic64b7bc2025-03-12 17:08:46 +0100109 const char *format = printf_formats[format_indicator];
Bence Szépkúti85d92ec2025-02-28 22:32:15 +0100110 char *output = NULL;
111 const size_t n = strlen(result);
112
113 /* Nominal case: buffer just large enough */
114 TEST_CALLOC(output, n + 1);
115 if ((size_t) sizeof_x <= sizeof(int)) { // Any smaller integers would be promoted to an int due to calling a vararg function
116 TEST_EQUAL(n, mbedtls_snprintf(output, n + 1, format, (int) x));
117 } else if (sizeof_x == sizeof(long)) {
118 TEST_EQUAL(n, mbedtls_snprintf(output, n + 1, format, (long) x));
119 } else if (sizeof_x == sizeof(long long)) {
120 TEST_EQUAL(n, mbedtls_snprintf(output, n + 1, format, (long long) x));
121 } else {
122 TEST_FAIL(
123 "sizeof_x <= sizeof(int) || sizeof_x == sizeof(long) || sizeof_x == sizeof(long long)");
124 }
125 TEST_MEMORY_COMPARE(result, n + 1, output, n + 1);
126
127exit:
128 mbedtls_free(output);
129 output = NULL;
Bence Szépkúti1e62c952025-03-02 01:17:02 +0100130
131#if defined(_WIN32)
132 // Restore default Windows behaviour
133 _set_invalid_parameter_handler(saved_handler);
134 _CrtSetReportMode(_CRT_ASSERT, saved_report_mode);
135 (void) saved_report_mode;
136#endif
Bence Szépkúti85d92ec2025-02-28 22:32:15 +0100137}
138/* END_CASE */
139
Bence Szépkútid5102c92025-02-28 16:22:33 +0100140/* BEGIN_CASE depends_on:MBEDTLS_SSL_TLS_C */
Gilles Peskine449bd832023-01-11 14:50:10 +0100141void debug_print_msg_threshold(int threshold, int level, char *file,
142 int line, char *result_str)
Paul Bakkerc73079a2014-04-25 16:34:30 +0200143{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200144 mbedtls_ssl_context ssl;
Manuel Pégourié-Gonnarddef0bbe2015-05-04 14:56:36 +0200145 mbedtls_ssl_config conf;
Paul Bakkerc73079a2014-04-25 16:34:30 +0200146 struct buffer_data buffer;
147
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +0100148 MD_PSA_INIT();
149
Gilles Peskine449bd832023-01-11 14:50:10 +0100150 mbedtls_ssl_init(&ssl);
151 mbedtls_ssl_config_init(&conf);
152 memset(buffer.buf, 0, 2000);
Paul Bakkerc73079a2014-04-25 16:34:30 +0200153 buffer.ptr = buffer.buf;
154
Yanray Wangaad94492023-12-04 10:42:06 +0800155 TEST_EQUAL(mbedtls_ssl_config_defaults(&conf,
156 MBEDTLS_SSL_IS_CLIENT,
157 MBEDTLS_SSL_TRANSPORT_STREAM,
158 MBEDTLS_SSL_PRESET_DEFAULT),
159 0);
Ronald Cronaab4a542024-02-23 18:51:11 +0100160 mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +0100161 mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
Jerry Yub19ccc32021-08-09 17:44:56 +0800162
Gilles Peskine449bd832023-01-11 14:50:10 +0100163 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
Manuel Pégourié-Gonnardd5a9e412015-05-04 11:11:42 +0200164
Gilles Peskine449bd832023-01-11 14:50:10 +0100165 mbedtls_debug_set_threshold(threshold);
Paul Bakkerc73079a2014-04-25 16:34:30 +0200166
Gilles Peskine449bd832023-01-11 14:50:10 +0100167 mbedtls_debug_print_msg(&ssl, level, file, line,
168 "Text message, 2 == %d", 2);
Paul Bakkerc73079a2014-04-25 16:34:30 +0200169
Gilles Peskine449bd832023-01-11 14:50:10 +0100170 TEST_ASSERT(strcmp(buffer.buf, result_str) == 0);
Manuel Pégourié-Gonnardd5a9e412015-05-04 11:11:42 +0200171
172exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100173 mbedtls_ssl_free(&ssl);
174 mbedtls_ssl_config_free(&conf);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +0100175 MD_PSA_DONE();
Paul Bakkerc73079a2014-04-25 16:34:30 +0200176}
177/* END_CASE */
178
Bence Szépkútid5102c92025-02-28 16:22:33 +0100179/* BEGIN_CASE depends_on:MBEDTLS_SSL_TLS_C */
Gilles Peskine449bd832023-01-11 14:50:10 +0100180void mbedtls_debug_print_ret(char *file, int line, char *text, int value,
181 char *result_str)
Paul Bakker57ffa552014-04-25 14:29:10 +0200182{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200183 mbedtls_ssl_context ssl;
Manuel Pégourié-Gonnarddef0bbe2015-05-04 14:56:36 +0200184 mbedtls_ssl_config conf;
Paul Bakker57ffa552014-04-25 14:29:10 +0200185 struct buffer_data buffer;
186
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +0100187 MD_PSA_INIT();
188
Gilles Peskine449bd832023-01-11 14:50:10 +0100189 mbedtls_ssl_init(&ssl);
190 mbedtls_ssl_config_init(&conf);
191 memset(buffer.buf, 0, 2000);
Paul Bakker57ffa552014-04-25 14:29:10 +0200192 buffer.ptr = buffer.buf;
193
Yanray Wangaad94492023-12-04 10:42:06 +0800194 TEST_EQUAL(mbedtls_ssl_config_defaults(&conf,
195 MBEDTLS_SSL_IS_CLIENT,
196 MBEDTLS_SSL_TRANSPORT_STREAM,
197 MBEDTLS_SSL_PRESET_DEFAULT),
198 0);
Ronald Cronaab4a542024-02-23 18:51:11 +0100199 mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +0100200 mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
Paul Bakker57ffa552014-04-25 14:29:10 +0200201
Gilles Peskine449bd832023-01-11 14:50:10 +0100202 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
Jerry Yub19ccc32021-08-09 17:44:56 +0800203
Gilles Peskine449bd832023-01-11 14:50:10 +0100204 mbedtls_debug_print_ret(&ssl, 0, file, line, text, value);
Paul Bakker57ffa552014-04-25 14:29:10 +0200205
Gilles Peskine449bd832023-01-11 14:50:10 +0100206 TEST_ASSERT(strcmp(buffer.buf, result_str) == 0);
Manuel Pégourié-Gonnardd5a9e412015-05-04 11:11:42 +0200207
208exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100209 mbedtls_ssl_free(&ssl);
210 mbedtls_ssl_config_free(&conf);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +0100211 MD_PSA_DONE();
Paul Bakker57ffa552014-04-25 14:29:10 +0200212}
213/* END_CASE */
214
Bence Szépkútid5102c92025-02-28 16:22:33 +0100215/* BEGIN_CASE depends_on:MBEDTLS_SSL_TLS_C */
Gilles Peskine449bd832023-01-11 14:50:10 +0100216void mbedtls_debug_print_buf(char *file, int line, char *text,
217 data_t *data, char *result_str)
Paul Bakker57ffa552014-04-25 14:29:10 +0200218{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200219 mbedtls_ssl_context ssl;
Manuel Pégourié-Gonnarddef0bbe2015-05-04 14:56:36 +0200220 mbedtls_ssl_config conf;
Paul Bakker57ffa552014-04-25 14:29:10 +0200221 struct buffer_data buffer;
Paul Bakker57ffa552014-04-25 14:29:10 +0200222
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +0100223 MD_PSA_INIT();
224
Gilles Peskine449bd832023-01-11 14:50:10 +0100225 mbedtls_ssl_init(&ssl);
226 mbedtls_ssl_config_init(&conf);
227 memset(buffer.buf, 0, 2000);
Paul Bakker57ffa552014-04-25 14:29:10 +0200228 buffer.ptr = buffer.buf;
229
Yanray Wangaad94492023-12-04 10:42:06 +0800230 TEST_EQUAL(mbedtls_ssl_config_defaults(&conf,
231 MBEDTLS_SSL_IS_CLIENT,
232 MBEDTLS_SSL_TRANSPORT_STREAM,
233 MBEDTLS_SSL_PRESET_DEFAULT),
234 0);
Ronald Cronaab4a542024-02-23 18:51:11 +0100235 mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +0100236 mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
Paul Bakker57ffa552014-04-25 14:29:10 +0200237
Gilles Peskine449bd832023-01-11 14:50:10 +0100238 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
Jerry Yub19ccc32021-08-09 17:44:56 +0800239
Gilles Peskine449bd832023-01-11 14:50:10 +0100240 mbedtls_debug_print_buf(&ssl, 0, file, line, text, data->x, data->len);
Paul Bakker57ffa552014-04-25 14:29:10 +0200241
Gilles Peskine449bd832023-01-11 14:50:10 +0100242 TEST_ASSERT(strcmp(buffer.buf, result_str) == 0);
Manuel Pégourié-Gonnardd5a9e412015-05-04 11:11:42 +0200243
244exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100245 mbedtls_ssl_free(&ssl);
246 mbedtls_ssl_config_free(&conf);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +0100247 MD_PSA_DONE();
Paul Bakker57ffa552014-04-25 14:29:10 +0200248}
249/* END_CASE */
250
Bence Szépkútid5102c92025-02-28 16:22:33 +0100251/* BEGIN_CASE depends_on:MBEDTLS_SSL_TLS_C:MBEDTLS_FS_IO:MBEDTLS_X509_CRT_PARSE_C:!MBEDTLS_X509_REMOVE_INFO */
Gilles Peskine449bd832023-01-11 14:50:10 +0100252void mbedtls_debug_print_crt(char *crt_file, char *file, int line,
253 char *prefix, char *result_str)
Paul Bakker1f761152010-02-18 18:16:31 +0000254{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200255 mbedtls_x509_crt crt;
256 mbedtls_ssl_context ssl;
Manuel Pégourié-Gonnarddef0bbe2015-05-04 14:56:36 +0200257 mbedtls_ssl_config conf;
Paul Bakker1f761152010-02-18 18:16:31 +0000258 struct buffer_data buffer;
259
Gilles Peskine449bd832023-01-11 14:50:10 +0100260 mbedtls_ssl_init(&ssl);
261 mbedtls_ssl_config_init(&conf);
262 mbedtls_x509_crt_init(&crt);
Valerio Setti92c3f362023-05-17 15:36:44 +0200263 MD_OR_USE_PSA_INIT();
264
Gilles Peskine449bd832023-01-11 14:50:10 +0100265 memset(buffer.buf, 0, 2000);
Paul Bakker57ffa552014-04-25 14:29:10 +0200266 buffer.ptr = buffer.buf;
Paul Bakker1f761152010-02-18 18:16:31 +0000267
Yanray Wangaad94492023-12-04 10:42:06 +0800268 TEST_EQUAL(mbedtls_ssl_config_defaults(&conf,
269 MBEDTLS_SSL_IS_CLIENT,
270 MBEDTLS_SSL_TRANSPORT_STREAM,
271 MBEDTLS_SSL_PRESET_DEFAULT),
272 0);
Ronald Cronaab4a542024-02-23 18:51:11 +0100273 mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +0100274 mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
Paul Bakker1f761152010-02-18 18:16:31 +0000275
Gilles Peskine449bd832023-01-11 14:50:10 +0100276 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
Jerry Yub19ccc32021-08-09 17:44:56 +0800277
Gilles Peskine449bd832023-01-11 14:50:10 +0100278 TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
279 mbedtls_debug_print_crt(&ssl, 0, file, line, prefix, &crt);
Paul Bakker1f761152010-02-18 18:16:31 +0000280
Gilles Peskine449bd832023-01-11 14:50:10 +0100281 TEST_ASSERT(strcmp(buffer.buf, result_str) == 0);
Paul Bakker58ef6ec2013-01-03 11:33:48 +0100282
Paul Bakkerbd51b262014-07-10 15:26:12 +0200283exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100284 mbedtls_x509_crt_free(&crt);
285 mbedtls_ssl_free(&ssl);
286 mbedtls_ssl_config_free(&conf);
Valerio Setti92c3f362023-05-17 15:36:44 +0200287 MD_OR_USE_PSA_DONE();
Paul Bakker1f761152010-02-18 18:16:31 +0000288}
Paul Bakker33b43f12013-08-20 11:48:36 +0200289/* END_CASE */
Paul Bakkerbe4e7dc2011-03-14 20:41:31 +0000290
Bence Szépkútid5102c92025-02-28 16:22:33 +0100291/* BEGIN_CASE depends_on:MBEDTLS_SSL_TLS_C:MBEDTLS_BIGNUM_C */
Gilles Peskine449bd832023-01-11 14:50:10 +0100292void mbedtls_debug_print_mpi(char *value, char *file, int line,
293 char *prefix, char *result_str)
Paul Bakkerbe4e7dc2011-03-14 20:41:31 +0000294{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200295 mbedtls_ssl_context ssl;
Manuel Pégourié-Gonnarddef0bbe2015-05-04 14:56:36 +0200296 mbedtls_ssl_config conf;
Paul Bakkerbe4e7dc2011-03-14 20:41:31 +0000297 struct buffer_data buffer;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200298 mbedtls_mpi val;
Paul Bakkerbe4e7dc2011-03-14 20:41:31 +0000299
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +0100300 MD_PSA_INIT();
301
Gilles Peskine449bd832023-01-11 14:50:10 +0100302 mbedtls_ssl_init(&ssl);
303 mbedtls_ssl_config_init(&conf);
304 mbedtls_mpi_init(&val);
305 memset(buffer.buf, 0, 2000);
Paul Bakker57ffa552014-04-25 14:29:10 +0200306 buffer.ptr = buffer.buf;
Paul Bakkerbe4e7dc2011-03-14 20:41:31 +0000307
Yanray Wangaad94492023-12-04 10:42:06 +0800308 TEST_EQUAL(mbedtls_ssl_config_defaults(&conf,
309 MBEDTLS_SSL_IS_CLIENT,
310 MBEDTLS_SSL_TRANSPORT_STREAM,
311 MBEDTLS_SSL_PRESET_DEFAULT),
312 0);
Ronald Cronaab4a542024-02-23 18:51:11 +0100313 mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +0100314 mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
Jerry Yub19ccc32021-08-09 17:44:56 +0800315
Gilles Peskine449bd832023-01-11 14:50:10 +0100316 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
Manuel Pégourié-Gonnardd5a9e412015-05-04 11:11:42 +0200317
Gilles Peskine449bd832023-01-11 14:50:10 +0100318 TEST_ASSERT(mbedtls_test_read_mpi(&val, value) == 0);
Paul Bakkereaebbd52014-04-25 15:04:14 +0200319
Gilles Peskine449bd832023-01-11 14:50:10 +0100320 mbedtls_debug_print_mpi(&ssl, 0, file, line, prefix, &val);
Paul Bakkerbe4e7dc2011-03-14 20:41:31 +0000321
Gilles Peskine449bd832023-01-11 14:50:10 +0100322 TEST_ASSERT(strcmp(buffer.buf, result_str) == 0);
Paul Bakker6c591fa2011-05-05 11:49:20 +0000323
Paul Bakkerbd51b262014-07-10 15:26:12 +0200324exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100325 mbedtls_mpi_free(&val);
326 mbedtls_ssl_free(&ssl);
327 mbedtls_ssl_config_free(&conf);
Manuel Pégourié-Gonnard23fc4372023-03-17 13:34:11 +0100328 MD_PSA_DONE();
Paul Bakkerbe4e7dc2011-03-14 20:41:31 +0000329}
Paul Bakker33b43f12013-08-20 11:48:36 +0200330/* END_CASE */