blob: f3c8ff61967ed870779c9d24b2138c3635f7371e [file] [log] [blame]
Paul Bakker33b43f12013-08-20 11:48:36 +02001/* BEGIN_HEADER */
Valerio Settib4f50762024-01-17 10:24:52 +01002#include "debug_internal.h"
Mohammad Azim Khan67735d52017-04-06 11:55:43 +01003#include "string.h"
Valerio Setti1b08d422023-02-13 11:33:26 +01004#include "mbedtls/pk.h"
Yanray Wang5b60b422023-12-01 17:20:22 +08005#include <test/ssl_helpers.h>
Paul Bakker1f761152010-02-18 18:16:31 +00006
Bence Szépkúti58bb7ec2025-03-02 01:17:02 +01007#if defined(_WIN32)
8# include <stdlib.h>
9# include <crtdbg.h>
10#endif
11
Bence Szépkúti46e0b1c2025-03-12 16:43:38 +010012// Dummy type for builds without MBEDTLS_HAVE_TIME
13#if !defined(MBEDTLS_HAVE_TIME)
14typedef int64_t mbedtls_ms_time_t;
Bence Szépkúti154066d2025-03-02 00:58:11 +010015#endif
16
Bence Szépkúti24f11a32025-03-12 17:08:46 +010017typedef enum {
18 PRINTF_SIZET,
19 PRINTF_LONGLONG,
20 PRINTF_MS_TIME,
21} printf_format_indicator_t;
22
23const char *const printf_formats[] = {
24 [PRINTF_SIZET] = "%" MBEDTLS_PRINTF_SIZET,
25 [PRINTF_LONGLONG] = "%" MBEDTLS_PRINTF_LONGLONG,
26 [PRINTF_MS_TIME] = "%" MBEDTLS_PRINTF_MS_TIME,
27};
28
Gilles Peskine449bd832023-01-11 14:50:10 +010029struct buffer_data {
Paul Bakker1f761152010-02-18 18:16:31 +000030 char buf[2000];
31 char *ptr;
32};
33
Bence Szépkúti12210522025-02-28 16:22:33 +010034#if defined(MBEDTLS_SSL_TLS_C)
Michael Schuster54300d42024-06-04 02:30:22 +020035static void string_debug(void *data, int level, const char *file, int line, const char *str)
Paul Bakker1f761152010-02-18 18:16:31 +000036{
37 struct buffer_data *buffer = (struct buffer_data *) data;
Manuel Pégourié-Gonnardfd474232015-06-23 16:34:24 +020038 char *p = buffer->ptr;
Paul Bakker26b41a82011-07-13 14:53:58 +000039 ((void) level);
Paul Bakker1f761152010-02-18 18:16:31 +000040
Gilles Peskine449bd832023-01-11 14:50:10 +010041 memcpy(p, file, strlen(file));
42 p += strlen(file);
Manuel Pégourié-Gonnardfd474232015-06-23 16:34:24 +020043
44 *p++ = '(';
Gilles Peskine449bd832023-01-11 14:50:10 +010045 *p++ = '0' + (line / 1000) % 10;
46 *p++ = '0' + (line / 100) % 10;
47 *p++ = '0' + (line / 10) % 10;
48 *p++ = '0' + (line / 1) % 10;
Manuel Pégourié-Gonnardfd474232015-06-23 16:34:24 +020049 *p++ = ')';
50 *p++ = ':';
51 *p++ = ' ';
52
Manuel Pégourié-Gonnard7b23c512015-08-31 16:11:00 +020053#if defined(MBEDTLS_THREADING_C)
54 /* Skip "thread ID" (up to the first space) as it is not predictable */
Gilles Peskine449bd832023-01-11 14:50:10 +010055 while (*str++ != ' ') {
56 ;
57 }
Manuel Pégourié-Gonnard7b23c512015-08-31 16:11:00 +020058#endif
59
Gilles Peskine449bd832023-01-11 14:50:10 +010060 memcpy(p, str, strlen(str));
61 p += strlen(str);
Paul Bakker92478c32014-04-25 15:18:34 +020062
63 /* Detect if debug messages output partial lines and mark them */
Gilles Peskine449bd832023-01-11 14:50:10 +010064 if (p[-1] != '\n') {
Manuel Pégourié-Gonnardfd474232015-06-23 16:34:24 +020065 *p++ = '*';
Gilles Peskine449bd832023-01-11 14:50:10 +010066 }
Manuel Pégourié-Gonnardfd474232015-06-23 16:34:24 +020067
68 buffer->ptr = p;
Paul Bakker1f761152010-02-18 18:16:31 +000069}
Bence Szépkúti12210522025-02-28 16:22:33 +010070#endif /* MBEDTLS_SSL_TLS_C */
Bence Szépkúti58bb7ec2025-03-02 01:17:02 +010071
72#if defined(_WIN32)
73static void noop_invalid_parameter_handler(
74 const wchar_t *expression,
75 const wchar_t *function,
76 const wchar_t *file,
77 unsigned int line,
78 uintptr_t pReserved)
79{
80 (void) expression;
81 (void) function;
82 (void) file;
83 (void) line;
84 (void) pReserved;
85}
86#endif /* _WIN32 */
87
Paul Bakker33b43f12013-08-20 11:48:36 +020088/* END_HEADER */
Paul Bakker1f761152010-02-18 18:16:31 +000089
Paul Bakker33b43f12013-08-20 11:48:36 +020090/* BEGIN_DEPENDENCIES
Bence Szépkúti12210522025-02-28 16:22:33 +010091 * depends_on:MBEDTLS_DEBUG_C
Paul Bakker33b43f12013-08-20 11:48:36 +020092 * END_DEPENDENCIES
93 */
Paul Bakker5690efc2011-05-26 13:16:06 +000094
Bence Szépkútic6a8bf02025-02-28 22:32:15 +010095/* BEGIN_CASE */
Bence Szépkúti24f11a32025-03-12 17:08:46 +010096void printf_int_expr(int format_indicator, intmax_t sizeof_x, intmax_t x, char *result)
Bence Szépkútic6a8bf02025-02-28 22:32:15 +010097{
Bence Szépkúti58bb7ec2025-03-02 01:17:02 +010098#if defined(_WIN32)
99 /* Windows treats any invalid format specifiers passsed to the CRT as fatal assertion failures.
100 Disable this behaviour temporarily, so the rest of the test cases can complete. */
101 _invalid_parameter_handler saved_handler =
102 _set_invalid_parameter_handler(noop_invalid_parameter_handler);
103
104 // Disable assertion pop-up window in Debug builds
105 int saved_report_mode = _CrtSetReportMode(_CRT_ASSERT, _CRTDBG_REPORT_MODE);
106 _CrtSetReportMode(_CRT_ASSERT, _CRTDBG_MODE_DEBUG);
107#endif
108
Bence Szépkúti24f11a32025-03-12 17:08:46 +0100109 const char *format = printf_formats[format_indicator];
Bence Szépkútic6a8bf02025-02-28 22:32:15 +0100110 char *output = NULL;
111 const size_t n = strlen(result);
112
113 /* Nominal case: buffer just large enough */
114 TEST_CALLOC(output, n + 1);
115 if ((size_t) sizeof_x <= sizeof(int)) { // Any smaller integers would be promoted to an int due to calling a vararg function
116 TEST_EQUAL(n, mbedtls_snprintf(output, n + 1, format, (int) x));
117 } else if (sizeof_x == sizeof(long)) {
118 TEST_EQUAL(n, mbedtls_snprintf(output, n + 1, format, (long) x));
119 } else if (sizeof_x == sizeof(long long)) {
120 TEST_EQUAL(n, mbedtls_snprintf(output, n + 1, format, (long long) x));
121 } else {
122 TEST_FAIL(
123 "sizeof_x <= sizeof(int) || sizeof_x == sizeof(long) || sizeof_x == sizeof(long long)");
124 }
125 TEST_MEMORY_COMPARE(result, n + 1, output, n + 1);
126
127exit:
128 mbedtls_free(output);
129 output = NULL;
Bence Szépkúti58bb7ec2025-03-02 01:17:02 +0100130
131#if defined(_WIN32)
132 // Restore default Windows behaviour
133 _set_invalid_parameter_handler(saved_handler);
134 _CrtSetReportMode(_CRT_ASSERT, saved_report_mode);
135 (void) saved_report_mode;
136#endif
Bence Szépkútic6a8bf02025-02-28 22:32:15 +0100137}
138/* END_CASE */
139
Bence Szépkúti12210522025-02-28 16:22:33 +0100140/* BEGIN_CASE depends_on:MBEDTLS_SSL_TLS_C */
Gilles Peskine449bd832023-01-11 14:50:10 +0100141void debug_print_msg_threshold(int threshold, int level, char *file,
142 int line, char *result_str)
Paul Bakkerc73079a2014-04-25 16:34:30 +0200143{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200144 mbedtls_ssl_context ssl;
Manuel Pégourié-Gonnarddef0bbe2015-05-04 14:56:36 +0200145 mbedtls_ssl_config conf;
Paul Bakkerc73079a2014-04-25 16:34:30 +0200146 struct buffer_data buffer;
147
Gilles Peskine449bd832023-01-11 14:50:10 +0100148 mbedtls_ssl_init(&ssl);
149 mbedtls_ssl_config_init(&conf);
Valerio Setti3a994b72024-07-03 16:58:10 +0200150 MD_OR_USE_PSA_INIT();
Gilles Peskine449bd832023-01-11 14:50:10 +0100151 memset(buffer.buf, 0, 2000);
Paul Bakkerc73079a2014-04-25 16:34:30 +0200152 buffer.ptr = buffer.buf;
153
Yanray Wangaad94492023-12-04 10:42:06 +0800154 TEST_EQUAL(mbedtls_ssl_config_defaults(&conf,
155 MBEDTLS_SSL_IS_CLIENT,
156 MBEDTLS_SSL_TRANSPORT_STREAM,
157 MBEDTLS_SSL_PRESET_DEFAULT),
158 0);
Ronald Cronaab4a542024-02-23 18:51:11 +0100159 mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +0100160 mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
Jerry Yub19ccc32021-08-09 17:44:56 +0800161
Gilles Peskine449bd832023-01-11 14:50:10 +0100162 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
Manuel Pégourié-Gonnardd5a9e412015-05-04 11:11:42 +0200163
Gilles Peskine449bd832023-01-11 14:50:10 +0100164 mbedtls_debug_set_threshold(threshold);
Paul Bakkerc73079a2014-04-25 16:34:30 +0200165
Gilles Peskine449bd832023-01-11 14:50:10 +0100166 mbedtls_debug_print_msg(&ssl, level, file, line,
167 "Text message, 2 == %d", 2);
Paul Bakkerc73079a2014-04-25 16:34:30 +0200168
Gilles Peskine449bd832023-01-11 14:50:10 +0100169 TEST_ASSERT(strcmp(buffer.buf, result_str) == 0);
Manuel Pégourié-Gonnardd5a9e412015-05-04 11:11:42 +0200170
171exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100172 mbedtls_ssl_free(&ssl);
173 mbedtls_ssl_config_free(&conf);
Valerio Setti84733902024-06-27 08:05:09 +0200174 MD_OR_USE_PSA_DONE();
Paul Bakkerc73079a2014-04-25 16:34:30 +0200175}
176/* END_CASE */
177
Bence Szépkúti12210522025-02-28 16:22:33 +0100178/* BEGIN_CASE depends_on:MBEDTLS_SSL_TLS_C */
Gilles Peskine449bd832023-01-11 14:50:10 +0100179void mbedtls_debug_print_ret(char *file, int line, char *text, int value,
180 char *result_str)
Paul Bakker57ffa552014-04-25 14:29:10 +0200181{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200182 mbedtls_ssl_context ssl;
Manuel Pégourié-Gonnarddef0bbe2015-05-04 14:56:36 +0200183 mbedtls_ssl_config conf;
Paul Bakker57ffa552014-04-25 14:29:10 +0200184 struct buffer_data buffer;
185
Gilles Peskine449bd832023-01-11 14:50:10 +0100186 mbedtls_ssl_init(&ssl);
187 mbedtls_ssl_config_init(&conf);
Valerio Setti3a994b72024-07-03 16:58:10 +0200188 MD_OR_USE_PSA_INIT();
Gilles Peskine449bd832023-01-11 14:50:10 +0100189 memset(buffer.buf, 0, 2000);
Paul Bakker57ffa552014-04-25 14:29:10 +0200190 buffer.ptr = buffer.buf;
191
Yanray Wangaad94492023-12-04 10:42:06 +0800192 TEST_EQUAL(mbedtls_ssl_config_defaults(&conf,
193 MBEDTLS_SSL_IS_CLIENT,
194 MBEDTLS_SSL_TRANSPORT_STREAM,
195 MBEDTLS_SSL_PRESET_DEFAULT),
196 0);
Ronald Cronaab4a542024-02-23 18:51:11 +0100197 mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +0100198 mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
Paul Bakker57ffa552014-04-25 14:29:10 +0200199
Gilles Peskine449bd832023-01-11 14:50:10 +0100200 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
Jerry Yub19ccc32021-08-09 17:44:56 +0800201
Gilles Peskine449bd832023-01-11 14:50:10 +0100202 mbedtls_debug_print_ret(&ssl, 0, file, line, text, value);
Paul Bakker57ffa552014-04-25 14:29:10 +0200203
Gilles Peskine449bd832023-01-11 14:50:10 +0100204 TEST_ASSERT(strcmp(buffer.buf, result_str) == 0);
Manuel Pégourié-Gonnardd5a9e412015-05-04 11:11:42 +0200205
206exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100207 mbedtls_ssl_free(&ssl);
208 mbedtls_ssl_config_free(&conf);
Valerio Setti84733902024-06-27 08:05:09 +0200209 MD_OR_USE_PSA_DONE();
Paul Bakker57ffa552014-04-25 14:29:10 +0200210}
211/* END_CASE */
212
Bence Szépkúti12210522025-02-28 16:22:33 +0100213/* BEGIN_CASE depends_on:MBEDTLS_SSL_TLS_C */
Gilles Peskine449bd832023-01-11 14:50:10 +0100214void mbedtls_debug_print_buf(char *file, int line, char *text,
215 data_t *data, char *result_str)
Paul Bakker57ffa552014-04-25 14:29:10 +0200216{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200217 mbedtls_ssl_context ssl;
Manuel Pégourié-Gonnarddef0bbe2015-05-04 14:56:36 +0200218 mbedtls_ssl_config conf;
Paul Bakker57ffa552014-04-25 14:29:10 +0200219 struct buffer_data buffer;
Paul Bakker57ffa552014-04-25 14:29:10 +0200220
Gilles Peskine449bd832023-01-11 14:50:10 +0100221 mbedtls_ssl_init(&ssl);
222 mbedtls_ssl_config_init(&conf);
Valerio Setti3a994b72024-07-03 16:58:10 +0200223 MD_OR_USE_PSA_INIT();
Gilles Peskine449bd832023-01-11 14:50:10 +0100224 memset(buffer.buf, 0, 2000);
Paul Bakker57ffa552014-04-25 14:29:10 +0200225 buffer.ptr = buffer.buf;
226
Yanray Wangaad94492023-12-04 10:42:06 +0800227 TEST_EQUAL(mbedtls_ssl_config_defaults(&conf,
228 MBEDTLS_SSL_IS_CLIENT,
229 MBEDTLS_SSL_TRANSPORT_STREAM,
230 MBEDTLS_SSL_PRESET_DEFAULT),
231 0);
Ronald Cronaab4a542024-02-23 18:51:11 +0100232 mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +0100233 mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
Paul Bakker57ffa552014-04-25 14:29:10 +0200234
Gilles Peskine449bd832023-01-11 14:50:10 +0100235 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
Jerry Yub19ccc32021-08-09 17:44:56 +0800236
Gilles Peskine449bd832023-01-11 14:50:10 +0100237 mbedtls_debug_print_buf(&ssl, 0, file, line, text, data->x, data->len);
Paul Bakker57ffa552014-04-25 14:29:10 +0200238
Gilles Peskine449bd832023-01-11 14:50:10 +0100239 TEST_ASSERT(strcmp(buffer.buf, result_str) == 0);
Manuel Pégourié-Gonnardd5a9e412015-05-04 11:11:42 +0200240
241exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100242 mbedtls_ssl_free(&ssl);
243 mbedtls_ssl_config_free(&conf);
Valerio Setti84733902024-06-27 08:05:09 +0200244 MD_OR_USE_PSA_DONE();
Paul Bakker57ffa552014-04-25 14:29:10 +0200245}
246/* END_CASE */
247
Bence Szépkúti12210522025-02-28 16:22:33 +0100248/* BEGIN_CASE depends_on:MBEDTLS_SSL_TLS_C:MBEDTLS_FS_IO:MBEDTLS_X509_CRT_PARSE_C:!MBEDTLS_X509_REMOVE_INFO */
Gilles Peskine449bd832023-01-11 14:50:10 +0100249void mbedtls_debug_print_crt(char *crt_file, char *file, int line,
250 char *prefix, char *result_str)
Paul Bakker1f761152010-02-18 18:16:31 +0000251{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200252 mbedtls_x509_crt crt;
253 mbedtls_ssl_context ssl;
Manuel Pégourié-Gonnarddef0bbe2015-05-04 14:56:36 +0200254 mbedtls_ssl_config conf;
Paul Bakker1f761152010-02-18 18:16:31 +0000255 struct buffer_data buffer;
256
Gilles Peskine449bd832023-01-11 14:50:10 +0100257 mbedtls_ssl_init(&ssl);
258 mbedtls_ssl_config_init(&conf);
259 mbedtls_x509_crt_init(&crt);
Valerio Setti92c3f362023-05-17 15:36:44 +0200260 MD_OR_USE_PSA_INIT();
261
Gilles Peskine449bd832023-01-11 14:50:10 +0100262 memset(buffer.buf, 0, 2000);
Paul Bakker57ffa552014-04-25 14:29:10 +0200263 buffer.ptr = buffer.buf;
Paul Bakker1f761152010-02-18 18:16:31 +0000264
Yanray Wangaad94492023-12-04 10:42:06 +0800265 TEST_EQUAL(mbedtls_ssl_config_defaults(&conf,
266 MBEDTLS_SSL_IS_CLIENT,
267 MBEDTLS_SSL_TRANSPORT_STREAM,
268 MBEDTLS_SSL_PRESET_DEFAULT),
269 0);
Ronald Cronaab4a542024-02-23 18:51:11 +0100270 mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +0100271 mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
Paul Bakker1f761152010-02-18 18:16:31 +0000272
Gilles Peskine449bd832023-01-11 14:50:10 +0100273 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
Jerry Yub19ccc32021-08-09 17:44:56 +0800274
Gilles Peskine449bd832023-01-11 14:50:10 +0100275 TEST_ASSERT(mbedtls_x509_crt_parse_file(&crt, crt_file) == 0);
276 mbedtls_debug_print_crt(&ssl, 0, file, line, prefix, &crt);
Paul Bakker1f761152010-02-18 18:16:31 +0000277
Gilles Peskine449bd832023-01-11 14:50:10 +0100278 TEST_ASSERT(strcmp(buffer.buf, result_str) == 0);
Paul Bakker58ef6ec2013-01-03 11:33:48 +0100279
Paul Bakkerbd51b262014-07-10 15:26:12 +0200280exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100281 mbedtls_x509_crt_free(&crt);
282 mbedtls_ssl_free(&ssl);
283 mbedtls_ssl_config_free(&conf);
Valerio Setti92c3f362023-05-17 15:36:44 +0200284 MD_OR_USE_PSA_DONE();
Paul Bakker1f761152010-02-18 18:16:31 +0000285}
Paul Bakker33b43f12013-08-20 11:48:36 +0200286/* END_CASE */
Paul Bakkerbe4e7dc2011-03-14 20:41:31 +0000287
Bence Szépkúti12210522025-02-28 16:22:33 +0100288/* BEGIN_CASE depends_on:MBEDTLS_SSL_TLS_C:MBEDTLS_BIGNUM_C */
Gilles Peskine449bd832023-01-11 14:50:10 +0100289void mbedtls_debug_print_mpi(char *value, char *file, int line,
290 char *prefix, char *result_str)
Paul Bakkerbe4e7dc2011-03-14 20:41:31 +0000291{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200292 mbedtls_ssl_context ssl;
Manuel Pégourié-Gonnarddef0bbe2015-05-04 14:56:36 +0200293 mbedtls_ssl_config conf;
Paul Bakkerbe4e7dc2011-03-14 20:41:31 +0000294 struct buffer_data buffer;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200295 mbedtls_mpi val;
Paul Bakkerbe4e7dc2011-03-14 20:41:31 +0000296
Gilles Peskine449bd832023-01-11 14:50:10 +0100297 mbedtls_ssl_init(&ssl);
298 mbedtls_ssl_config_init(&conf);
299 mbedtls_mpi_init(&val);
Valerio Setti3a994b72024-07-03 16:58:10 +0200300 MD_OR_USE_PSA_INIT();
Gilles Peskine449bd832023-01-11 14:50:10 +0100301 memset(buffer.buf, 0, 2000);
Paul Bakker57ffa552014-04-25 14:29:10 +0200302 buffer.ptr = buffer.buf;
Paul Bakkerbe4e7dc2011-03-14 20:41:31 +0000303
Yanray Wangaad94492023-12-04 10:42:06 +0800304 TEST_EQUAL(mbedtls_ssl_config_defaults(&conf,
305 MBEDTLS_SSL_IS_CLIENT,
306 MBEDTLS_SSL_TRANSPORT_STREAM,
307 MBEDTLS_SSL_PRESET_DEFAULT),
308 0);
Ronald Cronaab4a542024-02-23 18:51:11 +0100309 mbedtls_ssl_conf_rng(&conf, mbedtls_test_random, NULL);
Gilles Peskine449bd832023-01-11 14:50:10 +0100310 mbedtls_ssl_conf_dbg(&conf, string_debug, &buffer);
Jerry Yub19ccc32021-08-09 17:44:56 +0800311
Gilles Peskine449bd832023-01-11 14:50:10 +0100312 TEST_ASSERT(mbedtls_ssl_setup(&ssl, &conf) == 0);
Manuel Pégourié-Gonnardd5a9e412015-05-04 11:11:42 +0200313
Gilles Peskine449bd832023-01-11 14:50:10 +0100314 TEST_ASSERT(mbedtls_test_read_mpi(&val, value) == 0);
Paul Bakkereaebbd52014-04-25 15:04:14 +0200315
Gilles Peskine449bd832023-01-11 14:50:10 +0100316 mbedtls_debug_print_mpi(&ssl, 0, file, line, prefix, &val);
Paul Bakkerbe4e7dc2011-03-14 20:41:31 +0000317
Gilles Peskine449bd832023-01-11 14:50:10 +0100318 TEST_ASSERT(strcmp(buffer.buf, result_str) == 0);
Paul Bakker6c591fa2011-05-05 11:49:20 +0000319
Paul Bakkerbd51b262014-07-10 15:26:12 +0200320exit:
Gilles Peskine449bd832023-01-11 14:50:10 +0100321 mbedtls_mpi_free(&val);
322 mbedtls_ssl_free(&ssl);
323 mbedtls_ssl_config_free(&conf);
Valerio Setti84733902024-06-27 08:05:09 +0200324 MD_OR_USE_PSA_DONE();
Paul Bakkerbe4e7dc2011-03-14 20:41:31 +0000325}
Paul Bakker33b43f12013-08-20 11:48:36 +0200326/* END_CASE */