Hi,
We are trying to port Iotivity-1.2.0 to MIPS platform with security enabled (SECURED=1). We run sampleserver_justworks and provisioningclient in the same device and always get handshake error. Anyone ever see similar message? Do we miss something? Any hint is greatly appreciated. Thank you so much. June An short excerpt of server error log is as below: == 10:43.319 DEBUG: OIC_CA_NET_SSL: In RecvCallBack 10:43.319 DEBUG: OIC_CA_NET_SSL: Out RecvCallBack 10:43.319 DEBUG: MBED_TLS: ssl->f_recv(_timeout)() returned 0 (-0x0000) 10:43.319 DEBUG: MBED_TLS: mbedtls_ssl_fetch_input() returned -29312 (-0x7280) 10:43.319 DEBUG: MBED_TLS: mbedtls_ssl_read_record_layer() returned -29312 (-0x7280) 10:43.319 DEBUG: MBED_TLS: mbedtls_ssl_read_record() returned -29312 (-0x7280) 10:43.319 DEBUG: MBED_TLS: server state: 8 10:43.319 DEBUG: MBED_TLS: => flush output 10:43.319 DEBUG: MBED_TLS: <= flush output 10:43.319 DEBUG: MBED_TLS: => parse client key exchange 10:43.319 DEBUG: MBED_TLS: => read record 10:43.319 DEBUG: MBED_TLS: => fetch input 10:43.324 DEBUG: MBED_TLS: in_left: 0, nb_want: 13 10:43.324 DEBUG: MBED_TLS: f_recv_timeout: 1000 ms 10:43.324 DEBUG: OIC_CA_NET_SSL: In RecvCallBack 10:43.324 DEBUG: OIC_CA_NET_SSL: Out RecvCallBack 10:43.324 DEBUG: MBED_TLS: ssl->f_recv(_timeout)() returned 0 (-0x0000) 10:43.324 DEBUG: MBED_TLS: mbedtls_ssl_fetch_input() returned -29312 (-0x7280) 10:43.324 DEBUG: MBED_TLS: mbedtls_ssl_read_record_layer() returned -29312 (-0x7280) 10:43.325 DEBUG: MBED_TLS: mbedtls_ssl_read_record() returned -29312 (-0x7280) 10:43.320 DEBUG: OIC_CA_NET_SSL: Out CAdecryptSsl 10:43.325 DEBUG: OIC_CA_IP_SERVER: CAdecryptSsl returns [0] 10:43.325 DEBUG: OIC_CA_NET_SSL: In CAdecryptSsl 10:43.325 DEBUG: OIC_CA_NET_SSL: In GetSslPeer 10:43.325 DEBUG: OIC_CA_NET_SSL: Compare [10.10.10.254:35253] and [10.10.10.254:35253] 10:43.325 DEBUG: OIC_CA_NET_SSL: Out GetSslPeer 10:43.325 DEBUG: MBED_TLS: server state: 8 10:43.325 DEBUG: MBED_TLS: => flush output 10:43.325 DEBUG: MBED_TLS: <= flush output 10:43.325 DEBUG: MBED_TLS: => parse client key exchange 10:43.325 DEBUG: MBED_TLS: => read record 10:43.325 DEBUG: MBED_TLS: => fetch input 10:43.325 DEBUG: MBED_TLS: in_left: 0, nb_want: 13 10:43.325 DEBUG: MBED_TLS: f_recv_timeout: 1000 ms 10:43.325 DEBUG: OIC_CA_NET_SSL: In RecvCallBack 10:43.325 DEBUG: OIC_CA_NET_SSL: Out RecvCallBack 10:43.325 DEBUG: MBED_TLS: ssl->f_recv(_timeout)() returned 15 (-0xfffffff1) 10:43.326 DEBUG: MBED_TLS: <= fetch input 10:43.326 DEBUG: MBED_TLS: dumping 'input record header' (13 bytes) 10:43.326 DEBUG: MBED_TLS: 0000: 15 fe fd 00 00 00 00 00 00 00 02 00 02 ............. 10:43.326 DEBUG: MBED_TLS: input record: msgtype = 21, version = [3:3], msglen = 2 10:43.326 DEBUG: MBED_TLS: => fetch input 10:43.326 DEBUG: MBED_TLS: in_left: 15, nb_want: 15 10:43.326 DEBUG: MBED_TLS: <= fetch input 10:43.326 DEBUG: MBED_TLS: dumping 'input record from network' (15 bytes) 10:43.326 DEBUG: MBED_TLS: 0000: 15 fe fd 00 00 00 00 00 00 00 02 00 02 02 28 ..............( 10:43.326 DEBUG: MBED_TLS: got an alert message, type: [2:40] 10:43.326 DEBUG: MBED_TLS: is a fatal alert message (msg 40) 10:43.326 DEBUG: MBED_TLS: mbedtls_ssl_handle_message_type() returned -30592 (-0x7780) 10:43.326 DEBUG: MBED_TLS: mbedtls_ssl_read_record() returned -30592 (-0x7780) 10:43.326 ERROR: OIC_CA_NET_SSL: Handshake error: -0x7780 10:43.326 DEBUG: OIC_CA_NET_SSL: In DeleteSslEndPoint 10:43.327 DEBUG: MBED_TLS: => free -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.iotivity.org/pipermail/iotivity-dev/attachments/20161130/be8f11b6/attachment.html>