Hi,


We are trying to port Iotivity-1.2.0 to MIPS platform with security enabled
(SECURED=1).

We run sampleserver_justworks and provisioningclient in the same device and
always get handshake error.

Anyone ever see similar message? Do we miss something? 

Any hint is greatly appreciated.



Thank you so much.



June



An short excerpt of server error log is as below:

==

10:43.319 DEBUG: OIC_CA_NET_SSL: In RecvCallBack

10:43.319 DEBUG: OIC_CA_NET_SSL: Out RecvCallBack

10:43.319 DEBUG: MBED_TLS: ssl->f_recv(_timeout)() returned 0 (-0x0000)

10:43.319 DEBUG: MBED_TLS: mbedtls_ssl_fetch_input() returned -29312
(-0x7280)

10:43.319 DEBUG: MBED_TLS: mbedtls_ssl_read_record_layer() returned -29312
(-0x7280)

10:43.319 DEBUG: MBED_TLS: mbedtls_ssl_read_record() returned -29312
(-0x7280)

10:43.319 DEBUG: MBED_TLS: server state: 8

10:43.319 DEBUG: MBED_TLS: => flush output

10:43.319 DEBUG: MBED_TLS: <= flush output

10:43.319 DEBUG: MBED_TLS: => parse client key exchange

10:43.319 DEBUG: MBED_TLS: => read record

10:43.319 DEBUG: MBED_TLS: => fetch input

10:43.324 DEBUG: MBED_TLS: in_left: 0, nb_want: 13

10:43.324 DEBUG: MBED_TLS: f_recv_timeout: 1000 ms

10:43.324 DEBUG: OIC_CA_NET_SSL: In RecvCallBack

10:43.324 DEBUG: OIC_CA_NET_SSL: Out RecvCallBack

10:43.324 DEBUG: MBED_TLS: ssl->f_recv(_timeout)() returned 0 (-0x0000)

10:43.324 DEBUG: MBED_TLS: mbedtls_ssl_fetch_input() returned -29312
(-0x7280)

10:43.324 DEBUG: MBED_TLS: mbedtls_ssl_read_record_layer() returned -29312
(-0x7280)

10:43.325 DEBUG: MBED_TLS: mbedtls_ssl_read_record() returned -29312
(-0x7280)

10:43.320 DEBUG: OIC_CA_NET_SSL: Out CAdecryptSsl

10:43.325 DEBUG: OIC_CA_IP_SERVER: CAdecryptSsl returns [0]

10:43.325 DEBUG: OIC_CA_NET_SSL: In CAdecryptSsl

10:43.325 DEBUG: OIC_CA_NET_SSL: In GetSslPeer

10:43.325 DEBUG: OIC_CA_NET_SSL: Compare [10.10.10.254:35253] and
[10.10.10.254:35253]

10:43.325 DEBUG: OIC_CA_NET_SSL: Out GetSslPeer

10:43.325 DEBUG: MBED_TLS: server state: 8

10:43.325 DEBUG: MBED_TLS: => flush output

10:43.325 DEBUG: MBED_TLS: <= flush output

10:43.325 DEBUG: MBED_TLS: => parse client key exchange

10:43.325 DEBUG: MBED_TLS: => read record

10:43.325 DEBUG: MBED_TLS: => fetch input

10:43.325 DEBUG: MBED_TLS: in_left: 0, nb_want: 13

10:43.325 DEBUG: MBED_TLS: f_recv_timeout: 1000 ms

10:43.325 DEBUG: OIC_CA_NET_SSL: In RecvCallBack

10:43.325 DEBUG: OIC_CA_NET_SSL: Out RecvCallBack

10:43.325 DEBUG: MBED_TLS: ssl->f_recv(_timeout)() returned 15 (-0xfffffff1)

10:43.326 DEBUG: MBED_TLS: <= fetch input

10:43.326 DEBUG: MBED_TLS: dumping 'input record header' (13 bytes)

10:43.326 DEBUG: MBED_TLS: 0000:  15 fe fd 00 00 00 00 00 00 00 02 00 02
.............

10:43.326 DEBUG: MBED_TLS: input record: msgtype = 21, version = [3:3],
msglen = 2

10:43.326 DEBUG: MBED_TLS: => fetch input

10:43.326 DEBUG: MBED_TLS: in_left: 15, nb_want: 15

10:43.326 DEBUG: MBED_TLS: <= fetch input

10:43.326 DEBUG: MBED_TLS: dumping 'input record from network' (15 bytes)

10:43.326 DEBUG: MBED_TLS: 0000:  15 fe fd 00 00 00 00 00 00 00 02 00 02 02
28     ..............(

10:43.326 DEBUG: MBED_TLS: got an alert message, type: [2:40]

10:43.326 DEBUG: MBED_TLS: is a fatal alert message (msg 40)

10:43.326 DEBUG: MBED_TLS: mbedtls_ssl_handle_message_type() returned -30592
(-0x7780)

10:43.326 DEBUG: MBED_TLS: mbedtls_ssl_read_record() returned -30592
(-0x7780)

10:43.326 ERROR: OIC_CA_NET_SSL: Handshake error: -0x7780

10:43.326 DEBUG: OIC_CA_NET_SSL: In DeleteSslEndPoint

10:43.327 DEBUG: MBED_TLS: => free





-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
<http://lists.iotivity.org/pipermail/iotivity-dev/attachments/20161130/be8f11b6/attachment.html>

Reply via email to