{
break;
}
+ else if (-1 == ret)
+ {
+ OIC_LOG(ERROR, NET_SSL_TAG, "Handshake failed due to socket error");
+ RemovePeerFromList(&tep->sep.endpoint);
+ return NULL;
+ }
SSL_CHECK_FAIL(tep, ret, "Handshake error", 0, NULL, MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE);
}
OIC_LOG_V(DEBUG, NET_SSL_TAG, "Out %s", __func__);
oc_mutex_unlock(g_sslContextMutex);
return CA_STATUS_FAILED;
}
- int adapterIndex = GetAdapterIndex(peer->sep.endpoint.adapter);
- if (0 == adapterIndex || adapterIndex == 1)
+ else if (0 < ret)
{
- g_caSslContext->adapterCallbacks[adapterIndex].recvCallback(&peer->sep, decryptBuffer, ret);
- }
- else
- {
- OIC_LOG(ERROR, NET_SSL_TAG, "Unsuported adapter");
- RemovePeerFromList(&peer->sep.endpoint);
- oc_mutex_unlock(g_sslContextMutex);
- return CA_STATUS_FAILED;
+ int adapterIndex = GetAdapterIndex(peer->sep.endpoint.adapter);
+ if (0 == adapterIndex || adapterIndex == 1)
+ {
+ g_caSslContext->adapterCallbacks[adapterIndex].recvCallback(&peer->sep, decryptBuffer, ret);
+ }
+ else
+ {
+ OIC_LOG(ERROR, NET_SSL_TAG, "Unsuported adapter");
+ RemovePeerFromList(&peer->sep.endpoint);
+ oc_mutex_unlock(g_sslContextMutex);
+ return CA_STATUS_FAILED;
+ }
}
}