]> git.ipfire.org Git - thirdparty/openvpn.git/commitdiff
mbedtls: print warning if random personalisation fails
authorSteffan Karger <steffan.karger@fox-it.com>
Wed, 29 Aug 2018 12:04:46 +0000 (14:04 +0200)
committerGert Doering <gert@greenie.muc.de>
Mon, 3 Sep 2018 08:27:34 +0000 (10:27 +0200)
... instead of when it doesn't fail.  Looks like 'someone' mixed up the
mbedtls return style (0 means success) with the openvpn internal return
style (true means success).

Signed-off-by: Steffan Karger <steffan.karger@fox-it.com>
Acked-by: Antonio Quartulli <antonio@openvpn.net>
Message-Id: <1535544286-29638-1-git-send-email-steffan.karger@fox-it.com>
URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg17428.html
Signed-off-by: Gert Doering <gert@greenie.muc.de>
(cherry picked from commit dd1da0e485a3d161feb5230b6aa57df11ea72705)

src/openvpn/ssl_mbedtls.c

index 3f579e1e8b8e022a4c26a01e255927ec0b686c98..66e529fa831e66ba3d5f8884b8e63b4e3c6b2e4d 100644 (file)
@@ -853,7 +853,7 @@ tls_ctx_personalise_random(struct tls_root_ctx *ctx)
         const md_kt_t *sha256_kt = md_kt_get("SHA256");
         mbedtls_x509_crt *cert = ctx->crt_chain;
 
-        if (0 != md_full(sha256_kt, cert->tbs.p, cert->tbs.len, sha256_hash))
+        if (!md_full(sha256_kt, cert->tbs.p, cert->tbs.len, sha256_hash))
         {
             msg(M_WARN, "WARNING: failed to personalise random");
         }