The wrong return value was checked, resulting in dead code and
potential bugs.
It should fix GitHub issue #2005.
This patch should be backported up to 2.5.
rxresp
expect resp.status == 200
expect resp.http.x-jwt-alg == "ES512"
- expect resp.http.x-jwt-verify-ES512 == "0"
+ # Invalid token
+ expect resp.http.x-jwt-verify-ES512 == "-3"
} -run
*/
if (is_ecdsa) {
int conv_retval = convert_ecdsa_sig(ctx, entry->pkey, decoded_signature);
- if (retval != 0) {
+ if (conv_retval != 0) {
retval = conv_retval;
goto end;
}