From: Steffan Karger Date: Wed, 29 Aug 2018 12:04:46 +0000 (+0200) Subject: mbedtls: print warning if random personalisation fails X-Git-Tag: v2.5_beta1~445 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=dd1da0e485a3d161feb5230b6aa57df11ea72705;p=thirdparty%2Fopenvpn.git mbedtls: print warning if random personalisation fails ... instead of when it doesn't fail. Looks like 'someone' mixed up the mbedtls return style (0 means success) with the openvpn internal return style (true means success). Signed-off-by: Steffan Karger Acked-by: Antonio Quartulli Message-Id: <1535544286-29638-1-git-send-email-steffan.karger@fox-it.com> URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg17428.html Signed-off-by: Gert Doering --- diff --git a/src/openvpn/ssl_mbedtls.c b/src/openvpn/ssl_mbedtls.c index 8e31980a3..ef83e6504 100644 --- a/src/openvpn/ssl_mbedtls.c +++ b/src/openvpn/ssl_mbedtls.c @@ -853,7 +853,7 @@ tls_ctx_personalise_random(struct tls_root_ctx *ctx) const md_kt_t *sha256_kt = md_kt_get("SHA256"); mbedtls_x509_crt *cert = ctx->crt_chain; - if (0 != md_full(sha256_kt, cert->tbs.p, cert->tbs.len, sha256_hash)) + if (!md_full(sha256_kt, cert->tbs.p, cert->tbs.len, sha256_hash)) { msg(M_WARN, "WARNING: failed to personalise random"); }