... instead of when it doesn't fail. Looks like 'someone' mixed up the
mbedtls return style (0 means success) with the openvpn internal return
style (true means success).
Signed-off-by: Steffan Karger <steffan.karger@fox-it.com>
Acked-by: Antonio Quartulli <antonio@openvpn.net>
Message-Id: <1535544286-29638-1-git-send-email-steffan.karger@fox-it.com>
URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg17428.html
Signed-off-by: Gert Doering <gert@greenie.muc.de>
... | ... |
@@ -853,7 +853,7 @@ tls_ctx_personalise_random(struct tls_root_ctx *ctx) |
853 | 853 |
const md_kt_t *sha256_kt = md_kt_get("SHA256"); |
854 | 854 |
mbedtls_x509_crt *cert = ctx->crt_chain; |
855 | 855 |
|
856 |
- if (0 != md_full(sha256_kt, cert->tbs.p, cert->tbs.len, sha256_hash)) |
|
856 |
+ if (!md_full(sha256_kt, cert->tbs.p, cert->tbs.len, sha256_hash)) |
|
857 | 857 |
{ |
858 | 858 |
msg(M_WARN, "WARNING: failed to personalise random"); |
859 | 859 |
} |