From 46afd5d8fad4307fcdc23b74491216fb04ff5163 Mon Sep 17 00:00:00 2001 From: Jarno Lamsa Date: Tue, 17 Dec 2019 08:50:53 +0200 Subject: [PATCH] Fix CI issues Default flow assumes failure causes multiple issues with compatibility tests when the return value is initialised with error value in ssl_in_server_key_exchange_parse. The function would need a significant change in structure for this. --- library/ssl_cli.c | 2 +- library/ssl_srv.c | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/library/ssl_cli.c b/library/ssl_cli.c index 0a9f4a526..e0c104e01 100644 --- a/library/ssl_cli.c +++ b/library/ssl_cli.c @@ -2731,7 +2731,7 @@ static int ssl_in_server_key_exchange_parse( mbedtls_ssl_context *ssl, unsigned char *buf, size_t buflen ) { - volatile int ret = MBEDTLS_ERR_SSL_INTERNAL_ERROR; + volatile int ret = 0; unsigned char *p; unsigned char *end; diff --git a/library/ssl_srv.c b/library/ssl_srv.c index 38ff1ab47..8d14374c4 100644 --- a/library/ssl_srv.c +++ b/library/ssl_srv.c @@ -4632,8 +4632,8 @@ static int ssl_parse_certificate_verify( mbedtls_ssl_context *ssl ) MBEDTLS_SSL_DEBUG_MSG( 2, ( "<= parse certificate verify" ) ); goto exit; - } - + } + } MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_pk_verify", ret );