The ustream_ssl_update_own_cert() function should, like the name suggests, only
update the local ssl peer's own certificate and not the any of the CA's.
By overwriting the CA's certifcates when setting the own certificate, the code
broke SSL client verification.
This bug was only triggerd when:
Hi Daniel,
On Sun, Dec 08, 2019 at 05:14:19PM +0100, Daniel Danzberger wrote:
> Signed-off-by: Daniel Danzberger
> ---
> ustream-mbedtls.c | 7 ---
> 1 file changed, 7 deletions(-)
Please provide a more elaborate commit description as it is not obvious
why those lines need to be removed.
>
Signed-off-by: Daniel Danzberger
---
ustream-mbedtls.c | 7 ---
1 file changed, 7 deletions(-)
diff --git a/ustream-mbedtls.c b/ustream-mbedtls.c
index 85bbb1c..74c27a5 100644
--- a/ustream-mbedtls.c
+++ b/ustream-mbedtls.c
@@ -182,16 +182,9 @@ static void ustream_ssl_update_own_cert(struct