From f61a98068695994bcfddc1146e7744f50296f9b9 Mon Sep 17 00:00:00 2001 From: Vladislav Vaintroub Date: Fri, 26 Jul 2019 17:01:36 +0200 Subject: Update WolfSSL, remove older workarounds. --- mysys_ssl/my_crypt.cc | 16 ---------------- 1 file changed, 16 deletions(-) (limited to 'mysys_ssl/my_crypt.cc') diff --git a/mysys_ssl/my_crypt.cc b/mysys_ssl/my_crypt.cc index fda909e6530..02770644259 100644 --- a/mysys_ssl/my_crypt.cc +++ b/mysys_ssl/my_crypt.cc @@ -88,24 +88,8 @@ public: } virtual int finish(uchar *dst, uint *dlen) { -#ifdef HAVE_WOLFSSL - /* - Bug in WolfSSL - sometimes EVP_CipherFinal_ex - returns success without setting destination length - when it should return error. - We catch it by presetting invalid value for length, - and checking if it has changed after the call. - - See https://github.com/wolfSSL/wolfssl/issues/2224 - */ - *dlen= UINT_MAX; -#endif if (EVP_CipherFinal_ex(ctx, dst, (int*)dlen) != 1) return MY_AES_BAD_DATA; -#ifdef HAVE_WOLFSSL - if (*dlen == UINT_MAX) - return MY_AES_BAD_DATA; -#endif return MY_AES_OK; } }; -- cgit v1.2.1