forked from wolfSSL/wolfssl
Ticket failure should result in a regular handshake
This commit is contained in:
@@ -30757,7 +30757,9 @@ static int DoSessionTicket(WOLFSSL* ssl, const byte* input, word32* inOutIdx,
|
|||||||
et->enc_ticket, inLen, &outLen,
|
et->enc_ticket, inLen, &outLen,
|
||||||
ssl->ctx->ticketEncCtx);
|
ssl->ctx->ticketEncCtx);
|
||||||
}
|
}
|
||||||
if (ret == WOLFSSL_TICKET_RET_FATAL || ret < 0) return ret;
|
if (ret == WOLFSSL_TICKET_RET_FATAL)
|
||||||
|
ret = WOLFSSL_TICKET_RET_REJECT;
|
||||||
|
if (ret < 0) return ret;
|
||||||
if (outLen > (int)inLen || outLen < (int)sizeof(InternalTicket)) {
|
if (outLen > (int)inLen || outLen < (int)sizeof(InternalTicket)) {
|
||||||
WOLFSSL_MSG("Bad user ticket decrypt len");
|
WOLFSSL_MSG("Bad user ticket decrypt len");
|
||||||
return BAD_TICKET_KEY_CB_SZ;
|
return BAD_TICKET_KEY_CB_SZ;
|
||||||
|
Reference in New Issue
Block a user