Fix for sniffer with TLS v1.2 session ticket. Logic broken in PR #3044. ZD 10926.

This commit is contained in:
David Garske
2020-09-29 11:11:32 -07:00
parent 46b9531bec
commit 3e0d478543

View File

@@ -2607,8 +2607,8 @@ static int ProcessSessionTicket(const byte* input, int* sslBytes,
else
#endif /* WOLFSSL_TLS13 */
{
/* make sure ticket id isn't too long */
if (len > ID_LEN) {
/* capture last part of sessionID as macID (32 bytes) */
if (len < ID_LEN) {
SetError(BAD_INPUT_STR, error, session, FATAL_ERROR_STATE);
return -1;
}