-
Bug
-
Resolution: Fixed
-
P4
-
13, 26
-
None
-
b18
Observed when testing SunPKCS11, but may also affect other providers.
Session ticket decryption assumes that the cipher in use will work with the minimal output buffer size. However, due to a limitation of older NSS versions, SunPKCS11 AES cipher requires a larger buffer size for decryption [1], and the decryption fails with a ShortBufferException.
[1] https://github.com/openjdk/jdk/blob/303686684c23db465ccfb6a9b4861a673bfa5f4b/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11AEADCipher.java#L500-L503
Session ticket decryption assumes that the cipher in use will work with the minimal output buffer size. However, due to a limitation of older NSS versions, SunPKCS11 AES cipher requires a larger buffer size for decryption [1], and the decryption fails with a ShortBufferException.
[1] https://github.com/openjdk/jdk/blob/303686684c23db465ccfb6a9b4861a673bfa5f4b/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11AEADCipher.java#L500-L503
- relates to
-
JDK-8368824 Multiple httpclient tests pass and then time out on Windows
-
- Open
-
-
JDK-8368669 TLS 1.2 stateless session ticket creation fails when master key is not extractable
-
- Open
-
- links to
-
Commit(master) openjdk/jdk/3c9fd768
-
Review(master) openjdk/jdk/27463