RFR: 8368514: TLS stateless session ticket decryption fails on some providers

Artur Barashev abarashev at openjdk.org
Wed Sep 24 15:41:29 UTC 2025


On Wed, 24 Sep 2025 08:08:11 GMT, Daniel Jeliński <djelinski at openjdk.org> wrote:

> Please review this trivial patch that fixes stateless session resumption with JCE providers that require extra space for AES/GCM decryption.
> 
> I modified the existing FipsModeTLS12 test to additionally verify that session resumption works. The TLS 1.3 test resumes the session using a stateless ticket; the TLS 1.2 test uses stateful sessions, because stateless ticket creation fails for other reasons.
> 
> Tier1-3 tests continue to pass.

test/jdk/sun/security/pkcs11/tls/tls12/FipsModeTLS12.java line 35:

> 33:  * @run main/othervm/timeout=120 -Djdk.tls.client.protocols=TLSv1.2
> 34:  *      -Djdk.tls.useExtendedMasterSecret=false
> 35:  *      -Djdk.tls.client.enableSessionTicketExtension=false FipsModeTLS12

Why do we need to set `jdk.tls.client.enableSessionTicketExtension` to false?

test/jdk/sun/security/pkcs11/tls/tls12/FipsModeTLS12.java line 282:

> 280:                 SSLEngine clientSSLEngine = engineToTest[0];
> 281:                 SSLEngine serverSSLEngine = engineToTest[1];
> 282:                 // Check that session resumption works

I would put more details in this comment about what exactly we are testing here: stateless session ticket decryption using the most preferred currently installed provider - NSS.

-------------

PR Review Comment: https://git.openjdk.org/jdk/pull/27463#discussion_r2376211880
PR Review Comment: https://git.openjdk.org/jdk/pull/27463#discussion_r2376204562


More information about the security-dev mailing list