Use TLSEXT_KEYNAME_LENGTH in tls_decrypt_ticket.
authorBernd Edlinger <bernd.edlinger@hotmail.de>
Mon, 13 Feb 2017 17:36:13 +0000 (18:36 +0100)
committerRich Salz <rsalz@openssl.org>
Tue, 14 Feb 2017 19:45:08 +0000 (14:45 -0500)
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Rich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/2618)
(cherry picked from commit 57b0d651f052ed86528da916397acbcce035fb21)

ssl/t1_lib.c

index f1e4d29f7be3820fd37a65f29b2a1261ab61bdd7..b51d60a7cc5da693c51b5ec253e0d6277964dd0b 100644 (file)
@@ -3151,8 +3151,8 @@ static int tls_decrypt_ticket(SSL *s, const unsigned char *etick,
     }
     /* Attempt to decrypt session data */
     /* Move p after IV to start of encrypted ticket, update length */
-    p = etick + 16 + EVP_CIPHER_CTX_iv_length(ctx);
-    eticklen -= 16 + EVP_CIPHER_CTX_iv_length(ctx);
+    p = etick + TLSEXT_KEYNAME_LENGTH + EVP_CIPHER_CTX_iv_length(ctx);
+    eticklen -= TLSEXT_KEYNAME_LENGTH + EVP_CIPHER_CTX_iv_length(ctx);
     sdec = OPENSSL_malloc(eticklen);
     if (sdec == NULL || EVP_DecryptUpdate(ctx, sdec, &slen, p, eticklen) <= 0) {
         EVP_CIPHER_CTX_free(ctx);