JDK-8368514 : TLS stateless session ticket decryption fails on some providers
  • Type: Bug
  • Component: security-libs
  • Sub-Component: javax.net.ssl
  • Affected Version: 13,26
  • Priority: P4
  • Status: Resolved
  • Resolution: Fixed
  • Submitted: 2025-09-24
  • Updated: 2025-09-28
  • Resolved: 2025-09-25
The Version table provides details related to the release that this issue/RFE will be addressed.

Unresolved : Release in which this issue/RFE will be addressed.
Resolved: Release in which this issue/RFE has been resolved.
Fixed : Release in which this issue/RFE has been fixed. The release containing this fix may be available for download as an Early Access Release or a General Availability Release.

To download the current JDK release, click here.
JDK 26
26 masterFixed
Related Reports
Relates :  
Description
Observed when testing SunPKCS11, but may also affect other providers.

Session ticket decryption assumes that the cipher in use will work with the minimal output buffer size. However, due to a limitation of older NSS versions, SunPKCS11 AES cipher requires a larger buffer size for decryption [1], and the decryption fails with a ShortBufferException.

[1] https://github.com/openjdk/jdk/blob/303686684c23db465ccfb6a9b4861a673bfa5f4b/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/P11AEADCipher.java#L500-L503
Comments
Changeset: 3c9fd768 Branch: master Author: Daniel JeliƄski <djelinski@openjdk.org> Date: 2025-09-25 18:47:32 +0000 URL: https://git.openjdk.org/jdk/commit/3c9fd7688f4d73067db9b128c329ca7603a60578
25-09-2025

A pull request was submitted for review. Branch: master URL: https://git.openjdk.org/jdk/pull/27463 Date: 2025-09-24 08:08:11 +0000
24-09-2025