Topic: WolfSSL 4.8.1: Invalid client ticket handshake failure
When a client presents a ticket that causes DoClientTicket() to return an error (e.g., -1), the ticket should be disregarded and the handshake should complete. The current implementation instead terminates the handshake. If the client then retries with the same ticket, the connection attempts will loop forever - a pretty fatal real-world outcome.
Please change the logic in TLSX_SessionTicket_Parse() (under /* got actual ticket from client */) accordingly.
Thank you very much in advance!