EAP-TLS: Extend TLS version config to allow TLS v1.3 to be disabled
This may be needed to avoid interoperability issues with the new protocol version and significant changes for EAP use cases in both key derivation and handshake termination. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
0d34c13a72
commit
bbbc7e8016
5 changed files with 15 additions and 0 deletions
|
@ -80,6 +80,10 @@ static void eap_tls_params_flags(struct tls_connection_params *params,
|
|||
params->flags |= TLS_CONN_DISABLE_TLSv1_2;
|
||||
if (os_strstr(txt, "tls_disable_tlsv1_2=0"))
|
||||
params->flags &= ~TLS_CONN_DISABLE_TLSv1_2;
|
||||
if (os_strstr(txt, "tls_disable_tlsv1_3=1"))
|
||||
params->flags |= TLS_CONN_DISABLE_TLSv1_3;
|
||||
if (os_strstr(txt, "tls_disable_tlsv1_3=0"))
|
||||
params->flags &= ~TLS_CONN_DISABLE_TLSv1_3;
|
||||
if (os_strstr(txt, "tls_ext_cert_check=1"))
|
||||
params->flags |= TLS_CONN_EXT_CERT_CHECK;
|
||||
if (os_strstr(txt, "tls_ext_cert_check=0"))
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue