smlinux/net/wpa-supplicant/allow-tlsv1.patch
PktSurf b84f8a4a14 Upgraded base/chrony to version 4.4
Upgraded base/cmake to version 3.27.7
Upgraded base/glib to 2.78.1
Upgraded base/libvpx to 1.10.0
Added AMDGPU and BPF build targets to base/llvm
Added a patch to extra/ffmpegthumbnailer for fixing a build error against ffmpeg 5.X versions
Upgraded gtk/libwnck3 to 3.36.0
Upgraded heavybuilds/firefox to 115.5.0
Added some patches to base/wpa-supplicant
Added glslang to xorg
2023-12-10 23:23:41 +05:30

22 lines
666 B
Diff

From: Andrej Shadura <andrewsh@debian.org>
Subject: Enable TLSv1.0 by default
OpenSSL 1.1.1 disables TLSv1.0 by default and sets the security level to 2.
Some older networks may support for TLSv1.0 and less secure cyphers.
--- a/src/crypto/tls_openssl.c
+++ b/src/crypto/tls_openssl.c
@@ -988,6 +988,13 @@
os_free(data);
return NULL;
}
+
+#ifndef EAP_SERVER_TLS
+ /* Enable TLSv1.0 by default to allow connecting to legacy
+ * networks since Debian OpenSSL is set to minimum TLSv1.2 and SECLEVEL=2. */
+ SSL_CTX_set_min_proto_version(ssl, TLS1_VERSION);
+#endif
+
data->ssl = ssl;
if (conf)
data->tls_session_lifetime = conf->tls_session_lifetime;