wpa_supplicant-allow-legacy-renegotiation.patch 982 B

123456789101112131415161718192021
  1. diff -up wpa_supplicant-2.10/src/crypto/tls_openssl.c.legacy-server-connect wpa_supplicant-2.10/src/crypto/tls_openssl.c
  2. --- wpa_supplicant-2.10/src/crypto/tls_openssl.c.legacy-server-connect 2022-01-16 15:51:29.000000000 -0500
  3. +++ wpa_supplicant-2.10/src/crypto/tls_openssl.c 2022-04-28 02:47:26.863529683 -0400
  4. @@ -1049,6 +1049,16 @@
  5. SSL_CTX_set_options(ssl, SSL_OP_NO_SSLv2);
  6. SSL_CTX_set_options(ssl, SSL_OP_NO_SSLv3);
  7. + /* Many enterprise PEAP server implementations (e.g. used in large
  8. + corporations and universities) do not support RFC5746 secure
  9. + renegotiation, and starting with OpenSSL 3.0,
  10. + SSL_OP_LEGACY_SERVER_CONNECT is no longer set as part of SSL_OP_ALL.
  11. + So until we implement a way to request SSL_OP_LEGACY_SERVER_CONNECT
  12. + only in EAP peer mode, just set SSL_OP_LEGACY_SERVER_CONNECT
  13. + globally. */
  14. +
  15. + SSL_CTX_set_options(ssl, SSL_OP_LEGACY_SERVER_CONNECT);
  16. +
  17. SSL_CTX_set_mode(ssl, SSL_MODE_AUTO_RETRY);
  18. #ifdef SSL_MODE_NO_AUTO_CHAIN