summaryrefslogtreecommitdiff
path: root/tests/version-checks.c
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@redhat.com>2018-11-20 11:30:22 +0100
committerNikos Mavrogiannopoulos <nmav@redhat.com>2018-11-27 12:52:23 +0100
commit8979d4072d2017c2a58d95d8d4ccb9a1790baa8b (patch)
tree364fa646f8530c83ec8a9d82b8b772c4e6de759a /tests/version-checks.c
parentf7143c4eb99ddbd5bf1b972244f24a0ff7ce22e3 (diff)
downloadgnutls-tmp-tls10-tls13-fix.tar.gz
Prevent applications from combining legacy versions of TLS with TLS1.3tmp-tls10-tls13-fix
It can happen that an application due to a misconfiguration, enables TLS1.3 in combination with TLS1.0 or TLS1.1 only. In that case a server which is unaware of the TLS1.3 protocol will reply by selecting the TLS1.2 protocol instead and that answer will be rejected by the client. With this change we ensure that TLS1.3 is not enabled in these problematic scenarios. Resolves: #621 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Diffstat (limited to 'tests/version-checks.c')
-rw-r--r--tests/version-checks.c7
1 files changed, 7 insertions, 0 deletions
diff --git a/tests/version-checks.c b/tests/version-checks.c
index c02bdbe79e..4f9bac2261 100644
--- a/tests/version-checks.c
+++ b/tests/version-checks.c
@@ -164,6 +164,13 @@ void doit(void)
reset_buffers();
try("NORMAL:-VERS-TLS-ALL:+VERS-TLS1.3", GNUTLS_TLS1_3);
reset_buffers();
+ try("NORMAL:-VERS-TLS-ALL:+VERS-TLS1.3:+VERS-TLS1.0", GNUTLS_TLS1_0);
+ reset_buffers();
+ /* similar to above test, but checks a different syntax */
+ try("NORMAL:-VERS-ALL:+VERS-TLS1.3:+VERS-TLS1.1", GNUTLS_TLS1_1);
+ reset_buffers();
+ try("NORMAL:-VERS-TLS-ALL:+VERS-TLS1.3:+VERS-TLS1.2", GNUTLS_TLS1_3);
+ reset_buffers();
#ifdef ENABLE_SSL3
try("NORMAL:-VERS-TLS-ALL:+VERS-SSL3.0", -1);
reset_buffers();