Blame SOURCES/nss-fips-disable-tls13.patch

3d912a
diff --git a/lib/ssl/sslsock.c b/lib/ssl/sslsock.c
3d912a
--- a/lib/ssl/sslsock.c
3d912a
+++ b/lib/ssl/sslsock.c
3d912a
@@ -2382,16 +2382,26 @@ ssl3_CreateOverlapWithPolicy(SSLProtocol
3d912a
     rv = ssl3_GetEffectiveVersionPolicy(protocolVariant,
3d912a
                                         &effectivePolicyBoundary);
3d912a
     if (rv == SECFailure) {
3d912a
         /* SECFailure means internal failure or invalid configuration. */
3d912a
         overlap->min = overlap->max = SSL_LIBRARY_VERSION_NONE;
3d912a
         return SECFailure;
3d912a
     }
3d912a
 
3d912a
+    /* TODO: TLSv1.3 doesn't work yet under FIPS mode */
3d912a
+    if (PK11_IsFIPS()) {
3d912a
+        if (effectivePolicyBoundary.min >= SSL_LIBRARY_VERSION_TLS_1_3) {
3d912a
+            effectivePolicyBoundary.min = SSL_LIBRARY_VERSION_TLS_1_2;
3d912a
+        }
3d912a
+        if (effectivePolicyBoundary.max >= SSL_LIBRARY_VERSION_TLS_1_3) {
3d912a
+            effectivePolicyBoundary.max = SSL_LIBRARY_VERSION_TLS_1_2;
3d912a
+        }
3d912a
+    }
3d912a
+
3d912a
     vrange.min = PR_MAX(input->min, effectivePolicyBoundary.min);
3d912a
     vrange.max = PR_MIN(input->max, effectivePolicyBoundary.max);
3d912a
 
3d912a
     if (vrange.max < vrange.min) {
3d912a
         /* there was no overlap, turn off range altogether */
3d912a
         overlap->min = overlap->max = SSL_LIBRARY_VERSION_NONE;
3d912a
         return SECFailure;
3d912a
     }