Blame SOURCES/nss-fips-disable-tls13.patch

cae166
diff --git a/lib/ssl/sslsock.c b/lib/ssl/sslsock.c
cae166
--- a/lib/ssl/sslsock.c
cae166
+++ b/lib/ssl/sslsock.c
cae166
@@ -2382,16 +2382,26 @@ ssl3_CreateOverlapWithPolicy(SSLProtocol
cae166
     rv = ssl3_GetEffectiveVersionPolicy(protocolVariant,
cae166
                                         &effectivePolicyBoundary);
cae166
     if (rv == SECFailure) {
cae166
         /* SECFailure means internal failure or invalid configuration. */
cae166
         overlap->min = overlap->max = SSL_LIBRARY_VERSION_NONE;
cae166
         return SECFailure;
cae166
     }
cae166
 
cae166
+    /* TODO: TLSv1.3 doesn't work yet under FIPS mode */
cae166
+    if (PK11_IsFIPS()) {
cae166
+        if (effectivePolicyBoundary.min >= SSL_LIBRARY_VERSION_TLS_1_3) {
cae166
+            effectivePolicyBoundary.min = SSL_LIBRARY_VERSION_TLS_1_2;
cae166
+        }
cae166
+        if (effectivePolicyBoundary.max >= SSL_LIBRARY_VERSION_TLS_1_3) {
cae166
+            effectivePolicyBoundary.max = SSL_LIBRARY_VERSION_TLS_1_2;
cae166
+        }
cae166
+    }
cae166
+
cae166
     vrange.min = PR_MAX(input->min, effectivePolicyBoundary.min);
cae166
     vrange.max = PR_MIN(input->max, effectivePolicyBoundary.max);
cae166
 
cae166
     if (vrange.max < vrange.min) {
cae166
         /* there was no overlap, turn off range altogether */
cae166
         overlap->min = overlap->max = SSL_LIBRARY_VERSION_NONE;
cae166
         return SECFailure;
cae166
     }