Blame SOURCES/wget-1.19.5-Add-TLS-1.3-support-for-GnuTLS.patch

aa6d84
From 2bbdfd76dab187ab29e22bed18d737f94343e629 Mon Sep 17 00:00:00 2001
aa6d84
From: Tomas Hozza <thozza@redhat.com>
aa6d84
Date: Tue, 4 Sep 2018 11:22:14 +0200
aa6d84
Subject: [PATCH] Add TLS 1.3 support for GnuTLS
aa6d84
aa6d84
* doc/wget.texi: Add "TLSv1_3" to --secure-protocol
aa6d84
* src/gnutls.c (set_prio_default): Use GNUTLS_TLS1_3 where needed
aa6d84
aa6d84
Wget currently allows specifying "TLSv1_3" as the parameter for
aa6d84
--secure-protocol option. However it is only implemented for OpenSSL
aa6d84
and in case wget is compiled with GnuTLS, it causes wget to abort with:
aa6d84
GnuTLS: unimplemented 'secure-protocol' option value 6
aa6d84
aa6d84
GnuTLS contains TLS 1.3 implementation since version 3.6.3 [1]. However
aa6d84
currently it must be enabled explicitly in the application of it to be
aa6d84
used. This will change after the draft is finalized. [2] However for
aa6d84
the time being, I enabled it explicitly in case "TLSv1_3" is used with
aa6d84
--secure-protocol.
aa6d84
aa6d84
I also fixed man page to contain "TLSv1_3" in all listings of available
aa6d84
parameters for --secure-protocol
aa6d84
aa6d84
[1] https://lists.gnupg.org/pipermail/gnutls-devel/2018-July/008584.html
aa6d84
[2] https://nikmav.blogspot.com/2018/05/gnutls-and-tls-13.html
aa6d84
aa6d84
Signed-off-by: Tomas Hozza <thozza@redhat.com>
aa6d84
---
aa6d84
 doc/wget.texi |  6 +++---
aa6d84
 src/gnutls.c  | 28 ++++++++++++++++++++++++++++
aa6d84
 2 files changed, 31 insertions(+), 3 deletions(-)
aa6d84
aa6d84
diff --git a/doc/wget.texi b/doc/wget.texi
aa6d84
index 38b4a245..7ae19d8e 100644
aa6d84
--- a/doc/wget.texi
aa6d84
+++ b/doc/wget.texi
aa6d84
@@ -1780,9 +1780,9 @@ If Wget is compiled without SSL support, none of these options are available.
aa6d84
 @cindex SSL protocol, choose
aa6d84
 @item --secure-protocol=@var{protocol}
aa6d84
 Choose the secure protocol to be used.  Legal values are @samp{auto},
aa6d84
-@samp{SSLv2}, @samp{SSLv3}, @samp{TLSv1}, @samp{TLSv1_1}, @samp{TLSv1_2}
aa6d84
-and @samp{PFS}.  If @samp{auto} is used, the SSL library is given the
aa6d84
-liberty of choosing the appropriate protocol automatically, which is
aa6d84
+@samp{SSLv2}, @samp{SSLv3}, @samp{TLSv1}, @samp{TLSv1_1}, @samp{TLSv1_2},
aa6d84
+@samp{TLSv1_3} and @samp{PFS}.  If @samp{auto} is used, the SSL library is
aa6d84
+given the liberty of choosing the appropriate protocol automatically, which is
aa6d84
 achieved by sending a TLSv1 greeting. This is the default.
aa6d84
 
aa6d84
 Specifying @samp{SSLv2}, @samp{SSLv3}, @samp{TLSv1}, @samp{TLSv1_1},
aa6d84
diff --git a/src/gnutls.c b/src/gnutls.c
aa6d84
index 07844c52..206d0b09 100644
aa6d84
--- a/src/gnutls.c
aa6d84
+++ b/src/gnutls.c
aa6d84
@@ -565,6 +565,15 @@ set_prio_default (gnutls_session_t session)
aa6d84
       err = gnutls_priority_set_direct (session, "NORMAL:-VERS-SSL3.0:-VERS-TLS1.0:-VERS-TLS1.1", NULL);
aa6d84
       break;
aa6d84
 
aa6d84
+    case secure_protocol_tlsv1_3:
aa6d84
+#if GNUTLS_VERSION_NUMBER >= 0x030603
aa6d84
+      err = gnutls_priority_set_direct (session, "NORMAL:-VERS-SSL3.0:+VERS-TLS1.3:-VERS-TLS1.0:-VERS-TLS1.1:-VERS-TLS1.2", NULL);
aa6d84
+      break;
aa6d84
+#else
aa6d84
+      logprintf (LOG_NOTQUIET, _("Your GnuTLS version is too old to support TLS 1.3\n"));
aa6d84
+      return -1;
aa6d84
+#endif
aa6d84
+
aa6d84
     case secure_protocol_pfs:
aa6d84
       err = gnutls_priority_set_direct (session, "PFS:-VERS-SSL3.0", NULL);
aa6d84
       if (err != GNUTLS_E_SUCCESS)
aa6d84
@@ -596,19 +605,38 @@ set_prio_default (gnutls_session_t session)
aa6d84
       allowed_protocols[0] = GNUTLS_TLS1_0;
aa6d84
       allowed_protocols[1] = GNUTLS_TLS1_1;
aa6d84
       allowed_protocols[2] = GNUTLS_TLS1_2;
aa6d84
+#if GNUTLS_VERSION_NUMBER >= 0x030603
aa6d84
+      allowed_protocols[3] = GNUTLS_TLS1_3;
aa6d84
+#endif
aa6d84
       err = gnutls_protocol_set_priority (session, allowed_protocols);
aa6d84
       break;
aa6d84
 
aa6d84
     case secure_protocol_tlsv1_1:
aa6d84
       allowed_protocols[0] = GNUTLS_TLS1_1;
aa6d84
       allowed_protocols[1] = GNUTLS_TLS1_2;
aa6d84
+#if GNUTLS_VERSION_NUMBER >= 0x030603
aa6d84
+      allowed_protocols[2] = GNUTLS_TLS1_3;
aa6d84
+#endif
aa6d84
       err = gnutls_protocol_set_priority (session, allowed_protocols);
aa6d84
       break;
aa6d84
 
aa6d84
     case secure_protocol_tlsv1_2:
aa6d84
       allowed_protocols[0] = GNUTLS_TLS1_2;
aa6d84
+#if GNUTLS_VERSION_NUMBER >= 0x030603
aa6d84
+      allowed_protocols[1] = GNUTLS_TLS1_3;
aa6d84
+#endif
aa6d84
+      err = gnutls_protocol_set_priority (session, allowed_protocols);
aa6d84
+      break;
aa6d84
+
aa6d84
+    case secure_protocol_tlsv1_3:
aa6d84
+#if GNUTLS_VERSION_NUMBER >= 0x030603
aa6d84
+      allowed_protocols[0] = GNUTLS_TLS1_3;
aa6d84
       err = gnutls_protocol_set_priority (session, allowed_protocols);
aa6d84
       break;
aa6d84
+#else
aa6d84
+      logprintf (LOG_NOTQUIET, _("Your GnuTLS version is too old to support TLS 1.3\n"));
aa6d84
+      return -1;
aa6d84
+#endif
aa6d84
 
aa6d84
     default:
aa6d84
       logprintf (LOG_NOTQUIET, _("GnuTLS: unimplemented 'secure-protocol' option value %d\n"), opt.secure_protocol);
aa6d84
-- 
aa6d84
2.17.1
aa6d84