diff --git a/configure.ac b/configure.ac index 894a35461..50920d743 100644 --- a/configure.ac +++ b/configure.ac @@ -4051,7 +4051,9 @@ fi if test "$ENABLED_OPENVPN" = "yes" then - AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_DES_ECB -DHAVE_EX_DATA -DWOLFSSL_KEY_GEN -DWOLFSSL_OPENVPN" + ENABLED_SUPPORTED_CURVES="yes" + AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_OPENVPN -DHAVE_KEYING_MATERIAL" + AM_CFLAGS="$AM_CFLAGS -DWOLFSSL_DES_ECB -DHAVE_EX_DATA -DWOLFSSL_KEY_GEN" fi diff --git a/src/tls13.c b/src/tls13.c index 027be809f..c6008d8b1 100644 --- a/src/tls13.c +++ b/src/tls13.c @@ -7565,6 +7565,15 @@ int wolfSSL_connect_TLSv13(WOLFSSL* ssl) } } + if (!ssl->options.tls1_3) { + #ifndef WOLFSSL_NO_TLS12 + if (ssl->options.downgrade) + return wolfSSL_connect(ssl); + #endif + WOLFSSL_MSG("Client using higher version, fatal error"); + return VERSION_ERROR; + } + ssl->options.connectState = HELLO_AGAIN; WOLFSSL_MSG("connect state: HELLO_AGAIN"); FALL_THROUGH; @@ -7573,16 +7582,6 @@ int wolfSSL_connect_TLSv13(WOLFSSL* ssl) if (ssl->options.certOnly) return WOLFSSL_SUCCESS; - if (!ssl->options.tls1_3) { - #ifndef WOLFSSL_NO_TLS12 - if (ssl->options.downgrade) - return wolfSSL_connect(ssl); - #endif - - WOLFSSL_MSG("Client using higher version, fatal error"); - return VERSION_ERROR; - } - if (ssl->options.serverState == SERVER_HELLO_RETRY_REQUEST_COMPLETE) { #if defined(WOLFSSL_TLS13_MIDDLEBOX_COMPAT)