Temporarily disable TLSv1.1 and TLSv1.2

They are enabled by default in the latest wpa_supplicant builds, but we
aren't quite ready to roll them out yet.  Before we can enable them
by default, we'll add options to CPanel to allow enterprise customers
to disable the new protocols in case there are interop problems with
buggy RADIUS servers.

BUG=chromium:605310
TEST=configure freeradius server to use TLSv1.2 and observe that the
     client only negotiates TLSv1.0. Tested with EAP-TLS and EAP-TTLS.

Change-Id: Ic579f79b7662f087a6f75df1f1e606f5449729dd
Reviewed-on: https://chromium-review.googlesource.com/340034
Commit-Ready: Kevin Cernekee <cernekee@chromium.org>
Tested-by: Kevin Cernekee <cernekee@chromium.org>
Reviewed-by: Sameer Nanda <snanda@chromium.org>
Reviewed-by: Paul Stewart <pstew@chromium.org>
Reviewed-by: Grant Grundler <grundler@chromium.org>
1 file changed