Blame SOURCES/openssl-1.1.1-tls-compliance.patch

067bfb
diff -up openssl-1.1.1c/ssl/record/ssl3_record.c.compliance openssl-1.1.1c/ssl/record/ssl3_record.c
067bfb
--- openssl-1.1.1c/ssl/record/ssl3_record.c.compliance	2019-05-28 15:12:21.000000000 +0200
067bfb
+++ openssl-1.1.1c/ssl/record/ssl3_record.c	2019-11-25 13:10:53.890637381 +0100
067bfb
@@ -559,7 +559,7 @@ int ssl3_get_record(SSL *s)
067bfb
             RECORD_LAYER_reset_read_sequence(&s->rlayer);
067bfb
             return 1;
067bfb
         }
067bfb
-        SSLfatal(s, SSL_AD_DECRYPTION_FAILED, SSL_F_SSL3_GET_RECORD,
067bfb
+        SSLfatal(s, SSL_AD_BAD_RECORD_MAC, SSL_F_SSL3_GET_RECORD,
067bfb
                  SSL_R_BLOCK_CIPHER_PAD_IS_WRONG);
067bfb
         return -1;
067bfb
     }
067bfb
diff -up openssl-1.1.1c/ssl/statem/extensions_srvr.c.compliance openssl-1.1.1c/ssl/statem/extensions_srvr.c
067bfb
--- openssl-1.1.1c/ssl/statem/extensions_srvr.c.compliance	2019-05-28 15:12:21.000000000 +0200
067bfb
+++ openssl-1.1.1c/ssl/statem/extensions_srvr.c	2019-11-25 13:12:59.329459528 +0100
067bfb
@@ -1487,6 +1487,10 @@ EXT_RETURN tls_construct_stoc_status_req
067bfb
                                              unsigned int context, X509 *x,
067bfb
                                              size_t chainidx)
067bfb
 {
067bfb
+    /* We don't currently support this extension inside a CertificateRequest */
067bfb
+    if (context == SSL_EXT_TLS1_3_CERTIFICATE_REQUEST)
067bfb
+        return EXT_RETURN_NOT_SENT;
067bfb
+
067bfb
     if (!s->ext.status_expected)
067bfb
         return EXT_RETURN_NOT_SENT;
067bfb