blob: a95646c24ef366258303f99dd8345ec17dd86f1d [file] [log] [blame]
progs.patch:
Fixup sources under the apps/ directory that are not built under the android environment.
arm-asm.patch.patch:
ARM assembly routines (AES, BN, SHA1, SHA256, SHA512)
small_records.patch:
Reduce OpenSSL memory consumption.
SSL records may be as large as 16K, but are typically < 2K. In
addition, a historic bug in Windows allowed records to be as large
32K. OpenSSL statically allocates read and write buffers (34K and
18K respectively) used for processing records.
With this patch, OpenSSL statically allocates 4K + 4K buffers, with
the option of dynamically growing buffers to 34K + 4K, which is a
saving of 44K per connection for the typical case.
handshake_cutthrough.patch
Enables SSL3+ clients to send application data immediately following the
Finished message even when negotiating full-handshakes. With this patch,
clients can negotiate SSL connections in 1-RTT even when performing
full-handshakes.
bad_version.patch
Addresses CVE-2010-0740 http://www.openssl.org/news/secadv_20100324.txt
A peer can send us a mal-formed packet and we'll copy its 'version'
number in order to send an error back. However, if the version number
is an internal OpenSSL value (like DTLS1_VERSION) then we'll assume
that we have a valid DTLS state and crash when sending an alert.