• Home
  • History
  • Annotate
Name Date Size #Lines LOC

..--

0001-progs.patchD22-Nov-20231.6 KiB5550

0002-handshake_cutthrough.patchD22-Nov-202311.3 KiB353334

0003-jsse.patchD22-Nov-202314.2 KiB431411

0004-channelid.patchD22-Nov-202347 KiB1,4631,405

0005-eng_dyn_dirs.patchD22-Nov-20232.7 KiB7367

0006-fix_clang_build.patchD22-Nov-20231.7 KiB4742

0007-tls12_digests.patchD22-Nov-202312 KiB441411

0008-alpn.patchD22-Nov-202317.6 KiB593567

0009-cbc_record_splitting.patchD22-Nov-202317.8 KiB542491

0010-dsa_nonce.patchD22-Nov-202317.8 KiB503480

0011-ecdhe_psk.patchD22-Nov-202340.3 KiB1,4361,394

0012-wincrypt.patchD22-Nov-20231 KiB3529

0013-tls_psk_hint.patchD22-Nov-202313.6 KiB419398

0014-arm_asm.patchD22-Nov-2023206.6 KiB7,8357,737

0016-ecdhe_psk_part2.patchD22-Nov-20233.2 KiB10192

0017-x86_textrel.patchD22-Nov-20231.2 KiB4941

READMED22-Nov-20232.4 KiB8350

testssl.shD22-Nov-20232.1 KiB7842

README

1progs.patch:
2
3Fixup sources under the apps/ directory that are not built under the android environment.
4
5
6handshake_cutthrough.patch
7
8Enables SSL3+ clients to send application data immediately following the
9Finished message even when negotiating full-handshakes.  With this patch,
10clients can negotiate SSL connections in 1-RTT even when performing
11full-handshakes.
12
13jsse.patch
14
15Support for JSSE implementation based on OpenSSL.
16
17channelid.patch
18
19Implements TLS Channel ID support as both a client and a server.
20See http://tools.ietf.org/html/draft-balfanz-tls-channelid-00.
21
22eng_dyn_dirs.patch
23
24Fixes the case of having multiple DIR_ADD commands sent to eng_dyn
25
26fix_clang_build.patch
27
28Fixes the Clang based build.
29
30tls12_digests.patch
31
32Fixes a bug with handling TLS 1.2 and digest functions for DSA and ECDSA
33keys.
34
35alpn.patch
36
37This change adds support for ALPN in OpenSSL. ALPN is the IETF
38blessed version of NPN and we'll be supporting both ALPN and NPN for
39some time yet.
40
41cbc_record_splitting.patch
42
43BEAST attack client-side mitigation. Removes 0/n record splitting, adds 1/n-1
44record splitting. Record splitting is disabled by default.
45
46dsa_nonce.patch
47
48Adds an option to mix in hash of message and private key into (EC)DSA nonces to
49make (EC)DSA more resilient to weaknesses in RNGs used for nonces. The feature
50is disabled by default.
51
52ecdhe_psk.patch
53
54Adds support for ECDHE Pre-Shared Key (PSK) TLS cipher suites.
55
56ecdhe_psk_part2.patch
57
58Removes ECHDE-PSK cipher suites with SHA-2 because they cannot be used with
59SSLv3 (and there's no way to express that in OpenSSL's configuration). Adds
60SHA-1 based ECDHE-PSK AES-CBC cipher suites instead.
61
62arm_asm.patch
63
64Adds newer ARM assembly pack with BSAES for ARMv7 and acceleration for ARMv8
65Based on branch available at:
66https://git.linaro.org/people/ard.biesheuvel/openssl.git/shortlog/refs/heads/openssl-1.0.1f-with-arm-patches
67c7b582ef23eb6f4386664e841e6e406d984c38d3^..cb8b1ab03e5c179a719afe83f03fecb1c2c78730
68
69tls_psk_hint.patch
70
71Fixes issues with TLS-PSK identity hint implementation where
72per-connection/session and per-context hints were being mixed up.
73
74psk_client_callback_128_byte_id_bug.patch
75
76Fixes the issue where it was impossible to return a 128 byte long PSK identity
77(the maximum supported length) from psk_client_callback.
78
79tls_fallback_scsv.patch
80
81Adds the signalling cipher suite value (SCSV) from
82https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00
83