Name | Date | Size | #Lines | LOC | ||
---|---|---|---|---|---|---|
.. | - | - | ||||
0001-progs.patch | D | 22-Nov-2023 | 1.6 KiB | 55 | 50 | |
0002-handshake_cutthrough.patch | D | 22-Nov-2023 | 11.3 KiB | 353 | 334 | |
0003-jsse.patch | D | 22-Nov-2023 | 14.2 KiB | 431 | 411 | |
0004-channelid.patch | D | 22-Nov-2023 | 47 KiB | 1,463 | 1,405 | |
0005-eng_dyn_dirs.patch | D | 22-Nov-2023 | 2.7 KiB | 73 | 67 | |
0006-fix_clang_build.patch | D | 22-Nov-2023 | 1.7 KiB | 47 | 42 | |
0007-tls12_digests.patch | D | 22-Nov-2023 | 12 KiB | 441 | 411 | |
0008-alpn.patch | D | 22-Nov-2023 | 17.6 KiB | 593 | 567 | |
0009-cbc_record_splitting.patch | D | 22-Nov-2023 | 17.8 KiB | 542 | 491 | |
0010-dsa_nonce.patch | D | 22-Nov-2023 | 17.8 KiB | 503 | 480 | |
0011-ecdhe_psk.patch | D | 22-Nov-2023 | 40.3 KiB | 1,436 | 1,394 | |
0012-wincrypt.patch | D | 22-Nov-2023 | 1 KiB | 35 | 29 | |
0013-tls_psk_hint.patch | D | 22-Nov-2023 | 13.6 KiB | 419 | 398 | |
0014-arm_asm.patch | D | 22-Nov-2023 | 206.6 KiB | 7,835 | 7,737 | |
0016-ecdhe_psk_part2.patch | D | 22-Nov-2023 | 3.2 KiB | 101 | 92 | |
0017-x86_textrel.patch | D | 22-Nov-2023 | 1.2 KiB | 49 | 41 | |
README | D | 22-Nov-2023 | 2.4 KiB | 83 | 50 | |
testssl.sh | D | 22-Nov-2023 | 2.1 KiB | 78 | 42 |
README
1progs.patch: 2 3Fixup sources under the apps/ directory that are not built under the android environment. 4 5 6handshake_cutthrough.patch 7 8Enables SSL3+ clients to send application data immediately following the 9Finished message even when negotiating full-handshakes. With this patch, 10clients can negotiate SSL connections in 1-RTT even when performing 11full-handshakes. 12 13jsse.patch 14 15Support for JSSE implementation based on OpenSSL. 16 17channelid.patch 18 19Implements TLS Channel ID support as both a client and a server. 20See http://tools.ietf.org/html/draft-balfanz-tls-channelid-00. 21 22eng_dyn_dirs.patch 23 24Fixes the case of having multiple DIR_ADD commands sent to eng_dyn 25 26fix_clang_build.patch 27 28Fixes the Clang based build. 29 30tls12_digests.patch 31 32Fixes a bug with handling TLS 1.2 and digest functions for DSA and ECDSA 33keys. 34 35alpn.patch 36 37This change adds support for ALPN in OpenSSL. ALPN is the IETF 38blessed version of NPN and we'll be supporting both ALPN and NPN for 39some time yet. 40 41cbc_record_splitting.patch 42 43BEAST attack client-side mitigation. Removes 0/n record splitting, adds 1/n-1 44record splitting. Record splitting is disabled by default. 45 46dsa_nonce.patch 47 48Adds an option to mix in hash of message and private key into (EC)DSA nonces to 49make (EC)DSA more resilient to weaknesses in RNGs used for nonces. The feature 50is disabled by default. 51 52ecdhe_psk.patch 53 54Adds support for ECDHE Pre-Shared Key (PSK) TLS cipher suites. 55 56ecdhe_psk_part2.patch 57 58Removes ECHDE-PSK cipher suites with SHA-2 because they cannot be used with 59SSLv3 (and there's no way to express that in OpenSSL's configuration). Adds 60SHA-1 based ECDHE-PSK AES-CBC cipher suites instead. 61 62arm_asm.patch 63 64Adds newer ARM assembly pack with BSAES for ARMv7 and acceleration for ARMv8 65Based on branch available at: 66https://git.linaro.org/people/ard.biesheuvel/openssl.git/shortlog/refs/heads/openssl-1.0.1f-with-arm-patches 67c7b582ef23eb6f4386664e841e6e406d984c38d3^..cb8b1ab03e5c179a719afe83f03fecb1c2c78730 68 69tls_psk_hint.patch 70 71Fixes issues with TLS-PSK identity hint implementation where 72per-connection/session and per-context hints were being mixed up. 73 74psk_client_callback_128_byte_id_bug.patch 75 76Fixes the issue where it was impossible to return a 128 byte long PSK identity 77(the maximum supported length) from psk_client_callback. 78 79tls_fallback_scsv.patch 80 81Adds the signalling cipher suite value (SCSV) from 82https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 83