1 progs.patch: 2 3 Fixup sources under the apps/ directory that are not built under the android environment. 4 5 6 arm-asm.patch.patch: 7 8 ARM assembly routines (AES, BN, SHA1, SHA256, SHA512) 9 10 11 small_records.patch: 12 13 Reduce OpenSSL memory consumption. 14 SSL records may be as large as 16K, but are typically < 2K. In 15 addition, a historic bug in Windows allowed records to be as large 16 32K. OpenSSL statically allocates read and write buffers (34K and 17 18K respectively) used for processing records. 18 With this patch, OpenSSL statically allocates 4K + 4K buffers, with 19 the option of dynamically growing buffers to 34K + 4K, which is a 20 saving of 44K per connection for the typical case. 21 22 23 handshake_cutthrough.patch 24 25 Enables SSL3+ clients to send application data immediately following the 26 Finished message even when negotiating full-handshakes. With this patch, 27 clients can negotiate SSL connections in 1-RTT even when performing 28 full-handshakes. 29 30 31 bad_version.patch 32 33 Addresses CVE-2010-0740 http://www.openssl.org/news/secadv_20100324.txt 34 A peer can send us a mal-formed packet and we'll copy its 'version' 35 number in order to send an error back. However, if the version number 36 is an internal OpenSSL value (like DTLS1_VERSION) then we'll assume 37 that we have a valid DTLS state and crash when sending an alert. 38