| Index: patches/handshake_cutthrough.patch
 | 
| ===================================================================
 | 
| --- patches/handshake_cutthrough.patch	(revision 156279)
 | 
| +++ patches/handshake_cutthrough.patch	(working copy)
 | 
| @@ -6,9 +6,9 @@
 | 
|   	BIO_printf(bio_err," -status           - request certificate status from server\n");
 | 
|   	BIO_printf(bio_err," -no_ticket        - disable use of RFC4507bis session tickets\n");
 | 
|  +	BIO_printf(bio_err," -cutthrough       - enable 1-RTT full-handshake for strong ciphers\n");
 | 
| - #endif
 | 
| - 	}
 | 
| - 
 | 
| + # if !defined(OPENSSL_NO_NEXTPROTONEG)
 | 
| + 	BIO_printf(bio_err," -nextprotoneg arg - enable NPN extension, considering named protocols supported (comma-separated list)\n");
 | 
| + # endif
 | 
|  @@ -304,6 +305,7 @@ int MAIN(int argc, char **argv)
 | 
|   	EVP_PKEY *key = NULL;
 | 
|   	char *CApath=NULL,*CAfile=NULL,*cipher=NULL;
 | 
| @@ -191,9 +191,9 @@
 | 
|   /* extra state */
 | 
|   #define SSL3_ST_CW_FLUSH		(0x100|SSL_ST_CONNECT)
 | 
|  +#define SSL3_ST_CUTTHROUGH_COMPLETE	(0x101|SSL_ST_CONNECT)
 | 
| - /* write to server */
 | 
| - #define SSL3_ST_CW_CLNT_HELLO_A		(0x110|SSL_ST_CONNECT)
 | 
| - #define SSL3_ST_CW_CLNT_HELLO_B		(0x111|SSL_ST_CONNECT)
 | 
| + #ifndef OPENSSL_NO_SCTP
 | 
| + #define DTLS1_SCTP_ST_CW_WRITE_SOCK			(0x310|SSL_ST_CONNECT)
 | 
| + #define DTLS1_SCTP_ST_CR_READ_SOCK			(0x320|SSL_ST_CONNECT)
 | 
|  diff -uarp openssl-1.0.0.orig/ssl/ssl_lib.c openssl-1.0.0/ssl/ssl_lib.c
 | 
|  --- openssl-1.0.0.orig/ssl/ssl_lib.c	2010-02-17 14:43:46.000000000 -0500
 | 
|  +++ openssl-1.0.0/ssl/ssl_lib.c	2010-04-21 17:02:45.000000000 -0400
 | 
| 
 |