| Index: README.chromium
|
| ===================================================================
|
| --- README.chromium (revision 105093)
|
| +++ README.chromium (working copy)
|
| @@ -1,6 +1,6 @@
|
| Name: openssl
|
| URL: http://openssl.org/source/
|
| -Version: 0.9.8o
|
| +Version: 1.0.0f
|
| License: BSDish
|
| License File: openssl/LICENSE
|
|
|
| @@ -10,14 +10,27 @@
|
| It's an unmodified, upstream source except for the patches listed below.
|
|
|
|
|
| -Patches are applied in this order:
|
| +********************************************************************************
|
| +The following patches are taken from Android Open Source Project.
|
|
|
| -missing_stddef.patch
|
|
|
| -Add stddef.h to header files which use size_t, otherwise apps that include
|
| -those headers get compiler errors.
|
| +progs.patch:
|
|
|
| +Fixup sources under the apps/ directory that are not built under the android environment.
|
|
|
| +
|
| +small_records.patch:
|
| +
|
| +Reduce OpenSSL memory consumption.
|
| +SSL records may be as large as 16K, but are typically < 2K. In
|
| +addition, a historic bug in Windows allowed records to be as large
|
| +32K. OpenSSL statically allocates read and write buffers (34K and
|
| +18K respectively) used for processing records.
|
| +With this patch, OpenSSL statically allocates 4K + 4K buffers, with
|
| +the option of dynamically growing buffers to 34K + 4K, which is a
|
| +saving of 44K per connection for the typical case.
|
| +
|
| +
|
| handshake_cutthrough.patch
|
|
|
| Enables SSL3+ clients to send application data immediately following the
|
| @@ -26,29 +39,52 @@
|
| full-handshakes.
|
|
|
|
|
| -next_proto_neg.patch
|
| +jsse.patch
|
|
|
| -Adds next-protocol-negotation support:
|
| - http://tools.ietf.org/html/draft-agl-tls-nextprotoneg-00
|
| +Support for JSSE implementation based on OpenSSL.
|
|
|
| -EXPERIMENTAL: this patches uses extension and handshake numbers that are not
|
| -assigned by IANA.
|
|
|
| -This patch implements server and client side support. Additionally, it includes
|
| -code that assumes the structure of the 'opaque' protocol strings in the draft.
|
| +npn.patch
|
|
|
| +Transport Layer Security (TLS) Next Protocol Negotiation Extension
|
|
|
| -snap_start.patch
|
|
|
| -Adds server-side support for Snap Start. This allows for 0-RTT handshakes in
|
| -the case that the application protocol involves the client side speaking first.
|
| +sha1_armv4_large.patch
|
|
|
| -http://tools.ietf.org/html/draft-agl-tls-snapstart-00
|
| +This patch eliminates memory stores to addresses below SP.
|
|
|
| -EXPERIMENTAL: this patches uses an extension number that is not assigned by
|
| -IANA.
|
|
|
| +openssl_no_dtls1.patch
|
|
|
| +Add missing #ifndef OPENSSL_NO_DTLS1
|
| +
|
| +
|
| +********************************************************************************
|
| +The following patches are needed to compile this openssl on Chromium and pass
|
| +the related net unit tests.
|
| +
|
| +
|
| +empty_OPENSSL_cpuid_setup.patch
|
| +
|
| +Use a empty implementation for function OPENSSL_cpuid_setup to resolve link
|
| +error. We should figure out how to geenrate platform specific implementation
|
| +of OPENSSL_cpuid_setup by leveraging crypto/*cpuid.pl.
|
| +
|
| +
|
| +x509_hash_name_algorithm_change.patch
|
| +
|
| +There are many symbolic links under /etc/ssl/certs created by using hash of
|
| +the pem certificates in order for OpenSSL to find those certificate.
|
| +Openssl has a tool to help you create hash symbolic links. (See tools/c_rehash)
|
| +However the new openssl changed the hash algorithm, Unless you compile/install
|
| +the latest openssl library and re-create all related symbolic links, the new
|
| +openssl can not find some certificates because the links of those certificates
|
| +were created by using old hash algorithm, which causes some tests failed.
|
| +This patch gives a way to find a certificate according to its hash by using both
|
| +new algorithm and old algorithm.
|
| +crbug.com/111045 is used to track this issue.
|
| +
|
| +
|
| Android platform support
|
|
|
| Copy config/android/openssl/opensslconf.h from Android's
|
|
|