0
0
mirror of https://github.com/nodejs/node.git synced 2024-11-30 15:30:56 +01:00
nodejs/deps/openssl
Ben Noordhuis 89e311b1ae deps: back-port openssl patch
Check for potentially exploitable overflows in asn1_d2i_read_bio
BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer
in CRYPTO_realloc_clean.

Taken from OpenSSL CVS. Addresses CVE-2012-2110.
2012-05-01 00:40:38 +02:00
..
config deps: reapply 0a34755 to bundled openssl 2012-04-12 01:34:05 +02:00
openssl deps: back-port openssl patch 2012-05-01 00:40:38 +02:00
patches deps: upgrade openssl to 1.0.0f 2012-04-12 01:34:05 +02:00
buildinf.h
openssl.gyp Disable OpenSSL UI 2012-04-12 01:34:05 +02:00
README.chromium deps: upgrade openssl to 1.0.0f 2012-04-12 01:34:05 +02:00

Name: openssl
URL: http://openssl.org/source/
Version: 1.0.0f
License: BSDish
License File: openssl/LICENSE

Description:
This is OpenSSL, the standard SSL/TLS library, which is used only in Android.

It's an unmodified, upstream source except for the patches listed below.


********************************************************************************
The following patches are taken from Android Open Source Project.


progs.patch:

Fixup sources under the apps/ directory that are not built under the android environment.


small_records.patch:

Reduce OpenSSL memory consumption.
SSL records may be as large as 16K, but are typically < 2K.  In
addition, a historic bug in Windows allowed records to be as large
32K.  OpenSSL statically allocates read and write buffers (34K and
18K respectively) used for processing records.
With this patch, OpenSSL statically allocates 4K + 4K buffers, with
the option of dynamically growing buffers to 34K + 4K, which is a
saving of 44K per connection for the typical case.


handshake_cutthrough.patch

Enables SSL3+ clients to send application data immediately following the
Finished message even when negotiating full-handshakes.  With this patch,
clients can negotiate SSL connections in 1-RTT even when performing
full-handshakes.


jsse.patch

Support for JSSE implementation based on OpenSSL.


npn.patch

Transport Layer Security (TLS) Next Protocol Negotiation Extension


sha1_armv4_large.patch

This patch eliminates memory stores to addresses below SP.


openssl_no_dtls1.patch

Add missing #ifndef OPENSSL_NO_DTLS1


********************************************************************************
The following patches are needed to compile this openssl on Chromium and pass
the related net unit tests.


empty_OPENSSL_cpuid_setup.patch

Use a empty implementation for function OPENSSL_cpuid_setup to resolve link
error. We should figure out how to geenrate platform specific implementation
of OPENSSL_cpuid_setup by leveraging crypto/*cpuid.pl.


x509_hash_name_algorithm_change.patch

There are many symbolic links under /etc/ssl/certs created by using hash of
the pem certificates in order for OpenSSL to find those certificate.
Openssl has a tool to help you create hash symbolic links. (See tools/c_rehash)
However the new openssl changed the hash algorithm, Unless you compile/install
the latest openssl library and re-create all related symbolic links, the new
openssl can not find some certificates because the links of those certificates
were created by using old hash algorithm, which causes some tests failed.
This patch gives a way to find a certificate according to its hash by using both
new algorithm and old algorithm.
crbug.com/111045 is used to track this issue.


tls_exporter.patch

Keying Material Exporters for Transport Layer Security (RFC 5705).


Android platform support

Copy config/android/openssl/opensslconf.h from Android's
external/openssl/include/openssl/opensslconf.h