diff options
author | Ben Noordhuis <info@bnoordhuis.nl> | 2013-04-26 14:49:54 +0200 |
---|---|---|
committer | Ben Noordhuis <info@bnoordhuis.nl> | 2013-04-29 12:12:33 +0200 |
commit | 4fdb8acdaef4c3cb1d855e992ada0e63fee520a6 (patch) | |
tree | 4b2a796fadb3060c6952c5521c292da209b4adfb /deps/openssl/patches/sha1_armv4_large.patch | |
parent | 626d7abdb43b672a6153510561afdd8856b7770f (diff) | |
download | android-node-v8-4fdb8acdaef4c3cb1d855e992ada0e63fee520a6.tar.gz android-node-v8-4fdb8acdaef4c3cb1d855e992ada0e63fee520a6.tar.bz2 android-node-v8-4fdb8acdaef4c3cb1d855e992ada0e63fee520a6.zip |
deps: downgrade openssl to v1.0.0f
Several people have reported issues with IIS and Resin servers (or maybe
SSL terminators sitting in front of those servers) that are fixed by
downgrading OpenSSL. The AESNI performance improvements were nice but
stability is more important. Downgrade OpenSSL from 1.0.1e to 1.0.0f.
Fixes #5360 (and others).
Diffstat (limited to 'deps/openssl/patches/sha1_armv4_large.patch')
-rw-r--r-- | deps/openssl/patches/sha1_armv4_large.patch | 21 |
1 files changed, 21 insertions, 0 deletions
diff --git a/deps/openssl/patches/sha1_armv4_large.patch b/deps/openssl/patches/sha1_armv4_large.patch new file mode 100644 index 0000000000..359ff94afd --- /dev/null +++ b/deps/openssl/patches/sha1_armv4_large.patch @@ -0,0 +1,21 @@ +diff --git a/crypto/sha/asm/sha1-armv4-large.pl b/crypto/sha/asm/sha1-armv4-large.pl +index 6e65fe3..79e3f61 100644 +--- a/crypto/sha/asm/sha1-armv4-large.pl ++++ b/crypto/sha/asm/sha1-armv4-large.pl +@@ -161,6 +161,7 @@ for($i=0;$i<5;$i++) { + $code.=<<___; + teq $Xi,sp + bne .L_00_15 @ [((11+4)*5+2)*3] ++ sub sp,sp,#5*4 + ___ + &BODY_00_15(@V); unshift(@V,pop(@V)); + &BODY_16_19(@V); unshift(@V,pop(@V)); +@@ -170,7 +171,7 @@ ___ + $code.=<<___; + + ldr $K,.LK_20_39 @ [+15+16*4] +- sub sp,sp,#25*4 ++ sub sp,sp,#20*4 + cmn sp,#0 @ [+3], clear carry to denote 20_39 + .L_20_39_or_60_79: + ___ |