node/deps/openssl/asm/x86-macosx-gas
Ben Noordhuis 2cf7e5de6f Revert "deps: downgrade openssl to v1.0.0f"
After much investigation it turns out that the affected servers are
buggy.  user-service.condenastdigital.com:443 in particular seems to
reject large TLS handshake records. Cutting down the number of
advertised ciphers or disabling SNI fixes the issue.

Similarly, passing { secureOptions: constants.SSL_OP_NO_TLSv1_2 }
seems to fix most connection issues with IIS servers.

Having to work around buggy servers is annoying for our users but not
a reason to downgrade OpenSSL. Therefore, revert it.

This reverts commit 4fdb8acdae.
2013-05-01 16:45:31 +02:00
..
aes Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
bf openssl: add generated asm code 2012-09-25 08:51:04 -07:00
bn openssl: add generated asm code 2012-09-25 08:51:04 -07:00
camellia Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
cast openssl: add generated asm code 2012-09-25 08:51:04 -07:00
des Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
md5 openssl: add generated asm code 2012-09-25 08:51:04 -07:00
rc4 Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
rc5 openssl: add generated asm code 2012-09-25 08:51:04 -07:00
ripemd openssl: add generated asm code 2012-09-25 08:51:04 -07:00
sha Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
whrlpool openssl: add generated asm code 2012-09-25 08:51:04 -07:00
x86cpuid.s Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00