node/deps/openssl/asm/x86-win32-masm
Ben Noordhuis 2cf7e5de6f Revert "deps: downgrade openssl to v1.0.0f"
After much investigation it turns out that the affected servers are
buggy.  user-service.condenastdigital.com:443 in particular seems to
reject large TLS handshake records. Cutting down the number of
advertised ciphers or disabling SNI fixes the issue.

Similarly, passing { secureOptions: constants.SSL_OP_NO_TLSv1_2 }
seems to fix most connection issues with IIS servers.

Having to work around buggy servers is annoying for our users but not
a reason to downgrade OpenSSL. Therefore, revert it.

This reverts commit 4fdb8acdae.
2013-05-01 16:45:31 +02:00
..
aes Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
bf Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
bn Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
camellia Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
cast Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
des Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
md5 Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
rc4 Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
rc5 Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
ripemd Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
sha Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
whrlpool openssl: add generated asm code 2012-09-25 08:51:04 -07:00
x86cpuid.asm Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00