node/deps/openssl/asm
Ben Noordhuis 2cf7e5de6f Revert "deps: downgrade openssl to v1.0.0f"
After much investigation it turns out that the affected servers are
buggy.  user-service.condenastdigital.com:443 in particular seems to
reject large TLS handshake records. Cutting down the number of
advertised ciphers or disabling SNI fixes the issue.

Similarly, passing { secureOptions: constants.SSL_OP_NO_TLSv1_2 }
seems to fix most connection issues with IIS servers.

Having to work around buggy servers is annoying for our users but not
a reason to downgrade OpenSSL. Therefore, revert it.

This reverts commit 4fdb8acdae.
2013-05-01 16:45:31 +02:00
..
x64-elf-gas Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
x64-macosx-gas Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
x64-win32-masm Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
x86-elf-gas Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
x86-macosx-gas Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
x86-win32-masm Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00
Makefile Revert "deps: downgrade openssl to v1.0.0f" 2013-05-01 16:45:31 +02:00