boring2/openssl-sys/src
Cody P Schafer 50c5042c70 ssl/npn+alpn: adjust protocol selection to fail if no protocols match
The current behavior causes a server written using rust-openssl to (if
it cannot negotiate a protocol) fallback to the first protocol it has
avaliable.

This makes it impossible to detect protocol mismatches.

This updates our selection to be more similar to how openssl's
s_server behaves: non-matching protocols are not supplied with a
fallback.

Note that some setups may actually want a fallback protocol supplied
via ALPN. To support those cases, we should consider adding a generic
callback that allows protocol selection to be entirely controlled by
the programmer.

For the purposes of having a sane default, however, not supplying a
default (and mimicing s_server's behavior) is the best choice.
2015-09-01 17:14:04 -04:00
..
lib.rs ssl/npn+alpn: adjust protocol selection to fail if no protocols match 2015-09-01 17:14:04 -04:00
openssl_shim.c Add support for set_tmp_dh() and RFC5114 DH parameters for forward secrecy. 2015-08-31 23:12:57 +02:00
probe.rs Update to rust master 2015-03-25 10:51:28 -07:00
ssl_options.rs Decouple C SSL Option bit flags from Rust version 2015-07-01 21:49:11 -07:00