| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
| | |
|
| | |
|
| | |
|
|\| |
|
| | |
|
| | |
|
|\| |
|
| | |
|
| | |
|
|\| |
|
| | |
|
|\| |
|
| | |
|
|\| |
|
| |
| |
| |
| | |
static one
|
|\| |
|
| |
| |
| |
| | |
DSA and ECDH certs/keys.
|
| | |
|
| | |
|
|\| |
|
| |
| |
| |
| | |
network. Also, although obsolete, SSLv3 isn't documented to have any weaknesses that TLS 1.0 (the most common version used today) doesn't also have. Get your act together clients!
|
| | |
|
| | |
|
| | |
|
|\| |
|
| |
| |
| |
| | |
cipher strength and to disable triple-DES (weaker and much slower than AES)
|
| | |
|
|\| |
|
| |
| |
| |
| | |
of the array
|
| |
| |
| |
| | |
default, as clients have been shown to commonly select weak and insecure ciphers even when they support stronger ones
|
| | |
|
|\| |
|
| | |
|
| | |
|
| | |
|
| |
| |
| |
| | |
that into the type
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| |
| |
| |
| | |
includes table upgrades (again)
|
| | |
|
| | |
|
| | |
|
| | |
|
| |
| |
| |
| | |
(Zash breaks, Zash unbreaks)
|
| | |
|