| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
santiago)
|
|
|
|
| |
part
|
|
|
|
| |
when not installed)
|
|
|
|
| |
arithmetic and avoid relying on implicit coercion (thanks David Favro)
|
| |
|
|
|
|
| |
ending with .crt
|
|
|
|
| |
overwritten by magic
|
|
|
|
| |
(fixes #614)
|
| |
|
|
|
|
| |
false to disable the built in default)
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
c6caaa440e74, portmanager assumes non-falsy second return value is an error) (thanks deoren)
|
| |
|
|
|
|
| |
option sets, merging all
|
| |
|
|
|
|
| |
from util.paths
|
|
|
|
| |
(thanks Ralph)
|
| |
|
| |
|
| |
|
|
|
|
| |
protocols
|
|
|
|
| |
settings with inheritance while allowing options to be disabled per virtualhost
|
| |
|
| |
|
| |
|
|
|
|
| |
removing defaults
|
|\ |
|
| |
| |
| |
| | |
DSA and ECDH certs/keys.
|
| |
| |
| |
| | |
network. Also, although obsolete, SSLv3 isn't documented to have any weaknesses that TLS 1.0 (the most common version used today) doesn't also have. Get your act together clients!
|
|\| |
|
| |
| |
| |
| | |
cipher strength and to disable triple-DES (weaker and much slower than AES)
|
|\| |
|
| |
| |
| |
| | |
of the array
|
| |
| |
| |
| | |
default, as clients have been shown to commonly select weak and insecure ciphers even when they support stronger ones
|
|\| |
|
| | |
|
| | |
|
| |
| |
| |
| | |
instead of a callback
|
| |
| |
| |
| | |
to not honour the 'ciphers' option. This change will apply 0.9's default cipher string for LuaSec 0.4.1 users.
|
| | |
|
| |
| |
| |
| | |
(Zash breaks, Zash unbreaks)
|
| |
| |
| |
| | |
instead of a callback
|