Hubert Kario 343e5cf194 add ECC strings to ciphers(1), point out difference between DH and ECDH
* Make a clear distinction between DH and ECDH key exchange.
 * Group all key exchange cipher suite identifiers, first DH then ECDH
 * add descriptions for all supported *DH* identifiers
 * add ECDSA authentication descriptions
 * add example showing how to disable all suites that offer no
   authentication or encryption
2014-06-10 20:53:07 +01:00
..
2012-11-19 20:06:44 +00:00
2009-04-15 15:27:03 +00:00
2014-04-16 12:15:43 +01:00
2014-02-14 22:29:12 +00:00
2002-07-09 10:51:25 +00:00
2014-04-03 13:33:50 +01:00
2009-04-15 15:27:03 +00:00
2009-04-15 15:27:03 +00:00
2009-04-15 15:27:03 +00:00
2009-04-15 15:27:03 +00:00
2014-02-14 22:29:12 +00:00
2009-04-15 15:27:03 +00:00
2004-11-25 18:21:26 +00:00
2009-04-15 15:27:03 +00:00
2012-01-11 21:58:19 +00:00
2009-04-15 15:27:03 +00:00
2008-02-25 18:11:47 +00:00
2002-10-04 12:59:00 +00:00
2009-04-15 15:27:03 +00:00
2014-03-01 23:16:08 +00:00
2014-02-14 22:29:12 +00:00
2009-04-15 15:27:03 +00:00
2009-04-15 15:27:03 +00:00
2009-04-15 15:27:03 +00:00
2009-02-02 00:01:28 +00:00
2014-02-14 22:29:12 +00:00
2007-09-17 17:54:31 +00:00
2004-01-08 07:38:15 +00:00
2009-04-15 15:27:03 +00:00
2009-04-15 15:27:03 +00:00
2014-02-14 22:29:12 +00:00
2014-02-14 22:29:12 +00:00
2014-04-26 08:09:53 +01:00
2013-08-21 13:43:00 +01:00