Emilia Kasper a556f34220 Rework the default cipherlist.
- Always prefer forward-secure handshakes.
 - Consistently order ECDSA above RSA.
 - Next, always prefer AEADs to non-AEADs, irrespective of strength.
 - Within AEADs, prefer GCM > CHACHA > CCM for a given strength.
 - Prefer TLS v1.2 ciphers to legacy ciphers.
 - Remove rarely used DSS, IDEA, SEED, CAMELLIA, CCM from the default
   list to reduce ClientHello bloat.

Reviewed-by: Rich Salz <rsalz@openssl.org>
2016-03-07 16:53:42 +01:00
..
2016-01-26 16:40:43 -05:00
2016-01-26 16:40:43 -05:00
2016-01-26 16:40:43 -05:00
2016-01-26 16:40:43 -05:00
2016-01-26 16:40:43 -05:00
2016-03-07 16:53:42 +01:00
2016-01-26 16:40:43 -05:00
2016-01-26 16:40:43 -05:00
2016-02-11 13:53:39 -05:00
2016-03-07 16:53:42 +01:00
2016-02-18 17:14:50 -05:00
2016-02-11 08:43:46 -05:00
2016-03-07 16:53:42 +01:00
2016-01-26 16:40:43 -05:00
2016-03-03 13:27:34 +00:00
2016-02-11 12:40:32 -05:00
2016-01-26 16:40:43 -05:00
2016-01-26 16:40:43 -05:00
2016-02-15 10:17:12 -05:00
2016-03-04 10:50:10 -05:00
2016-03-04 10:50:10 -05:00
2016-02-18 17:14:50 -05:00
2016-01-26 16:40:43 -05:00