cipherscan/top1m
Hubert Kario a71bfe5ebd detect some TLS intolerancies
buggy servers may choke on large ClientHello's, TLSv1.2 ClientHello's,
etc. try to detect such failures and report them

among tried connections are TLS1.2, TLS1.1, TLS1.0 and SSLv3 with
ability to downgrade to lower protocol versions as well as a size
limited client hello, both TLS1.2 and TLS1.0 version
2015-07-16 16:15:39 +02:00
..
Makefile add Makefile for the C utility 2014-10-30 01:33:58 +01:00
parse_CAs.c parse_CAs.c - implement error checking, remove magic numbers, compile fix 2014-10-30 23:37:43 +01:00
parse_CAs.py make scripts python 3 compatible 2015-05-30 15:46:26 +02:00
parse_results.py detect some TLS intolerancies 2015-07-16 16:15:39 +02:00
process-certificate-statistics.sh process-certificate-statistics.sh - the script HOWTO to turn results to CA stats 2014-10-12 20:38:25 +02:00
testtop1m.sh add support for testing supported curves 2015-03-27 10:04:15 -04:00
top-1m.csv update the top 1M list to the version from 2014-05-16 2014-05-16 17:34:22 +02:00