/third_party/openssl/test/ssl-tests/ |
D | 02-protocol-version.cnf | 695 MaxProtocol = SSLv3 700 MaxProtocol = SSLv3 725 MaxProtocol = SSLv3 750 MaxProtocol = SSLv3 775 MaxProtocol = SSLv3 800 MaxProtocol = SSLv3 824 MaxProtocol = SSLv3 844 MaxProtocol = SSLv3 845 MinProtocol = SSLv3 850 MaxProtocol = SSLv3 [all …]
|
D | 04-client_auth.cnf.in | 24 @protocols = (undef, "SSLv3", "TLSv1", "TLSv1.1", "TLSv1.2", "DTLSv1", "DTLSv1.2"); 38 if ($protocol_name eq "SSLv3") {
|
/third_party/openssl/doc/man3/ |
D | SSL_get_version.pod | 40 =item SSLv3 42 The connection uses the SSLv3 protocol. 73 The connection uses the SSLv3 protocol.
|
D | SSL_CONF_cmd.pod | 187 Currently supported protocol values are B<SSLv3>, B<TLSv1>, B<TLSv1.1>, 244 Disables protocol support for SSLv3, TLSv1.0, TLSv1.1, TLSv1.2 or TLSv1.3 by 400 Currently supported protocol values are B<SSLv3>, B<TLSv1>, B<TLSv1.1>, 412 Currently supported protocol values are B<SSLv3>, B<TLSv1>, B<TLSv1.1>, 435 Currently supported protocol values are B<SSLv3>, B<TLSv1>, B<TLSv1.1>, 606 SSL_CONF_cmd(ctx, "Protocol", "-SSLv3"); 609 it will disable SSLv3 support by default but the user can override it. If 613 SSL_CONF_cmd(ctx, "Protocol", "-SSLv3"); 615 SSLv3 is B<always> disabled and attempt to override this by the user are 670 This set the minimum protocol version to TLSv1, and so disables SSLv3. [all …]
|
D | SSL_CTX_new.pod | 126 The supported protocols are SSLv3, TLSv1, TLSv1.1, TLSv1.2 and TLSv1.3. 157 SSLv3 protocol. 158 The SSLv3 protocol is deprecated and should not be used. 206 The SSLv3 protocol is deprecated and should generally not be used.
|
D | SSL_COMP_add_compression_method.pod | 43 The TLS standard (or SSLv3) allows the integration of compression methods 51 An OpenSSL client speaking a protocol that allows compression (SSLv3, TLSv1)
|
D | SSL_CTX_set_options.pod | 256 These options turn off the SSLv3, TLSv1, TLSv1.1, TLSv1.2 or TLSv1.3 protocol 315 the client sends a SSLv2 hello and accepts up to SSLv3.1=TLSv1, the server 316 only understands up to SSLv3. In this case the client must still use the 317 same SSLv3.1=TLSv1 announcement. Some clients step down to SSLv3 with respect
|
D | SSL_CIPHER_get_name.pod | 50 SSLv3 and TLS, it returns the TLS name. 55 than the SSLv3 name.
|
D | SSL_export_keying_material.pod | 66 above. Attempting to use it in SSLv3 will result in an error.
|
D | SSL_extension_supported.pod | 194 Extensions are not typically defined for SSLv3. Setting this value will allow 195 the extension in SSLv3. Applications will not typically need to use this.
|
D | SSL_get_ciphers.pod | 56 SSLv3/TLS wire format), and parses the cipher suites supported by the library
|
D | SSL_CTX_set_client_hello_cb.pod | 42 differences from the normal SSLv3 format, including using three bytes per
|
D | SSL_CTX_set_generate_session_id.pod | 61 of generating the same session id is extremely small (2^256 for SSLv3/TLSv1).
|
D | SSL_CTX_set_split_send_fragment.pod | 39 TLS1.1+. There is no support in SSLv3, TLSv1.0 or DTLS (any version). This
|
D | SSL_alert_type_string.pod | 102 (SSLv3 only).
|
D | SSL_CTX_set_tlsext_ticket_key_cb.pod | 33 to TLS and there is no SSLv3 implementation.
|
/third_party/openssl/doc/man7/ |
D | EVP_MD-MD5-SHA1.pod | 11 MD5-SHA1 is a rather special digest that's used with SSLv3. 33 SSLv3 CertificateVerify message as per RFC6101.
|
D | ssl.pod | 47 methods/functions which implement the various protocol versions (SSLv3 99 This is the sub header file dealing with the SSLv3 protocol only.
|
D | EVP_MD-SHA1.pod | 31 SSLv3 CertificateVerify message as per RFC6101.
|
/third_party/openssl/doc/man1/ |
D | openssl-sess_id.pod.in | 101 This is the protocol in use TLSv1.3, TLSv1.2, TLSv1.1, TLSv1 or SSLv3.
|
D | openssl-ciphers.pod.in | 124 suites using the digest algorithm SHA1 and B<SSLv3> represents all SSL v3 278 =item B<TLSv1.2>, B<TLSv1.0>, B<SSLv3> 284 then both TLSv1.0 and SSLv3.0 cipher suites are available.
|
/third_party/python/Lib/ |
D | ssl.py | 160 SSLv3 = _ssl.PROTO_SSLv3 variable in TLSVersion 601 if value == TLSVersion.SSLv3:
|
/third_party/python/Doc/library/ |
D | ssl.rst | 798 Prevents an SSLv3 connection. This option is only applicable in 800 choosing SSLv3 as the protocol version. 806 SSLv3 is deprecated 1093 .. attribute:: TLSVersion.SSLv3 1402 ``"SSLv3"``, ``"TLSv1"``, ``"TLSv1.1"`` and ``"TLSv1.2"``. 1482 …*client* / **server** **SSLv2** **SSLv3** **TLS** [3]_ **TLSv1** **TLSv1.1** **TLSv… 1485 … *SSLv3* no yes no [2]_ no no no 1494 .. [2] :class:`SSLContext` disables SSLv3 with :data:`OP_NO_SSLv3` by default. 2683 :const:`PROTOCOL_TLS_SERVER` as the protocol version. SSLv2 and SSLv3 are
|
/third_party/openssl/include/openssl/ |
D | ssl.h.in | 160 # define SSL_TXT_SSLV3 "SSLv3" 263 /* Most extensions are not defined for SSLv3 but EXT_TYPE_renegotiate is */ 384 * If set, a server will allow a client to issue a SSLv3.0 version 656 * is set at the maximum size the session ID can be. In SSLv3/TLSv1 it is 32 1130 /* These alert types are for SSLv3 and TLSv1 */ 1926 OSSL_DEPRECATEDIN_1_1_0 __owur const SSL_METHOD *SSLv3_method(void); /* SSLv3 */
|
/third_party/openssl/test/ |
D | README.ssltest.md | 77 SSLv3, TLSv1, TLSv1.1, TLSv1.2.
|