Home
last modified time | relevance | path

Searched refs:SSLv3 (Results 1 – 25 of 41) sorted by relevance

12

/third_party/openssl/test/ssl-tests/
D02-protocol-version.cnf695 MaxProtocol = SSLv3
700 MaxProtocol = SSLv3
725 MaxProtocol = SSLv3
750 MaxProtocol = SSLv3
775 MaxProtocol = SSLv3
800 MaxProtocol = SSLv3
824 MaxProtocol = SSLv3
844 MaxProtocol = SSLv3
845 MinProtocol = SSLv3
850 MaxProtocol = SSLv3
[all …]
D04-client_auth.cnf.in24 @protocols = (undef, "SSLv3", "TLSv1", "TLSv1.1", "TLSv1.2", "DTLSv1", "DTLSv1.2");
38 if ($protocol_name eq "SSLv3") {
/third_party/openssl/doc/man3/
DSSL_get_version.pod40 =item SSLv3
42 The connection uses the SSLv3 protocol.
73 The connection uses the SSLv3 protocol.
DSSL_CONF_cmd.pod187 Currently supported protocol values are B<SSLv3>, B<TLSv1>, B<TLSv1.1>,
244 Disables protocol support for SSLv3, TLSv1.0, TLSv1.1, TLSv1.2 or TLSv1.3 by
400 Currently supported protocol values are B<SSLv3>, B<TLSv1>, B<TLSv1.1>,
412 Currently supported protocol values are B<SSLv3>, B<TLSv1>, B<TLSv1.1>,
435 Currently supported protocol values are B<SSLv3>, B<TLSv1>, B<TLSv1.1>,
606 SSL_CONF_cmd(ctx, "Protocol", "-SSLv3");
609 it will disable SSLv3 support by default but the user can override it. If
613 SSL_CONF_cmd(ctx, "Protocol", "-SSLv3");
615 SSLv3 is B<always> disabled and attempt to override this by the user are
670 This set the minimum protocol version to TLSv1, and so disables SSLv3.
[all …]
DSSL_CTX_new.pod126 The supported protocols are SSLv3, TLSv1, TLSv1.1, TLSv1.2 and TLSv1.3.
157 SSLv3 protocol.
158 The SSLv3 protocol is deprecated and should not be used.
206 The SSLv3 protocol is deprecated and should generally not be used.
DSSL_COMP_add_compression_method.pod43 The TLS standard (or SSLv3) allows the integration of compression methods
51 An OpenSSL client speaking a protocol that allows compression (SSLv3, TLSv1)
DSSL_CTX_set_options.pod256 These options turn off the SSLv3, TLSv1, TLSv1.1, TLSv1.2 or TLSv1.3 protocol
315 the client sends a SSLv2 hello and accepts up to SSLv3.1=TLSv1, the server
316 only understands up to SSLv3. In this case the client must still use the
317 same SSLv3.1=TLSv1 announcement. Some clients step down to SSLv3 with respect
DSSL_CIPHER_get_name.pod50 SSLv3 and TLS, it returns the TLS name.
55 than the SSLv3 name.
DSSL_export_keying_material.pod66 above. Attempting to use it in SSLv3 will result in an error.
DSSL_extension_supported.pod194 Extensions are not typically defined for SSLv3. Setting this value will allow
195 the extension in SSLv3. Applications will not typically need to use this.
DSSL_get_ciphers.pod56 SSLv3/TLS wire format), and parses the cipher suites supported by the library
DSSL_CTX_set_client_hello_cb.pod42 differences from the normal SSLv3 format, including using three bytes per
DSSL_CTX_set_generate_session_id.pod61 of generating the same session id is extremely small (2^256 for SSLv3/TLSv1).
DSSL_CTX_set_split_send_fragment.pod39 TLS1.1+. There is no support in SSLv3, TLSv1.0 or DTLS (any version). This
DSSL_alert_type_string.pod102 (SSLv3 only).
DSSL_CTX_set_tlsext_ticket_key_cb.pod33 to TLS and there is no SSLv3 implementation.
/third_party/openssl/doc/man7/
DEVP_MD-MD5-SHA1.pod11 MD5-SHA1 is a rather special digest that's used with SSLv3.
33 SSLv3 CertificateVerify message as per RFC6101.
Dssl.pod47 methods/functions which implement the various protocol versions (SSLv3
99 This is the sub header file dealing with the SSLv3 protocol only.
DEVP_MD-SHA1.pod31 SSLv3 CertificateVerify message as per RFC6101.
/third_party/openssl/doc/man1/
Dopenssl-sess_id.pod.in101 This is the protocol in use TLSv1.3, TLSv1.2, TLSv1.1, TLSv1 or SSLv3.
Dopenssl-ciphers.pod.in124 suites using the digest algorithm SHA1 and B<SSLv3> represents all SSL v3
278 =item B<TLSv1.2>, B<TLSv1.0>, B<SSLv3>
284 then both TLSv1.0 and SSLv3.0 cipher suites are available.
/third_party/python/Lib/
Dssl.py160 SSLv3 = _ssl.PROTO_SSLv3 variable in TLSVersion
601 if value == TLSVersion.SSLv3:
/third_party/python/Doc/library/
Dssl.rst798 Prevents an SSLv3 connection. This option is only applicable in
800 choosing SSLv3 as the protocol version.
806 SSLv3 is deprecated
1093 .. attribute:: TLSVersion.SSLv3
1402 ``"SSLv3"``, ``"TLSv1"``, ``"TLSv1.1"`` and ``"TLSv1.2"``.
1482 …*client* / **server** **SSLv2** **SSLv3** **TLS** [3]_ **TLSv1** **TLSv1.1** **TLSv…
1485 … *SSLv3* no yes no [2]_ no no no
1494 .. [2] :class:`SSLContext` disables SSLv3 with :data:`OP_NO_SSLv3` by default.
2683 :const:`PROTOCOL_TLS_SERVER` as the protocol version. SSLv2 and SSLv3 are
/third_party/openssl/include/openssl/
Dssl.h.in160 # define SSL_TXT_SSLV3 "SSLv3"
263 /* Most extensions are not defined for SSLv3 but EXT_TYPE_renegotiate is */
384 * If set, a server will allow a client to issue a SSLv3.0 version
656 * is set at the maximum size the session ID can be. In SSLv3/TLSv1 it is 32
1130 /* These alert types are for SSLv3 and TLSv1 */
1926 OSSL_DEPRECATEDIN_1_1_0 __owur const SSL_METHOD *SSLv3_method(void); /* SSLv3 */
/third_party/openssl/test/
DREADME.ssltest.md77 SSLv3, TLSv1, TLSv1.1, TLSv1.2.

12