Searched refs:SSL3 (Results 1 – 9 of 9) sorted by relevance
11 This option tells curl to not work around a security flaw in the SSL3 and
138 BIO_printf(bio_err, "SSL3 alert %s:%s:%s\n", str,
26 ### SSL3 cipher suites
631 pub const SSL3: SslVersion = SslVersion(ffi::SSL3_VERSION); constant
166 support SSL3.0 which this function excludes using the167 :data:`OP_NO_SSLv3`. SSL3.0 is widely considered to be `completely broken
466 * Save RAM by releasing read and write buffers when they're empty. (SSL3 and
12553 Remote buffer overflow in SSL3 protocol - an attacker could14705 * Remote buffer overflow in SSL3 protocol - an attacker could17000 SSL3/TLS protocol. Netscape SGC does two handshakes: the first with17882 * Fix memory leaks in s3_clnt.c: All non-anonymous SSL3/TLS1 connections
12491 Remote buffer overflow in SSL3 protocol - an attacker could14643 * Remote buffer overflow in SSL3 protocol - an attacker could16938 SSL3/TLS protocol. Netscape SGC does two handshakes: the first with17820 * Fix memory leaks in s3_clnt.c: All non-anonymous SSL3/TLS1 connections