Searched refs:SSL3 (Results 1 – 11 of 11) sorted by relevance
19 This option tells curl to not work around a security flaw in the SSL3 and
33 SSL3 and TLS1.0 protocols. If this option is not used or this bit is set to 0,
35 SSL3 and TLS1.0 protocols. If this option is not used or this bit is set to 0,
138 BIO_printf(bio_err, "SSL3 alert %s:%s:%s\n", str,
26 ### SSL3 cipher suites
631 pub const SSL3: SslVersion = SslVersion(ffi::SSL3_VERSION); constant
166 support SSL3.0 which this function excludes using the167 :data:`OP_NO_SSLv3`. SSL3.0 is widely considered to be `completely broken
466 * Save RAM by releasing read and write buffers when they're empty. (SSL3 and
12669 Remote buffer overflow in SSL3 protocol - an attacker could14821 * Remote buffer overflow in SSL3 protocol - an attacker could17116 SSL3/TLS protocol. Netscape SGC does two handshakes: the first with17998 * Fix memory leaks in s3_clnt.c: All non-anonymous SSL3/TLS1 connections
12491 Remote buffer overflow in SSL3 protocol - an attacker could14643 * Remote buffer overflow in SSL3 protocol - an attacker could16938 SSL3/TLS protocol. Netscape SGC does two handshakes: the first with17820 * Fix memory leaks in s3_clnt.c: All non-anonymous SSL3/TLS1 connections