Searched refs:SSLv3 (Results 1 – 20 of 20) sorted by relevance
/external/curl/docs/cmdline-opts/ |
D | sslv3.d | 9 Help: Use SSLv3 12 server. Sometimes curl is built without SSLv3 support. SSLv3 is widely
|
/external/curl/docs/ |
D | FEATURES | 75 - force usage of a specific SSL version (SSLv2 (*7), SSLv3 (*10) or TLSv1) 195 example, only supports SSLv3 and TLSv1 199 *10 = requires an SSL library that supports SSLv3
|
D | FAQ | 810 It turned out to be because many older SSL servers don't deal with SSLv3 815 request and instead you had to force curl to use SSLv3 with -3/--sslv3.
|
/external/conscrypt/ |
D | CAPABILITIES.md | 12 * `SSLv3` (ignored) 19 `SSLv3` in calls to methods like
|
/external/scapy/test/tls/ |
D | tests_tls_netaccess.uts | 120 = Testing TLS client with SSLv3 and TLS_RSA_EXPORT_WITH_RC4_40_MD5
|
/external/conscrypt/repackaged/testing/src/main/java/com/android/org/conscrypt/java/security/ |
D | StandardNames.java | 162 SSLv3("SSLv3"), enumConstant
|
/external/conscrypt/testing/src/main/java/org/conscrypt/java/security/ |
D | StandardNames.java | 160 SSLv3("SSLv3"), enumConstant
|
/external/python/cpython3/Lib/ |
D | ssl.py | 160 SSLv3 = _ssl.PROTO_SSLv3 variable in TLSVersion 489 if value == TLSVersion.SSLv3:
|
/external/okhttp/ |
D | CHANGELOG.md | 341 * **`COMPATIBLE_TLS` no longer supports SSLv3.** In response to the 343 vulnerability, OkHttp no longer offers SSLv3 when negotiation an 345 running SSLv3, you must manually configure your own `ConnectionSpec`. 392 only one fallback, to SSLv3. Applications can now configure this with the
|
/external/python/cpython3/Doc/library/ |
D | ssl.rst | 762 Prevents an SSLv3 connection. This option is only applicable in 764 choosing SSLv3 as the protocol version. 770 SSLv3 is deprecated 1051 .. attribute:: TLSVersion.SSLv3 1342 ``"SSLv3"``, ``"TLSv1"``, ``"TLSv1.1"`` and ``"TLSv1.2"``. 1422 …*client* / **server** **SSLv2** **SSLv3** **TLS** [3]_ **TLSv1** **TLSv1.1** **TLSv… 1425 … *SSLv3* no yes no [2]_ no no no 1434 .. [2] :class:`SSLContext` disables SSLv3 with :data:`OP_NO_SSLv3` by default. 1575 'protocol': 'TLSv1/SSLv3', 1582 'protocol': 'TLSv1/SSLv3', [all …]
|
/external/python/cpython2/Doc/library/ |
D | ssl.rst | 194 … *client* / **server** **SSLv2** **SSLv3** **SSLv23** **TLSv1** **TLSv1.1** **TLSv1.2** 197 *SSLv3* no yes yes no no no 687 Prevents an SSLv3 connection. This option is only applicable in 689 choosing SSLv3 as the protocol version. 1030 ``"SSLv3"``, ``"TLSv1"``, ``"TLSv1.1"`` and ``"TLSv1.2"``. 1780 disable SSLv2 and SSLv3 explicitly using the :data:`SSLContext.options`
|
/external/python/cpython3/Lib/test/ |
D | test_ssl.py | 1164 {ssl.TLSVersion.TLSv1, ssl.TLSVersion.SSLv3} 3737 server_context.minimum_version = ssl.TLSVersion.SSLv3 3738 client_context.minimum_version = ssl.TLSVersion.SSLv3 3739 client_context.maximum_version = ssl.TLSVersion.SSLv3
|
/external/python/cpython2/Misc/NEWS.d/ |
D | 2.7.11rc1.rst | 180 Disable the vulnerable SSLv3 protocol by default when creating
|
/external/python/cpython3/Misc/NEWS.d/ |
D | 3.5.1rc1.rst | 807 Disable the vulnerable SSLv3 protocol by default when creating
|
D | 3.6.0a1.rst | 3023 Disable the vulnerable SSLv3 protocol by default when creating
|
D | 3.5.0a1.rst | 1769 SSLv3 is now disabled throughout the standard library. It can still be
|
/external/python/cpython3/Doc/whatsnew/ |
D | 3.5.rst | 138 * SSLv3 is now disabled throughout the standard library.
|
D | 3.3.rst | 1969 SSLv3 server sockets to use the server's cipher ordering preference rather
|
/external/curl/ |
D | configure.ac | 2441 dnl Recent WolfSSL versions build without SSLv3 by default
|
/external/python/cpython3/Misc/ |
D | HISTORY | 310 - Issue #25530: Disable the vulnerable SSLv3 protocol by default when creating 1131 - Issue #22638: SSLv3 is now disabled throughout the standard library.
|