Home
last modified time | relevance | path

Searched refs:SSLv2 (Results 1 – 16 of 16) sorted by relevance

/external/scapy/test/
Dsslv2.uts9 ################# Reading SSLv2 vulnerable test session #######################
19 + Read a vulnerable SSLv2 session
21 = Reading SSLv2 session - Loading unparsed SSLv2 records
34 = Reading SSLv2 session - SSLv2 parsing does not raise any error
35 t = SSLv2(ch)
37 = Reading SSLv2 session - Record with cleartext
44 = Reading SSLv2 session - Record __getitem__
47 = Reading SSLv2 session - ClientHello
58 = Reading SSLv2 session - ServerHello
59 t = SSLv2(sh, tls_session=t.tls_session.mirror())
[all …]
/external/curl/docs/cmdline-opts/
Dsslv2.d9 Help: Use SSLv2
13 server. Sometimes curl is built without SSLv2 support. SSLv2 is widely
/external/scapy/scapy/layers/tls/
Dautomaton.py18 from scapy.layers.tls.record_sslv2 import SSLv2
143 if isinstance(p, SSLv2) and not p.msg:
195 self.buffer_out.append(SSLv2(tls_session=self.cur_session))
Drecord_sslv2.py66 class SSLv2(TLS): class
81 super(SSLv2, self).__init__(*args, **kargs)
173 p = SSLv2(s, _internal=1, _underlayer=self,
Drecord.py283 from scapy.layers.tls.record_sslv2 import SSLv2
284 return SSLv2
/external/python/pyopenssl/doc/api/
Dssl.rst83 SSLv2-compatible handshake, but don't want to use SSLv2. If the underlying
/external/scapy/test/tls/
Dtests_tls_netaccess.uts115 = Testing TLS server and client with SSLv2 and SSL_CK_DES_192_EDE3_CBC_WITH_MD5
/external/curl/docs/
DFEATURES75 - force usage of a specific SSL version (SSLv2 (*7), SSLv3 (*10) or TLSv1)
DFAQ802 requests properly. To correct this problem, tell curl to select SSLv2 from
805 There have also been examples where the remote server didn't like the SSLv2
/external/python/cpython2/Doc/library/
Dssl.rst194 … *client* / **server** **SSLv2** **SSLv3** **SSLv23** **TLSv1** **TLSv1.1** **TLSv1.2**
196 *SSLv2* yes no yes no no no
213 would always attempt SSLv2 connections.
616 .. deprecated:: 2.7.13 OpenSSL has removed support for SSLv2.
679 Prevents an SSLv2 connection. This option is only applicable in
681 choosing SSLv2 as the protocol version.
730 This option has no effect on client sockets and SSLv2 server sockets.
1029 As of this writing, possible return values include ``"SSLv2"``,
1780 disable SSLv2 and SSLv3 explicitly using the :data:`SSLContext.options`
/external/python/cpython3/Doc/library/
Dssl.rst695 OpenSSL has removed support for SSLv2.
757 Prevents an SSLv2 connection. This option is only applicable in
759 choosing SSLv2 as the protocol version.
765 SSLv2 is deprecated
841 This option has no effect on client sockets and SSLv2 server sockets.
1353 As of this writing, possible return values include ``"SSLv2"``,
1434 …*client* / **server** **SSLv2** **SSLv3** **TLS** [3]_ **TLSv1** **TLSv1.1** **TLSv…
1436 … *SSLv2* yes no no [1]_ no no no
1445 .. [1] :class:`SSLContext` disables SSLv2 with :data:`OP_NO_SSLv2` by default.
2658 :const:`PROTOCOL_TLS_SERVER` as the protocol version. SSLv2 and SSLv3 are
/external/python/cpython2/Misc/NEWS.d/
D2.7.7rc1.rst562 Always disable SSLv2 except when PROTOCOL_SSLv2 is explicitly asked for.
D2.7.3rc1.rst516 SSLv2 is explicitly asked for).
/external/python/pyopenssl/doc/
DChangeLog_old.txt226 * OpenSSL/ssl/context.c: Remove SSLv2 support if the underlying
/external/python/cpython3/Doc/whatsnew/
D3.2.rst1657 :data:`~ssl.OP_NO_SSLv2` which disables the insecure and obsolete SSLv2
/external/python/cpython3/Misc/
DHISTORY2690 - Issue #20207: Always disable SSLv2 except when PROTOCOL_SSLv2 is explicitly
8887 (except when SSLv2 is explicitly asked for).