Searched refs:SSLv2 (Results 1 – 16 of 16) sorted by relevance
/external/scapy/test/ |
D | sslv2.uts | 9 ################# Reading SSLv2 vulnerable test session ####################### 19 + Read a vulnerable SSLv2 session 21 = Reading SSLv2 session - Loading unparsed SSLv2 records 34 = Reading SSLv2 session - SSLv2 parsing does not raise any error 35 t = SSLv2(ch) 37 = Reading SSLv2 session - Record with cleartext 44 = Reading SSLv2 session - Record __getitem__ 47 = Reading SSLv2 session - ClientHello 58 = Reading SSLv2 session - ServerHello 59 t = SSLv2(sh, tls_session=t.tls_session.mirror()) [all …]
|
/external/curl/docs/cmdline-opts/ |
D | sslv2.d | 9 Help: Use SSLv2 13 server. Sometimes curl is built without SSLv2 support. SSLv2 is widely
|
/external/scapy/scapy/layers/tls/ |
D | automaton.py | 18 from scapy.layers.tls.record_sslv2 import SSLv2 143 if isinstance(p, SSLv2) and not p.msg: 195 self.buffer_out.append(SSLv2(tls_session=self.cur_session))
|
D | record_sslv2.py | 66 class SSLv2(TLS): class 81 super(SSLv2, self).__init__(*args, **kargs) 173 p = SSLv2(s, _internal=1, _underlayer=self,
|
D | record.py | 283 from scapy.layers.tls.record_sslv2 import SSLv2 284 return SSLv2
|
/external/python/pyopenssl/doc/api/ |
D | ssl.rst | 83 SSLv2-compatible handshake, but don't want to use SSLv2. If the underlying
|
/external/scapy/test/tls/ |
D | tests_tls_netaccess.uts | 115 = Testing TLS server and client with SSLv2 and SSL_CK_DES_192_EDE3_CBC_WITH_MD5
|
/external/curl/docs/ |
D | FEATURES | 75 - force usage of a specific SSL version (SSLv2 (*7), SSLv3 (*10) or TLSv1)
|
D | FAQ | 802 requests properly. To correct this problem, tell curl to select SSLv2 from 805 There have also been examples where the remote server didn't like the SSLv2
|
/external/python/cpython2/Doc/library/ |
D | ssl.rst | 194 … *client* / **server** **SSLv2** **SSLv3** **SSLv23** **TLSv1** **TLSv1.1** **TLSv1.2** 196 *SSLv2* yes no yes no no no 213 would always attempt SSLv2 connections. 616 .. deprecated:: 2.7.13 OpenSSL has removed support for SSLv2. 679 Prevents an SSLv2 connection. This option is only applicable in 681 choosing SSLv2 as the protocol version. 730 This option has no effect on client sockets and SSLv2 server sockets. 1029 As of this writing, possible return values include ``"SSLv2"``, 1780 disable SSLv2 and SSLv3 explicitly using the :data:`SSLContext.options`
|
/external/python/cpython3/Doc/library/ |
D | ssl.rst | 695 OpenSSL has removed support for SSLv2. 757 Prevents an SSLv2 connection. This option is only applicable in 759 choosing SSLv2 as the protocol version. 765 SSLv2 is deprecated 841 This option has no effect on client sockets and SSLv2 server sockets. 1353 As of this writing, possible return values include ``"SSLv2"``, 1434 …*client* / **server** **SSLv2** **SSLv3** **TLS** [3]_ **TLSv1** **TLSv1.1** **TLSv… 1436 … *SSLv2* yes no no [1]_ no no no 1445 .. [1] :class:`SSLContext` disables SSLv2 with :data:`OP_NO_SSLv2` by default. 2658 :const:`PROTOCOL_TLS_SERVER` as the protocol version. SSLv2 and SSLv3 are
|
/external/python/cpython2/Misc/NEWS.d/ |
D | 2.7.7rc1.rst | 562 Always disable SSLv2 except when PROTOCOL_SSLv2 is explicitly asked for.
|
D | 2.7.3rc1.rst | 516 SSLv2 is explicitly asked for).
|
/external/python/pyopenssl/doc/ |
D | ChangeLog_old.txt | 226 * OpenSSL/ssl/context.c: Remove SSLv2 support if the underlying
|
/external/python/cpython3/Doc/whatsnew/ |
D | 3.2.rst | 1657 :data:`~ssl.OP_NO_SSLv2` which disables the insecure and obsolete SSLv2
|
/external/python/cpython3/Misc/ |
D | HISTORY | 2690 - Issue #20207: Always disable SSLv2 except when PROTOCOL_SSLv2 is explicitly 8887 (except when SSLv2 is explicitly asked for).
|