| /external/chromium_org/third_party/openssl/openssl/ssl/ |
| s23_lib.c | 109 /* We can write SSLv2 and SSLv3 ciphers */
|
| s23_clnt.c | 610 /* we need to clean up the SSLv3 setup and put in the 678 /* we have sslv3 or tls1 (server hello or alert) */ 751 * for SSLv3 */
|
| ssl3.h | 380 * SSLv3 and TLSv1. 484 /* actually only need to be 16+20 for SSLv3 and 12 for TLS */ 557 /* SSLv3 */
|
| ssl_txt.c | 117 s="SSLv3";
|
| /external/chromium_org/third_party/tlslite/tlslite/ |
| constants.py | 78 no_certificate = 41 #SSLv3
|
| /external/openssl/ssl/ |
| s23_lib.c | 109 /* We can write SSLv2 and SSLv3 ciphers */
|
| s23_clnt.c | 610 /* we need to clean up the SSLv3 setup and put in the 678 /* we have sslv3 or tls1 (server hello or alert) */ 751 * for SSLv3 */
|
| ssl3.h | 380 * SSLv3 and TLSv1. 484 /* actually only need to be 16+20 for SSLv3 and 12 for TLS */ 577 /* SSLv3 */
|
| /libcore/crypto/src/main/java/org/conscrypt/ |
| PRF.java | 66 * Computes the value of SSLv3 pseudo random function.
|
| /external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/ |
| SSLContext1Test.java | 88 new String[] { "TLSv1", "SSLv3" }); 92 new String[] { "TLSv1", "SSLv3" });
|
| /external/chromium_org/third_party/openssl/openssl/patches/ |
| handshake_cutthrough.patch | 286 echo test sslv2/sslv3 with both client and server authentication 289 +echo test sslv2/sslv3 with both client and server authentication and handshake cutthrough
|
| jsse.patch | 288 /* works well for SSLv2, not so good for SSLv3 */ 309 return("SSLv3");
|
| /external/openssl/patches/ |
| handshake_cutthrough.patch | 286 echo test sslv2/sslv3 with both client and server authentication 289 +echo test sslv2/sslv3 with both client and server authentication and handshake cutthrough
|
| jsse.patch | 288 /* works well for SSLv2, not so good for SSLv3 */ 309 return("SSLv3");
|
| /external/chromium_org/third_party/openssl/openssl/crypto/rsa/ |
| rsa_err.c | 183 {ERR_REASON(RSA_R_SSLV3_ROLLBACK_ATTACK) ,"sslv3 rollback attack"},
|
| /external/openssl/crypto/rsa/ |
| rsa_err.c | 183 {ERR_REASON(RSA_R_SSLV3_ROLLBACK_ATTACK) ,"sslv3 rollback attack"},
|
| /external/chromium_org/third_party/openssl/openssl/include/openssl/ |
| ssl3.h | 380 * SSLv3 and TLSv1. 484 /* actually only need to be 16+20 for SSLv3 and 12 for TLS */ 557 /* SSLv3 */
|
| /external/openssl/include/openssl/ |
| ssl3.h | 380 * SSLv3 and TLSv1. 484 /* actually only need to be 16+20 for SSLv3 and 12 for TLS */ 577 /* SSLv3 */
|
| /libcore/support/src/test/java/libcore/java/security/ |
| StandardNames.java | 205 provide("SSLContext", "SSLv3"); 507 "SSLv3", 526 "SSLv3", [all...] |
| /external/chromium_org/third_party/tlslite/scripts/ |
| tls.py | 151 print "Test 10.a - good X509, SSLv3" 206 print "Test 14.a - good mutual X509, SSLv3" 571 print "Test 14a - good mutual X.509, SSLv3" [all...] |
| /external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
| SSLSocketFunctionalTest.java | 141 String[] protocols = {"SSLv3", "TLSv1"};
|
| /external/chromium/chrome/browser/ |
| page_info_model.cc | 246 // For now, only SSLv3 fallback will trigger a warning icon.
|
| /external/chromium_org/net/http/ |
| http_network_transaction_ssl_unittest.cc | 150 // |version_max| never fallbacks to SSLv3 for Google properties.
|
| http_response_info.cc | 78 // protocol version, compression method and whether SSLv3 fallback was used.
|
| /external/chromium_org/net/socket/ |
| client_socket_pool_manager.cc | 148 prefix = "sslv3/";
|