/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | t1_ext.c | 87 int custom_ext_parse(SSL *s, int server, 125 int custom_ext_add(SSL *s, int server,
|
H A D | t1_trce.c | 106 {SSL2_VERSION, "SSL 2.0"}, 107 {SSL3_VERSION, "SSL 3.0"}, 532 static int ssl_print_signature(BIO *bio, int indent, SSL *s, 673 static int ssl_print_client_hello(BIO *bio, SSL *ssl, int indent, 769 static int ssl_get_keyex(const char **pname, SSL *ssl) 820 static int ssl_print_client_keyex(BIO *bio, int indent, SSL *ssl, 871 static int ssl_print_server_keyex(BIO *bio, int indent, SSL *ssl, 986 static int ssl_print_cert_request(BIO *bio, int indent, SSL *s, 1081 static int ssl_print_handshake(BIO *bio, SSL *ssl, 1197 const void *buf, size_t msglen, SSL *ss [all...] |
H A D | t1_enc.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 295 static int tls1_generate_key_block(SSL *s, unsigned char *km, 319 int tls1_change_cipher_state(SSL *s, int which) 633 int tls1_setup_key_block(SSL *s) 751 int tls1_enc(SSL *s, int send) 921 int tls1_cert_verify_mac(SSL *s, int md_nid, unsigned char *out) 951 int tls1_final_finish_mac(SSL * [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | s_cb.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 182 SSL *ssl; 222 * the SSL context */ 251 * the SSL context */ 284 void MS_CALLBACK apps_ssl_info_callback(const SSL *s, int where, int ret) 321 void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg) 331 str_version = "SSL 2. [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | s3_srvr.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 164 int ssl3_accept(SSL *s) 168 void (*cb)(const SSL *ssl,int type,int val)=NULL; 376 * (see section "Certificate request" in SSL 3 drafts 380 * (against the specs, but s3_clnt.c accepts this for SSL 3) */ 607 int ssl3_send_hello_request(SSL *s) 629 int ssl3_check_client_hello(SSL * [all...] |
H A D | s3_clnt.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 159 int ssl3_connect(SSL *s) 164 void (*cb)(const SSL *ssl,int type,int val)=NULL; 520 int ssl3_client_hello(SSL *s) 621 int ssl3_get_server_hello(SSL *s) 803 int ssl3_get_server_certificate(SSL *s) 987 int ssl3_get_key_exchange(SSL * [all...] |
H A D | ssltest.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 190 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export,int keylength); 225 int doit_biopair(SSL *s_ssl,SSL *c_ssl,long bytes,clock_t *s_time,clock_t *c_time); 226 int doit(SSL *s_ssl,SSL *c_ssl,long bytes); 279 static void print_details(SSL *c_ss [all...] |
H A D | d1_enc.c | 62 * This package is an SSL implementation written 64 * The implementation was written so as to conform with Netscapes SSL. 69 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 125 int dtls1_enc(SSL *s, int send)
|
H A D | ssl_cert.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 151 0,"SSL for verify callback",NULL,NULL,NULL); 488 int ssl_verify_cert_chain(SSL *s,STACK_OF(X509) *sk) 513 * the context: if its a server it will verify SSL client certificates 573 void SSL_set_client_CA_list(SSL *s,STACK_OF(X509_NAME) *name_list) 588 STACK_OF(X509_NAME) *SSL_get_client_CA_list(const SSL *s) 626 int SSL_add_client_CA(SSL *ss [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | s_server.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 210 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength); 217 static int init_ssl_connection(SSL *s); 219 static int generate_session_id(const SSL *ssl, unsigned char *id, 319 static int cert_status_cb(SSL *s, void *arg); 352 static unsigned int psk_server_cb(SSL *ssl, const char *identity, 429 static int MS_CALLBACK ssl_srp_server_param_cb(SSL * [all...] |
H A D | ciphers.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 74 " -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n", 95 SSL *ssl = NULL;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | s_server.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 210 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength); 217 static int init_ssl_connection(SSL *s); 219 static int generate_session_id(const SSL *ssl, unsigned char *id, 319 static int cert_status_cb(SSL *s, void *arg); 352 static unsigned int psk_server_cb(SSL *ssl, const char *identity, 429 static int MS_CALLBACK ssl_srp_server_param_cb(SSL * [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/util/ |
H A D | mk1mf.pl | 115 no-ssl2 no-ssl3 - Skip this version of SSL 322 %shlib_ex_cflags=("SSL" => " -DOPENSSL_BUILD_SHLIBSSL", 526 SSL=$ssl 546 O_SSL= \$(LIB_D)$o$plib\$(SSL)$shlibp 548 SO_SSL= $plib\$(SSL)$so_shlibp 550 L_SSL= \$(LIB_D)$o$plib\$(SSL)$libp 756 \$(OBJ_D)\\\$(SSL).res: ms\\version32.rc 757 \$(RSC) /fo"\$(OBJ_D)\\\$(SSL).res" /d SSL ms\\version32.rc 983 { $ret.="\$(OBJ_D)\\\$(SSL) [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/util/ |
H A D | mk1mf.pl | 68 no-ssl2 no-ssl3 - Skip this version of SSL 250 %shlib_ex_cflags=("SSL" => " -DOPENSSL_BUILD_SHLIBSSL", 442 SSL=$ssl 462 O_SSL= \$(LIB_D)$o$plib\$(SSL)$shlibp 464 SO_SSL= $plib\$(SSL)$so_shlibp 466 L_SSL= \$(LIB_D)$o$plib\$(SSL)$libp 605 if (($_ eq "SSL") && $no_ssl2 && $no_ssl3) 678 \$(OBJ_D)\\\$(SSL).res: ms\\version32.rc 679 \$(RSC) /fo"\$(OBJ_D)\\\$(SSL).res" /d SSL m [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/util/ |
H A D | mk1mf.pl | 115 no-ssl2 no-ssl3 - Skip this version of SSL 322 %shlib_ex_cflags=("SSL" => " -DOPENSSL_BUILD_SHLIBSSL", 526 SSL=$ssl 546 O_SSL= \$(LIB_D)$o$plib\$(SSL)$shlibp 548 SO_SSL= $plib\$(SSL)$so_shlibp 550 L_SSL= \$(LIB_D)$o$plib\$(SSL)$libp 756 \$(OBJ_D)\\\$(SSL).res: ms\\version32.rc 757 \$(RSC) /fo"\$(OBJ_D)\\\$(SSL).res" /d SSL ms\\version32.rc 983 { $ret.="\$(OBJ_D)\\\$(SSL) [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | t1_enc.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 295 static int tls1_generate_key_block(SSL *s, unsigned char *km, 319 int tls1_change_cipher_state(SSL *s, int which) 633 int tls1_setup_key_block(SSL *s) 751 int tls1_enc(SSL *s, int send) 921 int tls1_cert_verify_mac(SSL *s, int md_nid, unsigned char *out) 951 int tls1_final_finish_mac(SSL * [all...] |
H A D | d1_clnt.c | 62 * This package is an SSL implementation written 64 * The implementation was written so as to conform with Netscapes SSL. 69 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 132 static int dtls1_get_hello_verify(SSL *s); 164 int dtls1_connect(SSL *s) 168 void (*cb) (const SSL *ssl, int type, int val) = NULL; 818 static int dtls1_get_hello_verify(SSL *s)
|
H A D | d1_srvr.c | 62 * This package is an SSL implementation written 64 * The implementation was written so as to conform with Netscapes SSL. 69 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 130 static int dtls1_send_hello_verify_request(SSL *s); 162 int dtls1_accept(SSL *s) 166 void (*cb) (const SSL *ssl, int type, int val) = NULL; 547 * section "Certificate request" in SSL 3 drafts and in 554 * this for SSL 3) 941 int dtls1_send_hello_verify_request(SSL * [all...] |
H A D | s3_srvr.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 189 static int ssl_check_srp_ext_ClientHello(SSL *s, int *al) 212 int ssl3_accept(SSL *s) 216 void (*cb) (const SSL *ssl, int type, int val) = NULL; 513 * section "Certificate request" in SSL 3 drafts and in 520 * this for SSL 3) 890 int ssl3_send_hello_request(SSL * [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/ |
H A D | axtls.c | 25 * Source file for all axTLS-specific code for the TLS/SSL layer. No code 53 /* axTLS has no global init. Everything is done through SSL and SSL_CTX 141 SSL *ssl = NULL; 161 /* check to see if we've been told to use an explicit SSL/TLS version */ 179 failf(data, "unable to create client SSL context"); 263 infof (data, "SSL re-using session ID\n"); 276 * SSL connection. 281 SSL *ssl = conn->ssl[sockindex].ssl; 380 /* Put our freshly minted SSL session in cache */ 391 * Use axTLS's non-blocking connection feature to open an SSL connectio [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/test/ |
H A D | ssltest.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 190 static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export,int keylength); 225 int doit_biopair(SSL *s_ssl,SSL *c_ssl,long bytes,clock_t *s_time,clock_t *c_time); 226 int doit(SSL *s_ssl,SSL *c_ssl,long bytes); 279 static void print_details(SSL *c_ss [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ |
H A D | ossl_typ.h | 178 typedef struct ssl_st SSL; typedef in typeref:struct:ssl_st
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/ssl/ |
H A D | serv.cpp | 48 SSL* ssl; 54 /* SSL preliminaries. We keep the certificate and key with the context. */ 105 /* TCP connection is ready. Do server side SSL. */ 113 printf ("SSL connection using %s\n", SSL_get_cipher (ssl));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/packages/vms/ |
H A D | build_curl-config_script.com | 181 $ write pco " for feature in SSL libz NTLM ""; do" 183 $ write pco " for feature in SSL IPv6 libz NTLM ""; do"
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/ssl/ |
H A D | serv.cpp | 48 SSL* ssl; 54 /* SSL preliminaries. We keep the certificate and key with the context. */ 105 /* TCP connection is ready. Do server side SSL. */ 113 printf ("SSL connection using %s\n", SSL_get_cipher (ssl));
|