/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | ssl_sess.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 150 SSL_SESSION *SSL_get_session(const SSL *ssl) 156 SSL_SESSION *SSL_get1_session(SSL *ssl) 374 * someone is trying to open roughly very close to 2^128 (or 2^256) SSL 380 static int def_generate_session_id(const SSL *ssl, unsigned char *id, 403 int ssl_get_new_session(SSL *s, int session) 564 int ssl_get_prev_session(SSL * [all...] |
H A D | s2_enc.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 63 int ssl2_enc_init(SSL *s, int client) 127 int ssl2_enc(SSL *s, int send) 159 void ssl2_mac(SSL *s, unsigned char *md, int send)
|
H A D | s2_pkt.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 118 static int read_n(SSL *s, unsigned int n, unsigned int max, 120 static int n_do_ssl_write(SSL *s, const unsigned char *buf, unsigned int len); 121 static int write_pending(SSL *s, const unsigned char *buf, unsigned int len); 125 * SSL 2.0 imlementation for SSL_read/SSL_peek - This routine will return 0 128 static int ssl2_read_internal(SSL *s, void *buf, int len, int peek) 285 * packets, and except for SSL [all...] |
H A D | s3_both.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 131 int ssl3_do_write(SSL *s, int type) 159 int ssl3_send_finished(SSL *s, int a, int b, const char *sender, int slen) 210 static void ssl3_take_mac(SSL *s) 235 int ssl3_get_finished(SSL *s, int a, int b) 305 int ssl3_send_change_cipher_spec(SSL *s, int a, int b) 322 unsigned long ssl3_output_cert_chain(SSL * [all...] |
H A D | kssl.h | 138 * (1) Kerberos session key to SSL, and 139 * (2) Config data between application and SSL lib 189 void SSL_set0_kssl_ctx(SSL *s, KSSL_CTX *kctx); 190 KSSL_CTX *SSL_get0_kssl_ctx(SSL *s);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | ssl_sess.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 150 SSL_SESSION *SSL_get_session(const SSL *ssl) 156 SSL_SESSION *SSL_get1_session(SSL *ssl) 374 * someone is trying to open roughly very close to 2^128 (or 2^256) SSL 380 static int def_generate_session_id(const SSL *ssl, unsigned char *id, 403 int ssl_get_new_session(SSL *s, int session) 564 int ssl_get_prev_session(SSL * [all...] |
H A D | s2_enc.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 63 int ssl2_enc_init(SSL *s, int client) 127 int ssl2_enc(SSL *s, int send) 159 void ssl2_mac(SSL *s, unsigned char *md, int send)
|
H A D | s2_pkt.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 118 static int read_n(SSL *s, unsigned int n, unsigned int max, 120 static int n_do_ssl_write(SSL *s, const unsigned char *buf, unsigned int len); 121 static int write_pending(SSL *s, const unsigned char *buf, unsigned int len); 125 * SSL 2.0 imlementation for SSL_read/SSL_peek - This routine will return 0 128 static int ssl2_read_internal(SSL *s, void *buf, int len, int peek) 285 * packets, and except for SSL [all...] |
H A D | s3_both.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 131 int ssl3_do_write(SSL *s, int type) 159 int ssl3_send_finished(SSL *s, int a, int b, const char *sender, int slen) 210 static void ssl3_take_mac(SSL *s) 235 int ssl3_get_finished(SSL *s, int a, int b) 305 int ssl3_send_change_cipher_spec(SSL *s, int a, int b) 322 unsigned long ssl3_output_cert_chain(SSL * [all...] |
H A D | kssl.h | 138 * (1) Kerberos session key to SSL, and 139 * (2) Config data between application and SSL lib 189 void SSL_set0_kssl_ctx(SSL *s, KSSL_CTX *kctx); 190 KSSL_CTX *SSL_get0_kssl_ctx(SSL *s);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/tunala/ |
H A D | buffer.c | 61 * higher-level "buffer_[to|from]_[fd|SSL|BIO]" functions should alter these 145 static void int_ssl_check(SSL *s, int ret) 152 * indicating a successfully closed SSL tunnel. We let this happen 165 * in the SSL tunnel being regarded as "dead". 182 void buffer_from_SSL(buffer_t * buf, SSL *ssl) 196 void buffer_to_SSL(buffer_t * buf, SSL *ssl)
|
H A D | cb.c | 23 void cb_ssl_info(const SSL *s, int where, int ret) 142 RSA *cb_generate_tmp_rsa(SSL *s, int is_export, int keylength)
|
H A D | sm.c | 56 SSL *state_machine_get_SSL(state_machine_t * machine) 61 int state_machine_set_SSL(state_machine_t * machine, SSL *ssl, int is_server) 67 /* Create the BIOs to handle the dirty side of the SSL */ 72 /* Hook up the BIOs on the dirty side of the SSL */ 109 * We close on the SSL side if the info callback noticed some problems or 110 * an SSL shutdown was underway and shutdown traffic had all been sent. 120 * Either the SSL is alive and well, or the closing process still has 126 /* Called when the clean side of the SSL has lost its connection */ 135 /* And start an SSL shutdown */ 138 /* This is an "event", so flush the SSL o [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/tunala/ |
H A D | buffer.c | 37 * higher-level "buffer_[to|from]_[fd|SSL|BIO]" functions should alter these 120 static void int_ssl_check(SSL *s, int ret) 126 * "error" indicating a successfully closed SSL tunnel. We let 137 * result in the SSL tunnel being regarded as "dead". */ 151 void buffer_from_SSL(buffer_t *buf, SSL *ssl) 165 void buffer_to_SSL(buffer_t *buf, SSL *ssl)
|
H A D | cb.c | 20 void cb_ssl_info(const SSL *s, int where, int ret) 132 RSA *cb_generate_tmp_rsa(SSL *s, int is_export, int keylength)
|
H A D | sm.c | 53 SSL *state_machine_get_SSL(state_machine_t *machine) 58 int state_machine_set_SSL(state_machine_t *machine, SSL *ssl, int is_server) 64 /* Create the BIOs to handle the dirty side of the SSL */ 69 /* Hook up the BIOs on the dirty side of the SSL */ 101 /* We close on the SSL side if the info callback noticed some problems 102 * or an SSL shutdown was underway and shutdown traffic had all been 110 /* Either the SSL is alive and well, or the closing process still has 115 /* Called when the clean side of the SSL has lost its connection */ 122 /* And start an SSL shutdown */ 125 /* This is an "event", so flush the SSL o [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | d1_lib.c | 92 int dtls1_new(SSL *s) 138 void dtls1_free(SSL *s) 186 void dtls1_clear(SSL *s)
|
H A D | s2_enc.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 63 int ssl2_enc_init(SSL *s, int client) 122 void ssl2_enc(SSL *s, int send) 152 void ssl2_mac(SSL *s, unsigned char *md, int send)
|
H A D | s2_pkt.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 118 static int read_n(SSL *s,unsigned int n,unsigned int max,unsigned int extend); 119 static int do_ssl_write(SSL *s, const unsigned char *buf, unsigned int len); 120 static int write_pending(SSL *s, const unsigned char *buf, unsigned int len); 124 /* SSL 2.0 imlementation for SSL_read/SSL_peek - 127 static int ssl2_read_internal(SSL *s, void *buf, int len, int peek) 290 * data may contain incomplete packets, and except for SSL [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/tunala/ |
H A D | buffer.c | 61 * higher-level "buffer_[to|from]_[fd|SSL|BIO]" functions should alter these 145 static void int_ssl_check(SSL *s, int ret) 152 * indicating a successfully closed SSL tunnel. We let this happen 165 * in the SSL tunnel being regarded as "dead". 182 void buffer_from_SSL(buffer_t * buf, SSL *ssl) 196 void buffer_to_SSL(buffer_t * buf, SSL *ssl)
|
H A D | cb.c | 23 void cb_ssl_info(const SSL *s, int where, int ret) 142 RSA *cb_generate_tmp_rsa(SSL *s, int is_export, int keylength)
|
H A D | sm.c | 56 SSL *state_machine_get_SSL(state_machine_t * machine) 61 int state_machine_set_SSL(state_machine_t * machine, SSL *ssl, int is_server) 67 /* Create the BIOs to handle the dirty side of the SSL */ 72 /* Hook up the BIOs on the dirty side of the SSL */ 109 * We close on the SSL side if the info callback noticed some problems or 110 * an SSL shutdown was underway and shutdown traffic had all been sent. 120 * Either the SSL is alive and well, or the closing process still has 126 /* Called when the clean side of the SSL has lost its connection */ 135 /* And start an SSL shutdown */ 138 /* This is an "event", so flush the SSL o [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | s_time.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 62 s_time - SSL client connection timer program 118 static SSL *doConnection(SSL *scon); 195 printf("-bugs - Turn on SSL bug compatibility\n"); 352 SSL *scon = NULL; 477 /* Get an SSL objec [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | s_time.c | 5 * This package is an SSL implementation written 7 * The implementation was written so as to conform with Netscapes SSL. 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 62 s_time - SSL client connection timer program 118 static SSL *doConnection(SSL *scon); 195 printf("-bugs - Turn on SSL bug compatibility\n"); 352 SSL *scon = NULL; 477 /* Get an SSL objec [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/wget-1.12/tests/ |
H A D | Test-proxied-https-auth.px | 20 use IO::Socket::SSL; 68 $conn = IO::Socket::SSL->new_from_fd($conn->fileno, @options) 69 or die "Couldn't initiate SSL";
|