/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | t1_lib.c | 674 s2n(id, p); 1284 s2n(TLSEXT_TYPE_server_name, ret); 1285 s2n(size_str + 5, ret); 1288 s2n(size_str + 3, ret); 1292 s2n(size_str, ret); 1309 s2n(TLSEXT_TYPE_renegotiate, ret); 1310 s2n(el, ret); 1340 s2n(TLSEXT_TYPE_srp, ret); 1341 s2n(login_len + 1, ret); 1368 s2n(TLSEXT_TYPE_ec_point_format [all...] |
H A D | d1_srtp.c | 265 s2n(ct * 2, p); 268 s2n(prof->id, p); 376 s2n(2, p); 377 s2n(s->srtp_profile->id, p);
|
H A D | s2_clnt.c | 555 s2n(SSL2_VERSION, p); /* version */ 566 s2n(n, p); /* cipher spec num bytes */ 572 s2n(i, p); /* session id length */ 576 s2n(0, p); 580 s2n(SSL2_CHALLENGE_LENGTH, p); /* challenge length */ 663 s2n(clear, p); 683 s2n(enc, p); 686 s2n(karg, p); /* key arg size */ 818 s2n(SSL2_PE_NO_CERTIFICATE, p); 854 s2n( [all...] |
H A D | t1_ext.c | 159 s2n(meth->ext_type, ret); 160 s2n(outlen, ret);
|
H A D | s23_clnt.c | 443 s2n(i, d); 449 s2n(0, d); 467 s2n(i, d); 521 s2n(i, p); 583 s2n((int)l, d);
|
H A D | s2_srvr.c | 801 s2n(s->version, p); /* version */ 802 s2n(0, p); /* cert len */ 803 s2n(0, p); /* ciphers len */ 808 s2n(s->version, p); /* version */ 810 s2n(n, p); /* certificate length */ 819 s2n(n, p); /* add cipher length */ 823 s2n(SSL2_CONNECTION_ID_LENGTH, p); /* add conn_id length */
|
H A D | d1_both.c | 438 s2n(msg_hdr->seq, p); 532 s2n(msg_hdr->seq, p); 1034 s2n(s->d1->handshake_write_seq, p); 1360 s2n(msg_hdr->seq, p); 1468 s2n(payload, bp); 1553 s2n(payload, p); 1555 s2n(s->tlsext_hb_seq, p);
|
H A D | s3_srvr.c | 1893 s2n(nr[i], p); 1925 s2n(strlen(s->ctx->psk_identity_hint), p); 1969 s2n(u, p); 2000 s2n(i, p); 2055 s2n(nl, p); 2079 s2n(j, p); 2087 s2n(j, d); 2096 s2n(nl, p); 2777 s2n(psk_len, t); 2780 s2n(psk_le [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | t1_lib.c | 674 s2n(id, p); 1284 s2n(TLSEXT_TYPE_server_name, ret); 1285 s2n(size_str + 5, ret); 1288 s2n(size_str + 3, ret); 1292 s2n(size_str, ret); 1309 s2n(TLSEXT_TYPE_renegotiate, ret); 1310 s2n(el, ret); 1340 s2n(TLSEXT_TYPE_srp, ret); 1341 s2n(login_len + 1, ret); 1368 s2n(TLSEXT_TYPE_ec_point_format [all...] |
H A D | d1_srtp.c | 265 s2n(ct * 2, p); 268 s2n(prof->id, p); 376 s2n(2, p); 377 s2n(s->srtp_profile->id, p);
|
H A D | s2_clnt.c | 555 s2n(SSL2_VERSION, p); /* version */ 566 s2n(n, p); /* cipher spec num bytes */ 572 s2n(i, p); /* session id length */ 576 s2n(0, p); 580 s2n(SSL2_CHALLENGE_LENGTH, p); /* challenge length */ 663 s2n(clear, p); 683 s2n(enc, p); 686 s2n(karg, p); /* key arg size */ 818 s2n(SSL2_PE_NO_CERTIFICATE, p); 854 s2n( [all...] |
H A D | t1_ext.c | 159 s2n(meth->ext_type, ret); 160 s2n(outlen, ret);
|
H A D | s23_clnt.c | 443 s2n(i, d); 449 s2n(0, d); 467 s2n(i, d); 521 s2n(i, p); 583 s2n((int)l, d);
|
H A D | s2_srvr.c | 801 s2n(s->version, p); /* version */ 802 s2n(0, p); /* cert len */ 803 s2n(0, p); /* ciphers len */ 808 s2n(s->version, p); /* version */ 810 s2n(n, p); /* certificate length */ 819 s2n(n, p); /* add cipher length */ 823 s2n(SSL2_CONNECTION_ID_LENGTH, p); /* add conn_id length */
|
H A D | d1_both.c | 438 s2n(msg_hdr->seq, p); 532 s2n(msg_hdr->seq, p); 1034 s2n(s->d1->handshake_write_seq, p); 1360 s2n(msg_hdr->seq, p); 1468 s2n(payload, bp); 1553 s2n(payload, p); 1555 s2n(s->tlsext_hb_seq, p);
|
H A D | s3_srvr.c | 1893 s2n(nr[i], p); 1925 s2n(strlen(s->ctx->psk_identity_hint), p); 1969 s2n(u, p); 2000 s2n(i, p); 2055 s2n(nl, p); 2079 s2n(j, p); 2087 s2n(j, d); 2096 s2n(nl, p); 2777 s2n(psk_len, t); 2780 s2n(psk_le [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | s23_clnt.c | 287 s2n(i,d); 294 s2n(0,d); 306 s2n(i,d); 348 s2n(i,p); 386 s2n((int)l,d);
|
H A D | s2_clnt.c | 567 s2n(SSL2_VERSION,p); /* version */ 579 s2n(n,p); /* cipher spec num bytes */ 586 s2n(i,p); /* session id length */ 592 s2n(0,p); 596 s2n(SSL2_CHALLENGE_LENGTH,p); /* challenge length */ 683 s2n(clear,p); 701 s2n(enc,p); 704 s2n(karg,p); /* key arg size */ 842 s2n(SSL2_PE_NO_CERTIFICATE,p); 874 s2n( [all...] |
H A D | d1_clnt.c | 596 s2n(i,p); 753 s2n(n,q); 834 s2n(enc_ticket->length,p); 842 s2n(authp->length,p); 853 s2n(0,p);/* null authenticator length */ 882 s2n(outl,p); 943 s2n(n,p); 1017 s2n(u,p); 1033 s2n(j,p);
|
H A D | d1_srvr.c | 917 s2n(nr[i],p); 951 s2n(u,p); 970 s2n(i,p); 1046 s2n(j,p); 1055 j-=2; s2n(j,d); j+=2; 1063 s2n(nl,p); 1068 s2n(s->d1->handshake_write_seq,d);
|
H A D | s2_srvr.c | 764 s2n(s->version,p); /* version */ 765 s2n(0,p); /* cert len */ 766 s2n(0,p); /* ciphers len */ 773 s2n(s->version,p); /* version */ 775 s2n(n,p); /* certificate length */ 784 s2n(n,p); /* add cipher length */ 788 s2n(SSL2_CONNECTION_ID_LENGTH,p); /* add conn_id length */
|
H A D | s3_clnt.c | 584 s2n(i,p); 1695 s2n(n,q); 1776 s2n(enc_ticket->length,p); 1784 s2n(authp->length,p); 1795 s2n(0,p);/* null authenticator length */ 1826 s2n(outl,p); 1887 s2n(n,p); 2147 s2n(u,p); 2163 s2n(j,p); 2180 s2n( [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/idea/ |
H A D | idea_lcl.h | 137 #undef s2n macro 138 #define s2n(l,c) (*((c)++)=(unsigned char)(((l) )&0xff), \ macro
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/idea/ |
H A D | idea_lcl.h | 139 #undef s2n macro 140 #define s2n(l,c) (*((c)++)=(unsigned char)(((l) )&0xff), \ macro
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/idea/ |
H A D | idea_lcl.h | 139 #undef s2n macro 140 #define s2n(l,c) (*((c)++)=(unsigned char)(((l) )&0xff), \ macro
|