quick update:
these encryption libraries are dynamically linked to the cspd MIPS ELF binary:
$ readelf --dyn-syms cspd | grep AES 484: 0053ab50 1248 FUNC GLOBAL DEFAULT 8 AES_set_encrypt_key 630: 0053b9d0 1600 FUNC GLOBAL DEFAULT 8 AES_decrypt 1187: 0050d470 552 FUNC GLOBAL DEFAULT 8 DecryByAES 1527: 0053b390 1600 FUNC GLOBAL DEFAULT 8 AES_encrypt 1535: 0053b030 864 FUNC GLOBAL DEFAULT 8 AES_set_decrypt_key as are these compression libraries:
$ readelf --dyn-syms cspd | grep compress 92: 0053c110 208 FUNC GLOBAL DEFAULT 8 uncompress 1064: 0053c010 216 FUNC GLOBAL DEFAULT 8 compress2 uncompress and compress2 are associated with zlib.
Speaking of analyzing ciphertext, I though that this question on Security.SE was interesting: How to determine what type of encoding/encryption has been used?, especially the answer.
quick update:
these encryption libraries are dynamically linked to the cspd MIPS ELF binary:
$ readelf --dyn-syms cspd | grep AES 484: 0053ab50 1248 FUNC GLOBAL DEFAULT 8 AES_set_encrypt_key 630: 0053b9d0 1600 FUNC GLOBAL DEFAULT 8 AES_decrypt 1187: 0050d470 552 FUNC GLOBAL DEFAULT 8 DecryByAES 1527: 0053b390 1600 FUNC GLOBAL DEFAULT 8 AES_encrypt 1535: 0053b030 864 FUNC GLOBAL DEFAULT 8 AES_set_decrypt_key as are these compression libraries:
$ readelf --dyn-syms cspd | grep compress 92: 0053c110 208 FUNC GLOBAL DEFAULT 8 uncompress 1064: 0053c010 216 FUNC GLOBAL DEFAULT 8 compress2 uncompress and compress2 are associated with zlib.