Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching full:schannel

2  * WPA Supplicant / SSL/TLS interface functions for Microsoft Schannel
26 #include <schannel.h>
189 /* Schannel does not export master secret or client/server random. */
199 * Cannot get master_key from Schannel, but EapKeyBlock can be used to
203 * and just use Schannel or CryptoAPI for low-level crypto
264 wpa_hexdump(MSG_MSGDUMP, "SChannel - ClientHello",
276 wpa_printf(MSG_ERROR, "SChannel: Failed to generate ClientHello");
308 wpa_hexdump_key(MSG_MSGDUMP, "Schannel - EapKeyBlock - rgbKeys",
310 wpa_hexdump_key(MSG_MSGDUMP, "Schannel - EapKeyBlock - rgbIVs",
339 wpa_printf(MSG_DEBUG, "SChannel: %d bytes handshake data to process",
348 /* Input buffer for Schannel */
353 /* Place for leftover data from Schannel */
362 /* Output buffer for Schannel */
383 wpa_printf(MSG_MSGDUMP, "Schannel: InitializeSecurityContext -> "
393 wpa_hexdump(MSG_MSGDUMP, "SChannel - output",
409 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INCOMPLETE_MESSAGE");
412 wpa_printf(MSG_DEBUG, "Schannel: SEC_I_CONTINUE_NEEDED");
416 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_OK - Handshake "
426 wpa_hexdump(MSG_MSGDUMP, "SChannel - Encrypted "
443 "Schannel: SEC_I_INCOMPLETE_CREDENTIALS");
446 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_WRONG_PRINCIPAL");
449 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INTERNAL_ERROR");
454 wpa_printf(MSG_DEBUG, "Schannel: Handshake failed "
463 wpa_hexdump(MSG_MSGDUMP, "SChannel - Leftover data",
537 wpa_printf(MSG_MSGDUMP, "Schannel: EncryptMessage -> "
544 wpa_printf(MSG_MSGDUMP, "Schannel: EncryptMessage pointers: "
552 wpa_hexdump(MSG_MSGDUMP, "SChannel: bufs",
559 wpa_hexdump_key(MSG_MSGDUMP, "Schannel: Encrypted data from "
586 wpa_hexdump(MSG_MSGDUMP, "Schannel: Encrypted data to DecryptMessage",
604 wpa_printf(MSG_MSGDUMP, "Schannel: DecryptMessage -> "
612 wpa_printf(MSG_MSGDUMP, "Schannel
633 wpa_hexdump_key(MSG_MSGDUMP, "Schannel: Decrypted data from "