Home | History | Annotate | Download | only in crypto

Lines Matching refs:schannel

2  * SSL/TLS interface functions for Microsoft Schannel
20 #include <schannel.h>
183 /* Schannel does not export master secret or client/server random. */
193 * Cannot get master_key from Schannel, but EapKeyBlock can be used to
197 * and just use Schannel or CryptoAPI for low-level crypto
257 wpa_hexdump(MSG_MSGDUMP, "SChannel - ClientHello",
268 wpa_printf(MSG_ERROR, "SChannel: Failed to generate ClientHello");
300 wpa_hexdump_key(MSG_MSGDUMP, "Schannel - EapKeyBlock - rgbKeys",
302 wpa_hexdump_key(MSG_MSGDUMP, "Schannel - EapKeyBlock - rgbIVs",
330 wpa_printf(MSG_DEBUG, "SChannel: %d bytes handshake data to process",
339 /* Input buffer for Schannel */
344 /* Place for leftover data from Schannel */
353 /* Output buffer for Schannel */
374 wpa_printf(MSG_MSGDUMP, "Schannel: InitializeSecurityContext -> "
384 wpa_hexdump(MSG_MSGDUMP, "SChannel - output",
397 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INCOMPLETE_MESSAGE");
400 wpa_printf(MSG_DEBUG, "Schannel: SEC_I_CONTINUE_NEEDED");
404 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_OK - Handshake "
414 wpa_hexdump(MSG_MSGDUMP, "SChannel - Encrypted "
428 "Schannel: SEC_I_INCOMPLETE_CREDENTIALS");
431 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_WRONG_PRINCIPAL");
434 wpa_printf(MSG_DEBUG, "Schannel: SEC_E_INTERNAL_ERROR");
439 wpa_printf(MSG_DEBUG, "Schannel: Handshake failed "
448 wpa_hexdump(MSG_MSGDUMP, "SChannel - Leftover data",
515 wpa_printf(MSG_MSGDUMP, "Schannel: EncryptMessage -> "
522 wpa_printf(MSG_MSGDUMP, "Schannel: EncryptMessage pointers: "
530 wpa_hexdump(MSG_MSGDUMP, "SChannel: bufs",
537 wpa_hexdump_buf_key(MSG_MSGDUMP, "Schannel: Encrypted data "
561 "Schannel: Encrypted data to DecryptMessage", in_data);
580 wpa_printf(MSG_MSGDUMP, "Schannel: DecryptMessage -> "
588 wpa_printf(MSG_MSGDUMP, "Schannel: DecryptMessage pointers: "
610 wpa_hexdump_key(MSG_MSGDUMP, "Schannel: Decrypted data from "