treewide: Remove non-ascii characters

This commit is contained in:
Denis Kenzior 2021-07-28 10:03:27 -05:00
parent 78b9328db6
commit 30d32e4a58
4 changed files with 9 additions and 9 deletions

View File

@ -261,7 +261,7 @@ int band_estimate_ht_rx_rate(const struct band *band,
* Number of Spatial Streams Supported' field at bits 98 and 99.
*
* Note 44 on page 1662 of 802.11-2016 states:
* "How a non-AP STA determines an APs HT MCS transmission support,
* "How a non-AP STA determines an AP's HT MCS transmission support,
* if the Tx MCS Set subfield in the HT Capabilities element
* advertised by the AP is equal to 0 or if he Tx Rx MCS Set Not Equal
* subfield in that element is equal to 1, is implementation dependent.

View File

@ -873,7 +873,7 @@ bool hkdf_expand(enum l_checksum_type type, const uint8_t *key, size_t key_len,
*
* 802.11, Section 11.6.1.3:
* The PTK shall be derived from the PMK by
* PTK PRF-X(PMK, Pairwise key expansion, Min(AA,SPA) || Max(AA,SPA) ||
* PTK = PRF-X(PMK, "Pairwise key expansion", Min(AA,SPA) || Max(AA,SPA) ||
* Min(ANonce,SNonce) || Max(ANonce,SNonce))
* where X = 256 + TK_bits. The value of TK_bits is cipher-suite dependent and
* is defined in Table 11-4. The Min and Max operations for IEEE 802 addresses

View File

@ -1727,7 +1727,7 @@ static void eapol_handle_ptk_3_of_4(struct eapol_sm *sm,
* pairwise cipher suite which is advertised by an AP, but
* which policy disallows for this particular STA. An
* Authenticator may, therefore, insert a second RSNE to
* overrule the STA's selection. An Authenticators SME shall
* overrule the STA's selection. An Authenticator's SME shall
* insert the second RSNE, after the first RSNE, only for this
* purpose. The pairwise cipher suite in the second RSNE
* included shall be one of the ciphers advertised by the
@ -2263,12 +2263,12 @@ static void eapol_eap_results_cb(const uint8_t *msk_data, size_t msk_len,
/*
* 802.11i 8.5.1.2:
* "When not using a PSK, the PMK is derived from the AAA key.
* The PMK shall be computed as the first 256 bits (bits 0255)
* of the AAA key: PMK L(PTK, 0, 256)."
* The PMK shall be computed as the first 256 bits (bits 0-255)
* of the AAA key: PMK = L(PTK, 0, 256)."
* 802.11-2016 12.7.1.3:
* "When not using a PSK, the PMK is derived from the MSK.
* The PMK shall be computed as the first PMK_bits bits
* (bits 0 to PMK_bits1) of the MSK: PMK = L(MSK, 0, PMK_bits)."
* (bits 0 to PMK_bits-1) of the MSK: PMK = L(MSK, 0, PMK_bits)."
* RFC5247 explains AAA-Key refers to the MSK and confirms the
* first 32 bytes of the MSK are used. MSK is at least 64 octets
* long per RFC3748. Note WEP derives the PTK from MSK differently.

View File

@ -190,10 +190,10 @@ static int fils_derive_key_data(struct fils_sm *fils)
/*
* IEEE 802.11ai - 12.12.2.5.3 PTKSA key derivation with FILS
* authentication
* authentication
*
* FILS-Key-Data = PRF-X(PMK, FILS PTK Derivation, SPA || AA ||
* SNonce || ANonce)
* FILS-Key-Data = PRF-X(PMK, "FILS PTK Derivation", SPA || AA ||
* SNonce || ANonce)
*/
memcpy(ptr, fils->hs->spa, 6);
ptr += 6;