mirror of
https://git.kernel.org/pub/scm/network/wireless/iwd.git
synced 2024-12-31 15:32:37 +01:00
treewide: Remove non-ascii characters
This commit is contained in:
parent
78b9328db6
commit
30d32e4a58
@ -261,7 +261,7 @@ int band_estimate_ht_rx_rate(const struct band *band,
|
||||
* Number of Spatial Streams Supported' field at bits 98 and 99.
|
||||
*
|
||||
* Note 44 on page 1662 of 802.11-2016 states:
|
||||
* "How a non-AP STA determines an AP’s HT MCS transmission support,
|
||||
* "How a non-AP STA determines an AP's HT MCS transmission support,
|
||||
* if the Tx MCS Set subfield in the HT Capabilities element
|
||||
* advertised by the AP is equal to 0 or if he Tx Rx MCS Set Not Equal
|
||||
* subfield in that element is equal to 1, is implementation dependent.
|
||||
|
@ -873,7 +873,7 @@ bool hkdf_expand(enum l_checksum_type type, const uint8_t *key, size_t key_len,
|
||||
*
|
||||
* 802.11, Section 11.6.1.3:
|
||||
* The PTK shall be derived from the PMK by
|
||||
* PTK ← PRF-X(PMK, “Pairwise key expansion”, Min(AA,SPA) || Max(AA,SPA) ||
|
||||
* PTK = PRF-X(PMK, "Pairwise key expansion", Min(AA,SPA) || Max(AA,SPA) ||
|
||||
* Min(ANonce,SNonce) || Max(ANonce,SNonce))
|
||||
* where X = 256 + TK_bits. The value of TK_bits is cipher-suite dependent and
|
||||
* is defined in Table 11-4. The Min and Max operations for IEEE 802 addresses
|
||||
|
@ -1727,7 +1727,7 @@ static void eapol_handle_ptk_3_of_4(struct eapol_sm *sm,
|
||||
* pairwise cipher suite which is advertised by an AP, but
|
||||
* which policy disallows for this particular STA. An
|
||||
* Authenticator may, therefore, insert a second RSNE to
|
||||
* overrule the STA's selection. An Authenticator’s SME shall
|
||||
* overrule the STA's selection. An Authenticator's SME shall
|
||||
* insert the second RSNE, after the first RSNE, only for this
|
||||
* purpose. The pairwise cipher suite in the second RSNE
|
||||
* included shall be one of the ciphers advertised by the
|
||||
@ -2263,12 +2263,12 @@ static void eapol_eap_results_cb(const uint8_t *msk_data, size_t msk_len,
|
||||
/*
|
||||
* 802.11i 8.5.1.2:
|
||||
* "When not using a PSK, the PMK is derived from the AAA key.
|
||||
* The PMK shall be computed as the first 256 bits (bits 0–255)
|
||||
* of the AAA key: PMK ← L(PTK, 0, 256)."
|
||||
* The PMK shall be computed as the first 256 bits (bits 0-255)
|
||||
* of the AAA key: PMK = L(PTK, 0, 256)."
|
||||
* 802.11-2016 12.7.1.3:
|
||||
* "When not using a PSK, the PMK is derived from the MSK.
|
||||
* The PMK shall be computed as the first PMK_bits bits
|
||||
* (bits 0 to PMK_bits–1) of the MSK: PMK = L(MSK, 0, PMK_bits)."
|
||||
* (bits 0 to PMK_bits-1) of the MSK: PMK = L(MSK, 0, PMK_bits)."
|
||||
* RFC5247 explains AAA-Key refers to the MSK and confirms the
|
||||
* first 32 bytes of the MSK are used. MSK is at least 64 octets
|
||||
* long per RFC3748. Note WEP derives the PTK from MSK differently.
|
||||
|
@ -190,10 +190,10 @@ static int fils_derive_key_data(struct fils_sm *fils)
|
||||
|
||||
/*
|
||||
* IEEE 802.11ai - 12.12.2.5.3 PTKSA key derivation with FILS
|
||||
* authentication
|
||||
* authentication
|
||||
*
|
||||
* FILS-Key-Data = PRF-X(PMK, “FILS PTK Derivation”, SPA || AA ||
|
||||
* SNonce || ANonce)
|
||||
* FILS-Key-Data = PRF-X(PMK, "FILS PTK Derivation", SPA || AA ||
|
||||
* SNonce || ANonce)
|
||||
*/
|
||||
memcpy(ptr, fils->hs->spa, 6);
|
||||
ptr += 6;
|
||||
|
Loading…
Reference in New Issue
Block a user