From 30d32e4a58faf76a684a1ea88905e869b7bfcfa1 Mon Sep 17 00:00:00 2001 From: Denis Kenzior Date: Wed, 28 Jul 2021 10:03:27 -0500 Subject: [PATCH] treewide: Remove non-ascii characters --- src/band.c | 2 +- src/crypto.c | 2 +- src/eapol.c | 8 ++++---- src/fils.c | 6 +++--- 4 files changed, 9 insertions(+), 9 deletions(-) diff --git a/src/band.c b/src/band.c index 2d5d33e5..22fbea97 100644 --- a/src/band.c +++ b/src/band.c @@ -261,7 +261,7 @@ int band_estimate_ht_rx_rate(const struct band *band, * Number of Spatial Streams Supported' field at bits 98 and 99. * * Note 44 on page 1662 of 802.11-2016 states: - * "How a non-AP STA determines an AP’s HT MCS transmission support, + * "How a non-AP STA determines an AP's HT MCS transmission support, * if the Tx MCS Set subfield in the HT Capabilities element * advertised by the AP is equal to 0 or if he Tx Rx MCS Set Not Equal * subfield in that element is equal to 1, is implementation dependent. diff --git a/src/crypto.c b/src/crypto.c index b347a838..3f516940 100644 --- a/src/crypto.c +++ b/src/crypto.c @@ -873,7 +873,7 @@ bool hkdf_expand(enum l_checksum_type type, const uint8_t *key, size_t key_len, * * 802.11, Section 11.6.1.3: * The PTK shall be derived from the PMK by - * PTK ← PRF-X(PMK, “Pairwise key expansion”, Min(AA,SPA) || Max(AA,SPA) || + * PTK = PRF-X(PMK, "Pairwise key expansion", Min(AA,SPA) || Max(AA,SPA) || * Min(ANonce,SNonce) || Max(ANonce,SNonce)) * where X = 256 + TK_bits. The value of TK_bits is cipher-suite dependent and * is defined in Table 11-4. The Min and Max operations for IEEE 802 addresses diff --git a/src/eapol.c b/src/eapol.c index 2722bc42..5754d79d 100644 --- a/src/eapol.c +++ b/src/eapol.c @@ -1727,7 +1727,7 @@ static void eapol_handle_ptk_3_of_4(struct eapol_sm *sm, * pairwise cipher suite which is advertised by an AP, but * which policy disallows for this particular STA. An * Authenticator may, therefore, insert a second RSNE to - * overrule the STA's selection. An Authenticator’s SME shall + * overrule the STA's selection. An Authenticator's SME shall * insert the second RSNE, after the first RSNE, only for this * purpose. The pairwise cipher suite in the second RSNE * included shall be one of the ciphers advertised by the @@ -2263,12 +2263,12 @@ static void eapol_eap_results_cb(const uint8_t *msk_data, size_t msk_len, /* * 802.11i 8.5.1.2: * "When not using a PSK, the PMK is derived from the AAA key. - * The PMK shall be computed as the first 256 bits (bits 0–255) - * of the AAA key: PMK ← L(PTK, 0, 256)." + * The PMK shall be computed as the first 256 bits (bits 0-255) + * of the AAA key: PMK = L(PTK, 0, 256)." * 802.11-2016 12.7.1.3: * "When not using a PSK, the PMK is derived from the MSK. * The PMK shall be computed as the first PMK_bits bits - * (bits 0 to PMK_bits–1) of the MSK: PMK = L(MSK, 0, PMK_bits)." + * (bits 0 to PMK_bits-1) of the MSK: PMK = L(MSK, 0, PMK_bits)." * RFC5247 explains AAA-Key refers to the MSK and confirms the * first 32 bytes of the MSK are used. MSK is at least 64 octets * long per RFC3748. Note WEP derives the PTK from MSK differently. diff --git a/src/fils.c b/src/fils.c index f12e8a28..7fffefb3 100644 --- a/src/fils.c +++ b/src/fils.c @@ -190,10 +190,10 @@ static int fils_derive_key_data(struct fils_sm *fils) /* * IEEE 802.11ai - 12.12.2.5.3 PTKSA key derivation with FILS - * authentication + * authentication * - * FILS-Key-Data = PRF-X(PMK, “FILS PTK Derivation”, SPA || AA || - * SNonce || ANonce) + * FILS-Key-Data = PRF-X(PMK, "FILS PTK Derivation", SPA || AA || + * SNonce || ANonce) */ memcpy(ptr, fils->hs->spa, 6); ptr += 6;