|
@@ -53,24 +53,32 @@ enum { EAPOL_KEY_TYPE_RC4 = 1, EAPOL_KEY_TYPE_RSN = 2,
|
|
|
struct ieee802_1x_eapol_key {
|
|
|
unsigned char type;
|
|
|
unsigned short key_length;
|
|
|
- /* does not repeat within the life of the keying material used to
|
|
|
- * encrypt the Key field; 64-bit NTP timestamp MAY be used here */
|
|
|
+ /*
|
|
|
+ * does not repeat within the life of the keying material used to
|
|
|
+ * encrypt the Key field; 64-bit NTP timestamp MAY be used here
|
|
|
+ */
|
|
|
unsigned char replay_counter[IEEE8021X_REPLAY_COUNTER_LEN];
|
|
|
unsigned char key_iv[IEEE8021X_KEY_IV_LEN]; /* cryptographically random number */
|
|
|
- unsigned char key_index; /* key flag in the most significant bit:
|
|
|
+ unsigned char key_index; /*
|
|
|
+ * key flag in the most significant bit:
|
|
|
* 0 = broadcast (default key),
|
|
|
* 1 = unicast (key mapping key); key index is in the
|
|
|
- * 7 least significant bits */
|
|
|
- /* HMAC-MD5 message integrity check computed with MS-MPPE-Send-Key as
|
|
|
- * the key */
|
|
|
+ * 7 least significant bits
|
|
|
+ */
|
|
|
+ /*
|
|
|
+ * HMAC-MD5 message integrity check computed with MS-MPPE-Send-Key as
|
|
|
+ * the key
|
|
|
+ */
|
|
|
unsigned char key_signature[IEEE8021X_KEY_SIGN_LEN];
|
|
|
|
|
|
- /* followed by key: if packet body length = 44 + key length, then the
|
|
|
+ /*
|
|
|
+ * followed by key: if packet body length = 44 + key length, then the
|
|
|
* key field (of key_length bytes) contains the key in encrypted form;
|
|
|
* if packet body length = 44, key field is absent and key_length
|
|
|
* represents the number of least significant octets from
|
|
|
* MS-MPPE-Send-Key attribute to be used as the keying material;
|
|
|
- * RC4 key used in encryption = Key-IV + MS-MPPE-Recv-Key */
|
|
|
+ * RC4 key used in encryption = Key-IV + MS-MPPE-Recv-Key
|
|
|
+ */
|
|
|
} __packed;
|
|
|
|
|
|
#define WPA_NONCE_LEN 32
|