Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
soc:2009:oremanj:journal:week6 [2009/07/03 16:29]
rwcr
soc:2009:oremanj:journal:week6 [2009/07/10 14:06] (current)
rwcr
Line 1: Line 1:
 ====== Joshua Oreman: 802.11 wireless development ====== ====== Joshua Oreman: 802.11 wireless development ======
-===== Journal Week =====+===== Journal Week =====
  
 ==== Monday, 29 June ==== ==== Monday, 29 June ====
Line 109: Line 109:
 is a surefire road to a hair-pulling two-hour debugging session. Learn from my mistake, and don't write descending loops as ascending loops. :-) is a surefire road to a hair-pulling two-hour debugging session. Learn from my mistake, and don't write descending loops as ascending loops. :-)
  
-CCMP uses AES in two ways: in key-wrap mode (RFC 3394) to protect the group key in the 4-Way Handshake frames, and in counter mode with CBC-MAC (RFC 3610) to handle normal data packets. I implemented AES-wrap as a generic crypto function, since it is reasonably simple and does not have many tunable parameters; it doesn'​t have a ''​crypto_algorithm''​ structure, but that's just a matter of it being almost uniformly used for bite-sized chunks of data that are generally operated on in one piece. For CCM, though, I made the implementation private to WPA2 because that allowed me to make WPA2-specific size-saving assumptions about how it would be used. I kept the encryption and MACing code separate from the packet marshalling code, though, so if another use for CCM arises it should be fairly easily genericizable.+CCMP uses AES in two ways: in key-wrap mode (RFC 3394) to protect the group key in the 4-Way Handshake frames, and in counter mode with CBC-MAC (CCM; RFC 3610) to handle normal data packets. I implemented AES-wrap as a generic crypto function, since it is reasonably simple and does not have many tunable parameters; it doesn'​t have a ''​crypto_algorithm''​ structure, but that's just a matter of it being almost uniformly used for bite-sized chunks of data that are generally operated on in one piece. For CCM, I made the implementation private to WPA2 because that allowed me to make WPA2-specific size-saving assumptions about how it would be used. I kept the encryption and MACing code separate from the packet marshalling code, though, so if another use for CCM arises it should be fairly easily genericizable.
  
-This will be my last coding work until July 20. In the meantime I will be preparing for and competing in the [[http://​ipho2009.smf.mx|2009 International Physics Olympiad]] in Merida, Mexico. Wish me luck! :-)+This will be my last coding work until July 20. In the meantime I will be preparing for and competing in the [[http://​ipho2009.smf.mx/home|2009 International Physics Olympiad]] in Merida, Mexico. Wish me luck! :-)
  
 After I get back: drivers drivers drivers... After I get back: drivers drivers drivers...
  

QR Code
QR Code soc:2009:oremanj:journal:week6 (generated for current page)