Compartilhar via


DOT11_KEY_ALGO_TKIP_MIC (Compact 2013)

3/26/2014

This structure defines a cipher key that is used by the TKIP algorithm for data encryption and decryption. The structure also defines a message integrity code (MIC) that is used by the Michael algorithm for verifying data integrity.

Syntax

typedef struct DOT11_KEY_ALGO_TKIP_MIC {
  UCHAR  ucIV48Counter[6];
  ULONG  ulTKIPKeyLength;
  ULONG  ulMICKeyLength;
  UCHAR  ucTKIPMICKeys[1];
} DOT11_KEY_ALGO_TKIP_MIC, *PDOT11_KEY_ALGO_TKIP_MIC;

Members

  • ucIV48Counter
    The initial 48-bit value of the TKIP Sequence Counter (TSC), which is used for replay protection.
  • ulTKIPKeyLength
    The length, in bytes, of the TKIP key material in the ucTKIPMICKeys array. If the authentication and cipher key derivation is performed by the operating system, this member will always have a value of 16.
  • ulMICKeyLength
    The length, in bytes, of the MIC key material in the ucTKIPMICKeys array. If the authentication and cipher key derivation is performed by the operating system, this member will always have a value of 16. The first 8 bytes will be the MIC key that is used for received packets and the last 8 bytes will be the MIC key that is used for transmitted packets.
  • ucTKIPMICKeys
    The TKIP and MIC key material

Remarks

The TKIP key starts at ucTKIPMICKeys[0]. The MIC key starts at ucTKIPMICKeys[ulTKIPKeyLength].

When the TKIP key is created, the 802.11 station must maintain separate TSC counters for the key for the send and receive path. The station must initialize the TSC counters in the following way:

  • Initialize the TSC counter that is used for the receive path to the value specified in the ucIV48Counter member
  • Initialize the TSC counter that is used for the send path to any value

Requirements

Header

windot11.h

See Also

Reference

Native 802.11 Data Types
DOT11_CIPHER_DEFAULT_KEY_VALUE
OID_DOT11_CIPHER_KEY_MAPPING_KEY
Native 802.11 Wireless LAN Reference