/**
* TLS-Attacker - A Modular Penetration Testing Framework for TLS
*
* Copyright 2014-2016 Ruhr University Bochum / Hackmanit GmbH
*
* Licensed under Apache License 2.0
* http://www.apache.org/licenses/LICENSE-2.0
*/
package de.rub.nds.tlsattacker.eap;
import de.rub.nds.tlsattacker.util.ArrayConverter;
/**
* Construct the EAP-ACK with no content and EAP-FLag 0x00.
* http://tools.ietf.org/html/rfc3748
*
* @author Felix Lange <flx.lange@gmail.com>
*/
public class FragAck extends EAPResponseDecorator {
EAPFrame eapframe;
public FragAck(EAPFrame eapframe, int id) {
this.eapframe = eapframe;
this.id = id;
createFrame();
}
@Override
public byte[] getFrame() {
return ArrayConverter.concatenate(eapframe.getFrame(), frame);
}
@Override
public void createFrame() {
frame = new byte[8];
eaplength = (short) (frame.length - 2);
frame[0] = (byte) (super.eaplength >>> 8); // Length
frame[1] = (byte) (super.eaplength); // Length
frame[2] = 0x02; // Code
frame[3] = (byte) id; // ID muss aus dem ConnectionHandler kommen //ID
frame[4] = (byte) (super.eaplength >>> 8); // Length
frame[5] = (byte) (super.eaplength); // Length
frame[6] = 0x0d; // Type
frame[7] = 0x00; // EAP-Flag
}
}