in reply to Re: HMAC_SHA1 Implementation for WPA
in thread [SOLVED] HMAC_SHA1 Implementation for WPA

Hi, there actually have been quite a few amendments since 2004, thankfully. You may want to look into a more updated document. As far as "five input parameters" goes, can you not see my 5 parameters? Also, I know that the order is important, as all documentation on building the string data to send to the HMAC-SHA1 uses min() max() functions in its concatentation syntax. This is why I have them hard-coded at the moment.
In a similar way, the computation of the pairwise temporal keys is wri +tten: PRF-512(PMK, "Pairwise key expansion", MAC1||MAC2||Nonce1||Nonce2) Here MAC1 and MAC2 are the MAC addresses of the two devices where MAC1 + is the smaller (numerically) and MAC2 is the larger of the two addre +sses. Similarly, Nonce1 is the smallest value between ANonce and SNon +ce, while Nonce2 is the largest of the two values.

During my more recent research however, I did find a Python implementation which shows similar difficulties, and might shed some insight on your documentation problem - as he did successfully calculate the PTK in Python in a *very* similar way. http-stackoverflow.com-questions-12018920/
Maybe this is a key, but I do use the pack() function, which seems to be the same. I am going to read the .cap file directly using Net::Pcap now and check if the "string" is somehow causing the issue.

Thanks.