On Thu, Dec 29, 2016 at 04:21:38PM +0500, ammad rehmat wrote: > I am working on 802.11w and I am facing problem in unicast management > frame encryption. I have implemented CCMP protocol of my own and it > works fine with test vectors. I am testing my project against hostapd > with 802.11W= required and pairwise_rsn= CCMP , keymanagemente= > SHA-psk-256. > > My project is unable to decipher the unicast management frame received > from hostapd. I am wondering if I am using the wrong key? I use the > PTK generated during 4-way handshake according to IEEE-802.11 2012 > article 8.6 . > > Please correct me if I am using the wrong key. Difficult to say what a separate implementation that I've never seen does.. Anyway, please note that there are no known issues in this area in hostapd and the actual CCMP encryption is not actually done within hostapd (i.e., it is in the driver, firmware, or hardware depending on which WLAN hardware component is used). > In the logs I tried to verify if the keys generated on both sides are > same but hostapd logs show following line : > > WPA: PTK - hexdump(len 48) : [removed] > > I do not understand , isnt the key length supposed to be 32 in CCMP > case and how can I print the key in the logs? CCMP uses TK which is part of the PTK, not the full PTK, as the key.. You can add -K to the hostapd command line to allow this type of key material to be included in the log. -- Jouni Malinen PGP id EFC895FA _______________________________________________ Hostap mailing list Hostap@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/hostap