Hi, I understand through mac80211/cfg80211 debugfs entry, we can write peer mac into file "tkip_mic_test" to send packet with wrong MIC. But I'm interested in how it works, as in most of cases, hardware is the one that typically encrypts and calculates MIC. Does this entry ask underlying hardware to send packet with wrong MIC? Or does it differently? Thanks, Ram -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html