Hi, I have two devices connected in AP client mode, driver used is ath9k. WPA CCMP crypto is used. When I switch to IBSS mode, the broadcast frames are not well decrypted, they are not decrypted at all, but I can see them with tcpdump (no monitor mode). I found that in fact, the keymap used by ath9k hw encryption is not entirely cleared when the interface go down in client mode. In consequences the broadcast frames sent by the ibss node using the keyid of the not cleared key (from precedent configuration) is set as decrypted, though is should be done in software in IBSS mode (hw encryption disabled) : if (test_bit(keyix, common->keymap)) rxs->flag |= RX_FLAG_DECRYPTED; from ath9k/common.c The keymap is not cleared at the end of Client mode because the hw_key_idx is less than IEEE80211_WEP_NKID (=4) : if (key->hw_key_idx < IEEE80211_WEP_NKID) return; in ath_key_delete (ath/key.c) The hw_key_idx is keyidx from the ath_key_config code, so it is = 1 or = 2 ... So less than IEEE80211_WEP_NKID. Is it normal behaviour ? I have not understand the whole key slot algorithm and why STA can't get a key cache slot like AP and IBSS mode. And if all this is normal, why the keymap is not cleared ? Thanks, Simon -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html