On Tue, 2017-05-09 at 14:16 -0400, Michael Skeffington wrote: > In order to allow wpa_supplicant to correctly identify a perceived > WPA TKIP key > recovery attack the michael MIC must be checked before the packet > decode is > attempted. A packet with an invalid MIC will always fail a decrypt > check which > previously was being checked first. Therefore the MIC failure bit of > status flags > describing the error would remain unset. This isn't how the Michael MIC works. I have no idea what problem you're trying to solve, but this is not the solution. johannes