Hi,

I understand through mac80211/cfg80211 debugfs entry, we can write
peer mac into file "tkip_mic_test" to send packet with wrong MIC.

But I'm interested in how it works, as in most of cases, hardware is
the one that typically encrypts and calculates MIC.  Does this entry
ask underlying hardware to send packet with wrong MIC?  Or does it
differently?

Thanks,
Ram
--
To unsubscribe from this list: send the line "unsubscribe linux-wireless" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to