And the same on a different system, with ath9k (with the "host" using iwlwifi):
BSS 4e:75:8f:95:91:12 (on wlan0)
TSF: 191896339578 usec (2d, 05:18:16)
freq: 2412
beacon interval: 100
capability: IBSS Privacy (0x0012)
signal: -55.00 dBm
last seen: 288 ms ago
SSID: adhoc
Supported rates: 1.0* 2.0* 5.5* 11.0* 18.0 24.0 36.0 54.0
DS Parameter set: channel 1
ERP: <no flags>
Extended supported rates: 6.0 9.0 12.0 48.0
WPA: * Version: 1
* Group cipher: TKIP
* Pairwise ciphers: Use group cipher suite
* Authentication suites: 00-50-f2:0
* Capabilities: 16-PTKSA-RC (0x000c)
However, NM happily connects to the network without the host blocking the connection; with an invalid passphrase. (I used "12345678" entered on the "client"). See attached.
And the same on a different system, with ath9k (with the "host" using iwlwifi):
BSS 4e:75:8f:95:91:12 (on wlan0)
TSF: 191896339578 usec (2d, 05:18:16)
freq: 2412
beacon interval: 100
capability: IBSS Privacy (0x0012)
signal: -55.00 dBm
last seen: 288 ms ago
SSID: adhoc
Supported rates: 1.0* 2.0* 5.5* 11.0* 18.0 24.0 36.0 54.0
DS Parameter set: channel 1
ERP: <no flags>
Extended supported rates: 6.0 9.0 12.0 48.0
WPA: * Version: 1
* Group cipher: TKIP
* Pairwise ciphers: Use group cipher suite
* Authentication suites: 00-50-f2:0
* Capabilities: 16-PTKSA-RC (0x000c)
However, NM happily connects to the network without the host blocking the connection; with an invalid passphrase. (I used "12345678" entered on the "client"). See attached.