This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

WL1835MOD + wpa_supplicant+DBUS - WEP security is not successful

Interface: "fi.w1.wpa_supplicant1.Interface"

Service: "fi.w1.wpa_supplicant1"

Dbus properties interface: "org.freedesktop.DBus.Properties"

Properties: Get

Interface properties to get: fi.w1.wpa_supplicant1.BSS - WPA or RSN

With my scan list retrieved from dbus I am trying to get the group properties for each scan results fi.w1.wpa_supplicant1.BSS (WPA, RSN). With one of my AP with WEP40, the group shows empty. It does not show as WEP40.

I checked in both RSN and WPA. Both returns empty for Group for that AP.

What would be the problem?

Regards,

Johncy.

  • Hi Johncy,

    First lets try to connect directly to a WEP40 AP (not using DBus) so we can rule out any DBus issues.
    Please follow the instructions in this link: processors.wiki.ti.com/.../Connect_to_Secure_AP_using_WPA_Supplicant and confirm if you are able to connect.

    Regards,
    Gigi Joseph.
  • Hi Gigi,

    I am able to connect via command line.
    The scan results using wpa_cli shows the security type as WEP. But when I use dbus in code to scan and the scan results shows CCMP or TKIP for WPA-PSK/WPA2-PSK. The group levels seems to be correct for the AP's with security type WPA-PSK/WPA2-PSK. But for WEP it shows empty string.

    Regards,
    Johncy.
  • Hi Johncy,

    What does the "dbus-monitor" reveal?
    Is it a problem with your app?

    Regards,
    Gigi Joseph.
  • Hi Gigi,

    I use print_message function from dbus-print-message.c . Whatever reply message received through fi.w1.wpa_supplicant1.BSS for the (WPA/RSN) properties is passed to print_message

    Regards,
    Johncy.
  • Hi Gigi,

    dbus_monitor output either doesnt show the Group as WEP it shows empty strings

    signal sender=:1.4 -> dest=(null destination) serial=172 path=/fi/w1/wpa_supplicant1/Interfaces/1; interface=fi.w1.wpa_supplicant1.Interface; member=BSSAdded
    object path "/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/24"
    array [
    dict entry(
    string "SSID"
    variant array of bytes "dlink"
    )
    dict entry(
    string "BSSID"
    variant array of bytes [
    84 c9 b2 30 a2 82
    ]
    )
    dict entry(
    string "Privacy"
    variant boolean true
    )
    dict entry(
    string "Mode"
    variant string "infrastructure"
    )
    dict entry(
    string "Signal"
    variant int16 -34
    )
    dict entry(
    string "Frequency"
    variant uint16 2462
    )
    dict entry(
    string "Rates"
    variant array [
    uint32 54000000
    uint32 48000000
    uint32 36000000
    uint32 24000000
    uint32 18000000
    uint32 12000000
    uint32 11000000
    uint32 9000000
    uint32 6000000
    uint32 5500000
    uint32 2000000
    uint32 1000000
    ]
    )
    dict entry(
    string "WPA"
    variant array [
    dict entry(
    string "KeyMgmt"
    variant array [
    ]
    )
    dict entry(
    string "Group"
    variant string ""
    )
    dict entry(
    string "Pairwise"
    variant array [
    ]
    )
    ]
    )
    dict entry(
    string "RSN"
    variant array [
    dict entry(
    string "KeyMgmt"
    variant array [
    ]
    )
    dict entry(
    string "Group"
    variant string ""
    )
    dict entry(
    string "Pairwise"
    variant array [
    ]
    )
    ]
    )
    dict entry(
    string "WPS"
    variant array [
    dict entry(
    string "Type"
    variant string ""
    )
    ]
    )
    dict entry(
    string "IEs"
    variant array of bytes [
    00 08 64 6c 69 6e 6b 6c 63 63 01 08 82 84 8b 96 24 30 48 6c 03
    01 0b 2a 01 00 2f 01 00 32 04 0c 12 18 60 2d 1a 6c 18 1b ff 00
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    3d 16 0b 08 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

    ]
    )
    ]
    Regards,
    Johncy.
  • Hi Johncy,

    Can you please a corresponding "iw wlan0 scan" results as well (along with the dbus-monitor output)?

    Regards,
    Gigi Joseph.
  • dbus-monitor putput: signal sender=:1.4 -> dest=(null destination) serial=19 path=/fi/w1/wpa_supplicant1/Interfaces/1; interface=fi.w1.wpa_supplicant1.Interface; member=BSSAdded
       object path "/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/11"
       array [
          dict entry(
             string "SSID"
             variant             array of bytes "dlinklcc"
          )
          dict entry(
             string "BSSID"
             variant             array of bytes [
                   84 c9 b2 30 a2 8a
                ]
          )
          dict entry(
             string "Privacy"
             variant             boolean true
          )
          dict entry(
             string "Mode"
             variant             string "infrastructure"
          )
          dict entry(
             string "Signal"
             variant             int16 -33
          )
          dict entry(
             string "Frequency"
             variant             uint16 2462
          )
          dict entry(
             string "Rates"
             variant             array [
                   uint32 54000000
                   uint32 48000000
                   uint32 36000000
                   uint32 24000000
                   uint32 18000000
                   uint32 12000000
                   uint32 11000000
                   uint32 9000000
                   uint32 6000000
                   uint32 5500000
                   uint32 2000000
                   uint32 1000000
                ]
          )
          dict entry(
             string "WPA"
             variant             array [
                   dict entry(
                      string "KeyMgmt"
                      variant                      array [
                         ]
                   )
                   dict entry(
                      string "Group"
                      variant                      string ""
                   )
                   dict entry(
                      string "Pairwise"
                      variant                      array [
                         ]
                   )
                ]
          )
          dict entry(
             string "RSN"
             variant             array [
                   dict entry(
                      string "KeyMgmt"
                      variant                      array [
                         ]
                   )
                   dict entry(
                      string "Group"
                      variant                      string ""
                   )
                   dict entry(
                      string "Pairwise"
                      variant                      array [
                         ]
                   )
                ]
          )
          dict entry(
             string "WPS"
             variant             array [
                   dict entry(
                      string "Type"
                      variant                      string ""
                   )
                ]
          )
          dict entry(
             string "IEs"
             variant             array of bytes [
                   00 08 64 6c 69 6e 6b 6c 63 63 01 08 82 84 8b 96 24 30 48 6c 03
                   01 0b 2a 01 00 2f 01 00 32 04 0c 12 18 60 2d 1a 6c 18 1b ff 00
                   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                   3d 16 0b 08 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                   00 00 00 dd 09 00 10 18 02 00 f0 05 00 00 dd 18 00 50 f2 02 01
                   01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e
                   00 90 4c 33 6c 18 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00
                   00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0b 08 11 00 00 00
                   00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                ]
          )
       ]

    iw scan output:

    BSS 84:c9:b2:30:a2:8a(on wlan0)
        TSF: 3137609114 usec (0d, 00:52:17)
        freq: 2462
        beacon interval: 100 TUs
        capability: ESS Privacy ShortSlotTime (0x0411)
        signal: -35.00 dBm
        last seen: 2960 ms ago
        SSID: dlinklcc
        Supported rates: 1.0* 2.0* 5.5* 11.0* 18.0 24.0 36.0 54.0
        DS Parameter set: channel 11
        ERP: <no flags>
        ERP D4.0: <no flags>
        Extended supported rates: 6.0 9.0 12.0 48.0
        HT capabilities:
            Capabilities: 0x186c
                HT20
                SM Power Save disabled
                RX HT20 SGI
                RX HT40 SGI
                No RX STBC
                Max AMSDU length: 7935 bytes
                DSSS/CCK HT40
            Maximum RX AMPDU length 65535 bytes (exponent: 0x003)
            Minimum RX AMPDU time spacing: 8 usec (0x06)
            HT RX MCS rate indexes supported: 0-7
            HT TX MCS rate indexes are undefined
        HT operation:
             * primary channel: 11
             * secondary channel offset: no secondary
             * STA channel width: 20 MHz
             * RIFS: 1
             * HT protection: nonmember
             * non-GF present: 0
             * OBSS non-GF present: 1
             * dual beacon: 0
             * dual CTS protection: 0
             * STBC beacon: 0
             * L-SIG TXOP Prot: 0
             * PCO active: 0
             * PCO phase: 0
        WMM:     * Parameter version 1
             * u-APSD
             * BE: CW 15-1023, AIFSN 3
             * BK: CW 15-1023, AIFSN 7
             * VI: CW 7-15, AIFSN 2, TXOP 3008 usec
             * VO: CW 3-7, AIFSN 2, TXOP 1504 usec

    wpa_cli -iwanl0 scan

    wpa_cli -iwan0 scan_reults

    84:c9:b2:30:a2:8a       2462    -34     [WEP][ESS]      dlinklcc

  • Hi Johncy,

    I don't see any WPA/RSN information in the "iw wlan0 scan" response as well...
    Does the AP sent any RSN IE in the Beacon/Probe Rsp?

    Regards,
    Gigi Joseph.
  • For AP's with WPA-PSK/WPA2-PSK it sends the RSN/WPA IE.

    BSS 60:e7:01:04:9d:fd(on wlan0)
    TSF: 890479703 usec (0d, 00:14:50)
    freq: 2437
    beacon interval: 100 TUs
    capability: ESS Privacy ShortSlotTime (0x0411)
    signal: -72.00 dBm
    last seen: 3200 ms ago
    Information elements from Probe Response frame:
    SSID: HUAWEI-Venki
    Supported rates: 1.0* 2.0* 5.5* 11.0* 18.0 24.0 36.0 54.0
    DS Parameter set: channel 6
    ERP: <no flags>
    ERP D4.0: <no flags>
    RSN: * Version: 1
    * Group cipher: CCMP
    * Pairwise ciphers: CCMP
    * Authentication suites: PSK
    * Capabilities: 16-PTKSA-RC 1-GTKSA-RC (0x000c)
    Extended supported rates: 6.0 9.0 12.0 48.0
    HT capabilities:
    Capabilities: 0x1120
    HT20
    Static SM Power Save
    RX HT20 SGI
    RX STBC 1-stream
    Max AMSDU length: 3839 bytes
    DSSS/CCK HT40
    Maximum RX AMPDU length 8191 bytes (exponent: 0x000)
    Minimum RX AMPDU time spacing: 8 usec (0x06)
    HT RX MCS rate indexes supported: 0-7
    HT TX MCS rate indexes are undefined
    HT operation:
    * primary channel: 6
    * secondary channel offset: no secondary
    * STA channel width: 20 MHz
    * RIFS: 1
    * HT protection: nonmember
    * non-GF present: 1
    * OBSS non-GF present: 1
    * dual beacon: 0
    * dual CTS protection: 0
    * STBC beacon: 0
    * L-SIG TXOP Prot: 0
    * PCO active: 0
    * PCO phase: 0
    WMM: * Parameter version 1
    * BE: CW 15-1023, AIFSN 3
    * BK: CW 15-1023, AIFSN 7
    * VI: CW 7-15, AIFSN 2, TXOP 3008 usec
    * VO: CW 3-7, AIFSN 2, TXOP 1504 usec

    signal sender=:1.4 -> dest=(null destination) serial=13 path=/fi/w1/wpa_supplicant1/Interfaces/1; interface=fi.w1.wpa_supplicant1.Interface; member=BSSAdded
    object path "/fi/w1/wpa_supplicant1/Interfaces/1/BSSs/5"
    array [
    dict entry(
    string "SSID"
    variant array of bytes "HUAWEI-Venki"
    )
    dict entry(
    string "BSSID"
    variant array of bytes [
    60 e7 01 04 9d fd
    ]
    )
    dict entry(
    string "Privacy"
    variant boolean true
    )
    dict entry(
    string "Mode"
    variant string "infrastructure"
    )
    dict entry(
    string "Signal"
    variant int16 -71
    )
    dict entry(
    string "Frequency"
    variant uint16 2437
    )
    dict entry(
    string "Rates"
    variant array [
    uint32 54000000
    uint32 48000000
    uint32 36000000
    uint32 24000000
    uint32 18000000
    uint32 12000000
    uint32 11000000
    uint32 9000000
    uint32 6000000
    uint32 5500000
    uint32 2000000
    uint32 1000000
    ]
    )
    dict entry(
    string "WPA"
    variant array [
    dict entry(
    string "KeyMgmt"
    variant array [
    ]
    )
    dict entry(
    string "Group"
    variant string ""
    )
    dict entry(
    string "Pairwise"
    variant array [
    ]
    )
    ]
    )
    dict entry(
    string "RSN"
    variant array [
    dict entry(
    string "KeyMgmt"
    variant array [
    string "wpa-psk"
    ]
    )
    dict entry(
    string "Group"
    variant string "ccmp"
    )
    dict entry(
    string "Pairwise"
    variant array [
    string "ccmp"
    ]
    )
    dict entry(
    string "MgmtGroup"
    variant string "aes128cmac"
    )
    ]
    )
    dict entry(
    string "WPS"
    variant array [
    dict entry(
    string "Type"
    variant string ""
    )
    ]
    )
    dict entry(
    string "IEs"
    variant array of bytes [
    00 0c 48 55 41 57 45 49 2d 56 65 6e 6b 69 01 08 82 84 8b 96 24
    30 48 6c 03 01 06 2a 01 00 2f 01 00 30 14 01 00 00 0f ac 04 01
    00 00 0f ac 04 01 00 00 0f ac 02 0c 00 32 04 0c 12 18 60 2d 1a
    20 11 18 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    00 00 00 00 00 3d 16 06 08 15 00 00 00 00 00 00 00 00 00 00 00
    00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 00 04 00 00 dd 18
    00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62
    32 2f 00
    ]
    )
    ]
  • Hi Johncy,

    Then this is an AP configuration issue, right?

    Regards,
    Gigi Joseph.
  • I dont find anything additional in the configuration to make it visible. If I configure the same AP to WPA/WPA2 it shows the RSN/WPA IE.
  • Hi Johncy,

    I am not sure how I can help you with the AP's configuration...
    I think you can check for the AP's manual online.

    Regards,
    Gigi Joseph.