This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

Acquire AP's security capabilities from the WL1271 driver

Other Parts Discussed in Thread: WL1271

Hi all,

I've been trying to figure out a way to acquire the different security capabilities of the scanned access points using the WL1271 driver.

I can see that the driver can return a 1bit flag called "Privacy" for the scanned APs but I was wondering if it is possible to also get the security type such as WEP, WPA, WPA2 etc? If so, could you maybe give me some hints on how to do this?

With kindest regards,

Nestor

  • Nestor,

    Currently, the wlan_cu CLI application does not try to decode those information while getting driver events  for scan. Since other open source tools like iwconfig/iwlist (iwlist tiwlan0 scan) parses those information elements from the WL1271 driver events, we may want to add code in the application to achieve it.

    Thanks,

    Sinoj

  • Thank you very much for the information Sinoj. Could you maybe provide some hints on where this information shall be parsed from?

    We are not using the CLI API but going directly to the driver, however I've been going through the driver's code and couldn't find where to get this information from so any hints would be greatly appreciated.

    Best regards,

    Nestor

  • Hi Nestor,

    In general parsing of probe response & beacons are done in mlmeParser module.
    From there the information is sent to scan result table and other modules.

    Thanks,
    Alon.S

  • Hi Alon,

    I would like to learn how to obtain these authentication and authorization values from the driver through the ioctl calls from the user space. It is possible to send SIOCGIWSCAN request (defined in the wireless.h as get scanning results) through the ioctl and obtain following parameters:

    SIOCGIWAP /* get access point MAC addresses */

    SIOCGIWESSID /* get ESSID (network name) */

    SIOCGIWNAME /* get name == wireless protocol */

    SIOCGIWMODE /* get operation mode */

    etc...

    but among them there are not any parameters talking about the found network authentication and authorization type.

    Is it possible to obtain them from user space calling ioctl with proper identifier? Or maybe the parameters are already passed to the user space after calling the SIOCGIWSCA but I do no know the proper event identifier to parse. Please let me know.

    Regards,

    Krzysztof

  • Krysztof -

    It is possible. If you obtain the source for wireless tools, iwlist specifically, the code does parse the capability information properly from the driver.

    Regards,

    WRiba

     

  • Hi Krysztof .

    I believe that WRiba is correct and it should be possible to extract this information in that way.

     Thanks,
    Alon.S