This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

WL1837MOD: Capturing all outgoing wifi pakets with pcap

Part Number: WL1837MOD

Hello,

I have an embedded device with a WL1837MOD wifi chip. To debug wifi connection problems directly on the device, I am trying to capture all wifi traffic from the WL1837MOD to the AP and vice-versa. I use the libpcap library (version 1.9.1) on linux-fslc-imx kernel (5.4-2.1.x-imx) to capture network pakets. This works well for e.g. TCP communication, but for the connection phase where the device is authenticating to the AP with EAP and EAPOL messages, the pcap library seems to only capture the pakets received by the WL1837MOD but not the pakets it sends to the AP.

Is it possible to capture the authentication and assiciation packages sent by WL1837MOD or are these messages generated in the modules' firmware and therefore cannot be captured with libpcap? Is there another way to capture all traffic without using an external wifi sniffer?

Regards,
Michael

  • Hi

    Cannot comment on libpcap lib - we don't use this library. FYI - WPA supplicant layer is responsible for security handshake including sending EAPOL messages etc.  Point being , it is different from data tx/rx which is normally done by an app after opening a n/w socket . 

    Thanks

    Saurabh

  • Hi,

    Thank you. I already knew that WPA supplicant should be responsible for the handshake but was not sure if it may offload some work to the WL1837MOD and that may be the reason I cannot capture these frames. I will further investigate on the wpa_supplicant and kernel side.

    Regards,
    Michael