RE: How can I tell what capabilities are built in to a wpa_supplicant executable?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

There is something anologue to this which allows to know the HT and VHT capabilties? And also if wpa_supplicant was built using those option (CONFIG_IEEE80211N and CONFIG_IEEE80211AC)?.
It would be really useful on the upper layers in order to know if 80211n and 80211ac can be enabled when setting up an AP mode operation.

Regards,

Jose Blanquicet

> -----Original Message-----
> From: Hostap [mailto:hostap-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Dan
> Williams
> Sent: Monday, August 15, 2016 4:47 PM
> To: Jouni Malinen; chris@xxxxxxxxxxxxxxxxxxx
> Cc: hostap@xxxxxxxxxxxxxxxxxxx
> Subject: Re: How can I tell what capabilities are built in to a wpa_supplicant
> executable?
>
> On Sat, 2016-08-13 at 10:33 +0300, Jouni Malinen wrote:
> > On Mon, Aug 08, 2016 at 12:20:43PM +0100, chris@xxxxxxxxxxxxxxxxxxx
> > wrote:
> > >
> > > Is there any way to tell what options have been used to build a
> > > wpa_supplicant executable?
> > >
> > > In particular I'd like to be able to find out if the wpa_supplicant
> > > provided by the Ubuntu repositories has EAP-SIM capabilities.
> > The control interface command GET_CAPABILITY allows number of the
> > capabilities to be determined. For example, "wpa_cli get_capability
> > eap"
> > would list the EAP methods that were included in the build.
>
> The D-Bus interface also lists which EAP methods are built in:
>
> dbus-send --system --print-reply --dest=fi.w1.wpa_supplicant1
> /fi/w1/wpa_supplicant1 org.freedesktop.DBus.Properties.GetAll
> string:"fi.w1.wpa_supplicant1"
>
> gives you something like:
>
>       dict entry(
>          string "EapMethods"
>          variant             array [
>                string "MD5"
>                string "TLS"
>                string "MSCHAPV2"
>                string "PEAP"
>                string "TTLS"
>                string "GTC"
>                string "OTP"
>                string "LEAP"
>                string "AKA"
>                string "FAST"
>                string "PAX"
>                string "SAKE"
>                string "GPSK"
>                string "WSC"
>                string "IKEV2"
>                string "TNC"
>             ]
>       )
>
> Dan
>
> _______________________________________________
> Hostap mailing list
> Hostap@xxxxxxxxxxxxxxxxxxx
> http://lists.infradead.org/mailman/listinfo/hostap

________________________________

VISITA IL NOSTRO NUOVO SITO WEB! - VISIT OUR NEW WEB SITE! www.magnetimarelli.com

Confidential Notice: This message - including its attachments - may contain proprietary, confidential and/or legally protected information and is intended solely for the use of the designated addressee(s) above. If you are not the intended recipient be aware that any downloading, copying, disclosure, distribution or use of the contents of the above information is strictly prohibited.
If you have received this communication by mistake, please forward the message back to the sender at the email address above, delete the message from all mailboxes and any other electronic storage medium and destroy all copies.
Disclaimer Notice: Internet communications cannot be guaranteed to be safe or error-free. Therefore we do not assure that this message is complete or accurate and we do not accept liability for any errors or omissions in the contents of this message.
_______________________________________________
Hostap mailing list
Hostap@xxxxxxxxxxxxxxxxxxx
http://lists.infradead.org/mailman/listinfo/hostap



[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]

  Powered by Linux