How can I tell what capabilities are built in to a wpa_supplicant executable?
dcbw at redhat.com
Tue Aug 16 09:01:08 PDT 2016
On Tue, 2016-08-16 at 12:45 +0000, Blanquicet-Melendez Jose (MM) wrote:
> There is something anologue to this which allows to know the HT and
> VHT capabilties? And also if wpa_supplicant was built using those
> option (CONFIG_IEEE80211N and CONFIG_IEEE80211AC)?.
> It would be really useful on the upper layers in order to know if
> 80211n and 80211ac can be enabled when setting up an AP mode
Not yet, but would be pretty trivial to add to interface capabilities
in the D-Bus interface. Since this is dependent on the driver and
hardware, it should be an interface capability and not a supplicant
global capability (obviously would be disabled if the supplicant wasn't
built with IEEE80211N and AC).
sudo dbus-send --system --print-reply --dest=fi.w1.wpa_supplicant1
is where that kind of thing should show up if implemented. Not sure
about the socket-based control interface, but I can't find it in a 20s
> Jose Blanquicet
> > -----Original Message-----
> > From: Hostap [mailto:hostap-bounces at lists.infradead.org] On Behalf
> > Of Dan
> > Williams
> > Sent: Monday, August 15, 2016 4:47 PM
> > To: Jouni Malinen; chris at globaloptimists.org
> > Cc: hostap at lists.infradead.org
> > Subject: Re: How can I tell what capabilities are built in to a
> > wpa_supplicant
> > executable?
> > On Sat, 2016-08-13 at 10:33 +0300, Jouni Malinen wrote:
> > >
> > > On Mon, Aug 08, 2016 at 12:20:43PM +0100, chris at globaloptimists.o
> > > rg
> > > wrote:
> > > >
> > > >
> > > > Is there any way to tell what options have been used to build a
> > > > wpa_supplicant executable?
> > > >
> > > > In particular I'd like to be able to find out if the
> > > > wpa_supplicant
> > > > provided by the Ubuntu repositories has EAP-SIM capabilities.
> > > The control interface command GET_CAPABILITY allows number of the
> > > capabilities to be determined. For example, "wpa_cli
> > > get_capability
> > > eap"
> > > would list the EAP methods that were included in the build.
> > The D-Bus interface also lists which EAP methods are built in:
> > dbus-send --system --print-reply --dest=fi.w1.wpa_supplicant1
> > /fi/w1/wpa_supplicant1 org.freedesktop.DBus.Properties.GetAll
> > string:"fi.w1.wpa_supplicant1"
> > gives you something like:
> > dict entry(
> > string "EapMethods"
> > variant array [
> > string "MD5"
> > string "TLS"
> > string "MSCHAPV2"
> > string "PEAP"
> > string "TTLS"
> > string "GTC"
> > string "OTP"
> > string "LEAP"
> > string "AKA"
> > string "FAST"
> > string "PAX"
> > string "SAKE"
> > string "GPSK"
> > string "WSC"
> > string "IKEV2"
> > string "TNC"
> > ]
> > )
> > Dan
> > _______________________________________________
> > Hostap mailing list
> > Hostap at lists.infradead.org
> > http://lists.infradead.org/mailman/listinfo/hostap
> VISITA IL NOSTRO NUOVO SITO WEB! - VISIT OUR NEW WEB SITE! www.magnet
> Confidential Notice: This message - including its attachments - may
> contain proprietary, confidential and/or legally protected
> information and is intended solely for the use of the designated
> addressee(s) above. If you are not the intended recipient be aware
> that any downloading, copying, disclosure, distribution or use of the
> contents of the above information is strictly prohibited.
> If you have received this communication by mistake, please forward
> the message back to the sender at the email address above, delete the
> message from all mailboxes and any other electronic storage medium
> and destroy all copies.
> Disclaimer Notice: Internet communications cannot be guaranteed to be
> safe or error-free. Therefore we do not assure that this message is
> complete or accurate and we do not accept liability for any errors or
> omissions in the contents of this message.
> Hostap mailing list
> Hostap at lists.infradead.org
More information about the Hostap