return (freq / 5) - 1000;
}
-static char * nl80211_getval(const char *buf, const char *key)
+static char * nl80211_getval(const char *ifname, const char *buf, const char *key)
{
int i, len;
char lkey[64] = { 0 };
const char *ln = buf;
static char lval[256] = { 0 };
+ int matched_if = ifname ? 0 : 1;
+
+
for( i = 0, len = strlen(buf); i < len; i++ )
{
if( !lkey[0] && (buf[i] == ' ' || buf[i] == '\t') )
}
else if( buf[i] == '\n' )
{
- if( lkey[0] && !strcmp(lkey, key) )
+ if( lkey[0] )
{
memcpy(lval, ln + strlen(lkey) + 1,
min(sizeof(lval) - 1, &buf[i] - ln - strlen(lkey) - 1));
- return lval;
+ if( (ifname != NULL ) &&
+ (!strcmp(lkey, "interface") || !strcmp(lkey, "bss")) )
+ {
+ matched_if = !strcmp(lval, ifname);
+ }
+ else if( matched_if && !strcmp(lkey, key) )
+ {
+ return lval;
+ }
}
ln = &buf[i+1];
return 0;
}
else if( (ssid = nl80211_hostapd_info(ifname)) &&
- (ssid = nl80211_getval(ssid, "ssid")) )
+ (ssid = nl80211_getval(ifname, ssid, "ssid")) )
{
memcpy(buf, ssid, strlen(ssid));
return 0;
return 0;
}
else if( (bssid = nl80211_hostapd_info(ifname)) &&
- (bssid = nl80211_getval(bssid, "bssid")) )
+ (bssid = nl80211_getval(ifname, bssid, "bssid")) )
{
mac[0] = strtol(&bssid[0], NULL, 16);
mac[1] = strtol(&bssid[3], NULL, 16);
struct iwinfo_crypto_entry *c = (struct iwinfo_crypto_entry *)buf;
/* Hostapd */
- if( (res = nl80211_hostapd_info(ifname)) &&
- nl80211_getval(res, "interface") )
+ if( (res = nl80211_hostapd_info(ifname)) )
{
- if( (val = nl80211_getval(res, "auth_algs")) && (val > 0) )
+ if( (val = nl80211_getval(ifname, res, "auth_algs")) && (val > 0) )
{
c->auth_suites |= IWINFO_KMGMT_NONE;
{
snprintf(k, sizeof(k), "wep_key%d", i);
- if( (val = nl80211_getval(res, k)) )
+ if( (val = nl80211_getval(ifname, res, k)) )
{
if( (strlen(val) == 5) || (strlen(val) == 10) )
c->pair_ciphers |= IWINFO_CIPHER_WEP40;
}
- if( (val = nl80211_getval(res, "wpa")) != NULL )
+ if( (val = nl80211_getval(ifname, res, "wpa")) != NULL )
c->wpa_version = atoi(val);
- val = nl80211_getval(res, "wpa_key_mgmt");
+ val = nl80211_getval(ifname, res, "wpa_key_mgmt");
if( !val || strstr(val, "PSK") )
c->auth_suites |= IWINFO_KMGMT_PSK;
c->auth_suites |= IWINFO_KMGMT_NONE;
- if( (val = nl80211_getval(res, "wpa_pairwise")) != NULL )
+ if( (val = nl80211_getval(ifname, res, "wpa_pairwise")) != NULL )
{
if( strstr(val, "TKIP") )
c->pair_ciphers |= IWINFO_CIPHER_TKIP;
/* WPA supplicant */
else if( (res = nl80211_wpasupp_info(ifname, "STATUS")) &&
- (val = nl80211_getval(res, "pairwise_cipher")) )
+ (val = nl80211_getval(NULL, res, "pairwise_cipher")) )
{
/* WEP */
if( strstr(val, "WEP") )
c->pair_ciphers |= IWINFO_CIPHER_WEP104;
- if( (val = nl80211_getval(res, "group_cipher")) )
+ if( (val = nl80211_getval(NULL, res, "group_cipher")) )
{
if( strstr(val, "TKIP") )
c->group_ciphers |= IWINFO_CIPHER_TKIP;
}
- if( (val = nl80211_getval(res, "key_mgmt")) )
+ if( (val = nl80211_getval(NULL, res, "key_mgmt")) )
{
if( strstr(val, "WPA2") )
c->wpa_version = 2;