Show signal level and WPS support in scan results debug dump
This makes it easier to debug AP selection for WPS provisioning.
This commit is contained in:
parent
9abe9b2c35
commit
f62c2315f7
1 changed files with 4 additions and 2 deletions
|
@ -440,10 +440,12 @@ wpa_supplicant_select_bss_wpa(struct wpa_supplicant *wpa_s,
|
||||||
rsn_ie_len = ie ? ie[1] : 0;
|
rsn_ie_len = ie ? ie[1] : 0;
|
||||||
|
|
||||||
wpa_printf(MSG_DEBUG, "%d: " MACSTR " ssid='%s' "
|
wpa_printf(MSG_DEBUG, "%d: " MACSTR " ssid='%s' "
|
||||||
"wpa_ie_len=%u rsn_ie_len=%u caps=0x%x",
|
"wpa_ie_len=%u rsn_ie_len=%u caps=0x%x level=%d%s",
|
||||||
(int) i, MAC2STR(bss->bssid),
|
(int) i, MAC2STR(bss->bssid),
|
||||||
wpa_ssid_txt(ssid_, ssid_len),
|
wpa_ssid_txt(ssid_, ssid_len),
|
||||||
wpa_ie_len, rsn_ie_len, bss->caps);
|
wpa_ie_len, rsn_ie_len, bss->caps, bss->level,
|
||||||
|
wpa_scan_get_vendor_ie(bss, WPS_IE_VENDOR_TYPE) ?
|
||||||
|
" wps" : "");
|
||||||
|
|
||||||
e = wpa_blacklist_get(wpa_s, bss->bssid);
|
e = wpa_blacklist_get(wpa_s, bss->bssid);
|
||||||
if (e && e->count > 1) {
|
if (e && e->count > 1) {
|
||||||
|
|
Loading…
Reference in a new issue