Return-path: Received: from mx1.HRZ.Uni-Dortmund.DE ([129.217.128.51]:54650 "EHLO unimail.uni-dortmund.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751835Ab3GaWEU (ORCPT ); Wed, 31 Jul 2013 18:04:20 -0400 Message-ID: <51F9807A.6080000@uni-dortmund.de> (sfid-20130801_000423_273546_D009E065) Date: Wed, 31 Jul 2013 23:24:10 +0200 From: Thomas Klute MIME-Version: 1.0 To: Michael McElroy CC: Krishna Chaitanya , linux-wireless Subject: Re: CLI scan tool needed References: In-Reply-To: Content-Type: text/plain; charset=UTF-8 Sender: linux-wireless-owner@vger.kernel.org List-ID: Am 31.07.2013 22:51, schrieb Michael McElroy: > Thanks Krishna, but all it returns is OK. Running the version 2.0 of > wpa_supplicant. I think the command you want is "scan_results" instead of "scan", so "wpa_cli -i scan_results" over all. ;-) > On Wed, Jul 31, 2013 at 4:30 PM, Krishna Chaitanya > wrote: >> On Wed, Jul 31, 2013 at 11:57 PM, Michael McElroy wrote: >>> Using the backports project, I have one of the latest ralink driver >>> going on an arm processor running 2.6.29 along with all nl80211 parts. >>> Works great, thank you! The last piece I need is to get the to SSID >>> list, their security protocols, and signal strength. I'm looking for >>> output similar to 'wilist scanning'. 'iw scan' gives a lot of info but >>> not quite what I need without a lot of massaging. >> >> "wpa_cli -i scan" >> this should give you the required info, if you are already running the >> wpa_supplicant. > -- > To unsubscribe from this list: send the line "unsubscribe linux-wireless" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html >