wpa_supplicant daemon server GUI test message

2023-11-28 05:48

本文主要是介绍wpa_supplicant daemon server GUI test message,希望对大家解决编程问题提供一定的参考价值,需要的开发者们随着小编来一起学习吧!

1、先来看一下wpa_gui发出的命令序列,方便我们来模拟。

send command: STATUS

send command: LIST_NETWORKS
scan here!
send cmd: BSS 0
send command: BSS 0
scan here!
send cmd: BSS 0
send command: BSS 0
send command: SCAN
send cmd: BSS 0
send command: BSS 0
reply: "id=0
bssid=ec:26:ca:62:2e:94
freq=2412
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-35
tsf=0003132175564689
age=0
ie=000564797a6462010882848b960c1218240301010706434e20010d202a010030140100000fac040100000fac040100000fac02000032043048606c2d1a6e101bffffff0000000000000000008000000000000000000000331a6e101bffffff00000000000000000080000000000000000000003d1601050500000000000000000000000000000000000000341601050500000000000000000000000000000000000000dd160050f20101000050f20401000050f20401000050f202dd180050f2020101030003a4000027a4000042435e0062322f00dd0900037f01010000ff7f
flags=[WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]
ssid=dyzdb
"
send cmd: BSS 1
send command: BSS 1
reply: "id=1
bssid=08:57:00:c7:17:7b
freq=2457
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-55
tsf=0000279279287569
age=0
ie=0013e78c8ee8b1b9e5858de8b4b957694669313139010882848b968c12982403010a30140100000fac040100000fac040100000fac0200002a01003204b048606cdd180050f2020101800003a4000027a4000042435e0062322f002d1a6e1802ff000000000000000000000000000000000000000000003d160a070200000000000000000000000000000000000000dd0700e04c02021000
flags=[WPA2-PSK-CCMP][ESS]
ssid=\xe7\x8c\x8e\xe8\xb1\xb9\xe5\x85\x8d\xe8\xb4\xb9WiFi119
"
send cmd: BSS 2
send command: BSS 2
reply: "id=2
bssid=22:12:7b:15:be:95
freq=2412
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-70
tsf=0000193622805050
age=0
ie=000c7469636b6574393939393939010882848b960c1218240301010706434e20010d142a010030140100000fac040100000fac040100000fac02000032043048606c2d1a2c0103ff000000000000000000000000000000000000000000003d16010511000000000000000000000000000000000000004a0e14000a002c01c8001400050019007f080100000000000000dd180050f20201010c0003a4000027a4000042435e0062322f00dd1e00904c332c0103ff00000000000000000000000000000000000000000000dd1a00904c3401051100000000000000000000000000000000000000dd0900037f01010000ff7f
flags=[WPA2-PSK-CCMP][ESS]
ssid=ticket999999
"
send cmd: BSS 3
send command: BSS 3
reply: "id=3
bssid=c8:3a:35:11:0a:60
freq=2462
beacon_int=100
capabilities=0x0411
qual=0
noise=0
level=-77
tsf=0000000070956613
age=0
ie=00094e6f73657276696365010882840b162430486c03010b2a01002f010030140100000fac040100000fac040100000fac020c0032040c1218602d1afc191bffff0000000000000000000000000000000000000000003d160b080000000000000000000000000000000000000000dd090010180216f02c0000dd180050f20101000050f20401000050f20401000050f2020c00dd180050f2020101000003a4000027a4000042435e0062322f00
flags=[WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]
ssid=Noservice
"
send cmd: BSS 4
send command: BSS 4
reply: "id=4
bssid=64:d9:54:8d:ab:7b
freq=2412
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-77
tsf=0000025011218790
age=0
ie=0015e4b8ade585b1e4b8ade5a4aee58a9ee585ace58e85010882848b961224486c0301012a010432040c18306030140100000fac040100000fac040100000fac020000dd180050f2020101000003a4000027a4000042435e0062322f00dd07000c43060000002d1a6e0102ff000000000000000000000000000000000e00000000003d16010500000000000000000000000000000000000000003e0100dd1e00904c336e0102ff000000000000000000000000000000000e0000000000dd1a00904c3401050000000000000000000000000000000000000000
flags=[WPA2-PSK-CCMP][ESS]
ssid=\xe4\xb8\xad\xe5\x85\xb1\xe4\xb8\xad\xe5\xa4\xae\xe5\x8a\x9e\xe5\x85\xac\xe5\x8e\x85
"
send cmd: BSS 5
send command: BSS 5
reply: "id=5
bssid=00:36:76:64:01:f6
freq=2462
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-80
tsf=0000021864357251
age=0
ie=0006e8b9ade8b9ad010882848b961224486c03010b32040c183060dd180050f20101000050f20401000050f20401000050f202000030140100000fac040100000fac040100000fac020000dd180050f2020101000003a4000027a4000042435e0062322f000504000100002a0104dd07000c43060000002d1a6e0102ff000000000000000000000000000000000e00000000003d160b070000000000000000000000000000000000000000dd1e00904c336e0102ff000000000000000000000000000000000e0000000000dd1a00904c340b070000000000000000000000000000000000000000
flags=[WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]
ssid=\xe8\xb9\xad\xe8\xb9\xad
"
send cmd: BSS 6
send command: BSS 6
reply: "id=6
bssid=24:05:0f:2d:eb:19
freq=2437
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-80
tsf=0000025712915070
age=0
ie=0012efbc88e69caae79fa5e4bfa1e58fb7efbc89010882848b961224486c03010632040c183060dd180050f20101000050f20401000050f20401000050f202000030140100000fac040100000fac040100000fac020000dd180050f2020101000003a4000027a4000042435e0062322f000504000100002a0104dd07000c43060000002d1a6e0102ff000000000000000000000000000000000e00000000003d1606050000000000000000000000000000000000000000dd1e00904c336e0102ff000000000000000000000000000000000e0000000000dd1a00904c3406050000000000000000000000000000000000000000
flags=[WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]
ssid=\xef\xbc\x88\xe6\x9c\xaa\xe7\x9f\xa5\xe4\xbf\xa1\xe5\x8f\xb7\xef\xbc\x89
"
send cmd: BSS 7
send command: BSS 7
reply: "id=7
bssid=00:b0:c6:02:f1:b0
freq=2437
beacon_int=100
capabilities=0x0001
qual=0
noise=0
level=-16
tsf=0063487038395693
age=0
ie=000649502d434f4d010882848b961224486c0301062a010432040c1830602d1aee1117ffff0000010000000000000000000000000c00000000003d16060000000000000000000000000000000000000000003e0100dd180050f2020101000003a4000027a4000042435e0062322f000b05000013127a7f0101dd07000c43040000000706434e20010d10dd1e00904c33ee1117ffff0000010000000000000000000000000c0000000000dd1a00904c3406000000000000000000000000000000000000000000
flags=[ESS]
ssid=IP-COM
"
send cmd: BSS 8
send command: BSS 8
send command: GET_CAPABILITY eap
send command: ADD_NETWORK
send command: SET_NETWORK 0 ssid "dyzdb"
send command: SET_NETWORK 0 auth_alg OPEN
send command: SET_NETWORK 0 proto WPA2
send command: SET_NETWORK 0 key_mgmt WPA-PSK
send command: SET_NETWORK 0 pairwise CCMP
send command: SET_NETWORK 0 group TKIP CCMP WEP104 WEP40
send command: SET_NETWORK 0 psk "zhongduanbu"
send command: SET_NETWORK 0 phase2 NULL
send command: SET_NETWORK 0 identity NULL
send command: SET_NETWORK 0 password NULL
send command: SET_NETWORK 0 ca_cert NULL
send command: SET_NETWORK 0 id_str NULL
send command: SET_NETWORK 0 priority 0
send command: ENABLE_NETWORK 0
send command: STATUS
send command: LIST_NETWORKS
send command: GET_NETWORK 0 disabled
send command: GET_NETWORK 0 disabled
send command: SAVE_CONFIG
send cmd: BSS 0
send command: BSS 0
reply: "id=0
bssid=ec:26:ca:62:2e:94
freq=2412
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-34
tsf=0003132185560426
age=0
ie=000564797a6462010882848b960c1218240301010706434e20010d202a010030140100000fac040100000fac040100000fac02000032043048606c2d1a6e101bffffff0000000000000000008000000000000000000000331a6e101bffffff00000000000000000080000000000000000000003d1601050500000000000000000000000000000000000000341601050500000000000000000000000000000000000000dd160050f20101000050f20401000050f20401000050f202dd180050f2020101030003a4000027a4000042435e0062322f00dd0900037f01010000ff7f
flags=[WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]
ssid=dyzdb
"
send cmd: BSS 1
send command: BSS 1
reply: "id=1
bssid=08:57:00:c7:17:7b
freq=2457
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-55
tsf=0000279289191457
age=0
ie=0013e78c8ee8b1b9e5858de8b4b957694669313139010882848b968c12982403010a30140100000fac040100000fac040100000fac0200002a01003204b048606cdd180050f2020101800003a4000027a4000042435e0062322f002d1a6e1802ff000000000000000000000000000000000000000000003d160a070200000000000000000000000000000000000000dd0700e04c02021000
flags=[WPA2-PSK-CCMP][ESS]
ssid=\xe7\x8c\x8e\xe8\xb1\xb9\xe5\x85\x8d\xe8\xb4\xb9WiFi119
"
send cmd: BSS 2
send command: BSS 2
reply: "id=2
bssid=22:12:7b:15:be:95
freq=2412
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-70
tsf=0000193632797780
age=0
ie=000c7469636b6574393939393939010882848b960c1218240301010706434e20010d142a010030140100000fac040100000fac040100000fac02000032043048606c2d1a2c0103ff000000000000000000000000000000000000000000003d16010511000000000000000000000000000000000000004a0e14000a002c01c8001400050019007f080100000000000000dd180050f20201010c0003a4000027a4000042435e0062322f00dd1e00904c332c0103ff00000000000000000000000000000000000000000000dd1a00904c3401051100000000000000000000000000000000000000dd0900037f01010000ff7f
flags=[WPA2-PSK-CCMP][ESS]
ssid=ticket999999
"
send cmd: BSS 3
send command: BSS 3
reply: "id=3
bssid=c8:3a:35:11:0a:60
freq=2462
beacon_int=100
capabilities=0x0411
qual=0
noise=0
level=-77
tsf=0000000070956613
age=0
ie=00094e6f73657276696365010882840b162430486c03010b2a01002f010030140100000fac040100000fac040100000fac020c0032040c1218602d1afc191bffff0000000000000000000000000000000000000000003d160b080000000000000000000000000000000000000000dd090010180216f02c0000dd180050f20101000050f20401000050f20401000050f2020c00dd180050f2020101000003a4000027a4000042435e0062322f00
flags=[WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]
ssid=Noservice
"
send cmd: BSS 4
send command: BSS 4
reply: "id=4
bssid=64:d9:54:8d:ab:7b
freq=2412
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-77
tsf=0000025011218790
age=10
ie=0015e4b8ade585b1e4b8ade5a4aee58a9ee585ace58e85010882848b961224486c0301012a010432040c18306030140100000fac040100000fac040100000fac020000dd180050f2020101000003a4000027a4000042435e0062322f00dd07000c43060000002d1a6e0102ff000000000000000000000000000000000e00000000003d16010500000000000000000000000000000000000000003e0100dd1e00904c336e0102ff000000000000000000000000000000000e0000000000dd1a00904c3401050000000000000000000000000000000000000000
flags=[WPA2-PSK-CCMP][ESS]
ssid=\xe4\xb8\xad\xe5\x85\xb1\xe4\xb8\xad\xe5\xa4\xae\xe5\x8a\x9e\xe5\x85\xac\xe5\x8e\x85
"
send cmd: BSS 5
send command: BSS 5
reply: "id=5
bssid=00:36:76:64:01:f6
freq=2462
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-71
tsf=0000021874390183
age=0
ie=0006e8b9ade8b9ad010882848b961224486c03010b32040c183060dd180050f20101000050f20401000050f20401000050f202000030140100000fac040100000fac040100000fac020000dd180050f2020101000003a4000027a4000042435e0062322f000504000100002a0104dd07000c43060000002d1a6e0102ff000000000000000000000000000000000e00000000003d160b070000000000000000000000000000000000000000dd1e00904c336e0102ff000000000000000000000000000000000e0000000000dd1a00904c340b070000000000000000000000000000000000000000
flags=[WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]
ssid=\xe8\xb9\xad\xe8\xb9\xad
"
send cmd: BSS 6
send command: BSS 6
reply: "id=6
bssid=24:05:0f:2d:eb:19
freq=2437
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-80
tsf=0000025712915070
age=10
ie=0012efbc88e69caae79fa5e4bfa1e58fb7efbc89010882848b961224486c03010632040c183060dd180050f20101000050f20401000050f20401000050f202000030140100000fac040100000fac040100000fac020000dd180050f2020101000003a4000027a4000042435e0062322f000504000100002a0104dd07000c43060000002d1a6e0102ff000000000000000000000000000000000e00000000003d1606050000000000000000000000000000000000000000dd1e00904c336e0102ff000000000000000000000000000000000e0000000000dd1a00904c3406050000000000000000000000000000000000000000
flags=[WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]
ssid=\xef\xbc\x88\xe6\x9c\xaa\xe7\x9f\xa5\xe4\xbf\xa1\xe5\x8f\xb7\xef\xbc\x89
"
send cmd: BSS 7
send command: BSS 7
reply: "id=7
bssid=00:b0:c6:02:f1:b0
freq=2437
beacon_int=100
capabilities=0x0001
qual=0
noise=0
level=-17
tsf=0063487048382800
age=0
ie=000649502d434f4d010882848b961224486c0301062a010432040c1830602d1aee1117ffff0000010000000000000000000000000c00000000003d16060000000000000000000000000000000000000000003e0100dd180050f2020101000003a4000027a4000042435e0062322f000b05000011127a7f0101dd07000c43040000000706434e20010d10dd1e00904c33ee1117ffff0000010000000000000000000000000c0000000000dd1a00904c3406000000000000000000000000000000000000000000
flags=[ESS]
ssid=IP-COM
"
send cmd: BSS 8
send command: BSS 8
reply: "id=8
bssid=00:36:76:4b:26:de
freq=2437
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-76
tsf=0000008500309991
age=0
ie=00026d6f010882848b961224486c03010632040c183060dd180050f20101000050f20401000050f20401000050f202000030140100000fac040100000fac040100000fac020000dd180050f2020101000003a4000027a4000042435e0062322f000504000100002a0104dd07000c43060000002d1a6e0102ff000000000000000000000000000000000e00000000003d1606050000000000000000000000000000000000000000dd1e00904c336e0102ff000000000000000000000000000000000e0000000000dd1a00904c3406050000000000000000000000000000000000000000
flags=[WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]
ssid=mo
"
send cmd: BSS 9
send command: BSS 9
send command: REASSOCIATE
send command: STATUS
send command: STATUS
send command: DISCONNECT
send command: DISCONNECT

2、下面是wpa_supplicant daemon server输出的信息。

yantai:/home/shell.albert # wpa_supplicant  -i wlp5s0 -c /etc/wpa_supplicant/wpa_supplicant.conf  
Successfully initialized wpa_supplicant
wlp5s0: CTRL-EVENT-SCAN-STARTED
wlp5s0: CTRL-EVENT-SCAN-STARTED
wlp5s0: SME: Trying to authenticate with ec:26:ca:62:2e:94 (SSID='dyzdb' freq=2412 MHz)
wlp5s0: Trying to associate with ec:26:ca:62:2e:94 (SSID='dyzdb' freq=2412 MHz)
wlp5s0: Associated with ec:26:ca:62:2e:94
wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=CN
wlp5s0: WPA: Key negotiation completed with ec:26:ca:62:2e:94 [PTK=CCMP GTK=CCMP]
wlp5s0: CTRL-EVENT-CONNECTED - Connection to ec:26:ca:62:2e:94 completed [id=0 id_str=]
wlp5s0: SME: Trying to authenticate with ec:26:ca:62:2e:94 (SSID='dyzdb' freq=2412 MHz)
wlp5s0: Trying to associate with ec:26:ca:62:2e:94 (SSID='dyzdb' freq=2412 MHz)
wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=DRIVER type=WORLD
wlp5s0: Associated with ec:26:ca:62:2e:94
wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=CN
wlp5s0: WPA: Key negotiation completed with ec:26:ca:62:2e:94 [PTK=CCMP GTK=CCMP]
wlp5s0: CTRL-EVENT-CONNECTED - Connection to ec:26:ca:62:2e:94 completed [id=0 id_str=]
wlp5s0: WPA: Group rekeying completed with ec:26:ca:62:2e:94 [GTK=CCMP]
wlp5s0: CTRL-EVENT-DISCONNECTED bssid=ec:26:ca:62:2e:94 reason=3 locally_generated=1
wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=DRIVER type=WORLD

3、好像这样还不行,这样只是连接上了,还没有配置ip地址。使用dhcp分配一下。

dhclient wlp5s0

再ping就能ping通了。

by zhangshaoyan at May 20,2015.



这篇关于wpa_supplicant daemon server GUI test message的文章就介绍到这儿,希望我们推荐的文章对编程师们有所帮助!



http://www.chinasem.cn/article/429164

相关文章

SQL Server修改数据库名及物理数据文件名操作步骤

《SQLServer修改数据库名及物理数据文件名操作步骤》在SQLServer中重命名数据库是一个常见的操作,但需要确保用户具有足够的权限来执行此操作,:本文主要介绍SQLServer修改数据... 目录一、背景介绍二、操作步骤2.1 设置为单用户模式(断开连接)2.2 修改数据库名称2.3 查找逻辑文件名

SQL Server数据库死锁处理超详细攻略

《SQLServer数据库死锁处理超详细攻略》SQLServer作为主流数据库管理系统,在高并发场景下可能面临死锁问题,影响系统性能和稳定性,这篇文章主要给大家介绍了关于SQLServer数据库死... 目录一、引言二、查询 Sqlserver 中造成死锁的 SPID三、用内置函数查询执行信息1. sp_w

Linux中修改Apache HTTP Server(httpd)默认端口的完整指南

《Linux中修改ApacheHTTPServer(httpd)默认端口的完整指南》ApacheHTTPServer(简称httpd)是Linux系统中最常用的Web服务器之一,本文将详细介绍如何... 目录一、修改 httpd 默认端口的步骤1. 查找 httpd 配置文件路径2. 编辑配置文件3. 保存

Windows Server 2025 搭建NPS-Radius服务器的步骤

《WindowsServer2025搭建NPS-Radius服务器的步骤》本文主要介绍了通过微软的NPS角色实现一个Radius服务器,身份验证和证书使用微软ADCS、ADDS,具有一定的参考价... 目录简介示意图什么是 802.1X?核心作用802.1X的组成角色工作流程简述802.1X常见应用802.

SQL Server身份验证模式步骤和示例代码

《SQLServer身份验证模式步骤和示例代码》SQLServer是一个广泛使用的关系数据库管理系统,通常使用两种身份验证模式:Windows身份验证和SQLServer身份验证,本文将详细介绍身份... 目录身份验证方式的概念更改身份验证方式的步骤方法一:使用SQL Server Management S

Spring AI 实现 STDIO和SSE MCP Server的过程详解

《SpringAI实现STDIO和SSEMCPServer的过程详解》STDIO方式是基于进程间通信,MCPClient和MCPServer运行在同一主机,主要用于本地集成、命令行工具等场景... 目录Spring AI 实现 STDIO和SSE MCP Server1.新建Spring Boot项目2.a

SQL Server中的PIVOT与UNPIVOT用法具体示例详解

《SQLServer中的PIVOT与UNPIVOT用法具体示例详解》这篇文章主要给大家介绍了关于SQLServer中的PIVOT与UNPIVOT用法的具体示例,SQLServer中PIVOT和U... 目录引言一、PIVOT:将行转换为列核心作用语法结构实战示例二、UNPIVOT:将列编程转换为行核心作用语

解决tomcat启动时报Junit相关错误java.lang.ClassNotFoundException: org.junit.Test问题

《解决tomcat启动时报Junit相关错误java.lang.ClassNotFoundException:org.junit.Test问题》:本文主要介绍解决tomcat启动时报Junit相... 目录tomcat启动时报Junit相关错误Java.lang.ClassNotFoundException

Spring Boot 整合 SSE的高级实践(Server-Sent Events)

《SpringBoot整合SSE的高级实践(Server-SentEvents)》SSE(Server-SentEvents)是一种基于HTTP协议的单向通信机制,允许服务器向浏览器持续发送实... 目录1、简述2、Spring Boot 中的SSE实现2.1 添加依赖2.2 实现后端接口2.3 配置超时时

SQL server配置管理器找不到如何打开它

《SQLserver配置管理器找不到如何打开它》最近遇到了SQLserver配置管理器打不开的问题,尝试在开始菜单栏搜SQLServerManager无果,于是将自己找到的方法总结分享给大家,对SQ... 目录方法一:桌面图标进入方法二:运行窗口进入方法三:查找文件路径方法四:检查 SQL Server 安