wpa_supplicant daemon server GUI test message

2023-11-28 05:48

本文主要是介绍wpa_supplicant daemon server GUI test message,希望对大家解决编程问题提供一定的参考价值,需要的开发者们随着小编来一起学习吧!

1、先来看一下wpa_gui发出的命令序列,方便我们来模拟。

send command: STATUS

send command: LIST_NETWORKS
scan here!
send cmd: BSS 0
send command: BSS 0
scan here!
send cmd: BSS 0
send command: BSS 0
send command: SCAN
send cmd: BSS 0
send command: BSS 0
reply: "id=0
bssid=ec:26:ca:62:2e:94
freq=2412
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-35
tsf=0003132175564689
age=0
ie=000564797a6462010882848b960c1218240301010706434e20010d202a010030140100000fac040100000fac040100000fac02000032043048606c2d1a6e101bffffff0000000000000000008000000000000000000000331a6e101bffffff00000000000000000080000000000000000000003d1601050500000000000000000000000000000000000000341601050500000000000000000000000000000000000000dd160050f20101000050f20401000050f20401000050f202dd180050f2020101030003a4000027a4000042435e0062322f00dd0900037f01010000ff7f
flags=[WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]
ssid=dyzdb
"
send cmd: BSS 1
send command: BSS 1
reply: "id=1
bssid=08:57:00:c7:17:7b
freq=2457
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-55
tsf=0000279279287569
age=0
ie=0013e78c8ee8b1b9e5858de8b4b957694669313139010882848b968c12982403010a30140100000fac040100000fac040100000fac0200002a01003204b048606cdd180050f2020101800003a4000027a4000042435e0062322f002d1a6e1802ff000000000000000000000000000000000000000000003d160a070200000000000000000000000000000000000000dd0700e04c02021000
flags=[WPA2-PSK-CCMP][ESS]
ssid=\xe7\x8c\x8e\xe8\xb1\xb9\xe5\x85\x8d\xe8\xb4\xb9WiFi119
"
send cmd: BSS 2
send command: BSS 2
reply: "id=2
bssid=22:12:7b:15:be:95
freq=2412
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-70
tsf=0000193622805050
age=0
ie=000c7469636b6574393939393939010882848b960c1218240301010706434e20010d142a010030140100000fac040100000fac040100000fac02000032043048606c2d1a2c0103ff000000000000000000000000000000000000000000003d16010511000000000000000000000000000000000000004a0e14000a002c01c8001400050019007f080100000000000000dd180050f20201010c0003a4000027a4000042435e0062322f00dd1e00904c332c0103ff00000000000000000000000000000000000000000000dd1a00904c3401051100000000000000000000000000000000000000dd0900037f01010000ff7f
flags=[WPA2-PSK-CCMP][ESS]
ssid=ticket999999
"
send cmd: BSS 3
send command: BSS 3
reply: "id=3
bssid=c8:3a:35:11:0a:60
freq=2462
beacon_int=100
capabilities=0x0411
qual=0
noise=0
level=-77
tsf=0000000070956613
age=0
ie=00094e6f73657276696365010882840b162430486c03010b2a01002f010030140100000fac040100000fac040100000fac020c0032040c1218602d1afc191bffff0000000000000000000000000000000000000000003d160b080000000000000000000000000000000000000000dd090010180216f02c0000dd180050f20101000050f20401000050f20401000050f2020c00dd180050f2020101000003a4000027a4000042435e0062322f00
flags=[WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]
ssid=Noservice
"
send cmd: BSS 4
send command: BSS 4
reply: "id=4
bssid=64:d9:54:8d:ab:7b
freq=2412
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-77
tsf=0000025011218790
age=0
ie=0015e4b8ade585b1e4b8ade5a4aee58a9ee585ace58e85010882848b961224486c0301012a010432040c18306030140100000fac040100000fac040100000fac020000dd180050f2020101000003a4000027a4000042435e0062322f00dd07000c43060000002d1a6e0102ff000000000000000000000000000000000e00000000003d16010500000000000000000000000000000000000000003e0100dd1e00904c336e0102ff000000000000000000000000000000000e0000000000dd1a00904c3401050000000000000000000000000000000000000000
flags=[WPA2-PSK-CCMP][ESS]
ssid=\xe4\xb8\xad\xe5\x85\xb1\xe4\xb8\xad\xe5\xa4\xae\xe5\x8a\x9e\xe5\x85\xac\xe5\x8e\x85
"
send cmd: BSS 5
send command: BSS 5
reply: "id=5
bssid=00:36:76:64:01:f6
freq=2462
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-80
tsf=0000021864357251
age=0
ie=0006e8b9ade8b9ad010882848b961224486c03010b32040c183060dd180050f20101000050f20401000050f20401000050f202000030140100000fac040100000fac040100000fac020000dd180050f2020101000003a4000027a4000042435e0062322f000504000100002a0104dd07000c43060000002d1a6e0102ff000000000000000000000000000000000e00000000003d160b070000000000000000000000000000000000000000dd1e00904c336e0102ff000000000000000000000000000000000e0000000000dd1a00904c340b070000000000000000000000000000000000000000
flags=[WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]
ssid=\xe8\xb9\xad\xe8\xb9\xad
"
send cmd: BSS 6
send command: BSS 6
reply: "id=6
bssid=24:05:0f:2d:eb:19
freq=2437
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-80
tsf=0000025712915070
age=0
ie=0012efbc88e69caae79fa5e4bfa1e58fb7efbc89010882848b961224486c03010632040c183060dd180050f20101000050f20401000050f20401000050f202000030140100000fac040100000fac040100000fac020000dd180050f2020101000003a4000027a4000042435e0062322f000504000100002a0104dd07000c43060000002d1a6e0102ff000000000000000000000000000000000e00000000003d1606050000000000000000000000000000000000000000dd1e00904c336e0102ff000000000000000000000000000000000e0000000000dd1a00904c3406050000000000000000000000000000000000000000
flags=[WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]
ssid=\xef\xbc\x88\xe6\x9c\xaa\xe7\x9f\xa5\xe4\xbf\xa1\xe5\x8f\xb7\xef\xbc\x89
"
send cmd: BSS 7
send command: BSS 7
reply: "id=7
bssid=00:b0:c6:02:f1:b0
freq=2437
beacon_int=100
capabilities=0x0001
qual=0
noise=0
level=-16
tsf=0063487038395693
age=0
ie=000649502d434f4d010882848b961224486c0301062a010432040c1830602d1aee1117ffff0000010000000000000000000000000c00000000003d16060000000000000000000000000000000000000000003e0100dd180050f2020101000003a4000027a4000042435e0062322f000b05000013127a7f0101dd07000c43040000000706434e20010d10dd1e00904c33ee1117ffff0000010000000000000000000000000c0000000000dd1a00904c3406000000000000000000000000000000000000000000
flags=[ESS]
ssid=IP-COM
"
send cmd: BSS 8
send command: BSS 8
send command: GET_CAPABILITY eap
send command: ADD_NETWORK
send command: SET_NETWORK 0 ssid "dyzdb"
send command: SET_NETWORK 0 auth_alg OPEN
send command: SET_NETWORK 0 proto WPA2
send command: SET_NETWORK 0 key_mgmt WPA-PSK
send command: SET_NETWORK 0 pairwise CCMP
send command: SET_NETWORK 0 group TKIP CCMP WEP104 WEP40
send command: SET_NETWORK 0 psk "zhongduanbu"
send command: SET_NETWORK 0 phase2 NULL
send command: SET_NETWORK 0 identity NULL
send command: SET_NETWORK 0 password NULL
send command: SET_NETWORK 0 ca_cert NULL
send command: SET_NETWORK 0 id_str NULL
send command: SET_NETWORK 0 priority 0
send command: ENABLE_NETWORK 0
send command: STATUS
send command: LIST_NETWORKS
send command: GET_NETWORK 0 disabled
send command: GET_NETWORK 0 disabled
send command: SAVE_CONFIG
send cmd: BSS 0
send command: BSS 0
reply: "id=0
bssid=ec:26:ca:62:2e:94
freq=2412
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-34
tsf=0003132185560426
age=0
ie=000564797a6462010882848b960c1218240301010706434e20010d202a010030140100000fac040100000fac040100000fac02000032043048606c2d1a6e101bffffff0000000000000000008000000000000000000000331a6e101bffffff00000000000000000080000000000000000000003d1601050500000000000000000000000000000000000000341601050500000000000000000000000000000000000000dd160050f20101000050f20401000050f20401000050f202dd180050f2020101030003a4000027a4000042435e0062322f00dd0900037f01010000ff7f
flags=[WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]
ssid=dyzdb
"
send cmd: BSS 1
send command: BSS 1
reply: "id=1
bssid=08:57:00:c7:17:7b
freq=2457
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-55
tsf=0000279289191457
age=0
ie=0013e78c8ee8b1b9e5858de8b4b957694669313139010882848b968c12982403010a30140100000fac040100000fac040100000fac0200002a01003204b048606cdd180050f2020101800003a4000027a4000042435e0062322f002d1a6e1802ff000000000000000000000000000000000000000000003d160a070200000000000000000000000000000000000000dd0700e04c02021000
flags=[WPA2-PSK-CCMP][ESS]
ssid=\xe7\x8c\x8e\xe8\xb1\xb9\xe5\x85\x8d\xe8\xb4\xb9WiFi119
"
send cmd: BSS 2
send command: BSS 2
reply: "id=2
bssid=22:12:7b:15:be:95
freq=2412
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-70
tsf=0000193632797780
age=0
ie=000c7469636b6574393939393939010882848b960c1218240301010706434e20010d142a010030140100000fac040100000fac040100000fac02000032043048606c2d1a2c0103ff000000000000000000000000000000000000000000003d16010511000000000000000000000000000000000000004a0e14000a002c01c8001400050019007f080100000000000000dd180050f20201010c0003a4000027a4000042435e0062322f00dd1e00904c332c0103ff00000000000000000000000000000000000000000000dd1a00904c3401051100000000000000000000000000000000000000dd0900037f01010000ff7f
flags=[WPA2-PSK-CCMP][ESS]
ssid=ticket999999
"
send cmd: BSS 3
send command: BSS 3
reply: "id=3
bssid=c8:3a:35:11:0a:60
freq=2462
beacon_int=100
capabilities=0x0411
qual=0
noise=0
level=-77
tsf=0000000070956613
age=0
ie=00094e6f73657276696365010882840b162430486c03010b2a01002f010030140100000fac040100000fac040100000fac020c0032040c1218602d1afc191bffff0000000000000000000000000000000000000000003d160b080000000000000000000000000000000000000000dd090010180216f02c0000dd180050f20101000050f20401000050f20401000050f2020c00dd180050f2020101000003a4000027a4000042435e0062322f00
flags=[WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]
ssid=Noservice
"
send cmd: BSS 4
send command: BSS 4
reply: "id=4
bssid=64:d9:54:8d:ab:7b
freq=2412
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-77
tsf=0000025011218790
age=10
ie=0015e4b8ade585b1e4b8ade5a4aee58a9ee585ace58e85010882848b961224486c0301012a010432040c18306030140100000fac040100000fac040100000fac020000dd180050f2020101000003a4000027a4000042435e0062322f00dd07000c43060000002d1a6e0102ff000000000000000000000000000000000e00000000003d16010500000000000000000000000000000000000000003e0100dd1e00904c336e0102ff000000000000000000000000000000000e0000000000dd1a00904c3401050000000000000000000000000000000000000000
flags=[WPA2-PSK-CCMP][ESS]
ssid=\xe4\xb8\xad\xe5\x85\xb1\xe4\xb8\xad\xe5\xa4\xae\xe5\x8a\x9e\xe5\x85\xac\xe5\x8e\x85
"
send cmd: BSS 5
send command: BSS 5
reply: "id=5
bssid=00:36:76:64:01:f6
freq=2462
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-71
tsf=0000021874390183
age=0
ie=0006e8b9ade8b9ad010882848b961224486c03010b32040c183060dd180050f20101000050f20401000050f20401000050f202000030140100000fac040100000fac040100000fac020000dd180050f2020101000003a4000027a4000042435e0062322f000504000100002a0104dd07000c43060000002d1a6e0102ff000000000000000000000000000000000e00000000003d160b070000000000000000000000000000000000000000dd1e00904c336e0102ff000000000000000000000000000000000e0000000000dd1a00904c340b070000000000000000000000000000000000000000
flags=[WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]
ssid=\xe8\xb9\xad\xe8\xb9\xad
"
send cmd: BSS 6
send command: BSS 6
reply: "id=6
bssid=24:05:0f:2d:eb:19
freq=2437
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-80
tsf=0000025712915070
age=10
ie=0012efbc88e69caae79fa5e4bfa1e58fb7efbc89010882848b961224486c03010632040c183060dd180050f20101000050f20401000050f20401000050f202000030140100000fac040100000fac040100000fac020000dd180050f2020101000003a4000027a4000042435e0062322f000504000100002a0104dd07000c43060000002d1a6e0102ff000000000000000000000000000000000e00000000003d1606050000000000000000000000000000000000000000dd1e00904c336e0102ff000000000000000000000000000000000e0000000000dd1a00904c3406050000000000000000000000000000000000000000
flags=[WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]
ssid=\xef\xbc\x88\xe6\x9c\xaa\xe7\x9f\xa5\xe4\xbf\xa1\xe5\x8f\xb7\xef\xbc\x89
"
send cmd: BSS 7
send command: BSS 7
reply: "id=7
bssid=00:b0:c6:02:f1:b0
freq=2437
beacon_int=100
capabilities=0x0001
qual=0
noise=0
level=-17
tsf=0063487048382800
age=0
ie=000649502d434f4d010882848b961224486c0301062a010432040c1830602d1aee1117ffff0000010000000000000000000000000c00000000003d16060000000000000000000000000000000000000000003e0100dd180050f2020101000003a4000027a4000042435e0062322f000b05000011127a7f0101dd07000c43040000000706434e20010d10dd1e00904c33ee1117ffff0000010000000000000000000000000c0000000000dd1a00904c3406000000000000000000000000000000000000000000
flags=[ESS]
ssid=IP-COM
"
send cmd: BSS 8
send command: BSS 8
reply: "id=8
bssid=00:36:76:4b:26:de
freq=2437
beacon_int=100
capabilities=0x0431
qual=0
noise=0
level=-76
tsf=0000008500309991
age=0
ie=00026d6f010882848b961224486c03010632040c183060dd180050f20101000050f20401000050f20401000050f202000030140100000fac040100000fac040100000fac020000dd180050f2020101000003a4000027a4000042435e0062322f000504000100002a0104dd07000c43060000002d1a6e0102ff000000000000000000000000000000000e00000000003d1606050000000000000000000000000000000000000000dd1e00904c336e0102ff000000000000000000000000000000000e0000000000dd1a00904c3406050000000000000000000000000000000000000000
flags=[WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]
ssid=mo
"
send cmd: BSS 9
send command: BSS 9
send command: REASSOCIATE
send command: STATUS
send command: STATUS
send command: DISCONNECT
send command: DISCONNECT

2、下面是wpa_supplicant daemon server输出的信息。

yantai:/home/shell.albert # wpa_supplicant  -i wlp5s0 -c /etc/wpa_supplicant/wpa_supplicant.conf  
Successfully initialized wpa_supplicant
wlp5s0: CTRL-EVENT-SCAN-STARTED
wlp5s0: CTRL-EVENT-SCAN-STARTED
wlp5s0: SME: Trying to authenticate with ec:26:ca:62:2e:94 (SSID='dyzdb' freq=2412 MHz)
wlp5s0: Trying to associate with ec:26:ca:62:2e:94 (SSID='dyzdb' freq=2412 MHz)
wlp5s0: Associated with ec:26:ca:62:2e:94
wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=CN
wlp5s0: WPA: Key negotiation completed with ec:26:ca:62:2e:94 [PTK=CCMP GTK=CCMP]
wlp5s0: CTRL-EVENT-CONNECTED - Connection to ec:26:ca:62:2e:94 completed [id=0 id_str=]
wlp5s0: SME: Trying to authenticate with ec:26:ca:62:2e:94 (SSID='dyzdb' freq=2412 MHz)
wlp5s0: Trying to associate with ec:26:ca:62:2e:94 (SSID='dyzdb' freq=2412 MHz)
wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=DRIVER type=WORLD
wlp5s0: Associated with ec:26:ca:62:2e:94
wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=CN
wlp5s0: WPA: Key negotiation completed with ec:26:ca:62:2e:94 [PTK=CCMP GTK=CCMP]
wlp5s0: CTRL-EVENT-CONNECTED - Connection to ec:26:ca:62:2e:94 completed [id=0 id_str=]
wlp5s0: WPA: Group rekeying completed with ec:26:ca:62:2e:94 [GTK=CCMP]
wlp5s0: CTRL-EVENT-DISCONNECTED bssid=ec:26:ca:62:2e:94 reason=3 locally_generated=1
wlp5s0: CTRL-EVENT-REGDOM-CHANGE init=DRIVER type=WORLD

3、好像这样还不行,这样只是连接上了,还没有配置ip地址。使用dhcp分配一下。

dhclient wlp5s0

再ping就能ping通了。

by zhangshaoyan at May 20,2015.



这篇关于wpa_supplicant daemon server GUI test message的文章就介绍到这儿,希望我们推荐的文章对编程师们有所帮助!



http://www.chinasem.cn/article/429164

相关文章

python连接本地SQL server详细图文教程

《python连接本地SQLserver详细图文教程》在数据分析领域,经常需要从数据库中获取数据进行分析和处理,下面:本文主要介绍python连接本地SQLserver的相关资料,文中通过代码... 目录一.设置本地账号1.新建用户2.开启双重验证3,开启TCP/IP本地服务二js.python连接实例1.

mysql出现ERROR 2003 (HY000): Can‘t connect to MySQL server on ‘localhost‘ (10061)的解决方法

《mysql出现ERROR2003(HY000):Can‘tconnecttoMySQLserveron‘localhost‘(10061)的解决方法》本文主要介绍了mysql出现... 目录前言:第一步:第二步:第三步:总结:前言:当你想通过命令窗口想打开mysql时候发现提http://www.cpp

Python GUI框架中的PyQt详解

《PythonGUI框架中的PyQt详解》PyQt是Python语言中最强大且广泛应用的GUI框架之一,基于Qt库的Python绑定实现,本文将深入解析PyQt的核心模块,并通过代码示例展示其应用场... 目录一、PyQt核心模块概览二、核心模块详解与示例1. QtCore - 核心基础模块2. QtWid

SQL Server清除日志文件ERRORLOG和删除tempdb.mdf

《SQLServer清除日志文件ERRORLOG和删除tempdb.mdf》数据库再使用一段时间后,日志文件会增大,特别是在磁盘容量不足的情况下,更是需要缩减,以下为缩减方法:如果可以停止SQLSe... 目录缩减 ERRORLOG 文件(停止服务后)停止 SQL Server 服务:找到错误日志文件:删除

Windows Server服务器上配置FileZilla后,FTP连接不上?

《WindowsServer服务器上配置FileZilla后,FTP连接不上?》WindowsServer服务器上配置FileZilla后,FTP连接错误和操作超时的问题,应该如何解决?首先,通过... 目录在Windohttp://www.chinasem.cnws防火墙开启的情况下,遇到的错误如下:无法与

一文详解SQL Server如何跟踪自动统计信息更新

《一文详解SQLServer如何跟踪自动统计信息更新》SQLServer数据库中,我们都清楚统计信息对于优化器来说非常重要,所以本文就来和大家简单聊一聊SQLServer如何跟踪自动统计信息更新吧... SQL Server数据库中,我们都清楚统计信息对于优化器来说非常重要。一般情况下,我们会开启"自动更新

JAVA虚拟机中 -D, -X, -XX ,-server参数使用

《JAVA虚拟机中-D,-X,-XX,-server参数使用》本文主要介绍了JAVA虚拟机中-D,-X,-XX,-server参数使用,文中通过示例代码介绍的非常详细,对大家的学习或者工作具有... 目录一、-D参数二、-X参数三、-XX参数总结:在Java开发过程中,对Java虚拟机(JVM)的启动参数进

Windows server服务器使用blat命令行发送邮件

《Windowsserver服务器使用blat命令行发送邮件》在linux平台的命令行下可以使用mail命令来发送邮件,windows平台没有内置的命令,但可以使用开源的blat,其官方主页为ht... 目录下载blatBAT命令行示例备注总结在linux平台的命令行下可以使用mail命令来发送邮件,Win

MySQL 中的服务器配置和状态详解(MySQL Server Configuration and Status)

《MySQL中的服务器配置和状态详解(MySQLServerConfigurationandStatus)》MySQL服务器配置和状态设置包括服务器选项、系统变量和状态变量三个方面,可以通过... 目录mysql 之服务器配置和状态1 MySQL 架构和性能优化1.1 服务器配置和状态1.1.1 服务器选项

查询SQL Server数据库服务器IP地址的多种有效方法

《查询SQLServer数据库服务器IP地址的多种有效方法》作为数据库管理员或开发人员,了解如何查询SQLServer数据库服务器的IP地址是一项重要技能,本文将介绍几种简单而有效的方法,帮助你轻松... 目录使用T-SQL查询方法1:使用系统函数方法2:使用系统视图使用SQL Server Configu