wpa_cli

来源:互联网 发布:天刀成女脸型数据 编辑:程序博客网 时间:2024/04/30 04:36

~ # wpa_cli -vwpa_cli v2.4Copyright (c) 2004-2015, Jouni Malinen <j@w1.fi> and contributors~ # ~ # wpa_cli -hwpa_cli [-p<path to ctrl sockets>] [-i<ifname>] [-hvB] [-a<action file>] \        [-P<pid file>] [-g<global ctrl>] [-G<ping interval>]  [command..]  -h = help (show this usage text)  -v = shown version information  -a = run in daemon mode executing the action file based on events from       wpa_supplicant  -B = run a daemon in the background  default path: /var/run/wpa_supplicant  default interface: first interface found in socket pathcommands:  status [verbose] = get current WPA/EAPOL/EAP status  ifname = get current interface name  ping = pings wpa_supplicant  relog = re-open log-file (allow rolling logs)  note <text> = add a note to wpa_supplicant debug log  mib = get MIB variables (dot1x, dot11)  help [command] = show usage help  interface [ifname] = show interfaces/select interface  level <debug level> = change debug level  license = show full wpa_cli license  quit = exit wpa_cli  set = set variables (shows list of variables when run without arguments)  dump = dump config variables  get <name> = get information  logon = IEEE 802.1X EAPOL state machine logon  logoff = IEEE 802.1X EAPOL state machine logoff  pmksa = show PMKSA cache  pmksa_flush = flush PMKSA cache entries  reassociate = force reassociation  reattach = force reassociation back to the same BSS  preauthenticate <BSSID> = force preauthentication  identity <network id> <identity> = configure identity for an SSID  password <network id> <password> = configure password for an SSID  new_password <network id> <password> = change password for an SSID  pin <network id> <pin> = configure pin for an SSID  otp <network id> <password> = configure one-time-password for an SSID  passphrase <network id> <passphrase> = configure private key passphrase    for an SSID  sim <network id> <pin> = report SIM operation result  bssid <network id> <BSSID> = set preferred BSSID for an SSID  blacklist <BSSID> = add a BSSID to the blacklist  blacklist clear = clear the blacklist  blacklist = display the blacklist  log_level <level> [<timestamp>] = update the log level/timestamp  log_level = display the current log level and log options  list_networks = list configured networks  select_network <network id> = select a network (disable others)  enable_network <network id> = enable a network  disable_network <network id> = disable a network  add_network = add a network  remove_network <network id> = remove a network  set_network <network id> <variable> <value> = set network variables (shows    list of variables when run without arguments)  get_network <network id> <variable> = get network variables  dup_network <src network id> <dst network id> <variable> = duplicate network variables  list_creds = list configured credentials  add_cred = add a credential  remove_cred <cred id> = remove a credential  set_cred <cred id> <variable> <value> = set credential variables  get_cred <cred id> <variable> = get credential variables  save_config = save the current configuration  disconnect = disconnect and wait for reassociate/reconnect command before    connecting  reconnect = like reassociate, but only takes effect if already disconnected  scan = request new BSS scan  scan_results = get latest scan results  bss <<idx> | <bssid>> = get detailed scan result info  get_capability <eap/pairwise/group/key_mgmt/proto/auth_alg/channels/freq/modes> = get capabilies  reconfigure = force wpa_supplicant to re-read its configuration file  terminate = terminate wpa_supplicant  interface_add <ifname> <confname> <driver> <ctrl_interface> <driver_param>    <bridge_name> = adds new interface, all parameters but <ifname>    are optional  interface_remove <ifname> = removes the interface  interface_list = list available interfaces  ap_scan <value> = set ap_scan parameter  scan_interval <value> = set scan_interval parameter (in seconds)  bss_expire_age <value> = set BSS expiration age parameter  bss_expire_count <value> = set BSS expiration scan count parameter  bss_flush <value> = set BSS flush age (0 by default)  stkstart <addr> = request STK negotiation with <addr>  ft_ds <addr> = request over-the-DS FT with <addr>  wps_pbc [BSSID] = start Wi-Fi Protected Setup: Push Button Configuration  wps_pin <BSSID> [PIN] = start WPS PIN method (returns PIN, if not hardcoded)  wps_check_pin <PIN> = verify PIN checksum  wps_cancel Cancels the pending WPS operation  wps_nfc [BSSID] = start Wi-Fi Protected Setup: NFC  wps_nfc_config_token <WPS|NDEF> = build configuration token  wps_nfc_token <WPS|NDEF> = create password token  wps_nfc_tag_read <hexdump of payload> = report read NFC tag with WPS data  nfc_get_handover_req <NDEF> <WPS> = create NFC handover request  nfc_get_handover_sel <NDEF> <WPS> = create NFC handover select  nfc_report_handover <role> <type> <hexdump of req> <hexdump of sel> = report completed NFC handover  wps_reg <BSSID> <AP PIN> = start WPS Registrar to configure an AP  wps_ap_pin [params..] = enable/disable AP PIN  wps_er_start [IP address] = start Wi-Fi Protected Setup External Registrar  wps_er_stop = stop Wi-Fi Protected Setup External Registrar  wps_er_pin <UUID> <PIN> = add an Enrollee PIN to External Registrar  wps_er_pbc <UUID> = accept an Enrollee PBC using External Registrar  wps_er_learn <UUID> <PIN> = learn AP configuration  wps_er_set_config <UUID> <network id> = set AP configuration for enrolling  wps_er_config <UUID> <PIN> <SSID> <auth> <encr> <key> = configure AP  wps_er_nfc_config_token <WPS/NDEF> <UUID> = build NFC configuration token  ibss_rsn <addr> = request RSN authentication with <addr> in IBSS  sta <addr> = get information about an associated station (AP)  all_sta = get information about all associated stations (AP)  deauthenticate <addr> = deauthenticate a station  disassociate <addr> = disassociate a station  chan_switch <cs_count> <freq> [sec_channel_offset=] [center_freq1=] [center_freq2=] [bandwidth=] [blocktx] [ht|vht] = CSA parameters  suspend = notification of suspend/hibernate  resume = notification of resume/thaw  roam <addr> = roam to the specified BSS  p2p_find [timeout] [type=*] = find P2P Devices for up-to timeout seconds  p2p_stop_find = stop P2P Devices search  p2p_asp_provision <addr> adv_id=<adv_id> conncap=<conncap> [info=<infodata>] = provision with a P2P ASP Device  p2p_asp_provision_resp <addr> adv_id=<adv_id> [role<conncap>] [info=<infodata>] = provision with a P2P ASP Device  p2p_connect <addr> <"pbc"|PIN> [ht40] = connect to a P2P Device  p2p_listen [timeout] = listen for P2P Devices for up-to timeout seconds  p2p_group_remove <ifname> = remove P2P group interface (terminate group if GO)  p2p_group_add [ht40] = add a new P2P group (local end as GO)  p2p_prov_disc <addr> <method> = request provisioning discovery  p2p_get_passphrase = get the passphrase for a group (GO only)  p2p_serv_disc_req <addr> <TLVs> = schedule service discovery request  p2p_serv_disc_cancel_req <id> = cancel pending service discovery request  p2p_serv_disc_resp <freq> <addr> <dialog token> <TLVs> = service discovery response  p2p_service_update = indicate change in local services  p2p_serv_disc_external <external> = set external processing of service discovery  p2p_service_flush = remove all stored service entries  p2p_service_add <bonjour|upnp|asp> <query|version> <response|service> = add a local service  p2p_service_rep asp <auto> <adv_id> <svc_state> <svc_string> [<svc_info>] = replace local ASP service  p2p_service_del <bonjour|upnp> <query|version> [|service] = remove a local service  p2p_reject <addr> = reject connection attempts from a specific peer  p2p_invite <cmd> [peer=addr] = invite peer  p2p_peers [discovered] = list known (optionally, only fully discovered) P2P peers  p2p_peer <address> = show information about known P2P peer  p2p_set <field> <value> = set a P2P parameter  p2p_flush = flush P2P state  p2p_cancel = cancel P2P group formation  p2p_unauthorize <address> = unauthorize a peer  p2p_presence_req [<duration> <interval>] [<duration> <interval>] = request GO presence  p2p_ext_listen [<period> <interval>] = set extended listen timing  p2p_remove_client <address|iface=address> = remove a peer from all groups  wfd_subelem_set <subelem> [contents] = set Wi-Fi Display subelement  wfd_subelem_get <subelem> = get Wi-Fi Display subelement  fetch_anqp = fetch ANQP information for all APs  stop_fetch_anqp = stop fetch_anqp operation  interworking_select [auto] = perform Interworking network selection  interworking_connect <BSSID> = connect using Interworking credentials  interworking_add_network <BSSID> = connect using Interworking credentials  anqp_get <addr> <info id>[,<info id>]... = request ANQP information  gas_request <addr> <AdvProtoID> [QueryReq] = GAS request  gas_response_get <addr> <dialog token> [start,len] = Fetch last GAS response  hs20_anqp_get <addr> <subtype>[,<subtype>]... = request HS 2.0 ANQP information  nai_home_realm_list <addr> <home realm> = get HS20 nai home realm list  hs20_icon_request <addr> <icon name> = get Hotspot 2.0 OSU icon  fetch_osu = fetch OSU provider information from all APs  cancel_fetch_osu = cancel fetch_osu command  sta_autoconnect <0/1> = disable/enable automatic reconnection  tdls_discover <addr> = request TDLS discovery with <addr>  tdls_setup <addr> = request TDLS setup with <addr>  tdls_teardown <addr> = tear down TDLS with <addr>  wmm_ac_addts <uplink/downlink/bidi> <tsid=0..7> <up=0..7> [nominal_msdu_size=#] [mean_data_rate=#] [min_phy_rate=#] [sba=#] [fixed_nominal_msdu] = add WMM-AC traffic stream  wmm_ac_delts <tsid> = delete WMM-AC traffic stream  wmm_ac_status = show status for Wireless Multi-Media Admission-Control  tdls_chan_switch <addr> <oper class> <freq> [sec_channel_offset=] [center_freq1=] [center_freq2=] [bandwidth=] [ht|vht] = enable channel switching with TDLS peer  tdls_cancel_chan_switch <addr> = disable channel switching with TDLS peer <addr>  signal_poll = get signal parameters  pktcnt_poll = get TX/RX packet counters  reauthenticate = trigger IEEE 802.1X/EAPOL reauthentication  raw <params..> = Sent unprocessed command  flush = flush wpa_supplicant state  driver <command> = driver private commands  radio_work = radio_work <show/add/done>  vendor <vendor id> <command id> [<hex formatted command argument>] = Send vendor command  neighbor_rep_request [ssid=<SSID>] = Trigger request to AP for neighboring AP report (with optional given SSID, default: current SSID)  erp_flush = flush ERP keys  mac_rand_scan <scan|sched|pno|all> enable=<0/1> [addr=mac-address mask=mac-address-mask] = scan MAC randomization  p2p_ago_enable ch=<ch> [ht40] [vht] = start an anonymous p2p group (local end as GO)  p2p_ago_disable = stop an anonymous p2p group~ # 

~ # wpa_cli dumpSelected interface 'p2p0'ctrl_interface=/var/run/wpa_supplicantctrl_interface_group=nulleapol_version=1ap_scan=1disable_scan_offload=0fast_reauth=1opensc_engine_path=nullpkcs11_engine_path=nullpkcs11_module_path=nullopenssl_ciphers=nullpcsc_reader=nullpcsc_pin=nullexternal_sim=0driver_param=nulldot11RSNAConfigPMKLifetime=0dot11RSNAConfigPMKReauthThreshold=0dot11RSNAConfigSATimeout=0update_config=1device_name=AAAmanufacturer=BBBmodel_name=CCCmodel_number=0.0.0.1serial_number=1234567config_methods=virtual_push_button physical_displaywps_cred_processing=0p2p_listen_reg_class=0p2p_listen_channel=0p2p_oper_reg_class=0p2p_oper_channel=11p2p_go_intent=1p2p_ssid_postfix=1195linuxpersistent_reconnect=1p2p_intra_bss=1p2p_group_idle=0p2p_passphrase_len=0p2p_add_cli_chan=0p2p_optimize_listen_chan=0p2p_go_ht40=0p2p_go_vht=0p2p_disabled=0p2p_go_ctwindow=0p2p_no_group_iface=1p2p_ignore_shared_freq=0bss_max_count=200bss_expiration_age=180bss_expiration_scan_count=2filter_ssids=0filter_rssi=0max_num_sta=128disassoc_low_ack=0hs20=0interworking=0access_network_type=15pbc_in_m1=0autoscan=nullwps_nfc_dev_pw_id=0ext_password_backend=nullp2p_go_max_inactivity=300auto_interworking=0okc=0pmf=0dtim_period=0beacon_int=0ignore_old_scan_res=0scan_cur_freq=0sched_scan_interval=0tdls_external_control=0osu_dir=nullwowlan_triggers=nullp2p_search_delay=500mac_addr=0rand_addr_lifetime=60preassoc_mac_addr=0key_mgmt_offload=1passive_scan=0reassoc_same_bss_optim=0p2p_go_ssid=DIRECT-xyfeb7d1p2p_go_passphrase=12345678enforce_pin=0static_pin=12345670~ # 


~ # wpa_cli p2p_peer 0c:8b:fd:e5:1b:50Selected interface 'p2p0'0c:8b:fd:e5:1b:50pri_dev_type=1-0050F200-0device_name=DESKTOP-5VBHCUAmanufacturer=model_name=model_number=serial_number=config_methods=0x11e8dev_capab=0x24group_capab=0x82level=0persistent=1age=45listen_freq=2462wps_method=not-readyinterface_addr=00:00:00:00:00:00member_in_go_dev=00:00:00:00:00:00member_in_go_iface=00:00:00:00:00:00go_neg_req_sent=0go_state=remotedialog_token=7intended_addr=0e:8b:fd:e5:1b:50country=XXoper_freq=2412req_config_methods=0x0flags=[REPORTED][PREFER_PERSISTENT_GROUP]status=0invitation_reqs=0ext_listen_period=336ext_listen_interval=486wfd_subelems=00000601101c440006~ # 


P2P-DEVICE-FOUND 12:9f:a9:fe:fd:39 p2p_dev_addr=12:9f:a9:fe:fd:39 pri_dev_type=7-0050F204-1 name='SBMC FEFD39' config_methods=0x88 dev_capab=0x21 group_capab=0x0 wfd_dev_info=0x0111216a0032 new=1

P2P-DEVICE-FOUND 12:9f:a9:fe:fd:39 p2p_dev_addr=12:9f:a9:fe:fd:39 pri_dev_type=7-0050F204-1 name='SBMC FEFD39' config_methods=0x88 dev_capab=0x21 group_capab=0x2a wfd_dev_info=0x0111216a0032 new=1

P2P-PROV-DISC-PBC-REQ 12:9f:a9:fe:fd:39 p2p_dev_addr=12:9f:a9:fe:fd:39 pri_dev_type=7-0050F204-1 name='SBMC FEFD39' config_methods=0x88 dev_capab=0x21 group_capab=0x0

P2PS-PROV-DONE 12:9f:a9:fe:fd:39 status=0 conncap=1 adv_id=4d6fc8 adv_mac=12:9f:a9:fe:b7:d1 session=12ab34 mac=12:9f:a9:fe:b7:d1 dev_passwd_id=1

P2P-PROV-DISC-SHOW-PIN 12:9f:a9:fe:fd:39 12345670 p2p_dev_addr=12:9f:a9:fe:fd:39 pri_dev_type=7-0050F204-1 name='SBMC FEFD39' config_methods=0x88 dev_capab=0x21 group_capab=0x2a



0 0
原创粉丝点击