wpa_cli
来源:互联网 发布:天刀成女脸型数据 编辑:程序博客网 时间:2024/04/30 04:36
~ # wpa_cli -vwpa_cli v2.4Copyright (c) 2004-2015, Jouni Malinen <j@w1.fi> and contributors~ # ~ # wpa_cli -hwpa_cli [-p<path to ctrl sockets>] [-i<ifname>] [-hvB] [-a<action file>] \ [-P<pid file>] [-g<global ctrl>] [-G<ping interval>] [command..] -h = help (show this usage text) -v = shown version information -a = run in daemon mode executing the action file based on events from wpa_supplicant -B = run a daemon in the background default path: /var/run/wpa_supplicant default interface: first interface found in socket pathcommands: status [verbose] = get current WPA/EAPOL/EAP status ifname = get current interface name ping = pings wpa_supplicant relog = re-open log-file (allow rolling logs) note <text> = add a note to wpa_supplicant debug log mib = get MIB variables (dot1x, dot11) help [command] = show usage help interface [ifname] = show interfaces/select interface level <debug level> = change debug level license = show full wpa_cli license quit = exit wpa_cli set = set variables (shows list of variables when run without arguments) dump = dump config variables get <name> = get information logon = IEEE 802.1X EAPOL state machine logon logoff = IEEE 802.1X EAPOL state machine logoff pmksa = show PMKSA cache pmksa_flush = flush PMKSA cache entries reassociate = force reassociation reattach = force reassociation back to the same BSS preauthenticate <BSSID> = force preauthentication identity <network id> <identity> = configure identity for an SSID password <network id> <password> = configure password for an SSID new_password <network id> <password> = change password for an SSID pin <network id> <pin> = configure pin for an SSID otp <network id> <password> = configure one-time-password for an SSID passphrase <network id> <passphrase> = configure private key passphrase for an SSID sim <network id> <pin> = report SIM operation result bssid <network id> <BSSID> = set preferred BSSID for an SSID blacklist <BSSID> = add a BSSID to the blacklist blacklist clear = clear the blacklist blacklist = display the blacklist log_level <level> [<timestamp>] = update the log level/timestamp log_level = display the current log level and log options list_networks = list configured networks select_network <network id> = select a network (disable others) enable_network <network id> = enable a network disable_network <network id> = disable a network add_network = add a network remove_network <network id> = remove a network set_network <network id> <variable> <value> = set network variables (shows list of variables when run without arguments) get_network <network id> <variable> = get network variables dup_network <src network id> <dst network id> <variable> = duplicate network variables list_creds = list configured credentials add_cred = add a credential remove_cred <cred id> = remove a credential set_cred <cred id> <variable> <value> = set credential variables get_cred <cred id> <variable> = get credential variables save_config = save the current configuration disconnect = disconnect and wait for reassociate/reconnect command before connecting reconnect = like reassociate, but only takes effect if already disconnected scan = request new BSS scan scan_results = get latest scan results bss <<idx> | <bssid>> = get detailed scan result info get_capability <eap/pairwise/group/key_mgmt/proto/auth_alg/channels/freq/modes> = get capabilies reconfigure = force wpa_supplicant to re-read its configuration file terminate = terminate wpa_supplicant interface_add <ifname> <confname> <driver> <ctrl_interface> <driver_param> <bridge_name> = adds new interface, all parameters but <ifname> are optional interface_remove <ifname> = removes the interface interface_list = list available interfaces ap_scan <value> = set ap_scan parameter scan_interval <value> = set scan_interval parameter (in seconds) bss_expire_age <value> = set BSS expiration age parameter bss_expire_count <value> = set BSS expiration scan count parameter bss_flush <value> = set BSS flush age (0 by default) stkstart <addr> = request STK negotiation with <addr> ft_ds <addr> = request over-the-DS FT with <addr> wps_pbc [BSSID] = start Wi-Fi Protected Setup: Push Button Configuration wps_pin <BSSID> [PIN] = start WPS PIN method (returns PIN, if not hardcoded) wps_check_pin <PIN> = verify PIN checksum wps_cancel Cancels the pending WPS operation wps_nfc [BSSID] = start Wi-Fi Protected Setup: NFC wps_nfc_config_token <WPS|NDEF> = build configuration token wps_nfc_token <WPS|NDEF> = create password token wps_nfc_tag_read <hexdump of payload> = report read NFC tag with WPS data nfc_get_handover_req <NDEF> <WPS> = create NFC handover request nfc_get_handover_sel <NDEF> <WPS> = create NFC handover select nfc_report_handover <role> <type> <hexdump of req> <hexdump of sel> = report completed NFC handover wps_reg <BSSID> <AP PIN> = start WPS Registrar to configure an AP wps_ap_pin [params..] = enable/disable AP PIN wps_er_start [IP address] = start Wi-Fi Protected Setup External Registrar wps_er_stop = stop Wi-Fi Protected Setup External Registrar wps_er_pin <UUID> <PIN> = add an Enrollee PIN to External Registrar wps_er_pbc <UUID> = accept an Enrollee PBC using External Registrar wps_er_learn <UUID> <PIN> = learn AP configuration wps_er_set_config <UUID> <network id> = set AP configuration for enrolling wps_er_config <UUID> <PIN> <SSID> <auth> <encr> <key> = configure AP wps_er_nfc_config_token <WPS/NDEF> <UUID> = build NFC configuration token ibss_rsn <addr> = request RSN authentication with <addr> in IBSS sta <addr> = get information about an associated station (AP) all_sta = get information about all associated stations (AP) deauthenticate <addr> = deauthenticate a station disassociate <addr> = disassociate a station chan_switch <cs_count> <freq> [sec_channel_offset=] [center_freq1=] [center_freq2=] [bandwidth=] [blocktx] [ht|vht] = CSA parameters suspend = notification of suspend/hibernate resume = notification of resume/thaw roam <addr> = roam to the specified BSS p2p_find [timeout] [type=*] = find P2P Devices for up-to timeout seconds p2p_stop_find = stop P2P Devices search p2p_asp_provision <addr> adv_id=<adv_id> conncap=<conncap> [info=<infodata>] = provision with a P2P ASP Device p2p_asp_provision_resp <addr> adv_id=<adv_id> [role<conncap>] [info=<infodata>] = provision with a P2P ASP Device p2p_connect <addr> <"pbc"|PIN> [ht40] = connect to a P2P Device p2p_listen [timeout] = listen for P2P Devices for up-to timeout seconds p2p_group_remove <ifname> = remove P2P group interface (terminate group if GO) p2p_group_add [ht40] = add a new P2P group (local end as GO) p2p_prov_disc <addr> <method> = request provisioning discovery p2p_get_passphrase = get the passphrase for a group (GO only) p2p_serv_disc_req <addr> <TLVs> = schedule service discovery request p2p_serv_disc_cancel_req <id> = cancel pending service discovery request p2p_serv_disc_resp <freq> <addr> <dialog token> <TLVs> = service discovery response p2p_service_update = indicate change in local services p2p_serv_disc_external <external> = set external processing of service discovery p2p_service_flush = remove all stored service entries p2p_service_add <bonjour|upnp|asp> <query|version> <response|service> = add a local service p2p_service_rep asp <auto> <adv_id> <svc_state> <svc_string> [<svc_info>] = replace local ASP service p2p_service_del <bonjour|upnp> <query|version> [|service] = remove a local service p2p_reject <addr> = reject connection attempts from a specific peer p2p_invite <cmd> [peer=addr] = invite peer p2p_peers [discovered] = list known (optionally, only fully discovered) P2P peers p2p_peer <address> = show information about known P2P peer p2p_set <field> <value> = set a P2P parameter p2p_flush = flush P2P state p2p_cancel = cancel P2P group formation p2p_unauthorize <address> = unauthorize a peer p2p_presence_req [<duration> <interval>] [<duration> <interval>] = request GO presence p2p_ext_listen [<period> <interval>] = set extended listen timing p2p_remove_client <address|iface=address> = remove a peer from all groups wfd_subelem_set <subelem> [contents] = set Wi-Fi Display subelement wfd_subelem_get <subelem> = get Wi-Fi Display subelement fetch_anqp = fetch ANQP information for all APs stop_fetch_anqp = stop fetch_anqp operation interworking_select [auto] = perform Interworking network selection interworking_connect <BSSID> = connect using Interworking credentials interworking_add_network <BSSID> = connect using Interworking credentials anqp_get <addr> <info id>[,<info id>]... = request ANQP information gas_request <addr> <AdvProtoID> [QueryReq] = GAS request gas_response_get <addr> <dialog token> [start,len] = Fetch last GAS response hs20_anqp_get <addr> <subtype>[,<subtype>]... = request HS 2.0 ANQP information nai_home_realm_list <addr> <home realm> = get HS20 nai home realm list hs20_icon_request <addr> <icon name> = get Hotspot 2.0 OSU icon fetch_osu = fetch OSU provider information from all APs cancel_fetch_osu = cancel fetch_osu command sta_autoconnect <0/1> = disable/enable automatic reconnection tdls_discover <addr> = request TDLS discovery with <addr> tdls_setup <addr> = request TDLS setup with <addr> tdls_teardown <addr> = tear down TDLS with <addr> wmm_ac_addts <uplink/downlink/bidi> <tsid=0..7> <up=0..7> [nominal_msdu_size=#] [mean_data_rate=#] [min_phy_rate=#] [sba=#] [fixed_nominal_msdu] = add WMM-AC traffic stream wmm_ac_delts <tsid> = delete WMM-AC traffic stream wmm_ac_status = show status for Wireless Multi-Media Admission-Control tdls_chan_switch <addr> <oper class> <freq> [sec_channel_offset=] [center_freq1=] [center_freq2=] [bandwidth=] [ht|vht] = enable channel switching with TDLS peer tdls_cancel_chan_switch <addr> = disable channel switching with TDLS peer <addr> signal_poll = get signal parameters pktcnt_poll = get TX/RX packet counters reauthenticate = trigger IEEE 802.1X/EAPOL reauthentication raw <params..> = Sent unprocessed command flush = flush wpa_supplicant state driver <command> = driver private commands radio_work = radio_work <show/add/done> vendor <vendor id> <command id> [<hex formatted command argument>] = Send vendor command neighbor_rep_request [ssid=<SSID>] = Trigger request to AP for neighboring AP report (with optional given SSID, default: current SSID) erp_flush = flush ERP keys mac_rand_scan <scan|sched|pno|all> enable=<0/1> [addr=mac-address mask=mac-address-mask] = scan MAC randomization p2p_ago_enable ch=<ch> [ht40] [vht] = start an anonymous p2p group (local end as GO) p2p_ago_disable = stop an anonymous p2p group~ #
~ # wpa_cli dumpSelected interface 'p2p0'ctrl_interface=/var/run/wpa_supplicantctrl_interface_group=nulleapol_version=1ap_scan=1disable_scan_offload=0fast_reauth=1opensc_engine_path=nullpkcs11_engine_path=nullpkcs11_module_path=nullopenssl_ciphers=nullpcsc_reader=nullpcsc_pin=nullexternal_sim=0driver_param=nulldot11RSNAConfigPMKLifetime=0dot11RSNAConfigPMKReauthThreshold=0dot11RSNAConfigSATimeout=0update_config=1device_name=AAAmanufacturer=BBBmodel_name=CCCmodel_number=0.0.0.1serial_number=1234567config_methods=virtual_push_button physical_displaywps_cred_processing=0p2p_listen_reg_class=0p2p_listen_channel=0p2p_oper_reg_class=0p2p_oper_channel=11p2p_go_intent=1p2p_ssid_postfix=1195linuxpersistent_reconnect=1p2p_intra_bss=1p2p_group_idle=0p2p_passphrase_len=0p2p_add_cli_chan=0p2p_optimize_listen_chan=0p2p_go_ht40=0p2p_go_vht=0p2p_disabled=0p2p_go_ctwindow=0p2p_no_group_iface=1p2p_ignore_shared_freq=0bss_max_count=200bss_expiration_age=180bss_expiration_scan_count=2filter_ssids=0filter_rssi=0max_num_sta=128disassoc_low_ack=0hs20=0interworking=0access_network_type=15pbc_in_m1=0autoscan=nullwps_nfc_dev_pw_id=0ext_password_backend=nullp2p_go_max_inactivity=300auto_interworking=0okc=0pmf=0dtim_period=0beacon_int=0ignore_old_scan_res=0scan_cur_freq=0sched_scan_interval=0tdls_external_control=0osu_dir=nullwowlan_triggers=nullp2p_search_delay=500mac_addr=0rand_addr_lifetime=60preassoc_mac_addr=0key_mgmt_offload=1passive_scan=0reassoc_same_bss_optim=0p2p_go_ssid=DIRECT-xyfeb7d1p2p_go_passphrase=12345678enforce_pin=0static_pin=12345670~ #
~ # wpa_cli p2p_peer 0c:8b:fd:e5:1b:50Selected interface 'p2p0'0c:8b:fd:e5:1b:50pri_dev_type=1-0050F200-0device_name=DESKTOP-5VBHCUAmanufacturer=model_name=model_number=serial_number=config_methods=0x11e8dev_capab=0x24group_capab=0x82level=0persistent=1age=45listen_freq=2462wps_method=not-readyinterface_addr=00:00:00:00:00:00member_in_go_dev=00:00:00:00:00:00member_in_go_iface=00:00:00:00:00:00go_neg_req_sent=0go_state=remotedialog_token=7intended_addr=0e:8b:fd:e5:1b:50country=XXoper_freq=2412req_config_methods=0x0flags=[REPORTED][PREFER_PERSISTENT_GROUP]status=0invitation_reqs=0ext_listen_period=336ext_listen_interval=486wfd_subelems=00000601101c440006~ #
P2P-DEVICE-FOUND 12:9f:a9:fe:fd:39 p2p_dev_addr=12:9f:a9:fe:fd:39 pri_dev_type=7-0050F204-1 name='SBMC FEFD39' config_methods=0x88 dev_capab=0x21 group_capab=0x0 wfd_dev_info=0x0111216a0032 new=1
P2P-DEVICE-FOUND 12:9f:a9:fe:fd:39 p2p_dev_addr=12:9f:a9:fe:fd:39 pri_dev_type=7-0050F204-1 name='SBMC FEFD39' config_methods=0x88 dev_capab=0x21 group_capab=0x2a wfd_dev_info=0x0111216a0032 new=1
P2P-PROV-DISC-PBC-REQ 12:9f:a9:fe:fd:39 p2p_dev_addr=12:9f:a9:fe:fd:39 pri_dev_type=7-0050F204-1 name='SBMC FEFD39' config_methods=0x88 dev_capab=0x21 group_capab=0x0
P2PS-PROV-DONE 12:9f:a9:fe:fd:39 status=0 conncap=1 adv_id=4d6fc8 adv_mac=12:9f:a9:fe:b7:d1 session=12ab34 mac=12:9f:a9:fe:b7:d1 dev_passwd_id=1
P2P-PROV-DISC-SHOW-PIN 12:9f:a9:fe:fd:39 12345670 p2p_dev_addr=12:9f:a9:fe:fd:39 pri_dev_type=7-0050F204-1 name='SBMC FEFD39' config_methods=0x88 dev_capab=0x21 group_capab=0x2a
- wpa_cli
- wpa_cli 使用
- wpa_cli用法
- wpa_supplicant & wpa_cli
- wpa_supplicant/wpa_cli
- [转]Wpa_cli usage manual
- 用wpa_cli 连接无线网络
- 用wpa_cli 连接无线网络
- wpa_cli 连接 wifi
- 运用wpa_cli连接wifi
- wpa_supplicant, wpa_cli用法
- Wpa_cli usage manual
- wpa_cli取命令函数
- 用wpa_cli 连接无线网络
- wpa_cli软件初始化图
- wpa_supplicant, wpa_cli用法
- wpa_supplicant, wpa_cli用法
- wpa_supplicant, wpa_cli用法 .
- Web app和native app之争_20151215
- HDOJ 1272 小希的迷宫
- linux 问题处理
- 命令行自动提升管理员权限
- HDOJ 1856 More is better
- wpa_cli
- Stream、Reader说明;Stream与String互转
- Hive内置数据类型
- volatile
- HDOJ 1213 How Many Tables
- 最近5年133个Java面试问题列表
- SQL Server 存储过程
- 构建Unity3D信号槽机制 【ZObject.cs】
- Mac OS X 10.10 启用 Web 服务器