Updated: October 28, 2024 |
GET_CAPABILITY eap AKA FAST GTC LEAP MD5 MSCHAPV2 OTP PAX PEAP PSK SIM TLS TTLS GET_CAPABILITY pairwise CCMP TKIP NONE GET_CAPABILITY pairwise strict GET_CAPABILITY group CCMP TKIP WEP104 WEP40 GET_CAPABILITY key_mgmt WPA-PSK WPA-EAP IEEE8021X NONE GET_CAPABILITY proto RSN WPA GET_CAPABILITY auth_alg OPEN SHARED LEAP
If you don't issue this command, the default debug level is SLOG2_NOTICE.
dot11RSNAOptionImplemented=TRUE dot11RSNAPreauthenticationImplemented=TRUE ... dot1xSuppPaeState=5 dot1xSuppHeldPeriod=60 ...
Index / AA / PMKID / expiration (in seconds) / opportunistic 1 / 02:00:01:02:03:04 / 000102030405060708090a0b0c0d0e0f / 41362 / 0 2 / 02:00:01:33:55:77 / 928389281928383b34afb34ba4212345 / 362 / 1
bssid=02:00:01:02:03:04 ssid=test network pairwise_cipher=CCMP group_cipher=CCMP key_mgmt=WPA-PSK wpa_state=COMPLETED ip_address=192.168.1.21 Supplicant PAE state=AUTHENTICATED suppPortStatus=Authorized EAP state=SUCCESS
... suppPortStatus=Authorized heldPeriod=60 authPeriod=30 startPeriod=30 maxStart=3 portControl=Auto Supplicant Backend state=IDLE EAP state=SUCCESS
bssid=00:09:5b:95:e0:4e freq=2412 beacon_int=0 capabilities=0x0011 qual=51 noise=161 level=212 tsf=0000000000000000 ie=000b6a6b6d2070726976617465010180dd180050f20101000050f20401000050f20401000050f2020000 ssid=jkm private
wlan0 eth0
network id / ssid / bssid / flags 0 example network any [CURRENT]Note that the fields are separated with tabs.
bssid / frequency / signal level / flags / ssid 00:09:5b:95:e0:4e 2412 208 [WPA-PSK-CCMP] jkm private 02:55:24:33:77:a3 2462 187 [WPA-PSK-TKIP] testing 00:09:5b:95:e0:4f 2412 209 jkm guestNote that the fields are separated with tabs.
If you don't specify type, you can set freq to make the initial scan use only the specified channel (with the given frequency in MHz), after which only social channels are scanned.
p2p_find 5 dev_id=11:22:33:44:55:66 seek=alt.example.chat seek=alt.example.video
When you specify pin or a PIN value, you must follow this parameter with either display, to use a dynamically generated random PIN, or keypad, to use a PIN entered from the peer's display. These parameters can't be set with any other WPS provisioning method.
The persistent parameter can be used without a value to request to form a persistent group. Or, a network ID can be used as the value, to pre-populate an SSID/passphrase configuration based on a previously used group where this device was the Group Owner (GO). This group's parameters will be used if the local end becomes the GO in GO Negotiation.
You can use the join parameter to request to join an existing group as a client—this skips the GO Negotiation and sends a Provision Discovery Request to the target GO before associating for WPS provisioning. Alternatively, you can use auth to indicate that the WPS parameters are authorized for the peer device without starting GO Negotiation (i.e., the peer is expected to start negotiation). This is mainly for testing purposes.
The go_intent parameter overrides the default GO Intent value for this negotiation. The value range is 0 through 15, with 15 forcing the local end to become the GO.
The optional persistent parameter can be specified without a value, to request that the group be persistent. A network ID can be used as the parameter value, to request the restart of a specific presistent group. The optional freq parameter lets the caller force the GO to be started on a specific frequency. Special settings of freq=2 or freq=5 request the best 2.4 GHz or 5 GHz band channel to be selected automatically.
The optional join parameter can be used to request that a running GO prepare for a new client. This is mainly used with display to make it display a PIN. Alternatively, auto can be used to request wpa_supplicant to automatically determine whether the peer device is operating as a GO and if so, use join-a-group PD instead of GO Negotiation PD.
If the P2P module is not idle when the Extended Listen Timing timeout occurs, the Listen State is skipped.
The optional go_dev_addr parameter can be used to override the GO device address for the Invitation Request if it's unknown for some reason (usually, this isn't needed). When reinvoking a persistent group, the GO device can specify the group's frequency with the freq parameter (in MHz). Meanwhile, the P2P client device can use freq to force a specific operating channel (or invitation failure if GO rejects that), or pref to request a specific channel (while allowing GO to select another channel if needed).
This command returns an identifier for the pending query (e.g., 1f77628) that can be used to cancel the request. Directed requests are removed when the peer replies to them.
This command is used only if an external program is used to process the request.
When the WPA supplicant needs certain information to perform authentication, it sends an event message to the monitor program. For a list of data fields that the service can request, see the WPA_CTRL_REQ event description.
The program can provide the requested field by constructing a command using the WPA_CTRL_RSP macro. This macro provides an alias for the CTRL-RSP- message prefix, and can be used in, say, an snprintf() statement to construct the command. The command must contain the prefix followed by the field name, network ID, and field value.
int send_password(struct wpa_ctrl *ctrl, int netID, char *password) { char cmd[256], reply[256]; snprintf(cmd, sizeof(cmd), WPA_CTRL_RSP "PASSWORD-%s:%s", netID, password); wpa_ctrl_request(ctrl, cmd, strlen(cmd), reply, sizeof(reply), NULL); /* Code to process the response and exit the function goes here */ }
The actual command that gets sent is then: CTRL-RSP-PASSWORD-netID-password