Advertisement
Guest User

/etc/wpa_supplicant/wpa_supplicant.conf

a guest
Aug 4th, 2014
387
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 18.42 KB | None | 0 0
  1. wpa_supplicant v2.0
  2. random: Trying to read entropy from /dev/random
  3. Successfully initialized wpa_supplicant
  4. Initializing interface 'wifi1' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
  5. Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
  6. Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
  7. ctrl_interface='/var/run/wpa_supplicant'
  8. ctrl_interface_group='wheel'
  9. update_config=1
  10. Priority group 0
  11. id=0 ssid='LJRWireless'
  12. rfkill: initial event: idx=0 type=2 op=0 soft=0 hard=0
  13. rfkill: initial event: idx=1 type=1 op=0 soft=1 hard=0
  14. rfkill: WLAN soft blocked
  15. SIOCGIWRANGE: WE(compiled)=22 WE(source)=19 enc_capa=0xf
  16. capabilities: key_mgmt 0xf enc 0x1f flags 0x0
  17. netlink: Operstate: linkmode=1, operstate=5
  18. wifi1: Own MAC address: c4:04:15:3c:d8:f2
  19. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  20. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  21. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  22. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  23. wpa_driver_wext_set_countermeasures
  24. wifi1: RSN: flushing PMKID list in the driver
  25. wifi1: Setting scan request: 0 sec 100000 usec
  26. WPS: Set UUID for interface wifi1
  27. WPS: UUID based on MAC address - hexdump(len=16): 3e 84 46 81 b1 da 59 ee 98 d2 e6 14 d9 58 d1 98
  28. EAPOL: SUPP_PAE entering state DISCONNECTED
  29. EAPOL: Supplicant port status: Unauthorized
  30. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  31. EAPOL: SUPP_BE entering state INITIALIZE
  32. EAP: EAP entering state DISABLED
  33. EAPOL: Supplicant port status: Unauthorized
  34. EAPOL: Supplicant port status: Unauthorized
  35. ctrl_interface_group=10 (from group name 'wheel')
  36. wifi1: Added interface wifi1
  37. wifi1: State: DISCONNECTED -> DISCONNECTED
  38. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  39. netlink: Operstate: linkmode=-1, operstate=5
  40. random: Got 20/20 bytes from /dev/random
  41. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  42. RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
  43. WEXT: if_removed already cleared - ignore event
  44. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  45. RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
  46. WEXT: if_removed already cleared - ignore event
  47. Wireless event: cmd=0x8b06 len=12
  48. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  49. RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
  50. WEXT: if_removed already cleared - ignore event
  51. Wireless event: cmd=0x8b1a len=48
  52. wifi1: State: DISCONNECTED -> SCANNING
  53. wifi1: Starting AP scan for wildcard SSID
  54. Scan requested (ret=0) - scan timeout 10 seconds
  55. CTRL_IFACE monitor attached - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  56. RX ctrl_iface - hexdump_ascii(len=10):
  57. 49 4e 54 45 52 46 41 43 45 53 INTERFACES
  58. wifi1: Control interface command 'INTERFACES'
  59. RX ctrl_iface - hexdump_ascii(len=18):
  60. 47 45 54 5f 43 41 50 41 42 49 4c 49 54 59 20 65 GET_CAPABILITY e
  61. 61 70 ap
  62. wifi1: Control interface command 'GET_CAPABILITY eap'
  63. CTRL_IFACE: GET_CAPABILITY 'eap'
  64. RX ctrl_iface - hexdump_ascii(len=6):
  65. 53 54 41 54 55 53 STATUS
  66. wifi1: Control interface command 'STATUS'
  67. RX ctrl_iface - hexdump_ascii(len=13):
  68. 4c 49 53 54 5f 4e 45 54 57 4f 52 4b 53 LIST_NETWORKS
  69. wifi1: Control interface command 'LIST_NETWORKS'
  70. RX ctrl_iface - hexdump_ascii(len=22):
  71. 47 45 54 5f 4e 45 54 57 4f 52 4b 20 30 20 64 69 GET_NETWORK 0 di
  72. 73 61 62 6c 65 64 sabled
  73. wifi1: Control interface command 'GET_NETWORK 0 disabled'
  74. CTRL_IFACE: GET_NETWORK id=0 name='disabled'
  75. EAPOL: disable timer tick
  76. EAPOL: Supplicant port status: Unauthorized
  77. Scan timeout - try to get results
  78. wifi1: Event SCAN_RESULTS (3) received
  79. Received 3958 bytes of scan results (6 BSSes)
  80. wifi1: BSS: Start scan result update 1
  81. wifi1: BSS: Add new id 0 BSSID 98:fc:11:b6:6b:c6 SSID 'LJRWireless'
  82. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  83. wifi1: BSS: Add new id 1 BSSID 04:a1:51:e9:41:45 SSID 'LJRWireless'
  84. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  85. wifi1: BSS: Add new id 2 BSSID 2c:b0:5d:e9:1c:ea SSID 'MATTER100'
  86. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  87. wifi1: BSS: Add new id 3 BSSID 20:aa:4b:62:c1:12 SSID 'RED SOXS'
  88. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  89. wifi1: BSS: Add new id 4 BSSID 2c:b0:5d:fb:29:92 SSID 'CharterWiFi45a8'
  90. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  91. wifi1: BSS: Add new id 5 BSSID 02:aa:4b:62:c1:13 SSID 'RED SOXS-guest'
  92. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  93. BSS: last_scan_res_used=6/32 last_scan_full=0
  94. wifi1: New scan results available
  95. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  96. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  97. WPS: AP 04:a1:51:e9:41:45 type 0 added
  98. WPS: AP 2c:b0:5d:e9:1c:ea type 0 added
  99. WPS: AP 20:aa:4b:62:c1:12 type 0 added
  100. WPS: AP 2c:b0:5d:fb:29:92 type 0 added
  101. WPS: AP[0] 04:a1:51:e9:41:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  102. WPS: AP[1] 2c:b0:5d:e9:1c:ea type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  103. WPS: AP[2] 20:aa:4b:62:c1:12 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  104. WPS: AP[3] 2c:b0:5d:fb:29:92 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  105. wifi1: Selecting BSS from priority group 0
  106. wifi1: 0: 98:fc:11:b6:6b:c6 ssid='LJRWireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-38
  107. wifi1: selected based on RSN IE
  108. wifi1: selected BSS 98:fc:11:b6:6b:c6 ssid='LJRWireless'
  109. wifi1: Request association: reassociate: 0 selected: 98:fc:11:b6:6b:c6 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  110. wifi1: Trying to associate with 98:fc:11:b6:6b:c6 (SSID='LJRWireless' freq=2412 MHz)
  111. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  112. wifi1: Cancelling scan request
  113. wifi1: WPA: clearing own WPA/RSN IE
  114. wifi1: Automatic auth_alg selection: 0x1
  115. RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
  116. RSN: Search for BSSID 98:fc:11:b6:6b:c6
  117. RSN: No PMKSA cache entry found
  118. wifi1: RSN: using IEEE 802.11i/D9.0
  119. wifi1: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
  120. wifi1: WPA: clearing AP WPA IE
  121. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  122. wifi1: WPA: using GTK CCMP
  123. wifi1: WPA: using PTK CCMP
  124. wifi1: WPA: using KEY_MGMT WPA-PSK
  125. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  126. wifi1: No keys have been configured - skip key clearing
  127. wifi1: State: SCANNING -> ASSOCIATING
  128. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  129. netlink: Operstate: linkmode=-1, operstate=5
  130. Limit connection to BSSID 98:fc:11:b6:6b:c6 freq=2412 MHz based on scan results (bssid_set=0)
  131. wpa_driver_wext_associate
  132. wpa_driver_wext_set_drop_unencrypted
  133. wpa_driver_wext_set_psk
  134. wifi1: Setting authentication timeout: 10 sec 0 usec
  135. EAPOL: External notification - EAP success=0
  136. EAPOL: Supplicant port status: Unauthorized
  137. EAPOL: External notification - EAP fail=0
  138. EAPOL: Supplicant port status: Unauthorized
  139. EAPOL: External notification - portControl=Auto
  140. EAPOL: Supplicant port status: Unauthorized
  141. RSN: Ignored PMKID candidate without preauth flag
  142. RSN: Ignored PMKID candidate without preauth flag
  143. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  144. RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
  145. WEXT: if_removed already cleared - ignore event
  146. Wireless event: cmd=0x8b06 len=12
  147. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  148. RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
  149. WEXT: if_removed already cleared - ignore event
  150. Wireless event: cmd=0x8b04 len=16
  151. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  152. RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
  153. WEXT: if_removed already cleared - ignore event
  154. Wireless event: cmd=0x8b1a len=27
  155. RX ctrl_iface - hexdump_ascii(len=6):
  156. 53 54 41 54 55 53 STATUS
  157. wifi1: Control interface command 'STATUS'
  158. RX ctrl_iface - hexdump_ascii(len=22):
  159. 47 45 54 5f 4e 45 54 57 4f 52 4b 20 30 20 64 69 GET_NETWORK 0 di
  160. 73 61 62 6c 65 64 sabled
  161. wifi1: Control interface command 'GET_NETWORK 0 disabled'
  162. CTRL_IFACE: GET_NETWORK id=0 name='disabled'
  163. RX ctrl_iface - hexdump_ascii(len=13):
  164. 4c 49 53 54 5f 4e 45 54 57 4f 52 4b 53 LIST_NETWORKS
  165. wifi1: Control interface command 'LIST_NETWORKS'
  166. RX ctrl_iface - hexdump_ascii(len=22):
  167. 47 45 54 5f 4e 45 54 57 4f 52 4b 20 30 20 64 69 GET_NETWORK 0 di
  168. 73 61 62 6c 65 64 sabled
  169. wifi1: Control interface command 'GET_NETWORK 0 disabled'
  170. CTRL_IFACE: GET_NETWORK id=0 name='disabled'
  171. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  172. RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
  173. WEXT: if_removed already cleared - ignore event
  174. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  175. RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
  176. WEXT: if_removed already cleared - ignore event
  177. Wireless event: cmd=0x8b15 len=24
  178. Wireless event: new AP: 98:fc:11:b6:6b:c6
  179. wifi1: Event ASSOC (0) received
  180. wifi1: State: ASSOCIATING -> ASSOCIATED
  181. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  182. netlink: Operstate: linkmode=-1, operstate=5
  183. wifi1: Associated to a new BSS: BSSID=98:fc:11:b6:6b:c6
  184. wifi1: No keys have been configured - skip key clearing
  185. wifi1: Associated with 98:fc:11:b6:6b:c6
  186. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  187. wifi1: WPA: Association event - clear replay counter
  188. wifi1: WPA: Clear old PTK
  189. EAPOL: External notification - portEnabled=0
  190. EAPOL: Supplicant port status: Unauthorized
  191. EAPOL: External notification - portValid=0
  192. EAPOL: Supplicant port status: Unauthorized
  193. EAPOL: External notification - EAP success=0
  194. EAPOL: Supplicant port status: Unauthorized
  195. EAPOL: External notification - portEnabled=1
  196. EAPOL: SUPP_PAE entering state CONNECTING
  197. EAPOL: enable timer tick
  198. EAPOL: SUPP_BE entering state IDLE
  199. wifi1: Setting authentication timeout: 10 sec 0 usec
  200. wifi1: Cancelling scan request
  201. wifi1: RX EAPOL from 98:fc:11:b6:6b:c6
  202. wifi1: Setting authentication timeout: 10 sec 0 usec
  203. wifi1: IEEE 802.1X RX: version=1 type=3 length=95
  204. wifi1: EAPOL-Key type=2
  205. wifi1: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  206. wifi1: key_length=16 key_data_length=0
  207. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  208. key_nonce - hexdump(len=32): 0f aa b9 9e dc 8f 63 91 90 4a 89 2d 59 87 f3 9e c3 a2 d7 63 c8 51 1e 44 a2 79 a7 43 a3 06 c7 c5
  209. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  210. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  211. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  212. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  213. wifi1: State: ASSOCIATED -> 4WAY_HANDSHAKE
  214. wifi1: WPA: RX message 1 of 4-Way Handshake from 98:fc:11:b6:6b:c6 (ver=2)
  215. RSN: msg 1/4 key data - hexdump(len=0):
  216. WPA: Renewed SNonce - hexdump(len=32): 4d 21 87 06 b2 f9 10 b5 be d1 27 8f 21 96 b4 c7 50 58 05 9f 1b 3e 4b a0 54 f4 51 2d 3c 70 b0 d5
  217. WPA: PTK derivation - A1=c4:04:15:3c:d8:f2 A2=98:fc:11:b6:6b:c6
  218. WPA: Nonce1 - hexdump(len=32): 4d 21 87 06 b2 f9 10 b5 be d1 27 8f 21 96 b4 c7 50 58 05 9f 1b 3e 4b a0 54 f4 51 2d 3c 70 b0 d5
  219. WPA: Nonce2 - hexdump(len=32): 0f aa b9 9e dc 8f 63 91 90 4a 89 2d 59 87 f3 9e c3 a2 d7 63 c8 51 1e 44 a2 79 a7 43 a3 06 c7 c5
  220. WPA: PMK - hexdump(len=32): [REMOVED]
  221. WPA: PTK - hexdump(len=48): [REMOVED]
  222. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  223. WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  224. wifi1: WPA: Sending EAPOL-Key 2/4
  225. WPA: KCK - hexdump(len=16): [REMOVED]
  226. WPA: Derived Key MIC - hexdump(len=16): c8 f6 b3 04 f2 8c de 3d 03 cd ed 98 d1 3c ea ee
  227. wifi1: RX EAPOL from 98:fc:11:b6:6b:c6
  228. wifi1: IEEE 802.1X RX: version=1 type=3 length=151
  229. wifi1: EAPOL-Key type=2
  230. wifi1: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  231. wifi1: key_length=16 key_data_length=56
  232. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  233. key_nonce - hexdump(len=32): 0f aa b9 9e dc 8f 63 91 90 4a 89 2d 59 87 f3 9e c3 a2 d7 63 c8 51 1e 44 a2 79 a7 43 a3 06 c7 c5
  234. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  235. key_rsc - hexdump(len=8): e3 24 00 00 00 00 00 00
  236. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  237. key_mic - hexdump(len=16): 23 7f 1b 95 94 df d6 fa b0 a7 71 96 64 fd cb d6
  238. RSN: encrypted key data - hexdump(len=56): 10 bc 40 95 dd 59 e7 11 70 4a 54 ee 24 88 90 1d d9 01 ca 70 f5 01 87 2f ff c0 51 2b 47 71 26 e0 24 9b e6 0b 94 f3 1b e1 81 06 98 71 32 95 c1 1a a1 c5 a4 5b 0c 7d d7 01
  239. WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
  240. wifi1: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  241. wifi1: WPA: RX message 3 of 4-Way Handshake from 98:fc:11:b6:6b:c6 (ver=2)
  242. WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 e2 4a 6c e5 50 4b 9e 2e 81 f0 9a 75 77 7f 3a 17 dd 00
  243. WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  244. WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
  245. wifi1: WPA: Sending EAPOL-Key 4/4
  246. WPA: KCK - hexdump(len=16): [REMOVED]
  247. WPA: Derived Key MIC - hexdump(len=16): 74 de 33 64 3d 61 05 5f fd 64 6d e7 03 1a e8 88
  248. wifi1: WPA: Installing PTK to the driver
  249. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
  250. EAPOL: External notification - portValid=1
  251. wifi1: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
  252. RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
  253. WPA: Group Key - hexdump(len=16): [REMOVED]
  254. wifi1: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
  255. WPA: RSC - hexdump(len=6): e3 24 00 00 00 00
  256. wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
  257. wifi1: WPA: Key negotiation completed with 98:fc:11:b6:6b:c6 [PTK=CCMP GTK=CCMP]
  258. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  259. wifi1: Cancelling authentication timeout
  260. wifi1: State: GROUP_HANDSHAKE -> COMPLETED
  261. wifi1: CTRL-EVENT-CONNECTED - Connection to 98:fc:11:b6:6b:c6 completed [id=0 id_str=]
  262. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  263. wpa_driver_wext_set_operstate: operstate 0->1 (UP)
  264. netlink: Operstate: linkmode=-1, operstate=6
  265. EAPOL: External notification - portValid=1
  266. EAPOL: External notification - EAP success=1
  267. EAPOL: SUPP_PAE entering state AUTHENTICATING
  268. EAPOL: SUPP_BE entering state SUCCESS
  269. EAP: EAP entering state DISABLED
  270. EAPOL: SUPP_PAE entering state AUTHENTICATED
  271. EAPOL: Supplicant port status: Authorized
  272. EAPOL: SUPP_BE entering state IDLE
  273. EAPOL authentication completed successfully
  274. RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  275. RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
  276. WEXT: if_removed already cleared - ignore event
  277. RX ctrl_iface - hexdump_ascii(len=6):
  278. 53 54 41 54 55 53 STATUS
  279. wifi1: Control interface command 'STATUS'
  280. RX ctrl_iface - hexdump_ascii(len=22):
  281. 47 45 54 5f 4e 45 54 57 4f 52 4b 20 30 20 64 69 GET_NETWORK 0 di
  282. 73 61 62 6c 65 64 sabled
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement