Guest User

/etc/wpa_supplicant/wpa_supplicant.conf

a guest
Aug 4th, 2014
344
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. wpa_supplicant v2.0
  2. random: Trying to read entropy from /dev/random
  3. Successfully initialized wpa_supplicant
  4. Initializing interface 'wifi1' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
  5. Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
  6. Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
  7. ctrl_interface='/var/run/wpa_supplicant'
  8. ctrl_interface_group='wheel'
  9. update_config=1
  10. Priority group 0
  11. id=0 ssid='LJRWireless'
  12. rfkill: initial event: idx=0 type=2 op=0 soft=0 hard=0
  13. rfkill: initial event: idx=1 type=1 op=0 soft=1 hard=0
  14. rfkill: WLAN soft blocked
  15. SIOCGIWRANGE: WE(compiled)=22 WE(source)=19 enc_capa=0xf
  16. capabilities: key_mgmt 0xf enc 0x1f flags 0x0
  17. netlink: Operstate: linkmode=1, operstate=5
  18. wifi1: Own MAC address: c4:04:15:3c:d8:f2
  19. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  20. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  21. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  22. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  23. wpa_driver_wext_set_countermeasures
  24. wifi1: RSN: flushing PMKID list in the driver
  25. wifi1: Setting scan request: 0 sec 100000 usec
  26. WPS: Set UUID for interface wifi1
  27. WPS: UUID based on MAC address - hexdump(len=16): 3e 84 46 81 b1 da 59 ee 98 d2 e6 14 d9 58 d1 98
  28. EAPOL: SUPP_PAE entering state DISCONNECTED
  29. EAPOL: Supplicant port status: Unauthorized
  30. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  31. EAPOL: SUPP_BE entering state INITIALIZE
  32. EAP: EAP entering state DISABLED
  33. EAPOL: Supplicant port status: Unauthorized
  34. EAPOL: Supplicant port status: Unauthorized
  35. ctrl_interface_group=10 (from group name 'wheel')
  36. wifi1: Added interface wifi1
  37. wifi1: State: DISCONNECTED -> DISCONNECTED
  38. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  39. netlink: Operstate: linkmode=-1, operstate=5
  40. random: Got 20/20 bytes from /dev/random
  41. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  42. RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
  43. WEXT: if_removed already cleared - ignore event
  44. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  45. RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
  46. WEXT: if_removed already cleared - ignore event
  47. Wireless event: cmd=0x8b06 len=12
  48. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  49. RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
  50. WEXT: if_removed already cleared - ignore event
  51. Wireless event: cmd=0x8b1a len=48
  52. wifi1: State: DISCONNECTED -> SCANNING
  53. wifi1: Starting AP scan for wildcard SSID
  54. Scan requested (ret=0) - scan timeout 10 seconds
  55. CTRL_IFACE monitor attached - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  56. RX ctrl_iface - hexdump_ascii(len=10):
  57. 49 4e 54 45 52 46 41 43 45 53 INTERFACES
  58. wifi1: Control interface command 'INTERFACES'
  59. RX ctrl_iface - hexdump_ascii(len=18):
  60. 47 45 54 5f 43 41 50 41 42 49 4c 49 54 59 20 65 GET_CAPABILITY e
  61. 61 70 ap
  62. wifi1: Control interface command 'GET_CAPABILITY eap'
  63. CTRL_IFACE: GET_CAPABILITY 'eap'
  64. RX ctrl_iface - hexdump_ascii(len=6):
  65. 53 54 41 54 55 53 STATUS
  66. wifi1: Control interface command 'STATUS'
  67. RX ctrl_iface - hexdump_ascii(len=13):
  68. 4c 49 53 54 5f 4e 45 54 57 4f 52 4b 53 LIST_NETWORKS
  69. wifi1: Control interface command 'LIST_NETWORKS'
  70. RX ctrl_iface - hexdump_ascii(len=22):
  71. 47 45 54 5f 4e 45 54 57 4f 52 4b 20 30 20 64 69 GET_NETWORK 0 di
  72. 73 61 62 6c 65 64 sabled
  73. wifi1: Control interface command 'GET_NETWORK 0 disabled'
  74. CTRL_IFACE: GET_NETWORK id=0 name='disabled'
  75. EAPOL: disable timer tick
  76. EAPOL: Supplicant port status: Unauthorized
  77. Scan timeout - try to get results
  78. wifi1: Event SCAN_RESULTS (3) received
  79. Received 3958 bytes of scan results (6 BSSes)
  80. wifi1: BSS: Start scan result update 1
  81. wifi1: BSS: Add new id 0 BSSID 98:fc:11:b6:6b:c6 SSID 'LJRWireless'
  82. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  83. wifi1: BSS: Add new id 1 BSSID 04:a1:51:e9:41:45 SSID 'LJRWireless'
  84. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  85. wifi1: BSS: Add new id 2 BSSID 2c:b0:5d:e9:1c:ea SSID 'MATTER100'
  86. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  87. wifi1: BSS: Add new id 3 BSSID 20:aa:4b:62:c1:12 SSID 'RED SOXS'
  88. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  89. wifi1: BSS: Add new id 4 BSSID 2c:b0:5d:fb:29:92 SSID 'CharterWiFi45a8'
  90. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  91. wifi1: BSS: Add new id 5 BSSID 02:aa:4b:62:c1:13 SSID 'RED SOXS-guest'
  92. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  93. BSS: last_scan_res_used=6/32 last_scan_full=0
  94. wifi1: New scan results available
  95. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  96. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  97. WPS: AP 04:a1:51:e9:41:45 type 0 added
  98. WPS: AP 2c:b0:5d:e9:1c:ea type 0 added
  99. WPS: AP 20:aa:4b:62:c1:12 type 0 added
  100. WPS: AP 2c:b0:5d:fb:29:92 type 0 added
  101. WPS: AP[0] 04:a1:51:e9:41:45 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  102. WPS: AP[1] 2c:b0:5d:e9:1c:ea type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  103. WPS: AP[2] 20:aa:4b:62:c1:12 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  104. WPS: AP[3] 2c:b0:5d:fb:29:92 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  105. wifi1: Selecting BSS from priority group 0
  106. wifi1: 0: 98:fc:11:b6:6b:c6 ssid='LJRWireless' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-38
  107. wifi1: selected based on RSN IE
  108. wifi1: selected BSS 98:fc:11:b6:6b:c6 ssid='LJRWireless'
  109. wifi1: Request association: reassociate: 0 selected: 98:fc:11:b6:6b:c6 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
  110. wifi1: Trying to associate with 98:fc:11:b6:6b:c6 (SSID='LJRWireless' freq=2412 MHz)
  111. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  112. wifi1: Cancelling scan request
  113. wifi1: WPA: clearing own WPA/RSN IE
  114. wifi1: Automatic auth_alg selection: 0x1
  115. RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
  116. RSN: Search for BSSID 98:fc:11:b6:6b:c6
  117. RSN: No PMKSA cache entry found
  118. wifi1: RSN: using IEEE 802.11i/D9.0
  119. wifi1: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
  120. wifi1: WPA: clearing AP WPA IE
  121. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  122. wifi1: WPA: using GTK CCMP
  123. wifi1: WPA: using PTK CCMP
  124. wifi1: WPA: using KEY_MGMT WPA-PSK
  125. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  126. wifi1: No keys have been configured - skip key clearing
  127. wifi1: State: SCANNING -> ASSOCIATING
  128. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  129. netlink: Operstate: linkmode=-1, operstate=5
  130. Limit connection to BSSID 98:fc:11:b6:6b:c6 freq=2412 MHz based on scan results (bssid_set=0)
  131. wpa_driver_wext_associate
  132. wpa_driver_wext_set_drop_unencrypted
  133. wpa_driver_wext_set_psk
  134. wifi1: Setting authentication timeout: 10 sec 0 usec
  135. EAPOL: External notification - EAP success=0
  136. EAPOL: Supplicant port status: Unauthorized
  137. EAPOL: External notification - EAP fail=0
  138. EAPOL: Supplicant port status: Unauthorized
  139. EAPOL: External notification - portControl=Auto
  140. EAPOL: Supplicant port status: Unauthorized
  141. RSN: Ignored PMKID candidate without preauth flag
  142. RSN: Ignored PMKID candidate without preauth flag
  143. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  144. RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
  145. WEXT: if_removed already cleared - ignore event
  146. Wireless event: cmd=0x8b06 len=12
  147. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  148. RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
  149. WEXT: if_removed already cleared - ignore event
  150. Wireless event: cmd=0x8b04 len=16
  151. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  152. RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
  153. WEXT: if_removed already cleared - ignore event
  154. Wireless event: cmd=0x8b1a len=27
  155. RX ctrl_iface - hexdump_ascii(len=6):
  156. 53 54 41 54 55 53 STATUS
  157. wifi1: Control interface command 'STATUS'
  158. RX ctrl_iface - hexdump_ascii(len=22):
  159. 47 45 54 5f 4e 45 54 57 4f 52 4b 20 30 20 64 69 GET_NETWORK 0 di
  160. 73 61 62 6c 65 64 sabled
  161. wifi1: Control interface command 'GET_NETWORK 0 disabled'
  162. CTRL_IFACE: GET_NETWORK id=0 name='disabled'
  163. RX ctrl_iface - hexdump_ascii(len=13):
  164. 4c 49 53 54 5f 4e 45 54 57 4f 52 4b 53 LIST_NETWORKS
  165. wifi1: Control interface command 'LIST_NETWORKS'
  166. RX ctrl_iface - hexdump_ascii(len=22):
  167. 47 45 54 5f 4e 45 54 57 4f 52 4b 20 30 20 64 69 GET_NETWORK 0 di
  168. 73 61 62 6c 65 64 sabled
  169. wifi1: Control interface command 'GET_NETWORK 0 disabled'
  170. CTRL_IFACE: GET_NETWORK id=0 name='disabled'
  171. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  172. RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
  173. WEXT: if_removed already cleared - ignore event
  174. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  175. RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
  176. WEXT: if_removed already cleared - ignore event
  177. Wireless event: cmd=0x8b15 len=24
  178. Wireless event: new AP: 98:fc:11:b6:6b:c6
  179. wifi1: Event ASSOC (0) received
  180. wifi1: State: ASSOCIATING -> ASSOCIATED
  181. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  182. netlink: Operstate: linkmode=-1, operstate=5
  183. wifi1: Associated to a new BSS: BSSID=98:fc:11:b6:6b:c6
  184. wifi1: No keys have been configured - skip key clearing
  185. wifi1: Associated with 98:fc:11:b6:6b:c6
  186. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  187. wifi1: WPA: Association event - clear replay counter
  188. wifi1: WPA: Clear old PTK
  189. EAPOL: External notification - portEnabled=0
  190. EAPOL: Supplicant port status: Unauthorized
  191. EAPOL: External notification - portValid=0
  192. EAPOL: Supplicant port status: Unauthorized
  193. EAPOL: External notification - EAP success=0
  194. EAPOL: Supplicant port status: Unauthorized
  195. EAPOL: External notification - portEnabled=1
  196. EAPOL: SUPP_PAE entering state CONNECTING
  197. EAPOL: enable timer tick
  198. EAPOL: SUPP_BE entering state IDLE
  199. wifi1: Setting authentication timeout: 10 sec 0 usec
  200. wifi1: Cancelling scan request
  201. wifi1: RX EAPOL from 98:fc:11:b6:6b:c6
  202. wifi1: Setting authentication timeout: 10 sec 0 usec
  203. wifi1: IEEE 802.1X RX: version=1 type=3 length=95
  204. wifi1: EAPOL-Key type=2
  205. wifi1: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  206. wifi1: key_length=16 key_data_length=0
  207. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  208. key_nonce - hexdump(len=32): 0f aa b9 9e dc 8f 63 91 90 4a 89 2d 59 87 f3 9e c3 a2 d7 63 c8 51 1e 44 a2 79 a7 43 a3 06 c7 c5
  209. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  210. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  211. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  212. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  213. wifi1: State: ASSOCIATED -> 4WAY_HANDSHAKE
  214. wifi1: WPA: RX message 1 of 4-Way Handshake from 98:fc:11:b6:6b:c6 (ver=2)
  215. RSN: msg 1/4 key data - hexdump(len=0):
  216. WPA: Renewed SNonce - hexdump(len=32): 4d 21 87 06 b2 f9 10 b5 be d1 27 8f 21 96 b4 c7 50 58 05 9f 1b 3e 4b a0 54 f4 51 2d 3c 70 b0 d5
  217. WPA: PTK derivation - A1=c4:04:15:3c:d8:f2 A2=98:fc:11:b6:6b:c6
  218. WPA: Nonce1 - hexdump(len=32): 4d 21 87 06 b2 f9 10 b5 be d1 27 8f 21 96 b4 c7 50 58 05 9f 1b 3e 4b a0 54 f4 51 2d 3c 70 b0 d5
  219. WPA: Nonce2 - hexdump(len=32): 0f aa b9 9e dc 8f 63 91 90 4a 89 2d 59 87 f3 9e c3 a2 d7 63 c8 51 1e 44 a2 79 a7 43 a3 06 c7 c5
  220. WPA: PMK - hexdump(len=32): [REMOVED]
  221. WPA: PTK - hexdump(len=48): [REMOVED]
  222. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  223. WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  224. wifi1: WPA: Sending EAPOL-Key 2/4
  225. WPA: KCK - hexdump(len=16): [REMOVED]
  226. WPA: Derived Key MIC - hexdump(len=16): c8 f6 b3 04 f2 8c de 3d 03 cd ed 98 d1 3c ea ee
  227. wifi1: RX EAPOL from 98:fc:11:b6:6b:c6
  228. wifi1: IEEE 802.1X RX: version=1 type=3 length=151
  229. wifi1: EAPOL-Key type=2
  230. wifi1: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  231. wifi1: key_length=16 key_data_length=56
  232. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  233. key_nonce - hexdump(len=32): 0f aa b9 9e dc 8f 63 91 90 4a 89 2d 59 87 f3 9e c3 a2 d7 63 c8 51 1e 44 a2 79 a7 43 a3 06 c7 c5
  234. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  235. key_rsc - hexdump(len=8): e3 24 00 00 00 00 00 00
  236. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  237. key_mic - hexdump(len=16): 23 7f 1b 95 94 df d6 fa b0 a7 71 96 64 fd cb d6
  238. RSN: encrypted key data - hexdump(len=56): 10 bc 40 95 dd 59 e7 11 70 4a 54 ee 24 88 90 1d d9 01 ca 70 f5 01 87 2f ff c0 51 2b 47 71 26 e0 24 9b e6 0b 94 f3 1b e1 81 06 98 71 32 95 c1 1a a1 c5 a4 5b 0c 7d d7 01
  239. WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
  240. wifi1: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  241. wifi1: WPA: RX message 3 of 4-Way Handshake from 98:fc:11:b6:6b:c6 (ver=2)
  242. WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 e2 4a 6c e5 50 4b 9e 2e 81 f0 9a 75 77 7f 3a 17 dd 00
  243. WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  244. WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
  245. wifi1: WPA: Sending EAPOL-Key 4/4
  246. WPA: KCK - hexdump(len=16): [REMOVED]
  247. WPA: Derived Key MIC - hexdump(len=16): 74 de 33 64 3d 61 05 5f fd 64 6d e7 03 1a e8 88
  248. wifi1: WPA: Installing PTK to the driver
  249. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
  250. EAPOL: External notification - portValid=1
  251. wifi1: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
  252. RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
  253. WPA: Group Key - hexdump(len=16): [REMOVED]
  254. wifi1: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
  255. WPA: RSC - hexdump(len=6): e3 24 00 00 00 00
  256. wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
  257. wifi1: WPA: Key negotiation completed with 98:fc:11:b6:6b:c6 [PTK=CCMP GTK=CCMP]
  258. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  259. wifi1: Cancelling authentication timeout
  260. wifi1: State: GROUP_HANDSHAKE -> COMPLETED
  261. wifi1: CTRL-EVENT-CONNECTED - Connection to 98:fc:11:b6:6b:c6 completed [id=0 id_str=]
  262. CTRL_IFACE monitor send - hexdump(len=23): 2f 74 6d 70 2f 77 70 61 5f 63 74 72 6c 5f 32 34 39 36 38 2d 31 33 00
  263. wpa_driver_wext_set_operstate: operstate 0->1 (UP)
  264. netlink: Operstate: linkmode=-1, operstate=6
  265. EAPOL: External notification - portValid=1
  266. EAPOL: External notification - EAP success=1
  267. EAPOL: SUPP_PAE entering state AUTHENTICATING
  268. EAPOL: SUPP_BE entering state SUCCESS
  269. EAP: EAP entering state DISABLED
  270. EAPOL: SUPP_PAE entering state AUTHENTICATED
  271. EAPOL: Supplicant port status: Authorized
  272. EAPOL: SUPP_BE entering state IDLE
  273. EAPOL authentication completed successfully
  274. RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  275. RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi1' added
  276. WEXT: if_removed already cleared - ignore event
  277. RX ctrl_iface - hexdump_ascii(len=6):
  278. 53 54 41 54 55 53 STATUS
  279. wifi1: Control interface command 'STATUS'
  280. RX ctrl_iface - hexdump_ascii(len=22):
  281. 47 45 54 5f 4e 45 54 57 4f 52 4b 20 30 20 64 69 GET_NETWORK 0 di
  282. 73 61 62 6c 65 64 sabled
RAW Paste Data

Adblocker detected! Please consider disabling it...

We've detected AdBlock Plus or some other adblocking software preventing Pastebin.com from fully loading.

We don't have any obnoxious sound, or popup ads, we actively block these annoying types of ads!

Please add Pastebin.com to your ad blocker whitelist or disable your adblocking software.

×