globetrotterdk

wpa.txt

Feb 18th, 2023
77
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 15.52 KB | None | 0 0
  1. wpa_supplicant v2.7
  2. Successfully initialized wpa_supplicant
  3. Initializing interface 'athn0' conf '/etc/wpa_supplicant.conf' driver 'bsd' ctrl_interface 'N/A' bridge 'N/A'
  4. Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
  5. Reading configuration file '/etc/wpa_supplicant.conf'
  6. ctrl_interface='/var/run/wpa_supplicant'
  7. ctrl_interface_group='wheel'
  8. update_config=1
  9. Line: 11 - start of a new network block
  10. ssid - hexdump_ascii(len=8):
  11. 62 6c 75 65 5f 75 66 6f SSID
  12. PSK (ASCII passphrase) - hexdump_ascii(len=9): [REMOVED]
  13. scan_ssid=1 (0x1)
  14. PSK (from passphrase) - hexdump(len=32): [REMOVED]
  15. Line: 20 - start of a new network block
  16. ssid - hexdump_ascii(len=8):
  17. 62 6c 75 65 5f 75 66 6f SSID
  18. PSK (ASCII passphrase) - hexdump_ascii(len=9): [REMOVED]
  19. scan_ssid=1 (0x1)
  20. PSK (from passphrase) - hexdump(len=32): [REMOVED]
  21. Line: 29 - start of a new network block
  22. ssid - hexdump_ascii(len=8):
  23. 62 6c 75 65 5f 75 66 6f SSID
  24. PSK (ASCII passphrase) - hexdump_ascii(len=9): [REMOVED]
  25. scan_ssid=1 (0x1)
  26. PSK (from passphrase) - hexdump(len=32): [REMOVED]
  27. Priority group 0
  28. id=0 ssid='SSID'
  29. id=1 ssid='SSID'
  30. id=2 ssid='SSID'
  31. Add interface athn0 to a new radio N/A
  32. athn0: Failed to attach pkt_type filter
  33. athn0: Own MAC address: 7c:e9:d3:2e:81:4d
  34. bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  35. bsd_del_key: key_idx=0
  36. bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  37. bsd_del_key: key_idx=1
  38. bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  39. bsd_del_key: key_idx=2
  40. bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  41. bsd_del_key: key_idx=3
  42. wpa_driver_bsd_set_countermeasures: enabled=0
  43. athn0: RSN: flushing PMKID list in the driver
  44. athn0: Setting scan request: 0.100000 sec
  45. ENGINE: Loading dynamic engine
  46. ENGINE: Loading dynamic engine
  47. EAPOL: SUPP_PAE entering state DISCONNECTED
  48. EAPOL: Supplicant port status: Unauthorized
  49. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  50. EAPOL: SUPP_BE entering state INITIALIZE
  51. EAP: EAP entering state DISABLED
  52. ctrl_interface_group=0 (from group name 'wheel')
  53. athn0: Added interface athn0
  54. athn0: State: DISCONNECTED -> DISCONNECTED
  55. athn0: State: DISCONNECTED -> SCANNING
  56. Scan SSID - hexdump_ascii(len=8):
  57. 62 6c 75 65 5f 75 66 6f SSID
  58. athn0: Starting AP scan for wildcard SSID (Interleave with specific)
  59. athn0: Add radio work 'scan'@0x6fd386cd90c0
  60. athn0: First radio work item in the queue - schedule start immediately
  61. athn0: Starting radio work 'scan'@0x6fd386cd90c0 after 0.000024 second wait
  62. wpa_driver_bsd_set_wpa: enabled=1
  63. wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
  64. EAPOL: disable timer tick
  65. athn0: Event SCAN_RESULTS (3) received
  66. Received 200 bytes of scan results (2 BSSes)
  67. athn0: BSS: Start scan result update 1
  68. athn0: BSS: Add new id 0 BSSID 78:45:58:d5:19:5b SSID 'SSID' freq 2412
  69. athn0: BSS: Add new id 1 BSSID 34:21:09:45:67:c9 SSID 'Omni_785F10' freq 2437
  70. BSS: last_scan_res_used=2/32
  71. athn0: New scan results available (own=0 ext=0)
  72. athn0: Radio work 'scan'@0x6fd386cd90c0 done in 2.831495 seconds
  73. athn0: radio_work_free('scan'@0x6fd386cd90c0): num_active_works --> 0
  74. athn0: Selecting BSS from priority group 0
  75. athn0: 0: 78:45:58:d5:19:5b ssid='SSID' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=21 freq=2412
  76. athn0: selected based on RSN IE
  77. athn0: selected BSS 78:45:58:d5:19:5b ssid='SSID'
  78. athn0: Considering connect request: reassociate: 0 selected: 78:45:58:d5:19:5b bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x6fd386ddb000 current_ssid=0x0
  79. athn0: Request association with 78:45:58:d5:19:5b
  80. athn0: No ongoing scan/p2p-scan found to abort
  81. athn0: Add radio work 'connect'@0x6fd386cd90c0
  82. athn0: First radio work item in the queue - schedule start immediately
  83. RSN: Ignored PMKID candidate without preauth flag
  84. athn0: Starting radio work 'connect'@0x6fd386cd90c0 after 0.000012 second wait
  85. athn0: Trying to associate with 78:45:58:d5:19:5b (SSID='SSID' freq=2412 MHz)
  86. athn0: Cancelling scan request
  87. athn0: WPA: clearing own WPA/RSN IE
  88. RSN: PMKSA cache search - network_ctx=0x6fd386ddb000 try_opportunistic=0 akmp=0x0
  89. RSN: Search for BSSID 78:45:58:d5:19:5b
  90. RSN: No PMKSA cache entry found
  91. athn0: RSN: using IEEE 802.11i/D9.0
  92. athn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
  93. athn0: WPA: clearing AP WPA IE
  94. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  95. athn0: WPA: using GTK CCMP
  96. athn0: WPA: using PTK CCMP
  97. athn0: WPA: using KEY_MGMT WPA-PSK
  98. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  99. PSK (set in config) - hexdump(len=32): [REMOVED]
  100. WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
  101. athn0: Automatic auth_alg selection: 0x1
  102. Failed to add supported operating classes IE
  103. athn0: State: SCANNING -> ASSOCIATING
  104. Limit connection to BSSID 78:45:58:d5:19:5b freq=2412 MHz based on scan results (bssid_set=0 wps=0)
  105. wpa_driver_bsd_associate: ssid 'SSID' wpa ie len 22 pairwise 16 group 16 key mgmt 2
  106. wpa_driver_bsd_set_drop_unencrypted: enabled=1
  107. wpa_driver_bsd_associate: set PRIVACY 1
  108. athn0: Setting authentication timeout: 10 sec 0 usec
  109. EAPOL: External notification - EAP success=0
  110. EAPOL: External notification - EAP fail=0
  111. EAPOL: External notification - portControl=Auto
  112. athn0: Event ASSOC (0) received
  113. athn0: State: ASSOCIATING -> ASSOCIATED
  114. athn0: Associated to a new BSS: BSSID=78:45:58:d5:19:5b
  115. athn0: Associated with 78:45:58:d5:19:5b
  116. athn0: WPA: Association event - clear replay counter
  117. athn0: WPA: Clear old PTK
  118. EAPOL: External notification - portEnabled=0
  119. EAPOL: External notification - portValid=0
  120. EAPOL: External notification - EAP success=0
  121. EAPOL: External notification - portEnabled=1
  122. EAPOL: SUPP_PAE entering state CONNECTING
  123. EAPOL: enable timer tick
  124. EAPOL: SUPP_BE entering state IDLE
  125. athn0: Setting authentication timeout: 10 sec 0 usec
  126. athn0: Cancelling scan request
  127. athn0: RX EAPOL from 78:45:58:d5:19:5b
  128. RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 a4 70 0d b2 0d 9c 78 16 f9 ba 84 bd ae 81 8d b1 2d 5a d4 ec 03 5b 27 b9 08 15 74 3c 50 73 29 5e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  129. athn0: Setting authentication timeout: 10 sec 0 usec
  130. athn0: IEEE 802.1X RX: version=2 type=3 length=95
  131. WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 a4 70 0d b2 0d 9c 78 16 f9 ba 84 bd ae 81 8d b1 2d 5a d4 ec 03 5b 27 b9 08 15 74 3c 50 73 29 5e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  132. athn0: EAPOL-Key type=2
  133. athn0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  134. athn0: key_length=16 key_data_length=0
  135. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  136. key_nonce - hexdump(len=32): a4 70 0d b2 0d 9c 78 16 f9 ba 84 bd ae 81 8d b1 2d 5a d4 ec 03 5b 27 b9 08 15 74 3c 50 73 29 5e
  137. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  138. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  139. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  140. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  141. athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
  142. athn0: WPA: RX message 1 of 4-Way Handshake from 78:45:58:d5:19:5b (ver=2)
  143. RSN: msg 1/4 key data - hexdump(len=0):
  144. Get randomness: len=32 entropy=3
  145. WPA: Renewed SNonce - hexdump(len=32): fe c8 46 a3 ce 29 27 f5 7f 36 97 c2 e2 b0 f3 8d 86 68 bc 43 b6 0a 53 0a 80 fa fa ee 27 c2 c3 ed
  146. WPA: PTK derivation using PRF(SHA1)
  147. WPA: PTK derivation - A1=7c:e9:d3:2e:81:4d A2=78:45:58:d5:19:5b
  148. WPA: Nonce1 - hexdump(len=32): fe c8 46 a3 ce 29 27 f5 7f 36 97 c2 e2 b0 f3 8d 86 68 bc 43 b6 0a 53 0a 80 fa fa ee 27 c2 c3 ed
  149. WPA: Nonce2 - hexdump(len=32): a4 70 0d b2 0d 9c 78 16 f9 ba 84 bd ae 81 8d b1 2d 5a d4 ec 03 5b 27 b9 08 15 74 3c 50 73 29 5e
  150. WPA: PMK - hexdump(len=32): [REMOVED]
  151. WPA: PTK - hexdump(len=48): [REMOVED]
  152. WPA: KCK - hexdump(len=16): [REMOVED]
  153. WPA: KEK - hexdump(len=16): [REMOVED]
  154. WPA: TK - hexdump(len=16): [REMOVED]
  155. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  156. WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  157. athn0: WPA: Sending EAPOL-Key 2/4
  158. WPA: Send EAPOL-Key frame to 78:45:58:d5:19:5b ver=2 mic_len=16 key_mgmt=0x2
  159. WPA: EAPOL-Key MIC using HMAC-SHA1
  160. WPA: KCK - hexdump(len=16): [REMOVED]
  161. WPA: Derived Key MIC - hexdump(len=16): 23 b9 1f cb f5 96 91 e7 09 e2 c6 16 42 3a 0b 17
  162. WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 fe c8 46 a3 ce 29 27 f5 7f 36 97 c2 e2 b0 f3 8d 86 68 bc 43 b6 0a 53 0a 80 fa fa ee 27 c2 c3 ed 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 23 b9 1f cb f5 96 91 e7 09 e2 c6 16 42 3a 0b 17 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  163. athn0: RX EAPOL from 78:45:58:d5:19:5b
  164. RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 a4 70 0d b2 0d 9c 78 16 f9 ba 84 bd ae 81 8d b1 2d 5a d4 ec 03 5b 27 b9 08 15 74 3c 50 73 29 5e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 75 ba 4f 8f 40 29 a7 33 7a 19 9a 2f 8f 91 19 6a 00 38 73 90 3a 9f 1e 5c 0a 7d 32 9d a7 fc 0e 41 dd eb 57 85 fc 59 99 f6 f8 6f 67 b0 53 99 ee e1 b9 bc 0d 90 04 f2 c6 65 ed 07 13 e7 1c 0b 19 69 ff 6c 5c dd 39 bb 12 0f 4e a8
  165. athn0: IEEE 802.1X RX: version=2 type=3 length=151
  166. WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 a4 70 0d b2 0d 9c 78 16 f9 ba 84 bd ae 81 8d b1 2d 5a d4 ec 03 5b 27 b9 08 15 74 3c 50 73 29 5e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 75 ba 4f 8f 40 29 a7 33 7a 19 9a 2f 8f 91 19 6a 00 38 73 90 3a 9f 1e 5c 0a 7d 32 9d a7 fc 0e 41 dd eb 57 85 fc 59 99 f6 f8 6f 67 b0 53 99 ee e1 b9 bc 0d 90 04 f2 c6 65 ed 07 13 e7 1c 0b 19 69 ff 6c 5c dd 39 bb 12 0f 4e a8
  167. athn0: EAPOL-Key type=2
  168. athn0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  169. athn0: key_length=16 key_data_length=56
  170. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  171. key_nonce - hexdump(len=32): a4 70 0d b2 0d 9c 78 16 f9 ba 84 bd ae 81 8d b1 2d 5a d4 ec 03 5b 27 b9 08 15 74 3c 50 73 29 5e
  172. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  173. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  174. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  175. key_mic - hexdump(len=16): 75 ba 4f 8f 40 29 a7 33 7a 19 9a 2f 8f 91 19 6a
  176. WPA: EAPOL-Key MIC using HMAC-SHA1
  177. RSN: encrypted key data - hexdump(len=56): 73 90 3a 9f 1e 5c 0a 7d 32 9d a7 fc 0e 41 dd eb 57 85 fc 59 99 f6 f8 6f 67 b0 53 99 ee e1 b9 bc 0d 90 04 f2 c6 65 ed 07 13 e7 1c 0b 19 69 ff 6c 5c dd 39 bb 12 0f 4e a8
  178. WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
  179. WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
  180. athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  181. athn0: WPA: RX message 3 of 4-Way Handshake from 78:45:58:d5:19:5b (ver=2)
  182. WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 3b 44 19 c4 98 72 dc ef 0e a4 ce df 55 50 32 65 dd 00
  183. WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  184. WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
  185. athn0: WPA: Sending EAPOL-Key 4/4
  186. WPA: Send EAPOL-Key frame to 78:45:58:d5:19:5b ver=2 mic_len=16 key_mgmt=0x2
  187. WPA: EAPOL-Key MIC using HMAC-SHA1
  188. WPA: KCK - hexdump(len=16): [REMOVED]
  189. WPA: Derived Key MIC - hexdump(len=16): f3 95 aa cf 73 81 2a d6 ff 16 62 0b 67 28 0a 4a
  190. WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f3 95 aa cf 73 81 2a d6 ff 16 62 0b 67 28 0a 4a 00 00
  191. athn0: WPA: Installing PTK to the driver
  192. bsd_set_key: alg=3 addr=0x6fd386ddc2f8 key_idx=0 set_tx=1 seq_len=6 key_len=16
  193. EAPOL: External notification - portValid=1
  194. athn0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
  195. RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
  196. WPA: Group Key - hexdump(len=16): [REMOVED]
  197. athn0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
  198. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
  199. bsd_set_key: alg=3 addr=0x1c4c72c81 key_idx=1 set_tx=0 seq_len=6 key_len=16
  200. athn0: WPA: Key negotiation completed with 78:45:58:d5:19:5b [PTK=CCMP GTK=CCMP]
  201. athn0: Cancelling authentication timeout
  202. athn0: State: GROUP_HANDSHAKE -> COMPLETED
  203. athn0: Radio work 'connect'@0x6fd386cd90c0 done in 0.021677 seconds
  204. athn0: radio_work_free('connect'@0x6fd386cd90c0): num_active_works --> 0
  205. athn0: CTRL-EVENT-CONNECTED - Connection to 78:45:58:d5:19:5b completed [id=0 id_str=]
  206. EAPOL: External notification - portValid=1
  207. EAPOL: External notification - EAP success=1
  208. EAPOL: SUPP_PAE entering state AUTHENTICATING
  209. EAPOL: SUPP_BE entering state SUCCESS
  210. EAP: EAP entering state DISABLED
  211. EAPOL: SUPP_PAE entering state AUTHENTICATED
  212. EAPOL: Supplicant port status: Authorized
  213. EAPOL: SUPP_BE entering state IDLE
  214. EAPOL authentication completed - result=SUCCESS
  215. EAPOL: startWhen --> 0
  216. EAPOL: disable timer tick
  217. athn0: Removing interface athn0
  218. athn0: Request to deauthenticate - bssid=78:45:58:d5:19:5b pending_bssid=00:00:00:00:00:00 reason=3 state=COMPLETED
  219. bsd_send_mlme_param: op=3 reason=3 addr=78:45:58:d5:19:5b
  220. athn0: Event DEAUTH (11) received
  221. athn0: Deauthentication notification
  222. athn0: * reason 3 (locally generated)
  223. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  224. athn0: CTRL-EVENT-DISCONNECTED bssid=78:45:58:d5:19:5b reason=3 locally_generated=1
  225. athn0: Auto connect disabled: do not try to re-connect
  226. athn0: Ignore connection failure indication since interface has been put into disconnected state
  227. athn0: WPA: Clear old PMK and PTK
  228. athn0: Disconnect event - remove keys
  229. bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  230. bsd_del_key: key_idx=0
  231. bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  232. bsd_del_key: key_idx=1
  233. bsd_set_key: alg=0 addr=0x6fd386def100 key_idx=0 set_tx=0 seq_len=0 key_len=0
  234. bsd_del_key: addr=78:45:58:d5:19:5b
  235. ioctl[SIOCS80211, op=20, val=0, arg_len=7]: Can't assign requested address
  236. athn0: State: COMPLETED -> DISCONNECTED
  237. EAPOL: External notification - portEnabled=0
  238. EAPOL: SUPP_PAE entering state DISCONNECTED
  239. EAPOL: Supplicant port status: Unauthorized
  240. EAPOL: SUPP_BE entering state INITIALIZE
  241. EAPOL: External notification - portValid=0
  242. EAPOL: External notification - EAP success=0
  243. athn0: State: DISCONNECTED -> DISCONNECTED
  244. EAPOL: External notification - portEnabled=0
  245. EAPOL: External notification - portValid=0
  246. wpa_driver_bsd_set_countermeasures: enabled=0
  247. athn0: WPA: Clear old PMK and PTK
  248. athn0: BSS: Remove id 0 BSSID 78:45:58:d5:19:5b SSID 'SSID' due to wpa_bss_flush
  249. athn0: BSS: Remove id 1 BSSID 34:21:09:45:67:c9 SSID 'Omni_785F10' due to wpa_bss_flush
  250. athn0: Cancelling scan request
  251. athn0: Cancelling authentication timeout
  252. Remove interface athn0 from radio
  253. Remove radio
  254. wpa_driver_bsd_set_wpa: enabled=0
  255. wpa_driver_bsd_set_wpa_internal: wpa=0 privacy=0
  256. wpa_driver_bsd_set_wpa_internal: wpa=0 privacy=0
  257. athn0: CTRL-EVENT-TERMINATING
  258.  
Tags: netbsd
Add Comment
Please, Sign In to add comment