亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? wpa_cli.sgml

?? via usb driver that support vt6656 chipsets
?? SGML
字號:
<!doctype refentry PUBLIC "-//OASIS//DTD DocBook V4.1//EN"><refentry>  <refmeta>    <refentrytitle>wpa_cli</refentrytitle>    <manvolnum>8</manvolnum>  </refmeta>  <refnamediv>    <refname>wpa_cli</refname>    <refpurpose>WPA command line client</refpurpose>  </refnamediv>  <refsynopsisdiv>    <cmdsynopsis>      <command>wpa_cli</command>      <arg>-p <replaceable>path to ctrl sockets</replaceable></arg>      <arg>-i <replaceable>ifname</replaceable></arg>      <arg>-hvB</arg>      <arg>-a <replaceable>action file</replaceable></arg>      <arg>-P <replaceable>pid file</replaceable></arg>      <arg><replaceable>command ...</replaceable></arg>    </cmdsynopsis>  </refsynopsisdiv>  <refsect1>    <title>Overview</title>    <para>wpa_cli is a text-based frontend program for interacting    with wpa_supplicant. It is used to query current status, change    configuration, trigger events, and request interactive user    input.</para>    <para>wpa_cli can show the current authentication status, selected    security mode, dot11 and dot1x MIBs, etc. In addition, it can    configure some variables like EAPOL state machine parameters and    trigger events like reassociation and IEEE 802.1X    logoff/logon. wpa_cli provides a user interface to request    authentication information, like username and password, if these    are not included in the configuration. This can be used to    implement, e.g., one-time-passwords or generic token card    authentication where the authentication is based on a    challenge-response that uses an external device for generating the    response.</para>    <para>The control interface of wpa_supplicant can be configured to    allow non-root user access (ctrl_interface_group in the    configuration file). This makes it possible to run wpa_cli with a    normal user account.</para>    <para>wpa_cli supports two modes: interactive and command    line. Both modes share the same command set and the main    difference is in interactive mode providing access to unsolicited    messages (event messages, username/password requests).</para>    <para>Interactive mode is started when wpa_cli is executed without    including the command as a command line parameter. Commands are    then entered on the wpa_cli prompt. In command line mode, the same    commands are entered as command line arguments for wpa_cli.</para> </refsect1> <refsect1>   <title>Interactive authentication parameters request</title>   <para>When wpa_supplicant need authentication parameters, like   username and password, which are not present in the configuration   file, it sends a request message to all attached frontend programs,   e.g., wpa_cli in interactive mode. wpa_cli shows these requests   with "CTRL-REQ-&lt;type&gt;-&lt;id&gt;:&lt;text&gt;"   prefix. &lt;type&gt; is IDENTITY, PASSWORD, or OTP   (one-time-password). &lt;id&gt; is a unique identifier for the   current network. &lt;text&gt; is description of the request. In   case of OTP request, it includes the challenge from the   authentication server.</para>    <para>The reply to these requests can be given with 'identity',    'password', and 'otp' commands. &lt;id&gt; needs to be copied from the    the matching request. 'password' and 'otp' commands can be used    regardless of whether the request was for PASSWORD or OTP. The    main difference between these two commands is that values given    with 'password' are remembered as long as wpa_supplicant is    running whereas values given with 'otp' are used only once and    then forgotten, i.e., wpa_supplicant will ask frontend for a new    value for every use. This can be used to implement    one-time-password lists and generic token card -based    authentication.</para>    <para>Example request for password and a matching reply:</para><blockquote><programlisting>CTRL-REQ-PASSWORD-1:Password needed for SSID foobar> password 1 mysecretpassword</programlisting></blockquote>    <para>Example request for generic token card challenge-response:</para><blockquote><programlisting>CTRL-REQ-OTP-2:Challenge 1235663 needed for SSID foobar> otp 2 9876</programlisting></blockquote>  </refsect1>  <refsect1>    <title>Command Arguments</title>    <variablelist>      <varlistentry>	<term>-p path</term>	<listitem><para>Change the path where control sockets should	be found.</para></listitem>      </varlistentry>      <varlistentry>	<term>-i ifname</term>        <listitem><para>Specify the interface that is being	configured.  By default, choose the first interface found with	a control socket in the socket path.</para></listitem>      </varlistentry>      <varlistentry>	<term>-h</term>	<listitem><para>Help.  Show a usage message.</para></listitem>      </varlistentry>      <varlistentry>	<term>-v</term>	<listitem><para>Show version information.</para></listitem>      </varlistentry>      <varlistentry>	<term>-B</term>	<listitem><para>Run as a daemon in the background.</para></listitem>      </varlistentry>      <varlistentry>	<term>-a file</term>	<listitem><para>Run in daemon mode executing the action file        based on events from wpa_supplicant.  The specified file will	be executed with the first argument set to interface name and	second to "CONNECT" or "DISCONNECT" depending on the event.	This can be used </para></listitem>      </varlistentry>      <varlistentry>	<term>-P file</term>	<listitem><para>Set the location of the PID	file.</para></listitem>      </varlistentry>      <varlistentry>	<term>command</term>	<listitem><para>Run a command.  The available commands are	listed in the next section.</para></listitem>      </varlistentry>    </variablelist>  </refsect1>  <refsect1>    <title>Commands</title>    <para>The following commands are available:</para>    <variablelist>      <varlistentry>	<term>status</term>	<listitem>	  <para>get current WPA/EAPOL/EAP status</para>	</listitem>      </varlistentry>      <varlistentry>	<term>mib</term>	<listitem>	  <para>get MIB variables (dot1x, dot11)</para>	</listitem>      </varlistentry>      <varlistentry>	<term>help</term>	<listitem>	  <para>show this usage help</para>	</listitem>      </varlistentry>      <varlistentry>	<term>interface [ifname]</term>	<listitem>	  <para>show interfaces/select interface</para>	</listitem>      </varlistentry>      <varlistentry>	<term>level &lt;debug level&gt;</term>	<listitem>	  <para>change debug level</para>	</listitem>      </varlistentry>      <varlistentry>	<term>license</term>	<listitem>	  <para>show full wpa_cli license</para>	</listitem>      </varlistentry>      <varlistentry>	<term>logoff</term>	<listitem>	  <para>IEEE 802.1X EAPOL state machine logoff</para>	</listitem>      </varlistentry>      <varlistentry>	<term>logon</term>	<listitem>	  <para>IEEE 802.1X EAPOL state machine logon</para>	</listitem>      </varlistentry>      <varlistentry>	<term>set</term>	<listitem>	  <para>set variables (shows list of variables when run without arguments)</para>	</listitem>      </varlistentry>      <varlistentry>	<term>pmksa</term>	<listitem>	  <para>show PMKSA cache</para>	</listitem>      </varlistentry>      <varlistentry>	<term>reassociate</term>	<listitem>	  <para>force reassociation</para>	</listitem>      </varlistentry>      <varlistentry>	<term>reconfigure</term>	<listitem>	  <para>force wpa_supplicant to re-read its configuration file</para>	</listitem>      </varlistentry>      <varlistentry>	<term>preauthenticate &lt;BSSID&gt;</term>	<listitem>	  <para>force preauthentication</para>	</listitem>      </varlistentry>      <varlistentry>	<term>identity &lt;network id&gt; &lt;identity&gt;</term>	<listitem>	  <para>configure identity for an SSID</para>	</listitem>      </varlistentry>      <varlistentry>	<term>password &lt;network id&gt; &lt;password&gt;</term>	<listitem>	  <para>configure password for an SSID</para>	</listitem>      </varlistentry>      <varlistentry>	<term>pin &lt;network id&gt; &lt;pin&gt;</term>	<listitem>	  <para>configure pin for an SSID</para>	</listitem>      </varlistentry>      <varlistentry>	<term>otp &lt;network id&gt; &lt;password&gt;</term>	<listitem>	  <para>configure one-time-password for an SSID</para>	</listitem>      </varlistentry>      <varlistentry>	<term>bssid *lt;network id&gt; &lt;BSSID&gt;</term>	<listitem>	  <para>set preferred BSSID for an SSID</para>	</listitem>      </varlistentry>      <varlistentry>	<term>list_networks</term>	<listitem>	  <para>list configured networks</para>	</listitem>      </varlistentry>      <varlistentry>	<term>terminate</term>	<listitem>	  <para>terminate <command>wpa_supplicant</command></para>	</listitem>      </varlistentry>      <varlistentry>	<term>quit</term>	<listitem><para>exit wpa_cli</para></listitem>      </varlistentry>    </variablelist>  </refsect1>  <refsect1>    <title>See Also</title>    <para>      <citerefentry>	<refentrytitle>wpa_supplicant</refentrytitle>	<manvolnum>8</manvolnum>      </citerefentry>    </para>  </refsect1>  <refsect1>    <title>Legal</title>    <para>wpa_supplicant is copyright (c) 2003-2005,    Jouni Malinen <email>jkmaline@cc.hut.fi</email> and    contributors.    All Rights Reserved.</para>    <para>This program is dual-licensed under both the GPL version 2    and BSD license. Either license may be used at your option.</para>  </refsect1></refentry>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧洲一区二区三区在线| 日韩不卡一区二区| 国产精品羞羞答答xxdd| 日韩欧美国产午夜精品| 国产在线视频一区二区三区| 久久久久久毛片| 国产 日韩 欧美大片| 亚洲欧洲一区二区三区| 在线欧美日韩精品| 日韩黄色免费电影| 久久久久久影视| 色域天天综合网| 日本在线不卡一区| 中文字幕高清不卡| 欧美色老头old∨ideo| 奇米在线7777在线精品| 国产色婷婷亚洲99精品小说| 99久久精品国产毛片| 亚洲福利一二三区| 国产亚洲欧美日韩在线一区| 色综合激情久久| 青青草国产精品97视觉盛宴| 久久久噜噜噜久久人人看| 91美女片黄在线观看91美女| 琪琪一区二区三区| |精品福利一区二区三区| 91麻豆精品91久久久久同性| 国产精品77777竹菊影视小说| 中文字幕一区av| 欧美一区二区三区视频在线| 成人av电影在线播放| 日本三级亚洲精品| 国产日韩精品视频一区| 欧美丰满少妇xxxxx高潮对白| 粉嫩一区二区三区性色av| 一区二区三区免费在线观看| 精品国产一二三| 欧美在线观看18| 成人永久看片免费视频天堂| 国产乱人伦偷精品视频免下载| 亚洲视频在线观看三级| 精品裸体舞一区二区三区| 91在线你懂得| 狠狠色伊人亚洲综合成人| 亚洲香肠在线观看| 中文字幕一区av| 26uuu色噜噜精品一区| 欧美日韩一卡二卡三卡| 97国产精品videossex| 国产一区二区在线观看免费| 五月天丁香久久| 亚洲欧洲制服丝袜| 国产精品久久久久久久浪潮网站 | 亚洲国产日韩精品| 久久精品人人做| 欧美一区二区三区公司| 欧美日韩一区二区在线观看| 91丨porny丨首页| 北岛玲一区二区三区四区 | 国产一区二区三区日韩 | 国产一区二区看久久| 日韩经典中文字幕一区| 一区二区三区精品| 亚洲色图在线视频| 中文字幕在线免费不卡| 中文字幕乱码亚洲精品一区| 国产亚洲午夜高清国产拍精品| 2022国产精品视频| 亚洲精品一区二区三区在线观看| 日韩欧美一二区| 欧美一区二区三区免费观看视频| 欧美男女性生活在线直播观看| 欧美在线视频全部完| 日本韩国精品在线| 日本精品一级二级| 欧美三级韩国三级日本三斤| 在线观看三级视频欧美| 在线一区二区三区| 欧美日韩国产成人在线91| 欧美日韩国产综合视频在线观看| 欧美亚洲国产一区二区三区va| 在线精品视频一区二区| 欧美亚洲一区三区| 欧美妇女性影城| 欧美一区二区三区在线电影| 欧美草草影院在线视频| 337p日本欧洲亚洲大胆精品| 国产婷婷色一区二区三区在线| 国产性色一区二区| 亚洲精品高清在线观看| 亚洲v中文字幕| 免费人成网站在线观看欧美高清| 久久er精品视频| 粉嫩久久99精品久久久久久夜| 成人免费福利片| 91国模大尺度私拍在线视频| 欧美日韩精品免费| 久久综合色8888| 亚洲欧美在线aaa| 亚洲va欧美va人人爽| 久久国产精品免费| 欧美系列在线观看| 欧美精品一区二区三区在线播放| 国产精品视频看| 亚洲成人资源在线| 国产91丝袜在线播放| 欧美综合天天夜夜久久| 欧美大片国产精品| 亚洲视频你懂的| 麻豆freexxxx性91精品| 99免费精品视频| 日韩欧美一级片| 亚洲免费成人av| 狠狠狠色丁香婷婷综合激情| 在线免费观看一区| 久久久久高清精品| 亚洲一区二区三区不卡国产欧美| 国精品**一区二区三区在线蜜桃| 色综合久久中文综合久久97| 欧美一级片免费看| 亚洲视频网在线直播| 精品一区在线看| 色天天综合久久久久综合片| 久久亚洲一区二区三区四区| 亚洲线精品一区二区三区| 成人永久免费视频| 亚洲精品一线二线三线无人区| 亚洲最新视频在线观看| 国产成人av资源| 日韩一区二区三区免费看| 一区二区成人在线| 成人免费视频app| 日韩精品一区二区三区四区视频| 亚洲美女免费视频| 成人蜜臀av电影| 欧美va亚洲va| 日精品一区二区| 91国内精品野花午夜精品| 国产日韩欧美在线一区| 久久精品国产99国产精品| 欧美三级蜜桃2在线观看| 亚洲视频综合在线| 成人激情综合网站| 国产日韩欧美电影| 国产一区二区三区在线看麻豆| 欧美乱妇20p| 婷婷激情综合网| 欧美性猛片aaaaaaa做受| 国产精品传媒入口麻豆| 国产69精品久久久久777| 亚洲精品一区二区三区精华液 | 日韩免费观看高清完整版在线观看| 亚洲欧美一区二区三区久本道91| 高清视频一区二区| 国产欧美视频一区二区三区| 国内一区二区视频| 欧美精品一区二区三区在线| 寂寞少妇一区二区三区| 日韩你懂的在线播放| 精品无人码麻豆乱码1区2区| 精品国产污污免费网站入口 | 欧美色综合久久| 亚洲福中文字幕伊人影院| 欧美亚洲国产一区二区三区va| 一区二区成人在线观看| 欧美探花视频资源| 亚洲小说欧美激情另类| 欧美欧美欧美欧美首页| 日日夜夜精品视频天天综合网| 欧美福利一区二区| 久久精品av麻豆的观看方式| 亚洲精品少妇30p| av一区二区三区在线| 亚洲理论在线观看| 欧美日韩一区高清| 美女性感视频久久| 精品1区2区在线观看| 成人精品国产一区二区4080 | 亚洲国产日韩一级| 91精品一区二区三区在线观看| 午夜电影久久久| 日韩精品中文字幕一区二区三区 | 国产一区不卡在线| 久久久久久免费网| 91免费观看在线| 天堂va蜜桃一区二区三区漫画版| 欧美成人女星排名| 国产成人精品1024| 亚洲自拍偷拍综合| 2014亚洲片线观看视频免费| 99精品黄色片免费大全| 性久久久久久久| 久久久久国色av免费看影院| 色偷偷成人一区二区三区91| 日韩av电影免费观看高清完整版 | 成人综合激情网| 亚洲综合视频网| 精品999久久久| 在线免费亚洲电影| 国产精品一二三|