原文:https://blog.csdn.net/hanlunko2016/article/details/81276248

一. Wpa_supplicant 启动脚本:
      wpa_supplicant -Dnl80211 -iwlan0 -c/data/misc/wifi/wpa_supplicant.conf  -O/data/misc/wifi/sockets

二. Wpa_cli 启动:
      wpa_cli是命令行界面下的无线网连接工具,在wpa_supplicant运行的基础上,打开wpa_cli:

wpa_cli -iwlan0 -p/data/misc/wifi/sockets

三. wpa_cli 整套指令如下:
root@:/system/bin # wpa_cli -iwlan0 -p/data/misc/wifi/sockets

wpa_cli v2.5-devel-6.0

Copyright (c) 2004-2015, Jouni Malinen <j@w1.fi> and contributors

This software may be distributed under the terms of the BSD license.

See README for more details.

Interactive mode

> help

commands:

status [verbose] = get current WPA/EAPOL/EAP status

ifname = get current interface name

ping = pings wpa_supplicant

relog = re-open log-file (allow rolling logs)

note <text> = add a note to wpa_supplicant debug log

mib = get MIB variables (dot1x, dot11)

help [command] = show usage help

interface [ifname] = show interfaces/select interface

level <debug level> = change debug level

license = show full wpa_cli license

quit = exit wpa_cli

set = set variables (shows list of variables when run without arguments)

dump = dump config variables

get <name> = get information

logon = IEEE 802.1X EAPOL state machine logon

logoff = IEEE 802.1X EAPOL state machine logoff

pmksa = show PMKSA cache

pmksa_flush = flush PMKSA cache entries

reassociate = force reassociation

reattach = force reassociation back to the same BSS

preauthenticate <BSSID> = force preauthentication

identity <network id> <identity> = configure identity for an SSID

password <network id> <password> = configure password for an SSID

new_password <network id> <password> = change password for an SSID

pin <network id> <pin> = configure pin for an SSID

otp <network id> <password> = configure one-time-password for an SSID

passphrase <network id> <passphrase> = configure private key passphrase

for an SSID

sim <network id> <pin> = report SIM operation result

bssid <network id> <BSSID> = set preferred BSSID for an SSID

blacklist <BSSID> = add a BSSID to the blacklist

blacklist clear = clear the blacklist

blacklist = display the blacklist

log_level <level> [<timestamp>] = update the log level/timestamp

log_level = display the current log level and log options

list_networks = list configured networks

select_network <network id> = select a network (disable others)

enable_network <network id> = enable a network

disable_network <network id> = disable a network

add_network = add a network

remove_network <network id> = remove a network

set_network <network id> <variable> <value> = set network variables (shows

list of variables when run without arguments)

get_network <network id> <variable> = get network variables

dup_network <src network id> <dst network id> <variable> = duplicate network variables

list_creds = list configured credentials

add_cred = add a credential

remove_cred <cred id> = remove a credential

set_cred <cred id> <variable> <value> = set credential variables

get_cred <cred id> <variable> = get credential variables

save_config = save the current configuration

disconnect = disconnect and wait for reassociate/reconnect command before

connecting

reconnect = like reassociate, but only takes effect if already disconnected

scan = request new BSS scan

scan_results = get latest scan results

bss <<idx> | <bssid>> = get detailed scan result info

get_capability <eap/pairwise/group/key_mgmt/proto/auth_alg/channels/freq/modes> = get capabilities

reconfigure = force wpa_supplicant to re-read its configuration file

terminate = terminate wpa_supplicant

interface_add <ifname> <confname> <driver> <ctrl_interface> <driver_param>

<bridge_name> = adds new interface, all parameters but <ifname>

are optional

interface_remove <ifname> = removes the interface

interface_list = list available interfaces

ap_scan <value> = set ap_scan parameter

scan_interval <value> = set scan_interval parameter (in seconds)

bss_expire_age <value> = set BSS expiration age parameter

bss_expire_count <value> = set BSS expiration scan count parameter

bss_flush <value> = set BSS flush age (0 by default)

stkstart <addr> = request STK negotiation with <addr>

ft_ds <addr> = request over-the-DS FT with <addr>

wps_pbc [BSSID] = start Wi-Fi Protected Setup: Push Button Configuration

wps_pin <BSSID> [PIN] = start WPS PIN method (returns PIN, if not hardcoded)

wps_check_pin <PIN> = verify PIN checksum

wps_cancel Cancels the pending WPS operation

wps_nfc [BSSID] = start Wi-Fi Protected Setup: NFC

wps_nfc_config_token <WPS|NDEF> = build configuration token

wps_nfc_token <WPS|NDEF> = create password token

wps_nfc_tag_read <hexdump of payload> = report read NFC tag with WPS data

nfc_get_handover_req <NDEF> <WPS> = create NFC handover request

nfc_get_handover_sel <NDEF> <WPS> = create NFC handover select

nfc_report_handover <role> <type> <hexdump of req> <hexdump of sel> = report completed NFC handover

wps_reg <BSSID> <AP PIN> = start WPS Registrar to configure an AP

wps_ap_pin [params..] = enable/disable AP PIN

wps_er_start [IP address] = start Wi-Fi Protected Setup External Registrar

wps_er_stop = stop Wi-Fi Protected Setup External Registrar

wps_er_pin <UUID> <PIN> = add an Enrollee PIN to External Registrar

wps_er_pbc <UUID> = accept an Enrollee PBC using External Registrar

wps_er_learn <UUID> <PIN> = learn AP configuration

wps_er_set_config <UUID> <network id> = set AP configuration for enrolling

wps_er_config <UUID> <PIN> <SSID> <auth> <encr> <key> = configure AP

wps_er_nfc_config_token <WPS/NDEF> <UUID> = build NFC configuration token

ibss_rsn <addr> = request RSN authentication with <addr> in IBSS

sta <addr> = get information about an associated station (AP)

all_sta = get information about all associated stations (AP)

deauthenticate <addr> = deauthenticate a station

disassociate <addr> = disassociate a station

chan_switch <cs_count> <freq> [sec_channel_offset=] [center_freq1=] [center_freq2=] [bandwidth=] [blocktx] [ht|vht] = CSA parameters

suspend = notification of suspend/hibernate

resume = notification of resume/thaw

roam <addr> = roam to the specified BSS

p2p_find [timeout] [type=*] = find P2P Devices for up-to timeout seconds

p2p_stop_find = stop P2P Devices search

p2p_asp_provision <addr> adv_id=<adv_id> conncap=<conncap> [info=<infodata>] = provision with a P2P ASP Device

p2p_asp_provision_resp <addr> adv_id=<adv_id> [role<conncap>] [info=<infodata>] = provision with a P2P ASP Device

p2p_connect <addr> <"pbc"|PIN> [ht40] = connect to a P2P Device

p2p_listen [timeout] = listen for P2P Devices for up-to timeout seconds

p2p_group_remove <ifname> = remove P2P group interface (terminate group if GO)

p2p_group_add [ht40] = add a new P2P group (local end as GO)

p2p_prov_disc <addr> <method> = request provisioning discovery

p2p_get_passphrase = get the passphrase for a group (GO only)

p2p_serv_disc_req <addr> <TLVs> = schedule service discovery request

p2p_serv_disc_cancel_req <id> = cancel pending service discovery request

p2p_serv_disc_resp <freq> <addr> <dialog token> <TLVs> = service discovery response

p2p_service_update = indicate change in local services

p2p_serv_disc_external <external> = set external processing of service discovery

p2p_service_flush = remove all stored service entries

p2p_service_add <bonjour|upnp|asp> <query|version> <response|service> = add a local service

p2p_service_rep asp <auto> <adv_id> <svc_state> <svc_string> [<svc_info>] = replace local ASP service

p2p_service_del <bonjour|upnp> <query|version> [|service] = remove a local service

p2p_reject <addr> = reject connection attempts from a specific peer

p2p_invite <cmd> [peer=addr] = invite peer

p2p_peers [discovered] = list known (optionally, only fully discovered) P2P peers

p2p_peer <address> = show information about known P2P peer

p2p_set <field> <value> = set a P2P parameter

p2p_flush = flush P2P state

p2p_cancel = cancel P2P group formation

p2p_unauthorize <address> = unauthorize a peer

p2p_presence_req [<duration> <interval>] [<duration> <interval>] = request GO presence

p2p_ext_listen [<period> <interval>] = set extended listen timing

p2p_remove_client <address|iface=address> = remove a peer from all groups

wfd_subelem_set <subelem> [contents] = set Wi-Fi Display subelement

wfd_subelem_get <subelem> = get Wi-Fi Display subelement

fetch_anqp = fetch ANQP information for all APs

stop_fetch_anqp = stop fetch_anqp operation

interworking_select [auto] = perform Interworking network selection

interworking_connect <BSSID> = connect using Interworking credentials

interworking_add_network <BSSID> = connect using Interworking credentials

anqp_get <addr> <info id>[,<info id>]... = request ANQP information

gas_request <addr> <AdvProtoID> [QueryReq] = GAS request

gas_response_get <addr> <dialog token> [start,len] = Fetch last GAS response

hs20_anqp_get <addr> <subtype>[,<subtype>]... = request HS 2.0 ANQP information

nai_home_realm_list <addr> <home realm> = get HS20 nai home realm list

hs20_icon_request <addr> <icon name> = get Hotspot 2.0 OSU icon

fetch_osu = fetch OSU provider information from all APs

cancel_fetch_osu = cancel fetch_osu command

sta_autoconnect <0/1> = disable/enable automatic reconnection

tdls_discover <addr> = request TDLS discovery with <addr>

tdls_setup <addr> = request TDLS setup with <addr>

tdls_teardown <addr> = tear down TDLS with <addr>

tdls_link_status <addr> = TDLS link status with <addr>

wmm_ac_addts <uplink/downlink/bidi> <tsid=0..7> <up=0..7> [nominal_msdu_size=#] [mean_data_rate=#] [min_phy_rate=#] [sba=#] [fixed_nominal_msdu] = add WMM-AC traffic stream

wmm_ac_delts <tsid> = delete WMM-AC traffic stream

wmm_ac_status = show status for Wireless Multi-Media Admission-Control

tdls_chan_switch <addr> <oper class> <freq> [sec_channel_offset=] [center_freq1=] [center_freq2=] [bandwidth=] [ht|vht] = enable channel switching with TDLS peer

tdls_cancel_chan_switch <addr> = disable channel switching with TDLS peer <addr>

signal_poll = get signal parameters

pktcnt_poll = get TX/RX packet counters

reauthenticate = trigger IEEE 802.1X/EAPOL reauthentication

wnm_sleep <enter/exit> [interval=#] = enter/exit WNM-Sleep mode

wnm_bss_query <query reason> = Send BSS Transition Management Query

raw <params..> = Sent unprocessed command

flush = flush wpa_supplicant state

driver <command> = driver private commands

radio_work = radio_work <show/add/done>

vendor <vendor id> <command id> [<hex formatted command argument>] = Send vendor command

neighbor_rep_request [ssid=<SSID>] = Trigger request to AP for neighboring AP report (with optional given SSID, default: current SSID)

erp_flush = flush ERP keys

mac_rand_scan <scan|sched|pno|all> enable=<0/1> [addr=mac-address mask=mac-address-mask] = scan MAC randomization

>

常用的指令如下:

1. 打开debug log  :   wpa_cli -iwlan0 -p/data/misc/wifi/sockets log_level debug

2. scan:打开后扫描AP

3. scan_results:显示扫描结果

4. status:列出目前的联网状态。

5. ist_networks:列出所有备选网络。目前正连接到的网络会标[CURRENT],禁用的网络会标[DISABLE]。

6. add_network:增加一个备选网络,输出新网络的号码(这个号码替代下文的[network_id])。注意新网络此时是禁用状态。

7. set_network [network_id] ssid “Your SSID”:设置无线网的名称(SSID)

8. set_network [network_id] key_mgmt WPA-PSK:设置无线网的加密方式为WPA-PSK/WPA2-PSK

9. set_network [network_id] psk “Your Password”:设置无线网的PSK密码

10. enable_network [network_id]:启用网络。启用后如果系统搜索到了这个网络,就会尝试连接。

11. disable_network [network_id]:禁用网络。

12. save_config:保存配置。

e.g.

>add_network

0<---    新网络的号码

>set_network 0 ssid "TP-LINK_HyFi_75"

ok

>set_network 0 key_mgmt WPA-PSK

ok

>set_network 0 psk "147258369"

ok

>enable_network 0

ok

>save_config<--------别忘了这个,否则重启之后网络配置可能丢失

ok

四. demo
       wpa_supplicant log:

wlan0: Control interface command 'SCAN TYPE=ONLY'  //scan

wlan0: Control interface command 'ADD_NETWORK'    //add_network x :  增加一个备选网络,输出新网络的号码(这个号码替代下文的[network_id])。注意新网络此时是禁用状态

CTRL_IFACE: ADD_NETWORK

wlan0: Control interface command 'SET_NETWORK [REMOVED]'   //set_network [network_id] ssid “Your SSID”:设置无线网的名称(SSID)

CTRL_IFACE: SET_NETWORK id=0 name='ssid'

ssid - hexdump(len=15): 54 50 2d 4c 49 4e 4b 5f 5a 48 45 4e 32 2e 34

wlan0: Control interface command 'SET_NETWORK [REMOVED]'   //set_network [network_id] key_mgmt WPA-PSK:设置无线网的加密方式为WPA-PSK/WPA2-PSK

CTRL_IFACE: SET_NETWORK id=0 name='key_mgmt'

key_mgmt: 0x4

wlan0: Control interface command 'SET_NETWORK [REMOVED]'   //set_network [network_id] priority x:设置network 的优先级

CTRL_IFACE: SET_NETWORK id=0 name='priority'

priority=0 (0x0)

wlan0: Control interface command 'ENABLE_NETWORK 0'        //enable_network [network_id]:启用网络。启用后如果系统搜索到了这个网络,就会尝试连接

CTRL_IFACE: ENABLE_NETWORK id=0

wlan0: Control interface command 'SELECT_NETWORK 0'          //select_network [networi_id]:  选择network进行连接

CTRL_IFACE: SELECT_NETWORK id=0

Fast associate: Old scan results

wlan0: Setting scan request: 0.000000 sec

wlan0: Control interface command 'RECONNECT' // reconnect : like reassociate, but only takes effect if already disconnected

实操:

> scan

OK

<3>CTRL-EVENT-STATE-CHANGE id=-1 state=3 BSSID=00:00:00:00:00:00 SSID=

<3>CTRL-EVENT-SCAN-STARTED

<3>CTRL-EVENT-SCAN-RESULTS

<3>WPS-AP-AVAILABLE

<3>CTRL-EVENT-STATE-CHANGE id=-1 state=2 BSSID=00:00:00:00:00:00 SSID=

<3>CTRL-EVENT-NETWORK-NOT-FOUND

>

> scan_results

bssid / frequency / signal level / flags / ssid

04:a1:51:8a:9c:ae 5745      -53  [WPA2-PSK-CCMP][WPS][ESS]   NETGEAR-63-5G

8c:be:be:2d:3f:28  5785      -60  [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][WPS][ESS]       XIaomi_5G

50:bd:5f:15:36:18  5785      -63  [WPA-PSK-CCMP][WPA2-PSK-CCMP][WPS][ESS]       TP-LINK_ZHEN_5G

ec:26:ca:3a:fa:ba  5745      -68  [WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]   Lw_5G

50:bd:5f:15:36:19  2442      -53  [WPA-PSK-CCMP][WPA2-PSK-CCMP][WPS][ESS]       TP-LINK_ZHEN_2.4G

8c:be:be:2d:3f:27  2437      -55  [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][WPS][ESS]       Xiaomi_2.4G

80:89:17:ab:c0:7f  2437      -62  [WPA-PSK-CCMP][WPA2-PSK-CCMP][WPS][ESS]      sa10

ec:26:ca:87:83:02 2437      -64  [WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]   TP-LINK_8302

ec:26:ca:3a:fa:bb  2422      -65  [WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]   Lw_24G

80:89:17:ab:c0:7e 5745      -73  [WPA-PSK-CCMP][WPA2-PSK-CCMP][WPS][ESS]      sa10_5G

28:6c:07:51:1b:46 2447      -55  [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][WPS][ESS]       Xiaomi_test_ZZ

40:e3:d6:8f:59:62  2462      -56  [WPA2-EAP-CCMP][ESS]      mtkinternet

40:e3:d6:8f:59:61  2462      -59  [WPA-EAP-CCMP+TKIP][WPA2-EAP-CCMP+TKIP][ESS]

98:fc:11:4d:c7:a2  2412      -61  [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][WPS][ESS]      linksys

50:bd:5f:93:ee:ac  2412      -63  [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][WPS][ESS]      abcd

28:6c:07:51:1b:47 5745      -82  [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][WPS][ESS]       Xiaomi_test_ZZ_5G

38:97:d6:18:c4:12 2412      -60  [WPA-PSK-TKIP][WPA2-PSK-TKIP][ESS]  wnw

c8:02:10:b4:ab:61 2462      -69  [WPA2-PSK-CCMP][ESS]      LG_MusicFlow_DL_3193

70:f9:6d:31:e0:00  2462      -75  [WPA2-PSK-CCMP][ESS]      MPR-wifi

80:89:17:f4:cb:77  2437      -78  [WPA-PSK-CCMP][WPA2-PSK-CCMP][WPS][ESS]       TP-LINK_2.4G_MT3

6c:f3:7f:38:ff:eb    5785      -85  [WPA2-EAP-CCMP][ESS]      mtkemp

6c:f3:7f:38:ff:ea    5785      -86  [WPA2-EAP-CCMP][ESS]      mtkinternet

64:09:80:1f:17:be  2462      -75  [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][WPS][ESS]       SS2_Xiaomi

40:e3:d6:8f:59:41  2462      -75  [WPA-EAP-CCMP+TKIP][WPA2-EAP-CCMP+TKIP][ESS]

ec:6c:9f:22:de:01  2437      -75  [WPA2-PSK-CCMP][ESS]      estar

40:e3:d6:8f:59:43  2462      -76  [WPA2-EAP-CCMP][ESS]      mtkemp

38:97:d6:18:d4:32 2412      -76  [WPA-PSK-TKIP][WPA2-PSK-TKIP][ESS]  wnw

40:e3:d6:8f:59:42  2462      -77  [WPA2-EAP-CCMP][ESS]      mtkinternet

6c:f3:7f:38:ff:e9    5785      -87  [WPA-EAP-CCMP+TKIP][WPA2-EAP-CCMP+TKIP][ESS]

80:89:17:f4:cb:76  5785      -89  [WPA-PSK-CCMP][WPA2-PSK-CCMP][WPS][ESS]      TP-LINK_5G_MT3

b8:a3:86:55:8f:b2  2437      -79  [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][WPS][ESS]       SS7_VPN

40:e3:d6:8f:59:83  2462      -81  [WPA2-EAP-CCMP][ESS]      mtkemp

38:97:d6:18:c4:00 5805      -85  [WPA-PSK-TKIP][WPA2-PSK-TKIP][ESS]  wnwyanfa

40:e3:d6:8f:59:81  2462      -82  [WPA-EAP-CCMP+TKIP][WPA2-EAP-CCMP+TKIP][ESS]

0c:72:2c:4f:41:66  2427      -88  [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][WPS][ESS]       0000aaaa

40:e3:d6:8f:59:64  2462      -57  [WEP][ESS] mtklab

40:e3:d6:8f:59:44  2462      -75  [WEP][ESS] mtklab

6c:f3:7f:38:ff:ec    5785      -86  [WEP][ESS] mtklab

04:a1:51:8a:9c:ac 2422      -56  [WPS][ESS] NETGEAR-63-2.4G

e4:d3:32:cd:74:b3 2412      -57  [WPS][ESS] rongweim

40:e3:d6:8f:59:60  2462      -57  [ESS]     mtkguest

fc:75:16:a3:95:d0  2462      -76  [WPS][ESS] dlink

00:0c:43:28:08:88 2437      -78  [ESS]     MT7623_AP_2.4G

6c:f3:7f:38:ff:e8    5785      -85  [ESS]     mtkguest

40:e3:d6:8f:59:40  2462      -75  [ESS]     mtkguest

6c:f3:7f:38:ff:e0    2462      -85  [ESS]     mtkguest

> list_network

network id / ssid / bssid / flags

0       Xiaomi_5G   any [DISABLED]

1       D8_5GHZ    any [DISABLED]

2       SS7_VPN    any [DISABLED]

3       Xiaomi_2.4G       any [DISABLED]

4       XIaomi_5G   any [DISABLED]

5       hello       any [DISABLED]

6       NETGEAR6200  any [DISABLED]

7       NETGEAR6200_5G  any [DISABLED]

8       NETGEAR-63-2.4G  any [DISABLED]

9       DLink88_24G      any [DISABLED]

> add_network 10

10

> set_network 10 ssid "NETGEAR-63-5G"

OK

> list_network

network id / ssid / bssid / flags

0       Xiaomi_5G   any [DISABLED]

1       D8_5GHZ    any [DISABLED]

2       SS7_VPN    any [DISABLED]

3       Xiaomi_2.4G       any [DISABLED]

4       XIaomi_5G   any [DISABLED]

5       hello       any [DISABLED]

6       NETGEAR6200  any [DISABLED]

7       NETGEAR6200_5G  any [DISABLED]

8       NETGEAR-63-2.4G  any [DISABLED]

9       DLink88_24G      any [DISABLED]

10     NETGEAR-63-5G     any [DISABLED]

> set_network 10 key_mgmt WPA-PSK

OK

> set_network 10 psk "11111111"

OK

> get_network 10 key_mgmt

WPA-PSK

> get_network 10 psk

*

> enable_network 10

OK

<3>CTRL-EVENT-STATE-CHANGE id=-1 state=3 BSSID=00:00:00:00:00:00 SSID=

<3>CTRL-EVENT-SCAN-STARTED

<3>CTRL-EVENT-SCAN-RESULTS

<3>WPS-AP-AVAILABLE

<3>Trying to associate with [18434.676000] 80211> Connect bssid 04:a1:51:8a:9c:ae

> select_network 10

OK

> reconnect

OK

> list_network

network id / ssid / bssid / flags

0       Xiaomi_5G   any [DISABLED]

1       D8_5GHZ    any [DISABLED]

2       SS7_VPN    any [DISABLED]

3       Xiaomi_2.4G       any [DISABLED]

4       XIaomi_5G   any [DISABLED]

5       hello       any [DISABLED]

6       NETGEAR6200  any [DISABLED]

7       NETGEAR6200_5G  any [DISABLED]

8       NETGEAR-63-2.4G  any [DISABLED]

9       DLink88_24G      any [DISABLED]

10     NETGEAR-63-5G     any [CURRENT]

> save_config

OK

> status

bssid=04:a1:51:8a:9c:ae

freq=5745

ssid=NETGEAR-63-5G

id=10

mode=station

pairwise_cipher=CCMP

group_cipher=CCMP

key_mgmt=WPA2-PSK

wpa_state=COMPLETED

ip_address=10.0.0.5

address=00:6c:fd:ab:68:be

uuid=12345678-9abc-def0-1234-56789abcdef0

<3>CTRL-EVENT-STATE-CHANGE id=10 state=9 BSSID=04:a1:51:8a:9c:ae SSID=NETGEAR-63-5G

<3>CTRL-EVENT-CONNECTED - connection to 04:a1:51:8a:9c:ae completed (auth) [id=10 id_str=]

保存后的wap_supplicant.conf

root@:/system/bin # cd /data/misc/wifi/

root@:/data/misc/wifi # cat wpa_supplicant

wpa_supplicant.conf wpa_supplicant/

at wpa_supplicant.conf                                                        <

ctrl_interface=/data/misc/wifi/sockets

driver_param=p2p_capable=0

update_config=1

uuid=12345678-9abc-def0-1234-56789abcdef0

device_name=full

manufacturer= Group Co., Ltd

model_name=Android TV

model_number=Android TV

serial_number=123456789

device_type=10-0050F204-5

os_version=01020300

config_methods=physical_display virtual_push_button

external_sim=1

wowlan_triggers=magic_pkt

network={

ssid="Xiaomi_5G"

psk="26630099"

key_mgmt=WPA-PSK

priority=12

disabled=1

}

network={

ssid="D8_5GHZ"

key_mgmt=NONE

priority=9

disabled=1

}

network={

ssid="SS7_VPN"

psk="12345678"

key_mgmt=WPA-PSK

priority=11

disabled=1

}

network={

ssid="Xiaomi_2.4G"

psk="26630099"

key_mgmt=WPA-PSK

priority=13

disabled=1

}

network={

ssid="XIaomi_5G"

psk="26630099"

key_mgmt=WPA-PSK

priority=18

disabled=1

}

network={

ssid="hello"

key_mgmt=NONE

priority=17

disabled=1

}

network={

ssid="NETGEAR6200"

psk="12345678"

key_mgmt=WPA-PSK

priority=19

disabled=1

}

network={

ssid="NETGEAR6200_5G"

psk="12345678"

key_mgmt=WPA-PSK

priority=27

disabled=1

}

network={

ssid="NETGEAR-63-2.4G"

psk="11111111"

key_mgmt=WPA-PSK

priority=56

disabled=1

}

network={

ssid="DLink88_24G"

psk="12345678"

key_mgmt=WPA-PSK

priority=38

disabled=1

}

network={

ssid="NETGEAR-63-5G"

psk="11111111"

key_mgmt=WPA-PSK

}

wpa_cli 操作指令使用指南相关推荐

  1. 2014年广州科目三道路驾驶技能考试/广汕路科目三路考系统操作和评判指南

    一 上车准备 上车准备操作要点: 绕车一周,观察车辆外观和周围环境,确认安全. 考生绕车一周,检查轮胎气压.轮胎磨损情况.轮胎螺栓有无松动,检查有无漏水.漏油等情况,车辆外观有无凹凸等碰撞情况,有无妨 ...

  2. ESP8266WiFi模块AT指令入门指南

    ESP8266WiFi模块AT指令入门指南      1.1.模块 AP 模式下做 TCP serve AT+CWMODE=2                        开启 AP 模式(串口助手 ...

  3. Hadoop常用的操作指令速查和讲解

    一.常用操作指令速查 假设Hadoop的安装目录HADOOP_HOME为/home/admin/hadoop.0.启动与关闭 启动Hadoop 进入HADOOP_HOME目录. 执行sh bin/st ...

  4. mysql kill 指令_MySQL kill指令使用指南

    KILL [CONNECTION | QUERY] processlist_id 在Mysql中每个连接都是单独线程运行,可以使用语句 KILL processlist_id statement.来终 ...

  5. ios快捷指令使用指南-TUST校园网认证自动连接登录

    ios快捷指令使用指南-TUST校园网认证自动连接登录 2021.9.1更新: 校园网登录页面更新后,部分规则变动,更新后快捷指令链接如下: https://www.icloud.com/shortc ...

  6. 十个效果酷炫的Linux系统操作指令(像黑客帝国般的效果~)

    点击上方"小白学视觉",选择加"星标"或"置顶" 重磅干货,第一时间送达 想想电影黑客帝国中的画面,估计会令很多人都叹为观止,其实最简单的只 ...

  7. python创建文件夹命令_python文件操作指令

    原文地址:http://www.cnblogs.com/rollenholt/archive/2012/04/23/2466179.html 常用的文件操作指令: python中对文件.文件夹(文件操 ...

  8. 汇编中的字符串操作指令

    每一种语言都有一些字符串操作函数,反汇编后的代码也不例外.网上讲的都比较零碎,我将它们收集起来,并配上自己的理解,形成本文. 一.字节操作指令:lodsb和stosb 1. lodsd需要寄存器esi ...

  9. linux(ubuntu)~终端(terminal)shell操作指令

    shell是指计算机操作指令,是用户.计算机程序.内核之间沟通的桥梁,是计算机图形化之前操作计算机的方式,现在包含:sh-shell.bash-shell.csh-shell.tcsh-shell.a ...

最新文章

  1. java 国际化例子_JavaSE 国际化 简单例子
  2. python 批量改名
  3. 通俗易懂,java8 .stream().map().collect()用法
  4. 前端学习(1960)vue之电商管理系统电商系统之分类参数的基本结构
  5. python小老鼠编程_邯郸pythonnot学习费用多少
  6. maven仲裁机制_maven仲裁机制
  7. python安装后没有命令_Python的下载安装
  8. 苹果发布会新品曝光 这款软件肯定用得上
  9. 全网首发:There is an incompatible JNA native library installed on this system/6.1.2/4.0.1
  10. Xcode低版本运行高版本真机(xcode9联调真机iOS12 系统)
  11. 【大猛子与曾经的无趣生活】
  12. Flutter安装后出现HTTP host not reachable.
  13. 深入理解Java虚拟机之Java类加载机制,Java类实例化过程详解。
  14. 用java创建person类_创建一个Person类,有以下属性:名字、身高、性别、年龄,创建10个对象,用java程序...
  15. Vim 进阶操作-移动
  16. 传奇服务器设置验证码,简单设置传奇服务端支持二级密码的办法
  17. 【经历】苹果企业账号申请记录,比想象中要简单
  18. iphone上用lua做了个doodlejump的菜单界面
  19. Lotus Notes的六个使用技巧
  20. DB2进行压缩的最佳实践

热门文章

  1. Python接口请求
  2. 双碳”目标下资源环境中的可计算一般均衡(CGE)模型技术应用
  3. 微科WMS智能仓储管理系统
  4. [渝粤教育] 西南科技大学 钢筋砼与砌体结构 在线考试复习资料(1)
  5. 【Unity3D日常开发】Unity3D项目的加密、激活思路分享
  6. 软件测试案例实践:银行如何做大规模自动化测试?
  7. 基本路径测试案例分析
  8. 2022 年 8 月初北上广深杭热门签到打卡点微博数据集
  9. 四非院校的我是如何从化工行业转行成为一名数据挖掘工程师的
  10. 马云身退,而未必功成!