__aeabi_unwind_cpp_pr0 __libc_start_main _fini _init __aeabi_unwind_cpp_pr1 __errno_location __stack_chk_fail __stack_chk_guard atoi bcmp fprintf free getenv getopt malloc memcpy optarg optind printf putchar puts snprintf stderr strcasecmp strchr strcmp strdup strerror strlen strncasecmp strncmp strstr __select_time64 bind close connect gethostbyname htonl htons inet_ntoa ntohs perror recv send socket stdout vprintf memset realloc strrchr __clock_gettime64 __gettimeofday_time64 calloc daemon execv exit fclose fflush fopen fork getpid setenv sleep unlink unsetenv usleep waitpid alarm memmove signal read dladdr __assert_fail abort dl_iterate_phdr unw_get_fpreg unw_get_proc_info unw_get_proc_name unw_get_reg unw_init_local unw_is_fpreg unw_is_signal_frame unw_local_addr_space unw_regname unw_resume unw_save_vfp_as_X unw_set_fpreg unw_set_reg unw_step _Unwind_Complete _Unwind_DeleteException _Unwind_GetLanguageSpecificData _Unwind_GetRegionStart _Unwind_RaiseException _Unwind_Resume _Unwind_VRS_Get _Unwind_VRS_Interpret _Unwind_VRS_Pop _Unwind_VRS_Set __aeabi_unwind_cpp_pr2 __gnu_unwind_frame decode_eht_entry unw_getcontext libc.so
ap_max_inactivity p2p_go_max_inactivity anonymous_identity wps_priority sp_priority discoverability get_capability country .wpa_cli_history Failed to allocate memory <addr> <method> = request provisioning discovery <external> = set external processing of service discovery temporary wps_nfc_dh_privkey wpa_ptk_rekey wps_nfc_dh_pubkey private_key Alternatively, six arguments can be used to reconfigure the AP: - BSSID of the target AP - AP PIN - new SSID - new auth (OPEN, WPAPSK, WPA2PSK) - new encr (NONE, WEP, TKIP, CCMP) - new key Invalid WPS_ER_CONFIG command: need six arguments: - AP UUID - AP PIN - new SSID - new auth (OPEN, WPAPSK, WPA2PSK) - new encr (NONE, WEP, TKIP, CCMP) - new key frequency wifi_display Invalid WPS_PIN command: need one or two arguments: - BSSID: use 'any' to select any - PIN: optional, used only with devices that have no display sched_scan_start_delay p2p_search_delay p2p_ssid_postfix wep_tx_keyidx %02x:%02x:%02x:%02x:%02x:%02x wps_nfc_dev_pw p2p_go_ctwindow raw = notification of resume/thaw ieee80211w execv a:Bg:G:hi:p:P:s:v ampdu dot11RSNAConfigSATimeout relative_band_adjust localhost bssid_blacklist <BSSID> = add a BSSID to the blacklist blacklist clear = clear the blacklist blacklist = display the blacklist bssid_whitelist p2p_client_list get_pref_freq_list psk_list interface_list neighbor_rep_request <id> = cancel pending service discovery request <addr> <TLVs> = schedule service discovery request client_cert ca_cert wps_er_start ip_addr_start p2p_lo_start EAPOL::maxStart bss_max_count bss_expiration_scan_count bss_expire_count beacon_int disc_int p2p_go_intent p2p_remove_client /var/run/wpa_supplicant = pings wpa_supplicant = terminate wpa_supplicant key_mgmt group_mgmt <network id> <pin> = report SIM operation result quit ELOOP: Too long timeout (secs=%u) to ever happen - ignore it p2p_go_vht p2p_set go_internet socket vendor_elem_get _Unwind_VRS_Set strict disconnect sta_autoconnect persistent_reconnect Connection to wpa_supplicant lost - trying to reconnect cross_connect p2p_connect select p2p_reject check_cert_subject = flush ERP keys tdls_link_status wmm_ac_status [verbose] = get current WPA/EAPOL/EAP status Invalid GET_CAPABILITY command: need either one or two arguments Invalid P2P_SERVICE_DEL command: needs two or three arguments Invalid P2P_SERVICE_REP command: needs 5-6 arguments Invalid P2P_SERVICE_ADD command: needs 3-6 arguments ap_vendor_elements scan_results = get latest scan results wmm_ac_delts wmm_ac_addts cbdata->sects Invalid WPS_ER_PIN command: need at least two arguments: - UUID: use 'any' to select any - PIN: Enrollee PIN optional: - Enrollee MAC address <dev_addr> = Get peer interface address on local GO using peer Device Address pbss p2p_intra_bss p2p_oper_reg_class p2p_listen_reg_class unsupported register class wpa_cli v2.9 Copyright (c) 2004-2019, Jouni Malinen <j@w1.fi> and contributors ProcessDescriptors = get TX/RX packet counters = set signal monitor parameters = get signal parameters openssl_ciphers wowlan_triggers p2p_peers [discovered] = list known (optionally, only fully discovered) P2P peers wps sae_groups <address|iface=address> = remove a peer from all groups oppps disallow_aps <level> [<timestamp>] = update the log level/timestamp log_level = display the current log level and log options channels = list configured credentials list_networks = list configured networks is driver_flags eapol_flags = list driver flags ignore_old_scan_res <cred id> <variable> <value> = set credential variables <cred id> <variable> = get credential variables <network id> <variable> = get network variables <src network id> <dst network id> <variable> = duplicate network variables = dump config variables <eap/pairwise/group/key_mgmt/proto/auth_alg/channels/freq/modes> = get capabilities = flush PMKSA cache entries = remove all stored service entries modes = indicate change in local services = list available interfaces index inlined table detected but pr function requires extra words config_methods [timeout] = listen for P2P Devices for up-to timeout seconds [timeout] [type=*] = find P2P Devices for up-to timeout seconds filter_ssids list_creds ft_ds ifname=%s CTRL-RSP-IDENTITY-%s:%s CTRL-RSP-OTP-%s:%s CTRL-RSP-PIN-%s:%s CTRL-RSP-SIM-%s:%s CTRL-RSP-PSK_PASSPHRASE-%s:%s CTRL-RSP-PASSPHRASE-%s:%s CTRL-RSP-NEW_PASSWORD-%s:%s CTRL-RSP-PASSWORD-%s:%s %s/%s P2P_PEER NEXT-%s IFNAME=%s %s WPS_ER_CONFIG %s %s %s %s %s %s WPS_REG %s %s %s %s %s %s P2P_SERV_DISC_RESP %s %s %s %s P2P_SERVICE_DEL %s %s %s P2P_SERVICE_DEL %s %s WPS_REG %s %s BSS_FLUSH %s > %s eloop: %s: %s connect(%s:%d) failed: %s INTERFACE_ADD %s %s %s %s %s %s %s %s id_str signal_monitor vendor lr osu_dir tdls_discover driver Unknown ARM float register unknown register unsupported arm register setRegister getRegister setFloatRegister getFloatRegister peer_filter bssid_filter <value> = set BSS expiration scan count parameter <value> = set ap_scan parameter <value> = set BSS expiration age parameter <field> <value> = set a P2P parameter manufacturer roaming_partner update_identifier p2p_peer <cmd> [peer=addr] = invite peer <addr> = reject connection attempts from a specific peer <address> = unauthorize a peer <addr> <oper class> <freq> [sec_channel_offset=] [center_freq1=] [center_freq2=] [bandwidth=] [ht|vht] = enable channel switching with TDLS peer <address> = show information about known P2P peer pcsc_reader wps_version_number model_number serial_number p2p_group_member go_p2p_dev_addr preassoc_mac_addr [IP address] = start Wi-Fi Protected Setup External Registrar = stop Wi-Fi Protected Setup External Registrar <UUID> <PIN> = add an Enrollee PIN to External Registrar <UUID> = accept an Enrollee PBC using External Registrar disallow_freq scan_cur_freq p2p_no_go_freq scan_freq fixed_freq p2p_ignore_shared_freq p2p_serv_disc_cancel_req p2p_presence_req p2p_serv_disc_req tdls_setup go_venue_group ctrl_interface_group otp p2p_asp_provision_resp p2p_serv_disc_resp ocsp provisioning_sp erp /data/82840-merged/toolchain/llvm-project/libunwind/src/Registers.hpp /data/82840-merged/toolchain/llvm-project/libunwind/src/UnwindCursor.hpp /data/82840-merged/toolchain/llvm-project/libunwind/src/AddressSpace.hpp /data/82840-merged/toolchain/llvm-project/libunwind/src/Unwind-EHABI.cpp wps_er_stop p2p_lo_stop _Unwind_VRS_Pop dump [command] = show usage help p2p_service_rep load_dynamic_eap ELOOP: remaining timeout: %d.%06d eloop_data=%p user_data=%p handler=%p ELOOP: remaining socket: sock=%d eloop_data=%p user_data=%p handler=%p proto pno ip_addr_go <<idx> | <bssid>> = get detailed scan result info tdls_teardown ibss_rsn _Unwind_Resume() can't return wps_er_learn daemon <0/1> = disable/enable automatic reconnection getInfoFromEHABISection <scan|sched|pno|all> enable=<0/1> [addr=mac-address mask=mac-address-mask] = scan MAC randomization = save the current configuration <UUID> <PIN> = learn AP configuration [BSSID] = start Wi-Fi Protected Setup: Push Button Configuration Cancels the pending WPS operation <name> = get information = cancel P2P group formation = force reassociation <BSSID> = force preauthentication = trigger IEEE 802.1X/EAPOL reauthentication os_version eapol_version p2p_asp_provision = IEEE 802.1X EAPOL state machine logon wps_pin wps_er_pin wps_ap_pin wps_check_pin pcsc_pin Invalid P2P_PROV_DISC command: needs at least two arguments, address and config method (display, keypad, or pbc) and an optional join domain p2p_ext_listen p2p_listen p2p_passphrase_len p2p_optimize_listen_chan p2p_add_cli_chan p2p_pref_chan autoscan bgscan abort_scan ap_scan passive_scan mac_rand_scan = request new BSS scan <PIN> = verify PIN checksum sim_num required_roaming_consortium realm reassoc_same_bss_optim external_sim driver_param roam <tsid> = delete WMM-AC traffic stream <uplink/downlink/bidi> <tsid=0..7> <up=0..7> [nominal_msdu_size=#] [mean_data_rate=#] [min_phy_rate=#] [sba=#] [fixed_nominal_msdu] = add WMM-AC traffic stream tdls_external_control = show status for Wireless Multi-Media Admission-Control pktcnt_poll signal_poll mixed_cell log_level <debug level> = change debug level p2p_oper_channel p2p_listen_channel p2p_service_del wps_cancel p2p_cancel sched_scan_interval p2p_serv_disc_external _Unwind_VRS_Get_Internal <cred id> = remove a credential = add a credential type=social global per_sta_psk ip_addr_mask set_network get_network select_network dup_network remove_network disable_network enable_network add_network <network id> = remove a network <network id> = disable a network <network id> = enable a network = add a network radio_work fork disassoc_low_ack filter_rssi relative_rssi imsi = exit wpa_cli fast_reauth max_oper_chwidth opensc_engine_path pkcs11_engine_path pkcs11_module_path ca_path wpa_cli [-p<path to ctrl sockets>] [-i<ifname>] [-hvB] [-a<action file>] \ [-P<pid file>] [-g<global ctrl>] [-G<ping interval>] \ [-s<wpa_client_socket_file_path>] [command..] -h = help (show this usage text) -v = shown version information -a = run in daemon mode executing the action file based on events from wpa_supplicant -B = run a daemon in the background default path: /var/run/wpa_supplicant default interface: first interface found in socket path bss_flush erp_flush p2p_flush p2p_service_flush pmksa_flush tdls_chan_switch tdls_cancel_chan_switch domain_suffix_match altsubject_match domain_match = stop P2P Devices search reattach relog <text> = add a note to wpa_supplicant debug log tdls_testing wpa_supplicant did not reply to PING command - exiting = disconnect and wait for reassociate/reconnect command before connecting wps_cred_processing wpa_supplicant is terminating - stop monitoring ping [<period> <interval>] = set extended listen timing min_ul_bandwidth_roaming min_dl_bandwidth_roaming <UUID> <network id> = set AP configuration for enrolling auto_interworking go_interworking proactive_key_caching auth_alg wps_er_set_config wps_er_config save_config wps_reg pmf = IEEE 802.1X EAPOL state machine logoff conc_pref wps_fragment_size p2p_unauthorize p2p_group_remove vendor_elem_remove interface_remove type=progressive no_keep_alive note p2p_invite = flush wpa_supplicant state = flush P2P state = notification of suspend/hibernate terminate ap_isolate reassociate p2p_service_update preauthenticate verbose <freq> <addr> <dialog token> <TLVs> = service discovery response = show full wpa_cli license false pairwise p2p_get_passphrase psk_passphrase reconfigure during phase1 personality function said it would stop here, but now in phase2 it did not stop here s are go_access_network_type go_venue_type sec_device_type <interface type> = retrieve preferred freq list for the specified interface type unknown personality routine engine resume _Unwind_Resume min_ul_bandwidth_home min_dl_bandwidth_home rand_addr_lifetime dot11RSNAConfigPMKLifetime unwindOneFrame gethostbyname username ifname model_name device_name = get current interface name dh_file pac_file = force wpa_supplicant to re-read its configuration file p2p_group_idle = show PMKSA cache milenage bss_expiration_age bss_expire_age mode [<duration> <interval>] [<duration> <interval>] = request GO presence <bonjour|upnp> <query|version> [|service] = remove a local service <bonjour|upnp|asp> <query|version> <response|service> = add a local service asp <auto> <adv_id> <svc_state> <svc_string> [<svc_info>] = replace local ASP service <addr> adv_id=<adv_id> [role<conncap>] [info=<infodata>] = provision with a P2P ASP Device <addr> adv_id=<adv_id> conncap=<conncap> [info=<infodata>] = provision with a P2P ASP Device <addr> <"pbc"|PIN> [ht40] = connect to a P2P Device no_ctrl_interface [ifname] = show interfaces/select interface Failed to open monitor connection through global control interface <ifname> = removes the interface p2p_no_group_iface private_key_passwd private_key2_passwd uapsd client_apsd go_apsd force_long_sd new_password bg_scan_period dtim_period EAPOL::startPeriod EAPOL::authPeriod EAPOL::heldPeriod eap_workaround p2p_stop_find p2p_find suspend ext_password_backend ip_addr_end <vendor id> <command id> [<hex formatted command argument>] = Send vendor command Too long command <params..> = Sent unprocessed command dot11RSNAConfigPMKReauthThreshold uuid hessid bssid ignore_broadcast_ssid scan_ssid excluded_ssid key_id wps_nfc_dev_pw_id ca_cert_id engine_id key2_id ca_cert2_id engine2_id Invalid WPS_ER_SET_CONFIG command: need two arguments: - UUID: specify which AP to use - Network configuration id = request ongoing scan to be aborted = like reassociate, but only takes effect if already disconnected discovered set_cred get_cred remove_cred add_cred wps_disabled tdls_disabled p2p_disabled radio_disabled Connection to wpa_supplicant re-established managed p2p_group_add vendor_elem_add p2p_service_add interface_add key_mgmt_offload disable_scan_offload <freq> <period> <interval> <count> = start P2P listen offload = stop P2P listen offload max_bss_load read p2p_prov_disc pcsc pc okc wps_pbc wps_er_pbc mib req_conn_capab max_num_sta cbdata pmksa noa [timeout] Invalid INTERFACE_ADD command: needs at least one argument (interface name) All arguments: ifname confname driver ctrl_interface driver_param bridge_name [create] [PROBE_REQ_ONLY] GET_CAPABILITY saveVFPAsX P2P_PEER FIRST GET_PREF_FREQ_LIST INTERFACE_LIST BLACKLIST NEIGHBOR_REP_REQUEST WPS_ER_START P2P_LO_START BSS_EXPIRE_COUNT P2P_REMOVE_CLIENT P2P_SET VENDOR_ELEM_GET P2P_CONNECT DISCONNECT STA_AUTOCONNECT RECONNECT P2P_REJECT TDLS_LINK_STATUS WMM_AC_STATUS SCAN_RESULTS WMM_AC_DELTS WMM_AC_ADDTS <addr> = request RSN authentication with <addr> in IBSS = force reassociation back to the same BSS <addr> = roam to the specified BSS STATUS-WPS LIST_NETWORKS LIBUNWIND_PRINT_APIS DRIVER_FLAGS INTERFACES FT_DS LIST_CREDS WPA_ID_STR SIGNAL_MONITOR VENDOR WPA_CTRL_DIR TDLS_DISCOVER STATUS-DRIVER P2P_PEER P2P_GROUP_MEMBER P2P_SERV_DISC_CANCEL_REQ P2P_PRESENCE_REQ P2P_SERV_DISC_REQ TDLS_SETUP P2P_ASP_PROVISION_RESP WPS_ER_STOP P2P_LO_STOP DUMP P2P_SERVICE_REP <BSSID> <AP PIN> = start WPS Registrar to configure an AP <UUID> <PIN> <SSID> <auth> <encr> <key> = configure AP TDLS_TEARDOWN IBSS_RSN WPS_ER_LEARN P2P_ASP_PROVISION LOGON WPS_PIN WPS_ER_PIN WPS_AP_PIN WPS_CHECK_PIN [params..] = enable/disable AP PIN Invalid WPS_ER_LEARN command: need two arguments: - UUID: specify which AP to use - PIN: AP PIN Invalid WPS_REG command: need two arguments: - BSSID of the target AP - AP PIN P2P_EXT_LISTEN P2P_LISTEN ABORT_SCAN AP_SCAN MAC_RAND_SCAN ROAM PKTCNT_POLL SIGNAL_POLL FAIL LOG_LEVEL WPS_CANCEL P2P_CANCEL SCAN_INTERVAL P2P_SERV_DISC_EXTERNAL RADIO_WORK SET_NETWORK GET_NETWORK SELECT_NETWORK DUP_NETWORK REMOVE_NETWORK DISABLE_NETWORK ENABLE_NETWORK ADD_NETWORK PREAUTH ERP_FLUSH P2P_FLUSH P2P_SERVICE_FLUSH PMKSA_FLUSH TDLS_CHAN_SWITCH TDLS_CANCEL_CHAN_SWITCH REATTACH DETACH RELOG PONG PING LIBUNWIND_PRINT_UNWINDING WPS_ER_SET_CONFIG SAVE_CONFIG LOGOFF P2P_UNAUTHORIZE P2P_GROUP_REMOVE VENDOR_ELEM_REMOVE INTERFACE_REMOVE NOTE P2P_INVITE TERMINATE REASSOCIATE P2P_SERVICE_UPDATE REAUTHENTICATE STATUS-VERBOSE P2P_GET_PASSPHRASE RECONFIGURE RESUME HOME IFNAME GET_COOKIE BSS_EXPIRE_AGE P2P_STOP_FIND P2P_FIND SUSPEND WPA_ID BSSID <network id> <identity> = configure identity for an SSID <network id> <pin> = configure pin for an SSID <network id> <PSK/passphrase> = configure PSK/passphrase for an SSID <network id> <password> = configure one-time-password for an SSID <network id> <password> = configure password for an SSID <network id> <password> = change password for an SSID <network id> <BSSID> = set preferred BSSID for an SSID <network id> <passphrase> = configure private key passphrase for an SSID DISCONNECTED SET_CRED GET_CRED REMOVE_CRED ADD_CRED P2P_GROUP_ADD VENDOR_ELEM_ADD P2P_SERVICE_ADD P2P_PROV_DISC WPS_PBC WPS_ER_PBC MIB PMKSA <addr> = disable channel switching with TDLS peer <addr> <addr> = request TDLS discovery with <addr> <addr> = TDLS link status with <addr> <addr> = request TDLS setup with <addr> <addr> = request over-the-DS FT with <addr> <addr> = tear down TDLS with <addr> = radio_work <show/add/done> delay= p2p_dev_addr= bssid= dev_id= [id= IFNAME= Available interfaces: Ambiguous command '%s'; possible commands: s9 r9 d9 s29 d29 s19 d19 s8 r8 d8 s28 d28 s18 d18 s7 r7 d7 s27 d27 s17 d17 s6 r6 d6 s26 d26 s16 d16 s5 r5 d5 s25 d25 s15 _use_X_for_vfp_save || !_saved_vfp_d0_d15 s4 r4 d4 s24 d24 s14 d14 wep_key3 s3 r3 d3 s23 d23 s13 d13 wep_key2 private_key2 BSS RANGE=ALL MASK=0x2 client_cert2 ca_cert2 check_cert_subject2 s2 r2 vht_center_freq2 pin2 ca_path2 domain_suffix_match2 altsubject_match2 domain_match2 unwind_phase2 engine2 dh_file2 d2 s22 d22 s12 r12 d12 wep_key1 s1 r1 vht_center_freq1 wps_vendor_ext_m1 pbc_in_m1 phase1 d1 s31 d31 s21 d21 s11 r11 d11 wep_key0 s0 r0 d0 p2p_go_ht40 s30 d30 s20 d20 s10 r10 d10 Warning: Failed to attach to wpa_supplicant. .anonymous. Invalid P2P_EXT_LISTEN command: needs two arguments (availability period, availability interval; in millisecods). Extended Listen Timing can be cancelled with this command when used without parameters. Invalid P2P_PRESENCE_REQ command: needs two arguments (preferred duration, interval; in microsecods). Optional second pair can be used to provide acceptable values. set_network variables: ssid (network name, SSID) psk (WPA passphrase or pre-shared key) key_mgmt (key management protocol) identity (EAP identity) password (EAP password) ... Note: Values are entered in the same format as the configuration file is using, i.e., strings values need to be inside double quotation marks. For example: set_network 1 ssid "network name" Please see wpa_supplicant.conf documentation for full list of available variables. Could not read pending message. Too long IDENTITY command. Too long SET command. Too long OTP command. Too long PIN command. Too long SIM command. Too long BSS_FLUSH command. Too long WPS_ER_CONFIG command. Too long WPS_REG command. Too long PSK_PASSPHRASE command. Too long PASSPHRASE command. Too long NEW_PASSWORD command. Too long PASSWORD command. Not connected to wpa_supplicant - command dropped. Connection established. Invalid IDENTITY command: needs two arguments (network id and identity) = get the passphrase for a group (GO only) [ssid=<SSID>] [lci] [civic] = Trigger request to AP for neighboring AP report (with optional given SSID in hex or enclosed in double quotes, default: current SSID; with optional LCI and location civic request) <value> = set BSS flush age (0 by default) = set variables (shows list of variables when run without arguments) <network id> <variable> <value> = set network variables (shows list of variables when run without arguments) <network id> = select a network (disable others) = re-open log-file (allow rolling logs) <value> = set scan_interval parameter (in seconds) Invalid P2P_SERV_DISC_REQ command: needs two or more arguments (address and TLVs) Invalid P2P_SERV_DISC_RESP command: needs four arguments (freq, address, dialog token, and TLVs) Invalid PIN command: needs two arguments (network id and pin) (nil) Invalid SET_NETWORK command: needs three arguments (network id, variable name, and value) Invalid SET_CRED command: needs three arguments (cred id, variable name, and value) Invalid SIM command: needs two arguments (network id and SIM operation response) Invalid PSK_PASSPHRASE command: needs two arguments (network id and PSK/passphrase) Invalid PASSPHRASE command: needs two arguments (network id and passphrase) Invalid GET_NETWORK command: needs two arguments (network id and variable name) Invalid DUP_NETWORK command: needs three arguments (src netid, dest netid, and variable name) Invalid GET_CRED command: needs two arguments (cred id, variable name) Invalid OTP command: needs two arguments (network id and password) Invalid NEW_PASSWORD command: needs two arguments (network id and password) Invalid PASSWORD command: needs two arguments (network id and password) <BSSID> [PIN] = start WPS PIN method (returns PIN, if not hardcoded) <frame id> <hexdump of elem(s)> = add vendor specific IEs to frame(s) 0: Probe Req (P2P), 1: Probe Resp (P2P) , 2: Probe Resp (GO), 3: Beacon (GO), 4: PD Req, 5: PD Resp, 6: GO Neg Req, 7: GO Neg Resp, 8: GO Neg Conf, 9: Inv Req, 10: Inv Resp, 11: Assoc Req (P2P), 12: Assoc Resp (P2P) <frame id> = get vendor specific IE(s) to frame(s) 0: Probe Req (P2P), 1: Probe Resp (P2P) , 2: Probe Resp (GO), 3: Beacon (GO), 4: PD Req, 5: PD Resp, 6: GO Neg Req, 7: GO Neg Resp, 8: GO Neg Conf, 9: Inv Req, 10: Inv Resp, 11: Assoc Req (P2P), 12: Assoc Resp (P2P) <frame id> <hexdump of elem(s)> = remove vendor specific IE(s) in frame(s) 0: Probe Req (P2P), 1: Probe Resp (P2P) , 2: Probe Resp (GO), 3: Beacon (GO), 4: PD Req, 5: PD Resp, 6: GO Neg Req, 7: GO Neg Resp, 8: GO Neg Conf, 9: Inv Req, 10: Inv Resp, 11: Assoc Req (P2P), 12: Assoc Resp (P2P) [ht40] = add a new P2P group (local end as GO) <ifname> = remove P2P group interface (terminate group if GO) Invalid BSSID command: needs two arguments (network id and BSSID) = get MIB variables (dot1x, dot11) operator() <ifname> <confname> <driver> <ctrl_interface> <driver_param> <bridge_name> <create> <type> = adds new interface, all parameters but <ifname> are optional. Supported types are station ('sta') and AP ('ap') Invalid GET_CAPABILITY command: second argument, if any, must be 'strict' (*unwindingData & 0xf0000000) == 0x80000000 && "Must be a compact entry" %s%s SET %s p2p_set peer_filter set bssid_filter DPP-NET-ACCESS-KEY DPP-C-SIGN-KEY WPS-TIMEOUT P2P-DEVICE-LOST ESS-DISASSOC-IMMINENT WPS-SUCCESS DPP-CONFOBJ-PASS DPP-CONNECTOR HS20-SUBSCRIPTION-REMEDIATION DPP-CONFOBJ-AKM WPS-FAIL DPP-CONFOBJ-PSK CTRL-EVENT-STARTED-CHANNEL-SWITCH CTRL-EVENT-TERMINATING WPS-PBC-ACTIVE P2P-GO-NEG-FAILURE P2P-CROSS-CONNECT-DISABLE P2P-CROSS-CONNECT-ENABLE HS20-T-C-ACCEPTANCE HS20-DEAUTH-IMMINENT-NOTICE P2P-DEVICE-FOUND DPP-CONFOBJ-SSID CTRL-EVENT-BSS-REMOVED P2P-GROUP-REMOVED MESH-GROUP-REMOVED DPP-CONF-RECEIVED P2P-GROUP-STARTED MESH-GROUP-STARTED CTRL-EVENT-DISCONNECTED MESH-PEER-DISCONNECTED AP-STA-DISCONNECTED CTRL-EVENT-CONNECTED MESH-PEER-CONNECTED AP-STA-CONNECTED AP-DISABLED AP-ENABLED CTRL-EVENT-BSS-ADDED %s> %ld.%06u: libunwind: _Unwind_GetLanguageSpecificData(context=%p) => 0x%llx libunwind: unwind_phase2(ex_ojb=%p): start_ip=0x%x, func=%s, sp=0x%x, lsda=0x%x, personality=0x%x libunwind: unwind_phase1(ex_ojb=%p): pc=0x%x, start_ip=0x%x, func=%s, lsda=0x%x, personality=0x%x libunwind: unwind_phase2(ex_ojb=%p): re-entering user code with ip=0x%x, sp=0x%x libunwind: unwind_phase1(ex_ojb=%p): personality result %d start_ip %x ehtp %p additional %x %u Failed to connect to non-global ctrl_ifname: %s error: %s Failed to connect to wpa_supplicant global interface: %s error: %s libunwind: %s %s:%d - %s %s %s %s libunwind: unwind_phase1(ex_ojb=%p): calling personality function %p Could not connect to wpa_supplicant: %s - re-trying Could not connect to interface '%s' - re-trying Interactive mode libunwind: personality function returned unknown result %d libunwind: _Unwind_GetRegionStart(context=%p) => 0x%llX libunwind: unwind_phase2(ex_ojb=%p): _URC_INSTALL_CONTEXT libunwind: unwind_phase2(ex_ojb=%p): __unw_get_proc_info failed => _URC_FATAL_PHASE2_ERROR libunwind: unwind_phase1(ex_ojb=%p): __unw_get_proc_info failed => _URC_FATAL_PHASE1_ERROR libunwind: unwind_phase1(ex_ojb=%p): _URC_FATAL_PHASE1_ERROR OK libunwind: unwind_phase1(ex_ojb=%p): _URC_HANDLER_FOUND libunwind: unwind_phase2(ex_ojb=%p): _URC_CONTINUE_UNWIND libunwind: unwind_phase1(ex_ojb=%p): _URC_CONTINUE_UNWIND eloop: could not process SIGINT or SIGTERM in two seconds. Looks like there is a bug that ends up in a busy loop that prevents clean shutdown. Killing program forcefully. '%s' command timed out. This software may be distributed under the terms of the BSD license. See README for more details. Connected to interface '%s. Invalid %s command - at least %d argument%s required. '%s' command failed. libunwind: __unw_set_reg(cursor=%p, regNum=%d, value=0x%x) libunwind: __unw_get_proc_name(cursor=%p, &buf=%p, bufLen=%lu) libunwind: __unw_init_local(cursor=%p, context=%p) libunwind: __unw_step(cursor=%p) libunwind: __unw_resume(cursor=%p) libunwind: __unw_is_signal_frame(cursor=%p) libunwind: __unw_get_fpreg_save_vfp_as_X(cursor=%p) libunwind: __unw_get_proc_info(cursor=%p, &info=%p) libunwind: _Unwind_DeleteException(ex_obj=%p) libunwind: _Unwind_RaiseException(ex_obj=%p) libunwind: _Unwind_Resume(ex_obj=%p) libunwind: __unw_get_fpreg(cursor=%p, regNum=%d, &value=%p) libunwind: __unw_get_reg(cursor=%p, regNum=%d, &value=%p) libunwind: unwind_phase2(ex_ojb=%p) libunwind: _Unwind_VRS_Pop(context=%p, regclass=%d, discriminator=%d, representation=%d) libunwind: __unw_is_fpreg(cursor=%p, regNum=%d) libunwind: __unw_regname(cursor=%p, regNum=%d) libunwind: _Unwind_VRS_Get(context=%p, regclass=%d, reg=%d, rep=%d, value=0x%llX, result = %d) libunwind: _Unwind_VRS_Set(context=%p, regclass=%d, reg=%d, rep=%d, value=0x%llX) libunwind: __unw_set_fpreg(cursor=%p, regNum=%d, value=%llX) Unknown command '%s' %s %s This software may be distributed under the terms of the BSD license. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name(s) of the above-listed copyright holder(s) nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. BSS_FLUSH 0
A d d l l t t | |
.ARM.exidx .text .got .got.plt .rel.plt .init .bss .ARM.attributes .dynstr .interp .data.rel.ro .rel.dyn .dynsym .fini .gnu.hash .note.gnu.build-id .dynamic .ARM.extab .shstrtab .rodata .data
ap_max_inactivity p2p_go_max_inactivity anonymous_identity wps_priority sp_priority discoverability get_capability country .wpa_cli_history Failed to allocate memory <addr> <method> = request provisioning discovery <external> = set external processing of service discovery temporary wps_nfc_dh_privkey wpa_ptk_rekey wps_nfc_dh_pubkey private_key Alternatively, six arguments can be used to reconfigure the AP: - BSSID of the target AP - AP PIN - new SSID - new auth (OPEN, WPAPSK, WPA2PSK) - new encr (NONE, WEP, TKIP, CCMP) - new key Invalid WPS_ER_CONFIG command: need six arguments: - AP UUID - AP PIN - new SSID - new auth (OPEN, WPAPSK, WPA2PSK) - new encr (NONE, WEP, TKIP, CCMP) - new key frequency wifi_display Invalid WPS_PIN command: need one or two arguments: - BSSID: use 'any' to select any - PIN: optional, used only with devices that have no display sched_scan_start_delay p2p_search_delay p2p_ssid_postfix wep_tx_keyidx %02x:%02x:%02x:%02x:%02x:%02x wps_nfc_dev_pw p2p_go_ctwindow raw = notification of resume/thaw ieee80211w execv a:Bg:G:hi:p:P:s:v ampdu dot11RSNAConfigSATimeout relative_band_adjust localhost bssid_blacklist <BSSID> = add a BSSID to the blacklist blacklist clear = clear the blacklist blacklist = display the blacklist bssid_whitelist p2p_client_list get_pref_freq_list psk_list interface_list neighbor_rep_request <id> = cancel pending service discovery request <addr> <TLVs> = schedule service discovery request client_cert ca_cert wps_er_start ip_addr_start p2p_lo_start EAPOL::maxStart bss_max_count bss_expiration_scan_count bss_expire_count beacon_int disc_int p2p_go_intent p2p_remove_client /var/run/wpa_supplicant = pings wpa_supplicant = terminate wpa_supplicant key_mgmt group_mgmt <network id> <pin> = report SIM operation result quit ELOOP: Too long timeout (secs=%u) to ever happen - ignore it p2p_go_vht p2p_set go_internet socket vendor_elem_get _Unwind_VRS_Set strict disconnect sta_autoconnect persistent_reconnect Connection to wpa_supplicant lost - trying to reconnect cross_connect p2p_connect select p2p_reject check_cert_subject = flush ERP keys tdls_link_status wmm_ac_status [verbose] = get current WPA/EAPOL/EAP status Invalid GET_CAPABILITY command: need either one or two arguments Invalid P2P_SERVICE_DEL command: needs two or three arguments Invalid P2P_SERVICE_REP command: needs 5-6 arguments Invalid P2P_SERVICE_ADD command: needs 3-6 arguments ap_vendor_elements scan_results = get latest scan results wmm_ac_delts wmm_ac_addts cbdata->sects Invalid WPS_ER_PIN command: need at least two arguments: - UUID: use 'any' to select any - PIN: Enrollee PIN optional: - Enrollee MAC address <dev_addr> = Get peer interface address on local GO using peer Device Address pbss p2p_intra_bss p2p_oper_reg_class p2p_listen_reg_class unsupported register class wpa_cli v2.9 Copyright (c) 2004-2019, Jouni Malinen <j@w1.fi> and contributors ProcessDescriptors = get TX/RX packet counters = set signal monitor parameters = get signal parameters openssl_ciphers wowlan_triggers p2p_peers [discovered] = list known (optionally, only fully discovered) P2P peers wps sae_groups <address|iface=address> = remove a peer from all groups oppps disallow_aps <level> [<timestamp>] = update the log level/timestamp log_level = display the current log level and log options channels = list configured credentials list_networks = list configured networks is driver_flags eapol_flags = list driver flags ignore_old_scan_res <cred id> <variable> <value> = set credential variables <cred id> <variable> = get credential variables <network id> <variable> = get network variables <src network id> <dst network id> <variable> = duplicate network variables = dump config variables <eap/pairwise/group/key_mgmt/proto/auth_alg/channels/freq/modes> = get capabilities = flush PMKSA cache entries = remove all stored service entries modes = indicate change in local services = list available interfaces index inlined table detected but pr function requires extra words config_methods [timeout] = listen for P2P Devices for up-to timeout seconds [timeout] [type=*] = find P2P Devices for up-to timeout seconds filter_ssids list_creds ft_ds ifname=%s CTRL-RSP-IDENTITY-%s:%s CTRL-RSP-OTP-%s:%s CTRL-RSP-PIN-%s:%s CTRL-RSP-SIM-%s:%s CTRL-RSP-PSK_PASSPHRASE-%s:%s CTRL-RSP-PASSPHRASE-%s:%s CTRL-RSP-NEW_PASSWORD-%s:%s CTRL-RSP-PASSWORD-%s:%s %s/%s P2P_PEER NEXT-%s IFNAME=%s %s WPS_ER_CONFIG %s %s %s %s %s %s WPS_REG %s %s %s %s %s %s P2P_SERV_DISC_RESP %s %s %s %s P2P_SERVICE_DEL %s %s %s P2P_SERVICE_DEL %s %s WPS_REG %s %s BSS_FLUSH %s > %s eloop: %s: %s connect(%s:%d) failed: %s INTERFACE_ADD %s %s %s %s %s %s %s %s id_str signal_monitor vendor lr osu_dir tdls_discover driver Unknown ARM float register unknown register unsupported arm register setRegister getRegister setFloatRegister getFloatRegister peer_filter bssid_filter <value> = set BSS expiration scan count parameter <value> = set ap_scan parameter <value> = set BSS expiration age parameter <field> <value> = set a P2P parameter manufacturer roaming_partner update_identifier p2p_peer <cmd> [peer=addr] = invite peer <addr> = reject connection attempts from a specific peer <address> = unauthorize a peer <addr> <oper class> <freq> [sec_channel_offset=] [center_freq1=] [center_freq2=] [bandwidth=] [ht|vht] = enable channel switching with TDLS peer <address> = show information about known P2P peer pcsc_reader wps_version_number model_number serial_number p2p_group_member go_p2p_dev_addr preassoc_mac_addr [IP address] = start Wi-Fi Protected Setup External Registrar = stop Wi-Fi Protected Setup External Registrar <UUID> <PIN> = add an Enrollee PIN to External Registrar <UUID> = accept an Enrollee PBC using External Registrar disallow_freq scan_cur_freq p2p_no_go_freq scan_freq fixed_freq p2p_ignore_shared_freq p2p_serv_disc_cancel_req p2p_presence_req p2p_serv_disc_req tdls_setup go_venue_group ctrl_interface_group otp p2p_asp_provision_resp p2p_serv_disc_resp ocsp provisioning_sp erp /data/82840-merged/toolchain/llvm-project/libunwind/src/Registers.hpp /data/82840-merged/toolchain/llvm-project/libunwind/src/UnwindCursor.hpp /data/82840-merged/toolchain/llvm-project/libunwind/src/AddressSpace.hpp /data/82840-merged/toolchain/llvm-project/libunwind/src/Unwind-EHABI.cpp wps_er_stop p2p_lo_stop _Unwind_VRS_Pop dump [command] = show usage help p2p_service_rep load_dynamic_eap ELOOP: remaining timeout: %d.%06d eloop_data=%p user_data=%p handler=%p ELOOP: remaining socket: sock=%d eloop_data=%p user_data=%p handler=%p proto pno ip_addr_go <<idx> | <bssid>> = get detailed scan result info tdls_teardown ibss_rsn _Unwind_Resume() can't return wps_er_learn daemon <0/1> = disable/enable automatic reconnection getInfoFromEHABISection <scan|sched|pno|all> enable=<0/1> [addr=mac-address mask=mac-address-mask] = scan MAC randomization = save the current configuration <UUID> <PIN> = learn AP configuration [BSSID] = start Wi-Fi Protected Setup: Push Button Configuration Cancels the pending WPS operation <name> = get information = cancel P2P group formation = force reassociation <BSSID> = force preauthentication = trigger IEEE 802.1X/EAPOL reauthentication os_version eapol_version p2p_asp_provision = IEEE 802.1X EAPOL state machine logon wps_pin wps_er_pin wps_ap_pin wps_check_pin pcsc_pin Invalid P2P_PROV_DISC command: needs at least two arguments, address and config method (display, keypad, or pbc) and an optional join domain p2p_ext_listen p2p_listen p2p_passphrase_len p2p_optimize_listen_chan p2p_add_cli_chan p2p_pref_chan autoscan bgscan abort_scan ap_scan passive_scan mac_rand_scan = request new BSS scan <PIN> = verify PIN checksum sim_num required_roaming_consortium realm reassoc_same_bss_optim external_sim driver_param roam <tsid> = delete WMM-AC traffic stream <uplink/downlink/bidi> <tsid=0..7> <up=0..7> [nominal_msdu_size=#] [mean_data_rate=#] [min_phy_rate=#] [sba=#] [fixed_nominal_msdu] = add WMM-AC traffic stream tdls_external_control = show status for Wireless Multi-Media Admission-Control pktcnt_poll signal_poll mixed_cell log_level <debug level> = change debug level p2p_oper_channel p2p_listen_channel p2p_service_del wps_cancel p2p_cancel sched_scan_interval p2p_serv_disc_external _Unwind_VRS_Get_Internal <cred id> = remove a credential = add a credential type=social global per_sta_psk ip_addr_mask set_network get_network select_network dup_network remove_network disable_network enable_network add_network <network id> = remove a network <network id> = disable a network <network id> = enable a network = add a network radio_work fork disassoc_low_ack filter_rssi relative_rssi imsi = exit wpa_cli fast_reauth max_oper_chwidth opensc_engine_path pkcs11_engine_path pkcs11_module_path ca_path wpa_cli [-p<path to ctrl sockets>] [-i<ifname>] [-hvB] [-a<action file>] \ [-P<pid file>] [-g<global ctrl>] [-G<ping interval>] \ [-s<wpa_client_socket_file_path>] [command..] -h = help (show this usage text) -v = shown version information -a = run in daemon mode executing the action file based on events from wpa_supplicant -B = run a daemon in the background default path: /var/run/wpa_supplicant default interface: first interface found in socket path bss_flush erp_flush p2p_flush p2p_service_flush pmksa_flush tdls_chan_switch tdls_cancel_chan_switch domain_suffix_match altsubject_match domain_match = stop P2P Devices search reattach relog <text> = add a note to wpa_supplicant debug log tdls_testing wpa_supplicant did not reply to PING command - exiting = disconnect and wait for reassociate/reconnect command before connecting wps_cred_processing wpa_supplicant is terminating - stop monitoring ping [<period> <interval>] = set extended listen timing min_ul_bandwidth_roaming min_dl_bandwidth_roaming <UUID> <network id> = set AP configuration for enrolling auto_interworking go_interworking proactive_key_caching auth_alg wps_er_set_config wps_er_config save_config wps_reg pmf = IEEE 802.1X EAPOL state machine logoff conc_pref wps_fragment_size p2p_unauthorize p2p_group_remove vendor_elem_remove interface_remove type=progressive no_keep_alive note p2p_invite = flush wpa_supplicant state = flush P2P state = notification of suspend/hibernate terminate ap_isolate reassociate p2p_service_update preauthenticate verbose <freq> <addr> <dialog token> <TLVs> = service discovery response = show full wpa_cli license false pairwise p2p_get_passphrase psk_passphrase reconfigure during phase1 personality function said it would stop here, but now in phase2 it did not stop here s are go_access_network_type go_venue_type sec_device_type <interface type> = retrieve preferred freq list for the specified interface type unknown personality routine engine resume _Unwind_Resume min_ul_bandwidth_home min_dl_bandwidth_home rand_addr_lifetime dot11RSNAConfigPMKLifetime unwindOneFrame gethostbyname username ifname model_name device_name = get current interface name dh_file pac_file = force wpa_supplicant to re-read its configuration file p2p_group_idle = show PMKSA cache milenage bss_expiration_age bss_expire_age mode [<duration> <interval>] [<duration> <interval>] = request GO presence <bonjour|upnp> <query|version> [|service] = remove a local service <bonjour|upnp|asp> <query|version> <response|service> = add a local service asp <auto> <adv_id> <svc_state> <svc_string> [<svc_info>] = replace local ASP service <addr> adv_id=<adv_id> [role<conncap>] [info=<infodata>] = provision with a P2P ASP Device <addr> adv_id=<adv_id> conncap=<conncap> [info=<infodata>] = provision with a P2P ASP Device <addr> <"pbc"|PIN> [ht40] = connect to a P2P Device no_ctrl_interface [ifname] = show interfaces/select interface Failed to open monitor connection through global control interface <ifname> = removes the interface p2p_no_group_iface private_key_passwd private_key2_passwd uapsd client_apsd go_apsd force_long_sd new_password bg_scan_period dtim_period EAPOL::startPeriod EAPOL::authPeriod EAPOL::heldPeriod eap_workaround p2p_stop_find p2p_find suspend ext_password_backend ip_addr_end <vendor id> <command id> [<hex formatted command argument>] = Send vendor command Too long command <params..> = Sent unprocessed command dot11RSNAConfigPMKReauthThreshold uuid hessid bssid ignore_broadcast_ssid scan_ssid excluded_ssid key_id wps_nfc_dev_pw_id ca_cert_id engine_id key2_id ca_cert2_id engine2_id Invalid WPS_ER_SET_CONFIG command: need two arguments: - UUID: specify which AP to use - Network configuration id = request ongoing scan to be aborted = like reassociate, but only takes effect if already disconnected discovered set_cred get_cred remove_cred add_cred wps_disabled tdls_disabled p2p_disabled radio_disabled Connection to wpa_supplicant re-established managed p2p_group_add vendor_elem_add p2p_service_add interface_add key_mgmt_offload disable_scan_offload <freq> <period> <interval> <count> = start P2P listen offload = stop P2P listen offload max_bss_load read p2p_prov_disc pcsc pc okc wps_pbc wps_er_pbc mib req_conn_capab max_num_sta cbdata pmksa noa [timeout] Invalid INTERFACE_ADD command: needs at least one argument (interface name) All arguments: ifname confname driver ctrl_interface driver_param bridge_name [create] [PROBE_REQ_ONLY] GET_CAPABILITY saveVFPAsX P2P_PEER FIRST GET_PREF_FREQ_LIST INTERFACE_LIST BLACKLIST NEIGHBOR_REP_REQUEST WPS_ER_START P2P_LO_START BSS_EXPIRE_COUNT P2P_REMOVE_CLIENT P2P_SET VENDOR_ELEM_GET P2P_CONNECT DISCONNECT STA_AUTOCONNECT RECONNECT P2P_REJECT TDLS_LINK_STATUS WMM_AC_STATUS SCAN_RESULTS WMM_AC_DELTS WMM_AC_ADDTS <addr> = request RSN authentication with <addr> in IBSS = force reassociation back to the same BSS <addr> = roam to the specified BSS STATUS-WPS LIST_NETWORKS LIBUNWIND_PRINT_APIS DRIVER_FLAGS INTERFACES FT_DS LIST_CREDS WPA_ID_STR SIGNAL_MONITOR VENDOR WPA_CTRL_DIR TDLS_DISCOVER STATUS-DRIVER P2P_PEER P2P_GROUP_MEMBER P2P_SERV_DISC_CANCEL_REQ P2P_PRESENCE_REQ P2P_SERV_DISC_REQ TDLS_SETUP P2P_ASP_PROVISION_RESP WPS_ER_STOP P2P_LO_STOP DUMP P2P_SERVICE_REP <BSSID> <AP PIN> = start WPS Registrar to configure an AP <UUID> <PIN> <SSID> <auth> <encr> <key> = configure AP TDLS_TEARDOWN IBSS_RSN WPS_ER_LEARN P2P_ASP_PROVISION LOGON WPS_PIN WPS_ER_PIN WPS_AP_PIN WPS_CHECK_PIN [params..] = enable/disable AP PIN Invalid WPS_ER_LEARN command: need two arguments: - UUID: specify which AP to use - PIN: AP PIN Invalid WPS_REG command: need two arguments: - BSSID of the target AP - AP PIN P2P_EXT_LISTEN P2P_LISTEN ABORT_SCAN AP_SCAN MAC_RAND_SCAN ROAM PKTCNT_POLL SIGNAL_POLL FAIL LOG_LEVEL WPS_CANCEL P2P_CANCEL SCAN_INTERVAL P2P_SERV_DISC_EXTERNAL RADIO_WORK SET_NETWORK GET_NETWORK SELECT_NETWORK DUP_NETWORK REMOVE_NETWORK DISABLE_NETWORK ENABLE_NETWORK ADD_NETWORK PREAUTH ERP_FLUSH P2P_FLUSH P2P_SERVICE_FLUSH PMKSA_FLUSH TDLS_CHAN_SWITCH TDLS_CANCEL_CHAN_SWITCH REATTACH DETACH RELOG PONG PING LIBUNWIND_PRINT_UNWINDING WPS_ER_SET_CONFIG SAVE_CONFIG LOGOFF P2P_UNAUTHORIZE P2P_GROUP_REMOVE VENDOR_ELEM_REMOVE INTERFACE_REMOVE NOTE P2P_INVITE TERMINATE REASSOCIATE P2P_SERVICE_UPDATE REAUTHENTICATE STATUS-VERBOSE P2P_GET_PASSPHRASE RECONFIGURE RESUME HOME IFNAME GET_COOKIE BSS_EXPIRE_AGE P2P_STOP_FIND P2P_FIND SUSPEND WPA_ID BSSID <network id> <identity> = configure identity for an SSID <network id> <pin> = configure pin for an SSID <network id> <PSK/passphrase> = configure PSK/passphrase for an SSID <network id> <password> = configure one-time-password for an SSID <network id> <password> = configure password for an SSID <network id> <password> = change password for an SSID <network id> <BSSID> = set preferred BSSID for an SSID <network id> <passphrase> = configure private key passphrase for an SSID DISCONNECTED SET_CRED GET_CRED REMOVE_CRED ADD_CRED P2P_GROUP_ADD VENDOR_ELEM_ADD P2P_SERVICE_ADD P2P_PROV_DISC WPS_PBC WPS_ER_PBC MIB PMKSA <addr> = disable channel switching with TDLS peer <addr> <addr> = request TDLS discovery with <addr> <addr> = TDLS link status with <addr> <addr> = request TDLS setup with <addr> <addr> = request over-the-DS FT with <addr> <addr> = tear down TDLS with <addr> = radio_work <show/add/done> delay= p2p_dev_addr= bssid= dev_id= [id= IFNAME= Available interfaces: Ambiguous command '%s'; possible commands: s9 r9 d9 s29 d29 s19 d19 s8 r8 d8 s28 d28 s18 d18 s7 r7 d7 s27 d27 s17 d17 s6 r6 d6 s26 d26 s16 d16 s5 r5 d5 s25 d25 s15 _use_X_for_vfp_save || !_saved_vfp_d0_d15 s4 r4 d4 s24 d24 s14 d14 wep_key3 s3 r3 d3 s23 d23 s13 d13 wep_key2 private_key2 BSS RANGE=ALL MASK=0x2 client_cert2 ca_cert2 check_cert_subject2 s2 r2 vht_center_freq2 pin2 ca_path2 domain_suffix_match2 altsubject_match2 domain_match2 unwind_phase2 engine2 dh_file2 d2 s22 d22 s12 r12 d12 wep_key1 s1 r1 vht_center_freq1 wps_vendor_ext_m1 pbc_in_m1 phase1 d1 s31 d31 s21 d21 s11 r11 d11 wep_key0 s0 r0 d0 p2p_go_ht40 s30 d30 s20 d20 s10 r10 d10 Warning: Failed to attach to wpa_supplicant. .anonymous. Invalid P2P_EXT_LISTEN command: needs two arguments (availability period, availability interval; in millisecods). Extended Listen Timing can be cancelled with this command when used without parameters. Invalid P2P_PRESENCE_REQ command: needs two arguments (preferred duration, interval; in microsecods). Optional second pair can be used to provide acceptable values. set_network variables: ssid (network name, SSID) psk (WPA passphrase or pre-shared key) key_mgmt (key management protocol) identity (EAP identity) password (EAP password) ... Note: Values are entered in the same format as the configuration file is using, i.e., strings values need to be inside double quotation marks. For example: set_network 1 ssid "network name" Please see wpa_supplicant.conf documentation for full list of available variables. Could not read pending message. Too long IDENTITY command. Too long SET command. Too long OTP command. Too long PIN command. Too long SIM command. Too long BSS_FLUSH command. Too long WPS_ER_CONFIG command. Too long WPS_REG command. Too long PSK_PASSPHRASE command. Too long PASSPHRASE command. Too long NEW_PASSWORD command. Too long PASSWORD command. Not connected to wpa_supplicant - command dropped. Connection established. Invalid IDENTITY command: needs two arguments (network id and identity) = get the passphrase for a group (GO only) [ssid=<SSID>] [lci] [civic] = Trigger request to AP for neighboring AP report (with optional given SSID in hex or enclosed in double quotes, default: current SSID; with optional LCI and location civic request) <value> = set BSS flush age (0 by default) = set variables (shows list of variables when run without arguments) <network id> <variable> <value> = set network variables (shows list of variables when run without arguments) <network id> = select a network (disable others) = re-open log-file (allow rolling logs) <value> = set scan_interval parameter (in seconds) Invalid P2P_SERV_DISC_REQ command: needs two or more arguments (address and TLVs) Invalid P2P_SERV_DISC_RESP command: needs four arguments (freq, address, dialog token, and TLVs) Invalid PIN command: needs two arguments (network id and pin) (nil) Invalid SET_NETWORK command: needs three arguments (network id, variable name, and value) Invalid SET_CRED command: needs three arguments (cred id, variable name, and value) Invalid SIM command: needs two arguments (network id and SIM operation response) Invalid PSK_PASSPHRASE command: needs two arguments (network id and PSK/passphrase) Invalid PASSPHRASE command: needs two arguments (network id and passphrase) Invalid GET_NETWORK command: needs two arguments (network id and variable name) Invalid DUP_NETWORK command: needs three arguments (src netid, dest netid, and variable name) Invalid GET_CRED command: needs two arguments (cred id, variable name) Invalid OTP command: needs two arguments (network id and password) Invalid NEW_PASSWORD command: needs two arguments (network id and password) Invalid PASSWORD command: needs two arguments (network id and password) <BSSID> [PIN] = start WPS PIN method (returns PIN, if not hardcoded) <frame id> <hexdump of elem(s)> = add vendor specific IEs to frame(s) 0: Probe Req (P2P), 1: Probe Resp (P2P) , 2: Probe Resp (GO), 3: Beacon (GO), 4: PD Req, 5: PD Resp, 6: GO Neg Req, 7: GO Neg Resp, 8: GO Neg Conf, 9: Inv Req, 10: Inv Resp, 11: Assoc Req (P2P), 12: Assoc Resp (P2P) <frame id> = get vendor specific IE(s) to frame(s) 0: Probe Req (P2P), 1: Probe Resp (P2P) , 2: Probe Resp (GO), 3: Beacon (GO), 4: PD Req, 5: PD Resp, 6: GO Neg Req, 7: GO Neg Resp, 8: GO Neg Conf, 9: Inv Req, 10: Inv Resp, 11: Assoc Req (P2P), 12: Assoc Resp (P2P) <frame id> <hexdump of elem(s)> = remove vendor specific IE(s) in frame(s) 0: Probe Req (P2P), 1: Probe Resp (P2P) , 2: Probe Resp (GO), 3: Beacon (GO), 4: PD Req, 5: PD Resp, 6: GO Neg Req, 7: GO Neg Resp, 8: GO Neg Conf, 9: Inv Req, 10: Inv Resp, 11: Assoc Req (P2P), 12: Assoc Resp (P2P) [ht40] = add a new P2P group (local end as GO) <ifname> = remove P2P group interface (terminate group if GO) Invalid BSSID command: needs two arguments (network id and BSSID) = get MIB variables (dot1x, dot11) operator() <ifname> <confname> <driver> <ctrl_interface> <driver_param> <bridge_name> <create> <type> = adds new interface, all parameters but <ifname> are optional. Supported types are station ('sta') and AP ('ap') Invalid GET_CAPABILITY command: second argument, if any, must be 'strict' (*unwindingData & 0xf0000000) == 0x80000000 && "Must be a compact entry" %s%s SET %s p2p_set peer_filter set bssid_filter DPP-NET-ACCESS-KEY DPP-C-SIGN-KEY WPS-TIMEOUT P2P-DEVICE-LOST ESS-DISASSOC-IMMINENT WPS-SUCCESS DPP-CONFOBJ-PASS DPP-CONNECTOR HS20-SUBSCRIPTION-REMEDIATION DPP-CONFOBJ-AKM WPS-FAIL DPP-CONFOBJ-PSK CTRL-EVENT-STARTED-CHANNEL-SWITCH CTRL-EVENT-TERMINATING WPS-PBC-ACTIVE P2P-GO-NEG-FAILURE P2P-CROSS-CONNECT-DISABLE P2P-CROSS-CONNECT-ENABLE HS20-T-C-ACCEPTANCE HS20-DEAUTH-IMMINENT-NOTICE P2P-DEVICE-FOUND DPP-CONFOBJ-SSID CTRL-EVENT-BSS-REMOVED P2P-GROUP-REMOVED MESH-GROUP-REMOVED DPP-CONF-RECEIVED P2P-GROUP-STARTED MESH-GROUP-STARTED CTRL-EVENT-DISCONNECTED MESH-PEER-DISCONNECTED AP-STA-DISCONNECTED CTRL-EVENT-CONNECTED MESH-PEER-CONNECTED AP-STA-CONNECTED AP-DISABLED AP-ENABLED CTRL-EVENT-BSS-ADDED %s> %ld.%06u: libunwind: _Unwind_GetLanguageSpecificData(context=%p) => 0x%llx libunwind: unwind_phase2(ex_ojb=%p): start_ip=0x%x, func=%s, sp=0x%x, lsda=0x%x, personality=0x%x libunwind: unwind_phase1(ex_ojb=%p): pc=0x%x, start_ip=0x%x, func=%s, lsda=0x%x, personality=0x%x libunwind: unwind_phase2(ex_ojb=%p): re-entering user code with ip=0x%x, sp=0x%x libunwind: unwind_phase1(ex_ojb=%p): personality result %d start_ip %x ehtp %p additional %x %u Failed to connect to non-global ctrl_ifname: %s error: %s Failed to connect to wpa_supplicant global interface: %s error: %s libunwind: %s %s:%d - %s %s %s %s libunwind: unwind_phase1(ex_ojb=%p): calling personality function %p Could not connect to wpa_supplicant: %s - re-trying Could not connect to interface '%s' - re-trying Interactive mode libunwind: personality function returned unknown result %d libunwind: _Unwind_GetRegionStart(context=%p) => 0x%llX libunwind: unwind_phase2(ex_ojb=%p): _URC_INSTALL_CONTEXT libunwind: unwind_phase2(ex_ojb=%p): __unw_get_proc_info failed => _URC_FATAL_PHASE2_ERROR libunwind: unwind_phase1(ex_ojb=%p): __unw_get_proc_info failed => _URC_FATAL_PHASE1_ERROR libunwind: unwind_phase1(ex_ojb=%p): _URC_FATAL_PHASE1_ERROR OK libunwind: unwind_phase1(ex_ojb=%p): _URC_HANDLER_FOUND libunwind: unwind_phase2(ex_ojb=%p): _URC_CONTINUE_UNWIND libunwind: unwind_phase1(ex_ojb=%p): _URC_CONTINUE_UNWIND eloop: could not process SIGINT or SIGTERM in two seconds. Looks like there is a bug that ends up in a busy loop that prevents clean shutdown. Killing program forcefully. '%s' command timed out. This software may be distributed under the terms of the BSD license. See README for more details. Connected to interface '%s. Invalid %s command - at least %d argument%s required. '%s' command failed. libunwind: __unw_set_reg(cursor=%p, regNum=%d, value=0x%x) libunwind: __unw_get_proc_name(cursor=%p, &buf=%p, bufLen=%lu) libunwind: __unw_init_local(cursor=%p, context=%p) libunwind: __unw_step(cursor=%p) libunwind: __unw_resume(cursor=%p) libunwind: __unw_is_signal_frame(cursor=%p) libunwind: __unw_get_fpreg_save_vfp_as_X(cursor=%p) libunwind: __unw_get_proc_info(cursor=%p, &info=%p) libunwind: _Unwind_DeleteException(ex_obj=%p) libunwind: _Unwind_RaiseException(ex_obj=%p) libunwind: _Unwind_Resume(ex_obj=%p) libunwind: __unw_get_fpreg(cursor=%p, regNum=%d, &value=%p) libunwind: __unw_get_reg(cursor=%p, regNum=%d, &value=%p) libunwind: unwind_phase2(ex_ojb=%p) libunwind: _Unwind_VRS_Pop(context=%p, regclass=%d, discriminator=%d, representation=%d) libunwind: __unw_is_fpreg(cursor=%p, regNum=%d) libunwind: __unw_regname(cursor=%p, regNum=%d) libunwind: _Unwind_VRS_Get(context=%p, regclass=%d, reg=%d, rep=%d, value=0x%llX, result = %d) libunwind: _Unwind_VRS_Set(context=%p, regclass=%d, reg=%d, rep=%d, value=0x%llX) libunwind: __unw_set_fpreg(cursor=%p, regNum=%d, value=%llX) Unknown command '%s' %s %s This software may be distributed under the terms of the BSD license. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name(s) of the above-listed copyright holder(s) nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. BSS_FLUSH 0
A d d l l t t | |
.ARM.exidx .text .got .got.plt .rel.plt .init .bss .ARM.attributes .dynstr .interp .data.rel.ro .rel.dyn .dynsym .fini .gnu.hash .note.gnu.build-id .dynamic .ARM.extab .shstrtab .rodata .data