Warning: file_get_contents(/data/phpspider/zhask/data//catemap/1/typescript/8.json): failed to open stream: No such file or directory in /data/phpspider/zhask/libs/function.php on line 167

Warning: Invalid argument supplied for foreach() in /data/phpspider/zhask/libs/tag.function.php on line 1116

Notice: Undefined index: in /data/phpspider/zhask/libs/function.php on line 180

Warning: array_chunk() expects parameter 1 to be array, null given in /data/phpspider/zhask/libs/function.php on line 181
Arm 如何使用rtl8188cus芯片在带有Arch Linux的BeagleBone上启用wifi direct?_Arm_Archlinux_Wifi Direct_Beagleboneblack_Wifip2p - Fatal编程技术网

Arm 如何使用rtl8188cus芯片在带有Arch Linux的BeagleBone上启用wifi direct?

Arm 如何使用rtl8188cus芯片在带有Arch Linux的BeagleBone上启用wifi direct?,arm,archlinux,wifi-direct,beagleboneblack,wifip2p,Arm,Archlinux,Wifi Direct,Beagleboneblack,Wifip2p,我尝试在标准arch linux发行版下运行的beaglebone上实现wifi DIRECT(p2p) 我的wifi芯片是rtl8188cus,它使用rtl8192cu驱动程序 我的所有驱动程序都已正确加载: [root@alarm ~]# lsmod Module Size Used by arc4 1660 2 rtl8192cu 88159 0 rtlwifi

我尝试在标准arch linux发行版下运行的beaglebone上实现wifi DIRECT(p2p)

我的wifi芯片是rtl8188cus,它使用rtl8192cu驱动程序

我的所有驱动程序都已正确加载:

[root@alarm ~]# lsmod
Module                  Size  Used by
arc4                    1660  2 
rtl8192cu              88159  0 
rtlwifi                78157  1 rtl8192cu
rtl8192c_common        60321  1 rtl8192cu
mac80211              496147  3 rtlwifi,rtl8192c_common,rtl8192cu
cfg80211              421700  2 mac80211,rtlwifi
rfkill                 18407  1 cfg80211
g_ether                27657  0 
libcomposite           17081  1 g_ether
autofs4                21976  2 
我可以看到我的设备允许通过这种方式进行wifi直接连接:

[root@alarm ~]# iw phy0 info
Wiphy phy0
    Band 1:
    Capabilities: 0x1862
        HT20/HT40
        Static SM Power Save
        RX HT20 SGI
        RX HT40 SGI
        No RX STBC
        Max AMSDU length: 7935 bytes
        DSSS/CCK HT40
    Maximum RX AMPDU length 65535 bytes (exponent: 0x003)
    Minimum RX AMPDU time spacing: 16 usec (0x07)
    HT TX/RX MCS rate indexes supported: 0-7, 32
    Frequencies:
        * 2412 MHz [1] (20.0 dBm)
        * 2417 MHz [2] (20.0 dBm)
        * 2422 MHz [3] (20.0 dBm)
        * 2427 MHz [4] (20.0 dBm)
        * 2432 MHz [5] (20.0 dBm)
        * 2437 MHz [6] (20.0 dBm)
        * 2442 MHz [7] (20.0 dBm)
        * 2447 MHz [8] (20.0 dBm)
        * 2452 MHz [9] (20.0 dBm)
        * 2457 MHz [10] (20.0 dBm)
        * 2462 MHz [11] (20.0 dBm)
        * 2467 MHz [12] (disabled)
        * 2472 MHz [13] (disabled)
        * 2484 MHz [14] (disabled)
    Bitrates (non-HT):
        * 1.0 Mbps
        * 2.0 Mbps
        * 5.5 Mbps
        * 11.0 Mbps
        * 6.0 Mbps
        * 9.0 Mbps
        * 12.0 Mbps
        * 18.0 Mbps
        * 24.0 Mbps
        * 36.0 Mbps
        * 48.0 Mbps
        * 54.0 Mbps
max # scan SSIDs: 4
max scan IEs length: 2257 bytes
RTS threshold: 2347
Coverage class: 0 (up to 0m)
Supported Ciphers:
    * WEP40 (00-0f-ac:1)
    * WEP104 (00-0f-ac:5)
    * TKIP (00-0f-ac:2)
    * CCMP (00-0f-ac:4)
Available Antennas: TX 0 RX 0
Supported interface modes:
     * IBSS
     * managed
     * AP
     * AP/VLAN
     * monitor
software interface modes (can always be added):
     * AP/VLAN
     * monitor
interface combinations are not supported
Supported commands:
     * new_interface
     * set_interface
     * new_key
     * start_ap
     * new_station
     * new_mpath
     * set_mesh_config
     * set_bss
     * authenticate
     * associate
     * deauthenticate
     * disassociate
     * join_ibss
     * join_mesh
     * set_tx_bitrate_mask
     * frame
     * frame_wait_cancel
     * set_wiphy_netns
     * set_channel
     * set_wds_peer
     * probe_client
     * set_noack_map
     * register_beacons
     * start_p2p_device
     * set_mcast_rate
     * connect
     * disconnect
Supported TX frame types:
     * IBSS: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
     * managed: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
     * AP: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
     * AP/VLAN: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
     * mesh point: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
     * P2P-client: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
     * P2P-GO: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
     * P2P-device: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
Supported RX frame types:
     * IBSS: 0x40 0xb0 0xc0 0xd0
     * managed: 0x40 0xd0
     * AP: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0
     * AP/VLAN: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0
     * mesh point: 0xb0 0xc0 0xd0
     * P2P-client: 0x40 0xd0
     * P2P-GO: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0
     * P2P-device: 0x40 0xd0
HT Capability overrides:
     * MCS: ff ff ff ff ff ff ff ff ff ff
     * maximum A-MSDU length
     * supported channel width
     * short GI for 40 MHz
     * max A-MPDU length exponent
     * min MPDU start spacing
Device supports TX status socket option.
Device supports HT-IBSS.
Device supports low priority scan.
Device supports scan flush.
Device supports AP scan.
[root@alarm ~]# iwpriv 
wlan0     no private ioctls.

lo        no private ioctls.

eth0      no private ioctls.

usb0      no private ioctls.
但并非如此:

[root@alarm ~]# iw phy0 info
Wiphy phy0
    Band 1:
    Capabilities: 0x1862
        HT20/HT40
        Static SM Power Save
        RX HT20 SGI
        RX HT40 SGI
        No RX STBC
        Max AMSDU length: 7935 bytes
        DSSS/CCK HT40
    Maximum RX AMPDU length 65535 bytes (exponent: 0x003)
    Minimum RX AMPDU time spacing: 16 usec (0x07)
    HT TX/RX MCS rate indexes supported: 0-7, 32
    Frequencies:
        * 2412 MHz [1] (20.0 dBm)
        * 2417 MHz [2] (20.0 dBm)
        * 2422 MHz [3] (20.0 dBm)
        * 2427 MHz [4] (20.0 dBm)
        * 2432 MHz [5] (20.0 dBm)
        * 2437 MHz [6] (20.0 dBm)
        * 2442 MHz [7] (20.0 dBm)
        * 2447 MHz [8] (20.0 dBm)
        * 2452 MHz [9] (20.0 dBm)
        * 2457 MHz [10] (20.0 dBm)
        * 2462 MHz [11] (20.0 dBm)
        * 2467 MHz [12] (disabled)
        * 2472 MHz [13] (disabled)
        * 2484 MHz [14] (disabled)
    Bitrates (non-HT):
        * 1.0 Mbps
        * 2.0 Mbps
        * 5.5 Mbps
        * 11.0 Mbps
        * 6.0 Mbps
        * 9.0 Mbps
        * 12.0 Mbps
        * 18.0 Mbps
        * 24.0 Mbps
        * 36.0 Mbps
        * 48.0 Mbps
        * 54.0 Mbps
max # scan SSIDs: 4
max scan IEs length: 2257 bytes
RTS threshold: 2347
Coverage class: 0 (up to 0m)
Supported Ciphers:
    * WEP40 (00-0f-ac:1)
    * WEP104 (00-0f-ac:5)
    * TKIP (00-0f-ac:2)
    * CCMP (00-0f-ac:4)
Available Antennas: TX 0 RX 0
Supported interface modes:
     * IBSS
     * managed
     * AP
     * AP/VLAN
     * monitor
software interface modes (can always be added):
     * AP/VLAN
     * monitor
interface combinations are not supported
Supported commands:
     * new_interface
     * set_interface
     * new_key
     * start_ap
     * new_station
     * new_mpath
     * set_mesh_config
     * set_bss
     * authenticate
     * associate
     * deauthenticate
     * disassociate
     * join_ibss
     * join_mesh
     * set_tx_bitrate_mask
     * frame
     * frame_wait_cancel
     * set_wiphy_netns
     * set_channel
     * set_wds_peer
     * probe_client
     * set_noack_map
     * register_beacons
     * start_p2p_device
     * set_mcast_rate
     * connect
     * disconnect
Supported TX frame types:
     * IBSS: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
     * managed: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
     * AP: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
     * AP/VLAN: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
     * mesh point: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
     * P2P-client: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
     * P2P-GO: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
     * P2P-device: 0x00 0x10 0x20 0x30 0x40 0x50 0x60 0x70 0x80 0x90 0xa0 0xb0 0xc0 0xd0 0xe0 0xf0
Supported RX frame types:
     * IBSS: 0x40 0xb0 0xc0 0xd0
     * managed: 0x40 0xd0
     * AP: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0
     * AP/VLAN: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0
     * mesh point: 0xb0 0xc0 0xd0
     * P2P-client: 0x40 0xd0
     * P2P-GO: 0x00 0x20 0x40 0xa0 0xb0 0xc0 0xd0
     * P2P-device: 0x40 0xd0
HT Capability overrides:
     * MCS: ff ff ff ff ff ff ff ff ff ff
     * maximum A-MSDU length
     * supported channel width
     * short GI for 40 MHz
     * max A-MPDU length exponent
     * min MPDU start spacing
Device supports TX status socket option.
Device supports HT-IBSS.
Device supports low priority scan.
Device supports scan flush.
Device supports AP scan.
[root@alarm ~]# iwpriv 
wlan0     no private ioctls.

lo        no private ioctls.

eth0      no private ioctls.

usb0      no private ioctls.
我的wpa_请求者和is客户允许我启动p2p操作:

[root@alarm ~]# wpa_supplicant -Dnl80211 -iwlan0 -c/root/wpa_0_8.conf &
[1] 273
[root@alarm ~]# Successfully initialized wpa_supplicant

[root@alarm ~]# wpa_cli
wpa_cli v2.1
Copyright (c) 2004-2014, Jouni Malinen <j@w1.fi> and contributors

This software may be distributed under the terms of the BSD license.
See README for more details.


Selected interface 'wlan0'

Interactive mode

> p2p_find
FAIL
> help
commands:
  status [verbose] = get current WPA/EAPOL/EAP status
  ifname = get current interface name
  ping = pings wpa_supplicant
  relog = re-open log-file (allow rolling logs)
  note <text> = add a note to wpa_supplicant debug log
  mib = get MIB variables (dot1x, dot11)
  help [command] = show usage help
  interface [ifname] = show interfaces/select interface
  level <debug level> = change debug level
  license = show full wpa_cli license
  quit = exit wpa_cli
  set = set variables (shows list of variables when run without arguments)
  get <name> = get information
  logon = IEEE 802.1X EAPOL state machine logon
  logoff = IEEE 802.1X EAPOL state machine logoff
  pmksa = show PMKSA cache
  reassociate = force reassociation
  preauthenticate <BSSID> = force preauthentication
  identity <network id> <identity> = configure identity for an SSID
  password <network id> <password> = configure password for an SSID
  new_password <network id> <password> = change password for an SSID
  pin <network id> <pin> = configure pin for an SSID
  otp <network id> <password> = configure one-time-password for an SSID
  passphrase <network id> <passphrase> = configure private key passphrase
    for an SSID
  sim <network id> <pin> = report SIM operation result
  bssid <network id> <BSSID> = set preferred BSSID for an SSID
  blacklist <BSSID> = add a BSSID to the blacklist
  blacklist clear = clear the blacklist
  blacklist = display the blacklist
  log_level <level> [<timestamp>] = update the log level/timestamp
  log_level = display the current log level and log options
  list_networks = list configured networks
  select_network <network id> = select a network (disable others)
  enable_network <network id> = enable a network
  disable_network <network id> = disable a network
  add_network = add a network
  remove_network <network id> = remove a network
  set_network <network id> <variable> <value> = set network variables (shows
    list of variables when run without arguments)
  get_network <network id> <variable> = get network variables
  list_creds = list configured credentials
  add_cred = add a credential
  remove_cred <cred id> = remove a credential
  set_cred <cred id> <variable> <value> = set credential variables
  save_config = save the current configuration
  disconnect = disconnect and wait for reassociate/reconnect command before
    connecting
  reconnect = like reassociate, but only takes effect if already disconnected
  scan = request new BSS scan
  scan_results = get latest scan results
  bss <<idx> | <bssid>> = get detailed scan result info
  get_capability <eap/pairwise/group/key_mgmt/proto/auth_alg/channels/freq/modes> = get capabilies
  reconfigure = force wpa_supplicant to re-read its configuration file
  terminate = terminate wpa_supplicant
  interface_add <ifname> <confname> <driver> <ctrl_interface> <driver_param>
    <bridge_name> = adds new interface, all parameters but <ifname>
    are optional
  interface_remove <ifname> = removes the interface
  interface_list = list available interfaces
  ap_scan <value> = set ap_scan parameter
  scan_interval <value> = set scan_interval parameter (in seconds)
  bss_expire_age <value> = set BSS expiration age parameter
  bss_expire_count <value> = set BSS expiration scan count parameter
  bss_flush <value> = set BSS flush age (0 by default)
  stkstart <addr> = request STK negotiation with <addr>
  ft_ds <addr> = request over-the-DS FT with <addr>
  wps_pbc [BSSID] = start Wi-Fi Protected Setup: Push Button Configuration
  wps_pin <BSSID> [PIN] = start WPS PIN method (returns PIN, if not hardcoded)
  wps_check_pin <PIN> = verify PIN checksum
  wps_cancel Cancels the pending WPS operation
  wps_nfc [BSSID] = start Wi-Fi Protected Setup: NFC
  wps_nfc_config_token <WPS|NDEF> = build configuration token
  wps_nfc_token <WPS|NDEF> = create password token
  wps_nfc_tag_read <hexdump of payload> = report read NFC tag with WPS data
  nfc_get_handover_req <NDEF> <WPS> = create NFC handover request
  nfc_get_handover_sel <NDEF> <WPS> = create NFC handover select
  nfc_rx_handover_req <hexdump of payload> = report received NFC handover request
  nfc_rx_handover_sel <hexdump of payload> = report received NFC handover select
  nfc_report_handover <role> <type> <hexdump of req> <hexdump of sel> = report completed NFC handover
  wps_reg <BSSID> <AP PIN> = start WPS Registrar to configure an AP
  wps_ap_pin [params..] = enable/disable AP PIN
  wps_er_start [IP address] = start Wi-Fi Protected Setup External Registrar
  wps_er_stop = stop Wi-Fi Protected Setup External Registrar
  wps_er_pin <UUID> <PIN> = add an Enrollee PIN to External Registrar
  wps_er_pbc <UUID> = accept an Enrollee PBC using External Registrar
  wps_er_learn <UUID> <PIN> = learn AP configuration
  wps_er_set_config <UUID> <network id> = set AP configuration for enrolling
  wps_er_config <UUID> <PIN> <SSID> <auth> <encr> <key> = configure AP
  wps_er_nfc_config_token <WPS/NDEF> <UUID> = build NFC configuration token
  ibss_rsn <addr> = request RSN authentication with <addr> in IBSS
  sta <addr> = get information about an associated station (AP)
  all_sta = get information about all associated stations (AP)
  deauthenticate <addr> = deauthenticate a station
  disassociate <addr> = disassociate a station
  chan_switch <cs_count> <freq> [sec_channel_offset=] [center_freq1=] [center_freq2=] [bandwidth=] [blocktx] [ht|vht] = CSA parameters
  suspend = notification of suspend/hibernate
  resume = notification of resume/thaw
  drop_sa = drop SA without deauth/disassoc (test command)
  roam <addr> = roam to the specified BSS
  p2p_find [timeout] [type=*] = find P2P Devices for up-to timeout seconds
  p2p_stop_find = stop P2P Devices search
  p2p_connect <addr> <"pbc"|PIN> [ht40] = connect to a P2P Device
  p2p_listen [timeout] = listen for P2P Devices for up-to timeout seconds
  p2p_group_remove <ifname> = remove P2P group interface (terminate group if GO)
  p2p_group_add [ht40] = add a new P2P group (local end as GO)
  p2p_prov_disc <addr> <method> = request provisioning discovery
  p2p_get_passphrase = get the passphrase for a group (GO only)
  p2p_serv_disc_req <addr> <TLVs> = schedule service discovery request
  p2p_serv_disc_cancel_req <id> = cancel pending service discovery request
  p2p_serv_disc_resp <freq> <addr> <dialog token> <TLVs> = service discovery response
  p2p_service_update = indicate change in local services
  p2p_serv_disc_external <external> = set external processing of service discovery
  p2p_service_flush = remove all stored service entries
  p2p_service_add <bonjour|upnp> <query|version> <response|service> = add a local service
  p2p_service_del <bonjour|upnp> <query|version> [|service] = remove a local service
  p2p_reject <addr> = reject connection attempts from a specific peer
  p2p_invite <cmd> [peer=addr] = invite peer
  p2p_peers [discovered] = list known (optionally, only fully discovered) P2P peers
  p2p_peer <address> = show information about known P2P peer
  p2p_set <field> <value> = set a P2P parameter
  p2p_flush = flush P2P state
  p2p_cancel = cancel P2P group formation
  p2p_unauthorize <address> = unauthorize a peer
  p2p_presence_req [<duration> <interval>] [<duration> <interval>] = request GO presence
  p2p_ext_listen [<period> <interval>] = set extended listen timing
  p2p_remove_client <address|iface=address> = remove a peer from all groups
  wfd_subelem_set <subelem> [contents] = set Wi-Fi Display subelement
  wfd_subelem_get <subelem> = get Wi-Fi Display subelement
  sta_autoconnect <0/1> = disable/enable automatic reconnection
  tdls_discover <addr> = request TDLS discovery with <addr>
  tdls_setup <addr> = request TDLS setup with <addr>
  tdls_teardown <addr> = tear down TDLS with <addr>
  signal_poll = get signal parameters
  pktcnt_poll = get TX/RX packet counters
  reauthenticate = trigger IEEE 802.1X/EAPOL reauthentication
  autoscan [params] = Set or unset (if none) autoscan parameters
  raw <params..> = Sent unprocessed command
  flush = flush wpa_supplicant state
  radio_work = radio_work <show/add/done>
[root@alarm~]#wpa#u请求者-Dnl80211-iwlan0-c/root/wpa#u 0#u 8.conf&
[1] 273
[root@alarm~]#已成功初始化wpa_请求程序
[root@alarm~]#wpa#U cli
wpa_cli v2.1
版权所有(c)2004-2014,Jouni Malinen和贡献者
本软件可根据BSD许可证的条款进行分发。
有关更多详细信息,请参见自述。
所选接口“wlan0”
交互模式
>p2p_-find
失败
>帮助
命令:
状态[详细]=获取当前WPA/EAPOL/EAP状态
ifname=获取当前接口名称
ping=pings wpa_请求者
relog=重新打开日志文件(允许滚动日志)
note=向wpa\u请求者调试日志添加注释
mib=获取mib变量(dot1x、dot11)
help[命令]=显示用法帮助
接口[ifname]=显示接口/选择接口
级别=更改调试级别
许可证=显示完整的wpa\u cli许可证
退出=退出wpa\u cli
set=设置变量(在不带参数的情况下运行时显示变量列表)
获取信息
登录=IEEE 802.1X EAPOL状态机登录
注销=IEEE 802.1X EAPOL状态机注销
pmksa=显示pmksa缓存
重新关联=强制重新关联
预验证=强制预验证
标识=为SSID配置标识
password=为SSID配置密码
new_password=更改SSID的密码
pin=为SSID配置pin
otp=为SSID配置一次性密码
密码短语=配置私钥密码短语
对于SSID
sim=报告sim操作结果
bssid=为SSID设置首选bssid
黑名单=将BSSID添加到黑名单
清除黑名单=清除黑名单
黑名单=显示黑名单
日志级别[]=更新日志级别/时间戳
log_level=显示当前日志级别和日志选项
列表\网络=列表配置的网络
选择网络=选择一个网络(禁用其他网络)
enable_network=启用网络
禁用网络=禁用网络
添加\网络=添加网络
删除\网络=删除网络
设置网络=设置网络变量(显示
无参数运行时的变量列表)
获取网络=获取网络变量
list\u creds=列出配置的凭据
add_cred=添加凭证
remove\u cred=删除凭证
set_cred=设置凭证变量
save_config=保存当前配置
断开连接=断开连接并等待重新关联/重新连接命令
连接
重新连接=类似于重新关联,但仅在已断开连接时生效
扫描=请求新的BSS扫描
扫描结果=获取最新的扫描结果
bss=获取详细的扫描结果信息
获取能力=获取能力
重新配置=强制wpa_请求者重新读取其配置文件
终止=终止wpa_请求人
接口添加
=添加新接口,但不包括所有参数
是可选的
接口\移除=移除接口
接口列表=列出可用接口
ap\U扫描=设置ap\U扫描参数
扫描间隔=设置扫描间隔参数(秒)
bss\u expire\u age=设置bss过期时间参数
bss\u expire\u count=设置bss过期扫描计数参数
bss_flush=设置bss flush age(默认为0)
stkstart=请求与STK协商
ft_ds=通过ds ft请求
wps_pbc[BSSID]=启动受Wi-Fi保护的设置:按钮配置
wps_pin[pin]=启动wps pin方法(如果未硬编码,则返回pin)
wps\u check\u pin=验证pin校验和
wps_cancel取消挂起的wps操作
wps_nfc[BSSID]=启动受Wi-Fi保护的设置:nfc
wps\u nfc\u config\u令牌=生成配置令牌
wps\u nfc\u令牌=创建密码令牌
wps\U nfc\U tag\U read=报告读取带有wps数据的nfc标记
nfc\u获取\u移交\u请求=创建nfc移交请求
nfc\u获取\u移交\u选择=创建nfc移交选择
nfc_接收_移交_请求=报告收到的nfc移交请求
nfc\U rx\U移交\U sel=报告收到nfc移交选择
nfc_报告_移交=报告完成的nfc移交
wps_reg=启动wps注册器以配置AP
wps_ap_引脚[参数..]=启用/禁用ap引脚
wps_er_start[IP地址]=启动受Wi-Fi保护的设置外部注册器
wps_er_stop=停止受Wi-Fi保护的设置外部注册器
wps_er_pin=向外部注册机构添加注册者pin
wps_er_pbc=使用外部注册器接受加入者pbc
wps_er_learn=了解AP配置
wps\u er\u set\u config=为注册设置AP配置
wps\u er\u config=配置AP
wps\u er\u nfc\u配置\u令牌=构建nfc配置令牌
ibss_rsn=在ibss中请求rsn身份验证
sta=获取有关相关站点(AP)的信息
all_sta=获取所有相关站点(AP)的信息
取消认证=取消对站点的认证
解除关联=解除站点关联
信道交换机[秒信道偏移=][中心频率1=][中心频率2=][带宽=][块发送][ht | vht]=CSA参数
suspend=暂停/休眠的通知
resume=恢复/解冻通知
drop_sa=在没有deauth/disassoc的情况下drop sa(测试命令)
漫游=漫游到指定的BSS
p2p_find[timeout][type=*]=查找p2p设备的时间最长为超时秒
p2p\u stop\u find=停止p2p设备搜索
p2p_connect[ht40]=连接到p2p设备
p2p_listen[超时]=侦听p2p设备最多超时秒
p2p\u group\u remove=删除p2p组接口(如果转到,则终止组)
p2p_组_添加[ht40]=添加新的p2p组(本地端为GO)
p2p_prov_dis