R3070驱动移植

WWHHJJ1 2013-12-11 06:58:44
[root@FriendlyARM /root]# insmod rt3070sta.ko
rtusb init rt2870 --->


=== pAd = c48ee000, size = 510936 ===

<-- RTMPAllocAdapterBlock, Status=0
NVM is EFUSE
usbcore: registered new interface driver rt2870
[root@FriendlyARM /root]# ifconfig ra0 up
NICLoadFirmware: We need to load firmware
<-- RTMPAllocTxRxRingMemory, Status=0
RTMP_TimerListAdd: add timer obj c4936080!
RTMP_TimerListAdd: add timer obj c49360ac!
RTMP_TimerListAdd: add timer obj c49360d8!
RTMP_TimerListAdd: add timer obj c4936054!
RTMP_TimerListAdd: add timer obj c4935fd0!
RTMP_TimerListAdd: add timer obj c4935ffc!
RTMP_TimerListAdd: add timer obj c4900814!
RTMP_TimerListAdd: add timer obj c48efd0c!
RTMP_TimerListAdd: add timer obj c48efd3c!
RTMP_TimerListAdd: add timer obj c49008ac!
RTMP_TimerListAdd: add timer obj c49007bc!
RTMP_TimerListAdd: add timer obj c490087c!
-->RTUSBVenderReset
<--RTUSBVenderReset
Key1Str is Invalid key length(0) or Type(0)
Key2Str is Invalid key length(0) or Type(0)
Key3Str is Invalid key length(0) or Type(0)
Key4Str is Invalid key length(0) or Type(0)
1. Phy Mode = 5
2. Phy Mode = 5
NVM is Efuse and its size =2d[2d0-2fc]
phy mode> Error! The chip does not support 5G band 5!
RTMPSetPhyMode: channel is out of range, use first channel=1
3. Phy Mode = 9
AntCfgInit: primary/secondary ant 0/1
MCS Set = ff 00 00 00 01
<==== rt28xx_init, Status=0
0x1300 = 00064300
[root@FriendlyARM /root]# ifconfig eth0 down
[root@FriendlyARM /root]# ifconfig ra0 192.168.1.104
[root@FriendlyARM /root]# route add default gw 192.168.1.1

[root@FriendlyARM /root]# wpa_supplicant -Dwext -i ra0 -c /etc/wpa_supplicant.co
nf -dd &
[root@FriendlyARM /root]# ping 192.168.1.1
PING 192.168.1.1 (192.168.1.1): 56 data bytes
^C
--- 192.168.1.1 ping statistics ---
9 packets transmitted, 0 packets received, 100% packet loss
[root@FriendlyARM /root]#

[root@FriendlyARM /root]# ifconfig
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:9 errors:0 dropped:0 overruns:0 frame:0
TX packets:9 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:1008 (1008.0 B) TX bytes:1008 (1008.0 B)

ra0 Link encap:Ethernet HWaddr 48:02:2A:57:E6:84
inet addr:192.168.1.104 Bcast:192.168.1.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:10769 errors:0 dropped:0 overruns:0 frame:0
TX packets:50 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:2044797 (1.9 MiB) TX bytes:3416 (3.3 KiB)

真心不知道问题出哪了,就是ping不通折磨死了,希望大哥大姐帮下小妹,谢谢了

...全文
517 6 打赏 收藏 转发到动态 举报
写回复
用AI写文章
6 条回复
切换为时间正序
请发表友善的回复…
发表回复
voice_shen 2013-12-12
  • 打赏
  • 举报
回复
其实有个更简单的方法,其实都不用wpa_supplicant,真接更改RT2870STA.dat文件,更改相关参数,让其与你要连接的AP信息一样。
voice_shen 2013-12-12
  • 打赏
  • 举报
回复
你确定已经连接上了AP? 建议关掉debug信息。让wpa_supplicant后台运行。 我的做法,运行wpa_supplicant后,再让其dhcp来获取IP地址。然后进行网络测试。
WWHHJJ1 2013-12-12
  • 打赏
  • 举报
回复
能说的详细点么
WWHHJJ1 2013-12-11
  • 打赏
  • 举报
回复
字数太多所以分开写了,谢了
WWHHJJ1 2013-12-11
  • 打赏
  • 举报
回复
State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:25:86:1b:d9:a0 No keys have been configured - skip key clearing Associated with 00:25:86:1b:d9:a0 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RX EAPOL from 00:25:86:1b:d9:a0 RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 0f 80 8b 5d 21 06 41 91 e7 84 a2 c0 4b 38 ea 10 80 02 90 64 f7 b6 57 b6 1c 66 3a f1 bf f6 cb 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): 0f 80 8b 5d 21 06 41 91 e7 84 a2 c0 4b 38 ea 10 80 02 90 64 f7 b6 57 b6 1c 66 3a f1 bf f6 cb 6e key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 0f 80 8b 5d 21 06 41 91 e7 84 a2 c0 4b 38 ea 10 80 02 90 64 f7 b6 57 b6 1c 66 3a f1 bf f6 cb 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:25:86:1b:d9:a0 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): db b7 49 7f 2e a5 84 b0 6b 13 91 93 05 1a 95 6a 8c b9 5a 85 c4 4c d5 0f 7b 96 a2 73 7c 30 fc 59 WPA: PTK derivation - A1=48:02:2a:57:e6:84 A2=00:25:86:1b:d9:a0 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 db b7 49 7f 2e a5 84 b0 6b 13 91 93 05 1a 95 6a 8c b9 5a 85 c4 4c d5 0f 7b 96 a2 73 7c 30 fc 59 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 dc 84 d5 71 be 17 bb fb 1c b5 bb f2 77 bf 8c 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from 00:25:86:1b:d9:a0 RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 0f 80 8b 5d 21 06 41 91 e7 84 a2 c0 4b 38 ea 10 80 02 90 64 f7 b6 57 b6 1c 66 3a f1 bf f6 cb 6e 60 80 9c ef 0e 69 de d0 ce 68 31 e0 a9 1d 57 96 f0 3b 01 00 01 00 00 00 00 00 00 00 00 00 00 00 10 73 ae ea 36 e3 8d 20 00 2e e4 21 92 da 89 70 00 38 ff b0 47 77 5c 4a be c7 eb 67 72 a6 9b ce ee d6 02 76 d3 f5 fd 21 19 07 99 c8 03 6d 7d 52 a5 a7 43 08 b7 26 9b e4 cc 09 34 65 89 83 dd cc 37 bb 71 73 74 f0 33 54 24 ce IEEE 802.1X RX: version=1 type=3 length=151 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=56 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): 0f 80 8b 5d 21 06 41 91 e7 84 a2 c0 4b 38 ea 10 80 02 90 64 f7 b6 57 b6 1c 66 3a f1 bf f6 cb 6e key_iv - hexdump(len=16): 60 80 9c ef 0e 69 de d0 ce 68 31 e0 a9 1d 57 96 key_rsc - hexdump(len=8): f0 3b 01 00 01 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 10 73 ae ea 36 e3 8d 20 00 2e e4 21 92 da 89 70 WPA: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 0f 80 8b 5d 21 06 41 91 e7 84 a2 c0 4b 38 ea 10 80 02 90 64 f7 b6 57 b6 1c 66 3a f1 bf f6 cb 6e 60 80 9c ef 0e 69 de d0 ce 68 31 e0 a9 1d 57 96 f0 3b 01 00 01 00 00 00 00 00 00 00 00 00 00 00 10 73 ae ea 36 e3 8d 20 00 2e e4 21 92 da 89 70 00 38 ff b0 47 77 5c 4a be c7 eb 67 72 a6 9b ce ee d6 02 76 d3 f5 fd 21 19 07 99 c8 03 6d 7d 52 a5 a7 43 08 b7 26 9b e4 cc 09 34 65 89 83 dd cc 37 bb 71 73 74 f0 33 54 24 ce RSN: encrypted key data - hexdump(len=56): ff b0 47 77 5c 4a be c7 eb 67 72 a6 9b ce ee d6 02 76 d3 f5 fd 21 19 07 99 c8 03 6d 7d 52 a5 a7 43 08 b7 26 9b e4 cc 09 34 65 89 83 dd cc 37 bb 71 73 74 f0 33 54 24 ce WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:25:86:1b:d9:a0 (ver=2) WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 01 00 dd 16 00 0f ac 01 01 00 79 b5 5f eb 26 5b 50 ab 10 ec 4a fb a8 de 4b d8 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 01 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=2): 00 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09 18 e5 0f 83 70 a1 e0 d9 4f 47 44 d3 69 80 57 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16). WPA: RSC - hexdump(len=6): f0 3b 01 00 01 00 wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16 WPA: Key negotiation completed with 00:25:86:1b:d9:a0 [PTK=CCMP GTK=CCMP] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:25:86:1b:d9:a0 completed (auth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) netlink: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed successfully RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added EAPOL: startWhen --> 0 EAPOL: disable timer tick
WWHHJJ1 2013-12-11
  • 打赏
  • 举报
回复
[root@FriendlyARM /root]# wpa_supplicant -Dwext -i ra0 -c /etc/wpa_supplicant.conf -dd & [root@FriendlyARM /root]# Initializing interface 'ra0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' Reading configuration file '/etc/wpa_supplicant.conf' ctrl_interface='/var/run/wpa_supplicant' Line: 2 - start of a new network block ssid - hexdump_ascii(len=2): 74 74 tt scan_ssid=1 (0x1) proto: 0x2 key_mgmt: 0xf pairwise: 0x18 group: 0x1e PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED] PSK (from passphrase) - hexdump(len=32): [REMOVED] Priority group 0 id=0 ssid='tt' SIOCGIWRANGE: WE(compiled)=22 WE(source)=14 enc_capa=0xf capabilities: key_mgmt 0xf enc 0xf flags 0x0 netlink: Operstate: linkmode=1, operstate=5 Own MAC address: 48:02:2a:57:e6:84 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_countermeasures RSN: flushing PMKID list in the driver Setting scan request: 0 sec 100000 usec EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized Added interface ra0 RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added State: DISCONNECTED -> SCANNING Scan SSID - hexdump_ascii(len=2): 74 74 tt Starting AP scan for specific SSID(s) Scan requested (ret=0) - scan timeout 5 seconds EAPOL: disable timer tick EAPOL: Supplicant port status: Unauthorized Scan timeout - try to get results ===>rt_ioctl_giwscan. 23(23) BSS returned, data->length = 3443 Received 3443 bytes of scan results (23 BSSes) BSS: Start scan result update 1 BSS: Add new id==>rt_ioctl_siwfreq::SIOCSIWFREQ(Channel=1) 0 BSSID 22:17:c4:f0:55:00 SSID 'DubaWiFi-1195' BSS: Add new id 1 BSSID 00:25:86:1b:d9:a0 SSID 'tt' BSS: Add new id 2 BSSID be:b7:0d:dc:6c:23 SSID 'Connectify-que' BSS: Add new id 3 BSSID 8c:21:0a:49:c8:b4 SSID 'WHUT-HJM' BSS: Add new id 4 BSSID 00:1d:0f:6a:7b:d2 SSID 'TP-LINK-SZBGS' BSS: Add new id 5 BSSID 04:a1:51:28:20:31 SSID 'XXGUO' BSS: Add new id 6 BSSID 5c:63:bf:6a:7d:e4 SSID 'Lab1807' BSS: Add new id 7 BSSID ec:88:8f:89:c9:cc SSID 'TP-LINK_89C9CC' BSS: Add new id 8 BSSID bc:96:80:2c:79:64 SSID 'SodaGreen' BSS: Add new id 9 BSSID 28:c6:8e:01:f5:3c SSID 'NETGEAR65' BSS: Add new id 10 BSSID 0a:27:1d:1a:e3:94 SSID 'CMCC-AUTO' BSS: Add new id 11 BSSID bc:d1:77:8a:a7:1c SSID 'TP-LINK_8AA71C' BSS: Add new id 12 BSSID 0a:27:1d:1a:e3:99 SSID 'CMCC-AUTO' BSS: Add new id 13 BSSID f8:d1:11:f8:64:0c SSID 'LAB1707B' BSS: Add new id 14 BSSID 40:16:9f:30:c0:6a SSID 'SBCHZ' BSS: Add new id 15 BSSID e0:05:c5:17:32:e6 SSID '1713' BSS: Add new id 16 BSSID 8c:21:0a:44:5c:1e SSID '18zgyd' BSS: Add new id 17 BSSID 00:36:76:01:be:b7 SSID '360-ZSBEB7' BSS: Add new id 18 BSSID 00:27:1d:1a:e3:94 SSID 'CMCC' BSS: Add new id 19 BSSID 06:27:1d:1a:e3:94 SSID 'CMCC-EDU' BSS: Add new id 20 BSSID 00:27:1d:1a:e3:99 SSID 'CMCC' BSS: Add new id 21 BSSID 06:27:1d:1a:e3:99 SSID 'CMCC-EDU' BSS: Add new id 22 BSSID 00:27:1d:1a:e3:96 SSID 'CMCC' New scan results available Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 22:17:c4:f0:55:00 ssid='DubaWiFi-1195' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 skip - SSID mismatch 1: 00:25:86:1b:d9:a0 ssid='tt' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 selected based on RSN IE selected WPA AP 00:25:86:1b:d9:a0 ssid='tt' Trying to associate with 00:25:86:1b:d9:a0 (SSID='tt' freq=2412 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 01 00 WPA: using GTK CCMP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added Wireless event: cmd=0x8c07 len=40 AssocReq IE wireless event - hexdump(len=32): 00 02 74 74 01 04 82 84 8b 96 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:25:00:00:d9:a0 Association info event req_ies - hexdump(len=32): 00 02 74 74 01 04 82 84 8b 96 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00

21,597

社区成员

发帖
与我相关
我的任务
社区描述
硬件/嵌入开发 驱动开发/核心开发
社区管理员
  • 驱动开发/核心开发社区
加入社区
  • 近7日
  • 近30日
  • 至今
社区公告
暂无公告

试试用AI创作助手写篇文章吧