⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 wpa_supplicant_example.conf

📁 RT73无线网络芯片最新linux下驱动 支持到linux2.6.24 并向下兼容
💻 CONF
📖 第 1 页 / 共 2 页
字号:
#	wep_key0=1234567890
#	wep_key1=0102030405
#	wep_key2="1234567890123"
#	wep_tx_keyidx=0
#	priority=5
#}

# Shared WEP key connection (no WPA, no IEEE 802.1X) using Shared Key
#network={
#	ssid="static-wep-test2"
#	key_mgmt=NONE
#	wep_key0="abcde"
#	wep_key1=0102030405
#	wep_key2="1234567890123"
#	wep_tx_keyidx=0
#	priority=5
#	auth_alg=SHARED
#}


# ===================== WPA-PSK =====================

# Only WPA-PSK is used. Any valid cipher combination is accepted.
#network={
#	ssid="psk-test1"
#	proto=WPA
#	key_mgmt=WPA-PSK
#	pairwise=TKIP
#	group=TKIP CCMP
#	psk="12345678"
#	priority=2
#}

# Only WPA2-PSK is used. Any valid cipher combination is accepted.
#network={
#	ssid="psk-test2"
#	proto=WPA2
#	key_mgmt=WPA-PSK
#	pairwise=CCMP
#	group=TKIP CCMP
#	psk="12345678"
#	priority=2
#}

# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers
#network={
#	ssid="simple"
#	psk="very secret passphrase"
#	priority=5
#}

# Same as previous, but request SSID-specific scanning (for APs that reject
# broadcast SSID)
#network={
#	ssid="second ssid"
#	scan_ssid=1
#	psk="very secret passphrase"
#	priority=2
#}


# ===================== WPA-EAP =====================

# Only WPA-EAP is used. Both CCMP and TKIP is accepted. An AP that used WEP104
# or WEP40 as the group cipher will not be accepted.
#network={
#	ssid="eap-radius-test1"
#	proto=WPA
#	key_mgmt=WPA-EAP
#	pairwise=TKIP
#	group=TKIP
#	eap=TLS
#	identity="wpatest2@wpa.com"
#  	ca_cert="/etc/cert/root.pem"
#	client_cert="/etc/cert/id.pem"
#	private_key="/etc/cert/id_key.pem"
#	private_key_passwd="test2"
#	priority=1
#}

# EAP-PEAP/MSCHAPv2 configuration for RADIUS servers that use the old peaplabel
# (e.g., Radiator)
#network={
#	ssid="eap-radius-test2"
#	proto=WPA
#	key_mgmt=WPA-EAP
#	pairwise=CCMP
#	group=CCMP TKIP
#	eap=PEAP
#	identity="wpatest2@wpa.com"
#	password="test2"
#	ca_cert="/etc/cert/root.pem"
#	phase1="peaplabel=0"
#	phase2="auth=MSCHAPV2"
#	priority=1
#}

# EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the
# unencrypted use. Real identity is sent only within an encrypted TLS tunnel.
#network={
#	ssid="example"
#	key_mgmt=WPA-EAP
#	eap=TTLS
#	identity="user@example.com"
#	anonymous_identity="anonymous@example.com"
#	password="foobar"
#	ca_cert="/etc/cert/ca.pem"
#	priority=2
#}

# EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the unencrypted
# use. Real identity is sent only within an encrypted TLS tunnel.
#network={
#	ssid="example"
#	key_mgmt=WPA-EAP
#	eap=TTLS
#	identity="user@example.com"
#	anonymous_identity="anonymous@example.com"
#	password="foobar"
#	ca_cert="/etc/cert/ca.pem"
#	phase2="auth=MSCHAPV2"
#}

# WPA-EAP, EAP-TTLS with different CA certificate used for outer and inner
# authentication.
#network={
#	ssid="195"
#	proto=WPA
#	key_mgmt=WPA-EAP
#	pairwise=TKIP
#	group=TKIP
#	eap=TTLS
	# Phase1 / outer authentication
#	anonymous_identity="2000serv\test1@wifi.com"
#	password="test1"
#	ca_cert="/etc/cert/root.pem"
	# Phase 2 / inner authentication
#	phase2="autheap=TLS"
#	ca_cert2="/etc/cert/ca2.pem"
#	client_cert2="/etc/cer/id.pem"
#	private_key2="/etc/cer/id_key.prv"
#	private_key2_passwd="test1"
#	priority=2
#}


# =====================  IEEE 802.1X =====================

# IEEE 802.1X/EAPOL with dynamically generated WEP keys (i.e., no WPA) using
# EAP-TLS for authentication and key generation; require both unicast and
# broadcast WEP keys.
#network={
#	ssid="195"
#	key_mgmt=IEEE8021X
#	eap=TLS
#	identity="wpatest2@wpa.com"
#	ca_cert="/etc/cert/root.pem"
#	client_cert="/etc/cert/id.pem"
#	private_key="/etc/cert/id_key.pem"
#	private_key_passwd="test2"
#	eapol_flags=3
#}

# IEEE 802.1X/EAPOL dynamically generated WEP keys (i.e., no WPA) using EAP-MD5
#network={#	ssid="230"#	key_mgmt=IEEE8021X	#	eap=MD5#	wep_key0=1234567890#	wep_tx_keyidx=0#	identity="MD5"#	password="EAPMD5"#	auth_alg=OPEN#	eapol_flags=0#}

#802.1X for PEAP/MSCHAPV2 old version test; require both unicast and 
#broadcast WEP keys.
#network={
#	ssid="195"
#	key_mgmt=IEEE8021X
#	eap=PEAP
#	identity="wpatest2@wpa.com"
#	password="test2"
#	ca_cert="/etc/cert/root.pem"
#	phase1="peaplable=0"
#	phase2="auth=MSCHAPV2"
#	eapol_flags=3
#}


# ===================== Adhoc Mode =====================
# Note: set ap_scan=2 in adhoc mode

# IBSS/ad-hoc network with OPEN WEP
#network={
#	ssid="adhoc-wep-test"
#	mode=1
#	key_mgmt=NONE
#	wep_key0=1234567890
#	wep_key1=0102030405
#	wep_key2="1234567890123"
#	wep_tx_keyidx=0
#	priority=5
#}

# IBSS/ad-hoc network with WPA-NONE/TKIP/CCMP.
#network={
#	ssid="adhoc-wpa-test"
#	mode=1
#	proto=WPA
#	key_mgmt=WPA-NONE
#	pairwise=NONE
#	group=TKIP
#	psk="12345678"
#}


# ===================== Mixed key mgmt =====================

# Both WPA-PSK and WPA-EAP is accepted. Only CCMP is accepted as pairwise and
# group cipher.
#network={
#	ssid="example"
#	bssid=00:11:22:33:44:55
#	proto=WPA RSN
#	key_mgmt=WPA-PSK WPA-EAP
#	pairwise=CCMP
#	group=CCMP
#	psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
#}

# Special characters in SSID, so use hex string. Default to WPA-PSK, WPA-EAP
# and all valid ciphers.
#network={
#	ssid=00010203
#	psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
#}

# Catch all example that allows more or less all configuration modes
#network={
#	ssid="example"
#	scan_ssid=1
#	key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
#	pairwise=CCMP TKIP
#	group=CCMP TKIP WEP104 WEP40
#	psk="very secret passphrase"
#	eap=TTLS PEAP TLS
#	identity="user@example.com"
#	password="foobar"
#	ca_cert="/etc/cert/ca.pem"
#	client_cert="/etc/cert/user.pem"
#	private_key="/etc/cert/user.prv"
#	private_key_passwd="password"
#	phase1="peaplabel=0"
#}


# ===================== Others =====================

# EAP-SIM with a GSM SIM or USIM
#network={
#	ssid="eap-sim-test"
#	key_mgmt=WPA-EAP
#	eap=SIM
#	pin="1234"
#	pcsc=""
#}

# EAP-PSK
#network={
#	ssid="eap-psk-test"
#	key_mgmt=WPA-EAP
#	eap=PSK
#	identity="eap_psk_user"
#	eappsk=06b4be19da289f475aa46a33cb793029
#	nai="eap_psk_user@example.com"
#}

# LEAP with dynamic WEP keys
#network={
#	ssid="leap-example"
#	key_mgmt=IEEE8021X
#	eap=LEAP
#	identity="user"
#	password="foobar"
#}

# EAP-FAST with WPA (WPA or WPA2)
#network={
#	ssid="eap-fast-test"
#	key_mgmt=WPA-EAP
#	eap=FAST
#	anonymous_identity="FAST-000102030405"
#	identity="username"
#	password="password"
#	phase1="fast_provisioning=1"
#	pac_file="/etc/wpa_supplicant.eap-fast-pac"
#}

# EAP-FAST with WPA (WPA or WPA2)
#network={
#	ssid="eap-fast-test"
#	key_mgmt=WPA-EAP
#	eap=FAST
#	anonymous_identity="FAST-000102030405"
#	identity="username"
#	password="password"
#	phase1="fast_provisioning=1"
#	pac_file="blob://eap-fast-pac"
#}

# Example of EAP-TLS with smartcard (openssl engine)
#network={
#	ssid="example"
#	key_mgmt=WPA-EAP
#	eap=TLS
#	proto=RSN
#	pairwise=CCMP TKIP
#	group=CCMP TKIP
#	identity="user@example.com"
#	ca_cert="/etc/cert/ca.pem"
#	client_cert="/etc/cert/user.pem"

#	engine=1

	# The engine configured here must be available. Look at
	# OpenSSL engine support in the global section.
	# The key available through the engine must be the private key
	# matching the client certificate configured above.

	# use the opensc engine
	#engine_id="opensc"
	#key_id="45"

	# use the pkcs11 engine
#	engine_id="pkcs11"
#	key_id="id_45"

	# Optional PIN configuration; this can be left out and PIN will be
	# asked through the control interface
#	pin="1234"
#}

# Example configuration showing how to use an inlined blob as a CA certificate
# data instead of using external file
#network={
#	ssid="example"
#	key_mgmt=WPA-EAP
#	eap=TTLS
#	identity="user@example.com"
#	anonymous_identity="anonymous@example.com"
#	password="foobar"
#	ca_cert="blob://exampleblob"
#	priority=20
#}

#blob-base64-exampleblob={
#SGVsbG8gV29ybGQhCg==
#}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -