X7ROOT File Manager
Current Path:
/usr/share/doc/wpa_supplicant-2.6/examples
usr
/
share
/
doc
/
wpa_supplicant-2.6
/
examples
/
📁
..
📄
60_wpa_supplicant
(267 B)
📄
dbus-listen-preq.py
(1.53 KB)
📄
ieee8021x.conf
(269 B)
📄
openCryptoki.conf
(1.12 KB)
📁
p2p
📄
p2p-action-udhcp.sh
(1.68 KB)
📄
p2p-action.sh
(2.63 KB)
📄
p2p-nfc.py
(19.73 KB)
📄
plaintext.conf
(133 B)
📄
udhcpd-p2p.conf
(2.86 KB)
📄
wep.conf
(170 B)
📄
wpa-psk-tkip.conf
(181 B)
📄
wpa2-eap-ccmp.conf
(284 B)
📄
wpas-dbus-new-getall.py
(1.7 KB)
📄
wpas-dbus-new-signals.py
(5.93 KB)
📄
wpas-dbus-new-wps.py
(2.17 KB)
📄
wpas-dbus-new.py
(4.17 KB)
📄
wpas-test.py
(2.51 KB)
📄
wps-ap-cli
(1.15 KB)
📄
wps-nfc.py
(15.31 KB)
Editing: openCryptoki.conf
# EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and # openCryptoki (e.g., with TPM token) # This example uses following PKCS#11 objects: # $ pkcs11-tool --module /usr/lib/opencryptoki/libopencryptoki.so -O -l # Please enter User PIN: # Private Key Object; RSA # label: rsakey # ID: 04 # Usage: decrypt, sign, unwrap # Certificate Object, type = X.509 cert # label: ca # ID: 01 # Certificate Object, type = X.509 cert # label: cert # ID: 04 # Configure OpenSSL to load the PKCS#11 engine and openCryptoki module pkcs11_engine_path=/usr/lib/engines/engine_pkcs11.so pkcs11_module_path=/usr/lib/opencryptoki/libopencryptoki.so network={ ssid="test network" key_mgmt=WPA-EAP eap=TLS identity="User" # use OpenSSL PKCS#11 engine for this network engine=1 engine_id="pkcs11" # select the private key and certificates based on ID (see pkcs11-tool # output above) key_id="4" cert_id="4" ca_cert_id="1" # set the PIN code; leave this out to configure the PIN to be requested # interactively when needed (e.g., via wpa_gui or wpa_cli) pin="123456" }
Upload File
Create Folder