003 File Manager
Current Path:
/usr/src/contrib/wpa/wpa_supplicant/examples
usr
/
src
/
contrib
/
wpa
/
wpa_supplicant
/
examples
/
📁
..
📄
60_wpa_supplicant
(267 B)
📄
dbus-listen-preq.py
(1.68 KB)
📄
dpp-qrcode.py
(4.02 KB)
📄
ieee8021x.conf
(269 B)
📄
openCryptoki.conf
(1.12 KB)
📁
p2p
📄
p2p-action-udhcp.sh
(1.68 KB)
📄
p2p-action.sh
(2.63 KB)
📄
p2p-nfc.py
(19.82 KB)
📄
plaintext.conf
(133 B)
📄
udhcpd-p2p.conf
(2.86 KB)
📄
wep.conf
(170 B)
📄
wpa-psk-tkip.conf
(181 B)
📄
wpa2-eap-ccmp.conf
(284 B)
📄
wpas-dbus-new-getall.py
(1.73 KB)
📄
wpas-dbus-new-signals.py
(5.94 KB)
📄
wpas-dbus-new-wps.py
(2.18 KB)
📄
wpas-dbus-new.py
(4.18 KB)
📄
wps-ap-cli
(1.15 KB)
📄
wps-nfc.py
(15.38 KB)
Editing: openCryptoki.conf
# EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and # openCryptoki (e.g., with TPM token) # This example uses following PKCS#11 objects: # $ pkcs11-tool --module /usr/lib/opencryptoki/libopencryptoki.so -O -l # Please enter User PIN: # Private Key Object; RSA # label: rsakey # ID: 04 # Usage: decrypt, sign, unwrap # Certificate Object, type = X.509 cert # label: ca # ID: 01 # Certificate Object, type = X.509 cert # label: cert # ID: 04 # Configure OpenSSL to load the PKCS#11 engine and openCryptoki module pkcs11_engine_path=/usr/lib/engines/engine_pkcs11.so pkcs11_module_path=/usr/lib/opencryptoki/libopencryptoki.so network={ ssid="test network" key_mgmt=WPA-EAP eap=TLS identity="User" # use OpenSSL PKCS#11 engine for this network engine=1 engine_id="pkcs11" # select the private key and certificates based on ID (see pkcs11-tool # output above) key_id="4" cert_id="4" ca_cert_id="1" # set the PIN code; leave this out to configure the PIN to be requested # interactively when needed (e.g., via wpa_gui or wpa_cli) pin="123456" }
Upload File
Create Folder