亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? wpa_supplicant.conf.sgml

?? via usb driver that support vt6656 chipsets
?? SGML
字號:
<!doctype refentry PUBLIC "-//OASIS//DTD DocBook V4.1//EN"><refentry>  <refmeta>    <refentrytitle>wpa_supplicant.conf</refentrytitle>    <manvolnum>5</manvolnum>  </refmeta>  <refnamediv>    <refname>wpa_supplicant.conf</refname>    <refpurpose>configuration file for wpa_supplicant</refpurpose>  </refnamediv>  <refsect1>    <title>Overview</title>    <para><command>wpa_supplicant</command> is configured using a text    file that lists all accepted networks and security policies,    including pre-shared keys. See the example configuration file,    probably in <command>/usr/share/doc/wpa_supplicant/</command>, for    detailed information about the configuration format and supported    fields.</para>    <para>All file paths in this configuration file should use full    (absolute, not relative to working directory) path in order to allow    working directory to be changed. This can happen if wpa_supplicant is    run in the background.</para>    <para>Changes to configuration file can be reloaded be sending    SIGHUP signal to <command>wpa_supplicant</command> ('killall -HUP    wpa_supplicant'). Similarly, reloading can be triggered with    'wpa_cli reconfigure' command.</para>    <para>Configuration file can include one or more network blocks,    e.g., one for each used SSID. wpa_supplicant will automatically    select the best betwork based on the order of network blocks in    the configuration file, network security level (WPA/WPA2 is    prefered), and signal strength.</para>  </refsect1>  <refsect1>    <title>Quick Examples</title>    <orderedlist>      <listitem>      <para>WPA-Personal (PSK) as home network and WPA-Enterprise with      EAP-TLS as work network.</para><blockquote><programlisting># allow frontend (e.g., wpa_cli) to be used by all users in 'wheel' groupctrl_interface=/var/run/wpa_supplicantctrl_interface_group=wheel## home network; allow all valid ciphersnetwork={	ssid="home"	scan_ssid=1	key_mgmt=WPA-PSK	psk="very secret passphrase"}## work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphersnetwork={	ssid="work"	scan_ssid=1	key_mgmt=WPA-EAP	pairwise=CCMP TKIP	group=CCMP TKIP	eap=TLS	identity="user@example.com"	ca_cert="/etc/cert/ca.pem"	client_cert="/etc/cert/user.pem"	private_key="/etc/cert/user.prv"	private_key_passwd="password"}</programlisting></blockquote>         </listitem>      <listitem>	<para>WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that        use old peaplabel (e.g., Funk Odyssey and SBR, Meetinghouse        Aegis, Interlink RAD-Series)</para><blockquote><programlisting>ctrl_interface=/var/run/wpa_supplicantctrl_interface_group=wheelnetwork={	ssid="example"	scan_ssid=1	key_mgmt=WPA-EAP	eap=PEAP	identity="user@example.com"	password="foobar"	ca_cert="/etc/cert/ca.pem"	phase1="peaplabel=0"	phase2="auth=MSCHAPV2"}</programlisting></blockquote>      </listitem>      <listitem>	<para>EAP-TTLS/EAP-MD5-Challenge configuration with anonymous        identity for the unencrypted use. Real identity is sent only        within an encrypted TLS tunnel.</para><blockquote><programlisting>ctrl_interface=/var/run/wpa_supplicantctrl_interface_group=wheelnetwork={	ssid="example"	scan_ssid=1	key_mgmt=WPA-EAP	eap=TTLS	identity="user@example.com"	anonymous_identity="anonymous@example.com"	password="foobar"	ca_cert="/etc/cert/ca.pem"	phase2="auth=MD5"}</programlisting></blockquote>      </listitem>      <listitem>	<para>IEEE 802.1X (i.e., no WPA) with dynamic WEP keys        (require both unicast and broadcast); use EAP-TLS for        authentication</para><blockquote><programlisting>ctrl_interface=/var/run/wpa_supplicantctrl_interface_group=wheelnetwork={	ssid="1x-test"	scan_ssid=1	key_mgmt=IEEE8021X	eap=TLS	identity="user@example.com"	ca_cert="/etc/cert/ca.pem"	client_cert="/etc/cert/user.pem"	private_key="/etc/cert/user.prv"	private_key_passwd="password"	eapol_flags=3}</programlisting></blockquote>      </listitem>      <listitem>	<para>Catch all example that allows more or less all        configuration modes. The configuration options are used based        on what security policy is used in the selected SSID. This is        mostly for testing and is not recommended for normal        use.</para><blockquote><programlisting>ctrl_interface=/var/run/wpa_supplicantctrl_interface_group=wheelnetwork={	ssid="example"	scan_ssid=1	key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE	pairwise=CCMP TKIP	group=CCMP TKIP WEP104 WEP40	psk="very secret passphrase"	eap=TTLS PEAP TLS	identity="user@example.com"	password="foobar"	ca_cert="/etc/cert/ca.pem"	client_cert="/etc/cert/user.pem"	private_key="/etc/cert/user.prv"	private_key_passwd="password"	phase1="peaplabel=0"	ca_cert2="/etc/cert/ca2.pem"	client_cert2="/etc/cer/user.pem"	private_key2="/etc/cer/user.prv"	private_key2_passwd="password"}</programlisting></blockquote>      </listitem>      <listitem>	<para>Authentication for wired Ethernet. This can be used with       'wired' interface (-Dwired on command line).</para><blockquote><programlisting>ctrl_interface=/var/run/wpa_supplicantctrl_interface_group=wheelap_scan=0network={	key_mgmt=IEEE8021X	eap=MD5	identity="user"	password="password"	eapol_flags=0}</programlisting></blockquote>      </listitem>    </orderedlist>  </refsect1>  <refsect1>    <title>Certificates</title>    <para>Some EAP authentication methods require use of    certificates. EAP-TLS uses both server side and client    certificates whereas EAP-PEAP and EAP-TTLS only require the server    side certificate. When client certificate is used, a matching    private key file has to also be included in configuration. If the    private key uses a passphrase, this has to be configured in    wpa_supplicant.conf ("private_key_passwd").</para>    <para>wpa_supplicant supports X.509 certificates in PEM and DER    formats. User certificate and private key can be included in the    same file.</para>    <para>If the user certificate and private key is received in    PKCS#12/PFX format, they need to be converted to suitable PEM/DER    format for wpa_supplicant. This can be done, e.g., with following    commands:</para><blockquote><programlisting># convert client certificate and private key to PEM formatopenssl pkcs12 -in example.pfx -out user.pem -clcerts# convert CA certificate (if included in PFX file) to PEM formatopenssl pkcs12 -in example.pfx -out ca.pem -cacerts -nokeys</programlisting></blockquote>  </refsect1>  <refsect1>    <title>See Also</title>    <para>      <citerefentry>	<refentrytitle>wpa_supplicant</refentrytitle>	<manvolnum>8</manvolnum>      </citerefentry>      <citerefentry>	<refentrytitle>openssl</refentrytitle>	<manvolnum>1</manvolnum>      </citerefentry>    </para>  </refsect1></refentry>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩欧美成人午夜| 99精品在线观看视频| 欧美亚洲一区二区在线观看| 精品国产一二三区| 亚洲最快最全在线视频| 国产.精品.日韩.另类.中文.在线.播放| 色综合久久天天| 久久蜜臀精品av| 麻豆精品在线播放| 国产精品色在线观看| 欧美自拍偷拍一区| 视频一区二区不卡| 国产精品久久久久久久第一福利| 国产精品美女久久久久高潮| 亚洲人成网站精品片在线观看| 国产乱子伦一区二区三区国色天香| 欧美性videosxxxxx| 一区二区三区不卡在线观看 | 一区二区三区日韩欧美精品 | 久久午夜羞羞影院免费观看| 日韩av电影天堂| 日韩欧美中文一区| 全部av―极品视觉盛宴亚洲| 欧美一区二区三区白人| 日韩中文字幕亚洲一区二区va在线| 欧美日韩中文字幕精品| 视频一区二区三区中文字幕| 日韩精品一区二区三区中文精品| 老司机免费视频一区二区| 精品乱人伦小说| 成人午夜av影视| 亚洲国产欧美日韩另类综合 | 国产98色在线|日韩| 中日韩免费视频中文字幕| 91网址在线看| 亚洲成人福利片| 日韩免费成人网| 成人激情小说网站| 夜夜嗨av一区二区三区网页| 在线电影院国产精品| 国产精品1024| 午夜精品视频在线观看| 久久久久青草大香线综合精品| 成人app网站| 日韩av一区二区三区四区| 国产精品毛片a∨一区二区三区| 日本高清不卡视频| 国产一区二区三区香蕉| 亚洲图片欧美视频| 中文一区二区在线观看| 欧美日韩夫妻久久| av在线综合网| 久久69国产一区二区蜜臀 | 成人在线视频首页| 日韩经典中文字幕一区| 亚洲欧美在线视频| 久久久久久久久久久黄色| 欧美精品欧美精品系列| 99视频一区二区| 国产精品一区二区x88av| 首页亚洲欧美制服丝腿| 亚洲图片激情小说| 日本一区二区三区国色天香| 日韩欧美你懂的| 7777精品久久久大香线蕉| 日本精品视频一区二区三区| 成人午夜在线免费| 国产精品亚洲一区二区三区妖精 | 成人涩涩免费视频| 国产一区二区三区精品欧美日韩一区二区三区| 亚洲第一精品在线| 亚洲一区视频在线| 一区二区三区免费在线观看| 中文字幕日韩一区二区| 一色桃子久久精品亚洲| 亚洲男人的天堂av| 亚洲精品乱码久久久久久| 亚洲精品老司机| 一区二区三区国产豹纹内裤在线 | 国产成人亚洲综合色影视| 久88久久88久久久| 国产露脸91国语对白| 粉嫩aⅴ一区二区三区四区| eeuss国产一区二区三区| 不卡的av在线播放| 在线观看视频一区二区| 欧美色老头old∨ideo| 欧美一卡二卡三卡| 精品国产1区二区| 国产精品久久777777| 亚洲欧洲日本在线| 无吗不卡中文字幕| 久久91精品国产91久久小草| 国产成人精品免费网站| 在线观看国产日韩| 26uuu精品一区二区| 日韩美女精品在线| 久久精品国产亚洲a| 成人综合激情网| 91精品国产色综合久久不卡电影 | 欧美自拍丝袜亚洲| 91精品久久久久久蜜臀| 国产区在线观看成人精品 | 国产一区二区女| 在线观看成人免费视频| 一区二区高清在线| 日韩国产在线观看一区| 国产一区二区剧情av在线| 在线视频综合导航| 久久影院午夜论| 一区二区三区四区精品在线视频 | 91视频免费播放| 精品国产sm最大网站免费看| 一区二区三区欧美激情| 国产激情视频一区二区在线观看 | 久久久不卡网国产精品二区| 亚洲国产精品精华液网站| 国产成人aaa| 精品久久人人做人人爰| 婷婷一区二区三区| 日本韩国一区二区三区视频| 国产午夜精品久久久久久久 | 成人免费一区二区三区视频| 国产精品影视网| 51精品久久久久久久蜜臀| 亚洲伦理在线免费看| 成人精品免费网站| 国产欧美一区二区三区在线看蜜臀 | 欧美性受极品xxxx喷水| 亚洲欧美日韩电影| 不卡的av在线| 亚洲欧美色一区| 欧美影院一区二区| 亚洲成人av电影| 欧美一二三四区在线| 奇米影视7777精品一区二区| 欧美一区二区三区在线视频 | 色婷婷av一区二区三区gif | 欧美色网一区二区| 亚洲不卡av一区二区三区| 欧美日韩1234| 蜜臀av国产精品久久久久| 日韩你懂的在线观看| 国产主播一区二区| 国产精品久久久久久福利一牛影视 | 亚洲va国产天堂va久久en| 欧美日韩国产区一| 国产综合成人久久大片91| 久久久99精品免费观看不卡| 成人av在线网| 一区二区三区在线观看欧美| 欧美日韩另类国产亚洲欧美一级| 日日欢夜夜爽一区| 久久久久久久av麻豆果冻| 99国产精品久久久久久久久久久| 亚洲黄色免费网站| 欧美一区二区日韩| 成人一级片网址| 亚洲小说春色综合另类电影| 欧美白人最猛性xxxxx69交| 成人h版在线观看| 青青草成人在线观看| 国产精品少妇自拍| 91精品免费在线| 91蜜桃在线免费视频| 久久电影网电视剧免费观看| 一区在线观看视频| 日韩美一区二区三区| 91久久久免费一区二区| 国产一区二区三区高清播放| 亚洲午夜激情av| 亚洲国产成人私人影院tom| 欧美一区二区三区思思人| 91美女片黄在线观看91美女| 九九视频精品免费| 图片区小说区区亚洲影院| 亚洲天堂福利av| 国产精品天天摸av网| 欧美mv和日韩mv国产网站| 欧美日韩国产大片| 在线视频国内一区二区| 不卡av在线网| 成人久久视频在线观看| 国产成人亚洲精品狼色在线| 蜜桃91丨九色丨蝌蚪91桃色| 偷窥少妇高潮呻吟av久久免费| 亚洲色图第一区| 一区二区三区精品视频在线| 自拍偷拍国产精品| 国产精品女主播av| √…a在线天堂一区| 成人免费在线播放视频| 亚洲图片另类小说| 亚洲欧美另类综合偷拍| 亚洲欧洲一区二区三区| 亚洲视频在线观看三级| 一区二区中文视频| 亚洲一区在线观看免费观看电影高清| 亚洲国产电影在线观看| 亚洲日本青草视频在线怡红院|