亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? wpa1.conf

?? rtl8187的源碼
?? CONF
?? 第 1 頁 / 共 2 頁
字號:
##### Example wpa_supplicant configuration file ###############################
# Empty lines and lines starting with # are ignored

# NOTE! This file may contain password information and should probably be made
# readable only by root user on multiuser systems.

# global configuration (shared by all network blocks)
#
# Interface for separate control program. If this is specified, wpa_supplicant
# will create this directory and a UNIX domain socket for listening to requests
# from external programs (CLI/GUI, etc.) for status information and
# configuration. The socket file will be named based on the interface name, so
# multiple wpa_supplicant processes can be run at the same time if more than
# one interface is used.
# /var/run/wpa_supplicant is the recommended directory for sockets and by
# default, wpa_cli will use it when trying to connect with wpa_supplicant.
ctrl_interface=/var/run/wpa_supplicant

# Access control for the control interface can be configured by setting the
# directory to allow only members of a group to use sockets. This way, it is
# possible to run wpa_supplicant as root (since it needs to change network
# configuration and open raw sockets) and still allow GUI/CLI components to be
# run as non-root users. However, since the control interface can be used to
# change the network configuration, this access needs to be protected in many
# cases. By default, wpa_supplicant is configured to use gid 0 (root). If you
# want to allow non-root users to use the control interface, add a new group
# and change this value to match with that group. Add users that should have
# control interface access to this group. If this variable is commented out or
# not included in the configuration file, group will not be changed from the
# value it got by default when the directory or socket was created.
#
# This variable can be a group name or gid.
#ctrl_interface_group=wheel
ctrl_interface_group=0

# IEEE 802.1X/EAPOL version
# wpa_supplicant was implemented based on IEEE 802-1X-REV-d8 which defines
# EAPOL version 2. However, there are many APs that do not handle the new
# version number correctly (they seem to drop the frames completely). In order
# to make wpa_supplicant interoperate with these APs, the version number is set
# to 1 by default. This configuration value can be used to set it to the new
# version (2).
eapol_version=1

# AP scanning/selection
# By default, wpa_supplicant requests driver to perform AP scanning and then
# uses the scan results to select a suitable AP. Another alternative is to
# allow the driver to take care of AP scanning and selection and use
# wpa_supplicant just to process EAPOL frames based on IEEE 802.11 association
# information from the driver.
# 1: wpa_supplicant initiates scanning and AP selection
# 0: driver takes care of scanning, AP selection, and IEEE 802.11 association
#    parameters (e.g., WPA IE generation); this mode can also be used with
#    non-WPA drivers when using IEEE 802.1X mode; do not try to associate with
#    APs (i.e., external program needs to control association)
# 2: like 0, but associate with APs using security policy and SSID (but not
#    BSSID); this can be used, e.g., with ndiswrapper and NDIS driver to
#    enable operation with hidden SSIDs and optimized roaming; in this mode,
#    only the first network block in the configuration file is used and this
#    configuration should have explicit security policy (i.e., only one option
#    in the lists) for key_mgmt, pairwise, group, proto variables
ap_scan=1
#scan_ssid=0
# EAP fast re-authentication
# By default, fast re-authentication is enabled for all EAP methods that
# support it. This variable can be used to disable fast re-authentication.
# Normally, there is no need to disable this.
fast_reauth=1

# network block
#
# Each network (usually AP's sharing the same SSID) is configured as a separate
# block in this configuration file. The network blocks are in preference order
# (the first match is used).
#
# network block fields:
#
# ssid: SSID (mandatory); either as an ASCII string with double quotation or
#	as hex string; network name
#
# scan_ssid:
#	0 = do not scan this SSID with specific Probe Request frames (default)
#	1 = scan with SSID-specific Probe Request frames (this can be used to
#	    find APs that do not accept broadcast SSID or use multiple SSIDs;
#	    this will add latency to scanning, so enable this only when needed)
#
# bssid: BSSID (optional); if set, this network block is used only when
#	associating with the AP using the configured BSSID
#
# priority: priority group (integer)
# By default, all networks will get same priority group (0). If some of the
# networks are more desirable, this field can be used to change the order in
# which wpa_supplicant goes through the networks when selecting a BSS. The
# priority groups will be iterated in decreasing priority (i.e., the larger the
# priority value, the sooner the network is matched against the scan results).
# Within each priority group, networks will be selected based on security
# policy, signal strength, etc.
# Please note that AP scanning with scan_ssid=1 is not using this priority to
# select the order for scanning. Instead, it uses the order the networks are in
# the configuration file.
#
# mode: IEEE 802.11 operation mode
# 0 = infrastructure (Managed) mode, i.e., associate with an AP (default)
# 1 = IBSS (ad-hoc, peer-to-peer)
# Note: IBSS can only be used with key_mgmt NONE (plaintext and static WEP)
# and key_mgmt=WPA-NONE (fixed group key TKIP/CCMP). In addition, ap_scan has
# to be set to 2 for IBSS. WPA-None requires following network block options:
# proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not
# both), and psk must also be set.
#
# proto: list of accepted protocols
# WPA = WPA/IEEE 802.11i/D3.0
# RSN = WPA2/IEEE 802.11i (also WPA2 can be used as an alias for RSN)
# If not set, this defaults to: WPA RSN
#
# key_mgmt: list of accepted authenticated key management protocols
# WPA-PSK = WPA pre-shared key (this requires 'psk' field)
# WPA-EAP = WPA using EAP authentication (this can use an external
#	program, e.g., Xsupplicant, for IEEE 802.1X EAP Authentication
# IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically
#	generated WEP keys
# NONE = WPA is not used; plaintext or static WEP could be used
# If not set, this defaults to: WPA-PSK WPA-EAP
#
# auth_alg: list of allowed IEEE 802.11 authentication algorithms
# OPEN = Open System authentication (required for WPA/WPA2)
# SHARED = Shared Key authentication (requires static WEP keys)
# LEAP = LEAP/Network EAP (only used with LEAP)
# If not set, automatic selection is used (Open System with LEAP enabled if
# LEAP is allowed as one of the EAP methods).
#
# pairwise: list of accepted pairwise (unicast) ciphers for WPA
# CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0]
# TKIP = Temporal Key Integrity Protocol [IEEE 802.11i/D7.0]
# NONE = Use only Group Keys (deprecated, should not be included if APs support
#	pairwise keys)
# If not set, this defaults to: CCMP TKIP
#
# group: list of accepted group (broadcast/multicast) ciphers for WPA
# CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0]
# TKIP = Temporal Key Integrity Protocol [IEEE 802.11i/D7.0]
# WEP104 = WEP (Wired Equivalent Privacy) with 104-bit key
# WEP40 = WEP (Wired Equivalent Privacy) with 40-bit key [IEEE 802.11]
# If not set, this defaults to: CCMP TKIP WEP104 WEP40
#
# psk: WPA preshared key; 256-bit pre-shared key
# The key used in WPA-PSK mode can be entered either as 64 hex-digits, i.e.,
# 32 bytes or as an ASCII passphrase (in which case, the real PSK will be
# generated using the passphrase and SSID). ASCII passphrase must be between
# 8 and 63 characters (inclusive).
# This field is not needed, if WPA-EAP is used.
# Note: Separate tool, wpa_passphrase, can be used to generate 256-bit keys
# from ASCII passphrase. This process uses lot of CPU and wpa_supplicant
# startup and reconfiguration time can be optimized by generating the PSK only
# only when the passphrase or SSID has actually changed.
#
# eapol_flags: IEEE 802.1X/EAPOL options (bit field)
# Dynamic WEP key require for non-WPA mode
# bit0 (1): require dynamically generated unicast WEP key
# bit1 (2): require dynamically generated broadcast WEP key
# 	(3 = require both keys; default)
#
# Following fields are only used with internal EAP implementation.
# eap: space-separated list of accepted EAP methods
#	MD5 = EAP-MD5 (unsecure and does not generate keying material ->
#			cannot be used with WPA; to be used as a Phase 2 method
#			with EAP-PEAP or EAP-TTLS)
#       MSCHAPV2 = EAP-MSCHAPv2 (cannot be used separately with WPA; to be used
#		as a Phase 2 method with EAP-PEAP or EAP-TTLS)
#       OTP = EAP-OTP (cannot be used separately with WPA; to be used
#		as a Phase 2 method with EAP-PEAP or EAP-TTLS)
#       GTC = EAP-GTC (cannot be used separately with WPA; to be used
#		as a Phase 2 method with EAP-PEAP or EAP-TTLS)
#	TLS = EAP-TLS (client and server certificate)
#	PEAP = EAP-PEAP (with tunnelled EAP authentication)
#	TTLS = EAP-TTLS (with tunnelled EAP or PAP/CHAP/MSCHAP/MSCHAPV2
#			 authentication)
#	If not set, all compiled in methods are allowed.
#
# identity: Identity string for EAP
# anonymous_identity: Anonymous identity string for EAP (to be used as the
#	unencrypted identity with EAP types that support different tunnelled
#	identity, e.g., EAP-TTLS)
# password: Password string for EAP
# ca_cert: File path to CA certificate file. This file can have one or more
#	trusted CA certificates. If ca_cert is not included, server certificate
#	will not be verified. This is insecure and the CA file should always be
#	configured.
# client_cert: File path to client certificate file (PEM/DER)
# private_key: File path to client private key file (PEM/DER/PFX)
#	When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
#	commented out. Both the private key and certificate will be read from
#	the PKCS#12 file in this case.
# private_key_passwd: Password for private key file
# dh_file: File path to DH/DSA parameters file (in PEM format)
#	This is an optional configuration file for setting parameters for an
#	ephemeral DH key exchange. In most cases, the default RSA
#	authentication does not use this configuration. However, it is possible
#	setup RSA to use ephemeral DH key exchange. In addition, ciphers with
#	DSA keys always use ephemeral DH keys. This can be used to achieve
#	forward secrecy. If the file is in DSA parameters format, it will be
#	automatically converted into DH params.
# subject_match: Substring to be matched against the subject of the
#	authentication server certificate. If this string is set, the server
#	sertificate is only accepted if it contains this string in the subject.
#	The subject string is in following format:
#	/C=US/ST=CA/L=San Francisco/CN=Test AS/emailAddress=as@example.com
# phase1: Phase1 (outer authentication, i.e., TLS tunnel) parameters
#	(string with field-value pairs, e.g., "peapver=0" or
#	"peapver=1 peaplabel=1")
#	'peapver' can be used to force which PEAP version (0 or 1) is used.
#	'peaplabel=1' can be used to force new label, "client PEAP encryption",
#	to be used during key derivation when PEAPv1 or newer. Most existing
#	PEAPv1 implementation seem to be using the old label, "client EAP
#	encryption", and wpa_supplicant is now using that as the default value.
#	Some servers, e.g., Radiator, may require peaplabel=1 configuration to
#	interoperate with PEAPv1; see eap_testing.txt for more details.
#	'peap_outer_success=0' can be used to terminate PEAP authentication on
#	tunneled EAP-Success. This is required with some RADIUS servers that
#	implement draft-josefsson-pppext-eap-tls-eap-05.txt (e.g.,
#	Lucent NavisRadius v4.4.0 with PEAP in "IETF Draft 5" mode)
#	include_tls_length=1 can be used to force wpa_supplicant to include
#	TLS Message Length field in all TLS messages even if they are not
#	fragmented.
#	sim_min_num_chal=3 can be used to configure EAP-SIM to require three
#	challenges (by default, it accepts 2 or 3)
# phase2: Phase2 (inner authentication with TLS tunnel) parameters
#	(string with field-value pairs, e.g., "auth=MSCHAPV2" for EAP-PEAP or
#	"autheap=MSCHAPV2 autheap=MD5" for EAP-TTLS)
# Following certificate/private key fields are used in inner Phase2
# authentication when using EAP-TTLS or EAP-PEAP.
# ca_cert2: File path to CA certificate file. This file can have one or more
#	trusted CA certificates. If ca_cert2 is not included, server
#	certificate will not be verified. This is insecure and the CA file
#	should always be configured.
# client_cert2: File path to client certificate file
# private_key2: File path to client private key file
# private_key2_passwd: Password for private key file
# dh_file2: File path to DH/DSA parameters file (in PEM format)
# subject_match2: Substring to be matched against the subject of the
#	authentication server certificate.
#
# EAP-PSK variables:
# eappsk: 16-byte (128-bit, 32 hex digits) pre-shared key in hex format
# nai: user NAI
# server_nai: authentication server NAI
#
# EAP-FAST variables:
# pac_file: File path for the PAC entries. wpa_supplicant will need to be able
#	to create this file and write updates to it when PAC is being
#	provisioned or refreshed.
# phase1: fast_provisioning=1 option enables in-line provisioning of EAP-FAST
#	credentials (PAC)
#
# wpa_supplicant supports number of "EAP workarounds" to work around
# interoperability issues with incorrectly behaving authentication servers.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产精品中文字幕日韩精品| 麻豆91免费观看| 久久久不卡网国产精品二区| 91精品国产91综合久久蜜臀| 欧美另类久久久品| 日韩免费看的电影| 久久蜜桃一区二区| 国产精品久久夜| 亚洲激情av在线| 日韩精品三区四区| 韩国精品主播一区二区在线观看| 国精产品一区一区三区mba桃花| 精品在线一区二区| 国产经典欧美精品| 91免费看视频| 制服丝袜日韩国产| 国产日韩欧美在线一区| 中文字幕一区三区| 午夜在线成人av| 国产一区视频在线看| 成人av一区二区三区| 91久久久免费一区二区| 欧美一级淫片007| 欧美激情在线免费观看| 亚洲综合激情小说| 久久91精品久久久久久秒播| 丁香激情综合五月| 欧美日韩高清在线| 国产欧美日韩中文久久| 亚洲线精品一区二区三区 | 国产精品三级久久久久三级| 国产精品沙发午睡系列990531| 成人欧美一区二区三区| 亚洲成人动漫精品| 成人黄色网址在线观看| 欧美性做爰猛烈叫床潮| 久久综合国产精品| 一区二区在线看| 国产揄拍国内精品对白| 在线免费一区三区| 欧美经典一区二区| 美女性感视频久久| 欧美亚洲国产一区二区三区va| 精品精品欲导航| 亚洲va中文字幕| 99久久综合色| 国产亚洲人成网站| 久久精品国产精品亚洲综合| 色综合天天综合网国产成人综合天| 欧美一区二区在线免费播放| 亚洲人精品午夜| 国产精品影视在线观看| 精品视频一区三区九区| 亚洲素人一区二区| 成人国产精品视频| 久久先锋影音av鲁色资源| 日韩和欧美的一区| 欧美日韩在线播| 亚洲美女免费视频| 成人国产视频在线观看| 久久九九99视频| 激情久久五月天| 日韩你懂的在线观看| 五月天视频一区| 欧美中文字幕一二三区视频| 中文字幕一区二区三区蜜月| 成人午夜免费电影| 中文字幕二三区不卡| 高清国产午夜精品久久久久久| 精品少妇一区二区三区日产乱码| 日韩高清不卡在线| 91精品国产91热久久久做人人| 五月天欧美精品| 日韩视频在线永久播放| 日本91福利区| 精品日本一线二线三线不卡| 日本伊人午夜精品| 欧美不卡在线视频| 国产一区二区在线看| 欧美va日韩va| 国产伦精一区二区三区| 国产亚洲欧洲997久久综合| 国产电影精品久久禁18| 国产日韩精品一区| 91老司机福利 在线| 一区二区在线免费| 91精品国产日韩91久久久久久| 奇米影视7777精品一区二区| 久久影院午夜论| av影院午夜一区| 一区二区三区在线免费播放| 欧美日韩一区二区三区在线看| 午夜欧美视频在线观看| 26uuu国产日韩综合| 成人av电影免费观看| 亚洲精品老司机| 欧美变态凌虐bdsm| av一区二区三区在线| 亚洲国产日韩一级| 久久人人爽爽爽人久久久| 97久久精品人人做人人爽| 午夜成人免费视频| 久久久久久久久久电影| 在线观看免费一区| 国内精品自线一区二区三区视频| 中文字幕在线播放不卡一区| 欧美性做爰猛烈叫床潮| 国产乱国产乱300精品| 亚洲六月丁香色婷婷综合久久 | 亚洲国产精品精华液网站| 欧美一级欧美三级在线观看| 国产成人av电影在线| 亚洲一区二区在线观看视频| 精品国产欧美一区二区| 91成人在线精品| 国产精品一区免费视频| 一区二区日韩电影| 国产亚洲一区二区三区| 欧美日韩高清一区| 91在线观看一区二区| 国内外成人在线| 日韩成人一级大片| 一区二区三区欧美在线观看| 久久久国产午夜精品| 91精品国产乱| 欧美亚洲禁片免费| 91视频xxxx| 成人国产精品视频| 国产精品综合av一区二区国产馆| 亚洲成人免费av| 亚洲伦在线观看| 自拍偷在线精品自拍偷无码专区| 久久综合狠狠综合久久激情| 欧美日韩国产经典色站一区二区三区| 成人18精品视频| 成人午夜电影久久影院| 精品一区二区精品| 久久99国产精品麻豆| 欧美96一区二区免费视频| 亚洲va欧美va人人爽午夜| 一区二区三区欧美激情| 亚洲欧美日韩久久精品| 日韩理论片网站| 亚洲日本在线天堂| **欧美大码日韩| 最好看的中文字幕久久| 亚洲欧美日韩一区二区| 国产精品久久三| 亚洲天堂久久久久久久| 亚洲色欲色欲www在线观看| 国产精品家庭影院| 亚洲欧美一区二区不卡| 一区二区三区资源| 亚洲图片欧美色图| 日韩国产欧美在线视频| 美国十次综合导航| 黄一区二区三区| 国产精品亚洲视频| 99精品国产91久久久久久| 91丨porny丨首页| 欧洲一区在线观看| 在线不卡的av| 久久综合九色综合欧美就去吻| 久久精品欧美日韩| 亚洲日本青草视频在线怡红院 | 麻豆免费精品视频| 国内精品伊人久久久久影院对白| 另类调教123区| 国产成人小视频| 91小宝寻花一区二区三区| 色噜噜狠狠一区二区三区果冻| 在线观看视频一区| 日韩一级成人av| 国产亚洲成aⅴ人片在线观看| 中文字幕亚洲区| 日韩电影免费一区| 国产成人精品三级| 欧美日韩在线综合| 亚洲精品一线二线三线无人区| 久久久亚洲高清| 亚洲已满18点击进入久久| 视频一区视频二区中文| 国产91精品一区二区麻豆亚洲| av影院午夜一区| 欧美成人三级电影在线| 一区在线中文字幕| 毛片一区二区三区| 日本韩国精品在线| 久久久久国产免费免费| 亚洲综合色区另类av| 国产综合一区二区| 欧美日韩激情一区| 欧美国产精品v| 日韩高清电影一区| 91视频91自| 国产片一区二区三区| 三级久久三级久久久| 成人精品视频一区二区三区尤物| 欧美精品日日鲁夜夜添| 中文字幕亚洲在|