
After make process is completed, an executable file, wpa_supplicant will have been created.
- To create a WPA PSK connection, please modify the configuration file. For a detailed
description, you can refer to the original sample configuration file:
wpa_supplicant.conf) wpa_supplicant_psk.conf to meet wpa_psk test condition.
Sample settings for WPA-PSK:
Network={
ssid=”wrt55ag”
proto=WPA
key_mgmt=WPA-PSK
pairwise=CCMP TKIP
group=CCMP TKIP WEP104 WEP40
psk=”12345678”
priority=2
}
Similarily sample setttings for WPA EAP-TLS:
Network={
ssid=″wrt55ag″
proto=WPA
key_mgmt=WPA-EAP
pairwise=CCMP TKIP
group=CCMP TKIP WEP104 WEP40
eap=TLS
ca_cert=″/etc/cert/fluffy.pem″
client_cert=″/etc/cert/id.pem″
private_key=″/etc/cert/id_key.pem″
private_key_password=″password″
priority=2
}
For Non-WPA 802.1x networks, simply change key_mgmt field from WPA-EAP to IEEE802.1x.
Note 1:
The fluffy.pem is created by:
→ openss1 pkcs12 -in fluffy.pfx -passin pass:password -out fluffy.pem -cacerts –nokeys
The id_key.pem is created by:
→ openss1 pkcs12 -in fluffy.pfx -passin pass:password -passout pass:password –out id_key.pem -nocerts
The id.pem is created by:
→ openss1 pkcs12 -in fluffy.pfx -passin pass:password -out id.pem -nokeys
Note 2:
You can run openss1 utility (Included in openss1.zip) in Microsoft Windows OS.
20
Comentarios a estos manuales