head	1.5;
access;
symbols
	netbsd-11-0-RC4:1.5
	netbsd-11-0-RC3:1.5
	netbsd-11-0-RC2:1.5
	netbsd-11-0-RC1:1.5
	perseant-exfatfs-base-20250801:1.5
	netbsd-11:1.5.0.4
	netbsd-11-base:1.5
	netbsd-10-1-RELEASE:1.3.26.1
	perseant-exfatfs-base-20240630:1.5
	perseant-exfatfs:1.5.0.2
	perseant-exfatfs-base:1.5
	netbsd-8-3-RELEASE:1.3.8.1
	netbsd-9-4-RELEASE:1.3.18.1
	netbsd-10-0-RELEASE:1.3.26.1
	netbsd-10-0-RC6:1.3.26.1
	netbsd-10-0-RC5:1.3.26.1
	netbsd-10-0-RC4:1.3.26.1
	netbsd-10-0-RC3:1.3.26.1
	netbsd-10-0-RC2:1.3.26.1
	netbsd-10-0-RC1:1.3.26.1
	netbsd-10:1.3.0.26
	netbsd-10-base:1.3
	netbsd-9-3-RELEASE:1.3
	cjep_sun2x-base1:1.3
	cjep_sun2x:1.3.0.24
	cjep_sun2x-base:1.3
	cjep_staticlib_x-base1:1.3
	netbsd-9-2-RELEASE:1.3
	cjep_staticlib_x:1.3.0.22
	cjep_staticlib_x-base:1.3
	netbsd-9-1-RELEASE:1.3
	phil-wifi-20200421:1.3
	phil-wifi-20200411:1.3
	is-mlppp:1.3.0.20
	is-mlppp-base:1.3
	phil-wifi-20200406:1.3
	netbsd-8-2-RELEASE:1.3
	netbsd-9-0-RELEASE:1.3
	netbsd-9-0-RC2:1.3
	netbsd-9-0-RC1:1.3
	phil-wifi-20191119:1.3
	netbsd-9:1.3.0.18
	netbsd-9-base:1.3
	phil-wifi-20190609:1.3
	netbsd-8-1-RELEASE:1.3
	netbsd-8-1-RC1:1.3
	pgoyette-compat-merge-20190127:1.3
	pgoyette-compat-20190127:1.3
	pgoyette-compat-20190118:1.3
	pgoyette-compat-1226:1.3
	pgoyette-compat-1126:1.3
	pgoyette-compat-1020:1.3
	pgoyette-compat-0930:1.3
	pgoyette-compat-0906:1.3
	netbsd-7-2-RELEASE:1.1
	pgoyette-compat-0728:1.3
	netbsd-8-0-RELEASE:1.3
	phil-wifi:1.3.0.16
	phil-wifi-base:1.3
	pgoyette-compat-0625:1.3
	netbsd-8-0-RC2:1.3
	pgoyette-compat-0521:1.3
	pgoyette-compat-0502:1.3
	pgoyette-compat-0422:1.3
	netbsd-8-0-RC1:1.3
	pgoyette-compat-0415:1.3
	pgoyette-compat-0407:1.3
	pgoyette-compat-0330:1.3
	pgoyette-compat-0322:1.3
	pgoyette-compat-0315:1.3
	netbsd-7-1-2-RELEASE:1.1
	pgoyette-compat:1.3.0.14
	pgoyette-compat-base:1.3
	netbsd-7-1-1-RELEASE:1.1
	matt-nb8-mediatek:1.3.0.12
	matt-nb8-mediatek-base:1.3
	perseant-stdc-iso10646:1.3.0.10
	perseant-stdc-iso10646-base:1.3
	netbsd-8:1.3.0.8
	netbsd-8-base:1.3
	prg-localcount2-base3:1.3
	prg-localcount2-base2:1.3
	prg-localcount2-base1:1.3
	prg-localcount2:1.3.0.6
	prg-localcount2-base:1.3
	pgoyette-localcount-20170426:1.3
	bouyer-socketcan-base1:1.3
	pgoyette-localcount-20170320:1.3
	netbsd-7-1:1.1.0.14
	netbsd-7-1-RELEASE:1.1
	netbsd-7-1-RC2:1.1
	netbsd-7-nhusb-base-20170116:1.1
	bouyer-socketcan:1.3.0.4
	bouyer-socketcan-base:1.3
	pgoyette-localcount-20170107:1.3
	netbsd-7-1-RC1:1.1
	pgoyette-localcount-20161104:1.3
	netbsd-7-0-2-RELEASE:1.1
	localcount-20160914:1.3
	netbsd-7-nhusb:1.1.0.12
	netbsd-7-nhusb-base:1.1
	pgoyette-localcount-20160806:1.3
	pgoyette-localcount-20160726:1.3
	pgoyette-localcount:1.3.0.2
	pgoyette-localcount-base:1.3
	netbsd-7-0-1-RELEASE:1.1
	netbsd-7-0:1.1.0.10
	netbsd-7-0-RELEASE:1.1
	netbsd-7-0-RC3:1.1
	netbsd-7-0-RC2:1.1
	netbsd-7-0-RC1:1.1
	tls-maxphys-base:1.1
	tls-maxphys:1.1.0.8
	netbsd-7:1.1.0.6
	netbsd-7-base:1.1
	yamt-pagecache:1.1.0.4
	yamt-pagecache-base9:1.1
	tls-earlyentropy:1.1.0.2
	tls-earlyentropy-base:1.1
	riastradh-xf86-video-intel-2-7-1-pre-2-21-15:1.1
	riastradh-drm2-base3:1.1;
locks; strict;
comment	@# @;


1.5
date	2023.10.10.07.21.00;	author nia;	state Exp;
branches;
next	1.4;
commitid	f0pG4P6EFVNF83IE;

1.4
date	2023.09.29.14.05.28;	author gutteridge;	state Exp;
branches;
next	1.3;
commitid	28i53ISDArjkIFGE;

1.3
date	2015.11.26.16.07.40;	author hubertf;	state Exp;
branches
	1.3.8.1
	1.3.18.1
	1.3.26.1;
next	1.2;
commitid	6aQdVJNh6Fa0tCKy;

1.2
date	2015.11.26.16.03.18;	author hubertf;	state Exp;
branches;
next	1.1;
commitid	Ws3vMfUt90cvrCKy;

1.1
date	2014.01.23.07.26.51;	author spz;	state Exp;
branches
	1.1.4.1
	1.1.8.1;
next	;
commitid	e58wp3t0DYX3admx;

1.3.8.1
date	2023.10.02.13.36.06;	author martin;	state Exp;
branches;
next	;
commitid	JdQv4g9rSkwmt3HE;

1.3.18.1
date	2023.10.02.13.34.57;	author martin;	state Exp;
branches;
next	;
commitid	SVcqucHkIoWXs3HE;

1.3.26.1
date	2023.10.02.13.33.44;	author martin;	state Exp;
branches;
next	;
commitid	vplvxYlQeHgys3HE;

1.1.4.1
date	2014.01.23.07.26.51;	author yamt;	state dead;
branches;
next	1.1.4.2;
commitid	P3Rlj4go6xHqKwBx;

1.1.4.2
date	2014.05.22.11.37.45;	author yamt;	state Exp;
branches;
next	;
commitid	P3Rlj4go6xHqKwBx;

1.1.8.1
date	2014.01.23.07.26.51;	author tls;	state dead;
branches;
next	1.1.8.2;
commitid	jTnpym9Qu0o4R1Nx;

1.1.8.2
date	2014.08.20.00.02.30;	author tls;	state Exp;
branches;
next	;
commitid	jTnpym9Qu0o4R1Nx;


desc
@@


1.5
log
@Add an example of connecting to an unsecured network with wpa_supplicant
@
text
@# $NetBSD: wpa_supplicant.conf,v 1.4 2023/09/29 14:05:28 gutteridge Exp $
#
# example wpa_supplicant config
#
# please refer to the wpa_supplicant.conf man page

# wpa_cli and dhcpcd won't work well if you have no ctrl_interface set
# the value must be a directory, the sockets will be named after the interfaces
ctrl_interface=/var/run/wpa_supplicant/

# if non-root should be allowed to send wpa_supplicant commands via wpa_cli
# name a group whose members will be Allowed(tm)
ctrl_interface_group=wheel

# an unencrypted network
network={
	ssid="Freifunk"
	key_mgmt=NONE
	priority=10
}

# simple WPA-PSK, a favourite with conferences and hotel networks
network={
	ssid="SomeConference"
	key_mgmt=WPA-PSK
	psk="secretKey"
	priority=20
}

# a private WPA-PSK that doesn't broadcast its SSID
network={
	ssid="HomeSweetHome"
	key_mgmt=WPA-PSK
	psk="secretKey"
	scan_ssid=1
	priority=30
}

# WEP .. all the stopping power of a "please keep off the lawn" sign
# least common denominator "security" so it's formally not open
network={
	ssid="TheLawn"
	key_mgmt=NONE
	wep_tx_keyidx=0
	#wep_key0="pleasekeepoff"
	wep_key0=706c656173656b6565706f6666
	priority=2
}

# using eduroam for more examples:

## eduroam with PEAP/MSCHAPv2
#network={
#	ssid="eduroam"
#	scan_ssid=1
#
#	# The 'identity' is the username used for authentication.
#	identity="user1234@@your.university.domain"
#
#	# add yours
#	password="myPassword"
#
#	# download a fitting CA cert and put the path to it here
#	ca_cert="/etc/openssl/certs/eduroam-CA-cert.pem"
#
#	# where the authentication requests should be routed to
#	anonymous_identity="anonymous@@your.university.domain"
#
#	key_mgmt=WPA-EAP
#	auth_alg=OPEN
#	eap=PEAP
#	phase2="auth=MSCHAPV2"
#
#	priority=5
#}
#
## eduroam with EAP-TLS
#network={
#	ssid="eduroam"
#	scan_ssid=1
#
#	# The 'identity' is the username used for authentication.
#	identity="user1234@@your.university.domain"
#
#	client_cert="/home/you/eduroam/user.cert"
#	private_key="/home/you/eduroam/user.key"
#	private_key_passwd="s3kr3t"
#
#	# download a fitting CA cert and put the path to it here
#	ca_cert="/etc/openssl/certs/eduroam-CA-cert.pem"
#
#	# where the authentication requests should be routed to
#	anonymous_identity="anonymous@@your.university.domain"
#
#	key_mgmt=WPA-EAP
#	auth_alg=OPEN
#	eap=TLS
#
#	priority=4
#}
#
## eduroam with TTLS+PAP
#network={
#	ssid="eduroam"
#	scan_ssid=1
#
#	# The 'identity' is the username used for authentication.
#	identity="user1234@@your.university.domain"
#
#	# add yours
#	password="myPassword"
#
#	# download a fitting CA cert and put the path to it here
#	ca_cert="/etc/openssl/certs/eduroam-CA-cert.pem"
#
#	# where the authentication requests should be routed to
#	anonymous_identity="anonymous@@your.university.domain"
#
#	key_mgmt=WPA-EAP
#	auth_alg=OPEN
#	eap=TTLS
#	phase2="auth=PAP"
#
#	priority=3
#}
#
@


1.4
log
@wpa_supplicant.conf: fix connection string for Eduroam

"MSCHAPV2" must have an uppercase "V" in the connection string.
Reported by nebbionegiuseppe@@gmail.com in PR misc/57634.
@
text
@d1 1
a1 1
# $NetBSD: wpa_supplicant.conf,v 1.3 2015/11/26 16:07:40 hubertf Exp $
d15 7
d27 1
d36 1
@


1.3
log
@Move today's most common config (WPA) to the front
Add a WPA config with hidden (non-broadcasting) SSID
@
text
@d1 1
a1 1
# $NetBSD: wpa_supplicant.conf,v 1.2 2015/11/26 16:03:18 hubertf Exp $
d63 1
a63 1
#	phase2="auth=MSCHAPv2"
@


1.3.8.1
log
@Pull up following revision(s) (requested by gutteridge in ticket #1899):

	share/examples/wpa_supplicant/wpa_supplicant.conf: revision 1.4

wpa_supplicant.conf: fix connection string for Eduroam
"MSCHAPV2" must have an uppercase "V" in the connection string.

Reported by nebbionegiuseppe at gmail.com in PR misc/57634.
@
text
@d1 1
a1 1
# $NetBSD: wpa_supplicant.conf,v 1.3 2015/11/26 16:07:40 hubertf Exp $
d63 1
a63 1
#	phase2="auth=MSCHAPV2"
@


1.3.18.1
log
@Pull up following revision(s) (requested by gutteridge in ticket #1736):

	share/examples/wpa_supplicant/wpa_supplicant.conf: revision 1.4

wpa_supplicant.conf: fix connection string for Eduroam
"MSCHAPV2" must have an uppercase "V" in the connection string.

Reported by nebbionegiuseppe at gmail.com in PR misc/57634.
@
text
@d1 1
a1 1
# $NetBSD: wpa_supplicant.conf,v 1.3 2015/11/26 16:07:40 hubertf Exp $
d63 1
a63 1
#	phase2="auth=MSCHAPV2"
@


1.3.26.1
log
@Pull up following revision(s) (requested by gutteridge in ticket #384):

	share/examples/wpa_supplicant/wpa_supplicant.conf: revision 1.4

wpa_supplicant.conf: fix connection string for Eduroam
"MSCHAPV2" must have an uppercase "V" in the connection string.

Reported by nebbionegiuseppe at gmail.com in PR misc/57634.
@
text
@d1 1
a1 1
# $NetBSD: wpa_supplicant.conf,v 1.3 2015/11/26 16:07:40 hubertf Exp $
d63 1
a63 1
#	phase2="auth=MSCHAPV2"
@


1.2
log
@add RCS is
@
text
@d1 1
a1 1
# $NetBSD$
d15 15
a40 7
# simple WPA-PSK, a favourite with conferences and hotel networks
network={
	ssid="SomeConference"
	key_mgmt=WPA-PSK
	psk="secretKey"
}

@


1.1
log
@- make etc/rc.d/wpa_supplicant create directory /var/run/wpa_supplicant
  on startup
- create share/examples/wpa_supplicant/wpa_supplicant.conf and make it
  known in the relevant places. Improvements welcome, my point was
  ctrl_interface and "you seriously want this"
@
text
@d1 2
@


1.1.8.1
log
@file wpa_supplicant.conf was added on branch tls-maxphys on 2014-08-20 00:02:30 +0000
@
text
@d1 107
@


1.1.8.2
log
@Rebase to HEAD as of a few days ago.
@
text
@a0 107
# example wpa_supplicant config
#
# please refer to the wpa_supplicant.conf man page

# wpa_cli and dhcpcd won't work well if you have no ctrl_interface set
# the value must be a directory, the sockets will be named after the interfaces
ctrl_interface=/var/run/wpa_supplicant/

# if non-root should be allowed to send wpa_supplicant commands via wpa_cli
# name a group whose members will be Allowed(tm)
ctrl_interface_group=wheel

# WEP .. all the stopping power of a "please keep off the lawn" sign
# least common denominator "security" so it's formally not open
network={
	ssid="TheLawn"
	key_mgmt=NONE
	wep_tx_keyidx=0
	#wep_key0="pleasekeepoff"
	wep_key0=706c656173656b6565706f6666
	priority=2
}

# simple WPA-PSK, a favourite with conferences and hotel networks
network={
	ssid="SomeConference"
	key_mgmt=WPA-PSK
	psk="secretKey"
}

# using eduroam for more examples:

## eduroam with PEAP/MSCHAPv2
#network={
#	ssid="eduroam"
#	scan_ssid=1
#
#	# The 'identity' is the username used for authentication.
#	identity="user1234@@your.university.domain"
#
#	# add yours
#	password="myPassword"
#
#	# download a fitting CA cert and put the path to it here
#	ca_cert="/etc/openssl/certs/eduroam-CA-cert.pem"
#
#	# where the authentication requests should be routed to
#	anonymous_identity="anonymous@@your.university.domain"
#
#	key_mgmt=WPA-EAP
#	auth_alg=OPEN
#	eap=PEAP
#	phase2="auth=MSCHAPv2"
#
#	priority=5
#}
#
## eduroam with EAP-TLS
#network={
#	ssid="eduroam"
#	scan_ssid=1
#
#	# The 'identity' is the username used for authentication.
#	identity="user1234@@your.university.domain"
#
#	client_cert="/home/you/eduroam/user.cert"
#	private_key="/home/you/eduroam/user.key"
#	private_key_passwd="s3kr3t"
#
#	# download a fitting CA cert and put the path to it here
#	ca_cert="/etc/openssl/certs/eduroam-CA-cert.pem"
#
#	# where the authentication requests should be routed to
#	anonymous_identity="anonymous@@your.university.domain"
#
#	key_mgmt=WPA-EAP
#	auth_alg=OPEN
#	eap=TLS
#
#	priority=4
#}
#
## eduroam with TTLS+PAP
#network={
#	ssid="eduroam"
#	scan_ssid=1
#
#	# The 'identity' is the username used for authentication.
#	identity="user1234@@your.university.domain"
#
#	# add yours
#	password="myPassword"
#
#	# download a fitting CA cert and put the path to it here
#	ca_cert="/etc/openssl/certs/eduroam-CA-cert.pem"
#
#	# where the authentication requests should be routed to
#	anonymous_identity="anonymous@@your.university.domain"
#
#	key_mgmt=WPA-EAP
#	auth_alg=OPEN
#	eap=TTLS
#	phase2="auth=PAP"
#
#	priority=3
#}
#
@


1.1.4.1
log
@file wpa_supplicant.conf was added on branch yamt-pagecache on 2014-05-22 11:37:45 +0000
@
text
@d1 107
@


1.1.4.2
log
@sync with head.

for a reference, the tree before this commit was tagged
as yamt-pagecache-tag8.

this commit was splitted into small chunks to avoid
a limitation of cvs.  ("Protocol error: too many arguments")
@
text
@a0 107
# example wpa_supplicant config
#
# please refer to the wpa_supplicant.conf man page

# wpa_cli and dhcpcd won't work well if you have no ctrl_interface set
# the value must be a directory, the sockets will be named after the interfaces
ctrl_interface=/var/run/wpa_supplicant/

# if non-root should be allowed to send wpa_supplicant commands via wpa_cli
# name a group whose members will be Allowed(tm)
ctrl_interface_group=wheel

# WEP .. all the stopping power of a "please keep off the lawn" sign
# least common denominator "security" so it's formally not open
network={
	ssid="TheLawn"
	key_mgmt=NONE
	wep_tx_keyidx=0
	#wep_key0="pleasekeepoff"
	wep_key0=706c656173656b6565706f6666
	priority=2
}

# simple WPA-PSK, a favourite with conferences and hotel networks
network={
	ssid="SomeConference"
	key_mgmt=WPA-PSK
	psk="secretKey"
}

# using eduroam for more examples:

## eduroam with PEAP/MSCHAPv2
#network={
#	ssid="eduroam"
#	scan_ssid=1
#
#	# The 'identity' is the username used for authentication.
#	identity="user1234@@your.university.domain"
#
#	# add yours
#	password="myPassword"
#
#	# download a fitting CA cert and put the path to it here
#	ca_cert="/etc/openssl/certs/eduroam-CA-cert.pem"
#
#	# where the authentication requests should be routed to
#	anonymous_identity="anonymous@@your.university.domain"
#
#	key_mgmt=WPA-EAP
#	auth_alg=OPEN
#	eap=PEAP
#	phase2="auth=MSCHAPv2"
#
#	priority=5
#}
#
## eduroam with EAP-TLS
#network={
#	ssid="eduroam"
#	scan_ssid=1
#
#	# The 'identity' is the username used for authentication.
#	identity="user1234@@your.university.domain"
#
#	client_cert="/home/you/eduroam/user.cert"
#	private_key="/home/you/eduroam/user.key"
#	private_key_passwd="s3kr3t"
#
#	# download a fitting CA cert and put the path to it here
#	ca_cert="/etc/openssl/certs/eduroam-CA-cert.pem"
#
#	# where the authentication requests should be routed to
#	anonymous_identity="anonymous@@your.university.domain"
#
#	key_mgmt=WPA-EAP
#	auth_alg=OPEN
#	eap=TLS
#
#	priority=4
#}
#
## eduroam with TTLS+PAP
#network={
#	ssid="eduroam"
#	scan_ssid=1
#
#	# The 'identity' is the username used for authentication.
#	identity="user1234@@your.university.domain"
#
#	# add yours
#	password="myPassword"
#
#	# download a fitting CA cert and put the path to it here
#	ca_cert="/etc/openssl/certs/eduroam-CA-cert.pem"
#
#	# where the authentication requests should be routed to
#	anonymous_identity="anonymous@@your.university.domain"
#
#	key_mgmt=WPA-EAP
#	auth_alg=OPEN
#	eap=TTLS
#	phase2="auth=PAP"
#
#	priority=3
#}
#
@


