~ubuntu-branches/ubuntu/lucid/wpasupplicant/lucid-updates

« back to all changes in this revision

Viewing changes to debian/patches/02_comment_config.dpatch

  • Committer: Bazaar Package Importer
  • Author(s): Kel Modderman
  • Date: 2006-10-05 08:04:01 UTC
  • mfrom: (1.1.5 upstream) (3 etch)
  • mto: This revision was merged to the branch mainline in revision 4.
  • Revision ID: james.westby@ubuntu.com-20061005080401-r8lqlix4390yos7b
Tags: 0.5.5-2
* Update madwifi headers to latest SVN. (Closes: #388316)
* Remove failed attempt at action locking. [debian/functions.sh,
  debian/wpa_action.sh]
* Add hysteresis checking functions, to avoid "event loops" while
  using wpa-roam. [debian/functions.sh, debian/wpa_action.sh]
* Change of co-maintainer email address.
* Add ishex() function to functions.sh to determine wpa-psk value type in
  plaintext or hex. This effectively eliminates the need for the bogus and
  somewhat confusing wpa-passphrase contruct specific to our scripts and
  allows wpa-psk to work with either a 8 to 63 character long plaintext
  string or 64 character long hex string.
* Adjust README.modes to not refer to the redundant wpa-passphrase stuff.
* Add big fat NOTE about acceptable wpa-psk's to top of example gallery.
* Strip surrounding quotes from wpa-ssid if present, instead of just whining
  about them.
* Update email address in copyright blurb of functions.sh, ifupdown.sh and
  wpa_action.sh.  

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
#! /bin/sh /usr/share/dpatch/dpatch-run
2
 
## 20_comment_config.dpatch by  <kyle@debian.org>
3
 
##
4
 
## All lines beginning with `## DP:' are a description of the patch.
5
 
## DP: No description.
6
 
 
7
 
@DPATCH@
8
 
diff -urNad wpasupplicant-0.4.7~/wpa_supplicant.conf wpasupplicant-0.4.7/wpa_supplicant.conf
9
 
--- wpasupplicant-0.4.7~/wpa_supplicant.conf    2005-10-26 23:15:58.000000000 -0400
10
 
+++ wpasupplicant-0.4.7/wpa_supplicant.conf     2006-01-28 14:08:43.526236750 -0500
11
 
@@ -90,11 +90,15 @@
12
 
 # They are both from the opensc project (http://www.opensc.org/)
13
 
 # By default no engines are loaded.
14
 
 # make the opensc engine available
15
 
-opensc_engine_path=/usr/lib/opensc/engine_opensc.so
16
 
+
17
 
+# Debian note: Must install libengine-pkcs11-openssl otherwise
18
 
+#  loading the following will cause wpasupplicant to fail.
19
 
+
20
 
+#opensc_engine_path=/usr/lib/opensc/engine_opensc.so
21
 
 # make the pkcs11 engine available
22
 
-pkcs11_engine_path=/usr/lib/opensc/engine_pkcs11.so
23
 
+#pkcs11_engine_path=/usr/lib/opensc/engine_pkcs11.so
24
 
 # configure the path to the pkcs11 module required by the pkcs11 engine
25
 
-pkcs11_module_path=/usr/lib/pkcs11/opensc-pkcs11.so
26
 
+#pkcs11_module_path=/usr/lib/pkcs11/opensc-pkcs11.so
27
 
 
28
 
 # Driver interface parameters
29
 
 # This field can be used to configure arbitrary driver interace parameters. The
30
 
@@ -346,272 +350,273 @@
31
 
 # Example blocks:
32
 
 
33
 
 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers
34
 
-network={
35
 
-       ssid="simple"
36
 
-       psk="very secret passphrase"
37
 
-       priority=5
38
 
-}
39
 
+#network={
40
 
+#      ssid="simple"
41
 
+#      psk="very secret passphrase"
42
 
+#      priority=5
43
 
+#}
44
 
 
45
 
 # Same as previous, but request SSID-specific scanning (for APs that reject
46
 
 # broadcast SSID)
47
 
-network={
48
 
-       ssid="second ssid"
49
 
-       scan_ssid=1
50
 
-       psk="very secret passphrase"
51
 
-       priority=2
52
 
-}
53
 
+#network={
54
 
+#      ssid="second ssid"
55
 
+#      scan_ssid=1
56
 
+#      psk="very secret passphrase"
57
 
+#      priority=2
58
 
+#}
59
 
 
60
 
 # Only WPA-PSK is used. Any valid cipher combination is accepted.
61
 
-network={
62
 
-       ssid="example"
63
 
-       proto=WPA
64
 
-       key_mgmt=WPA-PSK
65
 
-       pairwise=CCMP TKIP
66
 
-       group=CCMP TKIP WEP104 WEP40
67
 
-       psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
68
 
-       priority=2
69
 
-}
70
 
+#network={
71
 
+#      ssid="example"
72
 
+#      proto=WPA
73
 
+#      key_mgmt=WPA-PSK
74
 
+#      pairwise=CCMP TKIP
75
 
+#      group=CCMP TKIP WEP104 WEP40
76
 
+#      psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
77
 
+#      priority=2
78
 
+#}
79
 
 
80
 
 # Only WPA-EAP is used. Both CCMP and TKIP is accepted. An AP that used WEP104
81
 
 # or WEP40 as the group cipher will not be accepted.
82
 
-network={
83
 
-       ssid="example"
84
 
-       proto=RSN
85
 
-       key_mgmt=WPA-EAP
86
 
-       pairwise=CCMP TKIP
87
 
-       group=CCMP TKIP
88
 
-       eap=TLS
89
 
-       identity="user@example.com"
90
 
-       ca_cert="/etc/cert/ca.pem"
91
 
-       client_cert="/etc/cert/user.pem"
92
 
-       private_key="/etc/cert/user.prv"
93
 
-       private_key_passwd="password"
94
 
-       priority=1
95
 
-}
96
 
+#network={
97
 
+#      ssid="example"
98
 
+#      proto=RSN
99
 
+#      key_mgmt=WPA-EAP
100
 
+#      pairwise=CCMP TKIP
101
 
+#      group=CCMP TKIP
102
 
+#      eap=TLS
103
 
+#      identity="user@example.com"
104
 
+#      ca_cert="/etc/cert/ca.pem"
105
 
+#      client_cert="/etc/cert/user.pem"
106
 
+#      private_key="/etc/cert/user.prv"
107
 
+#      private_key_passwd="password"
108
 
+#      priority=1
109
 
+#}
110
 
 
111
 
 # EAP-PEAP/MSCHAPv2 configuration for RADIUS servers that use the new peaplabel
112
 
 # (e.g., Radiator)
113
 
-network={
114
 
-       ssid="example"
115
 
-       key_mgmt=WPA-EAP
116
 
-       eap=PEAP
117
 
-       identity="user@example.com"
118
 
-       password="foobar"
119
 
-       ca_cert="/etc/cert/ca.pem"
120
 
-       phase1="peaplabel=1"
121
 
-       phase2="auth=MSCHAPV2"
122
 
-       priority=10
123
 
-}
124
 
+#network={
125
 
+#      ssid="example"
126
 
+#      key_mgmt=WPA-EAP
127
 
+#      eap=PEAP
128
 
+#      identity="user@example.com"
129
 
+#      password="foobar"
130
 
+#      ca_cert="/etc/cert/ca.pem"
131
 
+#      phase1="peaplabel=1"
132
 
+#      phase2="auth=MSCHAPV2"
133
 
+#      priority=10
134
 
+#}
135
 
 
136
 
 # EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the
137
 
 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel.
138
 
-network={
139
 
-       ssid="example"
140
 
-       key_mgmt=WPA-EAP
141
 
-       eap=TTLS
142
 
-       identity="user@example.com"
143
 
-       anonymous_identity="anonymous@example.com"
144
 
-       password="foobar"
145
 
-       ca_cert="/etc/cert/ca.pem"
146
 
-       priority=2
147
 
-}
148
 
+#network={
149
 
+#      ssid="example"
150
 
+#      key_mgmt=WPA-EAP
151
 
+#      eap=TTLS
152
 
+#      identity="user@example.com"
153
 
+#      anonymous_identity="anonymous@example.com"
154
 
+#      password="foobar"
155
 
+#      ca_cert="/etc/cert/ca.pem"
156
 
+#      priority=2
157
 
+#}
158
 
 
159
 
 # EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the unencrypted
160
 
 # use. Real identity is sent only within an encrypted TLS tunnel.
161
 
-network={
162
 
-       ssid="example"
163
 
-       key_mgmt=WPA-EAP
164
 
-       eap=TTLS
165
 
-       identity="user@example.com"
166
 
-       anonymous_identity="anonymous@example.com"
167
 
-       password="foobar"
168
 
-       ca_cert="/etc/cert/ca.pem"
169
 
-       phase2="auth=MSCHAPV2"
170
 
-}
171
 
+#network={
172
 
+#      ssid="example"
173
 
+#      key_mgmt=WPA-EAP
174
 
+#      eap=TTLS
175
 
+#      identity="user@example.com"
176
 
+#      anonymous_identity="anonymous@example.com"
177
 
+#      password="foobar"
178
 
+#      ca_cert="/etc/cert/ca.pem"
179
 
+#      phase2="auth=MSCHAPV2"
180
 
+#}
181
 
 
182
 
 # WPA-EAP, EAP-TTLS with different CA certificate used for outer and inner
183
 
 # authentication.
184
 
-network={
185
 
-       ssid="example"
186
 
-       key_mgmt=WPA-EAP
187
 
-       eap=TTLS
188
 
-       # Phase1 / outer authentication
189
 
-       anonymous_identity="anonymous@example.com"
190
 
-       ca_cert="/etc/cert/ca.pem"
191
 
-       # Phase 2 / inner authentication
192
 
-       phase2="autheap=TLS"
193
 
-       ca_cert2="/etc/cert/ca2.pem"
194
 
-       client_cert2="/etc/cer/user.pem"
195
 
-       private_key2="/etc/cer/user.prv"
196
 
-       private_key2_passwd="password"
197
 
-       priority=2
198
 
-}
199
 
+#network={
200
 
+#      ssid="example"
201
 
+#      key_mgmt=WPA-EAP
202
 
+#      eap=TTLS
203
 
+#      # Phase1 / outer authentication
204
 
+#      anonymous_identity="anonymous@example.com"
205
 
+#      ca_cert="/etc/cert/ca.pem"
206
 
+#      # Phase 2 / inner authentication
207
 
+#      phase2="autheap=TLS"
208
 
+#      ca_cert2="/etc/cert/ca2.pem"
209
 
+#      client_cert2="/etc/cer/user.pem"
210
 
+#      private_key2="/etc/cer/user.prv"
211
 
+#      private_key2_passwd="password"
212
 
+#      priority=2
213
 
+#}
214
 
 
215
 
 # Both WPA-PSK and WPA-EAP is accepted. Only CCMP is accepted as pairwise and
216
 
 # group cipher.
217
 
-network={
218
 
-       ssid="example"
219
 
-       bssid=00:11:22:33:44:55
220
 
-       proto=WPA RSN
221
 
-       key_mgmt=WPA-PSK WPA-EAP
222
 
-       pairwise=CCMP
223
 
-       group=CCMP
224
 
-       psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
225
 
-}
226
 
+#network={
227
 
+#      ssid="example"
228
 
+#      bssid=00:11:22:33:44:55
229
 
+#      proto=WPA RSN
230
 
+#      key_mgmt=WPA-PSK WPA-EAP
231
 
+#      pairwise=CCMP
232
 
+#      group=CCMP
233
 
+#      psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
234
 
+#}
235
 
 
236
 
 # Special characters in SSID, so use hex string. Default to WPA-PSK, WPA-EAP
237
 
 # and all valid ciphers.
238
 
-network={
239
 
-       ssid=00010203
240
 
-       psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
241
 
-}
242
 
+#network={
243
 
+#      ssid=00010203
244
 
+#      psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
245
 
+#}
246
 
 
247
 
 
248
 
 # EAP-SIM with a GSM SIM or USIM
249
 
-network={
250
 
-       ssid="eap-sim-test"
251
 
-       key_mgmt=WPA-EAP
252
 
-       eap=SIM
253
 
-       pin="1234"
254
 
-       pcsc=""
255
 
-}
256
 
+#network={
257
 
+#      ssid="eap-sim-test"
258
 
+#      key_mgmt=WPA-EAP
259
 
+#      eap=SIM
260
 
+#      pin="1234"
261
 
+#      pcsc=""
262
 
+#}
263
 
 
264
 
 
265
 
 # EAP-PSK
266
 
-network={
267
 
-       ssid="eap-psk-test"
268
 
-       key_mgmt=WPA-EAP
269
 
-       eap=PSK
270
 
-       identity="eap_psk_user"
271
 
-       eappsk=06b4be19da289f475aa46a33cb793029
272
 
-       nai="eap_psk_user@example.com"
273
 
-}
274
 
+#network={
275
 
+#      ssid="eap-psk-test"
276
 
+#      key_mgmt=WPA-EAP
277
 
+#      eap=PSK
278
 
+#      identity="eap_psk_user"
279
 
+#      eappsk=06b4be19da289f475aa46a33cb793029
280
 
+#      nai="eap_psk_user@example.com"
281
 
+#}
282
 
 
283
 
 
284
 
 # IEEE 802.1X/EAPOL with dynamically generated WEP keys (i.e., no WPA) using
285
 
 # EAP-TLS for authentication and key generation; require both unicast and
286
 
 # broadcast WEP keys.
287
 
-network={
288
 
-       ssid="1x-test"
289
 
-       key_mgmt=IEEE8021X
290
 
-       eap=TLS
291
 
-       identity="user@example.com"
292
 
-       ca_cert="/etc/cert/ca.pem"
293
 
-       client_cert="/etc/cert/user.pem"
294
 
-       private_key="/etc/cert/user.prv"
295
 
-       private_key_passwd="password"
296
 
-       eapol_flags=3
297
 
-}
298
 
+#network={
299
 
+#      ssid="1x-test"
300
 
+#      key_mgmt=IEEE8021X
301
 
+#      eap=TLS
302
 
+#      identity="user@example.com"
303
 
+#      ca_cert="/etc/cert/ca.pem"
304
 
+#      client_cert="/etc/cert/user.pem"
305
 
+#      private_key="/etc/cert/user.prv"
306
 
+#      private_key_passwd="password"
307
 
+#      eapol_flags=3
308
 
+#}
309
 
 
310
 
 
311
 
 # LEAP with dynamic WEP keys
312
 
-network={
313
 
-       ssid="leap-example"
314
 
-       key_mgmt=IEEE8021X
315
 
-       eap=LEAP
316
 
-       identity="user"
317
 
-       password="foobar"
318
 
-}
319
 
+#network={
320
 
+#      ssid="leap-example"
321
 
+#      key_mgmt=IEEE8021X
322
 
+#      eap=LEAP
323
 
+#      identity="user"
324
 
+#      password="foobar"
325
 
+#}
326
 
 
327
 
 # EAP-FAST with WPA (WPA or WPA2)
328
 
-network={
329
 
-       ssid="eap-fast-test"
330
 
-       key_mgmt=WPA-EAP
331
 
-       eap=FAST
332
 
-       anonymous_identity="FAST-000102030405"
333
 
-       identity="username"
334
 
-       password="password"
335
 
-       phase1="fast_provisioning=1"
336
 
-       pac_file="/etc/wpa_supplicant.eap-fast-pac"
337
 
-}
338
 
+#  Debian note, EAP-FAST requires recompile of OpenSSL
339
 
+#network={
340
 
+#      ssid="eap-fast-test"
341
 
+#      key_mgmt=WPA-EAP
342
 
+#      eap=FAST
343
 
+#      anonymous_identity="FAST-000102030405"
344
 
+#      identity="username"
345
 
+#      password="password"
346
 
+#      phase1="fast_provisioning=1"
347
 
+#      pac_file="/etc/wpa_supplicant.eap-fast-pac"
348
 
+#}
349
 
 
350
 
-network={
351
 
-       ssid="eap-fast-test"
352
 
-       key_mgmt=WPA-EAP
353
 
-       eap=FAST
354
 
-       anonymous_identity="FAST-000102030405"
355
 
-       identity="username"
356
 
-       password="password"
357
 
-       phase1="fast_provisioning=1"
358
 
-       pac_file="blob://eap-fast-pac"
359
 
-}
360
 
+#network={
361
 
+#      ssid="eap-fast-test"
362
 
+#      key_mgmt=WPA-EAP
363
 
+#      eap=FAST
364
 
+#      anonymous_identity="FAST-000102030405"
365
 
+#      identity="username"
366
 
+#      password="password"
367
 
+#      phase1="fast_provisioning=1"
368
 
+#      pac_file="blob://eap-fast-pac"
369
 
+#}
370
 
 
371
 
 # Plaintext connection (no WPA, no IEEE 802.1X)
372
 
-network={
373
 
-       ssid="plaintext-test"
374
 
-       key_mgmt=NONE
375
 
-}
376
 
+#network={
377
 
+#      ssid="plaintext-test"
378
 
+#      key_mgmt=NONE
379
 
+#}
380
 
 
381
 
 
382
 
 # Shared WEP key connection (no WPA, no IEEE 802.1X)
383
 
-network={
384
 
-       ssid="static-wep-test"
385
 
-       key_mgmt=NONE
386
 
-       wep_key0="abcde"
387
 
-       wep_key1=0102030405
388
 
-       wep_key2="1234567890123"
389
 
-       wep_tx_keyidx=0
390
 
-       priority=5
391
 
-}
392
 
+#network={
393
 
+#      ssid="static-wep-test"
394
 
+#      key_mgmt=NONE
395
 
+#      wep_key0="abcde"
396
 
+#      wep_key1=0102030405
397
 
+#      wep_key2="1234567890123"
398
 
+#      wep_tx_keyidx=0
399
 
+#      priority=5
400
 
+#}
401
 
 
402
 
 
403
 
 # Shared WEP key connection (no WPA, no IEEE 802.1X) using Shared Key
404
 
 # IEEE 802.11 authentication
405
 
-network={
406
 
-       ssid="static-wep-test2"
407
 
-       key_mgmt=NONE
408
 
-       wep_key0="abcde"
409
 
-       wep_key1=0102030405
410
 
-       wep_key2="1234567890123"
411
 
-       wep_tx_keyidx=0
412
 
-       priority=5
413
 
-       auth_alg=SHARED
414
 
-}
415
 
+#network={
416
 
+#      ssid="static-wep-test2"
417
 
+#      key_mgmt=NONE
418
 
+#      wep_key0="abcde"
419
 
+#      wep_key1=0102030405
420
 
+#      wep_key2="1234567890123"
421
 
+#      wep_tx_keyidx=0
422
 
+#      priority=5
423
 
+#      auth_alg=SHARED
424
 
+#}
425
 
 
426
 
 
427
 
 # IBSS/ad-hoc network with WPA-None/TKIP.
428
 
-network={
429
 
-       ssid="test adhoc"
430
 
-       mode=1
431
 
-       proto=WPA
432
 
-       key_mgmt=WPA-NONE
433
 
-       pairwise=NONE
434
 
-       group=TKIP
435
 
-       psk="secret passphrase"
436
 
-}
437
 
+#network={
438
 
+#      ssid="test adhoc"
439
 
+#      mode=1
440
 
+#      proto=WPA
441
 
+#      key_mgmt=WPA-NONE
442
 
+#      pairwise=NONE
443
 
+#      group=TKIP
444
 
+#      psk="secret passphrase"
445
 
+#}
446
 
 
447
 
 
448
 
 # Catch all example that allows more or less all configuration modes
449
 
-network={
450
 
-       ssid="example"
451
 
-       scan_ssid=1
452
 
-       key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
453
 
-       pairwise=CCMP TKIP
454
 
-       group=CCMP TKIP WEP104 WEP40
455
 
-       psk="very secret passphrase"
456
 
-       eap=TTLS PEAP TLS
457
 
-       identity="user@example.com"
458
 
-       password="foobar"
459
 
-       ca_cert="/etc/cert/ca.pem"
460
 
-       client_cert="/etc/cert/user.pem"
461
 
-       private_key="/etc/cert/user.prv"
462
 
-       private_key_passwd="password"
463
 
-       phase1="peaplabel=0"
464
 
-}
465
 
+#network={
466
 
+#      ssid="example"
467
 
+#      scan_ssid=1
468
 
+#      key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
469
 
+#      pairwise=CCMP TKIP
470
 
+#      group=CCMP TKIP WEP104 WEP40
471
 
+#      psk="very secret passphrase"
472
 
+#      eap=TTLS PEAP TLS
473
 
+#      identity="user@example.com"
474
 
+#      password="foobar"
475
 
+#      ca_cert="/etc/cert/ca.pem"
476
 
+#      client_cert="/etc/cert/user.pem"
477
 
+#      private_key="/etc/cert/user.prv"
478
 
+#      private_key_passwd="password"
479
 
+#      phase1="peaplabel=0"
480
 
+#}
481
 
 
482
 
 # Example of EAP-TLS with smartcard (openssl engine)
483
 
-network={
484
 
-       ssid="example"
485
 
-       key_mgmt=WPA-EAP
486
 
-       eap=TLS
487
 
-       proto=RSN
488
 
-       pairwise=CCMP TKIP
489
 
-       group=CCMP TKIP
490
 
-       identity="user@example.com"
491
 
-       ca_cert="/etc/cert/ca.pem"
492
 
-       client_cert="/etc/cert/user.pem"
493
 
+#network={
494
 
+#      ssid="example"
495
 
+#      key_mgmt=WPA-EAP
496
 
+#      eap=TLS
497
 
+#      proto=RSN
498
 
+#      pairwise=CCMP TKIP
499
 
+#      group=CCMP TKIP
500
 
+#      identity="user@example.com"
501
 
+#      ca_cert="/etc/cert/ca.pem"
502
 
+#      client_cert="/etc/cert/user.pem"
503
 
 
504
 
-       engine=1
505
 
+#      engine=1
506
 
 
507
 
        # The engine configured here must be available. Look at
508
 
        # OpenSSL engine support in the global section.
509
 
@@ -623,27 +628,27 @@
510
 
        #key_id="45"
511
 
 
512
 
        # use the pkcs11 engine
513
 
-       engine_id="pkcs11"
514
 
-       key_id="id_45"
515
 
+#      engine_id="pkcs11"
516
 
+#      key_id="id_45"
517
 
 
518
 
        # Optional PIN configuration; this can be left out and PIN will be
519
 
        # asked through the control interface
520
 
-       pin="1234"
521
 
-}
522
 
+#      pin="1234"
523
 
+#}
524
 
 
525
 
 # Example configuration showing how to use an inlined blob as a CA certificate
526
 
 # data instead of using external file
527
 
-network={
528
 
-       ssid="example"
529
 
-       key_mgmt=WPA-EAP
530
 
-       eap=TTLS
531
 
-       identity="user@example.com"
532
 
-       anonymous_identity="anonymous@example.com"
533
 
-       password="foobar"
534
 
-       ca_cert="blob://exampleblob"
535
 
-       priority=20
536
 
-}
537
 
+#network={
538
 
+#      ssid="example"
539
 
+#      key_mgmt=WPA-EAP
540
 
+#      eap=TTLS
541
 
+#      identity="user@example.com"
542
 
+#      anonymous_identity="anonymous@example.com"
543
 
+#      password="foobar"
544
 
+#      ca_cert="blob://exampleblob"
545
 
+#      priority=20
546
 
+#}
547
 
 
548
 
-blob-base64-exampleblob={
549
 
-SGVsbG8gV29ybGQhCg==
550
 
-}
551
 
+#blob-base64-exampleblob={
552
 
+#SGVsbG8gV29ybGQhCg==
553
 
+#}