[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@3.149.25.87: ~ $
# EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and
# openCryptoki (e.g., with TPM token)

# This example uses following PKCS#11 objects:
# $ pkcs11-tool --module /usr/lib/opencryptoki/libopencryptoki.so  -O -l
# Please enter User PIN:
# Private Key Object; RSA
#   label:      rsakey
#   ID:         04
#   Usage:      decrypt, sign, unwrap
# Certificate Object, type = X.509 cert
#   label:      ca
#   ID:         01
# Certificate Object, type = X.509 cert
#   label:      cert
#   ID:         04

# Configure OpenSSL to load the PKCS#11 engine and openCryptoki module
pkcs11_engine_path=/usr/lib/engines/engine_pkcs11.so
pkcs11_module_path=/usr/lib/opencryptoki/libopencryptoki.so

network={
	ssid="test network"
	key_mgmt=WPA-EAP
	eap=TLS
	identity="User"

	# use OpenSSL PKCS#11 engine for this network
	engine=1
	engine_id="pkcs11"

	# select the private key and certificates based on ID (see pkcs11-tool
	# output above)
	key_id="4"
	cert_id="4"
	ca_cert_id="1"

	# set the PIN code; leave this out to configure the PIN to be requested
	# interactively when needed (e.g., via wpa_gui or wpa_cli)
	pin="123456"
}

Filemanager

Name Type Size Permission Actions
p2p Folder 0755
60_wpa_supplicant File 267 B 0755
dbus-listen-preq.py File 1.53 KB 0644
ieee8021x.conf File 269 B 0644
openCryptoki.conf File 1.12 KB 0644
p2p-action-udhcp.sh File 1.68 KB 0755
p2p-action.sh File 2.63 KB 0755
p2p-nfc.py File 19.73 KB 0644
plaintext.conf File 133 B 0644
udhcpd-p2p.conf File 2.86 KB 0644
wep.conf File 170 B 0644
wpa-psk-tkip.conf File 181 B 0644
wpa2-eap-ccmp.conf File 284 B 0644
wpas-dbus-new-getall.py File 1.7 KB 0644
wpas-dbus-new-signals.py File 5.93 KB 0644
wpas-dbus-new-wps.py File 2.17 KB 0644
wpas-dbus-new.py File 4.17 KB 0644
wpas-test.py File 2.51 KB 0644
wps-ap-cli File 1.15 KB 0755
wps-nfc.py File 15.31 KB 0644