flavors rev 113
firefox: remove old files
author | Christophe Lincoln <pankso@slitaz.org> |
---|---|
date | Tue May 31 01:13:09 2011 +0200 (2011-05-31) |
parents | 97f1736b586c |
children | 6892605beb55 |
files | firefox/rootfs/etc/daemons.conf firefox/rootfs/etc/init.d/wpa_supplicant firefox/rootfs/etc/wpa_supplicant.conf firefox/rootfs/usr/share/applications/system-doc.desktop |
line diff
1.1 --- a/firefox/rootfs/etc/daemons.conf Tue May 31 00:45:49 2011 +0200 1.2 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 1.3 @@ -1,36 +0,0 @@ 1.4 -# /etc/daemons.conf - Daemons options configuration file. 1.5 -# 1.6 -# This file is used for setting options to start daemons at boot time or from 1.7 -# the command line (/etc/init.d/daemon-name start). Please check /etc/rcS.conf 1.8 -# to automatically start a daemon at boot. 1.9 -# 1.10 - 1.11 -# DBUS daemon options. 1.12 -DBUS_OPTIONS="--system" 1.13 - 1.14 -# HAL daemon options. 1.15 -HALD_OPTIONS="--daemon=yes" 1.16 - 1.17 -# LightTPD Web server options. 1.18 -LIGHTTPD_OPTIONS="-f /etc/lighttpd/lighttpd.conf" 1.19 - 1.20 -# Dropbear SSH server options. 1.21 -DROPBEAR_OPTIONS="-w -g -b /etc/dropbear/banner" 1.22 - 1.23 -# Rsync daemon options. 1.24 -RSYNCD_OPTIONS="--daemon" 1.25 - 1.26 -# Cron daemon options. 1.27 -CROND_OPTIONS="-b" 1.28 - 1.29 -# Domain Name Server options. 1.30 -DNSD_OPTIONS="-d" 1.31 - 1.32 -# Super server options 1.33 -INETD_OPTIONS="" 1.34 -# Tftp daemon options. 1.35 -TFTPD_OPTIONS="-r /boot" 1.36 - 1.37 -# wpa_supplicant daemon options 1.38 -WPA_OPTIONS="-B -P/var/run/wpa_supplicant.pid -c/etc/wpa_supplicant.conf -i$(. /etc/network.conf ; echo $WIFI_INTERFACE)" 1.39 -
2.1 --- a/firefox/rootfs/etc/init.d/wpa_supplicant Tue May 31 00:45:49 2011 +0200 2.2 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 2.3 @@ -1,55 +0,0 @@ 2.4 -#!/bin/sh 2.5 -# /etc/init.d/wpa_supplicant: Start, stop and restart wpa_supplicant deamon 2.6 -# on SliTaz, at boot time or with the command line. 2.7 -# 2.8 -# To start daemon at boot time, just put the right name in the $RUN_DAEMONS 2.9 -# variable of /etc/rcS.conf and configure options with /etc/daemons.conf. 2.10 -# 2.11 -. /etc/init.d/rc.functions 2.12 -. /etc/daemons.conf 2.13 - 2.14 -NAME=wpa_supplicant 2.15 -DESC="wpa_supplicant deamon" 2.16 -DAEMON=/usr/bin/wpa_supplicant 2.17 -OPTIONS=$WPA_OPTIONS 2.18 -PIDFILE=/var/run/wpa_supplicant.pid 2.19 - 2.20 -case "$1" in 2.21 - start) 2.22 - if [ -f $PIDFILE ] ; then 2.23 - echo "$NAME already running." 2.24 - exit 1 2.25 - fi 2.26 - echo -n "Starting $DESC: $NAME... " 2.27 - $DAEMON $OPTIONS 2.28 - status 2.29 - ;; 2.30 - stop) 2.31 - if [ ! -f $PIDFILE ] ; then 2.32 - echo "$NAME is not running." 2.33 - exit 1 2.34 - fi 2.35 - echo -n "Stopping $DESC: $NAME... " 2.36 - kill `cat $PIDFILE` 2.37 - status 2.38 - ;; 2.39 - restart) 2.40 - if [ ! -f $PIDFILE ] ; then 2.41 - echo "$NAME is not running." 2.42 - exit 1 2.43 - fi 2.44 - echo -n "Restarting $DESC: $NAME... " 2.45 - kill `cat $PIDFILE` 2.46 - sleep 2 2.47 - $DAEMON $OPTIONS 2.48 - status 2.49 - ;; 2.50 - *) 2.51 - echo "" 2.52 - echo -e "\033[1mUsage:\033[0m /etc/init.d/`basename $0` [start|stop|restart]" 2.53 - echo "" 2.54 - exit 1 2.55 - ;; 2.56 -esac 2.57 - 2.58 -exit 0
3.1 --- a/firefox/rootfs/etc/wpa_supplicant.conf Tue May 31 00:45:49 2011 +0200 3.2 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 3.3 @@ -1,754 +0,0 @@ 3.4 -##### Example wpa_supplicant configuration file ############################### 3.5 -# 3.6 -# This file describes configuration file format and lists all available option. 3.7 -# Please also take a look at simpler configuration examples in 'examples' 3.8 -# subdirectory. 3.9 -# 3.10 -# Empty lines and lines starting with # are ignored 3.11 - 3.12 -# NOTE! This file may contain password information and should probably be made 3.13 -# readable only by root user on multiuser systems. 3.14 - 3.15 -# Note: All file paths in this configuration file should use full (absolute, 3.16 -# not relative to working directory) path in order to allow working directory 3.17 -# to be changed. This can happen if wpa_supplicant is run in the background. 3.18 - 3.19 -# Whether to allow wpa_supplicant to update (overwrite) configuration 3.20 -# 3.21 -# This option can be used to allow wpa_supplicant to overwrite configuration 3.22 -# file whenever configuration is changed (e.g., new network block is added with 3.23 -# wpa_cli or wpa_gui, or a password is changed). This is required for 3.24 -# wpa_cli/wpa_gui to be able to store the configuration changes permanently. 3.25 -# Please note that overwriting configuration file will remove the comments from 3.26 -# it. 3.27 -#update_config=1 3.28 - 3.29 -# global configuration (shared by all network blocks) 3.30 -# 3.31 -# Parameters for the control interface. If this is specified, wpa_supplicant 3.32 -# will open a control interface that is available for external programs to 3.33 -# manage wpa_supplicant. The meaning of this string depends on which control 3.34 -# interface mechanism is used. For all cases, the existance of this parameter 3.35 -# in configuration is used to determine whether the control interface is 3.36 -# enabled. 3.37 -# 3.38 -# For UNIX domain sockets (default on Linux and BSD): This is a directory that 3.39 -# will be created for UNIX domain sockets for listening to requests from 3.40 -# external programs (CLI/GUI, etc.) for status information and configuration. 3.41 -# The socket file will be named based on the interface name, so multiple 3.42 -# wpa_supplicant processes can be run at the same time if more than one 3.43 -# interface is used. 3.44 -# /var/run/wpa_supplicant is the recommended directory for sockets and by 3.45 -# default, wpa_cli will use it when trying to connect with wpa_supplicant. 3.46 -# 3.47 -# Access control for the control interface can be configured by setting the 3.48 -# directory to allow only members of a group to use sockets. This way, it is 3.49 -# possible to run wpa_supplicant as root (since it needs to change network 3.50 -# configuration and open raw sockets) and still allow GUI/CLI components to be 3.51 -# run as non-root users. However, since the control interface can be used to 3.52 -# change the network configuration, this access needs to be protected in many 3.53 -# cases. By default, wpa_supplicant is configured to use gid 0 (root). If you 3.54 -# want to allow non-root users to use the control interface, add a new group 3.55 -# and change this value to match with that group. Add users that should have 3.56 -# control interface access to this group. If this variable is commented out or 3.57 -# not included in the configuration file, group will not be changed from the 3.58 -# value it got by default when the directory or socket was created. 3.59 -# 3.60 -# When configuring both the directory and group, use following format: 3.61 -# DIR=/var/run/wpa_supplicant GROUP=wheel 3.62 -# DIR=/var/run/wpa_supplicant GROUP=0 3.63 -# (group can be either group name or gid) 3.64 -# 3.65 -# For UDP connections (default on Windows): The value will be ignored. This 3.66 -# variable is just used to select that the control interface is to be created. 3.67 -# The value can be set to, e.g., udp (ctrl_interface=udp) 3.68 -# 3.69 -# For Windows Named Pipe: This value can be used to set the security descriptor 3.70 -# for controlling access to the control interface. Security descriptor can be 3.71 -# set using Security Descriptor String Format (see http://msdn.microsoft.com/ 3.72 -# library/default.asp?url=/library/en-us/secauthz/security/ 3.73 -# security_descriptor_string_format.asp). The descriptor string needs to be 3.74 -# prefixed with SDDL=. For example, ctrl_interface=SDDL=D: would set an empty 3.75 -# DACL (which will reject all connections). See README-Windows.txt for more 3.76 -# information about SDDL string format. 3.77 -# 3.78 -ctrl_interface=/var/run/wpa_supplicant 3.79 - 3.80 -# Ensure that only root can read the WPA configuration 3.81 -ctrl_interface_group=0 3.82 - 3.83 - 3.84 -# IEEE 802.1X/EAPOL version 3.85 -# wpa_supplicant is implemented based on IEEE Std 802.1X-2004 which defines 3.86 -# EAPOL version 2. However, there are many APs that do not handle the new 3.87 -# version number correctly (they seem to drop the frames completely). In order 3.88 -# to make wpa_supplicant interoperate with these APs, the version number is set 3.89 -# to 1 by default. This configuration value can be used to set it to the new 3.90 -# version (2). 3.91 -eapol_version=1 3.92 - 3.93 -# AP scanning/selection 3.94 -# By default, wpa_supplicant requests driver to perform AP scanning and then 3.95 -# uses the scan results to select a suitable AP. Another alternative is to 3.96 -# allow the driver to take care of AP scanning and selection and use 3.97 -# wpa_supplicant just to process EAPOL frames based on IEEE 802.11 association 3.98 -# information from the driver. 3.99 -# 1: wpa_supplicant initiates scanning and AP selection 3.100 -# 0: driver takes care of scanning, AP selection, and IEEE 802.11 association 3.101 -# parameters (e.g., WPA IE generation); this mode can also be used with 3.102 -# non-WPA drivers when using IEEE 802.1X mode; do not try to associate with 3.103 -# APs (i.e., external program needs to control association). This mode must 3.104 -# also be used when using wired Ethernet drivers. 3.105 -# 2: like 0, but associate with APs using security policy and SSID (but not 3.106 -# BSSID); this can be used, e.g., with ndiswrapper and NDIS drivers to 3.107 -# enable operation with hidden SSIDs and optimized roaming; in this mode, 3.108 -# the network blocks in the configuration file are tried one by one until 3.109 -# the driver reports successful association; each network block should have 3.110 -# explicit security policy (i.e., only one option in the lists) for 3.111 -# key_mgmt, pairwise, group, proto variables 3.112 -ap_scan=1 3.113 - 3.114 -# EAP fast re-authentication 3.115 -# By default, fast re-authentication is enabled for all EAP methods that 3.116 -# support it. This variable can be used to disable fast re-authentication. 3.117 -# Normally, there is no need to disable this. 3.118 -fast_reauth=1 3.119 - 3.120 -# OpenSSL Engine support 3.121 -# These options can be used to load OpenSSL engines. 3.122 -# The two engines that are supported currently are shown below: 3.123 -# They are both from the opensc project (http://www.opensc.org/) 3.124 -# By default no engines are loaded. 3.125 -# make the opensc engine available 3.126 -#opensc_engine_path=/usr/lib/opensc/engine_opensc.so 3.127 -# make the pkcs11 engine available 3.128 -#pkcs11_engine_path=/usr/lib/opensc/engine_pkcs11.so 3.129 -# configure the path to the pkcs11 module required by the pkcs11 engine 3.130 -#pkcs11_module_path=/usr/lib/pkcs11/opensc-pkcs11.so 3.131 - 3.132 -# Dynamic EAP methods 3.133 -# If EAP methods were built dynamically as shared object files, they need to be 3.134 -# loaded here before being used in the network blocks. By default, EAP methods 3.135 -# are included statically in the build, so these lines are not needed 3.136 -#load_dynamic_eap=/usr/lib/wpa_supplicant/eap_tls.so 3.137 -#load_dynamic_eap=/usr/lib/wpa_supplicant/eap_md5.so 3.138 - 3.139 -# Driver interface parameters 3.140 -# This field can be used to configure arbitrary driver interace parameters. The 3.141 -# format is specific to the selected driver interface. This field is not used 3.142 -# in most cases. 3.143 -#driver_param="field=value" 3.144 - 3.145 -# Maximum lifetime for PMKSA in seconds; default 43200 3.146 -#dot11RSNAConfigPMKLifetime=43200 3.147 -# Threshold for reauthentication (percentage of PMK lifetime); default 70 3.148 -#dot11RSNAConfigPMKReauthThreshold=70 3.149 -# Timeout for security association negotiation in seconds; default 60 3.150 -#dot11RSNAConfigSATimeout=60 3.151 - 3.152 -# network block 3.153 -# 3.154 -# Each network (usually AP's sharing the same SSID) is configured as a separate 3.155 -# block in this configuration file. The network blocks are in preference order 3.156 -# (the first match is used). 3.157 -# 3.158 -# network block fields: 3.159 -# 3.160 -# disabled: 3.161 -# 0 = this network can be used (default) 3.162 -# 1 = this network block is disabled (can be enabled through ctrl_iface, 3.163 -# e.g., with wpa_cli or wpa_gui) 3.164 -# 3.165 -# id_str: Network identifier string for external scripts. This value is passed 3.166 -# to external action script through wpa_cli as WPA_ID_STR environment 3.167 -# variable to make it easier to do network specific configuration. 3.168 -# 3.169 -# ssid: SSID (mandatory); either as an ASCII string with double quotation or 3.170 -# as hex string; network name 3.171 -# 3.172 -# scan_ssid: 3.173 -# 0 = do not scan this SSID with specific Probe Request frames (default) 3.174 -# 1 = scan with SSID-specific Probe Request frames (this can be used to 3.175 -# find APs that do not accept broadcast SSID or use multiple SSIDs; 3.176 -# this will add latency to scanning, so enable this only when needed) 3.177 -# 3.178 -# bssid: BSSID (optional); if set, this network block is used only when 3.179 -# associating with the AP using the configured BSSID 3.180 -# 3.181 -# priority: priority group (integer) 3.182 -# By default, all networks will get same priority group (0). If some of the 3.183 -# networks are more desirable, this field can be used to change the order in 3.184 -# which wpa_supplicant goes through the networks when selecting a BSS. The 3.185 -# priority groups will be iterated in decreasing priority (i.e., the larger the 3.186 -# priority value, the sooner the network is matched against the scan results). 3.187 -# Within each priority group, networks will be selected based on security 3.188 -# policy, signal strength, etc. 3.189 -# Please note that AP scanning with scan_ssid=1 and ap_scan=2 mode are not 3.190 -# using this priority to select the order for scanning. Instead, they try the 3.191 -# networks in the order that used in the configuration file. 3.192 -# 3.193 -# mode: IEEE 802.11 operation mode 3.194 -# 0 = infrastructure (Managed) mode, i.e., associate with an AP (default) 3.195 -# 1 = IBSS (ad-hoc, peer-to-peer) 3.196 -# Note: IBSS can only be used with key_mgmt NONE (plaintext and static WEP) 3.197 -# and key_mgmt=WPA-NONE (fixed group key TKIP/CCMP). In addition, ap_scan has 3.198 -# to be set to 2 for IBSS. WPA-None requires following network block options: 3.199 -# proto=WPA, key_mgmt=WPA-NONE, pairwise=NONE, group=TKIP (or CCMP, but not 3.200 -# both), and psk must also be set. 3.201 -# 3.202 -# frequency: Channel frequency in megahertz (MHz) for IBSS, e.g., 3.203 -# 2412 = IEEE 802.11b/g channel 1. This value is used to configure the initial 3.204 -# channel for IBSS (adhoc) networks. It is ignored in the infrastructure mode. 3.205 -# In addition, this value is only used by the station that creates the IBSS. If 3.206 -# an IBSS network with the configured SSID is already present, the frequency of 3.207 -# the network will be used instead of this configured value. 3.208 -# 3.209 -# proto: list of accepted protocols 3.210 -# WPA = WPA/IEEE 802.11i/D3.0 3.211 -# RSN = WPA2/IEEE 802.11i (also WPA2 can be used as an alias for RSN) 3.212 -# If not set, this defaults to: WPA RSN 3.213 -# 3.214 -# key_mgmt: list of accepted authenticated key management protocols 3.215 -# WPA-PSK = WPA pre-shared key (this requires 'psk' field) 3.216 -# WPA-EAP = WPA using EAP authentication (this can use an external 3.217 -# program, e.g., Xsupplicant, for IEEE 802.1X EAP Authentication 3.218 -# IEEE8021X = IEEE 802.1X using EAP authentication and (optionally) dynamically 3.219 -# generated WEP keys 3.220 -# NONE = WPA is not used; plaintext or static WEP could be used 3.221 -# If not set, this defaults to: WPA-PSK WPA-EAP 3.222 -# 3.223 -# auth_alg: list of allowed IEEE 802.11 authentication algorithms 3.224 -# OPEN = Open System authentication (required for WPA/WPA2) 3.225 -# SHARED = Shared Key authentication (requires static WEP keys) 3.226 -# LEAP = LEAP/Network EAP (only used with LEAP) 3.227 -# If not set, automatic selection is used (Open System with LEAP enabled if 3.228 -# LEAP is allowed as one of the EAP methods). 3.229 -# 3.230 -# pairwise: list of accepted pairwise (unicast) ciphers for WPA 3.231 -# CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0] 3.232 -# TKIP = Temporal Key Integrity Protocol [IEEE 802.11i/D7.0] 3.233 -# NONE = Use only Group Keys (deprecated, should not be included if APs support 3.234 -# pairwise keys) 3.235 -# If not set, this defaults to: CCMP TKIP 3.236 -# 3.237 -# group: list of accepted group (broadcast/multicast) ciphers for WPA 3.238 -# CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0] 3.239 -# TKIP = Temporal Key Integrity Protocol [IEEE 802.11i/D7.0] 3.240 -# WEP104 = WEP (Wired Equivalent Privacy) with 104-bit key 3.241 -# WEP40 = WEP (Wired Equivalent Privacy) with 40-bit key [IEEE 802.11] 3.242 -# If not set, this defaults to: CCMP TKIP WEP104 WEP40 3.243 -# 3.244 -# psk: WPA preshared key; 256-bit pre-shared key 3.245 -# The key used in WPA-PSK mode can be entered either as 64 hex-digits, i.e., 3.246 -# 32 bytes or as an ASCII passphrase (in which case, the real PSK will be 3.247 -# generated using the passphrase and SSID). ASCII passphrase must be between 3.248 -# 8 and 63 characters (inclusive). 3.249 -# This field is not needed, if WPA-EAP is used. 3.250 -# Note: Separate tool, wpa_passphrase, can be used to generate 256-bit keys 3.251 -# from ASCII passphrase. This process uses lot of CPU and wpa_supplicant 3.252 -# startup and reconfiguration time can be optimized by generating the PSK only 3.253 -# only when the passphrase or SSID has actually changed. 3.254 -# 3.255 -# eapol_flags: IEEE 802.1X/EAPOL options (bit field) 3.256 -# Dynamic WEP key required for non-WPA mode 3.257 -# bit0 (1): require dynamically generated unicast WEP key 3.258 -# bit1 (2): require dynamically generated broadcast WEP key 3.259 -# (3 = require both keys; default) 3.260 -# Note: When using wired authentication, eapol_flags must be set to 0 for the 3.261 -# authentication to be completed successfully. 3.262 -# 3.263 -# mixed_cell: This option can be used to configure whether so called mixed 3.264 -# cells, i.e., networks that use both plaintext and encryption in the same 3.265 -# SSID, are allowed when selecting a BSS form scan results. 3.266 -# 0 = disabled (default) 3.267 -# 1 = enabled 3.268 -# 3.269 -# proactive_key_caching: 3.270 -# Enable/disable opportunistic PMKSA caching for WPA2. 3.271 -# 0 = disabled (default) 3.272 -# 1 = enabled 3.273 -# 3.274 -# wep_key0..3: Static WEP key (ASCII in double quotation, e.g. "abcde" or 3.275 -# hex without quotation, e.g., 0102030405) 3.276 -# wep_tx_keyidx: Default WEP key index (TX) (0..3) 3.277 -# 3.278 -# peerkey: Whether PeerKey negotiation for direct links (IEEE 802.11e DLS) is 3.279 -# allowed. This is only used with RSN/WPA2. 3.280 -# 0 = disabled (default) 3.281 -# 1 = enabled 3.282 -#peerkey=1 3.283 -# 3.284 -# Following fields are only used with internal EAP implementation. 3.285 -# eap: space-separated list of accepted EAP methods 3.286 -# MD5 = EAP-MD5 (unsecure and does not generate keying material -> 3.287 -# cannot be used with WPA; to be used as a Phase 2 method 3.288 -# with EAP-PEAP or EAP-TTLS) 3.289 -# MSCHAPV2 = EAP-MSCHAPv2 (cannot be used separately with WPA; to be used 3.290 -# as a Phase 2 method with EAP-PEAP or EAP-TTLS) 3.291 -# OTP = EAP-OTP (cannot be used separately with WPA; to be used 3.292 -# as a Phase 2 method with EAP-PEAP or EAP-TTLS) 3.293 -# GTC = EAP-GTC (cannot be used separately with WPA; to be used 3.294 -# as a Phase 2 method with EAP-PEAP or EAP-TTLS) 3.295 -# TLS = EAP-TLS (client and server certificate) 3.296 -# PEAP = EAP-PEAP (with tunnelled EAP authentication) 3.297 -# TTLS = EAP-TTLS (with tunnelled EAP or PAP/CHAP/MSCHAP/MSCHAPV2 3.298 -# authentication) 3.299 -# If not set, all compiled in methods are allowed. 3.300 -# 3.301 -# identity: Identity string for EAP 3.302 -# anonymous_identity: Anonymous identity string for EAP (to be used as the 3.303 -# unencrypted identity with EAP types that support different tunnelled 3.304 -# identity, e.g., EAP-TTLS) 3.305 -# password: Password string for EAP 3.306 -# ca_cert: File path to CA certificate file (PEM/DER). This file can have one 3.307 -# or more trusted CA certificates. If ca_cert and ca_path are not 3.308 -# included, server certificate will not be verified. This is insecure and 3.309 -# a trusted CA certificate should always be configured when using 3.310 -# EAP-TLS/TTLS/PEAP. Full path should be used since working directory may 3.311 -# change when wpa_supplicant is run in the background. 3.312 -# On Windows, trusted CA certificates can be loaded from the system 3.313 -# certificate store by setting this to cert_store://<name>, e.g., 3.314 -# ca_cert="cert_store://CA" or ca_cert="cert_store://ROOT". 3.315 -# Note that when running wpa_supplicant as an application, the user 3.316 -# certificate store (My user account) is used, whereas computer store 3.317 -# (Computer account) is used when running wpasvc as a service. 3.318 -# ca_path: Directory path for CA certificate files (PEM). This path may 3.319 -# contain multiple CA certificates in OpenSSL format. Common use for this 3.320 -# is to point to system trusted CA list which is often installed into 3.321 -# directory like /etc/ssl/certs. If configured, these certificates are 3.322 -# added to the list of trusted CAs. ca_cert may also be included in that 3.323 -# case, but it is not required. 3.324 -# client_cert: File path to client certificate file (PEM/DER) 3.325 -# Full path should be used since working directory may change when 3.326 -# wpa_supplicant is run in the background. 3.327 -# Alternatively, a named configuration blob can be used by setting this 3.328 -# to blob://<blob name>. 3.329 -# private_key: File path to client private key file (PEM/DER/PFX) 3.330 -# When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 3.331 -# commented out. Both the private key and certificate will be read from 3.332 -# the PKCS#12 file in this case. Full path should be used since working 3.333 -# directory may change when wpa_supplicant is run in the background. 3.334 -# Windows certificate store can be used by leaving client_cert out and 3.335 -# configuring private_key in one of the following formats: 3.336 -# cert://substring_to_match 3.337 -# hash://certificate_thumbprint_in_hex 3.338 -# for example: private_key="hash://63093aa9c47f56ae88334c7b65a4" 3.339 -# Note that when running wpa_supplicant as an application, the user 3.340 -# certificate store (My user account) is used, whereas computer store 3.341 -# (Computer account) is used when running wpasvc as a service. 3.342 -# Alternatively, a named configuration blob can be used by setting this 3.343 -# to blob://<blob name>. 3.344 -# private_key_passwd: Password for private key file (if left out, this will be 3.345 -# asked through control interface) 3.346 -# dh_file: File path to DH/DSA parameters file (in PEM format) 3.347 -# This is an optional configuration file for setting parameters for an 3.348 -# ephemeral DH key exchange. In most cases, the default RSA 3.349 -# authentication does not use this configuration. However, it is possible 3.350 -# setup RSA to use ephemeral DH key exchange. In addition, ciphers with 3.351 -# DSA keys always use ephemeral DH keys. This can be used to achieve 3.352 -# forward secrecy. If the file is in DSA parameters format, it will be 3.353 -# automatically converted into DH params. 3.354 -# subject_match: Substring to be matched against the subject of the 3.355 -# authentication server certificate. If this string is set, the server 3.356 -# sertificate is only accepted if it contains this string in the subject. 3.357 -# The subject string is in following format: 3.358 -# /C=US/ST=CA/L=San Francisco/CN=Test AS/emailAddress=as@example.com 3.359 -# altsubject_match: Semicolon separated string of entries to be matched against 3.360 -# the alternative subject name of the authentication server certificate. 3.361 -# If this string is set, the server sertificate is only accepted if it 3.362 -# contains one of the entries in an alternative subject name extension. 3.363 -# altSubjectName string is in following format: TYPE:VALUE 3.364 -# Example: EMAIL:server@example.com 3.365 -# Example: DNS:server.example.com;DNS:server2.example.com 3.366 -# Following types are supported: EMAIL, DNS, URI 3.367 -# phase1: Phase1 (outer authentication, i.e., TLS tunnel) parameters 3.368 -# (string with field-value pairs, e.g., "peapver=0" or 3.369 -# "peapver=1 peaplabel=1") 3.370 -# 'peapver' can be used to force which PEAP version (0 or 1) is used. 3.371 -# 'peaplabel=1' can be used to force new label, "client PEAP encryption", 3.372 -# to be used during key derivation when PEAPv1 or newer. Most existing 3.373 -# PEAPv1 implementation seem to be using the old label, "client EAP 3.374 -# encryption", and wpa_supplicant is now using that as the default value. 3.375 -# Some servers, e.g., Radiator, may require peaplabel=1 configuration to 3.376 -# interoperate with PEAPv1; see eap_testing.txt for more details. 3.377 -# 'peap_outer_success=0' can be used to terminate PEAP authentication on 3.378 -# tunneled EAP-Success. This is required with some RADIUS servers that 3.379 -# implement draft-josefsson-pppext-eap-tls-eap-05.txt (e.g., 3.380 -# Lucent NavisRadius v4.4.0 with PEAP in "IETF Draft 5" mode) 3.381 -# include_tls_length=1 can be used to force wpa_supplicant to include 3.382 -# TLS Message Length field in all TLS messages even if they are not 3.383 -# fragmented. 3.384 -# sim_min_num_chal=3 can be used to configure EAP-SIM to require three 3.385 -# challenges (by default, it accepts 2 or 3) 3.386 -# phase2: Phase2 (inner authentication with TLS tunnel) parameters 3.387 -# (string with field-value pairs, e.g., "auth=MSCHAPV2" for EAP-PEAP or 3.388 -# "autheap=MSCHAPV2 autheap=MD5" for EAP-TTLS) 3.389 -# Following certificate/private key fields are used in inner Phase2 3.390 -# authentication when using EAP-TTLS or EAP-PEAP. 3.391 -# ca_cert2: File path to CA certificate file. This file can have one or more 3.392 -# trusted CA certificates. If ca_cert2 and ca_path2 are not included, 3.393 -# server certificate will not be verified. This is insecure and a trusted 3.394 -# CA certificate should always be configured. 3.395 -# ca_path2: Directory path for CA certificate files (PEM) 3.396 -# client_cert2: File path to client certificate file 3.397 -# private_key2: File path to client private key file 3.398 -# private_key2_passwd: Password for private key file 3.399 -# dh_file2: File path to DH/DSA parameters file (in PEM format) 3.400 -# subject_match2: Substring to be matched against the subject of the 3.401 -# authentication server certificate. 3.402 -# altsubject_match2: Substring to be matched against the alternative subject 3.403 -# name of the authentication server certificate. 3.404 -# 3.405 -# fragment_size: Maximum EAP fragment size in bytes (default 1398). 3.406 -# This value limits the fragment size for EAP methods that support 3.407 -# fragmentation (e.g., EAP-TLS and EAP-PEAP). This value should be set 3.408 -# small enough to make the EAP messages fit in MTU of the network 3.409 -# interface used for EAPOL. The default value is suitable for most 3.410 -# cases. 3.411 -# 3.412 -# EAP-PSK variables: 3.413 -# eappsk: 16-byte (128-bit, 32 hex digits) pre-shared key in hex format 3.414 -# nai: user NAI 3.415 -# 3.416 -# EAP-PAX variables: 3.417 -# eappsk: 16-byte (128-bit, 32 hex digits) pre-shared key in hex format 3.418 -# 3.419 -# EAP-SAKE variables: 3.420 -# eappsk: 32-byte (256-bit, 64 hex digits) pre-shared key in hex format 3.421 -# (this is concatenation of Root-Secret-A and Root-Secret-B) 3.422 -# nai: user NAI (PEERID) 3.423 -# 3.424 -# EAP-GPSK variables: 3.425 -# eappsk: Pre-shared key in hex format (at least 128 bits, i.e., 32 hex digits) 3.426 -# nai: user NAI (ID_Client) 3.427 -# 3.428 -# EAP-FAST variables: 3.429 -# pac_file: File path for the PAC entries. wpa_supplicant will need to be able 3.430 -# to create this file and write updates to it when PAC is being 3.431 -# provisioned or refreshed. Full path to the file should be used since 3.432 -# working directory may change when wpa_supplicant is run in the 3.433 -# background. Alternatively, a named configuration blob can be used by 3.434 -# setting this to blob://<blob name> 3.435 -# phase1: fast_provisioning=1 option enables in-line provisioning of EAP-FAST 3.436 -# credentials (PAC) 3.437 -# 3.438 -# wpa_supplicant supports number of "EAP workarounds" to work around 3.439 -# interoperability issues with incorrectly behaving authentication servers. 3.440 -# These are enabled by default because some of the issues are present in large 3.441 -# number of authentication servers. Strict EAP conformance mode can be 3.442 -# configured by disabling workarounds with eap_workaround=0. 3.443 - 3.444 -# Example blocks: 3.445 - 3.446 -# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers 3.447 -#network={ 3.448 -# ssid="simple" 3.449 -# psk="very secret passphrase" 3.450 -# priority=5 3.451 -#} 3.452 - 3.453 -# Same as previous, but request SSID-specific scanning (for APs that reject 3.454 -# broadcast SSID) 3.455 -#network={ 3.456 -# ssid="second ssid" 3.457 -# scan_ssid=1 3.458 -# psk="very secret passphrase" 3.459 -# priority=2 3.460 -#} 3.461 - 3.462 -# Only WPA-PSK is used. Any valid cipher combination is accepted. 3.463 -#network={ 3.464 -# ssid="example" 3.465 -# proto=WPA 3.466 -# key_mgmt=WPA-PSK 3.467 -# pairwise=CCMP TKIP 3.468 -# group=CCMP TKIP WEP104 WEP40 3.469 -# psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb 3.470 -# priority=2 3.471 -#} 3.472 - 3.473 -# Only WPA-EAP is used. Both CCMP and TKIP is accepted. An AP that used WEP104 3.474 -# or WEP40 as the group cipher will not be accepted. 3.475 -#network={ 3.476 -# ssid="example" 3.477 -# proto=RSN 3.478 -# key_mgmt=WPA-EAP 3.479 -# pairwise=CCMP TKIP 3.480 -# group=CCMP TKIP 3.481 -# eap=TLS 3.482 -# identity="user@example.com" 3.483 -# ca_cert="/etc/cert/ca.pem" 3.484 -# client_cert="/etc/cert/user.pem" 3.485 -# private_key="/etc/cert/user.prv" 3.486 -# private_key_passwd="password" 3.487 -# priority=1 3.488 -#} 3.489 - 3.490 -# EAP-PEAP/MSCHAPv2 configuration for RADIUS servers that use the new peaplabel 3.491 -# (e.g., Radiator) 3.492 -#network={ 3.493 -# ssid="example" 3.494 -# key_mgmt=WPA-EAP 3.495 -# eap=PEAP 3.496 -# identity="user@example.com" 3.497 -# password="foobar" 3.498 -# ca_cert="/etc/cert/ca.pem" 3.499 -# phase1="peaplabel=1" 3.500 -# phase2="auth=MSCHAPV2" 3.501 -# priority=10 3.502 -#} 3.503 - 3.504 -# EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the 3.505 -# unencrypted use. Real identity is sent only within an encrypted TLS tunnel. 3.506 -#network={ 3.507 -# ssid="example" 3.508 -# key_mgmt=WPA-EAP 3.509 -# eap=TTLS 3.510 -# identity="user@example.com" 3.511 -# anonymous_identity="anonymous@example.com" 3.512 -# password="foobar" 3.513 -# ca_cert="/etc/cert/ca.pem" 3.514 -# priority=2 3.515 -#} 3.516 - 3.517 -# EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the unencrypted 3.518 -# use. Real identity is sent only within an encrypted TLS tunnel. 3.519 -#network={ 3.520 -# ssid="example" 3.521 -# key_mgmt=WPA-EAP 3.522 -# eap=TTLS 3.523 -# identity="user@example.com" 3.524 -# anonymous_identity="anonymous@example.com" 3.525 -# password="foobar" 3.526 -# ca_cert="/etc/cert/ca.pem" 3.527 -# phase2="auth=MSCHAPV2" 3.528 -#} 3.529 - 3.530 -# WPA-EAP, EAP-TTLS with different CA certificate used for outer and inner 3.531 -# authentication. 3.532 -#network={ 3.533 -# ssid="example" 3.534 -# key_mgmt=WPA-EAP 3.535 -# eap=TTLS 3.536 - # Phase1 / outer authentication 3.537 -# anonymous_identity="anonymous@example.com" 3.538 -# ca_cert="/etc/cert/ca.pem" 3.539 - # Phase 2 / inner authentication 3.540 -# phase2="autheap=TLS" 3.541 -# ca_cert2="/etc/cert/ca2.pem" 3.542 -# client_cert2="/etc/cer/user.pem" 3.543 -# private_key2="/etc/cer/user.prv" 3.544 -# private_key2_passwd="password" 3.545 -# priority=2 3.546 -#} 3.547 - 3.548 -# Both WPA-PSK and WPA-EAP is accepted. Only CCMP is accepted as pairwise and 3.549 -# group cipher. 3.550 -#network={ 3.551 -# ssid="example" 3.552 -# bssid=00:11:22:33:44:55 3.553 -# proto=WPA RSN 3.554 -# key_mgmt=WPA-PSK WPA-EAP 3.555 -# pairwise=CCMP 3.556 -# group=CCMP 3.557 -# psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb 3.558 -#} 3.559 - 3.560 -# Special characters in SSID, so use hex string. Default to WPA-PSK, WPA-EAP 3.561 -# and all valid ciphers. 3.562 -#network={ 3.563 -# ssid=00010203 3.564 -# psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f 3.565 -#} 3.566 - 3.567 - 3.568 -# EAP-SIM with a GSM SIM or USIM 3.569 -#network={ 3.570 -# ssid="eap-sim-test" 3.571 -# key_mgmt=WPA-EAP 3.572 -# eap=SIM 3.573 -# pin="1234" 3.574 -# pcsc="" 3.575 -#} 3.576 - 3.577 - 3.578 -# EAP-PSK 3.579 -#network={ 3.580 -# ssid="eap-psk-test" 3.581 -# key_mgmt=WPA-EAP 3.582 -# eap=PSK 3.583 -# identity="eap_psk_user" 3.584 -# eappsk=06b4be19da289f475aa46a33cb793029 3.585 -# nai="eap_psk_user@example.com" 3.586 -#} 3.587 - 3.588 - 3.589 -# IEEE 802.1X/EAPOL with dynamically generated WEP keys (i.e., no WPA) using 3.590 -# EAP-TLS for authentication and key generation; require both unicast and 3.591 -# broadcast WEP keys. 3.592 -#network={ 3.593 -# ssid="1x-test" 3.594 -# key_mgmt=IEEE8021X 3.595 -# eap=TLS 3.596 -# identity="user@example.com" 3.597 -# ca_cert="/etc/cert/ca.pem" 3.598 -# client_cert="/etc/cert/user.pem" 3.599 -# private_key="/etc/cert/user.prv" 3.600 -# private_key_passwd="password" 3.601 -# eapol_flags=3 3.602 -#} 3.603 - 3.604 - 3.605 -# LEAP with dynamic WEP keys 3.606 -#network={ 3.607 -# ssid="leap-example" 3.608 -# key_mgmt=IEEE8021X 3.609 -# eap=LEAP 3.610 -# identity="user" 3.611 -# password="foobar" 3.612 -#} 3.613 - 3.614 -# EAP-FAST with WPA (WPA or WPA2) 3.615 -#network={ 3.616 -# ssid="eap-fast-test" 3.617 -# key_mgmt=WPA-EAP 3.618 -# eap=FAST 3.619 -# anonymous_identity="FAST-000102030405" 3.620 -# identity="username" 3.621 -# password="password" 3.622 -# phase1="fast_provisioning=1" 3.623 -# pac_file="/etc/wpa_supplicant.eap-fast-pac" 3.624 -#} 3.625 - 3.626 -#network={ 3.627 -# ssid="eap-fast-test" 3.628 -# key_mgmt=WPA-EAP 3.629 -# eap=FAST 3.630 -# anonymous_identity="FAST-000102030405" 3.631 -# identity="username" 3.632 -# password="password" 3.633 -# phase1="fast_provisioning=1" 3.634 -# pac_file="blob://eap-fast-pac" 3.635 -#} 3.636 - 3.637 -# Plaintext connection (no WPA, no IEEE 802.1X) 3.638 -#network={ 3.639 -# ssid="plaintext-test" 3.640 -# key_mgmt=NONE 3.641 -#} 3.642 - 3.643 - 3.644 -# Shared WEP key connection (no WPA, no IEEE 802.1X) 3.645 -#network={ 3.646 -# ssid="static-wep-test" 3.647 -# key_mgmt=NONE 3.648 -# wep_key0="abcde" 3.649 -# wep_key1=0102030405 3.650 -# wep_key2="1234567890123" 3.651 -# wep_tx_keyidx=0 3.652 -# priority=5 3.653 -#} 3.654 - 3.655 - 3.656 -# Shared WEP key connection (no WPA, no IEEE 802.1X) using Shared Key 3.657 -# IEEE 802.11 authentication 3.658 -#network={ 3.659 -# ssid="static-wep-test2" 3.660 -# key_mgmt=NONE 3.661 -# wep_key0="abcde" 3.662 -# wep_key1=0102030405 3.663 -# wep_key2="1234567890123" 3.664 -# wep_tx_keyidx=0 3.665 -# priority=5 3.666 -# auth_alg=SHARED 3.667 -#} 3.668 - 3.669 - 3.670 -# IBSS/ad-hoc network with WPA-None/TKIP. 3.671 -#network={ 3.672 -# ssid="test adhoc" 3.673 -# mode=1 3.674 -# frequency=2412 3.675 -# proto=WPA 3.676 -# key_mgmt=WPA-NONE 3.677 -# pairwise=NONE 3.678 -# group=TKIP 3.679 -# psk="secret passphrase" 3.680 -#} 3.681 - 3.682 - 3.683 -# Catch all example that allows more or less all configuration modes 3.684 -#network={ 3.685 -# ssid="example" 3.686 -# scan_ssid=1 3.687 -# key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE 3.688 -# pairwise=CCMP TKIP 3.689 -# group=CCMP TKIP WEP104 WEP40 3.690 -# psk="very secret passphrase" 3.691 -# eap=TTLS PEAP TLS 3.692 -# identity="user@example.com" 3.693 -# password="foobar" 3.694 -# ca_cert="/etc/cert/ca.pem" 3.695 -# client_cert="/etc/cert/user.pem" 3.696 -# private_key="/etc/cert/user.prv" 3.697 -# private_key_passwd="password" 3.698 -# phase1="peaplabel=0" 3.699 -#} 3.700 - 3.701 -# Example of EAP-TLS with smartcard (openssl engine) 3.702 -#network={ 3.703 -# ssid="example" 3.704 -# key_mgmt=WPA-EAP 3.705 -# eap=TLS 3.706 -# proto=RSN 3.707 -# pairwise=CCMP TKIP 3.708 -# group=CCMP TKIP 3.709 -# identity="user@example.com" 3.710 -# ca_cert="/etc/cert/ca.pem" 3.711 -# client_cert="/etc/cert/user.pem" 3.712 -# 3.713 -# engine=1 3.714 - 3.715 - # The engine configured here must be available. Look at 3.716 - # OpenSSL engine support in the global section. 3.717 - # The key available through the engine must be the private key 3.718 - # matching the client certificate configured above. 3.719 - 3.720 - # use the opensc engine 3.721 - #engine_id="opensc" 3.722 - #key_id="45" 3.723 - 3.724 - # use the pkcs11 engine 3.725 -# engine_id="pkcs11" 3.726 -# key_id="id_45" 3.727 -# 3.728 - # Optional PIN configuration; this can be left out and PIN will be 3.729 - # asked through the control interface 3.730 -# pin="1234" 3.731 -#} 3.732 - 3.733 -# Example configuration showing how to use an inlined blob as a CA certificate 3.734 -# data instead of using external file 3.735 -#network={ 3.736 -# ssid="example" 3.737 -# key_mgmt=WPA-EAP 3.738 -# eap=TTLS 3.739 -# identity="user@example.com" 3.740 -# anonymous_identity="anonymous@example.com" 3.741 -# password="foobar" 3.742 -# ca_cert="blob://exampleblob" 3.743 -# priority=20 3.744 -#} 3.745 - 3.746 -#blob-base64-exampleblob={ 3.747 -#SGVsbG8gV29ybGQhCg== 3.748 -#} 3.749 - 3.750 - 3.751 -# Wildcard match for SSID (plaintext APs only). This example select any 3.752 -# open AP regardless of its SSID. 3.753 -network={ 3.754 - key_mgmt=NONE 3.755 -} 3.756 - 3.757 -
4.1 --- a/firefox/rootfs/usr/share/applications/system-doc.desktop Tue May 31 00:45:49 2011 +0200 4.2 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 4.3 @@ -1,8 +0,0 @@ 4.4 -[Desktop Entry] 4.5 -Name=System Doc 4.6 -Name[fr]=Doc du système 4.7 -Name[pt]=Documentação do Sistema 4.8 -Exec=browser file:///usr/share/doc/slitaz/index.html 4.9 -Icon=slitaz-doc.png 4.10 -Type=Application 4.11 -Categories=Documentation;