# Don't worry, all of the info in here is fake, modified from my original that I actually use every day. ;)

# allow frontend (e.g., wpa_cli) to be used by all users in 'wheel' group
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=root
#ctrl_interface_group=wheel
#
# home network; allow all valid ciphers
#ap_scan=1
# ap_scn of 2 is best for hidden SSIDs
ap_scan=2
network={
        ssid="wlan1"
        key_mgmt=WPA-PSK
        #scan_ssid=1
        psk=2d92e9ac0933efa9eeba340fac5061b0a99e5dc9bafe2fc9f5e6
       proto=WPA
       pairwise=TKIP
        group=TKIP
}

#

network={
        ssid="wlan2"
        key_mgmt=WPA-PSK
        scan_ssid=1
        psk=5d96149d830aef9c8d43951de6a1070b225cf70e91ef166a41d220
        proto=WPA
        pairwise=TKIP
        group=TKIP
}

network={
  ssid="corp"
  scan_ssid=1
  key_mgmt=WPA-EAP
  eap=PEAP
  #identity="jpavlov"
  #password="xxxxxxxx"
  identity="jpavlov@ldmi.com"
  password="xxxxxxxx"
  #identity="bbob"
  #password="xxxxxxxx"
  pairwise=TKIP
  phase1="peaplabel=0"
  group=TKIP
  proto=WPA
}

#
# work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
#network={
#        ssid="jpTestG"
#        scan_ssid=0
#        key_mgmt=WPA-EAP
#        #pairwise=CCMP TKIP
#        pairwise=TKIP
#        #group=CCMP TKIP
#        group=TKIP
#        eap=PEAP
#        #eap=TLS
#       #auth_alg=OPEN
#        identity="user1"
#       #password="9dea9384715f4d3169aa59026d96c0102dae0f4ff14c6"
#       password="supersecret"
#       phase1="peaplabel=1"
#       phase2="auth=MSCHAPV2"
#        #ca_cert="/etc/cert/ca.pem"
#        #client_cert="/etc/cert/user.pem"
#        #private_key="/etc/cert/user.prv"
#        #private_key_passwd="password"
#}