eapol_test man page on Archlinux

Man page or keyword search:  
man Server   11224 pages
apropos Keyword Search (all sections)
Output format
Archlinux logo
[printable version]


       eapol_test - EAP peer and RADIUS client testing

       eapol_test  [  -nWS  ]  [  -cconfig  file  ]  [ -aserver IP address ] [
       -Aclient IP address ] [ -pUDP port ] [ -sshared secret ] [ -rre-authen‐
       tications ] [ -ttimeout ] [ -CConnect-Info ] [ -MMAC address ] [ -ofile
       ] [ -Nattr spec ]

       eapol_test scard

       eapol_test sim [ PIN ] [ num triplets ]

       eapol_test is a program that links together the same EAP peer implemen‐
       tation  that  wpa_supplicant  is	 using	and  the RADIUS authentication
       client code from hostapd. In addition, it has minimal glue code to com‐
       bine  these two components in similar ways to IEEE 802.1X/EAPOL Authen‐
       ticator state machines. In  other  words,  it  integrates  IEEE	802.1X
       Authenticator  (normally,  an  access point) and IEEE 802.1X Supplicant
       (normally, a wireless client) together to  generate  a  single  program
       that  can be used to test EAP methods without having to setup an access
       point and a wireless client.

       The main uses for eapol_test are in  interoperability  testing  of  EAP
       methods	against	 RADIUS servers and in development testing for new EAP
       methods. It can be easily used to automate EAP testing  for  interoper‐
       ability	and regression since the program can be run from shell scripts
       without require additional test components apart from a RADIUS  server.
       For  example,  the automated EAP tests described in eap_testing.txt are
       implemented with eapol_test. Similarly, eapol_test  could  be  used  to
       implement  an  automated regression test suite for a RADIUS authentica‐
       tion server.

       As an example:

	      eapol_test -ctest.conf -a127.0.0.1 -p1812 -ssecret -r1

       tries to complete EAP authentication based on the network configuration
       from  test.conf	against the RADIUS server running on the local host. A
       re-authentication is triggered to test fast re-authentication. The con‐
       figuration  file uses the same format for network blocks as wpa_suppli‐

       -c configuration file path
	      A configuration to use.  The configuration should use  the  same
	      format for network blocks as wpa_supplicant.

       -a AS address
	      IP  address  of  the  authentication  server.   The  default  is

       -A client address
	      IP address of the client.	 The default is to select  an  address

       -p AS port
	      UDP port of the authentication server. The default is '1812'.

       -s AS secret
	      Shared  secret  with  the authentication server.	The default is

       -r count
	      Number of reauthentications.

       -t timeout
	      Timeout in seconds. The default is 30.

       -C info
	      RADIUS Connect-Info.  The default is 'CONNECT 11Mbps 802.11b'.

       -M mac address
	      Client  MAC  address  (Calling-Station-Id).   The	  default   is

       -o file
	      Location to write out server certificate.

       -N attr spec
	      Send  arbitrary  attribute  specific by attr_id:syntax:value, or
	      attr_id  alone.	attr_id	 should	 be  the  numeric  ID  of  the
	      attribute,  and syntax should be one of 's' (string), 'd' (inte‐
	      ger), or 'x' (octet string). The value is the attribute value to
	      send.   When  attr_id  is	 given	alone,	NULL  is  used	as the
	      attribute value.	Multiple attributes can be specified by	 using
	      the option several times.

       -n     Indicates that no MPPE keys are expected.

       -W     Wait for a control interface monitor before starting.

       -S     Save configuration after authentication.


       wpa_supplicant  is copyright (c) 2003-2014, Jouni Malinen <j@w1.fi> and
       contributors.  All Rights Reserved.

       This program is licensed under the BSD license (the one with advertise‐
       ment clause removed).

			       04 February 2014			 EAPOL_TEST(8)

List of man pages available for Archlinux

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
Vote for polarhome
Free Shell Accounts :: the biggest list on the net