plan9fox/sys/man/8/wpa

70 lines
1.3 KiB
Text
Raw Normal View History

2013-03-09 18:18:00 +00:00
.TH WPA 8
.SH NAME
wpa \- Wi-Fi Protected Access setup
.SH SYNOPSIS
.B aux/wpa
[
2013-03-24 01:30:11 +00:00
.B -dp12
2013-03-09 18:18:00 +00:00
] [
.B -s
.I essid
]
.I dev
.SH DESCRIPTION
.I Wpa
2013-03-10 23:25:01 +00:00
handles the authentication and key exchange with WPA
2013-03-09 18:18:00 +00:00
protected wireless networks.
.PP
The
.I dev
parameter specifies the network interface that needs
to be setup with WPA.
The
.I essid
can be set with the
.I -s
option. Otherwise, the previously configured essid
on the interface will be used.
The
.B -p
option will prompt and install the preshared key into
.IR factotum (4),
otherwise the key has to be already present in
2013-03-10 23:25:01 +00:00
factotum or an interactive key prompter like
2013-03-09 18:18:00 +00:00
.IR fgui (4)
needs to provide it.
.PP
The authentification protocol is initiated by the
wireless access point so
.I wpa
will background itself after the keyprompt and establish
the encryption automatically as needed.
2013-03-24 01:30:11 +00:00
The optional
.B -1
or
.B -2
arguments can be used to select between WPA1/TKIP
(default) or WPA2/CCMP encryption.
2013-03-09 18:18:00 +00:00
.PP
The
.B -d
2013-03-10 23:25:01 +00:00
option enables debugging and causes
2013-03-09 18:18:00 +00:00
.I wpa
2013-03-10 23:25:01 +00:00
to stay in foreground writing protocol messages to
2013-03-09 18:18:00 +00:00
standard error.
.SH EXAMPLES
Setup wireless encryption:
.EX
% bind -a '#l1' /net
% aux/wpa -s 9HAL -p /net/ether1
!Adding key: proto=wpapsk essid=9HAL
password: *****
!
% ip/ipconfig ether /net/ether1
.EE
.SH SOURCE
.B /sys/src/cmd/aux/wpa.c
.SH SEE ALSO
.IR factotum (4),
.IR ipconfig (8)