plan9fox/sys/man/8/wpa

73 lines
1.4 KiB
Plaintext
Raw Normal View History

2013-03-09 18:18:00 +00:00
.TH WPA 8
.SH NAME
wpa \- Wi-Fi Protected Access setup
.SH SYNOPSIS
.B aux/wpa
[
2013-03-24 01:30:11 +00:00
.B -dp12
2013-03-09 18:18:00 +00:00
] [
.B -s
.I essid
]
.I dev
.SH DESCRIPTION
.I Wpa
2013-03-10 23:25:01 +00:00
handles the authentication and key exchange with WPA
2013-03-09 18:18:00 +00:00
protected wireless networks.
.PP
The
.I dev
parameter specifies the network interface that needs
to be setup with WPA.
The
.I essid
can be set with the
.I -s
option. Otherwise, the previously configured essid
on the interface will be used.
The
.B -p
option will prompt and install the preshared key or
2016-01-12 07:43:36 +00:00
pap/chap credentials into factotum, otherwise the key has to be
already present in factotum or an interactive key prompter like
auth/fgui (see
.IR factotum (4))
2013-03-09 18:18:00 +00:00
needs to provide it.
.PP
The authentication protocol is initiated by the
2013-03-09 18:18:00 +00:00
wireless access point so
.I wpa
will background itself after the keyprompt and establish
the encryption automatically as needed.
2013-03-24 01:30:11 +00:00
The optional
.B -1
or
.B -2
arguments can be used to select between WPA1/TKIP
(default) or WPA2/CCMP encryption with WPA PSK.
2013-03-09 18:18:00 +00:00
.PP
The
.B -d
2013-03-10 23:25:01 +00:00
option enables debugging and causes
2013-03-09 18:18:00 +00:00
.I wpa
2013-03-10 23:25:01 +00:00
to stay in foreground writing protocol messages to
2013-03-09 18:18:00 +00:00
standard error.
.SH EXAMPLES
Setup wireless encryption:
.EX
% bind -a '#l1' /net
% aux/wpa -s 9HAL -p /net/ether1
!Adding key: proto=wpapsk essid=9HAL
password: *****
!
% ip/ipconfig ether /net/ether1
.EE
.SH SOURCE
.B /sys/src/cmd/aux/wpa.c
.SH SEE ALSO
.IR factotum (4),
.IR ipconfig (8)
2013-12-27 21:22:05 +00:00
.SH HISTORY
.I Wpa
first appeared in 9front (March, 2013).