1 .\" Copyright (c) 2005 Sam Leffler <sam@errno.com>
2 .\" All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
13 .\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
14 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
15 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
16 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
17 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
18 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
19 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
20 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
21 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
22 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25 .\" $FreeBSD: src/usr.sbin/wpa/wpa_supplicant/wpa_supplicant.8,v 1.2 2005/06/27 06:40:43 ru Exp $
26 .\" $DragonFly: src/usr.sbin/802_11/wpa_supplicant/wpa_supplicant.8,v 1.6 2007/09/16 18:52:17 swildner Exp $
33 .Nd "WPA/802.11i Supplicant for wireless network devices"
39 .Op Fl N i Ar ifname Fl c Ar config-file ...
44 is an implementation of the WPA Supplicant component,
45 i.e., the part that runs in the client stations.
46 It implements WPA key negotiation with a WPA Authenticator
47 and EAP authentication with an Authentication Server.
50 controls the roaming and IEEE 802.11
51 authentication/association support of the
53 module and can be used to configure static WEP keys
54 based on identified networks.
61 program that runs in the
62 background and acts as the backend component controlling
63 the wireless connection.
64 It supports separate frontend programs such as the
69 The following arguments must be specified on the command line:
70 .Bl -tag -width indent
72 Use the specified wireless interface.
73 .It Fl c Ar config-file
74 Use the settings in the specified configuration file when managing
75 the wireless interface.
77 .Xr wpa_supplicant.conf 5
78 for a description of the configuration file syntax and contents.
80 Changes to the configuration file can be reloaded by sending a
87 .Dq Li "wpa_cli reconfigure" .
90 The following options are available:
91 .Bl -tag -width indent
93 Enable debugging messages.
94 If this option is supplied twice, more verbose messages are displayed.
96 Use an external IEEE 802.1X Supplicant program and disable the
98 This option is not normally used.
102 Decrease debugging verbosity (i.e., counteract the use of the
106 Display version information on the terminal and exit.
108 If the specified interface is not present, wait for it to be
109 added; e.g.\& a cardbus device to be inserted.
110 This option is not normally used.
112 Detach from the controlling terminal and run as a daemon process
115 Include key information in debugging output.
117 Display the license for this program on the terminal and exit.
118 .It Fl N i Ar ifname Fl c Ar config-file ...
119 Specify an additional interface and configuration file.
120 If multiple interfaces are specified then
122 will manage them all with a single process.
135 .Xr wpa_supplicant.conf 5 ,
141 utility first appeared in
146 utility was written by
147 .An Jouni Malinen Aq jkmaline@cc.hut.fi .
148 This manual page is derived from the