Provided by: eapoltest_2.10-21ubuntu0.1_amd64 bug

NAME

       eapol_test - EAP peer and RADIUS client testing

SYNOPSIS

       eapol_test  [  -nWS  ] [ -cconfig file ] [ -aserver IP address ] [ -Aclient IP address ] [ -pUDP port ] [
       -sshared secret ] [ -rre-authentications ] [ -ttimeout ] [ -CConnect-Info ] [ -MMAC address ] [ -ofile  ]
       [ -Nattr spec ]

       eapol_test scard

       eapol_test sim [ PIN ] [ num triplets ]

OVERVIEW

       eapol_test is a program that links together the same EAP peer implementation that wpa_supplicant is using
       and the RADIUS authentication client code from hostapd. In addition, it has minimal glue code to  combine
       these  two  components in similar ways to IEEE 802.1X/EAPOL Authenticator state machines. In other words,
       it integrates IEEE 802.1X Authenticator (normally, an access point) and IEEE 802.1X Supplicant (normally,
       a  wireless  client)  together  to generate a single program that can be used to test EAP methods without
       having to setup an access point and a wireless client.

       The main uses for eapol_test are in interoperability testing of EAP methods against RADIUS servers and in
       development  testing  for  new  EAP  methods.  It  can  be  easily  used  to  automate  EAP  testing  for
       interoperability and regression since  the  program  can  be  run  from  shell  scripts  without  require
       additional  test components apart from a RADIUS server. For example, the automated EAP tests described in
       eap_testing.txt are implemented with eapol_test. Similarly, eapol_test could  be  used  to  implement  an
       automated regression test suite for a RADIUS authentication server.

       As an example:

              eapol_test -ctest.conf -a127.0.0.1 -p1812 -ssecret -r1

       tries to complete EAP authentication based on the network configuration from test.conf against the RADIUS
       server running on the local host. A re-authentication is triggered to test  fast  re-authentication.  The
       configuration file uses the same format for network blocks as wpa_supplicant.

COMMAND ARGUMENTS

       -c configuration file path
              A  configuration  to  use.   The  configuration  should  use the same format for network blocks as
              wpa_supplicant.

       -a AS address
              IP address of the authentication server.  The default is '127.0.0.1'.

       -A client address
              IP address of the client.  The default is to select an address automatically.

       -p AS port
              UDP port of the authentication server. The default is '1812'.

       -s AS secret
              Shared secret with the authentication server.  The default is 'radius'.

       -r count
              Number of reauthentications.

       -t timeout
              Timeout in seconds. The default is 30.

       -C info
              RADIUS Connect-Info.  The default is 'CONNECT 11Mbps 802.11b'.

       -M mac address
              Client MAC address (Calling-Station-Id).  The default is '02:00:00:00:00:01'.

       -o file
              Location to write out server certificate.

       -N attr spec
              Send arbitrary attribute specific by attr_id:syntax:value, or attr_id alone.   attr_id  should  be
              the  numeric  ID of the attribute, and syntax should be one of 's' (string), 'd' (integer), or 'x'
              (octet string). The value is the attribute value to send.  When attr_id is given  alone,  NULL  is
              used  as  the  attribute  value.  Multiple attributes can be specified by using the option several
              times.

       -n     Indicates that no MPPE keys are expected.

       -W     Wait for a control interface monitor before starting.

       -S     Save configuration after authentication.

SEE ALSO

       wpa_supplicant(8)

LEGAL

       wpa_supplicant is copyright  (c)  2003-2022,  Jouni  Malinen  <j@w1.fi>  and  contributors.   All  Rights
       Reserved.

       This program is licensed under the BSD license (the one with advertisement clause removed).

                                                 07 August 2019                                    EAPOL_TEST(8)