aboutsummaryrefslogtreecommitdiffstats
path: root/wpa_supplicant/doc/docbook/eapol_test.sgml
blob: 25cfd0688e029ef2de4053b79cc0a735cc05b351 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
<!doctype refentry PUBLIC "-//OASIS//DTD DocBook V4.1//EN">

<refentry>
  <refmeta>
    <refentrytitle>eapol_test</refentrytitle>
    <manvolnum>8</manvolnum>
  </refmeta>
  <refnamediv>
    <refname>eapol_test</refname>

    <refpurpose>EAP peer and RADIUS client testing</refpurpose>
  </refnamediv>

  <refsynopsisdiv>
    <cmdsynopsis>
      <command>eapol_test</command>
      <arg>-nWS</arg>
      <arg>-c<replaceable>config file</replaceable></arg>
      <arg>-a<replaceable>server IP address</replaceable></arg>
      <arg>-A<replaceable>client IP address</replaceable></arg>
      <arg>-p<replaceable>UDP port</replaceable></arg>
      <arg>-s<replaceable>shared secret</replaceable></arg>
      <arg>-r<replaceable>re-authentications</replaceable></arg>
      <arg>-t<replaceable>timeout</replaceable></arg>
      <arg>-C<replaceable>Connect-Info</replaceable></arg>
      <arg>-M<replaceable>MAC address</replaceable></arg>
      <arg>-o<replaceable>file</replaceable></arg>
      <arg>-N<replaceable>attr spec</replaceable></arg>
    </cmdsynopsis>
    <cmdsynopsis>
      <command>eapol_test scard</command>
    </cmdsynopsis>
    <cmdsynopsis>
      <command>eapol_test sim</command>
      <arg>PIN</arg>
      <arg>num triplets</arg>
    </cmdsynopsis>
  </refsynopsisdiv>

  <refsect1>
    <title>Overview</title>

    <para>eapol_test is a program that links together the same EAP
    peer implementation that wpa_supplicant is using and the RADIUS
    authentication client code from hostapd. In addition, it has
    minimal glue code to combine these two components in similar
    ways to IEEE 802.1X/EAPOL Authenticator state machines. In other
    words, it integrates IEEE 802.1X Authenticator (normally, an
    access point) and IEEE 802.1X Supplicant (normally, a wireless
    client) together to generate a single program that can be used to
    test EAP methods without having to setup an access point and a
    wireless client.</para>

    <para>The main uses for eapol_test are in interoperability testing
    of EAP methods against RADIUS servers and in development testing
    for new EAP methods. It can be easily used to automate EAP testing
    for interoperability and regression since the program can be run
    from shell scripts without require additional test components apart
    from a RADIUS server. For example, the automated EAP tests described
    in eap_testing.txt are implemented with eapol_test. Similarly,
    eapol_test could be used to implement an automated regression
    test suite for a RADIUS authentication server.</para>


    <para>As an example:</para>

<blockquote><programlisting>
eapol_test -ctest.conf -a127.0.0.1 -p1812 -ssecret -r1
</programlisting></blockquote>

    <para>tries to complete EAP authentication based on the network
    configuration from test.conf against the RADIUS server running
    on the local host. A re-authentication is triggered to test fast
    re-authentication. The configuration file uses the same format for
    network blocks as wpa_supplicant.</para>

  </refsect1>
  <refsect1>
    <title>Command Arguments</title>
    <variablelist>
      <varlistentry>
	<term>-c configuration file path</term>

	<listitem><para>A configuration to use.  The configuration should
	use the same format for network blocks as wpa_supplicant.
	</para></listitem>
      </varlistentry>

      <varlistentry>
	<term>-a AS address</term>

	<listitem><para>IP address of the authentication server.  The
	default is '127.0.0.1'.</para></listitem>
      </varlistentry>

      <varlistentry>
	<term>-A client address</term>

	<listitem><para>IP address of the client.  The default is to
	select an address automatically.</para></listitem>
      </varlistentry>

      <varlistentry>
	<term>-p AS port</term>

	<listitem><para>UDP port of the authentication server. The
	default is '1812'.</para></listitem>
      </varlistentry>

      <varlistentry>
	<term>-s AS secret</term>

	<listitem><para>Shared secret with the authentication server.
	The default is 'radius'.</para></listitem>
      </varlistentry>

      <varlistentry>
	<term>-r count</term>

	<listitem><para>Number of reauthentications.</para></listitem>
      </varlistentry>

      <varlistentry>
	<term>-t timeout</term>

	<listitem><para>Timeout in seconds. The default is 30.</para></listitem>
      </varlistentry>

      <varlistentry>
	<term>-C info</term>

	<listitem><para>RADIUS Connect-Info.  The default is
	'CONNECT 11Mbps 802.11b'.</para></listitem>
      </varlistentry>


      <varlistentry>
	<term>-M mac address</term>

	<listitem><para>Client MAC address (Calling-Station-Id).  The
	default is '02:00:00:00:00:01'.</para></listitem>
      </varlistentry>

      <varlistentry>
	<term>-o file</term>

	<listitem><para>Location to write out server certificate.
	</para></listitem>
      </varlistentry>

      <varlistentry>
	<term>-N attr spec</term>

	<listitem><para>Send arbitrary attribute specific by
	attr_id:syntax:value, or attr_id alone.  attr_id should be the numeric
	ID of the attribute, and syntax should be one of 's' (string),
	'd' (integer), or 'x' (octet string). The value is the attribute value
	to send.  When attr_id is given alone, NULL is used as the attribute
	value.  Multiple attributes can be specified by using the option
	several times.</para></listitem>
      </varlistentry>

      <varlistentry>
	<term>-n</term>

	<listitem><para>Indicates that no MPPE keys are expected.
	</para></listitem>
      </varlistentry>

      <varlistentry>
	<term>-W</term>

	<listitem><para>Wait for a control interface monitor before starting.
	</para></listitem>
      </varlistentry>

      <varlistentry>
	<term>-S</term>

	<listitem><para>Save configuration after authentication.
	</para></listitem>
      </varlistentry>

    </variablelist>
  </refsect1>
  <refsect1>
    <title>See Also</title>
    <para>
      <citerefentry>
	<refentrytitle>wpa_supplicant</refentrytitle>
	<manvolnum>8</manvolnum>
      </citerefentry>
    </para>
  </refsect1>
  <refsect1>
    <title>Legal</title>
    <para>wpa_supplicant is copyright (c) 2003-2017,
    Jouni Malinen <email>j@w1.fi</email> and
    contributors.
    All Rights Reserved.</para>

    <para>This program is licensed under the BSD license (the one with
    advertisement clause removed).</para>
  </refsect1>
</refentry>