1/* 2 * Copyright (c) 2005 Sam Leffler <sam@errno.com> 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 24 * SUCH DAMAGE. 25 */ 26 27comment = "IEEE Std 802.11 WPA Supplicant" 28 29desc = <<EOD 30The IEEE 802.11 standard for wireless networking, sometimes called Wi-Fi, 31defines several security protocols to provide security in wireless networks, 32the most common of which is Wi-Fi Protected Access (WPA). 33 34The wpa_supplicant utility is an implementation of the WPA Supplicant 35component, i.e., the part that runs in the client stations. It implements 36WPA key negotiation with a WPA Authenticator and EAP authentication with an 37Authentication Server. In addition, wpa_supplicant controls the roaming and 38IEEE 802.11 authentication/association support of the wlan(4) module and can 39be used to configure static WEP keys based on identified networks. 40 41The wpa_supplicant utility is designed to be a "daemon" program that 42runs in the background and acts as the backend component controlling 43the wireless connection. It supports separate frontend programs such 44as the text-based wpa_cli(8) program. 45EOD 46 47annotations { 48 set = minimal 49} 50