is an implementation of the WPA Supplicant component,
i.e., the part that runs in the client stations.
It implements WPA key negotiation with a WPA Authenticator
and EAP authentication with an Authentication Server.
controls the roaming and IEEE 802.11
authentication/association support of the
module and can be used to configure static WEP keys
based on identified networks.
is designed to be a
program that runs in the
background and acts as the backend component controlling
the wireless connection.
It supports separate frontend programs such as the
The following arguments must be specified on the command line:
| -i ifname
Use the specified wireless interface.
| -c config-file
Use the settings in the specified configuration file when managing
the wireless interface.
for a description of the configuration file syntax and contents.
Changes to the configuration file can be reloaded by sending a
process or with the