wpa_supplicant testing

Ambedkar R ambedkar_r
Wed Dec 27 06:18:23 PST 2006

Hi Bhuvan,
  1.To Develop test case:You should read the specifications such as design spec,functional spec or implementation spec which released to setup the test scenario.You ask your developer for those specs,without spec reading specs you can't understand its functionality and other stuff.
  2.To make conf files:There are many types which you can use it for your Station(Client) configuration,(1)Plain-text(2)Static WEP (3)WPA/WPA2 PSK (4)IEEE802.1X with Dynamic WEP keys (5) WPA/WPA2 Enterprise.
       Item number (4) and (5) which will use External/Internal authetication server.Internal authentication server means,server will be integarted on the AP.
      External server means,we have to use the FreeRADIUS or whichever available in the market.
  3.Sample conf:
   key_mgmt is for plain-text "NONE",WPA-PSK "WPA-PSK" and WPA Enterprise "WPA-EAP"
   "wep_key0" and "wep_key1",you can configure different keys for stations access,For example in CISCO AP,DEVICESCAPE AP and Broadcom AP you can configure 4 different wep keys.
    "wep_keyidx=0",if you configure in station the first key(wep_key0) will be used to associate with AP.
  4.Example conf,

bhuvan.kumarmital at wipro.com wrote:

I am doing a project which deals with porting the wpa_supplicant code to
nucleus RTOS. Our job is to develop test scenarios to test the
authentication procedure and the ported supplicant code. Can anyone
provide me some inputs on how to proceed with this testing? I am new to
WLAN world however I'm aware of the WLAN terminology and technology by

Please guide me on the following:
1. Developing Test Cases
2. How exactly do I make permutations and combinations for making more
.config files (wpa_supplicant configuration file)?
3. There are some sample configurations available. I am not able to
understand what the various parameters
(key_mgmt,wep_key0,wep_key1,wep_tx_keyidx etc..) mean. Is there any
documentation which can help me?
4. Does wpa_supplicant support ad-hoc mode operations and if yes what is
the limit to the maximum no. of devices which can be present in an
ad-hoc scenario?


Bhuvan Mital

The information contained in this electronic message and any attachments to this message are intended for the exclusive use of the addressee(s) and may contain proprietary, confidential or privileged information. If you are not the intended recipient, you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately and destroy all copies of this message and any attachments. 

WARNING: Computer viruses can be transmitted via email. The recipient should check this email and any attachments for the presence of viruses. The company accepts no liability for any damage caused by any virus transmitted by this email.

HostAP mailing list
HostAP at shmoo.com

Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.shmoo.com/pipermail/hostap/attachments/20061227/6c0a8434/attachment.htm 

More information about the Hostap mailing list