2018-09-19 20:30:37 +02:00
|
|
|
hw_mode=g
|
|
|
|
channel=1
|
|
|
|
ssid=TestFT
|
|
|
|
utf8_ssid=1
|
|
|
|
ctrl_interface=/var/run/hostapd
|
|
|
|
|
|
|
|
r1_key_holder=120000000003
|
|
|
|
nas_identifier=dummy3
|
|
|
|
|
|
|
|
wpa=2
|
|
|
|
# Can support WPA-PSK and FT-PSK (space separated list) and/or EAP at the same
|
|
|
|
# time but we want to force FT
|
|
|
|
wpa_key_mgmt=FT-PSK
|
|
|
|
wpa_pairwise=CCMP
|
|
|
|
wpa_passphrase=EasilyGuessedPassword
|
|
|
|
wpa_ptk_rekey=30
|
|
|
|
wpa_group_rekey=80
|
2019-03-22 17:23:12 +01:00
|
|
|
ieee80211w=2
|
2018-09-19 20:30:37 +02:00
|
|
|
disable_pmksa_caching=0
|
|
|
|
# Allow PMK cache to be shared opportunistically among configured interfaces
|
|
|
|
# and BSSes (i.e., all configurations within a single hostapd process).
|
|
|
|
okc=1
|
|
|
|
mobility_domain=1234
|
|
|
|
reassociation_deadline=60000
|
|
|
|
r0kh=12:00:00:00:00:01 dummy1 000102030405060708090a0b0c0d0e0f
|
|
|
|
r0kh=12:00:00:00:00:02 dummy2 000102030405060708090a0b0c0d0e0f
|
|
|
|
r0kh=12:00:00:00:00:03 dummy3 000102030405060708090a0b0c0d0e0f
|
|
|
|
r1kh=12:00:00:00:00:01 12:00:00:00:00:01 000102030405060708090a0b0c0d0e0f
|
|
|
|
r1kh=12:00:00:00:00:02 12:00:00:00:00:02 000102030405060708090a0b0c0d0e0f
|
|
|
|
r1kh=12:00:00:00:00:03 12:00:00:00:00:03 000102030405060708090a0b0c0d0e0f
|
|
|
|
# Push mode only needed for 8021x, not PSK mode since msk already known
|
|
|
|
pmk_r1_push=0
|
|
|
|
# Allow locally generated FT response so we don't have to configure push/pull
|
|
|
|
# between BSSes running as separate hostapd processes as in the test-runner
|
|
|
|
# case. Only works with FT-PSK, otherwise brctl needs to be installed and
|
|
|
|
# CONFIG_BRIDGE enabled in the kernel.
|
|
|
|
#ft_psk_generate_local=1
|
2019-05-09 19:14:14 +02:00
|
|
|
ft_over_ds=0
|
2018-09-19 20:30:37 +02:00
|
|
|
ap_table_expiration_time=36000
|
|
|
|
ap_table_max_size=10
|
|
|
|
rrm_neighbor_report=1
|