3
0
mirror of https://git.kernel.org/pub/scm/network/wireless/iwd.git synced 2024-12-04 19:09:24 +01:00
iwd/autotests/testFT-FILS-SHA384/ft-eap-ccmp-1.conf

43 lines
1.2 KiB
Plaintext
Raw Normal View History

2019-05-23 00:24:05 +02:00
hw_mode=g
channel=1
ssid=TestFT
utf8_ssid=1
ctrl_interface=/var/run/hostapd
r1_key_holder=000000000001
nas_identifier=dummy1
wpa=2
# Can support WPA-EAP and FT-EAP (space separated list) at the same
# time but we want to force FT
wpa_key_mgmt=FT-EAP FILS-SHA384 FT-FILS-SHA384
wpa_pairwise=CCMP
ieee8021x=1
2019-05-23 00:24:05 +02:00
fils_realm=example.com
2019-05-23 00:24:05 +02:00
wpa_ptk_rekey=30
wpa_group_rekey=80
ieee80211w=1
rsn_preauth=1
disable_pmksa_caching=1
# Allow PMK cache to be shared opportunistically among configured interfaces
# and BSSes (i.e., all configurations within a single hostapd process).
okc=1
mobility_domain=1234
reassociation_deadline=60000
r0kh=12:00:00:00:00:01 nas1.w1.fi 000102030405060708090a0b0c0d0e0f
r0kh=12:00:00:00:00:02 nas2.w1.fi 000102030405060708090a0b0c0d0e0f
r1kh=12:00:00:00:00:01 00:00:00:00:00:01 000102030405060708090a0b0c0d0e0f
r1kh=12:00:00:00:00:02 00:00:00:00:00:02 000102030405060708090a0b0c0d0e0f
# Push mode only needed for 8021x, not PSK mode since msk already known
pmk_r1_push=1
ft_over_ds=0
ap_table_expiration_time=36000
ap_table_max_size=10
rrm_neighbor_report=1
auth_server_addr=127.0.0.1
auth_server_port=1812
auth_server_shared_secret=secret
nas_identifier=nas1.w1.fi