mirror of
https://git.kernel.org/pub/scm/network/wireless/iwd.git
synced 2024-12-22 21:22:37 +01:00
1f044b8f45
Any autotest which rekeys will do so explicitly. There is no need to potentially introduce an unexpected rekey.
34 lines
801 B
Plaintext
34 lines
801 B
Plaintext
hw_mode=g
|
|
channel=1
|
|
ssid=TestPreauth
|
|
utf8_ssid=1
|
|
|
|
wpa=2
|
|
wpa_key_mgmt=WPA-EAP
|
|
wpa_pairwise=CCMP
|
|
ieee8021x=1
|
|
ieee80211w=1
|
|
|
|
# Run the RADIUS server in the BSS 0 hostapd only, listen for BSS 1 connections
|
|
eap_server=1
|
|
eap_user_file=/tmp/secrets/eap-user.text
|
|
ca_cert=/tmp/certs/cert-ca.pem
|
|
server_cert=/tmp/certs/cert-server.pem
|
|
private_key=/tmp/certs/cert-server-key.pem
|
|
server_id=testeap
|
|
radius_server_clients=/tmp/certs/radius-clients.text
|
|
radius_server_auth_port=1812
|
|
nas_identifier=testeap1
|
|
|
|
rsn_preauth=1
|
|
rsn_preauth_interfaces=$iface0 $iface1
|
|
disable_pmksa_caching=0
|
|
|
|
# Allow PMK cache to be shared opportunistically among configured interfaces
|
|
# and BSSes (i.e., all configurations within a single hostapd process).
|
|
okc=1
|
|
|
|
ap_table_expiration_time=36000
|
|
ap_table_max_size=10
|
|
rrm_neighbor_report=1
|