zephyr/samples/net/wifi
Rex Chen 193023b075 net: wifi: shell: update enterprise mode certificate files
Update enterprise mode certificate files to support phase1 and
phase2.

Signed-off-by: Rex Chen <rex.chen_1@nxp.com>
2024-10-17 09:46:02 +02:00
..
boards net: wifi: shell: add enterprise support for station 2024-10-17 09:46:02 +02:00
socs samples: wifi: ESP32-S2 sample configuration 2024-09-21 11:29:53 +02:00
src
test_certs net: wifi: shell: update enterprise mode certificate files 2024-10-17 09:46:02 +02:00
CMakeLists.txt
README.rst
overlay-enterprise-variable-bufs.conf samples: wifi: Add overlays for Enterprise mode 2024-10-15 13:53:30 +02:00
overlay-enterprise.conf samples: wifi: Add overlays for Enterprise mode 2024-10-15 13:53:30 +02:00
prj.conf samples: net: wifi: Fix stack sizes 2024-08-06 10:27:21 +02:00
sample.yaml samples: net: wifi: Enable nRF70 Util in nRF70 build 2024-10-17 09:45:34 +02:00

README.rst

.. zephyr:code-sample:: wifi-shell
   :name: Wi-Fi shell
   :relevant-api: net_stats

   Test Wi-Fi functionality using the Wi-Fi shell module.

Overview
********

This sample allows testing Wi-Fi drivers for various boards by
enabling the Wi-Fi shell module that provides a set of commands:
scan, connect, and disconnect.  It also enables the net_shell module
to verify net_if settings.

Building and Running
********************

Verify the board and chip you are targeting provide Wi-Fi support.

For instance you can use TI's CC3220 by selecting the cc3220sf_launchxl board.

.. zephyr-app-commands::
   :zephyr-app: samples/net/wifi
   :board: cc3220sf_launchxl
   :goals: build
   :compact:

Sample console interaction
==========================

.. code-block:: console

   shell> wifi scan
   Scan requested
   shell>
   Num  | SSID                             (len) | Chan | RSSI | Sec
   1    | kapoueh!                         8     | 1    | -93  | WPA/WPA2
   2    | mooooooh                         8     | 6    | -89  | WPA/WPA2
   3    | Ap-foo blob..                    13    | 11   | -73  | WPA/WPA2
   4    | gksu                             4     | 1    | -26  | WPA/WPA2
   ----------
   Scan request done

   shell> wifi connect "gksu" 4 SecretStuff
   Connection requested
   shell>
   Connected
   shell>