zephyr/samples/net/wifi
Anas Nashif 3ae52624ff license: cleanup: add SPDX Apache-2.0 license identifier
Update the files which contain no license information with the
'Apache-2.0' SPDX license identifier.  Many source files in the tree are
missing licensing information, which makes it harder for compliance
tools to determine the correct license.

By default all files without license information are under the default
license of Zephyr, which is Apache version 2.

Signed-off-by: Anas Nashif <anas.nashif@intel.com>
2019-04-07 08:45:22 -04:00
..
boards wifi: winc1500: Add Device Tree support 2018-11-13 14:12:18 -05:00
src wifi: winc1500: Convert to new DT_<COMPAT>_<INSTANCE> defines 2019-01-28 10:39:59 -06:00
CMakeLists.txt license: cleanup: add SPDX Apache-2.0 license identifier 2019-04-07 08:45:22 -04:00
README.rst doc: samples: Update samples to point to active boards 2018-12-12 23:06:16 +01:00
prj.conf cmake: Drop all in-tree usage 'set_conf_file' 2019-03-01 09:44:09 +01:00
quark_se_c1000_devboard.overlay license: cleanup: add SPDX Apache-2.0 license identifier 2019-04-07 08:45:22 -04:00
sample.yaml samples: add test identifier 2019-03-29 17:44:11 -04:00

README.rst

.. _wifi_sample:

Wi-Fi sample
############

Overview
********

This sample allows testing Wi-Fi drivers for various boards by
enabling the Wi-Fi shell module that provides a set of commands:
scan, connect, and disconnect.  It also enables the net_shell module
to verify net_if settings.

Building and Running
********************

Verify the board and chip you are targeting provide Wi-Fi support.

For instance you can use TI's CC3220 by selecting the cc3220sf_launchxl board.

.. zephyr-app-commands::
   :zephyr-app: samples/net/wifi
   :board: cc3220sf_launchxl
   :goals: build
   :compact:

Sample console interaction
==========================

.. code-block:: console

   shell> wifi scan
   Scan requested
   shell>
   Num  | SSID                             (len) | Chan | RSSI | Sec
   1    | kapoueh!                         8     | 1    | -93  | WPA/WPA2
   2    | mooooooh                         8     | 6    | -89  | WPA/WPA2
   3    | Ap-foo blob..                    13    | 11   | -73  | WPA/WPA2
   4    | gksu                             4     | 1    | -26  | WPA/WPA2
   ----------
   Scan request done

   shell> wifi connect "gksu" 4 SecretStuff
   Connection requested
   shell>
   Connected
   shell>