zephyr/samples/net/wifi/shell
Philipp Steiner ebaf31c8c1 boards: adafruit: add initial support esp32s3_feather_tft_reverse
The Adafruit Feather ESP32S3 TFT Reverse is a development board in the
Feather standard layout, sharing peripheral placement with other devices
labeled as Feathers or FeatherWings. The board is equipped with an
ESP32-S3 mini module, a fuel gauge, a USB-C and Qwiic/STEMMA-QT connector.
This variant additionally comes with a 240x135 pixel IPS TFT color display
on the backside of the boards and with 3 buttons.

Signed-off-by: Philipp Steiner <philipp.steiner1987@gmail.com>
2025-06-26 10:44:53 -10:00
..
boards samples: pm: Enable PM3 mode for RW612 in wifi example 2025-05-21 12:33:10 +02:00
nxp samples: net: wifi: Enable NXP_WIFI_TX_RX_ZERO_COPY for IW610 2025-06-24 09:17:03 +02:00
socs boards: adafruit: add initial support esp32s3_feather_tft_reverse 2025-06-26 10:44:53 -10:00
src
CMakeLists.txt
overlay-debug.conf samples: net: wifi: shell: Enable coredump logging 2025-02-07 17:54:51 +01:00
prj.conf
README.rst
sample.yaml tests, samples: update esp32_devkitc board records 2025-04-29 16:48:55 +02:00

.. zephyr:code-sample:: wifi-shell
   :name: Wi-Fi shell
   :relevant-api: net_stats

   Test Wi-Fi functionality using the Wi-Fi shell module.

Overview
********

This sample allows testing Wi-Fi drivers for various boards by
enabling the Wi-Fi shell module that provides a set of commands:
scan, connect, and disconnect.  It also enables the net_shell module
to verify net_if settings.

Building and Running
********************

Verify the board and chip you are targeting provide Wi-Fi support.

For instance you can use Nordic's nrf7002dk by selecting the nrf7002dk/nrf5340/cpuapp board.

.. zephyr-app-commands::
   :zephyr-app: samples/net/wifi/shell
   :board: nrf7002dk/nrf5340/cpuapp
   :goals: build
   :compact:

Sample console interaction
==========================

.. code-block:: console

   shell> wifi scan
   Scan requested
   shell>
   Num  | SSID                             (len) | Chan | RSSI | Sec
   1    | kapoueh!                         8     | 1    | -93  | WPA/WPA2
   2    | mooooooh                         8     | 6    | -89  | WPA/WPA2
   3    | Ap-foo blob..                    13    | 11   | -73  | WPA/WPA2
   4    | gksu                             4     | 1    | -26  | WPA/WPA2
   ----------
   Scan request done

   shell> wifi connect "gksu" 4 SecretStuff
   Connection requested
   shell>
   Connected
   shell>