zephyr/samples/net/wifi/shell
Benjamin Cabé daacc8c297 samples: net: wifi: remove redundant options from esp32 conf overlays
A lot of the config options are already set in the prj.conf.

Signed-off-by: Benjamin Cabé <benjamin@zephyrproject.org>
2025-04-01 11:51:59 +02:00
..
boards drivers: ethernet: Remove deprecated eth_mcux 2025-02-26 22:04:26 +00:00
socs samples: net: wifi: remove redundant options from esp32 conf overlays 2025-04-01 11:51:59 +02:00
src
CMakeLists.txt
overlay-debug.conf samples: net: wifi: shell: Enable coredump logging 2025-02-07 17:54:51 +01:00
overlay-enterprise-variable-bufs.conf
overlay-enterprise.conf net: wifi: shell: Fix alloc failures during cert validation 2025-03-28 12:21:20 +01:00
prj.conf
README.rst
sample.yaml boards: espressif: esp32c6: Add LP Core board support 2025-03-21 17:05:20 +01:00

.. zephyr:code-sample:: wifi-shell
   :name: Wi-Fi shell
   :relevant-api: net_stats

   Test Wi-Fi functionality using the Wi-Fi shell module.

Overview
********

This sample allows testing Wi-Fi drivers for various boards by
enabling the Wi-Fi shell module that provides a set of commands:
scan, connect, and disconnect.  It also enables the net_shell module
to verify net_if settings.

Building and Running
********************

Verify the board and chip you are targeting provide Wi-Fi support.

For instance you can use Nordic's nrf7002dk by selecting the nrf7002dk/nrf5340/cpuapp board.

.. zephyr-app-commands::
   :zephyr-app: samples/net/wifi/shell
   :board: nrf7002dk/nrf5340/cpuapp
   :goals: build
   :compact:

Sample console interaction
==========================

.. code-block:: console

   shell> wifi scan
   Scan requested
   shell>
   Num  | SSID                             (len) | Chan | RSSI | Sec
   1    | kapoueh!                         8     | 1    | -93  | WPA/WPA2
   2    | mooooooh                         8     | 6    | -89  | WPA/WPA2
   3    | Ap-foo blob..                    13    | 11   | -73  | WPA/WPA2
   4    | gksu                             4     | 1    | -26  | WPA/WPA2
   ----------
   Scan request done

   shell> wifi connect "gksu" 4 SecretStuff
   Connection requested
   shell>
   Connected
   shell>