zephyr/samples/net/wifi
Chaitanya Tata d107b04c9d samples: wifi: Add overlays for Enterprise mode
This overlay has all necessary configuration needed for Enterprise mode.
Two variants are given, once with fixed size network buffers and other
with variable size network buffers (still experimental).

Signed-off-by: Chaitanya Tata <Chaitanya.Tata@nordicsemi.no>
2024-10-15 13:53:30 +02:00
..
boards samples: net: wifi: enable time checking for mbedtls cert files 2024-10-08 06:00:25 -04:00
socs samples: wifi: ESP32-S2 sample configuration 2024-09-21 11:29:53 +02:00
src samples, tests, boards: Switch main return type from void to int 2023-04-14 07:49:41 +09:00
test_certs wifi: Add WPA2 EAP-TLS support 2024-08-20 10:30:55 +02:00
CMakeLists.txt
overlay-enterprise-variable-bufs.conf samples: wifi: Add overlays for Enterprise mode 2024-10-15 13:53:30 +02:00
overlay-enterprise.conf samples: wifi: Add overlays for Enterprise mode 2024-10-15 13:53:30 +02:00
prj.conf samples: net: wifi: Fix stack sizes 2024-08-06 10:27:21 +02:00
README.rst samples: net: doc: Use new Sphinx extension to document networking samples 2023-09-19 15:22:59 +01:00
sample.yaml samples: net: wifi: Disable building on NS platform variants 2024-10-05 14:05:36 -04:00

.. zephyr:code-sample:: wifi-shell
   :name: Wi-Fi shell
   :relevant-api: net_stats

   Test Wi-Fi functionality using the Wi-Fi shell module.

Overview
********

This sample allows testing Wi-Fi drivers for various boards by
enabling the Wi-Fi shell module that provides a set of commands:
scan, connect, and disconnect.  It also enables the net_shell module
to verify net_if settings.

Building and Running
********************

Verify the board and chip you are targeting provide Wi-Fi support.

For instance you can use TI's CC3220 by selecting the cc3220sf_launchxl board.

.. zephyr-app-commands::
   :zephyr-app: samples/net/wifi
   :board: cc3220sf_launchxl
   :goals: build
   :compact:

Sample console interaction
==========================

.. code-block:: console

   shell> wifi scan
   Scan requested
   shell>
   Num  | SSID                             (len) | Chan | RSSI | Sec
   1    | kapoueh!                         8     | 1    | -93  | WPA/WPA2
   2    | mooooooh                         8     | 6    | -89  | WPA/WPA2
   3    | Ap-foo blob..                    13    | 11   | -73  | WPA/WPA2
   4    | gksu                             4     | 1    | -26  | WPA/WPA2
   ----------
   Scan request done

   shell> wifi connect "gksu" 4 SecretStuff
   Connection requested
   shell>
   Connected
   shell>