2023-06-30 02:20:49 +05:30
.. _wifi_mgmt:
Wi-Fi Management
################
Overview
========
The Wi-Fi management API is used to manage Wi-Fi networks. It supports below modes:
* IEEE802.11 Station (STA)
* IEEE802.11 Access Point (AP)
Only personal mode security is supported with below types:
* Open
* WPA2-PSK
2024-10-24 08:01:44 +02:00
* WPA2-PSK-256
2023-06-30 02:20:49 +05:30
* WPA3-SAE
2024-09-10 19:51:57 +02:00
The Wi-Fi management API is implemented in the `` wifi_mgmt `` module as a part of the networking L2
stack.
2023-06-30 02:20:49 +05:30
Currently, two types of Wi-Fi drivers are supported:
* Networking or socket offloaded drivers
* Native L2 Ethernet drivers
2024-12-11 09:59:00 +05:30
Wi-Fi PSA crypto supported build
***** ***** ***** ***** ***** ***** **
To enable PSA crypto API supported Wi-Fi build, the :kconfig:option: `CONFIG_WIFI_NM_WPA_SUPPLICANT_CRYPTO_ALT` and the :kconfig:option: `CONFIG_WIFI_NM_WPA_SUPPLICANT_CRYPTO_MBEDTLS_PSA` need to be set.
2025-03-26 19:50:43 +05:30
Wi-Fi Enterprise test: X.509 Certificate management
***** ***** ***** ***** ***** ***** ***** ***** ***** ***** *
2024-06-24 15:42:59 +08:00
2025-03-26 19:50:43 +05:30
Wi-Fi enterprise security requires use of X.509 certificates, two methods of installing certificates are supported:
Compile time certificates
-------------------------
Test certificates in PEM format are committed to the repo at :zephyr_file:`samples/net/wifi/test_certs` and the during the
2024-09-10 19:51:57 +02:00
build process the certificates are converted to a C header file that is included by the Wi-Fi shell
2024-06-24 15:42:59 +08:00
module.
.. code-block :: bash
$ cp client.pem samples/net/wifi/test_certs/
$ cp client-key.pem samples/net/wifi/test_certs/
$ cp ca.pem samples/net/wifi/test_certs/
2024-09-24 17:15:56 +09:00
$ cp client2.pem samples/net/wifi/test_certs/
$ cp client-key2.pem samples/net/wifi/test_certs/
$ cp ca2.pem samples/net/wifi/test_certs/
2024-10-06 15:05:34 +05:30
$ west build -p -b <board> samples/net/wifi -- -DEXTRA_CONF_FILE=overlay-enterprise.conf
For using variable size network buffer, the following overlay file can be used:
.. code-block :: bash
$ west build -p -b <board> samples/net/wifi -- -DEXTRA_CONF_FILE=overlay-enterprise-variable-bufs.conf
2025-03-26 19:50:43 +05:30
Run time certificates
---------------------
The Wi-Fi shell module uses TLS credentials subsystem to store and manage the certificates. The certificates can be added at runtime using the shell commands, see :ref: `tls_credentials_shell` for more details.
The sample or application need to enable the :kconfig:option: `CONFIG_WIFI_SHELL_RUNTIME_CERTIFICATES` option to use this feature.
2024-06-24 15:42:59 +08:00
To initiate Wi-Fi connection, the following command can be used:
.. code-block :: console
2024-09-24 17:15:56 +09:00
uart:~$ wifi connect -s <SSID> -c 149 -k 17 -w 2 -a client1 --key1-pwd whatever --key2-pwd whatever --eap-id1 id1 --eap-pwd1 pwd1
2024-06-24 15:42:59 +08:00
Server certificate is also provided in the same directory for testing purposes.
2024-09-10 19:51:57 +02:00
Any AAA server can be used for testing purposes, for example, `` FreeRADIUS `` or `` hostapd `` .
2024-06-24 15:42:59 +08:00
.. note ::
The certificates are for testing purposes only and should not be used in production.
2024-09-10 19:51:57 +02:00
They are generated using `FreeRADIUS raddb <https://github.com/FreeRADIUS/freeradius-server/tree/master/raddb/certs> `_ scripts.
2024-06-24 15:42:59 +08:00
2023-06-30 02:20:49 +05:30
API Reference
***** ***** ***
.. doxygengroup :: wifi_mgmt