blob: fa3506f9f7ff85d270909fc2ae19086d4c9816dd [file] [log] [blame]
..
Copyright 2019,2020 NXP
.. highlight:: bat
.. _ex-se05x-wifi-kdf:
=======================================================================
SE05X WiFi KDF Example
=======================================================================
This project is to demonstrate Password based KDF (PBKDF) operation using
SE05X. This operation is used in deriving Pre-Shared key (PSK) for WiFi ssid
using stored passwords.
Building the Demo
=======================================================================
- Build Plug & Trust middleware stack. (Refer :ref:`building`)
- Project: ``ex_se05x_WiFiKDF_inject``
- Project: ``ex_se05x_WiFiKDF_derive``
Running the Example
=======================================================================
If you have built a binary, first flash the ``ex_se05x_WiFiKDF_inject``
binary on to the board and reset the board. Then flash ``ex_se05x_WiFiKDF_derive``
binary and reset the board.
If you have built an *exe* to be run from PC using VCOM, run as::
ex_se05x_WiFiKDF_inject.exe <PORT NAME>
ex_se05x_WiFiKDF_derive.exe -s <ssid_name> <PORT NAME>
Where **<PORT NAME>** is the VCOM COM port and **<ssid_name>** is the
name of SSID for which you want to derive the PSK.
Console output
=======================================================================
During injection, if everything is successful, the output will be similar to:
.. literalinclude:: out_ex_se05x_WiFiKDF_inject.rst.txt
:start-after: sss :WARN :!!!Not recommended for production use.!!!
While deriving the key, if everything is successful, the output will be similar to:
.. literalinclude:: out_ex_se05x_WiFiKDF_derive.rst.txt
:start-after: sss :WARN :!!!Not recommended for production use.!!!