Wi-Fi Enterprise security credentials structure.

Specifies the security credentials used for Wi-Fi Enterprise authentication.

Public Attributes#

uint8_t

Enterprise User Name.

uint8_t

Enterprise password.

uint8_t

Certificate password.

uint32_t

Certificate Id for Enterprise authentication.

uint32_t

Public Attribute Documentation#

username#

uint8_t sl_wifi_eap_credential_t::username[SL_WIFI_EAP_USER_NAME_LENGTH]

Enterprise User Name.


Definition at line 385 of file components/protocol/wifi/inc/sl_wifi_types.h

password#

uint8_t sl_wifi_eap_credential_t::password[SL_WIFI_EAP_PASSWORD_LENGTH]

Enterprise password.


Definition at line 386 of file components/protocol/wifi/inc/sl_wifi_types.h

certificate_key#

uint8_t sl_wifi_eap_credential_t::certificate_key[SL_WIFI_EAP_CERTIFICATE_KEY_LENGTH]

Certificate password.


Definition at line 387 of file components/protocol/wifi/inc/sl_wifi_types.h

certificate_id#

uint32_t sl_wifi_eap_credential_t::certificate_id

Certificate Id for Enterprise authentication.


Definition at line 388 of file components/protocol/wifi/inc/sl_wifi_types.h

eap_flags#

uint32_t sl_wifi_eap_credential_t::eap_flags

EAP Flags of type sl_wifi_eap_client_flag_t.

Note

    • BIT[0] of Opportunistic Key Caching (OKC) is used to enable or disable OKC:

      • 0 – disable

      • 1 – enable When this is enabled, the module will use cached PMKID to get the Master Session Key (MSK), which is needed for generating PMK that is needed for the 4-way handshake.

  • BIT[1] of OKC is used to enable or disable CA certification for PEAP connection: – 0 – CA certificate is not required – 1 – CA certificate is required

    • BIT[2-12] of OKC argument are used for cipher list selection for EAP connection. All possible ciphers are listed below:

      BIT position

      Cipher selected

      2

      DHE-RSA-AES256-SHA256

      3

      DHE-RSA-AES128-SHA256

      4

      DHE-RSA-AES256-SHA

      5

      DHE-RSA-AES128-SHA

      6

      AES256-SHA256

      7

      AES128-SHA256

      8

      AES256-SHA

      9

      AES128-SHA

      10

      RC4-SHA

      11

      DES-CBC3-SHA

      12

      RC4-MD5

    • BIT[13-31] of OKC argument is reserved. Note

      • If a user sets BIT[1] and does not provide the CA certificate for PEAP connection, an error is thrown. If a user provides an invalid CA certificate, an error is also thrown. A user can set either one or multiple bits from BIT[2-12] to provide the cipher list. If a user does not provide any values in OKC BIT[2-12], all ciphers are selected by default.


Definition at line 415 of file components/protocol/wifi/inc/sl_wifi_types.h