You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/en/api-guides/wifi.rst
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1428,7 +1428,7 @@ For establishing a secure connection, AP and Station negotiate and agree on the
1428
1428
- MSCHAP and MSCHAP-V2.
1429
1429
1430
1430
1431
-
Detailed information on creating certificates and how to run wpa2_enterprise example on {IDF_TARGET_NAME} can be found in :example:`wifi/wpa2_enterprise`.
1431
+
Detailed information on creating certificates and how to run wpa2_enterprise example on {IDF_TARGET_NAME} can be found in :example:`wifi/wifi_enterprise`.
Copy file name to clipboardExpand all lines: examples/wifi/wifi_enterprise/README.md
+16-15Lines changed: 16 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# WPA2 Enterprise Example
2
2
3
-
This example shows how ESP32 connects to AP with wpa2 enterprise encryption. Example does the following steps:
3
+
This example shows how ESP32 connects to AP with Wi-Fi enterprise encryption. The example does the following steps:
4
4
5
5
1. Install CA certificate which is optional.
6
6
2. Install client certificate and client key which is required in TLS method and optional in PEAP and TTLS methods.
@@ -9,12 +9,13 @@ This example shows how ESP32 connects to AP with wpa2 enterprise encryption. Exa
9
9
5. Enable wpa2 enterprise.
10
10
6. Connect to AP.
11
11
12
-
*Note:* 1. The certificates currently are generated and are present in examples.wifi/wpa2_enterprise/main folder.
12
+
*Note:* 1. The certificates currently are generated and are present in examples/wifi/wifi_enterprise/main folder.
13
13
2. The expiration date of the certificates is 2027/06/05.
14
+
3. In case using suite-b, please use appropriate certificates such as RSA-3072 or p384 EC certificates.
14
15
15
16
The steps to create new certificates are given below.
16
17
17
-
## The file wpa2_ca.pem, wpa2_ca.key, wpa2_server.pem, wpa2_server.crt and wpa2_server.key can be used to configure AP with wpa2 enterprise encryption.
18
+
## The file ca.pem, ca.key, server.pem, server.crt and server.key can be used to configure AP with enterprise encryption.
18
19
19
20
## How to use Example
20
21
@@ -36,7 +37,7 @@ idf.py menuconfig
36
37
idf.py -p PORT flash monitor
37
38
```
38
39
39
-
## Steps to create wpa2_ent openssl certs
40
+
## Steps to create enterprise openssl certs
40
41
41
42
1. make directry tree
42
43
@@ -56,27 +57,27 @@ idf.py -p PORT flash monitor
56
57
extendedKeyUsage = 1.3.6.1.5.5.7.3.1
57
58
58
59
2. ca.pem: root certificate, foundation of certificate verigy
0 commit comments