5.7.8. SE05X WiFi KDF Example¶
This project is to demonstrate Password based KDF (PBKDF) operation using SE05X. This operation is used in deriving Pre-Shared key (PSK) for WiFi ssid using stored passwords.
5.7.8.1. Building the Demo¶
Build Plug & Trust middleware stack. (Refer Building / Compiling)
Project:
ex_se05x_WiFiKDF_inject
Project:
ex_se05x_WiFiKDF_derive
5.7.8.2. Running the Example¶
If you have built a binary, first flash the ex_se05x_WiFiKDF_inject
binary on to the board and reset the board. Then flash ex_se05x_WiFiKDF_derive
binary and reset the board.
If you have built an exe to be run from PC using VCOM, run as:
ex_se05x_WiFiKDF_inject.exe <PORT NAME>
ex_se05x_WiFiKDF_derive.exe -s <ssid_name> <PORT NAME>
Where <PORT NAME> is the VCOM COM port and <ssid_name> is the name of SSID for which you want to derive the PSK.
5.7.8.3. Console output¶
During injection, if everything is successful, the output will be similar to:
App :INFO :Injecting wifi_password='some-wifi-password'
App :INFO :ex_sss Finished
While deriving the key, if everything is successful, the output will be similar to:
App :INFO :Deriving PBKDF2 for wifi_ssid='some-wifi-ssid', WIFI_COUNT='4096'
App :INFO :wifi_derivedKey (Len=32)
C9 A6 69 F9 6D A2 74 A1 41 43 A9 ED D1 8F 68 1B
B1 3E 6B 8B F0 16 02 7A 7D 72 BF 0E 0C 53 CD 7C
# Data for /etc/wpa_supplicant/wpa_supplicant.conf
network={
ssid="some-wifi-ssid"
psk=c9a669f96da274a14143a9edd18f681bb13e6b8bf01627a7d72bfec53cd7c
}
App :INFO :Done
App :INFO :ex_sss Finished