5.7.8. SE05X WiFi KDF Example

This project is to demonstrate Password based KDF (PBKDF) operation using SE05X. This operation is used in deriving Pre-Shared key (PSK) for WiFi ssid using stored passwords.

5.7.8.1. Building the Demo

  • Build Plug & Trust middleware stack. (Refer Building / Compiling)

  • Project: ex_se05x_WiFiKDF_inject

  • Project: ex_se05x_WiFiKDF_derive

5.7.8.2. Running the Example

If you have built a binary, first flash the ex_se05x_WiFiKDF_inject binary on to the board and reset the board. Then flash ex_se05x_WiFiKDF_derive binary and reset the board.

If you have built an exe to be run from PC using VCOM, run as:

ex_se05x_WiFiKDF_inject.exe <PORT NAME>
ex_se05x_WiFiKDF_derive.exe -s <ssid_name> <PORT NAME>

Where <PORT NAME> is the VCOM COM port and <ssid_name> is the name of SSID for which you want to derive the PSK.

5.7.8.3. Console output

During injection, if everything is successful, the output will be similar to:

App   :INFO :Injecting wifi_password='some-wifi-password'
App   :INFO :ex_sss Finished

While deriving the key, if everything is successful, the output will be similar to:

App   :INFO :Deriving PBKDF2 for wifi_ssid='some-wifi-ssid', WIFI_COUNT='4096'
App   :INFO :wifi_derivedKey (Len=32)
      C9 A6 69 F9    6D A2 74 A1    41 43 A9 ED    D1 8F 68 1B 
      B1 3E 6B 8B    F0 16 02 7A    7D 72 BF 0E    0C 53 CD 7C 

# Data for /etc/wpa_supplicant/wpa_supplicant.conf
network={
    ssid="some-wifi-ssid"
    psk=c9a669f96da274a14143a9edd18f681bb13e6b8bf01627a7d72bfec53cd7c
}
App   :INFO :Done
App   :INFO :ex_sss Finished