- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi,
Please let us know the list of wireless security methods implemented in WICED WiFi.
Thanks and Regards,
Suresh
Solved! Go to Solution.
- Tags:
- cyw43438
- wlan-wiced
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi :
We have a define in the wwd_constants.h , if you have install our sdk ,you can have a check.
Theoretically, we can support all the list like below, if you met issue on your debugging , please report case by project, or report the issue in community, we can reply to you case by case .
typedef enum
{
WICED_SECURITY_OPEN = 0, /**< Open security */
WICED_SECURITY_WEP_PSK = WEP_ENABLED, /**< WEP PSK Security with open authentication */
WICED_SECURITY_WEP_SHARED = ( WEP_ENABLED | SHARED_ENABLED ), /**< WEP PSK Security with shared authentication */
WICED_SECURITY_WPA_TKIP_PSK = ( WPA_SECURITY | TKIP_ENABLED ), /**< WPA PSK Security with TKIP */
WICED_SECURITY_WPA_AES_PSK = ( WPA_SECURITY | AES_ENABLED ), /**< WPA PSK Security with AES */
WICED_SECURITY_WPA_MIXED_PSK = ( WPA_SECURITY | AES_ENABLED | TKIP_ENABLED ), /**< WPA PSK Security with AES & TKIP */
WICED_SECURITY_WPA2_AES_PSK = ( WPA2_SECURITY | AES_ENABLED ), /**< WPA2 PSK Security with AES */
WICED_SECURITY_WPA2_TKIP_PSK = ( WPA2_SECURITY | TKIP_ENABLED ), /**< WPA2 PSK Security with TKIP */
WICED_SECURITY_WPA2_MIXED_PSK = ( WPA2_SECURITY | AES_ENABLED | TKIP_ENABLED ), /**< WPA2 PSK Security with AES & TKIP */
WICED_SECURITY_WPA2_FBT_PSK = ( WPA2_SECURITY | AES_ENABLED | FBT_ENABLED), /**< WPA2 FBT PSK Security with AES & TKIP */
WICED_SECURITY_WPA_TKIP_ENT = ( ENTERPRISE_ENABLED | WPA_SECURITY | TKIP_ENABLED ), /**< WPA Enterprise Security with TKIP */
WICED_SECURITY_WPA_AES_ENT = ( ENTERPRISE_ENABLED | WPA_SECURITY | AES_ENABLED ), /**< WPA Enterprise Security with AES */
WICED_SECURITY_WPA_MIXED_ENT = ( ENTERPRISE_ENABLED | WPA_SECURITY | AES_ENABLED | TKIP_ENABLED ), /**< WPA Enterprise Security with AES & TKIP */
WICED_SECURITY_WPA2_TKIP_ENT = ( ENTERPRISE_ENABLED | WPA2_SECURITY | TKIP_ENABLED ), /**< WPA2 Enterprise Security with TKIP */
WICED_SECURITY_WPA2_AES_ENT = ( ENTERPRISE_ENABLED | WPA2_SECURITY | AES_ENABLED ), /**< WPA2 Enterprise Security with AES */
WICED_SECURITY_WPA2_MIXED_ENT = ( ENTERPRISE_ENABLED | WPA2_SECURITY | AES_ENABLED | TKIP_ENABLED ), /**< WPA2 Enterprise Security with AES & TKIP */
WICED_SECURITY_WPA2_FBT_ENT = ( ENTERPRISE_ENABLED | WPA2_SECURITY | AES_ENABLED | FBT_ENABLED),
WICED_SECURITY_IBSS_OPEN = ( IBSS_ENABLED ), /**< Open security on IBSS ad-hoc network */
WICED_SECURITY_WPS_OPEN = ( WPS_ENABLED ), /**< WPS with open security */
WICED_SECURITY_WPS_SECURE = ( WPS_ENABLED | AES_ENABLED), /**< WPS with AES security */
WICED_SECURITY_UNKNOWN = -1, /**< May be returned by scan function if security is unknown. Do not pass this to the join function! */
WICED_SECURITY_FORCE_32_BIT = 0x7fffffff /**< Exists only to force wiced_security_t type to 32 bits */
} wiced_security_t;
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi :
We have a define in the wwd_constants.h , if you have install our sdk ,you can have a check.
Theoretically, we can support all the list like below, if you met issue on your debugging , please report case by project, or report the issue in community, we can reply to you case by case .
typedef enum
{
WICED_SECURITY_OPEN = 0, /**< Open security */
WICED_SECURITY_WEP_PSK = WEP_ENABLED, /**< WEP PSK Security with open authentication */
WICED_SECURITY_WEP_SHARED = ( WEP_ENABLED | SHARED_ENABLED ), /**< WEP PSK Security with shared authentication */
WICED_SECURITY_WPA_TKIP_PSK = ( WPA_SECURITY | TKIP_ENABLED ), /**< WPA PSK Security with TKIP */
WICED_SECURITY_WPA_AES_PSK = ( WPA_SECURITY | AES_ENABLED ), /**< WPA PSK Security with AES */
WICED_SECURITY_WPA_MIXED_PSK = ( WPA_SECURITY | AES_ENABLED | TKIP_ENABLED ), /**< WPA PSK Security with AES & TKIP */
WICED_SECURITY_WPA2_AES_PSK = ( WPA2_SECURITY | AES_ENABLED ), /**< WPA2 PSK Security with AES */
WICED_SECURITY_WPA2_TKIP_PSK = ( WPA2_SECURITY | TKIP_ENABLED ), /**< WPA2 PSK Security with TKIP */
WICED_SECURITY_WPA2_MIXED_PSK = ( WPA2_SECURITY | AES_ENABLED | TKIP_ENABLED ), /**< WPA2 PSK Security with AES & TKIP */
WICED_SECURITY_WPA2_FBT_PSK = ( WPA2_SECURITY | AES_ENABLED | FBT_ENABLED), /**< WPA2 FBT PSK Security with AES & TKIP */
WICED_SECURITY_WPA_TKIP_ENT = ( ENTERPRISE_ENABLED | WPA_SECURITY | TKIP_ENABLED ), /**< WPA Enterprise Security with TKIP */
WICED_SECURITY_WPA_AES_ENT = ( ENTERPRISE_ENABLED | WPA_SECURITY | AES_ENABLED ), /**< WPA Enterprise Security with AES */
WICED_SECURITY_WPA_MIXED_ENT = ( ENTERPRISE_ENABLED | WPA_SECURITY | AES_ENABLED | TKIP_ENABLED ), /**< WPA Enterprise Security with AES & TKIP */
WICED_SECURITY_WPA2_TKIP_ENT = ( ENTERPRISE_ENABLED | WPA2_SECURITY | TKIP_ENABLED ), /**< WPA2 Enterprise Security with TKIP */
WICED_SECURITY_WPA2_AES_ENT = ( ENTERPRISE_ENABLED | WPA2_SECURITY | AES_ENABLED ), /**< WPA2 Enterprise Security with AES */
WICED_SECURITY_WPA2_MIXED_ENT = ( ENTERPRISE_ENABLED | WPA2_SECURITY | AES_ENABLED | TKIP_ENABLED ), /**< WPA2 Enterprise Security with AES & TKIP */
WICED_SECURITY_WPA2_FBT_ENT = ( ENTERPRISE_ENABLED | WPA2_SECURITY | AES_ENABLED | FBT_ENABLED),
WICED_SECURITY_IBSS_OPEN = ( IBSS_ENABLED ), /**< Open security on IBSS ad-hoc network */
WICED_SECURITY_WPS_OPEN = ( WPS_ENABLED ), /**< WPS with open security */
WICED_SECURITY_WPS_SECURE = ( WPS_ENABLED | AES_ENABLED), /**< WPS with AES security */
WICED_SECURITY_UNKNOWN = -1, /**< May be returned by scan function if security is unknown. Do not pass this to the join function! */
WICED_SECURITY_FORCE_32_BIT = 0x7fffffff /**< Exists only to force wiced_security_t type to 32 bits */
} wiced_security_t;
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Are all of these implemented too in WICED SDK ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi :
This is a define from WICED SDK .
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
yes , but are they actully implemented for CY43438 ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Suresh:
Different chip has different capabilities, I only can give you this answer from datasheet, and if you find problems when doing debug, please raise to us:
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Does all mentioned security methods are supported in both STA and AP mode ?
Thanks and Regards,
Suresh
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Suresh:
I will have a test based on my environment, will update to you later next week.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
update my results, the results is based on 6.2 release with 4343wwcd1 .
WEB is not a secure encryption , not suggest to use it for production.
many routers already removed the support for it.
AP:
WICED_SECURITY_OPEN //ok
WICED_SECURITY_WEP_PSK // not suggest
WICED_SECURITY_WEP_SHARED // not suggest
WICED_SECURITY_WPA_TKIP_PSK // ok
WICED_SECURITY_WPA_AES_PSK // ok
WICED_SECURITY_WPA_MIXED_PSK //ok
WICED_SECURITY_WPA2_AES_PSK //ok
WICED_SECURITY_WPA2_TKIP_PSK //ok
WICED_SECURITY_WPA2_MIXED_PSK //ok
WICED_SECURITY_WPA2_FBT_PSK //ok
STA:
WICED_SECURITY_OPEN //ok
WICED_SECURITY_WEP_SHARED // not suggest
WICED_SECURITY_WPA_TKIP_PSK // ok, if AP set to WPA TKIP
WICED_SECURITY_WPA_AES_PSK // ok, if AP set WPA AES only
WICED_SECURITY_WPA_MIXED_PSK // ok
WICED_SECURITY_WPA2_TKIP_PSK // ok
WICED_SECURITY_WPA2_AES_PSK //ok
WICED_SECURITY_WPA2_MIXED_PSK // ok
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Is enterprise security also supported in STA/AP mode?
Thanks and Regards,
Suresh
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
HI :
We have a released document with SDK , its name is Wiced-Enterprise security user guide.pdf.
The document has a detailed introduction , and 43438 supports Enterprise Types already.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Here's where the document is located in the SDK: /43xxx_Wi-Fi/doc/WICED-Enterprise-Security-User-Guide.pdf