-
Notifications
You must be signed in to change notification settings - Fork 1.4k
Fix enterprise mode external certs #24990
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix enterprise mode external certs #24990
Conversation
The following west manifest projects have changed revision in this Pull Request:
✅ All manifest checks OK Note: This message is automatically posted and updated by the Manifest GitHub Action. |
CI InformationTo view the history of this post, clich the 'edited' button above Inputs:Sources:sdk-nrf: PR head: 79a22a2e68f2a0f3c0602bae612c5002b294f5be more detailssdk-nrf:
zephyr:
Github labels
List of changed files detected by CI (5)
Outputs:ToolchainVersion: Test Spec & Results: ✅ Success; ❌ Failure; 🟠 Queued; 🟡 Progress; ◻️ Skipped;
|
You can find the documentation preview for this PR here. Preview links for modified nRF Connect SDK documents: https://ncsdoc.z6.web.core.windows.net/PR-24990/nrf/samples/wifi/wfa_qt_app/README.html |
3e77f80
to
cea18f1
Compare
8ec84f8
to
27febd5
Compare
This change pulls in the support to set the test certificates directory for enterprise mode when an external certs directory is provided at build time. Signed-off-by: Triveni Danda <[email protected]>
Add changes to support connections in enterprise mode using EAP-TLS, EAP-TTLS, PEAPV0, and PEAPV1 authentication methods. Fixes SHEL-3709. Signed-off-by: Triveni Danda <[email protected]>
Add a line about configuring `CONFIG_WIFI_NM_WPA_SUPPLICANT_HEAP` based on the size of certifictaes used. Signed-off-by: Triveni Danda <[email protected]>
27febd5
to
79a22a2
Compare
Add changes to support connections in enterprise mode using EAP-TLS, EAP-TTLS, PEAPV0, and PEAPV1 authentication methods.
Fixes SHEL-3709.