Datasheet

Sample Application Demonstrations
2013 Microchip Technology Inc. Preliminary DS52108A-page 43
4.5.7.3 SETUP SOURCE CODE FOR WEP
After the AP is configured for WEP, user must program the development board to use
WEP. Configure the following for WEP, and it is located in WF_Config.h. For more
information, see Figure 4-12.
Set the encryption type to WEP-40 or WEP-104. Define
MY_DEFAULT_WIFI_SECURITY_MODE to either WF_SECURITY_WEP_40 or
WF_SECURITY_WEP_104
Set the WEP phrase. Refer to MY_DEFAULT_WEP_KEYS_40 or
MY_DEFAULT_WEP_KEYS_104.
FIGURE 4-12: SOURCE CODE FOR WEP SECURITY SETUP
4.5.8 WPA/WPA2
WPA and WPA2 are security modes that implement the 802.11i specification. They are
more secure than the WEP encrypted networks and utilizes the SSID and user
passphrase to generate the PSK. The MRF24WB0MA/B or MRF24WG0MA/B Wi-Fi
®
PICtail™ has two methods of calculating the PSK for use in WPA/WPA2. Users can
program the 32-byte hexadecimal key into the source code, or the MRF24WB0MA/B
or MRF24WG0MA/B Wi-Fi
®
PICtail™ can calculate the 32-byte hexadecimal key
internally. If the MRF24WB0MA/B or MRF24WG0MA/B Wi-Fi
®
PICtail™ has to
calculate the key, this will add an additional 30 seconds to 45 seconds to the initial
connection time, as the chip calculates the value.