- Add the ability to specify the specific channels that need to be scanned.
- Adds a warning that discourages from setting bssid and channel in
sta_config if btm is enabled and supported by the network.
- Includes wifi_types.h changes needed for adding the event when
neighbor reports are recieved from AP.
- Fixes issues with reporting authmodes of FT APs
1. Break FTM State Machine code into separate functions
2. Use dynamic allocation for FTM session to save memory
3. Add API to get FTM report instead of event based mechanism
4. Add FTM Request re-try and comeback support
5. Fix issues with duplicate FTM response, stale sessions and
frequent failures to respond from SoftAP side
6. Update PHY FTM Compensation for all 40MHz cases
1. Sync public header files between ESP-IDF and Wi-Fi driver
2. Add md5sum checks for new public header files:
- esp_wifi_types_generic.h
- esp_wifi_native.h
- Add support for WPA3 + WPA3_EXT_PSK mixed mode
- Improvements in scan and connect path as per specifications along with
minor bugfixes
- When AP advertises all PSK modes (WPA, WPA2 and WPA3), make sure that
station treats it as WPA2_WPA3_PSK mixed mode.
- WIFI_REASON_NO_AP_FOUND_W_COMPATIBLE_SECURITY will be reported for the following
reasons
-- AP has PMF required but station is not configured for pmf capable/required.
-- Station has PMF required but AP is not configured for pmf capable/required.
-- The AP is using unsupported group management/pairwise ciphers
-- OWE not enabled by station for found OWE AP
-- AP RSNXE parsing failed in supplicant code
-- AP is in Independent BSS mode
- Fixes issue with connecting and discovering WEP APs
- Expsnds the reasons for trigerring a disconnect using
REASON_NO_AP_FOUND_WITH_COMPATIBLE_SECURITY
-- SAE-PK configured as compulsory in sta config but disabled for the AP
-- SAE-H2e configured as compulsory in sta config but disabled for an AP
that has authmode as WPA3-PSK or WPA3-WPA2-PSK.
-- Open AP found but we have set password or enabled enterprise mode.
1. Adds 3 more disconnect reasons in case of No AP found.
a. REASON_NO_AP_FOUND_IN_RSSI_THRESHOLD : AP rejected because it did
not meet rssi threshold.
b. REASON_NO_AP_FOUND_IN_AUTHMODE THRESHOLD : AP rejected because it
did not meet security threshold.
c. REASON_NO_AP_FOUND_WITH_COMPATIBLE_ SECURITY : AP rejected because
of incompatible security configuration. These situations include
-- bss offerring WEP, but our password is not WEP compliant,
-- Encrypted AP bss but we have set authmode but no password config set.
-- AP is open AUTH but enterprise config setup.
-- AP is Enterprise but we have setup enterprise config.
2. Resets scan duration configuration to default after scan is done or is
canceled.
3. Disarms beacon timeout timer before attempting to scan and rearms it after
scan is done or scan is cancelled.
4. Resolves observed issue with duplicate reporting of beacons/probe responses
to supplicant for the same beacon/probe response during scan.
1. optimize bin size when softap & ftm not enabled
2. change fragment threshold to 256
3. support fragment for LR mode
4. fix ampdu duration issue
5. fix rx fragment fail in Open mode.
6. Drop fragmented AMPDUs