You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Note: Incase this value is not set and password is set as per WPA2 standards(password len >= 8),
662
670
it will be defaulted to WPA2 and device won't connect to deprecated WEP/WPA networks.
663
671
Please set authmode threshold as WIFI_AUTH_WEP/WIFI_AUTH_WPA_PSK to connect to WEP/WPA networks */
672
+
uint32rssi_5g_adjustment=3; /**< The RSSI value of the 5G AP is within the rssi_5g_adjustment range compared to the 2G AP, the 5G AP will be given priority for connection. */
664
673
}
665
674
666
675
messagewifi_pmf_config {
667
676
boolcapable=1; /**< Deprecated variable. Device will always connect in PMF mode if other device also advertizes PMF capability. */
668
677
boolrequired=2; /**< Advertizes that Protected Management Frame is required. Device will not associate to non-PMF capable devices. */
669
678
}
670
679
680
+
messagewifi_bss_max_idle_config {
681
+
uint32period=1; /**< Sets BSS Max idle period (1 Unit = 1000TUs OR 1.024 Seconds). If there are no frames for this period from a STA, SoftAP will disassociate due to inactivity. Setting it to 0 disables the feature */
682
+
boolprotected_keep_alive=2; /**< Requires clients to use protected keep alive frames for BSS Max Idle period */
683
+
}
684
+
671
685
messagewifi_ap_config {
672
686
bytesssid=1; /**< SSID of ESP32 soft-AP. If ssid_len field is 0, this must be a Null terminated string. Otherwise, length is set according to ssid_len. 32 char*/
673
687
bytespassword=2; /**< Password of ESP32 soft-AP. 64 char*/
wifi_pmf_configpmf_cfg=11; /**< Configuration for Protected Management Frame */
685
699
int32sae_pwe_h2e=12; /**< Configuration for SAE PWE derivation method */
700
+
uint32csa_count=13; /**< Channel Switch Announcement Count. Notify the station that the channel will switch after the csa_count beacon intervals. Default value: 3 */
701
+
uint32dtim_period=14; /**< Dtim period of soft-AP. Range: 1 ~ 10. Default value: 1 */
702
+
uint32transition_disable=15; /**< Whether to enable transition disable feature */
703
+
uint32sae_ext=16; /**< Enable SAE EXT feature. SOC_GCMP_SUPPORT is required for this feature. */
704
+
wifi_bss_max_idle_configbss_max_idle_cfg=17; /**< Configuration for bss max idle, effective if CONFIG_WIFI_BSS_MAX_IDLE_SUPPORT is enabled */
705
+
uint32gtk_rekey_interval=18; /**< GTK rekeying interval in seconds. If set to 0, GTK rekeying is disabled. Range: 60 ~ 65535 including 0. */
686
706
}
687
707
688
708
messagewifi_sta_config {
@@ -720,9 +740,13 @@ Units: AP beacon intervals. Defaults to 3 if set to 0. */
720
740
//uint32_t he_trig_su_bmforming_feedback_disabled:1; /**< Whether to disable support the transmission of SU feedback in an HE TB sounding sequence. */
721
741
//uint32_t he_trig_mu_bmforming_partial_feedback_disabled:1; /**< Whether to disable support the transmission of partial-bandwidth MU feedback in an HE TB sounding sequence. */
722
742
// uint32_t he_trig_cqi_feedback_disabled:1; /**< Whether to disable support the transmission of CQI feedback in an HE TB sounding sequence. */
723
-
// uint32_t he_reserved:22; /**< Reserved for future feature set */
743
+
// uint32_t vht_su_beamformee_disabled: 1; /**< Whether to disable support for operation as an VHT SU beamformee. */
744
+
// uint32_t vht_mu_beamformee_disabled: 1; /**< Whether to disable support for operation as an VHT MU beamformee. */
745
+
// uint32_t vht_mcs8_enabled: 1; /**< Whether to support VHT-MCS8. The default value is 0. */
746
+
// uint32_t he_reserved:19; /**< Reserved for future feature set */
724
747
uint32he_bitmask=14;
725
748
bytessae_h2e_identifier=15; /**< Password identifier for H2E. this needs to be null terminated string. SAE_H2E_IDENTIFIER_LEN chars */
749
+
uint32sae_pk_mode=16; /**< Configuration for SAE-PK (Public Key) Authentication method */
0 commit comments