Update wifi lib with below changes -
1. Return error for 2nd offchan Tx when 1st API still in progress
2. Fix timer index issue with last timer enum
Co-authored-by: Shyamal Khachane <shyamal.khachane@espressif.com>
1. Fix multi antenna issue
2. Fix typo in wifi api docs
3. Optimize BB filter timer to pass some corner case
4. Change fragment threshold to 256
5. Support fragment for LR mode
6. Fix rx fragment fail in Open mode.
7. Drop fragmented AMPDUs
8. Fix ampdu duration issue
1. Discard commit frame received at confirmed state in SAE STA
2. Add nvs values for new config params
3. Bugfix NVS get values for sae pwe
4. Bugfix memory leak caused by assoc retry timer and assoc IE
1) Fix issue during split scan to allow for data tx.
2) Fix issue when parsing wpa_ie to set correct authmode when AP
supports both WPA_EAP and WPA_EAP_SHA256 authmode.
Closes https://github.com/espressif/esp-idf/issues/11202
3) Fix an occasional crash during sta roam.
4) Add home_channel_dwell_time to wifi_scan_config_t. This allows
configuration of the time spent between scanning consecutive
channels for tx.
5) Adds a obss scan timer disarm when a sta disconnects from an AP
1. Disable SA query timers when station disconnect and other SA query related improvements
2. Send appropriate reason code in 4 way handshake failure
3. Send deauth while going from assoc state to init, if reason is assoc timeout
1. Deinit does not return ESP_ERR_WIFI_NOT_INIT if the wifi driver is no longer initialized.
2. Fix get wrong channel value use esp_wifi_get_config.
3. Fix bug of missing unlock when wifi stop.
4. Fix annotation error of api esp_wifi_connect.
1. Fixed not update phy according to country code.
2. Fixed crashed when esp_wifi_set_ant_gpio() called
3. Fixed a bug when ftm used with ps enabled
4. Fixed a potential issue to allocate PSRAM to wifi stack where internal RAM is required
5. Fixed potential fail to scan AP after receiving disassoc/deauth from AP on esp32s2
y
While using esp_wifi_set_config, flag pmf_capable defaults to 0.
Users may not bother to enable it, which prevents connection to a
WPA3 AP. Or the AP may reset into WPA3 mode failing the re-connection.
To ensure better security, deprecate the pmf_capable flag and set it to
true internally.