You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Move all serialization code to separate Serializer namespace and files.
- Generalize and improve JSON processing code.
- Prevent mesh passwords from containing " characters to avoid messing up the JSON processing.
- Improve documentation.
constexprchar exampleMeshName[] PROGMEM = "MeshNode_"; // The name of the mesh network. Used as prefix for the node SSID and to find other network nodes in the example networkFilter and broadcastFilter functions below.
22
-
constexprchar exampleWiFiPassword[] PROGMEM = "ChangeThisWiFiPassword_TODO"; // The password has to be min 8 and max 64 characters long, otherwise an AP which uses it will not be found during scans.
22
+
constexprchar exampleWiFiPassword[] PROGMEM = "ChangeThisWiFiPassword_TODO"; //Note: " is an illegal character. The password has to be min 8 and max 64 characters long, otherwise an AP which uses it will not be found during scans.
23
23
24
24
// A custom encryption key is required when using encrypted ESP-NOW transmissions. There is always a default Kok set, but it can be replaced if desired.
25
25
// All ESP-NOW keys below must match in an encrypted connection pair for encrypted communication to be possible.
constexprchar exampleMeshName[] PROGMEM = "MeshNode_"; // The name of the mesh network. Used as prefix for the node SSID and to find other network nodes in the example networkFilter and broadcastFilter functions below.
29
-
constexprchar exampleWiFiPassword[] PROGMEM = "ChangeThisWiFiPassword_TODO"; // The password has to be min 8 and max 64 characters long, otherwise an AP which uses it will not be found during scans.
29
+
constexprchar exampleWiFiPassword[] PROGMEM = "ChangeThisWiFiPassword_TODO"; //Note: " is an illegal character. The password has to be min 8 and max 64 characters long, otherwise an AP which uses it will not be found during scans.
30
30
31
31
// A custom encryption key is required when using encrypted ESP-NOW transmissions. There is always a default Kok set, but it can be replaced if desired.
32
32
// All ESP-NOW keys below must match in an encrypted connection pair for encrypted communication to be possible.
constexprchar exampleWiFiPassword[] PROGMEM = "ChangeThisWiFiPassword_TODO";// Note: " is an illegal character. The password has to be min 8 and max 64 characters long, otherwise an AP which uses it will not be found during scans.
sendToDefaultBSSID ? defaultBSSID : unencryptedBSSID, 'C', generateMessageID(nullptr)) // Generates a new message ID to avoid sending encrypted sessionKeys over unencrypted connections.
@@ -1217,7 +1217,7 @@ class EspnowMeshBackend : public MeshBackendBase {
1217
1217
* @param peerMac The MAC of the node with which an encrypted connection should be established.
1218
1218
* @param encryptionRequestBuilder A function which is responsible for constructing the request message to send.
1219
1219
* Called twice when the request is successful. First to build the initial request message and then to build the connection verification message.
1220
-
* The request message should typically be of the form: JsonTranslator::createEncryptionRequestIntro() + JsonTranslator::createEncryptionRequestEnding().
1220
+
* The request message should typically be of the form found in Serializer::createEncryptionRequestHmacMessage.
1221
1221
* @return The ultimate status of the requested encrypted connection, as EncryptedConnectionStatus.
0 commit comments