Open devgs opened 7 months ago
Hello, I’m really interested in this PR, since I have the same device (CB3S door sensor) and I’m experiencing the same slowness in connecting after a deep sleep (it can take up to 7/8s to report the state of the sensor).
I tried to change my esphome
config (I’m using the latest version - 2024.6.6) to use your branch as framework
in the bk72xx
section, in order to test this PR and see if I can notice any improvement.
Strangely, I can see that the device can connect really fast in some cases (around 1/2s as you stated), but it can take the same time as before in other cases after waking up from deep sleep. It seems to be pretty random, so I’m not able to understand what is the root cause behind this different behavior; unfortunately, I don’t have a way to connect the device via serial port to monitor the logs of the WiFi connection, so I’m a bit stuck.
Can you please share your setup, so that I can try testing it as well?
Thanks
@alessiocappa Seems like an issue that was fixed by #274. Have you used them both?
@alessiocappa Seems like an issue that was fixed by #274. Have you used them both?
Thanks, I didn't notice that the branch used for the PR was not up to date with the main one. However, I tried to fork the repo, merge your PR so that the one you mentioned is included, but I'm still experiencing the same issue unfortunately.
Not sure what could be the reason behind this, I can share my esphome
config if needed.
Generally speaking, I've already set a static IP address, and the fast_connect
option is enabled.
You can enable debug logging and include an example output when this issue occurs.
Thanks for the feedback, but I cannot seem to get any debug information related to WiFi using the wireless logging option. I don't think there is a way to get such information without connecting the device via serial port; I'll try to see if I can do it to better understand what's happening.
Another thing I noticed is that it seems like this problem appears only if I close/open the sensor shortly after the device goes into deep sleep; if I wait a bit more time (like a couple of minutes), it seems to connect quicker to the WiFi network.
I don't know if that might be related to the deep_sleep
parameters, I tried to change the run_duration
but the problem is still there.
Yes, you definitely need to connect it via serial. Also, maybe turning on the debugging of libretiny itself is going to be required.
Just an example to consider:
bk72xx:
board: cb3s
framework:
version: "0.0.0"
source: https://github.com/devgs/libretiny@test/devgs
loglevel: debug
debug:
- wifi
- ota
sdk_silent: all
uart_port: 1
Thanks for the feedback, but I cannot seem to get any debug information related to WiFi using the wireless logging option. I don't think there is a way to get such information without connecting the device via serial port; I'll try to see if I can do it to better understand what's happening.
Actually there might be a chance to see this debug info without serial - see my buff_log component.
any news? I have tried use this solution but my esp says that remote branch doe's not exists
@devgs
I'm not sure I understand the code correctly. How does it tell if the supplied passphrase
parameter is a password or a PSK?
@kuba2k2 It's a valid HEX exactly 64 bytes long.
The passphrase length is limited to 63 bytes. For exactly this reason: to be able to easily distinguish them:
A pass-phrase is a sequence of between 8 and 63 ASCII-encoded characters. The limit of 63 comes from the desire to distinguish between a pass-phrase and a PSK displayed as 64 hexadecimal characters.
Ah, I was still ambiguous. I mean it's all handled internally by the BDK or even some lower layer. What I said above is what I saw in the source code and that has motivated me to experiment with it and achieve this nice speedup.
Right. But I still can't see where the actual length check is implemented Still, the code seems to call wpa_psk_request()
no matter the length.
Also, the code in begin()
counts the length of passphrase
and copies that amount of bytes to STA_ADV_CFG.key
. What if the passphrase contains 0x00 bytes?
The only difference in this fixup is the use of large enough buffer (on stack) when supplying passphrase
in order to squeeze in a 0x00
byte at the end. Even before this PR this same question existed: how would wpa_psk_request()
behave if someone supplies 0x00
in the middle of sub-63-byte-long passphrase
.
And the reason for an explicit 0x00
is this nice piece of code that simply ignores length and would happily read past the buffer boundaries. I'm not sure whether internals behave the same, but better be safe than sorry.
Oh - my bad. I assumed the actual PSK (binary data) was 64 bytes long, then a 0x00 byte inside would cause problems. But if the 64-byte long string is an ASCII hex representation - it should be fine indeed :)
This is a feature that's already supported by ESP devices. However, in case of Tuya devices (at least for BK7231N) it's invaluable as it can reduce the connect time by 4 seconds or more. It's all because in order to start negotiation, each client is required to derive the PSK that is a function of SSID and Password. And it's a deterministic function: it can be calculated once, stored somewhere and used many times for the same pair of SSID and Password. Actually, looking at BDK it's obvious that native firmware does exactly that. It even has a caching system that from looks of it is capable of storing multiple records.
Saving and restoring connection parameters is a more complex feature that is not implemented by this PR. However, it can now be easily done with the fixes made in
bk_wlan_start_sta_adv_fix
. This PR allows user to manually pre-calculate PSK for each of hist networks and use them instead of plain passwords in YAML. Which already works with ESP32/ESP8266, but raisesPassphrase too long
error in LibreTiny: all due to BDK limitations that are now circumvented.On my cb3s based door sensor, using
fast_connect: true
with pre-calculated PSK I have managed to achieve a boot-to-mqtt-and-sleep time that is faster than the original firmware (probably because of higher latency): around 1.25-1.40s. Using a fixed BSSID and channel can push it down 1s or less.Additionally, this PR removes the need for two supplemental config structs in
WiFiClass
,STA_CFG
andSTA_ADV_CFG
, in favor of the latter.More info on PSK can be found here: https://jorisvr.nl/wpapsk.html