Found them! Yes, they are exposed to HA.
This is what I think is relevant from the code… I’ve redacted some parts for privacy, others were already redacted by the log itself:
"**REDACTED**6f8326d9b": {
"setting_preference": "manual",
"dtim_6e": 3,
"wpa3_support": true,
"minrate_na_advertising_rates": false,
"wpa_mode": "wpa2",
"minrate_setting_preference": "auto",
"minrate_ng_advertising_rates": false,
"b_supported": false,
"radius_das_enabled": false,
"group_rekey": 0,
"radius_macacl_format": "none_lower",
"pmf_mode": "optional",
"wpa3_transition": true,
"passphrase_autogenerated": true,
"private_preshared_keys": [
{
"password": "**OBVIOUSLY REDACTED**",
"networkconf_id": "<**REDACTED**8469dd7fd"
},
{
"password": "**OBVIOUSLY REDACTED**",
"networkconf_id": "**REDACTED**ed08efacdf2f"
},
{
"password": "**OBVIOUSLY REDACTED**",
"networkconf_id": "**REDACTED**0ed08eface00d"
},
{
"password": "**OBVIOUSLY REDACTED**",
"networkconf_id": "**REDACTED**3c7433f2a5"
}
],
"bc_filter_enabled": false,
"tdls_prohibit": false,
"mcastenhance_enabled": true,
"usergroup_id": "**REDACTED**308469dd7fe",
"schedule_enabled": false,
"proxy_arp": false,
"country_beacon": false,
"sae_sync": 5,
"uapsd_enabled": false,
"iapp_enabled": true,
"name": "Sojuelix",
"site_id": "**REDACTED**308469dd7e8",
"hide_ssid": false,
"wlan_band": "both",
"_id": "**REDACTED**506f8326d9b",
"private_preshared_keys_enabled": true,
"no2ghz_oui": true,
"x_iapp_key": "**REDACTED**0f5d7ea5e57dd32d28",
"auth_cache": false,
"networkconf_id": "**REDACTED**ff308469dd7fd",
"dtim_na": 3,
"is_guest": false,
"minrate_na_enabled": false,
"sae_groups": [],
"enabled": true,
"sae_psk": [],
"wlan_bands": [
"2g",
"5g"
],
"mac_filter_policy": "allow",
"p2p_cross_connect": false,
"security": "wpapsk",
"ap_group_ids": [
"**REDACTED**8469dd807"
],
"l2_isolation": true,
"minrate_ng_enabled": true,
"bss_transition": true,
"minrate_ng_data_rate_kbps": 1000,
"radius_mac_auth_enabled": false,
"wpa3_fast_roaming": false,
"schedule_with_duration": [],
"pmf_cipher": "auto",
"ap_group_mode": "all",
"wpa3_enhanced_192": false,
"vlan_enabled": false,
"fast_roaming_enabled": false,
"rrm_enabled": false,
"wpa_enc": "ccmp",
"x_passphrase": "**REDACTED**",
"radius_macacl_empty_password": false,
"mac_filter_list": [],
"dtim_mode": "default",
"p2p": false,
"schedule": [],
"element_adopt": false,
"bc_filter_list": "**REDACTED**",
"dpi_enabled": false,
"minrate_na_data_rate_kbps": 6000,
"mac_filter_enabled": false,
"sae_anti_clogging": 5,
"dtim_ng": 1
},
I’ve checked the QR code of the PPSK network and the password that it leads to is the regular psk, even though it is disabled…