Struct esp_idf_hal::sys::wifi_ap_config_t
source · #[repr(C)]pub struct wifi_ap_config_t {
pub ssid: [u8; 32],
pub password: [u8; 64],
pub ssid_len: u8,
pub channel: u8,
pub authmode: u32,
pub ssid_hidden: u8,
pub max_connection: u8,
pub beacon_interval: u16,
pub pairwise_cipher: u32,
pub ftm_responder: bool,
pub pmf_cfg: wifi_pmf_config_t,
pub sae_pwe_h2e: u32,
}
Expand description
@brief Soft-AP configuration settings for the device
Fields§
§ssid: [u8; 32]
< SSID of soft-AP. If ssid_len field is 0, this must be a Null terminated string. Otherwise, length is set according to ssid_len.
password: [u8; 64]
< Password of soft-AP.
ssid_len: u8
< Optional length of SSID field.
channel: u8
< Channel of soft-AP
authmode: u32
< Auth mode of soft-AP. Do not support AUTH_WEP, AUTH_WAPI_PSK and AUTH_OWE in soft-AP mode. When the auth mode is set to WPA2_PSK, WPA2_WPA3_PSK or WPA3_PSK, the pairwise cipher will be overwritten with WIFI_CIPHER_TYPE_CCMP.
< Broadcast SSID or not, default 0, broadcast the SSID
max_connection: u8
< Max number of stations allowed to connect in
beacon_interval: u16
< Beacon interval which should be multiples of 100. Unit: TU(time unit, 1 TU = 1024 us). Range: 100 ~ 60000. Default value: 100
pairwise_cipher: u32
< Pairwise cipher of SoftAP, group cipher will be derived using this. Cipher values are valid starting from WIFI_CIPHER_TYPE_TKIP, enum values before that will be considered as invalid and default cipher suites(TKIP+CCMP) will be used. Valid cipher suites in softAP mode are WIFI_CIPHER_TYPE_TKIP, WIFI_CIPHER_TYPE_CCMP and WIFI_CIPHER_TYPE_TKIP_CCMP.
ftm_responder: bool
< Enable FTM Responder mode
pmf_cfg: wifi_pmf_config_t
< Configuration for Protected Management Frame
sae_pwe_h2e: u32
< Configuration for SAE PWE derivation method
Trait Implementations§
source§impl Clone for wifi_ap_config_t
impl Clone for wifi_ap_config_t
source§fn clone(&self) -> wifi_ap_config_t
fn clone(&self) -> wifi_ap_config_t
1.0.0§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read more