Application protocols required for HTTP2. If HTTP2/ALPN support is required, a list of protocols that should be negotiated. The format is length followed by protocol name. For the most common cases the following is ok: const char **alpn_protos = { "h2", NULL }; - where 'h2' is the protocol name.
Client key decryption password string.
String length of the password pointed to by clientkey_password.
Use the ECDSA peripheral for the private key operations.
The efuse block where the ECDSA key is stored.
Configure non-blocking mode. If set to true the underneath socket will be configured in non blocking mode after tls session is established.
Enable this option to use secure element or atecc608a chip.
Network timeout in milliseconds. Note: If this value is not set, by default the timeout is set to 10 seconds. If you wish that the session should wait indefinitely then please use a larger value e.g., INT32_MAX.
Use a global ca_store for all the connections in which this bool is set.
If non-NULL, server certificate CN must match this name. If NULL, server certificate CN must match hostname.
Skip any validation of server certificate CN field.
Enable TCP keep-alive timeout for SSL connection.
Pointer to PSK hint and key. if not NULL (and certificates are NULL) then PSK authentication is enabled with configured setup. Important note: the pointer must be valid for connection.
Function pointer to esp_crt_bundle_attach. Enables the use of certification bundle for server verification, must be enabled in menuconfig.
Pointer for digital signature peripheral context.
Use non-TLS connection: When set to true, the esp-tls uses plain TCP transport rather then TLS/SSL connection. Note, that it is possible to connect using a plain tcp transport directly with esp_tls_plain_tcp_connect() API.
The name of interface for data to go through. Use the default interface without setting.
The address family to use when connecting to a host.
Pointer to a zero-terminated array of IANA identifiers of TLS ciphersuites. Please check the list validity by esp_tls_get_ciphersuites_list() API.
TLS protocol version of the connection, e.g., TLS 1.2, TLS 1.3 (default - no preference).