#[repr(C)]pub struct esp_tls_cfg_server {Show 16 fields
pub alpn_protos: *mut *const c_char,
pub __bindgen_anon_1: esp_tls_cfg_server__bindgen_ty_1,
pub __bindgen_anon_2: esp_tls_cfg_server__bindgen_ty_2,
pub __bindgen_anon_3: esp_tls_cfg_server__bindgen_ty_3,
pub __bindgen_anon_4: esp_tls_cfg_server__bindgen_ty_4,
pub __bindgen_anon_5: esp_tls_cfg_server__bindgen_ty_5,
pub __bindgen_anon_6: esp_tls_cfg_server__bindgen_ty_6,
pub serverkey_password: *const c_uchar,
pub serverkey_password_len: c_uint,
pub use_ecdsa_peripheral: bool,
pub ecdsa_key_efuse_blk: u8,
pub ecdsa_key_efuse_blk_high: u8,
pub ecdsa_curve: esp_tls_ecdsa_curve_t,
pub use_secure_element: bool,
pub tls_handshake_timeout_ms: u32,
pub userdata: *mut c_void,
}Expand description
@brief ESP-TLS Server configuration parameters
Fields§
§alpn_protos: *mut *const c_char< Application protocols required for HTTP2. If HTTP2/ALPN support is required, a list of protocols that should be negotiated. The format is length followed by protocol name. For the most common cases the following is ok: const char **alpn_protos = { “h2”, NULL };
- where ‘h2’ is the protocol name
__bindgen_anon_1: esp_tls_cfg_server__bindgen_ty_1§__bindgen_anon_2: esp_tls_cfg_server__bindgen_ty_2§__bindgen_anon_3: esp_tls_cfg_server__bindgen_ty_3§__bindgen_anon_4: esp_tls_cfg_server__bindgen_ty_4§__bindgen_anon_5: esp_tls_cfg_server__bindgen_ty_5§__bindgen_anon_6: esp_tls_cfg_server__bindgen_ty_6§serverkey_password: *const c_uchar< Server key decryption password string
serverkey_password_len: c_uint< String length of the password pointed to by serverkey_password
use_ecdsa_peripheral: bool< Use ECDSA peripheral to use private key
ecdsa_key_efuse_blk: u8< The efuse block where ECDSA key is stored. For SECP384R1 curve, if two blocks are used, set this to the low block and use ecdsa_key_efuse_blk_high for the high block.
ecdsa_key_efuse_blk_high: u8< The high efuse block for ECDSA key (used only for SECP384R1 curve). If not set (0), only ecdsa_key_efuse_blk is used.
ecdsa_curve: esp_tls_ecdsa_curve_t< ECDSA curve to use (SECP256R1 or SECP384R1)
use_secure_element: bool< Enable this option to use secure element or atecc608a chip
tls_handshake_timeout_ms: u32< TLS handshake timeout in milliseconds. Note: If this value is not set, by default the timeout is set to 10 seconds. If you wish that the session should wait indefinitely then please use a larger value e.g., INT32_MAX
userdata: *mut c_void< User data to be added to the ssl context. Can be retrieved by callbacks
Trait Implementations§
Source§impl Clone for esp_tls_cfg_server
impl Clone for esp_tls_cfg_server
Source§fn clone(&self) -> esp_tls_cfg_server
fn clone(&self) -> esp_tls_cfg_server
1.0.0§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source. Read moreSource§impl Default for esp_tls_cfg_server
impl Default for esp_tls_cfg_server
impl Copy for esp_tls_cfg_server
Auto Trait Implementations§
impl Freeze for esp_tls_cfg_server
impl RefUnwindSafe for esp_tls_cfg_server
impl !Send for esp_tls_cfg_server
impl !Sync for esp_tls_cfg_server
impl Unpin for esp_tls_cfg_server
impl UnsafeUnpin for esp_tls_cfg_server
impl UnwindSafe for esp_tls_cfg_server
Blanket Implementations§
§impl<T> Any for Twhere
T: 'static + ?Sized,
impl<T> Any for Twhere
T: 'static + ?Sized,
§impl<T> Borrow<T> for Twhere
T: ?Sized,
impl<T> Borrow<T> for Twhere
T: ?Sized,
§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
§unsafe fn clone_to_uninit(&self, dest: *mut u8)
unsafe fn clone_to_uninit(&self, dest: *mut u8)
clone_to_uninit)