You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: components/esp_websocket_client/include/esp_websocket_client.h
+5-2Lines changed: 5 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -108,10 +108,13 @@ typedef struct {
108
108
intbuffer_size; /*!< Websocket buffer size */
109
109
constchar*cert_pem; /*!< Pointer to certificate data in PEM or DER format for server verify (with SSL), default is NULL, not required to verify the server. PEM-format must have a terminating NULL-character. DER-format requires the length to be passed in cert_len. */
110
110
size_tcert_len; /*!< Length of the buffer pointed to by cert_pem. May be 0 for null-terminated pem */
111
-
constchar*client_cert; /*!< Pointer to certificate data in PEM or DER format for SSL mutual authentication, default is NULL, not required if mutual authentication is not needed. If it is not NULL, also `client_key` has to be provided. PEM-format must have a terminating NULL-character. DER-format requires the length to be passed in client_cert_len. */
111
+
constchar*client_cert; /*!< Pointer to certificate data in PEM or DER format for SSL mutual authentication, default is NULL, not required if mutual authentication is not needed. If it is not NULL, also `client_key` or `client_ds_data` (if supported) has to be provided. PEM-format must have a terminating NULL-character. DER-format requires the length to be passed in client_cert_len. */
112
112
size_tclient_cert_len; /*!< Length of the buffer pointed to by client_cert. May be 0 for null-terminated pem */
113
-
constchar*client_key; /*!< Pointer to private key data in PEM or DER format for SSL mutual authentication, default is NULL, not required if mutual authentication is not needed. If it is not NULL, also `client_cert` has to be provided. PEM-format must have a terminating NULL-character. DER-format requires the length to be passed in client_key_len */
113
+
constchar*client_key; /*!< Pointer to private key data in PEM or DER format for SSL mutual authentication, default is NULL, not required if mutual authentication is not needed. If it is not NULL, also `client_cert` has to be provided and `client_ds_data` (if supported) gets ignored. PEM-format must have a terminating NULL-character. DER-format requires the length to be passed in client_key_len */
114
114
size_tclient_key_len; /*!< Length of the buffer pointed to by client_key_pem. May be 0 for null-terminated pem */
115
+
#ifCONFIG_ESP_TLS_USE_DS_PERIPHERAL
116
+
void*client_ds_data; /*!< Pointer to the encrypted private key data for SSL mutual authentication using the DS peripheral, default is NULL, not required if mutual authentication is not needed. If it is not NULL, also `client_cert` has to be provided. It is ignored if `client_key` is provided */
117
+
#endif
115
118
esp_websocket_transport_ttransport; /*!< Websocket transport type, see `esp_websocket_transport_t */
This command will extract the second certificate in the chain and save it as a pem-file.
75
75
76
+
Mutual TLS with DS Peripheral
77
+
"""""""""""""""""""""""""""""
78
+
79
+
To leverage the Digital Signature (DS) peripheral on supported targets, use `esp_secure_cert_mgr <https://github.com/espressif/esp_secure_cert_mgr/>`_ to flash an encrypted client certificate. In your project, add the dependency: ::
80
+
81
+
idf.py add-dependency esp_secure_cert_mgr
82
+
83
+
Set ``client_cert`` and ``client_ds_data`` in the config struct:
0 commit comments