WINC1500 IoT Software APIs: TLS Socket Options

WINC1500 IoT Software API

WINC1500 IoT Software APIs  19.5.2
WINC Software API Reference Manual
TLS Socket Options

Macros

#define SO_SSL_BYPASS_X509_VERIF   0x01
 
#define SO_SSL_SNI   0x02
 
#define SO_SSL_ENABLE_SESSION_CACHING   0x03
 
#define SO_SSL_ENABLE_SNI_VALIDATION   0x04
 

Detailed Description

The following list of macros are used to define SSL Socket options.

See also
setsockopt

Macro Definition Documentation

◆ SO_SSL_BYPASS_X509_VERIF

#define SO_SSL_BYPASS_X509_VERIF   0x01

Allow an opened SSL socket to bypass the X509 certificate verification process. It is highly required NOT to use this socket option in production software applications. It is supported for debugging and testing purposes. The option value should be casted to int type and it is handled as a boolean flag.

◆ SO_SSL_SNI

#define SO_SSL_SNI   0x02

Set the Server Name Indicator (SNI) for an SSL socket. The SNI is a NULL terminated string containing the server name associated with the connection. It must not exceed the size of HOSTNAME_MAX_SIZE.

◆ SO_SSL_ENABLE_SESSION_CACHING

#define SO_SSL_ENABLE_SESSION_CACHING   0x03

This option allow the TLS to cache the session information for fast TLS session establishment in future connections using the TLS Protocol session resume features.

◆ SO_SSL_ENABLE_SNI_VALIDATION

#define SO_SSL_ENABLE_SNI_VALIDATION   0x04

Enable SNI validation against the server's certificate subject common name. If there is no SNI provided (via the SO_SSL_SNI option), setting this option does nothing.

Generated on Thu Jan 26 2017 22:15:21 for WINC1500 IoT Software APIs by   doxygen 1.8.13