gojimmypi 17c663b257 Espressif README files 11 kuukautta sitten
..
VisualGDB 5b01270205 Update all Expressif examples, ready for PR #6990 1 vuosi sitten
components fb77319758 Espressif examples: polish & misc updates 11 kuukautta sitten
main fb77319758 Espressif examples: polish & misc updates 11 kuukautta sitten
CMakeLists.txt 5b01270205 Update all Expressif examples, ready for PR #6990 1 vuosi sitten
Makefile 82d531562c Fixed build warnings due to esp-idf update 5 vuotta sitten
README.md 17c663b257 Espressif README files 11 kuukautta sitten
README_server_sm.md 5b01270205 Update all Expressif examples, ready for PR #6990 1 vuosi sitten
partitions_singleapp_large.csv 5b01270205 Update all Expressif examples, ready for PR #6990 1 vuosi sitten
sdkconfig.defaults 24f89337f6 Espressif examples default partition params: large app 1 vuosi sitten

README.md

wolfSSL TLS Client Example

This is the wolfSSL TLS Client demo, typically used with the Espressif TLS Server or the CLI Server.

When using the CLI, see the example parameters.

For general information on wolfSSL examples for Espressif, see the README file.

VisualGDB

Open the VisualGDB Visual Studio Project file in the VisualGDB directory and click the "Start" button. No wolfSSL setup is needed. You may need to adjust your specific COM port. The default is COM20.

ESP-IDF Commandline

  1. idf.py menuconfig to config the project

    1-1. Example Configuration ->

      Target host ip address : the host that you want to connect to.(default is 127.0.0.1)
    

    1-2. Example Connection Configuration ->

      WIFI SSID: your own WIFI, which is connected to the Internet.(default is "myssid")  
      WIFI Password: WIFI password, and default is "mypassword"
    

    Note: the example program uses 11111 port. If you want to use different port

    , you need to modify DEFAULT_PORT definition in the code.
    

When you want to test the wolfSSL client

  1. idf.py -p <PORT> flash and then idf.py monitor to load the firmware and see the context
  2. You can use /examples/server/server program for test.

     e.g. Launch ./examples/server/server -v 4 -b -i -d
    

  3. SM Ciphers

    Working Linux Client to ESP32 Server

    Command:

    cd /mnt/c/workspace/wolfssl-$USER/IDE/Espressif/ESP-IDF/examples/wolfssl_server
    . /mnt/c/SysGCC/esp32/esp-idf/v5.1/export.sh
    idf.py flash -p /dev/ttyS19 -b 115200 monitor
    
    
    cd /mnt/c/workspace/wolfssl-$USER
    
    ./examples/client/client  -h 192.168.1.108 -v 4 -l TLS_SM4_GCM_SM3 -c ./certs/sm2/client-sm2.pem -k ./certs/sm2/client-sm2-priv.pem     -A ./certs/sm2/root-sm2.pem -C
    

    Output:

    SSL version is TLSv1.3
    SSL cipher suite is TLS_SM4_GCM_SM3
    SSL curve name is SM2P256V1
    I hear you fa shizzle!
    

    Linux client to Linux server:

    ./examples/client/client  -h 127.0.0.1 -v 4 -l ECDHE-ECDSA-SM4-CBC-SM3     -c ./certs/sm2/client-sm2.pem -k ./certs/sm2/client-sm2-priv.pem     -A ./certs/sm2/root-sm2.pem -C
    
    ./examples/server/server                   -v 3 -l ECDHE-ECDSA-SM4-CBC-SM3     -c ./certs/sm2/server-sm2.pem -k ./certs/sm2/server-sm2-priv.pem     -A ./certs/sm2/client-sm2.pem -V
    

    See the README.md file in the upper level 'examples' directory for more information about examples.