gojimmypi 282e559113 Update wolfcrypt settings.h for Espressif ESP-IDF | 2 months ago | |
---|---|---|
.. | ||
VisualGDB | 7 months ago | |
components | 2 months ago | |
main | 2 months ago | |
CMakeLists.txt | 2 months ago | |
README.md | 2 months ago | |
partitions_singleapp_large.csv | 11 months ago | |
sdkconfig.defaults | 2 months ago |
This is an example of a minimally viable wolfSSL template to get started with your own project.
For general information on wolfSSL examples for Espressif, see the README file.
It is assumed the ESP-IDF environment has been installed.
main.c with a simple call to an Espressif library (ESP_LOGI
) and a call to a wolfSSL library (esp_ShowExtendedSystemInfo
) .
See components/wolfssl/include directory to edit the wolfSSL user_settings.h
.
Edit main/CMakeLists.txt to add/remove source files.
The components/wolfssl/CMakeLists.txt typically does not need to be changed.
Optional VisualGDB Project for Visual Studio using ESP32 and ESP-IDF v5.1.
Edit the project CMakeLists.txt to optionally point this project's wolfSSL component source code at a different directory:
set(WOLFSSL_ROOT "~/workspace/wolfssl-other-source")
Here's an example using the command-line idf.py.
Edit your WRK_IDF_PATH
to point to your ESP-IDF install directory.
WRK_IDF_PATH=/mnt/c/SysGCC/esp32/esp-idf/v5.1
echo "Run export.sh from ${WRK_IDF_PATH}"
. ${WRK_IDF_PATH}/export.sh
# build the example:
idf.py build
# optionally erase the flash
idf.py erase-flash -p /dev/ttyS19 -b 115200
# flash the code onto the serial device at /dev/ttyS19
idf.py flash -p /dev/ttyS19 -b 115200
# build, flash, and view UART output with one command:
idf.py flash -p /dev/ttyS19 -b 115200 monitor
Press Ctrl+]
to exit idf.py monitor
. See additional monitor keyboard commands.
For examples, see:
See the README.md file in the upper level 'examples' directory for more information about examples.