You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Improve user_settings.h examples and add validation rules
- Standardize header guards to WOLFSSL_USER_SETTINGS_H across all files
- Add #if 0/1 gates with labels for easy feature toggling
- Fix bugs: typos in eccnonblock (WOLFSL_SHA*), duplicates in fipsv5/all
- Add NO_DES3_TLS_SUITES alongside NO_DES3 where needed
- Update wolfboot_keytools with upstream PQ algorithms (ML-DSA, LMS, XMSS)
- Add settings.h validation rules with descriptive error messages
- Auto-define NO_DES3_TLS_SUITES when NO_DES3 is set (instead of error)
- Update README.md and add missing files to CI tests
Copy file name to clipboardExpand all lines: examples/configs/README.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,17 +4,19 @@ Example wolfSSL configuration file templates for use when autoconf is not availa
4
4
5
5
## Files
6
6
7
-
*`user_settings_template.h`: Template that allows modular algorithm and feature selection using `#if 0` logic.
7
+
*`user_settings_template.h`: Template that allows modular algorithm and feature selection using `#if 0`/`#if 1` gates.
8
8
*`user_settings_all.h`: This is wolfSSL with all features enabled. Equivalent to `./configure --enable-all`.
9
9
*`user_settings_arduino.h`: An example Arduino file. See also [wolfSSL/Arduino-wolfSSL](https://github.com/wolfSSL/Arduino-wolfSSL).
10
-
*.`user_settings_EBSnet.h`: Example configuration file for use with EBSnet ports.
10
+
*`user_settings_EBSnet.h`: Example configuration file for use with EBSnet ports.
11
+
*`user_settings_eccnonblock.h`: Example for non-blocking ECC crypto only. See comment at top for test results.
12
+
*`user_settings_espressif.h`: Example configuration for Espressif ESP32. See also [wolfSSL/IDE/Espressif](https://github.com/wolfSSL/wolfssl/tree/master/IDE/Espressif).
11
13
*`user_settings_fipsv2.h`: The FIPS v2 (3389) 140-2 certificate build options.
12
14
*`user_settings_fipsv5.h`: The FIPS v5 (ready) 140-3 build options. Equivalent to `./configure --enable-fips=v5-dev`.
13
-
*`user_settings_min_ecc.h`: This is ECC and SHA-256 only. For ECC verify only add `BUILD_VERIFY_ONLY`.
14
-
*`user_settings_platformio.h`: An example for PlatformIO library. See also [platformio/wolfssl](https://registry.platformio.org/libraries/wolfssl/wolfssl)
15
+
*`user_settings_min_ecc.h`: Minimal ECC and SHA-256 only (no TLS). For ECC verify only add `NO_ECC_SIGN`.
16
+
*`user_settings_platformio.h`: An example for PlatformIO library. See also [platformio/wolfssl](https://registry.platformio.org/libraries/wolfssl/wolfssl).
15
17
*`user_settings_stm32.h`: Example configuration file generated from the wolfSSL STM32 Cube pack.
16
-
*`user_settings_tls12`: Example for TLS v1.2 client only, ECC only, AESGCM only, SHA2-256 only.
17
-
*`user_settings_wolfboot_keytools.h`: This from wolfBoot tools/keytools and is ECC, RSA, ED25519and ChaCha20.
18
+
*`user_settings_tls12.h`: Example for TLS v1.2 client only, ECC only, AES-GCM only, SHA2-256 only.
19
+
*`user_settings_wolfboot_keytools.h`: wolfBoot key generation and signing tool. Supports ECC, RSA, ED25519, ED448, and post-quantum (ML-DSA/Dilithium, LMS, XMSS).
18
20
*`user_settings_wolfssh.h`: Minimum options for building wolfSSH. See comment at top for ./configure used to generate.
19
21
*`user_settings_wolftpm.h`: Minimum options for building wolfTPM. See comment at top for ./configure used to generate.
0 commit comments