wolfssl-examples/wolfCLU
kaleb-himes ae52a5d380 include main header for options.h prior to other wolfSSL headers 2017-08-11 10:52:30 -06:00
..
build-aux remove commented lines in Benchmark from debugging and remove files from version control 2016-09-15 10:23:01 -06:00
clu_include adding keygeneration framework and ed25519 der creation, update license 2017-05-03 14:54:15 -06:00
clu_src include main header for options.h prior to other wolfSSL headers 2017-08-11 10:52:30 -06:00
config wolfCLU Init 2016-01-05 16:23:42 -07:00
m4 remove commented lines in Benchmark from debugging and remove files from version control 2016-09-15 10:23:01 -06:00
manpages full API updates to reflect design change 2016-11-27 07:01:29 -07:00
testing-certs increase default max cert size to handle chain certificate 2016-11-25 19:45:56 -07:00
tests addition error check and test cases 2016-11-28 08:57:19 -07:00
.gitignore portability update for linux /bin/sh script 2016-11-27 17:24:26 -07:00
Makefile.am full API updates to reflect design change 2016-11-27 07:01:29 -07:00
README.md adding keygeneration framework and ed25519 der creation, update license 2017-05-03 14:54:15 -06:00
autogen.sh wolfCLU Init 2016-01-05 16:23:42 -07:00
configure.ac version update 2016-11-24 08:49:17 -07:00

README.md

wolfCLU

This is the wolfSSL: Command Line Utility (wolfCLU).

wolfSSL Install

To use this feature, please configure and install wolfssl with the following commands:

./configure --enable-pwdbased --enable-opensslextra && make && make check

If that succeeds, run:

sudo make install

--enable-pwdbased is for password based encryption allowing the user to specify a unique password known only to him/her self and the recipient of the encrypted file.

--enable-opensslextra provides utility for a hex to binary conversion of hexidecimal values.

--enable-base64encode enables Base64 encoding (not on by default)

Additional features that can be included when configuring wolfssl for encryption or decryption are:

    --enable-camellia
    --enable-des3
    --enable-blake2
    --enable-sha512
    --enable-fortress

Additional features that can be included when configuring wolfssl for key generation are:

    --enable-ed25519

##wolfCLU Install

After wolfssl is installed, install wolfCLU. In the directory wolfssl-examples/wolfCLU enter the following commands:

./autogen.sh
./configure
make
(optionally) make check OR make test
sudo make install

Now you should be able to use the wolfssl command line tool. To verify type:

wolfssl -h

If everything worked, you should see the wolfssl help page.

Example Usages

Base64

Encode

./wolfssl -hash base64enc -in README.md > README_encoded.md

Decode

./wolfssl -hash base64dec -in README_encoded.md

X509

wolfssl -x509 -inform pem -in testing-certs/ca-cert.pem -outform der -out outputfilename.der
wolfssl -x509 -inform der -in testing-certs/ca-cert.der -outform pem -out outputfilename.pem

Contacts

Please contact support@wolfssl.com with any questions or comments

License

Copyright (c) 2006-2017 wolfSSL Inc.