mirror of
				https://github.com/esp8266/Arduino.git
				synced 2025-10-30 04:26:50 +03:00 
			
		
		
		
	* update examples * fix serial<->tcp example, use STASSID instead of SSID (name collision) * fix HTTPSRequest.ino * update AxTLS HTTPS examples, update AxTLS API to deprecated * fixes * fixes + fix astyle (no preproc directives) + restyling script * fix HTTPClient library * fixes * common.sh: do not reload arduino when already present (for locally CI testing) * common.sh: do not reload ArduinoJson when already present (for locally CI testing) * fix * fix * fix deprecated example * fix WiFiHTTPSServer.ino * reduce footprint * wipfix * fix led builtin * fix example * finished updating APSSID on all examples * style * restyle examples * helper to run CI test locally * local CI runner more verbose * +const * deprecation deprecation * deprecation * Update NTPClient.ino const char[] => const char * * Update interactive.ino const char[] => const char *
		
			
				
	
	
		
			254 lines
		
	
	
		
			7.2 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			254 lines
		
	
	
		
			7.2 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| // Demonstrate the CertStore object with WiFiClientBearSSL
 | |
| //
 | |
| // Before running, you must download the set of certs using
 | |
| // the script "certs-from-mozilla.py" (no parameters)
 | |
| // and then uploading the generated .AR file to SPIFFS or SD.
 | |
| //
 | |
| // You do not need to generate the ".IDX" file listed below,
 | |
| // it is generated automatically when the CertStore object
 | |
| // is created and written to SD or SPIFFS by the ESP8266.
 | |
| //
 | |
| // Why would you need a CertStore?
 | |
| //
 | |
| // If you know the exact server being connected to, or you
 | |
| // are generating your own self-signed certificates and aren't
 | |
| // allowing connections to HTTPS/TLS servers out of your
 | |
| // control, then you do NOT want a CertStore.  Hardcode the
 | |
| // self-signing CA or the site's x.509 certificate directly.
 | |
| //
 | |
| // However, if you don't know what specific sites the system
 | |
| // will be required to connect to and verify, a
 | |
| // CertStore can allow you to select from among
 | |
| // 10s or 100s of CAs against which you can check the
 | |
| // target's X.509, without taking any more RAM than a single
 | |
| // certificate.  This is the same way that standard browsers
 | |
| // and operating systems verify SSL connections.
 | |
| //
 | |
| // About the chosen certs:
 | |
| // The certificates are scraped from the Mozilla.org current
 | |
| // list, but please don't take this as an endorsement or a
 | |
| // requirement:  it is up to YOU, the USER, to specify the
 | |
| // certificate authorities you will use as trust bases.
 | |
| //
 | |
| // Mar 2018 by Earle F. Philhower, III
 | |
| // Released to the public domain
 | |
| 
 | |
| #include <ESP8266WiFi.h>
 | |
| #include <CertStoreBearSSL.h>
 | |
| #include <time.h>
 | |
| 
 | |
| #ifndef STASSID
 | |
| #define STASSID "your-ssid"
 | |
| #define STAPSK  "your-password"
 | |
| #endif
 | |
| 
 | |
| const char *ssid = STASSID;
 | |
| const char *pass = STAPSK;
 | |
| 
 | |
| // A single, global CertStore which can be used by all
 | |
| // connections.  Needs to stay live the entire time any of
 | |
| // the WiFiClientBearSSLs are present.
 | |
| BearSSL::CertStore certStore;
 | |
| 
 | |
| // Uncomment below to use the SD card to store the certs
 | |
| // #define USE_SDCARD 1
 | |
| 
 | |
| // NOTE: The CertStoreFile virtual class may migrate to a templated
 | |
| // model in a future release. Expect some changes to the interface,
 | |
| // no matter what, as the SD and SPIFFS filesystem get unified.
 | |
| 
 | |
| #ifdef USE_SDCARD
 | |
| 
 | |
| #include <SD.h>
 | |
| class SDCertStoreFile : public BearSSL::CertStoreFile {
 | |
|   public:
 | |
|     SDCertStoreFile(const char *name) {
 | |
|       _name = name;
 | |
|     };
 | |
|     virtual ~SDCertStoreFile() override {};
 | |
| 
 | |
|     // The main API
 | |
|     virtual bool open(bool write = false) override {
 | |
|       _file = SD.open(_name, write ? FILE_WRITE : FILE_READ);
 | |
|       return _file;
 | |
|     }
 | |
|     virtual bool seek(size_t absolute_pos) override {
 | |
|       return _file.seek(absolute_pos);
 | |
|     }
 | |
|     virtual ssize_t read(void *dest, size_t bytes) override {
 | |
|       return _file.read(dest, bytes);
 | |
|     }
 | |
|     virtual ssize_t write(void *dest, size_t bytes) override {
 | |
|       return _file.write((const uint8_t*)dest, bytes);
 | |
|     }
 | |
|     virtual void close() override {
 | |
|       _file.close();
 | |
|     }
 | |
| 
 | |
|   private:
 | |
|     File _file;
 | |
|     const char *_name;
 | |
| };
 | |
| 
 | |
| SDCertStoreFile certs_idx("/certs.idx"); // Generated by the ESP8266
 | |
| SDCertStoreFile certs_ar("/certs.ar"); // Uploaded by the user
 | |
| 
 | |
| #else
 | |
| 
 | |
| #include <FS.h>
 | |
| class SPIFFSCertStoreFile : public BearSSL::CertStoreFile {
 | |
|   public:
 | |
|     SPIFFSCertStoreFile(const char *name) {
 | |
|       _name = name;
 | |
|     };
 | |
|     virtual ~SPIFFSCertStoreFile() override {};
 | |
| 
 | |
|     // The main API
 | |
|     virtual bool open(bool write = false) override {
 | |
|       _file = SPIFFS.open(_name, write ? "w" : "r");
 | |
|       return _file;
 | |
|     }
 | |
|     virtual bool seek(size_t absolute_pos) override {
 | |
|       return _file.seek(absolute_pos, SeekSet);
 | |
|     }
 | |
|     virtual ssize_t read(void *dest, size_t bytes) override {
 | |
|       return _file.readBytes((char*)dest, bytes);
 | |
|     }
 | |
|     virtual ssize_t write(void *dest, size_t bytes) override {
 | |
|       return _file.write((uint8_t*)dest, bytes);
 | |
|     }
 | |
|     virtual void close() override {
 | |
|       _file.close();
 | |
|     }
 | |
| 
 | |
|   private:
 | |
|     File _file;
 | |
|     const char *_name;
 | |
| };
 | |
| 
 | |
| SPIFFSCertStoreFile certs_idx("/certs.idx"); // Generated by the ESP8266
 | |
| SPIFFSCertStoreFile certs_ar("/certs.ar"); // Uploaded by the user
 | |
| 
 | |
| #endif
 | |
| 
 | |
| // Set time via NTP, as required for x.509 validation
 | |
| void setClock() {
 | |
|   configTime(3 * 3600, 0, "pool.ntp.org", "time.nist.gov");
 | |
| 
 | |
|   Serial.print("Waiting for NTP time sync: ");
 | |
|   time_t now = time(nullptr);
 | |
|   while (now < 8 * 3600 * 2) {
 | |
|     delay(500);
 | |
|     Serial.print(".");
 | |
|     now = time(nullptr);
 | |
|   }
 | |
|   Serial.println("");
 | |
|   struct tm timeinfo;
 | |
|   gmtime_r(&now, &timeinfo);
 | |
|   Serial.print("Current time: ");
 | |
|   Serial.print(asctime(&timeinfo));
 | |
| }
 | |
| 
 | |
| // Try and connect using a WiFiClientBearSSL to specified host:port and dump URL
 | |
| void fetchURL(BearSSL::WiFiClientSecure *client, const char *host, const uint16_t port, const char *path) {
 | |
|   if (!path) {
 | |
|     path = "/";
 | |
|   }
 | |
| 
 | |
|   Serial.printf("Trying: %s:443...", host);
 | |
|   client->connect(host, port);
 | |
|   if (!client->connected()) {
 | |
|     Serial.printf("*** Can't connect. ***\n-------\n");
 | |
|     return;
 | |
|   }
 | |
|   Serial.printf("Connected!\n-------\n");
 | |
|   client->write("GET ");
 | |
|   client->write(path);
 | |
|   client->write(" HTTP/1.0\r\nHost: ");
 | |
|   client->write(host);
 | |
|   client->write("\r\nUser-Agent: ESP8266\r\n");
 | |
|   client->write("\r\n");
 | |
|   uint32_t to = millis() + 5000;
 | |
|   if (client->connected()) {
 | |
|     do {
 | |
|       char tmp[32];
 | |
|       memset(tmp, 0, 32);
 | |
|       int rlen = client->read((uint8_t*)tmp, sizeof(tmp) - 1);
 | |
|       yield();
 | |
|       if (rlen < 0) {
 | |
|         break;
 | |
|       }
 | |
|       // Only print out first line up to \r, then abort connection
 | |
|       char *nl = strchr(tmp, '\r');
 | |
|       if (nl) {
 | |
|         *nl = 0;
 | |
|         Serial.print(tmp);
 | |
|         break;
 | |
|       }
 | |
|       Serial.print(tmp);
 | |
|     } while (millis() < to);
 | |
|   }
 | |
|   client->stop();
 | |
|   Serial.printf("\n-------\n");
 | |
| }
 | |
| 
 | |
| void setup() {
 | |
|   Serial.begin(115200);
 | |
|   Serial.println();
 | |
|   Serial.println();
 | |
| 
 | |
| #ifdef USE_SDCARD
 | |
|   SD.begin();
 | |
| #else
 | |
|   SPIFFS.begin();
 | |
| #endif
 | |
| 
 | |
|   // We start by connecting to a WiFi network
 | |
|   Serial.print("Connecting to ");
 | |
|   Serial.println(ssid);
 | |
|   WiFi.mode(WIFI_STA);
 | |
|   WiFi.begin(ssid, pass);
 | |
| 
 | |
|   while (WiFi.status() != WL_CONNECTED) {
 | |
|     delay(500);
 | |
|     Serial.print(".");
 | |
|   }
 | |
|   Serial.println("");
 | |
| 
 | |
|   Serial.println("WiFi connected");
 | |
|   Serial.println("IP address: ");
 | |
|   Serial.println(WiFi.localIP());
 | |
| 
 | |
|   setClock(); // Required for X.509 validation
 | |
| 
 | |
|   int numCerts = certStore.initCertStore(&certs_idx, &certs_ar);
 | |
|   Serial.printf("Number of CA certs read: %d\n", numCerts);
 | |
|   if (numCerts == 0) {
 | |
|     Serial.printf("No certs found. Did you run certs-from-mozill.py and upload the SPIFFS directory before running?\n");
 | |
|     return; // Can't connect to anything w/o certs!
 | |
|   }
 | |
| 
 | |
|   BearSSL::WiFiClientSecure *bear = new BearSSL::WiFiClientSecure();
 | |
|   // Integrate the cert store with this connection
 | |
|   bear->setCertStore(&certStore);
 | |
|   Serial.printf("Attempting to fetch https://www.github.com/...\n");
 | |
|   fetchURL(bear, "www.github.com", 443, "/");
 | |
|   delete bear;
 | |
| }
 | |
| 
 | |
| void loop() {
 | |
|   Serial.printf("\nPlease enter a website address (www.blah.com) to connect to: ");
 | |
|   String site;
 | |
|   do {
 | |
|     site = Serial.readString();
 | |
|   } while (site == "");
 | |
|   Serial.printf("https://%s/\n", site.c_str());
 | |
| 
 | |
|   BearSSL::WiFiClientSecure *bear = new BearSSL::WiFiClientSecure();
 | |
|   // Integrate the cert store with this connection
 | |
|   bear->setCertStore(&certStore);
 | |
|   fetchURL(bear, site.c_str(), 443, "/");
 | |
|   delete bear;
 | |
| }
 | |
| 
 |