mirror of
				https://github.com/esp8266/Arduino.git
				synced 2025-10-30 04:26:50 +03:00 
			
		
		
		
	* ArduinoOTA: allow use without MDNS, add MDNS.update() in handle() * Update examples with MDNS.update() in loop * Update CaptivePortalAdvanced.ino Fix typo * Update CaptivePortalAdvanced.ino astyle * Update Arduino_Wifi_AVRISP.ino astyle
		
			
				
	
	
		
			186 lines
		
	
	
		
			7.8 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			186 lines
		
	
	
		
			7.8 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*
 | |
|   HelloServerSecure - Simple HTTPS server example
 | |
| 
 | |
|   This example demonstrates a basic ESP8266WebServerSecure HTTPS server
 | |
|   that can serve "/" and "/inline" and generate detailed 404 (not found)
 | |
|   HTTP respoinses.  Be sure to update the SSID and PASSWORD before running
 | |
|   to allow connection to your WiFi network.
 | |
| 
 | |
|   IMPORTANT NOTES ABOUT SSL CERTIFICATES
 | |
| 
 | |
|   1. USE/GENERATE YOUR OWN CERTIFICATES
 | |
|     While a sample, self-signed certificate is included in this example,
 | |
|     it is ABSOLUTELY VITAL that you use your own SSL certificate in any
 | |
|     real-world deployment.  Anyone with the certificate and key may be
 | |
|     able to decrypt your traffic, so your own keys should be kept in a
 | |
|     safe manner, not accessible on any public network.
 | |
| 
 | |
|   2. HOW TO GENERATE YOUR OWN CERTIFICATE/KEY PAIR
 | |
|     A sample script, "make-self-signed-cert.sh" is provided in the
 | |
|     ESP8266WiFi/examples/WiFiHTTPSServer directory.  This script can be
 | |
|     modified (replace "your-name-here" with your Organization name).  Note
 | |
|     that this will be a *self-signed certificate* and will *NOT* be accepted
 | |
|     by default by most modern browsers.  They'll display something like,
 | |
|     "This certificate is from an untrusted source," or "Your connection is
 | |
|     not secure," or "Your connection is not private," and the user will
 | |
|     have to manully allow the browser to continue by using the
 | |
|     "Advanced/Add Exception" (FireFox) or "Advanced/Proceed" (Chrome) link.
 | |
| 
 | |
|     You may also, of course, use a commercial, trusted SSL provider to
 | |
|     generate your certificate.  When requesting the certificate, you'll
 | |
|     need to specify that it use SHA256 and 1024 or 512 bits in order to
 | |
|     function with the axTLS implementation in the ESP8266.
 | |
| 
 | |
|   Interactive usage:
 | |
|     Go to https://esp8266-webupdate.local/firmware, enter the username
 | |
|     and password, and the select a new BIN to upload.
 | |
| 
 | |
|   To upload through terminal you can use:
 | |
|   curl -u admin:admin -F "image=@firmware.bin" esp8266-webupdate.local/firmware
 | |
| 
 | |
|   Adapted by Earle F. Philhower, III, from the HelloServer.ino example.
 | |
|   This example is released into the public domain.
 | |
| */
 | |
| #include <ESP8266WiFi.h>
 | |
| #include <WiFiClient.h>
 | |
| #include <ESP8266WebServerSecure.h>
 | |
| #include <ESP8266mDNS.h>
 | |
| 
 | |
| #ifndef STASSID
 | |
| #define STASSID "your-ssid"
 | |
| #define STAPSK  "your-password"
 | |
| #endif
 | |
| 
 | |
| const char* ssid = STASSID;
 | |
| const char* password = STAPSK;
 | |
| 
 | |
| ESP8266WebServerSecure server(443);
 | |
| 
 | |
| // The certificate is stored in PMEM
 | |
| static const uint8_t x509[] PROGMEM = {
 | |
|   0x30, 0x82, 0x01, 0x3d, 0x30, 0x81, 0xe8, 0x02, 0x09, 0x00, 0xfe, 0x56,
 | |
|   0x46, 0xf2, 0x78, 0xc6, 0x51, 0x17, 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86,
 | |
|   0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b, 0x05, 0x00, 0x30, 0x26, 0x31,
 | |
|   0x10, 0x30, 0x0e, 0x06, 0x03, 0x55, 0x04, 0x0a, 0x0c, 0x07, 0x45, 0x53,
 | |
|   0x50, 0x38, 0x32, 0x36, 0x36, 0x31, 0x12, 0x30, 0x10, 0x06, 0x03, 0x55,
 | |
|   0x04, 0x03, 0x0c, 0x09, 0x31, 0x32, 0x37, 0x2e, 0x30, 0x2e, 0x30, 0x2e,
 | |
|   0x31, 0x30, 0x1e, 0x17, 0x0d, 0x31, 0x37, 0x30, 0x33, 0x31, 0x38, 0x31,
 | |
|   0x34, 0x34, 0x39, 0x31, 0x38, 0x5a, 0x17, 0x0d, 0x33, 0x30, 0x31, 0x31,
 | |
|   0x32, 0x35, 0x31, 0x34, 0x34, 0x39, 0x31, 0x38, 0x5a, 0x30, 0x26, 0x31,
 | |
|   0x10, 0x30, 0x0e, 0x06, 0x03, 0x55, 0x04, 0x0a, 0x0c, 0x07, 0x45, 0x53,
 | |
|   0x50, 0x38, 0x32, 0x36, 0x36, 0x31, 0x12, 0x30, 0x10, 0x06, 0x03, 0x55,
 | |
|   0x04, 0x03, 0x0c, 0x09, 0x31, 0x32, 0x37, 0x2e, 0x30, 0x2e, 0x30, 0x2e,
 | |
|   0x31, 0x30, 0x5c, 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7,
 | |
|   0x0d, 0x01, 0x01, 0x01, 0x05, 0x00, 0x03, 0x4b, 0x00, 0x30, 0x48, 0x02,
 | |
|   0x41, 0x00, 0xc6, 0x72, 0x6c, 0x12, 0xe1, 0x20, 0x4d, 0x10, 0x0c, 0xf7,
 | |
|   0x3a, 0x2a, 0x5a, 0x49, 0xe2, 0x2d, 0xc9, 0x7a, 0x63, 0x1d, 0xef, 0xc6,
 | |
|   0xbb, 0xa3, 0xd6, 0x6f, 0x59, 0xcb, 0xd5, 0xf6, 0xbe, 0x34, 0x83, 0x33,
 | |
|   0x50, 0x80, 0xec, 0x49, 0x63, 0xbf, 0xee, 0x59, 0x94, 0x67, 0x8b, 0x8d,
 | |
|   0x81, 0x85, 0x23, 0x24, 0x06, 0x52, 0x76, 0x55, 0x9d, 0x18, 0x09, 0xb3,
 | |
|   0x3c, 0x10, 0x40, 0x05, 0x01, 0xf3, 0x02, 0x03, 0x01, 0x00, 0x01, 0x30,
 | |
|   0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b,
 | |
|   0x05, 0x00, 0x03, 0x41, 0x00, 0x69, 0xdc, 0x6c, 0x9b, 0xa7, 0x62, 0x57,
 | |
|   0x7e, 0x03, 0x01, 0x45, 0xad, 0x9a, 0x83, 0x90, 0x3a, 0xe7, 0xdf, 0xe8,
 | |
|   0x8f, 0x46, 0x00, 0xd3, 0x5f, 0x2b, 0x0a, 0xde, 0x92, 0x1b, 0xc5, 0x04,
 | |
|   0xc5, 0xc0, 0x76, 0xf4, 0xf6, 0x08, 0x36, 0x97, 0x27, 0x82, 0xf1, 0x60,
 | |
|   0x76, 0xc2, 0xcd, 0x67, 0x6c, 0x4b, 0x6c, 0xca, 0xfd, 0x97, 0xfd, 0x33,
 | |
|   0x9e, 0x12, 0x67, 0x6b, 0x98, 0x7e, 0xd5, 0x80, 0x8f
 | |
| };
 | |
| 
 | |
| // And so is the key.  These could also be in DRAM
 | |
| static const uint8_t rsakey[] PROGMEM = {
 | |
|   0x30, 0x82, 0x01, 0x3a, 0x02, 0x01, 0x00, 0x02, 0x41, 0x00, 0xc6, 0x72,
 | |
|   0x6c, 0x12, 0xe1, 0x20, 0x4d, 0x10, 0x0c, 0xf7, 0x3a, 0x2a, 0x5a, 0x49,
 | |
|   0xe2, 0x2d, 0xc9, 0x7a, 0x63, 0x1d, 0xef, 0xc6, 0xbb, 0xa3, 0xd6, 0x6f,
 | |
|   0x59, 0xcb, 0xd5, 0xf6, 0xbe, 0x34, 0x83, 0x33, 0x50, 0x80, 0xec, 0x49,
 | |
|   0x63, 0xbf, 0xee, 0x59, 0x94, 0x67, 0x8b, 0x8d, 0x81, 0x85, 0x23, 0x24,
 | |
|   0x06, 0x52, 0x76, 0x55, 0x9d, 0x18, 0x09, 0xb3, 0x3c, 0x10, 0x40, 0x05,
 | |
|   0x01, 0xf3, 0x02, 0x03, 0x01, 0x00, 0x01, 0x02, 0x40, 0x35, 0x0b, 0x74,
 | |
|   0xd3, 0xff, 0x15, 0x51, 0x44, 0x0f, 0x13, 0x2e, 0x9b, 0x0f, 0x93, 0x5c,
 | |
|   0x3f, 0xfc, 0xf1, 0x17, 0xf9, 0x72, 0x94, 0x5e, 0xa7, 0xc6, 0xb3, 0xf0,
 | |
|   0xfe, 0xc9, 0x6c, 0xb1, 0x1e, 0x83, 0xb3, 0xc6, 0x45, 0x3a, 0x25, 0x60,
 | |
|   0x7c, 0x3d, 0x92, 0x7d, 0x53, 0xec, 0x49, 0x8d, 0xb5, 0x45, 0x10, 0x99,
 | |
|   0x9b, 0xc6, 0x22, 0x3a, 0x68, 0xc7, 0x13, 0x4e, 0xb6, 0x04, 0x61, 0x21,
 | |
|   0x01, 0x02, 0x21, 0x00, 0xea, 0x8c, 0x21, 0xd4, 0x7f, 0x3f, 0xb6, 0x91,
 | |
|   0xfa, 0xf8, 0xb9, 0x2d, 0xcb, 0x36, 0x36, 0x02, 0x5f, 0xf0, 0x0c, 0x6e,
 | |
|   0x87, 0xaa, 0x5c, 0x14, 0xf6, 0x56, 0x8e, 0x12, 0x92, 0x25, 0xde, 0xb3,
 | |
|   0x02, 0x21, 0x00, 0xd8, 0x99, 0x01, 0xf1, 0x04, 0x0b, 0x98, 0xa3, 0x71,
 | |
|   0x56, 0x1d, 0xea, 0x6f, 0x45, 0xd1, 0x36, 0x70, 0x76, 0x8b, 0xab, 0x69,
 | |
|   0x30, 0x58, 0x9c, 0xe0, 0x45, 0x97, 0xe7, 0xb6, 0xb5, 0xef, 0xc1, 0x02,
 | |
|   0x21, 0x00, 0xa2, 0x01, 0x06, 0xc0, 0xf2, 0xdf, 0xbc, 0x28, 0x1a, 0xb4,
 | |
|   0xbf, 0x9b, 0x5c, 0xd8, 0x65, 0xf7, 0xbf, 0xf2, 0x5b, 0x73, 0xe0, 0xeb,
 | |
|   0x0f, 0xcd, 0x3e, 0xd5, 0x4c, 0x2e, 0x91, 0x99, 0xec, 0xb7, 0x02, 0x20,
 | |
|   0x4b, 0x9d, 0x46, 0xd7, 0x3c, 0x01, 0x4c, 0x5d, 0x2a, 0xb0, 0xd4, 0xaa,
 | |
|   0xc6, 0x03, 0xca, 0xa0, 0xc5, 0xac, 0x2c, 0xe0, 0x3f, 0x4d, 0x98, 0x71,
 | |
|   0xd3, 0xbd, 0x97, 0xe5, 0x55, 0x9c, 0xb8, 0x41, 0x02, 0x20, 0x02, 0x42,
 | |
|   0x9f, 0xd1, 0x06, 0x35, 0x3b, 0x42, 0xf5, 0x64, 0xaf, 0x6d, 0xbf, 0xcd,
 | |
|   0x2c, 0x3a, 0xcd, 0x0a, 0x9a, 0x4d, 0x7c, 0xad, 0x29, 0xd6, 0x36, 0x57,
 | |
|   0xd5, 0xdf, 0x34, 0xeb, 0x26, 0x03
 | |
| };
 | |
| 
 | |
| const int led = 13;
 | |
| 
 | |
| void handleRoot() {
 | |
|   digitalWrite(led, 1);
 | |
|   server.send(200, "text/plain", "Hello from esp8266 over HTTPS!");
 | |
|   digitalWrite(led, 0);
 | |
| }
 | |
| 
 | |
| void handleNotFound() {
 | |
|   digitalWrite(led, 1);
 | |
|   String message = "File Not Found\n\n";
 | |
|   message += "URI: ";
 | |
|   message += server.uri();
 | |
|   message += "\nMethod: ";
 | |
|   message += (server.method() == HTTP_GET) ? "GET" : "POST";
 | |
|   message += "\nArguments: ";
 | |
|   message += server.args();
 | |
|   message += "\n";
 | |
|   for (uint8_t i = 0; i < server.args(); i++) {
 | |
|     message += " " + server.argName(i) + ": " + server.arg(i) + "\n";
 | |
|   }
 | |
|   server.send(404, "text/plain", message);
 | |
|   digitalWrite(led, 0);
 | |
| }
 | |
| 
 | |
| void setup(void) {
 | |
|   pinMode(led, OUTPUT);
 | |
|   digitalWrite(led, 0);
 | |
|   Serial.begin(115200);
 | |
|   WiFi.begin(ssid, password);
 | |
|   Serial.println("");
 | |
| 
 | |
|   // Wait for connection
 | |
|   while (WiFi.status() != WL_CONNECTED) {
 | |
|     delay(500);
 | |
|     Serial.print(".");
 | |
|   }
 | |
|   Serial.println("");
 | |
|   Serial.print("Connected to ");
 | |
|   Serial.println(ssid);
 | |
|   Serial.print("IP address: ");
 | |
|   Serial.println(WiFi.localIP());
 | |
| 
 | |
|   if (MDNS.begin("esp8266")) {
 | |
|     Serial.println("MDNS responder started");
 | |
|   }
 | |
| 
 | |
|   server.setServerKeyAndCert_P(rsakey, sizeof(rsakey), x509, sizeof(x509));
 | |
| 
 | |
|   server.on("/", handleRoot);
 | |
| 
 | |
|   server.on("/inline", []() {
 | |
|     server.send(200, "text/plain", "this works as well");
 | |
|   });
 | |
| 
 | |
|   server.onNotFound(handleNotFound);
 | |
| 
 | |
|   server.begin();
 | |
|   Serial.println("HTTPS server started");
 | |
| }
 | |
| 
 | |
| void loop(void) {
 | |
|   server.handleClient();
 | |
|   MDNS.update();
 | |
| }
 |