mirror of
				https://github.com/esp8266/Arduino.git
				synced 2025-11-03 14:33:37 +03:00 
			
		
		
		
	* update examples * fix serial<->tcp example, use STASSID instead of SSID (name collision) * fix HTTPSRequest.ino * update AxTLS HTTPS examples, update AxTLS API to deprecated * fixes * fixes + fix astyle (no preproc directives) + restyling script * fix HTTPClient library * fixes * common.sh: do not reload arduino when already present (for locally CI testing) * common.sh: do not reload ArduinoJson when already present (for locally CI testing) * fix * fix * fix deprecated example * fix WiFiHTTPSServer.ino * reduce footprint * wipfix * fix led builtin * fix example * finished updating APSSID on all examples * style * restyle examples * helper to run CI test locally * local CI runner more verbose * +const * deprecation deprecation * deprecation * Update NTPClient.ino const char[] => const char * * Update interactive.ino const char[] => const char *
		
			
				
	
	
		
			265 lines
		
	
	
		
			8.7 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			265 lines
		
	
	
		
			8.7 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
// Example of the different modes of the X.509 validation options
 | 
						|
// in the WiFiClientBearSSL object
 | 
						|
//
 | 
						|
// Mar 2018 by Earle F. Philhower, III
 | 
						|
// Released to the public domain
 | 
						|
 | 
						|
#include <ESP8266WiFi.h>
 | 
						|
#include <WiFiClientSecure.h>
 | 
						|
#include <time.h>
 | 
						|
 | 
						|
#ifndef STASSID
 | 
						|
#define STASSID "your-ssid"
 | 
						|
#define STAPSK  "your-password"
 | 
						|
#endif
 | 
						|
 | 
						|
const char *ssid = STASSID;
 | 
						|
const char *pass = STAPSK;
 | 
						|
 | 
						|
const char *   host = "api.github.com";
 | 
						|
const uint16_t port = 443;
 | 
						|
const char *   path = "/";
 | 
						|
 | 
						|
// Set time via NTP, as required for x.509 validation
 | 
						|
void setClock() {
 | 
						|
  configTime(3 * 3600, 0, "pool.ntp.org", "time.nist.gov");
 | 
						|
 | 
						|
  Serial.print("Waiting for NTP time sync: ");
 | 
						|
  time_t now = time(nullptr);
 | 
						|
  while (now < 8 * 3600 * 2) {
 | 
						|
    delay(500);
 | 
						|
    Serial.print(".");
 | 
						|
    now = time(nullptr);
 | 
						|
  }
 | 
						|
  Serial.println("");
 | 
						|
  struct tm timeinfo;
 | 
						|
  gmtime_r(&now, &timeinfo);
 | 
						|
  Serial.print("Current time: ");
 | 
						|
  Serial.print(asctime(&timeinfo));
 | 
						|
}
 | 
						|
 | 
						|
// Try and connect using a WiFiClientBearSSL to specified host:port and dump HTTP response
 | 
						|
void fetchURL(BearSSL::WiFiClientSecure *client, const char *host, const uint16_t port, const char *path) {
 | 
						|
  if (!path) {
 | 
						|
    path = "/";
 | 
						|
  }
 | 
						|
 | 
						|
  ESP.resetFreeContStack();
 | 
						|
  uint32_t freeStackStart = ESP.getFreeContStack();
 | 
						|
  Serial.printf("Trying: %s:443...", host);
 | 
						|
  client->connect(host, port);
 | 
						|
  if (!client->connected()) {
 | 
						|
    Serial.printf("*** Can't connect. ***\n-------\n");
 | 
						|
    return;
 | 
						|
  }
 | 
						|
  Serial.printf("Connected!\n-------\n");
 | 
						|
  client->write("GET ");
 | 
						|
  client->write(path);
 | 
						|
  client->write(" HTTP/1.0\r\nHost: ");
 | 
						|
  client->write(host);
 | 
						|
  client->write("\r\nUser-Agent: ESP8266\r\n");
 | 
						|
  client->write("\r\n");
 | 
						|
  uint32_t to = millis() + 5000;
 | 
						|
  if (client->connected()) {
 | 
						|
    do {
 | 
						|
      char tmp[32];
 | 
						|
      memset(tmp, 0, 32);
 | 
						|
      int rlen = client->read((uint8_t*)tmp, sizeof(tmp) - 1);
 | 
						|
      yield();
 | 
						|
      if (rlen < 0) {
 | 
						|
        break;
 | 
						|
      }
 | 
						|
      // Only print out first line up to \r, then abort connection
 | 
						|
      char *nl = strchr(tmp, '\r');
 | 
						|
      if (nl) {
 | 
						|
        *nl = 0;
 | 
						|
        Serial.print(tmp);
 | 
						|
        break;
 | 
						|
      }
 | 
						|
      Serial.print(tmp);
 | 
						|
    } while (millis() < to);
 | 
						|
  }
 | 
						|
  client->stop();
 | 
						|
  uint32_t freeStackEnd = ESP.getFreeContStack();
 | 
						|
  Serial.printf("\nCONT stack used: %d\n-------\n\n", freeStackStart - freeStackEnd);
 | 
						|
}
 | 
						|
 | 
						|
void fetchNoConfig() {
 | 
						|
  Serial.printf(R"EOF(
 | 
						|
If there are no CAs or insecure options specified, BearSSL will not connect.
 | 
						|
Expect the following call to fail as none have been configured.
 | 
						|
)EOF");
 | 
						|
  BearSSL::WiFiClientSecure client;
 | 
						|
  fetchURL(&client, host, port, path);
 | 
						|
}
 | 
						|
 | 
						|
void fetchInsecure() {
 | 
						|
  Serial.printf(R"EOF(
 | 
						|
This is absolutely *insecure*, but you can tell BearSSL not to check the
 | 
						|
certificate of the server.  In this mode it will accept ANY certificate,
 | 
						|
which is subject to man-in-the-middle (MITM) attacks.
 | 
						|
)EOF");
 | 
						|
  BearSSL::WiFiClientSecure client;
 | 
						|
  client.setInsecure();
 | 
						|
  fetchURL(&client, host, port, path);
 | 
						|
}
 | 
						|
 | 
						|
void fetchFingerprint() {
 | 
						|
  Serial.printf(R"EOF(
 | 
						|
The SHA-1 fingerprint of an X.509 certificate can be used to validate it
 | 
						|
instead of the while certificate.  This is not nearly as secure as real
 | 
						|
X.509 validation, but is better than nothing.
 | 
						|
)EOF");
 | 
						|
  BearSSL::WiFiClientSecure client;
 | 
						|
  static const char fp[] PROGMEM = "5F:F1:60:31:09:04:3E:F2:90:D2:B0:8A:50:38:04:E8:37:9F:BC:76";
 | 
						|
  client.setFingerprint(fp);
 | 
						|
  fetchURL(&client, host, port, path);
 | 
						|
}
 | 
						|
 | 
						|
void fetchSelfSigned() {
 | 
						|
  Serial.printf(R"EOF(
 | 
						|
It is also possible to accept *any* self-signed certificate.  This is
 | 
						|
absolutely insecure as anyone can make a self-signed certificate.
 | 
						|
)EOF");
 | 
						|
  BearSSL::WiFiClientSecure client;
 | 
						|
  Serial.printf("First, try and connect to a badssl.com self-signed website (will fail):\n");
 | 
						|
  fetchURL(&client, "self-signed.badssl.com", 443, "/");
 | 
						|
  Serial.printf("Now we'll enable self-signed certs (will pass)\n");
 | 
						|
  client.allowSelfSignedCerts();
 | 
						|
  fetchURL(&client, "self-signed.badssl.com", 443, "/");
 | 
						|
}
 | 
						|
 | 
						|
void fetchKnownKey() {
 | 
						|
  Serial.printf(R"EOF(
 | 
						|
The server certificate can be completely ignored and its public key
 | 
						|
hardcoded in your application. This should be secure as the public key
 | 
						|
needs to be paired with the private key of the site, which is obviously
 | 
						|
private and not shared.  A MITM without the private key would not be
 | 
						|
able to establish communications.
 | 
						|
)EOF");
 | 
						|
  // Extracted by: openssl x509 -pubkey -noout -in servercert.pem
 | 
						|
  static const char pubkey[] PROGMEM = R"KEY(
 | 
						|
-----BEGIN PUBLIC KEY-----
 | 
						|
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAy+3Up8qBkIn/7S9AfWlH
 | 
						|
Od8SdXmnWx+JCIHvnWzjFcLeLvQb2rMqqCDL5XDlvkyC5SZ8ZyLITemej5aJYuBv
 | 
						|
zcKPzyZ0QfYZiskU9nzL2qBQj8alzJJ/Cc32AWuuWrPrzVxBmOEW9gRCGFCD3m0z
 | 
						|
53y6GjcmBS2wcX7RagqbD7g2frEGko4G7kmW96H6dyh2j9Rou8TwAK6CnbiXPAM/
 | 
						|
5Q6dyfdYlHOCgP75F7hhdKB5gpprm9A/OnQsmZjUPzy4u0EKCxE8MfhBerZrZdod
 | 
						|
88ZdDG3CvTgm050bc+lGlbsT+s09lp0dgxSZIeI8+syV2Owt4YF/PdjeeymtzQdI
 | 
						|
wQIDAQAB
 | 
						|
-----END PUBLIC KEY-----
 | 
						|
)KEY";
 | 
						|
  BearSSL::WiFiClientSecure client;
 | 
						|
  BearSSL::PublicKey key(pubkey);
 | 
						|
  client.setKnownKey(&key);
 | 
						|
  fetchURL(&client, host, port, path);
 | 
						|
}
 | 
						|
 | 
						|
void fetchCertAuthority() {
 | 
						|
  static const char digicert[] PROGMEM = R"EOF(
 | 
						|
-----BEGIN CERTIFICATE-----
 | 
						|
MIIDxTCCAq2gAwIBAgIQAqxcJmoLQJuPC3nyrkYldzANBgkqhkiG9w0BAQUFADBs
 | 
						|
MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3
 | 
						|
d3cuZGlnaWNlcnQuY29tMSswKQYDVQQDEyJEaWdpQ2VydCBIaWdoIEFzc3VyYW5j
 | 
						|
ZSBFViBSb290IENBMB4XDTA2MTExMDAwMDAwMFoXDTMxMTExMDAwMDAwMFowbDEL
 | 
						|
MAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3
 | 
						|
LmRpZ2ljZXJ0LmNvbTErMCkGA1UEAxMiRGlnaUNlcnQgSGlnaCBBc3N1cmFuY2Ug
 | 
						|
RVYgUm9vdCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbM5XPm
 | 
						|
+9S75S0tMqbf5YE/yc0lSbZxKsPVlDRnogocsF9ppkCxxLeyj9CYpKlBWTrT3JTW
 | 
						|
PNt0OKRKzE0lgvdKpVMSOO7zSW1xkX5jtqumX8OkhPhPYlG++MXs2ziS4wblCJEM
 | 
						|
xChBVfvLWokVfnHoNb9Ncgk9vjo4UFt3MRuNs8ckRZqnrG0AFFoEt7oT61EKmEFB
 | 
						|
Ik5lYYeBQVCmeVyJ3hlKV9Uu5l0cUyx+mM0aBhakaHPQNAQTXKFx01p8VdteZOE3
 | 
						|
hzBWBOURtCmAEvF5OYiiAhF8J2a3iLd48soKqDirCmTCv2ZdlYTBoSUeh10aUAsg
 | 
						|
EsxBu24LUTi4S8sCAwEAAaNjMGEwDgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB/wQF
 | 
						|
MAMBAf8wHQYDVR0OBBYEFLE+w2kD+L9HAdSYJhoIAu9jZCvDMB8GA1UdIwQYMBaA
 | 
						|
FLE+w2kD+L9HAdSYJhoIAu9jZCvDMA0GCSqGSIb3DQEBBQUAA4IBAQAcGgaX3Nec
 | 
						|
nzyIZgYIVyHbIUf4KmeqvxgydkAQV8GK83rZEWWONfqe/EW1ntlMMUu4kehDLI6z
 | 
						|
eM7b41N5cdblIZQB2lWHmiRk9opmzN6cN82oNLFpmyPInngiK3BD41VHMWEZ71jF
 | 
						|
hS9OMPagMRYjyOfiZRYzy78aG6A9+MpeizGLYAiJLQwGXFK3xPkKmNEVX58Svnw2
 | 
						|
Yzi9RKR/5CYrCsSXaQ3pjOLAEFe4yHYSkVXySGnYvCoCWw9E1CAx2/S6cCZdkGCe
 | 
						|
vEsXCS+0yx5DaMkHJ8HSXPfqIbloEpw8nL+e/IBcm2PN7EeqJSdnoDfzAIJ9VNep
 | 
						|
+OkuE6N36B9K
 | 
						|
-----END CERTIFICATE-----
 | 
						|
)EOF";
 | 
						|
 | 
						|
  Serial.printf(R"EOF(
 | 
						|
A specific certification authority can be passed in and used to validate
 | 
						|
a chain of certificates from a given server.  These will be validated
 | 
						|
using BearSSL's rules, which do NOT include certificate revocation lists.
 | 
						|
A specific server's certificate, or your own self-signed root certificate
 | 
						|
can also be used.  ESP8266 time needs to be valid for checks to pass as
 | 
						|
BearSSL does verify the notValidBefore/After fields.
 | 
						|
)EOF");
 | 
						|
 | 
						|
  BearSSL::WiFiClientSecure client;
 | 
						|
  BearSSL::X509List cert(digicert);
 | 
						|
  client.setTrustAnchors(&cert);
 | 
						|
  Serial.printf("Try validating without setting the time (should fail)\n");
 | 
						|
  fetchURL(&client, host, port, path);
 | 
						|
 | 
						|
  Serial.printf("Try again after setting NTP time (should pass)\n");
 | 
						|
  setClock();
 | 
						|
  fetchURL(&client, host, port, path);
 | 
						|
}
 | 
						|
 | 
						|
void fetchFaster() {
 | 
						|
  Serial.printf(R"EOF(
 | 
						|
The ciphers used to set up the SSL connection can be configured to
 | 
						|
only support faster but less secure ciphers.  If you care about security
 | 
						|
you won't want to do this.  If you need to maximize battery life, these
 | 
						|
may make sense
 | 
						|
)EOF");
 | 
						|
  BearSSL::WiFiClientSecure client;
 | 
						|
  client.setInsecure();
 | 
						|
  uint32_t now = millis();
 | 
						|
  fetchURL(&client, host, port, path);
 | 
						|
  uint32_t delta = millis() - now;
 | 
						|
  client.setInsecure();
 | 
						|
  client.setCiphersLessSecure();
 | 
						|
  now = millis();
 | 
						|
  fetchURL(&client, host, port, path);
 | 
						|
  uint32_t delta2 = millis() - now;
 | 
						|
  std::vector<uint16_t> myCustomList = { BR_TLS_RSA_WITH_AES_256_CBC_SHA256, BR_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, BR_TLS_RSA_WITH_3DES_EDE_CBC_SHA };
 | 
						|
  client.setInsecure();
 | 
						|
  client.setCiphers(myCustomList);
 | 
						|
  now = millis();
 | 
						|
  fetchURL(&client, host, port, path);
 | 
						|
  uint32_t delta3 = millis() - now;
 | 
						|
  Serial.printf("Using more secure: %dms\nUsing less secure ciphers: %dms\nUsing custom cipher list: %dms\n", delta, delta2, delta3);
 | 
						|
}
 | 
						|
 | 
						|
void setup() {
 | 
						|
  Serial.begin(115200);
 | 
						|
  Serial.println();
 | 
						|
  Serial.println();
 | 
						|
 | 
						|
  // We start by connecting to a WiFi network
 | 
						|
  Serial.print("Connecting to ");
 | 
						|
  Serial.println(ssid);
 | 
						|
  WiFi.mode(WIFI_STA);
 | 
						|
  WiFi.begin(ssid, pass);
 | 
						|
 | 
						|
  while (WiFi.status() != WL_CONNECTED) {
 | 
						|
    delay(500);
 | 
						|
    Serial.print(".");
 | 
						|
  }
 | 
						|
  Serial.println("");
 | 
						|
 | 
						|
  Serial.println("WiFi connected");
 | 
						|
  Serial.println("IP address: ");
 | 
						|
  Serial.println(WiFi.localIP());
 | 
						|
 | 
						|
  fetchNoConfig();
 | 
						|
  fetchInsecure();
 | 
						|
  fetchFingerprint();
 | 
						|
  fetchSelfSigned();
 | 
						|
  fetchKnownKey();
 | 
						|
  fetchCertAuthority();
 | 
						|
  fetchFaster();
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
void loop() {
 | 
						|
  // Nothing to do here
 | 
						|
}
 |