mirror of
https://github.com/esp8266/Arduino.git
synced 2025-07-24 19:42:27 +03:00
Due to popular demand, remove the hardcoded dependency on SPIFFS or SD from the CertStore by factoring out the file interface into a new class (CertStoreFile) that the user will need to implement as a thin wrapper around either a SPIFFS.file or a SD.file Combine the downloaded certificates into a UNIX "ar" archive and parse that on-the-fly to allow easy inspection and creation of the Cert Store database. Examples updated with a new certificate downloader that creates the certs.ar archive and with a single sample that can be built for either SPIFFS or SD with a #define. Users can copy the implementation of the CertStoreFile they need to their own code as it is self-contained. Also move the CertStore to the BearSSL namespace and remove the suffix and separate SPIFFS/SD sources. Remove the "deep+" change from the CI build as well (no special options needed on any PIO or makefile build). We'll revisit the filesystem wrapper for 2.5.0, hopefully having a unified template for both filesystem usage at a global level. For current users, be aware the interface may change (simplify!) in release 2.5.0. Fixes #4740
245 lines
6.8 KiB
C++
245 lines
6.8 KiB
C++
// Demonstrate the CertStore object with WiFiClientBearSSL
|
|
//
|
|
// Before running, you must download the set of certs using
|
|
// the script "certs-from-mozilla.py" (no parameters)
|
|
// and then uploading the generated data directory to
|
|
// SPIFFS.
|
|
//
|
|
// Why would you need a CertStore?
|
|
//
|
|
// If you know the exact server being connected to, or you
|
|
// are generating your own self-signed certificates and aren't
|
|
// allowing connections to HTTPS/TLS servers out of your
|
|
// control, then you do NOT want a CertStore. Hardcode the
|
|
// self-signing CA or the site's x.509 certificate directly.
|
|
//
|
|
// However, if you don't know what specific sites the system
|
|
// will be required to connect to and verify, a
|
|
// CertStore can allow you to select from among
|
|
// 10s or 100s of CAs against which you can check the
|
|
// target's X.509, without taking any more RAM than a single
|
|
// certificate. This is the same way that standard browsers
|
|
// and operating systems use to verify SSL connections.
|
|
//
|
|
// About the chosen certs:
|
|
// The certificates are scraped from the Mozilla.org current
|
|
// list, but please don't take this as an endorsement or a
|
|
// requirement: it is up to YOU, the USER, to specify the
|
|
// certificate authorities you will use as trust bases.
|
|
//
|
|
// Mar 2018 by Earle F. Philhower, III
|
|
// Released to the public domain
|
|
|
|
#include <ESP8266WiFi.h>
|
|
#include <CertStoreBearSSL.h>
|
|
#include <time.h>
|
|
|
|
const char *ssid = "....";
|
|
const char *pass = "....";
|
|
|
|
// A single, global CertStore which can be used by all
|
|
// connections. Needs to stay live the entire time any of
|
|
// the WiFiClientBearSSLs are present.
|
|
BearSSL::CertStore certStore;
|
|
|
|
// Uncomment below to use the SD card to store the certs
|
|
// #define USE_SDCARD 1
|
|
|
|
// NOTE: The CertStoreFile virtual class may migrate to a templated
|
|
// model in a future release. Expect some changes to the interface,
|
|
// no matter what, as the SD and SPIFFS filesystem get unified.
|
|
|
|
#ifdef USE_SDCARD
|
|
|
|
#include <SD.h>
|
|
class SDCertStoreFile : public BearSSL::CertStoreFile {
|
|
public:
|
|
SDCertStoreFile(const char *name) {
|
|
_name = name;
|
|
};
|
|
virtual ~SDCertStoreFile() override {};
|
|
|
|
// The main API
|
|
virtual bool open(bool write = false) override {
|
|
_file = SD.open(_name, write ? FILE_WRITE : FILE_READ);
|
|
return _file;
|
|
}
|
|
virtual bool seek(size_t absolute_pos) override {
|
|
return _file.seek(absolute_pos);
|
|
}
|
|
virtual ssize_t read(void *dest, size_t bytes) override {
|
|
return _file.read(dest, bytes);
|
|
}
|
|
virtual ssize_t write(void *dest, size_t bytes) override {
|
|
return _file.write((const uint8_t*)dest, bytes);
|
|
}
|
|
virtual void close() override {
|
|
_file.close();
|
|
}
|
|
|
|
private:
|
|
File _file;
|
|
const char *_name;
|
|
};
|
|
|
|
SDCertStoreFile certs_idx("/certs.idx");
|
|
SDCertStoreFile certs_ar("/certs.ar");
|
|
|
|
#else
|
|
|
|
#include <FS.h>
|
|
class SPIFFSCertStoreFile : public BearSSL::CertStoreFile {
|
|
public:
|
|
SPIFFSCertStoreFile(const char *name) {
|
|
_name = name;
|
|
};
|
|
virtual ~SPIFFSCertStoreFile() override {};
|
|
|
|
// The main API
|
|
virtual bool open(bool write = false) override {
|
|
_file = SPIFFS.open(_name, write ? "w" : "r");
|
|
return _file;
|
|
}
|
|
virtual bool seek(size_t absolute_pos) override {
|
|
return _file.seek(absolute_pos, SeekSet);
|
|
}
|
|
virtual ssize_t read(void *dest, size_t bytes) override {
|
|
return _file.readBytes((char*)dest, bytes);
|
|
}
|
|
virtual ssize_t write(void *dest, size_t bytes) override {
|
|
return _file.write((uint8_t*)dest, bytes);
|
|
}
|
|
virtual void close() override {
|
|
_file.close();
|
|
}
|
|
|
|
private:
|
|
File _file;
|
|
const char *_name;
|
|
};
|
|
|
|
SPIFFSCertStoreFile certs_idx("/certs.idx");
|
|
SPIFFSCertStoreFile certs_ar("/certs.ar");
|
|
#endif
|
|
|
|
// Set time via NTP, as required for x.509 validation
|
|
void setClock() {
|
|
configTime(3 * 3600, 0, "pool.ntp.org", "time.nist.gov");
|
|
|
|
Serial.print("Waiting for NTP time sync: ");
|
|
time_t now = time(nullptr);
|
|
while (now < 8 * 3600 * 2) {
|
|
delay(500);
|
|
Serial.print(".");
|
|
now = time(nullptr);
|
|
}
|
|
Serial.println("");
|
|
struct tm timeinfo;
|
|
gmtime_r(&now, &timeinfo);
|
|
Serial.print("Current time: ");
|
|
Serial.print(asctime(&timeinfo));
|
|
}
|
|
|
|
// Try and connect using a WiFiClientBearSSL to specified host:port and dump URL
|
|
void fetchURL(BearSSL::WiFiClientSecure *client, const char *host, const uint16_t port, const char *path) {
|
|
if (!path) {
|
|
path = "/";
|
|
}
|
|
|
|
Serial.printf("Trying: %s:443...", host);
|
|
client->connect(host, port);
|
|
if (!client->connected()) {
|
|
Serial.printf("*** Can't connect. ***\n-------\n");
|
|
return;
|
|
}
|
|
Serial.printf("Connected!\n-------\n");
|
|
client->write("GET ");
|
|
client->write(path);
|
|
client->write(" HTTP/1.0\r\nHost: ");
|
|
client->write(host);
|
|
client->write("\r\nUser-Agent: ESP8266\r\n");
|
|
client->write("\r\n");
|
|
uint32_t to = millis() + 5000;
|
|
if (client->connected()) {
|
|
do {
|
|
char tmp[32];
|
|
memset(tmp, 0, 32);
|
|
int rlen = client->read((uint8_t*)tmp, sizeof(tmp) - 1);
|
|
yield();
|
|
if (rlen < 0) {
|
|
break;
|
|
}
|
|
// Only print out first line up to \r, then abort connection
|
|
char *nl = strchr(tmp, '\r');
|
|
if (nl) {
|
|
*nl = 0;
|
|
Serial.print(tmp);
|
|
break;
|
|
}
|
|
Serial.print(tmp);
|
|
} while (millis() < to);
|
|
}
|
|
client->stop();
|
|
Serial.printf("\n-------\n");
|
|
}
|
|
|
|
void setup() {
|
|
Serial.begin(115200);
|
|
Serial.println();
|
|
Serial.println();
|
|
|
|
#ifdef USE_SDCARD
|
|
SD.begin();
|
|
#else
|
|
SPIFFS.begin();
|
|
#endif
|
|
|
|
// We start by connecting to a WiFi network
|
|
Serial.print("Connecting to ");
|
|
Serial.println(ssid);
|
|
WiFi.mode(WIFI_STA);
|
|
WiFi.begin(ssid, pass);
|
|
|
|
while (WiFi.status() != WL_CONNECTED) {
|
|
delay(500);
|
|
Serial.print(".");
|
|
}
|
|
Serial.println("");
|
|
|
|
Serial.println("WiFi connected");
|
|
Serial.println("IP address: ");
|
|
Serial.println(WiFi.localIP());
|
|
|
|
setClock(); // Required for X.509 validation
|
|
|
|
int numCerts = certStore.initCertStore(&certs_idx, &certs_ar);
|
|
Serial.printf("Number of CA certs read: %d\n", numCerts);
|
|
if (numCerts == 0) {
|
|
Serial.printf("No certs found. Did you run certs-from-mozill.py and upload the SPIFFS directory before running?\n");
|
|
return; // Can't connect to anything w/o certs!
|
|
}
|
|
|
|
BearSSL::WiFiClientSecure *bear = new BearSSL::WiFiClientSecure();
|
|
// Integrate the cert store with this connection
|
|
bear->setCertStore(&certStore);
|
|
Serial.printf("Attempting to fetch https://www.github.com/...\n");
|
|
fetchURL(bear, "www.github.com", 443, "/");
|
|
delete bear;
|
|
}
|
|
|
|
void loop() {
|
|
Serial.printf("\nPlease enter a website address (www.blah.com) to connect to: ");
|
|
String site;
|
|
do {
|
|
site = Serial.readString();
|
|
} while (site == "");
|
|
Serial.printf("https://%s/\n", site.c_str());
|
|
|
|
BearSSL::WiFiClientSecure *bear = new BearSSL::WiFiClientSecure();
|
|
// Integrate the cert store with this connection
|
|
bear->setCertStore(&certStore);
|
|
fetchURL(bear, site.c_str(), 443, "/");
|
|
delete bear;
|
|
}
|
|
|