mirror of
				https://github.com/esp8266/Arduino.git
				synced 2025-10-31 15:50:55 +03:00 
			
		
		
		
	
		
			
				
	
	
		
			113 lines
		
	
	
		
			2.8 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			113 lines
		
	
	
		
			2.8 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /**
 | |
|    StreamHTTPClient.ino
 | |
| 
 | |
|     Created on: 24.05.2015
 | |
| 
 | |
| */
 | |
| 
 | |
| #include <Arduino.h>
 | |
| 
 | |
| #include <ESP8266WiFi.h>
 | |
| #include <ESP8266WiFiMulti.h>
 | |
| 
 | |
| #include <ESP8266HTTPClient.h>
 | |
| 
 | |
| ESP8266WiFiMulti WiFiMulti;
 | |
| 
 | |
| void setup() {
 | |
| 
 | |
|   Serial.begin(115200);
 | |
|   // Serial.setDebugOutput(true);
 | |
| 
 | |
|   Serial.println();
 | |
|   Serial.println();
 | |
|   Serial.println();
 | |
| 
 | |
|   for (uint8_t t = 4; t > 0; t--) {
 | |
|     Serial.printf("[SETUP] WAIT %d...\n", t);
 | |
|     Serial.flush();
 | |
|     delay(1000);
 | |
|   }
 | |
| 
 | |
|   WiFi.mode(WIFI_STA);
 | |
|   WiFiMulti.addAP("SSID", "PASSWORD");
 | |
| 
 | |
| }
 | |
| 
 | |
| void loop() {
 | |
|   // wait for WiFi connection
 | |
|   if ((WiFiMulti.run() == WL_CONNECTED)) {
 | |
| 
 | |
|     std::unique_ptr<BearSSL::WiFiClientSecure> client(new BearSSL::WiFiClientSecure);
 | |
| 
 | |
|     bool mfln = client->probeMaxFragmentLength("tls.mbed.org", 443, 1024);
 | |
|     Serial.printf("\nConnecting to https://tls.mbed.org\n");
 | |
|     Serial.printf("Maximum fragment Length negotiation supported: %s\n", mfln ? "yes" : "no");
 | |
|     if (mfln) {
 | |
|       client->setBufferSizes(1024, 1024);
 | |
|     }
 | |
| 
 | |
|     Serial.print("[HTTPS] begin...\n");
 | |
| 
 | |
|     // configure server and url
 | |
|     const uint8_t fingerprint[20] = {0x15, 0x77, 0xdc, 0x04, 0x7c, 0x00, 0xf8, 0x70, 0x09, 0x34, 0x24, 0xf4, 0xd3, 0xa1, 0x7a, 0x6c, 0x1e, 0xa3, 0xe0, 0x2a};
 | |
| 
 | |
|     client->setFingerprint(fingerprint);
 | |
| 
 | |
|     HTTPClient https;
 | |
| 
 | |
|     if (https.begin(*client, "https://tls.mbed.org/")) {
 | |
| 
 | |
|       Serial.print("[HTTPS] GET...\n");
 | |
|       // start connection and send HTTP header
 | |
|       int httpCode = https.GET();
 | |
|       if (httpCode > 0) {
 | |
|         // HTTP header has been send and Server response header has been handled
 | |
|         Serial.printf("[HTTPS] GET... code: %d\n", httpCode);
 | |
| 
 | |
|         // file found at server
 | |
|         if (httpCode == HTTP_CODE_OK) {
 | |
| 
 | |
|           // get length of document (is -1 when Server sends no Content-Length header)
 | |
|           int len = https.getSize();
 | |
| 
 | |
|           // create buffer for read
 | |
|           static uint8_t buff[128] = { 0 };
 | |
| 
 | |
|           // read all data from server
 | |
|           while (https.connected() && (len > 0 || len == -1)) {
 | |
|             // get available data size
 | |
|             size_t size = client->available();
 | |
| 
 | |
|             if (size) {
 | |
|               // read up to 128 byte
 | |
|               int c = client->readBytes(buff, ((size > sizeof(buff)) ? sizeof(buff) : size));
 | |
| 
 | |
|               // write it to Serial
 | |
|               Serial.write(buff, c);
 | |
| 
 | |
|               if (len > 0) {
 | |
|                 len -= c;
 | |
|               }
 | |
|             }
 | |
|             delay(1);
 | |
|           }
 | |
| 
 | |
|           Serial.println();
 | |
|           Serial.print("[HTTPS] connection closed or file end.\n");
 | |
| 
 | |
|         }
 | |
|       } else {
 | |
|         Serial.printf("[HTTPS] GET... failed, error: %s\n", https.errorToString(httpCode).c_str());
 | |
|       }
 | |
| 
 | |
|       https.end();
 | |
|     } else {
 | |
|       Serial.printf("Unable to connect\n");
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   Serial.println("Wait 10s before the next round...");
 | |
|   delay(10000);
 | |
| }
 |