49 lines
1.6 KiB
Markdown
49 lines
1.6 KiB
Markdown
|
1. Run ./gencrt.sh or if you have your own certificate, move to the openssl_client directory, the name is ca.crt,server.crt, server.key, client.crt and client.key.
|
||
|
|
||
|
The server.crt and client.crt was generate by the same ca.crt in ./gencrt.sh.
|
||
|
|
||
|
Server side needs ca.crt(to verify client.crt), server.crt, server.key
|
||
|
|
||
|
Client side needs ca.crt(to verify server.crt), client.crt, client.key
|
||
|
|
||
|
If you have two ca.crt to generate server.crt and client.crt respectively, client1.crt is generate by ca1.crt and client1.key, server2.crt is generate by ca2.crt and server2.key:
|
||
|
|
||
|
Client side needs ca2.crt, client1.crt, client1.key.
|
||
|
|
||
|
Server side needs ca1.crt, server2.crt, server2.key.
|
||
|
|
||
|
Rename ca2.crt client1.crt client1.key to ca.crt client.crt client.key and run ./genheader.sh.
|
||
|
|
||
|
Use ca1.crt in openssl s_server -CAfile option.
|
||
|
|
||
|
2. Run ./genheader.sh.
|
||
|
|
||
|
3. Modify this two lines in file openssl_demo.c to your computer server ip and port.
|
||
|
|
||
|
```#define OPENSSL_DEMO_TARGET_NAME "192.168.3.196"```
|
||
|
|
||
|
```#define OPENSSL_DEMO_TARGET_TCP_PORT 443```
|
||
|
|
||
|
|
||
|
4. Modify thease two lines in file user_config.h to your local Wi-Fi SSID and Password.
|
||
|
|
||
|
```#define SSID "HUAWEI001"```
|
||
|
|
||
|
```#define PASSWORD ""```
|
||
|
|
||
|
5. Make sure that the computer and ESP8266 are in the same local area network.
|
||
|
|
||
|
6. Run ./gen_misc.sh.
|
||
|
|
||
|
7. Run openssl s_server -CAfile ca.crt -cert server.crt -key server.key -verify 1 -tls1_1 -accept 443.
|
||
|
|
||
|
8. Download bin file to ESP8266.
|
||
|
|
||
|
**ATTENTION**
|
||
|
|
||
|
**1. Make sure the free heap size larger than 30K.**
|
||
|
|
||
|
**2. Make sure the private key length larger than 2048.**
|
||
|
|
||
|
**3. Make sure the fragment size range is between 2048 and 8192.**
|