esp8266-std/ESP8266_RTOS_SDK/examples/openssl_client/README.md

49 lines
1.6 KiB
Markdown

1. Run ./gencrt.sh or if you have your own certificate, move to the openssl_client directory, the name is ca.crt,server.crt, server.key, client.crt and client.key.
The server.crt and client.crt was generate by the same ca.crt in ./gencrt.sh.
Server side needs ca.crt(to verify client.crt), server.crt, server.key
Client side needs ca.crt(to verify server.crt), client.crt, client.key
If you have two ca.crt to generate server.crt and client.crt respectively, client1.crt is generate by ca1.crt and client1.key, server2.crt is generate by ca2.crt and server2.key:
Client side needs ca2.crt, client1.crt, client1.key.
Server side needs ca1.crt, server2.crt, server2.key.
Rename ca2.crt client1.crt client1.key to ca.crt client.crt client.key and run ./genheader.sh.
Use ca1.crt in openssl s_server -CAfile option.
2. Run ./genheader.sh.
3. Modify this two lines in file openssl_demo.c to your computer server ip and port.
```#define OPENSSL_DEMO_TARGET_NAME "192.168.3.196"```
```#define OPENSSL_DEMO_TARGET_TCP_PORT 443```
4. Modify thease two lines in file user_config.h to your local Wi-Fi SSID and Password.
```#define SSID "HUAWEI001"```
```#define PASSWORD ""```
5. Make sure that the computer and ESP8266 are in the same local area network.
6. Run ./gen_misc.sh.
7. Run openssl s_server -CAfile ca.crt -cert server.crt -key server.key -verify 1 -tls1_1 -accept 443.
8. Download bin file to ESP8266.
**ATTENTION**
**1. Make sure the free heap size larger than 30K.**
**2. Make sure the private key length larger than 2048.**
**3. Make sure the fragment size range is between 2048 and 8192.**