Skip to content

Commit d46dbef

Browse files
Update GitHub cert fingerprint in example
The certificate was regenerated yet again, so update the FP in the SSL validation example. Fixes esp8266#7394
1 parent fe673cc commit d46dbef

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

libraries/ESP8266WiFi/examples/BearSSL_Validation/BearSSL_Validation.ino

+5-2
Original file line numberDiff line numberDiff line change
@@ -110,10 +110,13 @@ void fetchFingerprint() {
110110
Serial.printf(R"EOF(
111111
The SHA-1 fingerprint of an X.509 certificate can be used to validate it
112112
instead of the while certificate. This is not nearly as secure as real
113-
X.509 validation, but is better than nothing.
113+
X.509 validation, but is better than nothing. Also be aware that these
114+
fingerprints will change if anything changes in the certificate chain
115+
(i.e. re-generating the certificate for a new end date, any updates to
116+
the root authorities, etc.).
114117
)EOF");
115118
BearSSL::WiFiClientSecure client;
116-
static const char fp[] PROGMEM = "5F:F1:60:31:09:04:3E:F2:90:D2:B0:8A:50:38:04:E8:37:9F:BC:76";
119+
static const char fp[] PROGMEM = "59:74:61:88:13:CA:12:34:15:4D:11:0A:C1:7F:E6:67:07:69:42:F5";
117120
client.setFingerprint(fp);
118121
fetchURL(&client, host, port, path);
119122
}

0 commit comments

Comments
 (0)