117 lines
4.5 KiB
C
117 lines
4.5 KiB
C
/*
|
|
* FreeRTOS V202203.00
|
|
* Copyright (C) 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
|
*
|
|
* Permission is hereby granted, free of charge, to any person obtaining a copy of
|
|
* this software and associated documentation files (the "Software"), to deal in
|
|
* the Software without restriction, including without limitation the rights to
|
|
* use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
|
|
* the Software, and to permit persons to whom the Software is furnished to do so,
|
|
* subject to the following conditions:
|
|
*
|
|
* The above copyright notice and this permission notice shall be included in all
|
|
* copies or substantial portions of the Software.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
|
|
* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
|
|
* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
|
|
* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
|
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
*
|
|
* http://aws.amazon.com/freertos
|
|
* http://www.FreeRTOS.org
|
|
*/
|
|
|
|
/*
|
|
****************************************************************************
|
|
* NOTE!
|
|
* This file is for ease of demonstration only. Secret information should not
|
|
* be pasted into the header file in production devices. Do not paste
|
|
* production secrets here! Production devices should store secrets such as
|
|
* private keys securely, such as within a secure element. See our examples that
|
|
* demonstrate how to use the PKCS #11 API for secure keys access.
|
|
****************************************************************************
|
|
*/
|
|
|
|
#ifndef AWS_CLIENT_CREDENTIAL_KEYS_H
|
|
#define AWS_CLIENT_CREDENTIAL_KEYS_H
|
|
|
|
/* @TEST_ANCHOR */
|
|
|
|
/*
|
|
* @brief PEM-encoded client certificate.
|
|
*
|
|
* @todo If you are running one of the FreeRTOS demo projects, set this
|
|
* to the certificate that will be used for TLS client authentication.
|
|
*
|
|
* @note Must include the PEM header and footer:
|
|
* "-----BEGIN CERTIFICATE-----\n"\
|
|
* "...base64 data...\n"\
|
|
* "-----END CERTIFICATE-----\n"
|
|
*/
|
|
#ifndef keyCLIENT_CERTIFICATE_PEM
|
|
#define keyCLIENT_CERTIFICATE_PEM NULL
|
|
#endif
|
|
|
|
/*
|
|
* @brief PEM-encoded issuer certificate for AWS IoT Just In Time Registration (JITR).
|
|
*
|
|
* @todo If you are using AWS IoT Just in Time Registration (JITR), set this to
|
|
* the issuer (Certificate Authority) certificate of the client certificate above.
|
|
*
|
|
* @note This setting is required by JITR because the issuer is used by the AWS
|
|
* IoT gateway for routing the device's initial request. (The device client
|
|
* certificate must always be sent as well.) For more information about JITR, see:
|
|
* https://docs.aws.amazon.com/iot/latest/developerguide/jit-provisioning.html,
|
|
* https://aws.amazon.com/blogs/iot/just-in-time-registration-of-device-certificates-on-aws-iot/.
|
|
*
|
|
* If you're not using JITR, set below to NULL.
|
|
*
|
|
* Must include the PEM header and footer:
|
|
* "-----BEGIN CERTIFICATE-----\n"\
|
|
* "...base64 data...\n"\
|
|
* "-----END CERTIFICATE-----\n"
|
|
*/
|
|
#ifndef keyJITR_DEVICE_CERTIFICATE_AUTHORITY_PEM
|
|
#define keyJITR_DEVICE_CERTIFICATE_AUTHORITY_PEM NULL
|
|
#endif
|
|
|
|
/*
|
|
* @brief PEM-encoded client private key.
|
|
*
|
|
* @todo If you are running one of the FreeRTOS demo projects, set this
|
|
* to the private key that will be used for TLS client authentication.
|
|
* Please note pasting a key into the header file in this manner is for
|
|
* convenience of demonstration only and should not be done in production.
|
|
* Never past a production private key here!. Production devices should
|
|
* store keys securely, such as within a secure element. Additionally,
|
|
* we provide the corePKCS library that further enhances security by
|
|
* enabling keys to be used without exposing them to software.
|
|
*
|
|
* @note Must include the PEM header and footer:
|
|
* "-----BEGIN RSA PRIVATE KEY-----\n"\
|
|
* "...base64 data...\n"\
|
|
* "-----END RSA PRIVATE KEY-----\n"
|
|
*/
|
|
#ifndef keyCLIENT_PRIVATE_KEY_PEM
|
|
#define keyCLIENT_PRIVATE_KEY_PEM NULL
|
|
#endif
|
|
|
|
/*
|
|
* @brief PEM-encoded public key used for code signature verification
|
|
*
|
|
* @todo If you are running OTA Amazon FreeRTOS demo projects, set this
|
|
* to the public key that will be used for code signature verification.
|
|
*
|
|
* @note Must include the PEM header and footer:
|
|
* "-----BEGIN PUBLIC KEY-----\n"\
|
|
* "...base64 data...\n"\
|
|
* "-----END PUBLIC KEY-----\n"
|
|
*/
|
|
#ifndef keyCODE_VERIFY_PUB_KEY_PEM
|
|
#define keyCODE_VERIFY_PUB_KEY_PEM NULL
|
|
#endif
|
|
|
|
#endif /* AWS_CLIENT_CREDENTIAL_KEYS_H */
|