MCUXpresso_LPC55S69/boards/lpcxpresso55s69/aws_examples/shadow_wifi_serial/cm33_core0/aws_clientcredential_keys.h

117 lines
4.5 KiB
C

/*
* FreeRTOS V202203.00
* Copyright (C) 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.
*
* Permission is hereby granted, free of charge, to any person obtaining a copy of
* this software and associated documentation files (the "Software"), to deal in
* the Software without restriction, including without limitation the rights to
* use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
* the Software, and to permit persons to whom the Software is furnished to do so,
* subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in all
* copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
*
* http://aws.amazon.com/freertos
* http://www.FreeRTOS.org
*/
/*
****************************************************************************
* NOTE!
* This file is for ease of demonstration only. Secret information should not
* be pasted into the header file in production devices. Do not paste
* production secrets here! Production devices should store secrets such as
* private keys securely, such as within a secure element. See our examples that
* demonstrate how to use the PKCS #11 API for secure keys access.
****************************************************************************
*/
#ifndef AWS_CLIENT_CREDENTIAL_KEYS_H
#define AWS_CLIENT_CREDENTIAL_KEYS_H
/* @TEST_ANCHOR */
/*
* @brief PEM-encoded client certificate.
*
* @todo If you are running one of the FreeRTOS demo projects, set this
* to the certificate that will be used for TLS client authentication.
*
* @note Must include the PEM header and footer:
* "-----BEGIN CERTIFICATE-----\n"\
* "...base64 data...\n"\
* "-----END CERTIFICATE-----\n"
*/
#ifndef keyCLIENT_CERTIFICATE_PEM
#define keyCLIENT_CERTIFICATE_PEM NULL
#endif
/*
* @brief PEM-encoded issuer certificate for AWS IoT Just In Time Registration (JITR).
*
* @todo If you are using AWS IoT Just in Time Registration (JITR), set this to
* the issuer (Certificate Authority) certificate of the client certificate above.
*
* @note This setting is required by JITR because the issuer is used by the AWS
* IoT gateway for routing the device's initial request. (The device client
* certificate must always be sent as well.) For more information about JITR, see:
* https://docs.aws.amazon.com/iot/latest/developerguide/jit-provisioning.html,
* https://aws.amazon.com/blogs/iot/just-in-time-registration-of-device-certificates-on-aws-iot/.
*
* If you're not using JITR, set below to NULL.
*
* Must include the PEM header and footer:
* "-----BEGIN CERTIFICATE-----\n"\
* "...base64 data...\n"\
* "-----END CERTIFICATE-----\n"
*/
#ifndef keyJITR_DEVICE_CERTIFICATE_AUTHORITY_PEM
#define keyJITR_DEVICE_CERTIFICATE_AUTHORITY_PEM NULL
#endif
/*
* @brief PEM-encoded client private key.
*
* @todo If you are running one of the FreeRTOS demo projects, set this
* to the private key that will be used for TLS client authentication.
* Please note pasting a key into the header file in this manner is for
* convenience of demonstration only and should not be done in production.
* Never past a production private key here!. Production devices should
* store keys securely, such as within a secure element. Additionally,
* we provide the corePKCS library that further enhances security by
* enabling keys to be used without exposing them to software.
*
* @note Must include the PEM header and footer:
* "-----BEGIN RSA PRIVATE KEY-----\n"\
* "...base64 data...\n"\
* "-----END RSA PRIVATE KEY-----\n"
*/
#ifndef keyCLIENT_PRIVATE_KEY_PEM
#define keyCLIENT_PRIVATE_KEY_PEM NULL
#endif
/*
* @brief PEM-encoded public key used for code signature verification
*
* @todo If you are running OTA Amazon FreeRTOS demo projects, set this
* to the public key that will be used for code signature verification.
*
* @note Must include the PEM header and footer:
* "-----BEGIN PUBLIC KEY-----\n"\
* "...base64 data...\n"\
* "-----END PUBLIC KEY-----\n"
*/
#ifndef keyCODE_VERIFY_PUB_KEY_PEM
#define keyCODE_VERIFY_PUB_KEY_PEM NULL
#endif
#endif /* AWS_CLIENT_CREDENTIAL_KEYS_H */