/* * FreeRTOS V202203.00 * Copyright (C) 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved. * * Permission is hereby granted, free of charge, to any person obtaining a copy of * this software and associated documentation files (the "Software"), to deal in * the Software without restriction, including without limitation the rights to * use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of * the Software, and to permit persons to whom the Software is furnished to do so, * subject to the following conditions: * * The above copyright notice and this permission notice shall be included in all * copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS * FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR * COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER * IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. * * http://aws.amazon.com/freertos * http://www.FreeRTOS.org */ /* **************************************************************************** * NOTE! * This file is for ease of demonstration only. Secret information should not * be pasted into the header file in production devices. Do not paste * production secrets here! Production devices should store secrets such as * private keys securely, such as within a secure element. See our examples that * demonstrate how to use the PKCS #11 API for secure keys access. **************************************************************************** */ #ifndef AWS_CLIENT_CREDENTIAL_KEYS_H #define AWS_CLIENT_CREDENTIAL_KEYS_H /* @TEST_ANCHOR */ /* * @brief PEM-encoded client certificate. * * @todo If you are running one of the FreeRTOS demo projects, set this * to the certificate that will be used for TLS client authentication. * * @note Must include the PEM header and footer: * "-----BEGIN CERTIFICATE-----\n"\ * "...base64 data...\n"\ * "-----END CERTIFICATE-----\n" */ #ifndef keyCLIENT_CERTIFICATE_PEM #define keyCLIENT_CERTIFICATE_PEM NULL #endif /* * @brief PEM-encoded issuer certificate for AWS IoT Just In Time Registration (JITR). * * @todo If you are using AWS IoT Just in Time Registration (JITR), set this to * the issuer (Certificate Authority) certificate of the client certificate above. * * @note This setting is required by JITR because the issuer is used by the AWS * IoT gateway for routing the device's initial request. (The device client * certificate must always be sent as well.) For more information about JITR, see: * https://docs.aws.amazon.com/iot/latest/developerguide/jit-provisioning.html, * https://aws.amazon.com/blogs/iot/just-in-time-registration-of-device-certificates-on-aws-iot/. * * If you're not using JITR, set below to NULL. * * Must include the PEM header and footer: * "-----BEGIN CERTIFICATE-----\n"\ * "...base64 data...\n"\ * "-----END CERTIFICATE-----\n" */ #ifndef keyJITR_DEVICE_CERTIFICATE_AUTHORITY_PEM #define keyJITR_DEVICE_CERTIFICATE_AUTHORITY_PEM NULL #endif /* * @brief PEM-encoded client private key. * * @todo If you are running one of the FreeRTOS demo projects, set this * to the private key that will be used for TLS client authentication. * Please note pasting a key into the header file in this manner is for * convenience of demonstration only and should not be done in production. * Never past a production private key here!. Production devices should * store keys securely, such as within a secure element. Additionally, * we provide the corePKCS library that further enhances security by * enabling keys to be used without exposing them to software. * * @note Must include the PEM header and footer: * "-----BEGIN RSA PRIVATE KEY-----\n"\ * "...base64 data...\n"\ * "-----END RSA PRIVATE KEY-----\n" */ #ifndef keyCLIENT_PRIVATE_KEY_PEM #define keyCLIENT_PRIVATE_KEY_PEM NULL #endif /* * @brief PEM-encoded public key used for code signature verification * * @todo If you are running OTA Amazon FreeRTOS demo projects, set this * to the public key that will be used for code signature verification. * * @note Must include the PEM header and footer: * "-----BEGIN PUBLIC KEY-----\n"\ * "...base64 data...\n"\ * "-----END PUBLIC KEY-----\n" */ #ifndef keyCODE_VERIFY_PUB_KEY_PEM #define keyCODE_VERIFY_PUB_KEY_PEM NULL #endif #endif /* AWS_CLIENT_CREDENTIAL_KEYS_H */