Add MQTT_Mutual_Auth_wolfSSL demo (#464)
Add a demo that shows MQTT over TLS mutual authentication connection and communication with a broken when using wolfSSL as the TLS library.pull/493/head
parent
7bbf951c71
commit
dfdf2ddf1f
@ -0,0 +1,711 @@
|
||||
/*
|
||||
* FreeRTOS V202012.00
|
||||
* Copyright (C) 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
||||
*
|
||||
* Permission is hereby granted, free of charge, to any person obtaining a copy of
|
||||
* this software and associated documentation files (the "Software"), to deal in
|
||||
* the Software without restriction, including without limitation the rights to
|
||||
* use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
|
||||
* the Software, and to permit persons to whom the Software is furnished to do so,
|
||||
* subject to the following conditions:
|
||||
*
|
||||
* The above copyright notice and this permission notice shall be included in all
|
||||
* copies or substantial portions of the Software.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
|
||||
* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
|
||||
* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
|
||||
* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
||||
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||
*
|
||||
* https://www.FreeRTOS.org
|
||||
* https://github.com/FreeRTOS
|
||||
*
|
||||
*/
|
||||
|
||||
/*
|
||||
* Demo for showing use of the MQTT API using a mutually authenticated
|
||||
* network connection.
|
||||
*
|
||||
* The Example shown below uses MQTT APIs to create MQTT messages and send them
|
||||
* over the mutually authenticated network connection established with the
|
||||
* MQTT broker. This example is single threaded and uses statically allocated
|
||||
* memory. It uses QoS1 for sending to and receiving messages from the broker.
|
||||
*
|
||||
* A mutually authenticated TLS connection is used to connect to the
|
||||
* MQTT message broker in this example. Define democonfigMQTT_BROKER_ENDPOINT,
|
||||
* democonfigROOT_CA_PEM, democonfigCLIENT_CERTIFICATE_PEM,
|
||||
* and democonfigCLIENT_PRIVATE_KEY_PEM in demo_config.h to establish a
|
||||
* mutually authenticated connection.
|
||||
*/
|
||||
|
||||
/* Standard includes. */
|
||||
#include <string.h>
|
||||
#include <stdio.h>
|
||||
|
||||
/* Kernel includes. */
|
||||
#include "FreeRTOS.h"
|
||||
#include "task.h"
|
||||
|
||||
/* Demo Specific configs. */
|
||||
#include "demo_config.h"
|
||||
|
||||
/* MQTT library includes. */
|
||||
#include "core_mqtt.h"
|
||||
|
||||
/* Transport interface implementation include header for TLS. */
|
||||
#include "using_wolfSSL.h"
|
||||
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
/* Compile time error for undefined configs. */
|
||||
#ifndef democonfigMQTT_BROKER_ENDPOINT
|
||||
#error "Define the config democonfigMQTT_BROKER_ENDPOINT by following the instructions in file demo_config.h."
|
||||
#endif
|
||||
#ifndef democonfigROOT_CA_PEM
|
||||
#error "Please define Root CA certificate of the MQTT broker(democonfigROOT_CA_PEM) in demo_config.h."
|
||||
#endif
|
||||
#ifndef democonfigCLIENT_CERTIFICATE_PEM
|
||||
#error "Please define client certificate(democonfigCLIENT_CERTIFICATE_PEM) in demo_config.h."
|
||||
#endif
|
||||
#ifndef democonfigCLIENT_PRIVATE_KEY_PEM
|
||||
#error "Please define client private key(democonfigCLIENT_PRIVATE_KEY_PEM) in demo_config.h."
|
||||
#endif
|
||||
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
/* Default values for configs. */
|
||||
#ifndef democonfigCLIENT_IDENTIFIER
|
||||
|
||||
/**
|
||||
* @brief The MQTT client identifier used in this example. Each client identifier
|
||||
* must be unique so edit as required to ensure no two clients connecting to the
|
||||
* same broker use the same client identifier.
|
||||
*
|
||||
* @note Appending __TIME__ to the client id string will help to create a unique
|
||||
* client id every time an application binary is built. Only a single instance of
|
||||
* this application's compiled binary may be used at a time, since the client ID
|
||||
* will always be the same.
|
||||
*/
|
||||
#define democonfigCLIENT_IDENTIFIER "testClient"__TIME__
|
||||
#endif
|
||||
|
||||
#ifndef democonfigMQTT_BROKER_PORT
|
||||
|
||||
/**
|
||||
* @brief The port to use for the demo.
|
||||
*/
|
||||
#define democonfigMQTT_BROKER_PORT ( 8883 )
|
||||
#endif
|
||||
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
/**
|
||||
* @brief Timeout for receiving CONNACK packet in milliseconds.
|
||||
*/
|
||||
#define mqttexampleCONNACK_RECV_TIMEOUT_MS ( 1000U )
|
||||
|
||||
/**
|
||||
* @brief The topic to subscribe and publish to in the example.
|
||||
*
|
||||
* The topic name starts with the client identifier to ensure that each demo
|
||||
* interacts with a unique topic name.
|
||||
*/
|
||||
#define mqttexampleTOPIC democonfigCLIENT_IDENTIFIER "/example/topic"
|
||||
|
||||
/**
|
||||
* @brief The MQTT message published in this example.
|
||||
*/
|
||||
#define mqttexampleMESSAGE "Hello World!"
|
||||
|
||||
/**
|
||||
* @brief Time in ticks to wait between each cycle of the demo implemented
|
||||
* by prvMQTTDemoTask().
|
||||
*/
|
||||
#define mqttexampleDELAY_BETWEEN_DEMO_ITERATIONS_TICKS ( pdMS_TO_TICKS( 5000U ) )
|
||||
|
||||
/**
|
||||
* @brief Timeout for MQTT_ProcessLoop in milliseconds.
|
||||
*/
|
||||
#define mqttexamplePROCESS_LOOP_TIMEOUT_MS ( 500U )
|
||||
|
||||
/**
|
||||
* @brief Keep alive time reported to the broker while establishing
|
||||
* an MQTT connection.
|
||||
*
|
||||
* It is the responsibility of the Client to ensure that the interval between
|
||||
* Control Packets being sent does not exceed the this Keep Alive value. In the
|
||||
* absence of sending any other Control Packets, the Client MUST send a
|
||||
* PINGREQ Packet.
|
||||
*/
|
||||
#define mqttexampleKEEP_ALIVE_TIMEOUT_SECONDS ( 60U )
|
||||
|
||||
/**
|
||||
* @brief Delay (in ticks) between consecutive cycles of MQTT publish operations in a
|
||||
* demo iteration.
|
||||
*
|
||||
* Note that the process loop also has a timeout, so the total time between
|
||||
* publishes is the sum of the two delays.
|
||||
*/
|
||||
#define mqttexampleDELAY_BETWEEN_PUBLISHES_TICKS ( pdMS_TO_TICKS( 2000U ) )
|
||||
|
||||
/**
|
||||
* @brief Transport timeout in milliseconds for transport send and receive.
|
||||
*/
|
||||
#define mqttexampleTRANSPORT_SEND_RECV_TIMEOUT_MS ( 1000U )
|
||||
|
||||
/**
|
||||
* @brief Milliseconds per second.
|
||||
*/
|
||||
#define _MILLISECONDS_PER_SECOND ( 1000U )
|
||||
|
||||
/**
|
||||
* @brief Milliseconds per FreeRTOS tick.
|
||||
*/
|
||||
#define _MILLISECONDS_PER_TICK ( _MILLISECONDS_PER_SECOND / configTICK_RATE_HZ )
|
||||
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
/**
|
||||
* @brief The task used to demonstrate the MQTT API.
|
||||
*
|
||||
* @param[in] pvParameters Parameters as passed at the time of task creation. Not
|
||||
* used in this example.
|
||||
*/
|
||||
static void prvMQTTDemoTask( void * pvParameters );
|
||||
|
||||
/**
|
||||
* @brief Sends an MQTT Connect packet over the already connected TLS over TCP connection.
|
||||
*
|
||||
* @param[in, out] pxMQTTContext MQTT context pointer.
|
||||
* @param[in] xNetworkContext network context.
|
||||
*/
|
||||
static void prvCreateMQTTConnectionWithBroker( MQTTContext_t * pxMQTTContext,
|
||||
NetworkContext_t * pxNetworkContext );
|
||||
|
||||
/**
|
||||
* @brief Subscribes to the topic as specified in mqttexampleTOPIC at the top of
|
||||
* this file.
|
||||
*
|
||||
* @param[in] pxMQTTContext MQTT context pointer.
|
||||
*/
|
||||
static void prvMQTTSubscribeToTopic( MQTTContext_t * pxMQTTContext );
|
||||
|
||||
/**
|
||||
* @brief Publishes a message mqttexampleMESSAGE on mqttexampleTOPIC topic.
|
||||
*
|
||||
* @param[in] pxMQTTContext MQTT context pointer.
|
||||
*/
|
||||
static void prvMQTTPublishToTopic( MQTTContext_t * pxMQTTContext );
|
||||
|
||||
/**
|
||||
* @brief Unsubscribes from the previously subscribed topic as specified
|
||||
* in mqttexampleTOPIC.
|
||||
*
|
||||
* @param[in] pxMQTTContext MQTT context pointer.
|
||||
*/
|
||||
static void prvMQTTUnsubscribeFromTopic( MQTTContext_t * pxMQTTContext );
|
||||
|
||||
/**
|
||||
* @brief The timer query function provided to the MQTT context.
|
||||
*
|
||||
* @return Time in milliseconds.
|
||||
*/
|
||||
static uint32_t prvGetTimeMs( void );
|
||||
|
||||
/**
|
||||
* @brief Process a response or ack to an MQTT request (PING, PUBLISH,
|
||||
* SUBSCRIBE or UNSUBSCRIBE). This function processes PINGRESP, PUBACK,
|
||||
* SUBACK, and UNSUBACK.
|
||||
*
|
||||
* @param[in] pxIncomingPacket is a pointer to structure containing deserialized
|
||||
* MQTT response.
|
||||
* @param[in] usPacketId is the packet identifier from the ack received.
|
||||
*/
|
||||
static void prvMQTTProcessResponse( MQTTPacketInfo_t * pxIncomingPacket,
|
||||
uint16_t usPacketId );
|
||||
|
||||
/**
|
||||
* @brief Process incoming Publish message.
|
||||
*
|
||||
* @param[in] pxPublishInfo is a pointer to structure containing deserialized
|
||||
* Publish message.
|
||||
*/
|
||||
static void prvMQTTProcessIncomingPublish( MQTTPublishInfo_t * pxPublishInfo );
|
||||
|
||||
/**
|
||||
* @brief The application callback function for getting the incoming publishes,
|
||||
* incoming acks, and ping responses reported from the MQTT library.
|
||||
*
|
||||
* @param[in] pxMQTTContext MQTT context pointer.
|
||||
* @param[in] pxPacketInfo Packet Info pointer for the incoming packet.
|
||||
* @param[in] pxDeserializedInfo Deserialized information from the incoming packet.
|
||||
*/
|
||||
static void prvEventCallback( MQTTContext_t * pxMQTTContext,
|
||||
MQTTPacketInfo_t * pxPacketInfo,
|
||||
MQTTDeserializedInfo_t * pxDeserializedInfo );
|
||||
|
||||
/**
|
||||
* @brief TLS connect to endpoint democonfigMQTT_BROKER_ENDPOINT.
|
||||
*
|
||||
* @param[in] pxNetworkCredentials Network credentials to establish a TLS connection
|
||||
* with democonfigMQTT_BROKER_ENDPOINT.
|
||||
* @param[in] pxNetworkCredentials Network context.
|
||||
*/
|
||||
static void prvTLSConnect( NetworkCredentials_t * pxNetworkCredentials,
|
||||
NetworkContext_t * pxNetworkContext );
|
||||
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
/* @brief Static buffer used to hold MQTT messages being sent and received. */
|
||||
static uint8_t ucSharedBuffer[ democonfigNETWORK_BUFFER_SIZE ];
|
||||
|
||||
/**
|
||||
* @brief Global entry time into the application to use as a reference timestamp
|
||||
* in the #prvGetTimeMs function. #prvGetTimeMs will always return the difference
|
||||
* between the current time and the global entry time. This will reduce the chances
|
||||
* of overflow for the 32 bit unsigned integer used for holding the timestamp.
|
||||
*/
|
||||
static uint32_t ulGlobalEntryTimeMs;
|
||||
|
||||
/**
|
||||
* @brief Packet Identifier generated when Publish request was sent to the broker;
|
||||
* it is used to match received Publish ACK to the transmitted Publish packet.
|
||||
*/
|
||||
static uint16_t usPublishPacketIdentifier;
|
||||
|
||||
/**
|
||||
* @brief Packet Identifier generated when Subscribe request was sent to the broker;
|
||||
* it is used to match received Subscribe ACK to the transmitted Subscribe packet.
|
||||
*/
|
||||
static uint16_t usSubscribePacketIdentifier;
|
||||
|
||||
/**
|
||||
* @brief Packet Identifier generated when Unsubscribe request was sent to the broker;
|
||||
* it is used to match received Unsubscribe response to the transmitted Unsubscribe
|
||||
* request.
|
||||
*/
|
||||
static uint16_t usUnsubscribePacketIdentifier;
|
||||
|
||||
/** @brief Static buffer used to hold MQTT messages being sent and received. */
|
||||
static MQTTFixedBuffer_t xBuffer =
|
||||
{
|
||||
ucSharedBuffer,
|
||||
democonfigNETWORK_BUFFER_SIZE
|
||||
};
|
||||
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
/*
|
||||
* @brief Create the task that demonstrates the MQTT API Demo over a
|
||||
* mutually authenticated network connection with MQTT broker.
|
||||
*/
|
||||
void vStartSimpleMQTTDemo( void )
|
||||
{
|
||||
/* This example uses a single application task, which in turn is used to
|
||||
* connect, subscribe, publish, unsubscribe and disconnect from the MQTT
|
||||
* broker. */
|
||||
xTaskCreate( prvMQTTDemoTask, /* Function that implements the task. */
|
||||
"MQTTDemo", /* Text name for the task - only used for debugging. */
|
||||
democonfigDEMO_STACKSIZE, /* Size of stack (in words, not bytes) to allocate for the task. */
|
||||
NULL, /* Task parameter - not used in this case. */
|
||||
tskIDLE_PRIORITY, /* Task priority, must be between 0 and configMAX_PRIORITIES - 1. */
|
||||
NULL ); /* Used to pass out a handle to the created task - not used in this case. */
|
||||
}
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
/*
|
||||
* @brief The Example shown below uses MQTT APIs to create MQTT messages and
|
||||
* send them over the mutually authenticated network connection established with the
|
||||
* MQTT broker. This example is single threaded and uses statically allocated
|
||||
* memory. It uses QoS1 for sending to and receiving messages from the broker.
|
||||
*
|
||||
* This MQTT client subscribes to the topic as specified in mqttexampleTOPIC at the
|
||||
* top of this file by sending a subscribe packet and then waiting for a subscribe
|
||||
* acknowledgment (SUBACK).This client will then publish to the same topic it
|
||||
* subscribed to, so it will expect all the messages it sends to the broker to be
|
||||
* sent back to it from the broker.
|
||||
*/
|
||||
static void prvMQTTDemoTask( void * pvParameters )
|
||||
{
|
||||
uint32_t ulPublishCount = 0U;
|
||||
const uint32_t ulMaxPublishCount = 5UL;
|
||||
NetworkContext_t xNetworkContext = { 0 };
|
||||
NetworkCredentials_t xNetworkCredentials = { 0 };
|
||||
MQTTContext_t xMQTTContext = { 0 };
|
||||
MQTTStatus_t xMQTTStatus;
|
||||
|
||||
/* Remove compiler warnings about unused parameters. */
|
||||
( void ) pvParameters;
|
||||
|
||||
/* Set the entry time of the demo application. This entry time will be used
|
||||
* to calculate relative time elapsed in the execution of the demo application,
|
||||
* by the timer utility function that is provided to the MQTT library.
|
||||
*/
|
||||
ulGlobalEntryTimeMs = prvGetTimeMs();
|
||||
|
||||
for( ; ; )
|
||||
{
|
||||
/****************************** Connect. ******************************/
|
||||
|
||||
/* Establish a TLS connection with the MQTT broker. This example connects to
|
||||
* the MQTT broker as specified by democonfigMQTT_BROKER_ENDPOINT and
|
||||
* democonfigMQTT_BROKER_PORT in the demo_config.h file. */
|
||||
LogInfo( ( "Creating a TLS connection to %s:%u.\r\n",
|
||||
democonfigMQTT_BROKER_ENDPOINT,
|
||||
democonfigMQTT_BROKER_PORT ) );
|
||||
prvTLSConnect( &xNetworkCredentials, &xNetworkContext );
|
||||
|
||||
/* Sends an MQTT Connect packet over the already established TLS connection,
|
||||
* and waits for connection acknowledgment (CONNACK) packet. */
|
||||
LogInfo( ( "Creating an MQTT connection to %s.\r\n", democonfigMQTT_BROKER_ENDPOINT ) );
|
||||
prvCreateMQTTConnectionWithBroker( &xMQTTContext, &xNetworkContext );
|
||||
|
||||
/**************************** Subscribe. ******************************/
|
||||
|
||||
/* The client is now connected to the broker. Subscribe to the topic
|
||||
* as specified in mqttexampleTOPIC at the top of this file by sending a
|
||||
* subscribe packet then waiting for a subscribe acknowledgment (SUBACK).
|
||||
* The function #prvMQTTSubscribeToTopic will not wait to receive a SUBACK,
|
||||
* but the function #MQTT_ProcessLoop will attempt to receive the SUBACK
|
||||
* from network and if a SUBACK is received, application will be notified
|
||||
* through the callback registered (#prvEventCallback for this application).
|
||||
* This demo uses QoS1 in Subscribe, therefore, the Publish messages
|
||||
* received from the broker will have QoS1. */
|
||||
LogInfo( ( "Attempt to subscribe to the MQTT topic %s.\r\n", mqttexampleTOPIC ) );
|
||||
prvMQTTSubscribeToTopic( &xMQTTContext );
|
||||
|
||||
/* Process incoming packet from the broker. After sending the subscribe, the
|
||||
* client may receive a publish before it receives a subscribe ack. Therefore,
|
||||
* call generic incoming packet processing function. Since this demo is
|
||||
* subscribing to the topic to which no one is publishing, probability of
|
||||
* receiving Publish message before subscribe ack is zero; but application
|
||||
* must be ready to receive any packet. This demo uses the generic packet
|
||||
* processing function everywhere to highlight this fact. */
|
||||
xMQTTStatus = MQTT_ProcessLoop( &xMQTTContext, mqttexamplePROCESS_LOOP_TIMEOUT_MS );
|
||||
|
||||
|
||||
configASSERT( xMQTTStatus == MQTTSuccess );
|
||||
|
||||
/**************************** Publish and Keep Alive Loop. ******************************/
|
||||
/* Publish messages with QoS1, send and process Keep alive messages. */
|
||||
for( ulPublishCount = 0; ulPublishCount < ulMaxPublishCount; ulPublishCount++ )
|
||||
{
|
||||
LogInfo( ( "Publish to the MQTT topic %s.\r\n", mqttexampleTOPIC ) );
|
||||
prvMQTTPublishToTopic( &xMQTTContext );
|
||||
|
||||
/* Process incoming publish echo, since application subscribed to the same
|
||||
* topic, the broker will send publish message back to the application. */
|
||||
LogInfo( ( "Attempt to receive publish message from broker.\r\n" ) );
|
||||
xMQTTStatus = MQTT_ProcessLoop( &xMQTTContext, mqttexamplePROCESS_LOOP_TIMEOUT_MS );
|
||||
configASSERT( xMQTTStatus == MQTTSuccess );
|
||||
|
||||
/* Leave Connection Idle for some time. */
|
||||
LogInfo( ( "Keeping Connection Idle...\r\n\r\n" ) );
|
||||
vTaskDelay( mqttexampleDELAY_BETWEEN_PUBLISHES_TICKS );
|
||||
}
|
||||
|
||||
/************************ Unsubscribe from the topic. **************************/
|
||||
LogInfo( ( "Unsubscribe from the MQTT topic %s.\r\n", mqttexampleTOPIC ) );
|
||||
prvMQTTUnsubscribeFromTopic( &xMQTTContext );
|
||||
|
||||
/* Process incoming UNSUBACK packet from the broker. */
|
||||
xMQTTStatus = MQTT_ProcessLoop( &xMQTTContext, mqttexamplePROCESS_LOOP_TIMEOUT_MS );
|
||||
configASSERT( xMQTTStatus == MQTTSuccess );
|
||||
|
||||
/**************************** Disconnect. ******************************/
|
||||
|
||||
/* Send an MQTT Disconnect packet over the already connected TLS over TCP connection.
|
||||
* There is no corresponding response for the disconnect packet. After sending
|
||||
* disconnect, client must close the network connection. */
|
||||
LogInfo( ( "Disconnecting the MQTT connection with %s.\r\n", democonfigMQTT_BROKER_ENDPOINT ) );
|
||||
MQTT_Disconnect( &xMQTTContext );
|
||||
|
||||
/* Close the network connection. */
|
||||
TLS_FreeRTOS_Disconnect( &xNetworkContext );
|
||||
|
||||
/* Wait for some time between two iterations to ensure that we do not
|
||||
* the broker. */
|
||||
LogInfo( ( "prvMQTTDemoTask() completed an iteration successfully. Total free heap is %u.\r\n", xPortGetFreeHeapSize() ) );
|
||||
LogInfo( ( "Demo completed successfully.\r\n" ) );
|
||||
LogInfo( ( "Short delay before starting the next iteration.... \r\n\r\n" ) );
|
||||
vTaskDelay( mqttexampleDELAY_BETWEEN_DEMO_ITERATIONS_TICKS );
|
||||
}
|
||||
}
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
static void prvTLSConnect( NetworkCredentials_t * pxNetworkCredentials,
|
||||
NetworkContext_t * pxNetworkContext )
|
||||
{
|
||||
BaseType_t xNetworkStatus;
|
||||
|
||||
/* Set the credentials for establishing a TLS connection. */
|
||||
pxNetworkCredentials->pRootCa = ( const unsigned char * ) democonfigROOT_CA_PEM;
|
||||
pxNetworkCredentials->rootCaSize = sizeof( democonfigROOT_CA_PEM );
|
||||
pxNetworkCredentials->pClientCert = ( const unsigned char * ) democonfigCLIENT_CERTIFICATE_PEM;
|
||||
pxNetworkCredentials->clientCertSize = sizeof( democonfigCLIENT_CERTIFICATE_PEM );
|
||||
pxNetworkCredentials->pPrivateKey = ( const unsigned char * ) democonfigCLIENT_PRIVATE_KEY_PEM;
|
||||
pxNetworkCredentials->privateKeySize = sizeof( democonfigCLIENT_PRIVATE_KEY_PEM );
|
||||
|
||||
/* Attempt to create a mutually authenticated TLS connection. */
|
||||
xNetworkStatus = TLS_FreeRTOS_Connect( pxNetworkContext,
|
||||
democonfigMQTT_BROKER_ENDPOINT,
|
||||
democonfigMQTT_BROKER_PORT,
|
||||
pxNetworkCredentials,
|
||||
mqttexampleTRANSPORT_SEND_RECV_TIMEOUT_MS,
|
||||
mqttexampleTRANSPORT_SEND_RECV_TIMEOUT_MS );
|
||||
configASSERT( xNetworkStatus == TLS_TRANSPORT_SUCCESS );
|
||||
LogInfo( ( "A mutually authenticated TLS connection established with %s:%u.\r\n",
|
||||
democonfigMQTT_BROKER_ENDPOINT,
|
||||
democonfigMQTT_BROKER_PORT ) );
|
||||
}
|
||||
/*-----------------------------------------------------------*/
|
||||
static void prvCreateMQTTConnectionWithBroker( MQTTContext_t * pxMQTTContext,
|
||||
NetworkContext_t * pxNetworkContext )
|
||||
{
|
||||
MQTTStatus_t xResult;
|
||||
MQTTConnectInfo_t xConnectInfo;
|
||||
bool xSessionPresent;
|
||||
TransportInterface_t xTransport;
|
||||
|
||||
/***
|
||||
* For readability, error handling in this function is restricted to the use of
|
||||
* asserts().
|
||||
***/
|
||||
|
||||
/* Fill in Transport Interface send and receive function pointers. */
|
||||
xTransport.pNetworkContext = pxNetworkContext;
|
||||
xTransport.send = TLS_FreeRTOS_send;
|
||||
xTransport.recv = TLS_FreeRTOS_recv;
|
||||
|
||||
/* Initialize MQTT library. */
|
||||
xResult = MQTT_Init( pxMQTTContext, &xTransport, prvGetTimeMs, prvEventCallback, &xBuffer );
|
||||
configASSERT( xResult == MQTTSuccess );
|
||||
|
||||
/* Some fields are not used in this demo so start with everything at 0. */
|
||||
memset( ( void * ) &xConnectInfo, 0x00, sizeof( xConnectInfo ) );
|
||||
|
||||
/* Start with a clean session i.e. direct the MQTT broker to discard any
|
||||
* previous session data. Also, establishing a connection with clean session
|
||||
* will ensure that the broker does not store any data when this client
|
||||
* gets disconnected. */
|
||||
xConnectInfo.cleanSession = true;
|
||||
|
||||
/* The client identifier is used to uniquely identify this MQTT client to
|
||||
* the MQTT broker. In a production device the identifier can be something
|
||||
* unique, such as a device serial number. */
|
||||
xConnectInfo.pClientIdentifier = democonfigCLIENT_IDENTIFIER;
|
||||
xConnectInfo.clientIdentifierLength = ( uint16_t ) strlen( democonfigCLIENT_IDENTIFIER );
|
||||
|
||||
/* Set MQTT keep-alive period. If the application does not send packets at an interval less than
|
||||
* the keep-alive period, the MQTT library will send PINGREQ packets. */
|
||||
xConnectInfo.keepAliveSeconds = mqttexampleKEEP_ALIVE_TIMEOUT_SECONDS;
|
||||
|
||||
/* Send MQTT CONNECT packet to broker. LWT is not used in this demo, so it
|
||||
* is passed as NULL. */
|
||||
xResult = MQTT_Connect( pxMQTTContext,
|
||||
&xConnectInfo,
|
||||
NULL,
|
||||
mqttexampleCONNACK_RECV_TIMEOUT_MS,
|
||||
&xSessionPresent );
|
||||
configASSERT( xResult == MQTTSuccess );
|
||||
|
||||
/* Successfully established and MQTT connection with the broker. */
|
||||
LogInfo( ( "An MQTT connection is established with %s.", democonfigMQTT_BROKER_ENDPOINT ) );
|
||||
}
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
static void prvMQTTSubscribeToTopic( MQTTContext_t * pxMQTTContext )
|
||||
{
|
||||
MQTTStatus_t xResult;
|
||||
MQTTSubscribeInfo_t xMQTTSubscription[ 1 ];
|
||||
|
||||
/***
|
||||
* For readability, error handling in this function is restricted to the use of
|
||||
* asserts().
|
||||
***/
|
||||
|
||||
/* Some fields are not used by this demo so start with everything at 0. */
|
||||
( void ) memset( ( void * ) &xMQTTSubscription, 0x00, sizeof( xMQTTSubscription ) );
|
||||
|
||||
/* Subscribe to the mqttexampleTOPIC topic filter. This example subscribes to
|
||||
* only one topic and uses QoS1. */
|
||||
xMQTTSubscription[ 0 ].qos = MQTTQoS1;
|
||||
xMQTTSubscription[ 0 ].pTopicFilter = mqttexampleTOPIC;
|
||||
xMQTTSubscription[ 0 ].topicFilterLength = ( uint16_t ) strlen( mqttexampleTOPIC );
|
||||
|
||||
/* Get a unique packet id. */
|
||||
usSubscribePacketIdentifier = MQTT_GetPacketId( pxMQTTContext );
|
||||
|
||||
/* Send SUBSCRIBE packet. */
|
||||
xResult = MQTT_Subscribe( pxMQTTContext,
|
||||
xMQTTSubscription,
|
||||
sizeof( xMQTTSubscription ) / sizeof( MQTTSubscribeInfo_t ),
|
||||
usSubscribePacketIdentifier );
|
||||
|
||||
configASSERT( xResult == MQTTSuccess );
|
||||
}
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
static void prvMQTTPublishToTopic( MQTTContext_t * pxMQTTContext )
|
||||
{
|
||||
MQTTStatus_t xResult;
|
||||
MQTTPublishInfo_t xMQTTPublishInfo;
|
||||
|
||||
|
||||
/***
|
||||
* For readability, error handling in this function is restricted to the use of
|
||||
* asserts().
|
||||
***/
|
||||
|
||||
/* Some fields are not used by this demo so start with everything at 0. */
|
||||
( void ) memset( ( void * ) &xMQTTPublishInfo, 0x00, sizeof( xMQTTPublishInfo ) );
|
||||
|
||||
/* This demo uses QoS1 */
|
||||
xMQTTPublishInfo.qos = MQTTQoS1;
|
||||
xMQTTPublishInfo.retain = false;
|
||||
xMQTTPublishInfo.pTopicName = mqttexampleTOPIC;
|
||||
xMQTTPublishInfo.topicNameLength = ( uint16_t ) strlen( mqttexampleTOPIC );
|
||||
xMQTTPublishInfo.pPayload = mqttexampleMESSAGE;
|
||||
xMQTTPublishInfo.payloadLength = strlen( mqttexampleMESSAGE );
|
||||
|
||||
/* Get a unique packet id. */
|
||||
usPublishPacketIdentifier = MQTT_GetPacketId( pxMQTTContext );
|
||||
|
||||
/* Send PUBLISH packet. Packet ID is not used for a QoS1 publish. */
|
||||
xResult = MQTT_Publish( pxMQTTContext, &xMQTTPublishInfo, usPublishPacketIdentifier );
|
||||
|
||||
configASSERT( xResult == MQTTSuccess );
|
||||
}
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
static void prvMQTTUnsubscribeFromTopic( MQTTContext_t * pxMQTTContext )
|
||||
{
|
||||
MQTTStatus_t xResult;
|
||||
MQTTSubscribeInfo_t xMQTTSubscription[ 1 ];
|
||||
|
||||
/* Some fields are not used by this demo so start with everything at 0. */
|
||||
memset( ( void * ) &xMQTTSubscription, 0x00, sizeof( xMQTTSubscription ) );
|
||||
|
||||
/* Unsubscribe to the mqttexampleTOPIC topic filter. */
|
||||
xMQTTSubscription[ 0 ].pTopicFilter = mqttexampleTOPIC;
|
||||
xMQTTSubscription[ 0 ].topicFilterLength = ( uint16_t ) strlen( mqttexampleTOPIC );
|
||||
|
||||
/* Get next unique packet identifier */
|
||||
usUnsubscribePacketIdentifier = MQTT_GetPacketId( pxMQTTContext );
|
||||
/* Make sure the packet id obtained is valid. */
|
||||
configASSERT( usUnsubscribePacketIdentifier != 0 );
|
||||
|
||||
/* Send UNSUBSCRIBE packet. */
|
||||
xResult = MQTT_Unsubscribe( pxMQTTContext,
|
||||
xMQTTSubscription,
|
||||
sizeof( xMQTTSubscription ) / sizeof( MQTTSubscribeInfo_t ),
|
||||
usUnsubscribePacketIdentifier );
|
||||
|
||||
configASSERT( xResult == MQTTSuccess );
|
||||
}
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
static void prvMQTTProcessResponse( MQTTPacketInfo_t * pxIncomingPacket,
|
||||
uint16_t usPacketId )
|
||||
{
|
||||
switch( pxIncomingPacket->type )
|
||||
{
|
||||
case MQTT_PACKET_TYPE_PUBACK:
|
||||
LogInfo( ( "PUBACK received for packet Id %u.\r\n", usPacketId ) );
|
||||
/* Make sure ACK packet identifier matches with Request packet identifier. */
|
||||
configASSERT( usPublishPacketIdentifier == usPacketId );
|
||||
break;
|
||||
|
||||
case MQTT_PACKET_TYPE_SUBACK:
|
||||
LogInfo( ( "Subscribed to the topic %s.\r\n", mqttexampleTOPIC ) );
|
||||
/* Make sure ACK packet identifier matches with Request packet identifier. */
|
||||
configASSERT( usSubscribePacketIdentifier == usPacketId );
|
||||
break;
|
||||
|
||||
case MQTT_PACKET_TYPE_UNSUBACK:
|
||||
LogInfo( ( "Unsubscribed from the topic %s.\r\n", mqttexampleTOPIC ) );
|
||||
/* Make sure ACK packet identifier matches with Request packet identifier. */
|
||||
configASSERT( usUnsubscribePacketIdentifier == usPacketId );
|
||||
break;
|
||||
|
||||
case MQTT_PACKET_TYPE_PINGRESP:
|
||||
LogInfo( ( "Ping Response successfully received.\r\n" ) );
|
||||
break;
|
||||
|
||||
/* Any other packet type is invalid. */
|
||||
default:
|
||||
LogWarn( ( "prvMQTTProcessResponse() called with unknown packet type:(%02X).\r\n",
|
||||
pxIncomingPacket->type ) );
|
||||
}
|
||||
}
|
||||
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
static void prvMQTTProcessIncomingPublish( MQTTPublishInfo_t * pxPublishInfo )
|
||||
{
|
||||
configASSERT( pxPublishInfo != NULL );
|
||||
|
||||
/* Process incoming Publish. */
|
||||
LogInfo( ( "Incoming QoS : %d\n", pxPublishInfo->qos ) );
|
||||
|
||||
/* Verify the received publish is for the we have subscribed to. */
|
||||
if( ( pxPublishInfo->topicNameLength == strlen( mqttexampleTOPIC ) ) &&
|
||||
( 0 == strncmp( mqttexampleTOPIC, pxPublishInfo->pTopicName, pxPublishInfo->topicNameLength ) ) )
|
||||
{
|
||||
LogInfo( ( "\r\nIncoming Publish Topic Name: %.*s matches subscribed topic.\r\n"
|
||||
"Incoming Publish Message : %.*s\r\n",
|
||||
pxPublishInfo->topicNameLength,
|
||||
pxPublishInfo->pTopicName,
|
||||
pxPublishInfo->payloadLength,
|
||||
pxPublishInfo->pPayload ) );
|
||||
}
|
||||
else
|
||||
{
|
||||
LogInfo( ( "Incoming Publish Topic Name: %.*s does not match subscribed topic.\r\n",
|
||||
pxPublishInfo->topicNameLength,
|
||||
pxPublishInfo->pTopicName ) );
|
||||
}
|
||||
}
|
||||
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
static void prvEventCallback( MQTTContext_t * pxMQTTContext,
|
||||
MQTTPacketInfo_t * pxPacketInfo,
|
||||
MQTTDeserializedInfo_t * pxDeserializedInfo )
|
||||
{
|
||||
/* The MQTT context is not used for this demo. */
|
||||
( void ) pxMQTTContext;
|
||||
|
||||
if( ( pxPacketInfo->type & 0xF0U ) == MQTT_PACKET_TYPE_PUBLISH )
|
||||
{
|
||||
prvMQTTProcessIncomingPublish( pxDeserializedInfo->pPublishInfo );
|
||||
}
|
||||
else
|
||||
{
|
||||
prvMQTTProcessResponse( pxPacketInfo, pxDeserializedInfo->packetIdentifier );
|
||||
}
|
||||
}
|
||||
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
static uint32_t prvGetTimeMs( void )
|
||||
{
|
||||
TickType_t xTickCount = 0;
|
||||
uint32_t ulTimeMs = 0UL;
|
||||
|
||||
/* Get the current tick count. */
|
||||
xTickCount = xTaskGetTickCount();
|
||||
|
||||
/* Convert the ticks to milliseconds. */
|
||||
ulTimeMs = ( uint32_t ) xTickCount * _MILLISECONDS_PER_TICK;
|
||||
|
||||
/* Reduce ulGlobalEntryTimeMs from obtained time so as to always return the
|
||||
* elapsed time in the application. */
|
||||
ulTimeMs = ( uint32_t ) ( ulTimeMs - ulGlobalEntryTimeMs );
|
||||
|
||||
return ulTimeMs;
|
||||
}
|
||||
|
||||
/*-----------------------------------------------------------*/
|
@ -0,0 +1,215 @@
|
||||
/*
|
||||
* FreeRTOS V202012.00
|
||||
* Copyright (C) 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
||||
*
|
||||
* Permission is hereby granted, free of charge, to any person obtaining a copy of
|
||||
* this software and associated documentation files (the "Software"), to deal in
|
||||
* the Software without restriction, including without limitation the rights to
|
||||
* use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
|
||||
* the Software, and to permit persons to whom the Software is furnished to do so,
|
||||
* subject to the following conditions:
|
||||
*
|
||||
* The above copyright notice and this permission notice shall be included in all
|
||||
* copies or substantial portions of the Software.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
|
||||
* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
|
||||
* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
|
||||
* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
||||
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||
*
|
||||
* https://www.FreeRTOS.org
|
||||
* https://github.com/FreeRTOS
|
||||
*
|
||||
*/
|
||||
|
||||
#ifndef FREERTOS_CONFIG_H
|
||||
#define FREERTOS_CONFIG_H
|
||||
|
||||
/*-----------------------------------------------------------
|
||||
* Application specific definitions.
|
||||
*
|
||||
* These definitions should be adjusted for your particular hardware and
|
||||
* application requirements.
|
||||
*
|
||||
* THESE PARAMETERS ARE DESCRIBED WITHIN THE 'CONFIGURATION' SECTION OF THE
|
||||
* FreeRTOS API DOCUMENTATION AVAILABLE ON THE FreeRTOS.org WEB SITE.
|
||||
* http://www.freertos.org/a00110.html
|
||||
*
|
||||
* The bottom of this file contains some constants specific to running the UDP
|
||||
* stack in this demo. Constants specific to FreeRTOS+TCP itself (rather than
|
||||
* the demo) are contained in FreeRTOSIPConfig.h.
|
||||
*----------------------------------------------------------*/
|
||||
#define configUSE_PREEMPTION 1
|
||||
#define configUSE_PORT_OPTIMISED_TASK_SELECTION 1
|
||||
#define configMAX_PRIORITIES ( 7 )
|
||||
#define configTICK_RATE_HZ ( 1000 ) /* In this non-real time simulated environment the tick frequency has to be at least a multiple of the Win32 tick frequency, and therefore very slow. */
|
||||
#define configMINIMAL_STACK_SIZE ( ( unsigned short ) 60 ) /* In this simulated case, the stack only has to hold one small structure as the real stack is part of the Win32 thread. */
|
||||
#define configTOTAL_HEAP_SIZE ( ( size_t ) ( 2048U * 1024U ) )
|
||||
#define configMAX_TASK_NAME_LEN ( 15 )
|
||||
#define configUSE_TRACE_FACILITY 0
|
||||
#define configUSE_16_BIT_TICKS 0
|
||||
#define configIDLE_SHOULD_YIELD 1
|
||||
#define configUSE_CO_ROUTINES 0
|
||||
#define configUSE_MUTEXES 1
|
||||
#define configUSE_RECURSIVE_MUTEXES 1
|
||||
#define configQUEUE_REGISTRY_SIZE 0
|
||||
#define configUSE_APPLICATION_TASK_TAG 0
|
||||
#define configUSE_COUNTING_SEMAPHORES 1
|
||||
#define configUSE_ALTERNATIVE_API 0
|
||||
#define configNUM_THREAD_LOCAL_STORAGE_POINTERS 0
|
||||
#define configENABLE_BACKWARD_COMPATIBILITY 1
|
||||
#define configSUPPORT_STATIC_ALLOCATION 1
|
||||
|
||||
/* Hook function related definitions. */
|
||||
#define configUSE_TICK_HOOK 0
|
||||
#define configUSE_IDLE_HOOK 0
|
||||
#define configUSE_MALLOC_FAILED_HOOK 0
|
||||
#define configCHECK_FOR_STACK_OVERFLOW 0 /* Not applicable to the Win32 port. */
|
||||
|
||||
/* Software timer related definitions. */
|
||||
#define configUSE_TIMERS 1
|
||||
#define configTIMER_TASK_PRIORITY ( configMAX_PRIORITIES - 1 )
|
||||
#define configTIMER_QUEUE_LENGTH 5
|
||||
#define configTIMER_TASK_STACK_DEPTH ( configMINIMAL_STACK_SIZE * 2 )
|
||||
|
||||
/* Event group related definitions. */
|
||||
#define configUSE_EVENT_GROUPS 1
|
||||
|
||||
/* Run time stats gathering configuration options. */
|
||||
#define configGENERATE_RUN_TIME_STATS 0
|
||||
|
||||
/* Co-routine definitions. */
|
||||
#define configUSE_CO_ROUTINES 0
|
||||
#define configMAX_CO_ROUTINE_PRIORITIES ( 2 )
|
||||
|
||||
/* Set the following definitions to 1 to include the API function, or zero
|
||||
* to exclude the API function. */
|
||||
#define INCLUDE_vTaskPrioritySet 1
|
||||
#define INCLUDE_uxTaskPriorityGet 1
|
||||
#define INCLUDE_vTaskDelete 1
|
||||
#define INCLUDE_vTaskCleanUpResources 0
|
||||
#define INCLUDE_vTaskSuspend 1
|
||||
#define INCLUDE_vTaskDelayUntil 1
|
||||
#define INCLUDE_vTaskDelay 1
|
||||
#define INCLUDE_uxTaskGetStackHighWaterMark 1
|
||||
#define INCLUDE_xTaskGetSchedulerState 1
|
||||
#define INCLUDE_xTimerGetTimerTaskHandle 0
|
||||
#define INCLUDE_xTaskGetIdleTaskHandle 0
|
||||
#define INCLUDE_xQueueGetMutexHolder 1
|
||||
#define INCLUDE_eTaskGetState 1
|
||||
#define INCLUDE_xEventGroupSetBitsFromISR 1
|
||||
#define INCLUDE_xTimerPendFunctionCall 1
|
||||
#define INCLUDE_pcTaskGetTaskName 1
|
||||
|
||||
/* This demo makes use of one or more example stats formatting functions. These
|
||||
* format the raw data provided by the uxTaskGetSystemState() function in to human
|
||||
* readable ASCII form. See the notes in the implementation of vTaskList() within
|
||||
* FreeRTOS/Source/tasks.c for limitations. configUSE_STATS_FORMATTING_FUNCTIONS
|
||||
* is set to 2 so the formatting functions are included without the stdio.h being
|
||||
* included in tasks.c. That is because this project defines its own sprintf()
|
||||
* functions. */
|
||||
#define configUSE_STATS_FORMATTING_FUNCTIONS 1
|
||||
|
||||
/* Assert call defined for debug builds. */
|
||||
#ifdef _DEBUG
|
||||
extern void vAssertCalled( const char * pcFile,
|
||||
uint32_t ulLine );
|
||||
#define configASSERT( x ) if( ( x ) == 0 ) vAssertCalled( __FILE__, __LINE__ )
|
||||
#endif /* _DEBUG */
|
||||
|
||||
|
||||
|
||||
/* Application specific definitions follow. **********************************/
|
||||
|
||||
/* Only used when running in the FreeRTOS Windows simulator. Defines the
|
||||
* priority of the task used to simulate Ethernet interrupts. */
|
||||
#define configMAC_ISR_SIMULATOR_PRIORITY ( configMAX_PRIORITIES - 1 )
|
||||
|
||||
/* This demo creates a virtual network connection by accessing the raw Ethernet
|
||||
* or WiFi data to and from a real network connection. Many computers have more
|
||||
* than one real network port, and configNETWORK_INTERFACE_TO_USE is used to tell
|
||||
* the demo which real port should be used to create the virtual port. The ports
|
||||
* available are displayed on the console when the application is executed. For
|
||||
* example, on my development laptop setting configNETWORK_INTERFACE_TO_USE to 4
|
||||
* results in the wired network being used, while setting
|
||||
* configNETWORK_INTERFACE_TO_USE to 2 results in the wireless network being
|
||||
* used. */
|
||||
#define configNETWORK_INTERFACE_TO_USE 0L
|
||||
|
||||
/* The address to which logging is sent should UDP logging be enabled. */
|
||||
#define configUDP_LOGGING_ADDR0 192
|
||||
#define configUDP_LOGGING_ADDR1 168
|
||||
#define configUDP_LOGGING_ADDR2 0
|
||||
#define configUDP_LOGGING_ADDR3 11
|
||||
|
||||
/* Default MAC address configuration. The demo creates a virtual network
|
||||
* connection that uses this MAC address by accessing the raw Ethernet/WiFi data
|
||||
* to and from a real network connection on the host PC. See the
|
||||
* configNETWORK_INTERFACE_TO_USE definition above for information on how to
|
||||
* configure the real network connection to use. */
|
||||
#define configMAC_ADDR0 0x00
|
||||
#define configMAC_ADDR1 0x11
|
||||
#define configMAC_ADDR2 0x11
|
||||
#define configMAC_ADDR3 0x11
|
||||
#define configMAC_ADDR4 0x11
|
||||
#define configMAC_ADDR5 0x41
|
||||
|
||||
/* Default IP address configuration. Used in ipconfigUSE_DNS is set to 0, or
|
||||
* ipconfigUSE_DNS is set to 1 but a DNS server cannot be contacted. */
|
||||
#define configIP_ADDR0 10
|
||||
#define configIP_ADDR1 10
|
||||
#define configIP_ADDR2 10
|
||||
#define configIP_ADDR3 200
|
||||
|
||||
/* Default gateway IP address configuration. Used in ipconfigUSE_DNS is set to
|
||||
* 0, or ipconfigUSE_DNS is set to 1 but a DNS server cannot be contacted. */
|
||||
#define configGATEWAY_ADDR0 10
|
||||
#define configGATEWAY_ADDR1 10
|
||||
#define configGATEWAY_ADDR2 10
|
||||
#define configGATEWAY_ADDR3 1
|
||||
|
||||
/* Default DNS server configuration. OpenDNS addresses are 208.67.222.222 and
|
||||
* 208.67.220.220. Used in ipconfigUSE_DNS is set to 0, or ipconfigUSE_DNS is set
|
||||
* to 1 but a DNS server cannot be contacted.*/
|
||||
#define configDNS_SERVER_ADDR0 208
|
||||
#define configDNS_SERVER_ADDR1 67
|
||||
#define configDNS_SERVER_ADDR2 222
|
||||
#define configDNS_SERVER_ADDR3 222
|
||||
|
||||
/* Default netmask configuration. Used in ipconfigUSE_DNS is set to 0, or
|
||||
* ipconfigUSE_DNS is set to 1 but a DNS server cannot be contacted. */
|
||||
#define configNET_MASK0 255
|
||||
#define configNET_MASK1 0
|
||||
#define configNET_MASK2 0
|
||||
#define configNET_MASK3 0
|
||||
|
||||
/* The UDP port to which print messages are sent. */
|
||||
#define configPRINT_PORT ( 15000 )
|
||||
|
||||
/* Task pool definitions for the demos of IoT Libraries. */
|
||||
#define configTASKPOOL_ENABLE_ASSERTS 1
|
||||
#define configTASKPOOL_NUMBER_OF_WORKERS 1
|
||||
#define configTASKPOOL_WORKER_PRIORITY tskIDLE_PRIORITY
|
||||
#define configTASKPOOL_WORKER_STACK_SIZE_BYTES 2048
|
||||
|
||||
#if ( defined( _MSC_VER ) && ( _MSC_VER <= 1600 ) && !defined( snprintf ) )
|
||||
/* Map to Windows names. */
|
||||
#define snprintf _snprintf
|
||||
#define vsnprintf _vsnprintf
|
||||
#endif
|
||||
|
||||
/* Visual studio does not have an implementation of strcasecmp(). */
|
||||
#define strcasecmp _stricmp
|
||||
#define strncasecmp _strnicmp
|
||||
#define strcmpi _strcmpi
|
||||
|
||||
/* Prototype for the function used to print out. In this case it prints to the
|
||||
* console before the network is connected then a UDP port after the network has
|
||||
* connected. */
|
||||
extern void vLoggingPrintf( const char * pcFormatString,
|
||||
... );
|
||||
#define configPRINTF( X ) vLoggingPrintf X
|
||||
|
||||
#endif /* FREERTOS_CONFIG_H */
|
@ -0,0 +1,310 @@
|
||||
/*
|
||||
* FreeRTOS V202012.00
|
||||
* Copyright (C) 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
||||
*
|
||||
* Permission is hereby granted, free of charge, to any person obtaining a copy of
|
||||
* this software and associated documentation files (the "Software"), to deal in
|
||||
* the Software without restriction, including without limitation the rights to
|
||||
* use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
|
||||
* the Software, and to permit persons to whom the Software is furnished to do so,
|
||||
* subject to the following conditions:
|
||||
*
|
||||
* The above copyright notice and this permission notice shall be included in all
|
||||
* copies or substantial portions of the Software.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
|
||||
* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
|
||||
* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
|
||||
* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
||||
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||
*
|
||||
* https://www.FreeRTOS.org
|
||||
* https://github.com/FreeRTOS
|
||||
*
|
||||
*/
|
||||
|
||||
|
||||
/*****************************************************************************
|
||||
*
|
||||
* See the following URL for configuration information.
|
||||
* http://www.freertos.org/FreeRTOS-Plus/FreeRTOS_Plus_TCP/TCP_IP_Configuration.html
|
||||
*
|
||||
*****************************************************************************/
|
||||
|
||||
#ifndef FREERTOS_IP_CONFIG_H
|
||||
#define FREERTOS_IP_CONFIG_H
|
||||
|
||||
/* Prototype for the function used to print out. In this case it prints to the
|
||||
* console before the network is connected then a UDP port after the network has
|
||||
* connected. */
|
||||
extern void vLoggingPrintf( const char * pcFormatString,
|
||||
... );
|
||||
|
||||
/* Set to 1 to print out debug messages. If ipconfigHAS_DEBUG_PRINTF is set to
|
||||
* 1 then FreeRTOS_debug_printf should be defined to the function used to print
|
||||
* out the debugging messages. */
|
||||
#define ipconfigHAS_DEBUG_PRINTF 0
|
||||
#if ( ipconfigHAS_DEBUG_PRINTF == 1 )
|
||||
#define FreeRTOS_debug_printf( X ) vLoggingPrintf X
|
||||
#endif
|
||||
|
||||
/* Set to 1 to print out non debugging messages, for example the output of the
|
||||
* FreeRTOS_netstat() command, and ping replies. If ipconfigHAS_PRINTF is set to 1
|
||||
* then FreeRTOS_printf should be set to the function used to print out the
|
||||
* messages. */
|
||||
#define ipconfigHAS_PRINTF 1
|
||||
#if ( ipconfigHAS_PRINTF == 1 )
|
||||
#define FreeRTOS_printf( X ) vLoggingPrintf X
|
||||
#endif
|
||||
|
||||
/* Define the byte order of the target MCU (the MCU FreeRTOS+TCP is executing
|
||||
* on). Valid options are pdFREERTOS_BIG_ENDIAN and pdFREERTOS_LITTLE_ENDIAN. */
|
||||
#define ipconfigBYTE_ORDER pdFREERTOS_LITTLE_ENDIAN
|
||||
|
||||
/* If the network card/driver includes checksum offloading (IP/TCP/UDP checksums)
|
||||
* then set ipconfigDRIVER_INCLUDED_RX_IP_CHECKSUM to 1 to prevent the software
|
||||
* stack repeating the checksum calculations. */
|
||||
#define ipconfigDRIVER_INCLUDED_RX_IP_CHECKSUM 1
|
||||
|
||||
/* Several API's will block until the result is known, or the action has been
|
||||
* performed, for example FreeRTOS_send() and FreeRTOS_recv(). The timeouts can be
|
||||
* set per socket, using setsockopt(). If not set, the times below will be
|
||||
* used as defaults. */
|
||||
#define ipconfigSOCK_DEFAULT_RECEIVE_BLOCK_TIME ( 2000 )
|
||||
#define ipconfigSOCK_DEFAULT_SEND_BLOCK_TIME ( 5000 )
|
||||
|
||||
/* Include support for LLMNR: Link-local Multicast Name Resolution
|
||||
* (non-Microsoft) */
|
||||
#define ipconfigUSE_LLMNR ( 0 )
|
||||
|
||||
/* Include support for NBNS: NetBIOS Name Service (Microsoft) */
|
||||
#define ipconfigUSE_NBNS ( 0 )
|
||||
|
||||
/* Include support for DNS caching. For TCP, having a small DNS cache is very
|
||||
* useful. When a cache is present, ipconfigDNS_REQUEST_ATTEMPTS can be kept low
|
||||
* and also DNS may use small timeouts. If a DNS reply comes in after the DNS
|
||||
* socket has been destroyed, the result will be stored into the cache. The next
|
||||
* call to FreeRTOS_gethostbyname() will return immediately, without even creating
|
||||
* a socket. */
|
||||
#define ipconfigUSE_DNS_CACHE ( 1 )
|
||||
#define ipconfigDNS_CACHE_NAME_LENGTH ( 64 )
|
||||
#define ipconfigDNS_CACHE_ENTRIES ( 4 )
|
||||
#define ipconfigDNS_REQUEST_ATTEMPTS ( 2 )
|
||||
|
||||
/* The IP stack executes it its own task (although any application task can make
|
||||
* use of its services through the published sockets API). ipconfigUDP_TASK_PRIORITY
|
||||
* sets the priority of the task that executes the IP stack. The priority is a
|
||||
* standard FreeRTOS task priority so can take any value from 0 (the lowest
|
||||
* priority) to (configMAX_PRIORITIES - 1) (the highest priority).
|
||||
* configMAX_PRIORITIES is a standard FreeRTOS configuration parameter defined in
|
||||
* FreeRTOSConfig.h, not FreeRTOSIPConfig.h. Consideration needs to be given as to
|
||||
* the priority assigned to the task executing the IP stack relative to the
|
||||
* priority assigned to tasks that use the IP stack. */
|
||||
#define ipconfigIP_TASK_PRIORITY ( configMAX_PRIORITIES - 2 )
|
||||
|
||||
/* The size, in words (not bytes), of the stack allocated to the FreeRTOS+TCP
|
||||
* task. This setting is less important when the FreeRTOS Win32 simulator is used
|
||||
* as the Win32 simulator only stores a fixed amount of information on the task
|
||||
* stack. FreeRTOS includes optional stack overflow detection, see:
|
||||
* http://www.freertos.org/Stacks-and-stack-overflow-checking.html */
|
||||
#define ipconfigIP_TASK_STACK_SIZE_WORDS ( configMINIMAL_STACK_SIZE * 5 )
|
||||
|
||||
/* ipconfigRAND32() is called by the IP stack to generate random numbers for
|
||||
* things such as a DHCP transaction number or initial sequence number. Random
|
||||
* number generation is performed via this macro to allow applications to use their
|
||||
* own random number generation method. For example, it might be possible to
|
||||
* generate a random number by sampling noise on an analogue input. */
|
||||
extern UBaseType_t uxRand();
|
||||
#define ipconfigRAND32() uxRand()
|
||||
|
||||
/* If ipconfigUSE_NETWORK_EVENT_HOOK is set to 1 then FreeRTOS+TCP will call the
|
||||
* network event hook at the appropriate times. If ipconfigUSE_NETWORK_EVENT_HOOK
|
||||
* is not set to 1 then the network event hook will never be called. See
|
||||
* http://www.FreeRTOS.org/FreeRTOS-Plus/FreeRTOS_Plus_UDP/API/vApplicationIPNetworkEventHook.shtml
|
||||
*/
|
||||
#define ipconfigUSE_NETWORK_EVENT_HOOK 1
|
||||
|
||||
/* Sockets have a send block time attribute. If FreeRTOS_sendto() is called but
|
||||
* a network buffer cannot be obtained then the calling task is held in the Blocked
|
||||
* state (so other tasks can continue to executed) until either a network buffer
|
||||
* becomes available or the send block time expires. If the send block time expires
|
||||
* then the send operation is aborted. The maximum allowable send block time is
|
||||
* capped to the value set by ipconfigMAX_SEND_BLOCK_TIME_TICKS. Capping the
|
||||
* maximum allowable send block time prevents prevents a deadlock occurring when
|
||||
* all the network buffers are in use and the tasks that process (and subsequently
|
||||
* free) the network buffers are themselves blocked waiting for a network buffer.
|
||||
* ipconfigMAX_SEND_BLOCK_TIME_TICKS is specified in RTOS ticks. A time in
|
||||
* milliseconds can be converted to a time in ticks by dividing the time in
|
||||
* milliseconds by portTICK_PERIOD_MS. */
|
||||
#define ipconfigUDP_MAX_SEND_BLOCK_TIME_TICKS ( 5000 / portTICK_PERIOD_MS )
|
||||
|
||||
/* If ipconfigUSE_DHCP is 1 then FreeRTOS+TCP will attempt to retrieve an IP
|
||||
* address, netmask, DNS server address and gateway address from a DHCP server. If
|
||||
* ipconfigUSE_DHCP is 0 then FreeRTOS+TCP will use a static IP address. The
|
||||
* stack will revert to using the static IP address even when ipconfigUSE_DHCP is
|
||||
* set to 1 if a valid configuration cannot be obtained from a DHCP server for any
|
||||
* reason. The static configuration used is that passed into the stack by the
|
||||
* FreeRTOS_IPInit() function call. */
|
||||
#define ipconfigUSE_DHCP 1
|
||||
|
||||
/* When ipconfigUSE_DHCP is set to 1, DHCP requests will be sent out at
|
||||
* increasing time intervals until either a reply is received from a DHCP server
|
||||
* and accepted, or the interval between transmissions reaches
|
||||
* ipconfigMAXIMUM_DISCOVER_TX_PERIOD. The IP stack will revert to using the
|
||||
* static IP address passed as a parameter to FreeRTOS_IPInit() if the
|
||||
* re-transmission time interval reaches ipconfigMAXIMUM_DISCOVER_TX_PERIOD without
|
||||
* a DHCP reply being received. */
|
||||
#define ipconfigMAXIMUM_DISCOVER_TX_PERIOD ( 120000 / portTICK_PERIOD_MS )
|
||||
|
||||
/* The ARP cache is a table that maps IP addresses to MAC addresses. The IP
|
||||
* stack can only send a UDP message to a remove IP address if it knowns the MAC
|
||||
* address associated with the IP address, or the MAC address of the router used to
|
||||
* contact the remote IP address. When a UDP message is received from a remote IP
|
||||
* address the MAC address and IP address are added to the ARP cache. When a UDP
|
||||
* message is sent to a remote IP address that does not already appear in the ARP
|
||||
* cache then the UDP message is replaced by a ARP message that solicits the
|
||||
* required MAC address information. ipconfigARP_CACHE_ENTRIES defines the maximum
|
||||
* number of entries that can exist in the ARP table at any one time. */
|
||||
#define ipconfigARP_CACHE_ENTRIES 6
|
||||
|
||||
/* ARP requests that do not result in an ARP response will be re-transmitted a
|
||||
* maximum of ipconfigMAX_ARP_RETRANSMISSIONS times before the ARP request is
|
||||
* aborted. */
|
||||
#define ipconfigMAX_ARP_RETRANSMISSIONS ( 5 )
|
||||
|
||||
/* ipconfigMAX_ARP_AGE defines the maximum time between an entry in the ARP
|
||||
* table being created or refreshed and the entry being removed because it is stale.
|
||||
* New ARP requests are sent for ARP cache entries that are nearing their maximum
|
||||
* age. ipconfigMAX_ARP_AGE is specified in tens of seconds, so a value of 150 is
|
||||
* equal to 1500 seconds (or 25 minutes). */
|
||||
#define ipconfigMAX_ARP_AGE 150
|
||||
|
||||
/* Implementing FreeRTOS_inet_addr() necessitates the use of string handling
|
||||
* routines, which are relatively large. To save code space the full
|
||||
* FreeRTOS_inet_addr() implementation is made optional, and a smaller and faster
|
||||
* alternative called FreeRTOS_inet_addr_quick() is provided. FreeRTOS_inet_addr()
|
||||
* takes an IP in decimal dot format (for example, "192.168.0.1") as its parameter.
|
||||
* FreeRTOS_inet_addr_quick() takes an IP address as four separate numerical octets
|
||||
* (for example, 192, 168, 0, 1) as its parameters. If
|
||||
* ipconfigINCLUDE_FULL_INET_ADDR is set to 1 then both FreeRTOS_inet_addr() and
|
||||
* FreeRTOS_indet_addr_quick() are available. If ipconfigINCLUDE_FULL_INET_ADDR is
|
||||
* not set to 1 then only FreeRTOS_indet_addr_quick() is available. */
|
||||
#define ipconfigINCLUDE_FULL_INET_ADDR 1
|
||||
|
||||
/* ipconfigNUM_NETWORK_BUFFER_DESCRIPTORS defines the total number of network buffer that
|
||||
* are available to the IP stack. The total number of network buffers is limited
|
||||
* to ensure the total amount of RAM that can be consumed by the IP stack is capped
|
||||
* to a pre-determinable value. */
|
||||
#define ipconfigNUM_NETWORK_BUFFER_DESCRIPTORS 60
|
||||
|
||||
/* A FreeRTOS queue is used to send events from application tasks to the IP
|
||||
* stack. ipconfigEVENT_QUEUE_LENGTH sets the maximum number of events that can
|
||||
* be queued for processing at any one time. The event queue must be a minimum of
|
||||
* 5 greater than the total number of network buffers. */
|
||||
#define ipconfigEVENT_QUEUE_LENGTH ( ipconfigNUM_NETWORK_BUFFER_DESCRIPTORS + 5 )
|
||||
|
||||
/* The address of a socket is the combination of its IP address and its port
|
||||
* number. FreeRTOS_bind() is used to manually allocate a port number to a socket
|
||||
* (to 'bind' the socket to a port), but manual binding is not normally necessary
|
||||
* for client sockets (those sockets that initiate outgoing connections rather than
|
||||
* wait for incoming connections on a known port number). If
|
||||
* ipconfigALLOW_SOCKET_SEND_WITHOUT_BIND is set to 1 then calling
|
||||
* FreeRTOS_sendto() on a socket that has not yet been bound will result in the IP
|
||||
* stack automatically binding the socket to a port number from the range
|
||||
* socketAUTO_PORT_ALLOCATION_START_NUMBER to 0xffff. If
|
||||
* ipconfigALLOW_SOCKET_SEND_WITHOUT_BIND is set to 0 then calling FreeRTOS_sendto()
|
||||
* on a socket that has not yet been bound will result in the send operation being
|
||||
* aborted. */
|
||||
#define ipconfigALLOW_SOCKET_SEND_WITHOUT_BIND 1
|
||||
|
||||
/* Defines the Time To Live (TTL) values used in outgoing UDP packets. */
|
||||
#define ipconfigUDP_TIME_TO_LIVE 128
|
||||
#define ipconfigTCP_TIME_TO_LIVE 128 /* also defined in FreeRTOSIPConfigDefaults.h */
|
||||
|
||||
/* USE_TCP: Use TCP and all its features */
|
||||
#define ipconfigUSE_TCP ( 1 )
|
||||
|
||||
/* Use the TCP socket wake context with a callback. */
|
||||
#define ipconfigSOCKET_HAS_USER_WAKE_CALLBACK_WITH_CONTEXT ( 1 )
|
||||
|
||||
/* USE_WIN: Let TCP use windowing mechanism. */
|
||||
#define ipconfigUSE_TCP_WIN ( 1 )
|
||||
|
||||
/* The MTU is the maximum number of bytes the payload of a network frame can
|
||||
* contain. For normal Ethernet V2 frames the maximum MTU is 1500. Setting a
|
||||
* lower value can save RAM, depending on the buffer management scheme used. If
|
||||
* ipconfigCAN_FRAGMENT_OUTGOING_PACKETS is 1 then (ipconfigNETWORK_MTU - 28) must
|
||||
* be divisible by 8. */
|
||||
#define ipconfigNETWORK_MTU 1200
|
||||
|
||||
/* Set ipconfigUSE_DNS to 1 to include a basic DNS client/resolver. DNS is used
|
||||
* through the FreeRTOS_gethostbyname() API function. */
|
||||
#define ipconfigUSE_DNS 1
|
||||
|
||||
/* If ipconfigREPLY_TO_INCOMING_PINGS is set to 1 then the IP stack will
|
||||
* generate replies to incoming ICMP echo (ping) requests. */
|
||||
#define ipconfigREPLY_TO_INCOMING_PINGS 1
|
||||
|
||||
/* If ipconfigSUPPORT_OUTGOING_PINGS is set to 1 then the
|
||||
* FreeRTOS_SendPingRequest() API function is available. */
|
||||
#define ipconfigSUPPORT_OUTGOING_PINGS 0
|
||||
|
||||
/* If ipconfigSUPPORT_SELECT_FUNCTION is set to 1 then the FreeRTOS_select()
|
||||
* (and associated) API function is available. */
|
||||
#define ipconfigSUPPORT_SELECT_FUNCTION 1
|
||||
|
||||
/* If ipconfigFILTER_OUT_NON_ETHERNET_II_FRAMES is set to 1 then Ethernet frames
|
||||
* that are not in Ethernet II format will be dropped. This option is included for
|
||||
* potential future IP stack developments. */
|
||||
#define ipconfigFILTER_OUT_NON_ETHERNET_II_FRAMES 1
|
||||
|
||||
/* If ipconfigETHERNET_DRIVER_FILTERS_FRAME_TYPES is set to 1 then it is the
|
||||
* responsibility of the Ethernet interface to filter out packets that are of no
|
||||
* interest. If the Ethernet interface does not implement this functionality, then
|
||||
* set ipconfigETHERNET_DRIVER_FILTERS_FRAME_TYPES to 0 to have the IP stack
|
||||
* perform the filtering instead (it is much less efficient for the stack to do it
|
||||
* because the packet will already have been passed into the stack). If the
|
||||
* Ethernet driver does all the necessary filtering in hardware then software
|
||||
* filtering can be removed by using a value other than 1 or 0. */
|
||||
#define ipconfigETHERNET_DRIVER_FILTERS_FRAME_TYPES 1
|
||||
|
||||
/* The windows simulator cannot really simulate MAC interrupts, and needs to
|
||||
* block occasionally to allow other tasks to run. */
|
||||
#define configWINDOWS_MAC_INTERRUPT_SIMULATOR_DELAY ( 20 / portTICK_PERIOD_MS )
|
||||
|
||||
/* Advanced only: in order to access 32-bit fields in the IP packets with
|
||||
* 32-bit memory instructions, all packets will be stored 32-bit-aligned, plus 16-bits.
|
||||
* This has to do with the contents of the IP-packets: all 32-bit fields are
|
||||
* 32-bit-aligned, plus 16-bit(!) */
|
||||
#define ipconfigPACKET_FILLER_SIZE 2
|
||||
|
||||
/* Define the size of the pool of TCP window descriptors. On the average, each
|
||||
* TCP socket will use up to 2 x 6 descriptors, meaning that it can have 2 x 6
|
||||
* outstanding packets (for Rx and Tx). When using up to 10 TP sockets
|
||||
* simultaneously, one could define TCP_WIN_SEG_COUNT as 120. */
|
||||
#define ipconfigTCP_WIN_SEG_COUNT 240
|
||||
|
||||
/* Each TCP socket has a circular buffers for Rx and Tx, which have a fixed
|
||||
* maximum size. Define the size of Rx buffer for TCP sockets. */
|
||||
#define ipconfigTCP_RX_BUFFER_LENGTH ( 1000 )
|
||||
|
||||
/* Define the size of Tx buffer for TCP sockets. */
|
||||
#define ipconfigTCP_TX_BUFFER_LENGTH ( 1000 )
|
||||
|
||||
/* When using call-back handlers, the driver may check if the handler points to
|
||||
* real program memory (RAM or flash) or just has a random non-zero value. */
|
||||
#define ipconfigIS_VALID_PROG_ADDRESS( x ) ( ( x ) != NULL )
|
||||
|
||||
/* Include support for TCP hang protection. All sockets in a connecting or
|
||||
* disconnecting stage will timeout after a period of non-activity. */
|
||||
#define ipconfigTCP_HANG_PROTECTION ( 1 )
|
||||
#define ipconfigTCP_HANG_PROTECTION_TIME ( 30 )
|
||||
|
||||
/* Include support for TCP keep-alive messages. */
|
||||
#define ipconfigTCP_KEEP_ALIVE ( 1 )
|
||||
#define ipconfigTCP_KEEP_ALIVE_INTERVAL ( 20 ) /* in seconds */
|
||||
|
||||
#define portINLINE __inline
|
||||
|
||||
#endif /* FREERTOS_IP_CONFIG_H */
|
@ -0,0 +1,133 @@
|
||||
# MQTT Mutual Auth wolfSSL Demo
|
||||
|
||||
# Overview
|
||||
This demo shows an MQTT subscriber / publisher establishing a TLS connection with an MQTT broker to send and receive topics in encrypted form. wolfSSL acts as a TLS library under the FreeRTOS MQTT library.
|
||||
A single FreeRTOS task acts as both an MQTT subscriber and an MQTT publisher, sending and receiving topics through the MQTT broker endpoint you specified. The task holds a client certificate and authenticate each other with the MQTT broker.
|
||||
|
||||
# How to build and run the Demo application
|
||||
|
||||
By double-clicking the solution file named "**mqtt_mutual_auth_demo_wolfSSL.sln**" included in this folder, Visual Studio starts and shows you a project in its solution explorer. It is named "RTOSDemo" and provides a console application program which runs on windows.
|
||||
|
||||
All required settings for wolfSSL have been set in the user_settings.h header file included in the RTOSDemo folder in the solution explorer pane. For this demo to work, you need to set the following information:
|
||||
|
||||
1. choose interface to use
|
||||
2. set MQTT broker endpoint URL
|
||||
2. set root CA certificate file(.pem) path
|
||||
3. set private key file(.pem) path
|
||||
|
||||
|
||||
|
||||
# Choose an interface to use
|
||||
You should choose an interface to use to configure the demo. However you may not know how to choose it. The demo will give you good guidance. Follow the steps below.
|
||||
|
||||
1. Build the RTOSDemo project
|
||||
2. Run the RTOSDemo.exe
|
||||
|
||||
A console that pops up appears with output similar to the following:
|
||||
```
|
||||
The following network interfaces are available:
|
||||
|
||||
Interface 1 - rpcap://\Device\NPF_{F47******-2150-****-89***-*******8C8D8}
|
||||
(Network adapter 'Qualcomm Atheros Ar81xx series PCI-E Ethernet Controller' on local host)
|
||||
|
||||
|
||||
The interface that will be opened is set by "configNETWORK_INTERFACE_TO_USE", which
|
||||
should be defined in FreeRTOSConfig.h
|
||||
|
||||
ERROR: configNETWORK_INTERFACE_TO_USE is set to 0, which is an invalid value.
|
||||
Please set configNETWORK_INTERFACE_TO_USE to one of the interface numbers listed above,
|
||||
then re-compile and re-start the application. Only Ethernet (as opposed to WiFi)
|
||||
interfaces are supported.
|
||||
|
||||
HALTING
|
||||
```
|
||||
<br>
|
||||
|
||||
This output provides guidance and a list of interfaces available on the system. Open the **FreeRTOSConfig.h** file in the same folder where this readme file located, and set the selected interface number to ***configNETWORK_INTERFACE_TO_USE*** .
|
||||
Then rebuild and run the demo. This time you can see that the interface is set up and working.
|
||||
<br><br>
|
||||
|
||||
```
|
||||
The following network interfaces are available:
|
||||
|
||||
Interface 1 - rpcap://\Device\NPF_{F47******-2150-****-89***-*******8C8D8}
|
||||
(Network adapter 'Qualcomm Atheros Ar81xx series PCI-E Ethernet Controller' on local host)
|
||||
|
||||
|
||||
The interface that will be opened is set by "configNETWORK_INTERFACE_TO_USE", which
|
||||
should be defined in FreeRTOSConfig.h
|
||||
Attempting to open interface number 1.
|
||||
Successfully opened interface number 1.
|
||||
0 560 [IP-task] vDHCPProcess: offer 192.168.1.6
|
||||
vDHCPProcess: offer 192.168.1.6
|
||||
1 600 [IP-task] [INFO] [MQTT-wolfSSL] [vApplicationIPNetworkEventHook:158] ---------STARTING DEMO---------
|
||||
2 600 [IP-task] [INFO] [MQTT-wolfSSL] [vApplicationIPNetworkEventHook:167] IP Address: 192.168.1.6
|
||||
3 600 [IP-task] [INFO] [MQTT-wolfSSL] [vApplicationIPNetworkEventHook:170] Subnet Mask: 255.255.255.0
|
||||
4 600 [IP-task] [INFO] [MQTT-wolfSSL] [vApplicationIPNetworkEventHook:173] Gateway Address: 192.168.1.1
|
||||
5 600 [IP-task] [INFO] [MQTT-wolfSSL] [vApplicationIPNetworkEventHook:176] DNS Server Address: 192.168.1.1
|
||||
6 600 [MQTTDemo] [INFO] [MQTT-wolfSSL] [prvMQTTDemoTask:356] Creating a TLS connection to ...insert here...:8883.
|
||||
vAssertCalled( ***\FreeRTOS\FreeRTOS-Plus\Demo\coreMQTT_Windows_Simulator\MQTT_Mutual_Auth_wolfSSL\DemoTasks\MutualAuthMQTTExample.c, 457
|
||||
```
|
||||
<br>
|
||||
|
||||
The demo stops by assertion. The log saying "Creating a TLS connection to **...insert here...**:8883" has a hint.
|
||||
|
||||
<br>
|
||||
|
||||
|
||||
# Set Credentials
|
||||
|
||||
Please remember you need to provide the remaining information to complete the demo configuration. This time, you should open **demo_config.h** and find following defininitions:
|
||||
|
||||
- **democonfigMQTT_BROKER_ENDPOINT**
|
||||
- **democonfigROOT_CA_PEM**
|
||||
- **democonfigCLIENT_CERTIFICATE_PEM**
|
||||
- **democonfigCLIENT_PRIVATE_KEY_PEM**
|
||||
|
||||
All have **"...insert here..."** as their defined value. This is the casuse of the assertion that stopped the demo. In the file, "...insert here..." is used as a placeholder. Therefore, you need to specify the correct value for each. Immediately above them, there is information on how and what to set for each definitions.
|
||||
|
||||
Please refer the [coreMQTT Demo(Mutual Authentication)](https://www.freertos.org/mqtt/mutual-authentication-mqtt-example.html) page to get more information.
|
||||
If you completes above settings, re-build demo and run it.
|
||||
|
||||
# Demo output
|
||||
Below is the output digest when a Aws MQTT IoT endpoint and appropriate credentials are set. You can find "**Hello World!**" message was published and received as a topic repeatedly.
|
||||
|
||||
```
|
||||
...
|
||||
1 8221 [IP-task] [INFO] [MQTT-wolfSSL] [vApplicationIPNetworkEventHook:158] ---------STARTING DEMO---------
|
||||
2 8221 [IP-task] [INFO] [MQTT-wolfSSL] [vApplicationIPNetworkEventHook:167] IP Address: 192.168.1.14
|
||||
...
|
||||
6 8222 [MQTTDemo] [INFO] [MQTT-wolfSSL] [prvMQTTDemoTask:356] Creating a TLS connection to a**************************.amazonaws.com:8883.
|
||||
...
|
||||
8 10221 [MQTTDemo] A mutually authenticated TLS connection established with a**************************.amazonaws.com::8883.
|
||||
...
|
||||
9 10221 [MQTTDemo] [INFO] [MQTT-wolfSSL] [prvMQTTDemoTask:361] Creating an MQTT connection to a**************************.amazonaws.com:.
|
||||
...
|
||||
14 10381 [MQTTDemo] [INFO] [MQTT] [MQTT_Connect:1798] MQTT connection established with the broker.
|
||||
15 10381 [MQTTDemo] [INFO] [MQTT-wolfSSL] [prvCreateMQTTConnectionWithBroker:514] An MQTT connection is established with a**************************.amazonaws.com:.
|
||||
16 10381 [MQTTDemo] [INFO] [MQTT-wolfSSL] [prvMQTTDemoTask:375] Attempt to subscribe to the MQTT topic demoDevice/example/topic.
|
||||
...
|
||||
19 11481 [MQTTDemo] [INFO] [MQTT-wolfSSL] [prvMQTTDemoTask:394] Publish to the MQTT topic demoDevice/example/topic.
|
||||
20 11481 [MQTTDemo] [INFO] [MQTT-wolfSSL] [prvMQTTDemoTask:399] Attempt to receive publish message from broker.
|
||||
...
|
||||
Incoming Publish Topic Name: demoDevice/example/topic matches subscribed topic.
|
||||
Incoming Publish Message : Hello World!
|
||||
|
||||
30 12641 [MQTTDemo] [INFO] [MQTT-wolfSSL] [prvMQTTDemoTask:404] Keeping Connection Idle...
|
||||
31 14641 [MQTTDemo] [INFO] [MQTT-wolfSSL] [prvMQTTDemoTask:394] Publish to the MQTT topic demoDevice/example/topic.
|
||||
32 14641 [MQTTDemo] [INFO] [MQTT-wolfSSL] [prvMQTTDemoTask:399] Attempt to receive publish message from broker.
|
||||
...
|
||||
Incoming Publish Topic Name: demoDevice/example/topic matches subscribed topic.
|
||||
Incoming Publish Message : Hello World!
|
||||
|
||||
42 15741 [MQTTDemo] [INFO] [MQTT-wolfSSL] [prvMQTTDemoTask:404] Keeping Connection Idle...
|
||||
43 17741 [MQTTDemo] [INFO] [MQTT-wolfSSL] [prvMQTTDemoTask:394] Publish to the MQTT topic demoDevice/example/topic.
|
||||
44 17741 [MQTTDemo] [INFO] [MQTT-wolfSSL] [prvMQTTDemoTask:399] Attempt to receive publish message from broker.
|
||||
...
|
||||
Incoming Publish Topic Name: demoDevice/example/topic matches subscribed topic.
|
||||
Incoming Publish Message : Hello World!
|
||||
...
|
||||
|
||||
```
|
||||
|
||||
|
@ -0,0 +1,768 @@
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<Project ToolsVersion="4.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
|
||||
<ItemGroup>
|
||||
<Filter Include="FreeRTOS">
|
||||
<UniqueIdentifier>{af3445a1-4908-4170-89ed-39345d90d30c}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS\Source">
|
||||
<UniqueIdentifier>{f32be356-4763-4cae-9020-974a2638cb08}</UniqueIdentifier>
|
||||
<Extensions>*.c</Extensions>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS\Source\Portable">
|
||||
<UniqueIdentifier>{88f409e6-d396-4ac5-94bd-7a99c914be46}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS+">
|
||||
<UniqueIdentifier>{e5ad4ec7-23dc-4295-8add-2acaee488f5a}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS\Source\include">
|
||||
<UniqueIdentifier>{d2dcd641-8d91-492b-852f-5563ffadaec6}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS+\FreeRTOS+TCP">
|
||||
<UniqueIdentifier>{8672fa26-b119-481f-8b8d-086419c01a3e}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS+\FreeRTOS+TCP\portable">
|
||||
<UniqueIdentifier>{4570be11-ec96-4b55-ac58-24b50ada980a}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS+\FreeRTOS+TCP\include">
|
||||
<UniqueIdentifier>{5d93ed51-023a-41ad-9243-8d230165d34b}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="DemoTasks">
|
||||
<UniqueIdentifier>{b71e974a-9f28-4815-972b-d930ba8a34d0}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS+\FreeRTOS IoT Libraries">
|
||||
<UniqueIdentifier>{60717407-397f-4ea5-8492-3314acdd25f0}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS+\FreeRTOS IoT Libraries\standard">
|
||||
<UniqueIdentifier>{8a90222f-d723-4b4e-8e6e-c57afaf7fa92}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS+\FreeRTOS IoT Libraries\platform">
|
||||
<UniqueIdentifier>{84613aa2-91dc-4e1a-a3b3-823b6d7bf0e0}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS+\FreeRTOS IoT Libraries\platform\freertos">
|
||||
<UniqueIdentifier>{fcf93295-15e2-4a84-a5e9-b3c162e9f061}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS+\wolfSSL">
|
||||
<UniqueIdentifier>{90bcf555-1d56-4512-85b0-dafefb542437}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS+\wolfSSL\wolfcrypt">
|
||||
<UniqueIdentifier>{617d7848-f326-4873-8006-bb13604861e6}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS+\wolfSSL\include">
|
||||
<UniqueIdentifier>{5599e5a4-2ff0-4ec0-8082-e9dc20d17723}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS+\wolfSSL\source">
|
||||
<UniqueIdentifier>{01240ff7-3a87-4cdd-9adb-b3f44b39f1be}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS+\wolfSSL\wolfcrypt\include">
|
||||
<UniqueIdentifier>{c1be3c08-d159-45ef-be6f-eb32bd235015}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS+\wolfSSL\wolfcrypt\source">
|
||||
<UniqueIdentifier>{93eb4d69-0f79-41a9-8101-68c1ddf755ee}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS+\FreeRTOS IoT Libraries\standard\coreMQTT">
|
||||
<UniqueIdentifier>{2d17d5e6-ed70-4e42-9693-f7a63baf4948}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS+\FreeRTOS IoT Libraries\standard\coreMQTT\src">
|
||||
<UniqueIdentifier>{7158b0be-01e7-42d1-8d3f-c75118a596a2}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS+\FreeRTOS IoT Libraries\standard\coreMQTT\include">
|
||||
<UniqueIdentifier>{6ad56e6d-c330-4830-8f4b-c75b05dfa866}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS+\FreeRTOS IoT Libraries\platform\transport">
|
||||
<UniqueIdentifier>{c5a01679-3e7a-4320-97ac-ee5b872c1650}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS+\FreeRTOS IoT Libraries\platform\transport\include">
|
||||
<UniqueIdentifier>{c992824d-4198-46b2-8d59-5f99ab9946ab}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS+\FreeRTOS IoT Libraries\platform\transport\src">
|
||||
<UniqueIdentifier>{6a35782c-bc09-42d5-a850-98bcb668a4dc}</UniqueIdentifier>
|
||||
</Filter>
|
||||
<Filter Include="FreeRTOS+\FreeRTOS IoT Libraries\platform\wolfSSL">
|
||||
<UniqueIdentifier>{2310fc2f-36e7-459b-b1e2-cf18c1cb342b}</UniqueIdentifier>
|
||||
</Filter>
|
||||
</ItemGroup>
|
||||
<ItemGroup>
|
||||
<ClCompile Include="..\..\..\..\FreeRTOS\Source\portable\MSVC-MingW\port.c">
|
||||
<Filter>FreeRTOS\Source\Portable</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\..\FreeRTOS\Source\timers.c">
|
||||
<Filter>FreeRTOS\Source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\..\FreeRTOS\Source\list.c">
|
||||
<Filter>FreeRTOS\Source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\..\FreeRTOS\Source\tasks.c">
|
||||
<Filter>FreeRTOS\Source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\FreeRTOS_UDP_IP.c">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\FreeRTOS_DHCP.c">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\FreeRTOS_DNS.c">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\FreeRTOS_Sockets.c">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\portable\BufferManagement\BufferAllocation_2.c">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP\portable</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\portable\NetworkInterface\WinPCap\NetworkInterface.c">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP\portable</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\FreeRTOS_ARP.c">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\FreeRTOS_IP.c">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\FreeRTOS_TCP_IP.c">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\FreeRTOS_TCP_WIN.c">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\..\FreeRTOS\Source\event_groups.c">
|
||||
<Filter>FreeRTOS\Source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\..\FreeRTOS\Source\portable\MemMang\heap_4.c">
|
||||
<Filter>FreeRTOS\Source\Portable</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\FreeRTOS_Stream_Buffer.c">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\..\FreeRTOS\Source\stream_buffer.c">
|
||||
<Filter>FreeRTOS\Source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\common\main.c" />
|
||||
<ClCompile Include="DemoTasks\MutualAuthMQTTExample.c">
|
||||
<Filter>DemoTasks</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\src\bio.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\src\crl.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\src\internal.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\src\keys.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\src\ocsp.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\src\sniffer.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\src\ssl.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\src\tls.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\src\tls13.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\src\wolfio.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\aes.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\arc4.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\asm.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\asn.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\blake2b.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\blake2s.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\camellia.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\chacha.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\chacha20_poly1305.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\cmac.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\coding.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\compress.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\cpuid.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\cryptocb.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\curve448.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\curve25519.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\des3.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\dh.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\dsa.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\ecc.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\ecc_fp.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\ed448.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\ed25519.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\error.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\evp.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\fe_448.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\fe_low_mem.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\fe_operations.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\ge_448.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\ge_low_mem.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\ge_operations.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\hash.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\hc128.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\hmac.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\idea.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\integer.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\logging.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\md2.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\md4.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\md5.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\memory.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\misc.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\pkcs7.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\pkcs12.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\poly1305.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\pwdbased.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\rabbit.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\random.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\ripemd.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\rsa.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\sha.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\sha3.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\sha256.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\sha512.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\signature.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\sp_arm32.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\sp_arm64.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\sp_armthumb.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\sp_c32.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\sp_c64.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\sp_cortexm.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\sp_dsp32.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\sp_int.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\sp_x86_64.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\srp.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\tfm.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\wc_dsp.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\wc_encrypt.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\wc_pkcs11.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\wc_port.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\wolfevent.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\ThirdParty\wolfSSL\wolfcrypt\src\wolfmath.c">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\Common\Logging\windows\Logging_WinSim.c" />
|
||||
<ClCompile Include="..\..\..\Source\Application-Protocols\coreMQTT\source\core_mqtt.c">
|
||||
<Filter>FreeRTOS+\FreeRTOS IoT Libraries\standard\coreMQTT\src</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\Source\Application-Protocols\coreMQTT\source\core_mqtt_serializer.c">
|
||||
<Filter>FreeRTOS+\FreeRTOS IoT Libraries\standard\coreMQTT\src</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\Source\Application-Protocols\coreMQTT\source\core_mqtt_state.c">
|
||||
<Filter>FreeRTOS+\FreeRTOS IoT Libraries\standard\coreMQTT\src</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\Source\Application-Protocols\network_transport\freertos_plus_tcp\sockets_wrapper.c">
|
||||
<Filter>FreeRTOS+\FreeRTOS IoT Libraries\platform\transport\src</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\..\FreeRTOS\Source\queue.c">
|
||||
<Filter>FreeRTOS\Source</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\Source\Utilities\backoff_algorithm\source\backoff_algorithm.c">
|
||||
<Filter>FreeRTOS+\FreeRTOS IoT Libraries\platform\freertos</Filter>
|
||||
</ClCompile>
|
||||
<ClCompile Include="..\..\..\Source\Application-Protocols\network_transport\freertos_plus_tcp\using_wolfSSL\using_wolfSSL.c">
|
||||
<Filter>FreeRTOS+\FreeRTOS IoT Libraries\platform\transport\src</Filter>
|
||||
</ClCompile>
|
||||
</ItemGroup>
|
||||
<ItemGroup>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\include\NetworkInterface.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\include\FreeRTOS_DNS.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\include\FreeRTOS_Sockets.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\include\FreeRTOS_UDP_IP.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS\Source\include\timers.h">
|
||||
<Filter>FreeRTOS\Source\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS\Source\include\event_groups.h">
|
||||
<Filter>FreeRTOS\Source\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS\Source\include\FreeRTOS.h">
|
||||
<Filter>FreeRTOS\Source\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS\Source\include\queue.h">
|
||||
<Filter>FreeRTOS\Source\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS\Source\include\semphr.h">
|
||||
<Filter>FreeRTOS\Source\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS\Source\include\task.h">
|
||||
<Filter>FreeRTOS\Source\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS\Source\portable\MSVC-MingW\portmacro.h">
|
||||
<Filter>FreeRTOS\Source\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\include\FreeRTOS_IP_Private.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\include\NetworkBufferManagement.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\include\FreeRTOS_ARP.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\include\FreeRTOS_DHCP.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\include\FreeRTOS_IP.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\include\FreeRTOS_TCP_IP.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\include\FreeRTOS_TCP_WIN.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\include\FreeRTOSIPConfigDefaults.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\include\IPTraceMacroDefaults.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="FreeRTOSConfig.h" />
|
||||
<ClInclude Include="FreeRTOSIPConfig.h" />
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS-Plus\Source\FreeRTOS-Plus-TCP\include\FreeRTOS_Stream_Buffer.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS+TCP\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS\Source\include\portable.h">
|
||||
<Filter>FreeRTOS\Source\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\FreeRTOS\Source\include\projdefs.h">
|
||||
<Filter>FreeRTOS\Source\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="demo_config.h" />
|
||||
<ClInclude Include="user_settings.h" />
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\sniffer_error.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\Source\Application-Protocols\coreMQTT\source\include\core_mqtt.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS IoT Libraries\standard\coreMQTT\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\Source\Application-Protocols\coreMQTT\source\include\core_mqtt_config_defaults.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS IoT Libraries\standard\coreMQTT\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\Source\Application-Protocols\coreMQTT\source\include\core_mqtt_serializer.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS IoT Libraries\standard\coreMQTT\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\Source\Application-Protocols\coreMQTT\source\include\core_mqtt_state.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS IoT Libraries\standard\coreMQTT\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\Source\Application-Protocols\network_transport\freertos_plus_tcp\sockets_wrapper.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS IoT Libraries\platform\transport\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\Source\Application-Protocols\coreMQTT\source\interface\transport_interface.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS IoT Libraries\platform</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\Source\Utilities\backoff_algorithm\source\include\backoff_algorithm.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS IoT Libraries\platform</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\aes.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\arc4.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\asn.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\asn_public.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\blake2.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\blake2-impl.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\blake2-int.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\camellia.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\chacha.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\chacha20_poly1305.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\cmac.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\coding.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\compress.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\cpuid.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\cryptocb.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\curve448.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\curve25519.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\des3.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\dh.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\dsa.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\ecc.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\ed448.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\ed25519.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\error-crypt.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\fe_448.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\fe_operations.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\fips_test.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\ge_448.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\ge_operations.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\hash.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\hc128.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\hmac.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\idea.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\integer.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\logging.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\md2.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\md4.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\md5.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\mem_track.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\memory.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\misc.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\mpi_class.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\mpi_superclass.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\wolfmath.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\wolfevent.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\wc_port.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\wc_pkcs11.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\wc_encrypt.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\visibility.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\types.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\tfm.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\sp.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\sp_int.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\srp.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\signature.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\sha512.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\sha256.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\sha3.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\sha.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\settings.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\selftest.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\rsa.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\ripemd.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\random.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\rabbit.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\pwdbased.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\poly1305.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\pkcs12.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\pkcs11.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfcrypt\pkcs7.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\callbacks.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\certs_test.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\error-ssl.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\crl.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\internal.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\ocsp.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\sniffer.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\ssl.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\test.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\version.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\..\Source\wolfSSL\wolfssl\wolfio.h">
|
||||
<Filter>FreeRTOS+\wolfSSL\include</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="core_mqtt_config.h">
|
||||
<Filter>FreeRTOS+</Filter>
|
||||
</ClInclude>
|
||||
<ClInclude Include="..\..\..\Source\Utilities\logging\logging.h" />
|
||||
<ClInclude Include="..\..\..\Source\Utilities\logging\logging_levels.h" />
|
||||
<ClInclude Include="..\..\..\Source\Utilities\logging\logging_stack.h" />
|
||||
<ClInclude Include="..\..\..\Source\Application-Protocols\network_transport\freertos_plus_tcp\using_wolfSSL\using_wolfSSL.h">
|
||||
<Filter>FreeRTOS+\FreeRTOS IoT Libraries\platform\transport\include</Filter>
|
||||
</ClInclude>
|
||||
</ItemGroup>
|
||||
<ItemGroup>
|
||||
<None Include="..\..\..\..\Source\wolfSSL\wolfcrypt\src\aes_asm.asm">
|
||||
<Filter>FreeRTOS+\wolfSSL\wolfcrypt\source</Filter>
|
||||
</None>
|
||||
</ItemGroup>
|
||||
</Project>
|
@ -0,0 +1,79 @@
|
||||
/*
|
||||
* FreeRTOS V202012.00
|
||||
* Copyright (C) 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
||||
*
|
||||
* Permission is hereby granted, free of charge, to any person obtaining a copy of
|
||||
* this software and associated documentation files (the "Software"), to deal in
|
||||
* the Software without restriction, including without limitation the rights to
|
||||
* use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
|
||||
* the Software, and to permit persons to whom the Software is furnished to do so,
|
||||
* subject to the following conditions:
|
||||
*
|
||||
* The above copyright notice and this permission notice shall be included in all
|
||||
* copies or substantial portions of the Software.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
|
||||
* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
|
||||
* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
|
||||
* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
||||
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||
*
|
||||
* https://www.FreeRTOS.org
|
||||
* https://github.com/FreeRTOS
|
||||
*
|
||||
*/
|
||||
#ifndef MQTT_CONFIG_H_
|
||||
#define MQTT_CONFIG_H_
|
||||
|
||||
/**************************************************/
|
||||
/******* DO NOT CHANGE the following order ********/
|
||||
/**************************************************/
|
||||
|
||||
/* Include logging header files and define logging macros in the following order:
|
||||
* 1. Include the header file "logging_levels.h".
|
||||
* 2. Define the LIBRARY_LOG_NAME and LIBRARY_LOG_LEVEL macros depending on
|
||||
* the logging configuration for MQTT.
|
||||
* 3. Include the header file "logging_stack.h", if logging is enabled for MQTT.
|
||||
*/
|
||||
|
||||
#include "logging_levels.h"
|
||||
|
||||
/* Logging configuration for the MQTT library. */
|
||||
#ifndef LIBRARY_LOG_NAME
|
||||
#define LIBRARY_LOG_NAME "MQTT"
|
||||
#endif
|
||||
|
||||
#ifndef LIBRARY_LOG_LEVEL
|
||||
#define LIBRARY_LOG_LEVEL LOG_INFO
|
||||
#endif
|
||||
|
||||
/* Prototype for the function used to print to console on Windows simulator
|
||||
* of FreeRTOS.
|
||||
* The function prints to the console before the network is connected;
|
||||
* then a UDP port after the network has connected. */
|
||||
extern void vLoggingPrintf(const char* pcFormatString,
|
||||
...);
|
||||
|
||||
/* Map the SdkLog macro to the logging function to enable logging
|
||||
* on Windows simulator. */
|
||||
#ifndef SdkLog
|
||||
#define SdkLog( message ) vLoggingPrintf message
|
||||
#endif
|
||||
|
||||
#include "logging_stack.h"
|
||||
/************ End of logging configuration ****************/
|
||||
|
||||
/**
|
||||
* @brief The maximum number of MQTT PUBLISH messages that may be pending
|
||||
* acknowledgement at any time.
|
||||
*
|
||||
* QoS 1 and 2 MQTT PUBLISHes require acknowledgment from the server before
|
||||
* they can be completed. While they are awaiting the acknowledgment, the
|
||||
* client must maintain information about their state. The value of this
|
||||
* macro sets the limit on how many simultaneous PUBLISH states an MQTT
|
||||
* context maintains.
|
||||
*/
|
||||
#define MQTT_STATE_ARRAY_MAX_COUNT 10U
|
||||
|
||||
#endif /* ifndef MQTT_CONFIG_H_ */
|
@ -0,0 +1,171 @@
|
||||
/*
|
||||
* FreeRTOS V202012.00
|
||||
* Copyright (C) 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
||||
*
|
||||
* Permission is hereby granted, free of charge, to any person obtaining a copy of
|
||||
* this software and associated documentation files (the "Software"), to deal in
|
||||
* the Software without restriction, including without limitation the rights to
|
||||
* use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
|
||||
* the Software, and to permit persons to whom the Software is furnished to do so,
|
||||
* subject to the following conditions:
|
||||
*
|
||||
* The above copyright notice and this permission notice shall be included in all
|
||||
* copies or substantial portions of the Software.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
|
||||
* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
|
||||
* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
|
||||
* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
||||
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||
*
|
||||
* https://www.FreeRTOS.org
|
||||
* https://github.com/FreeRTOS
|
||||
*
|
||||
*/
|
||||
|
||||
#ifndef DEMO_CONFIG_H
|
||||
#define DEMO_CONFIG_H
|
||||
|
||||
/* FreeRTOS config include. */
|
||||
#include "FreeRTOSConfig.h"
|
||||
|
||||
/**************************************************/
|
||||
/******* DO NOT CHANGE the following order ********/
|
||||
/**************************************************/
|
||||
|
||||
/* Include logging header files and define logging macros in the following order:
|
||||
* 1. Include the header file "logging_levels.h".
|
||||
* 2. Define the LIBRARY_LOG_NAME and LIBRARY_LOG_LEVEL macros depending on
|
||||
* the logging configuration for DEMO.
|
||||
* 3. Include the header file "logging_stack.h", if logging is enabled for DEMO.
|
||||
*/
|
||||
|
||||
#include "logging_levels.h"
|
||||
|
||||
/* Logging configuration for the Demo. */
|
||||
#ifndef LIBRARY_LOG_NAME
|
||||
#define LIBRARY_LOG_NAME "MQTT-wolfSSL"
|
||||
#endif
|
||||
|
||||
#ifndef LIBRARY_LOG_LEVEL
|
||||
#define LIBRARY_LOG_LEVEL LOG_INFO
|
||||
#endif
|
||||
|
||||
/* Prototype for the function used to print to console on Windows simulator
|
||||
* of FreeRTOS.
|
||||
* The function prints to the console before the network is connected;
|
||||
* then a UDP port after the network has connected. */
|
||||
extern void vLoggingPrintf(const char* pcFormatString,
|
||||
...);
|
||||
|
||||
/* Map the SdkLog macro to the logging function to enable logging
|
||||
* on Windows simulator. */
|
||||
#ifndef SdkLog
|
||||
#define SdkLog( message ) vLoggingPrintf message
|
||||
#endif
|
||||
|
||||
#include "logging_stack.h"
|
||||
|
||||
/************ End of logging configuration ****************/
|
||||
|
||||
/**
|
||||
* @brief The MQTT client identifier used in this example. Each client identifier
|
||||
* must be unique; so edit as required to ensure that no two clients connecting to
|
||||
* the same broker use the same client identifier.
|
||||
*
|
||||
* #define democonfigCLIENT_IDENTIFIER "insert here."
|
||||
*/
|
||||
#define democonfigCLIENT_IDENTIFIER "demoDevice"
|
||||
/**
|
||||
* @brief Endpoint of the MQTT broker to connect to.
|
||||
*
|
||||
* This demo application can be run with any MQTT broker, that supports mutual
|
||||
* authentication.
|
||||
*
|
||||
* For AWS IoT MQTT broker, this is the Thing's REST API Endpoint.
|
||||
*
|
||||
* @note Your AWS IoT Core endpoint can be found in the AWS IoT console under
|
||||
* Settings/Custom Endpoint, or using the describe-endpoint REST API (with
|
||||
* AWS CLI command line tool).
|
||||
*
|
||||
* #define democonfigMQTT_BROKER_ENDPOINT "...insert here..."
|
||||
*/
|
||||
#define democonfigMQTT_BROKER_ENDPOINT "...insert here..."
|
||||
/**
|
||||
* @brief The port to use for the demo.
|
||||
*
|
||||
* In general, port 8883 is for secured MQTT connections.
|
||||
*
|
||||
* @note Port 443 requires use of the ALPN TLS extension with the ALPN protocol
|
||||
* name. When using port 8883, ALPN is not required.
|
||||
*
|
||||
* #define democonfigMQTT_BROKER_PORT "...insert here..."
|
||||
*/
|
||||
#define democonfigMQTT_BROKER_PORT 8883
|
||||
/**
|
||||
* @brief Server's root CA certificate.
|
||||
*
|
||||
* For AWS IoT MQTT broker, this certificate is used to identify the AWS IoT
|
||||
* server and is publicly available. Refer to the AWS documentation available
|
||||
* in the link below.
|
||||
* https://docs.aws.amazon.com/iot/latest/developerguide/server-authentication.html#server-authentication-certs
|
||||
*
|
||||
* @note This certificate should be PEM-encoded.
|
||||
*
|
||||
* Must include the PEM header and footer:
|
||||
* "-----BEGIN CERTIFICATE-----\n"\
|
||||
* "...base64 data...\n"\
|
||||
* "-----END CERTIFICATE-----\n"
|
||||
*
|
||||
* #define democonfigROOT_CA_PEM "...insert here..."
|
||||
*/
|
||||
#define democonfigROOT_CA_PEM "...insert here..."
|
||||
/**
|
||||
* @brief Client certificate.
|
||||
*
|
||||
* For AWS IoT MQTT broker, refer to the AWS documentation below for details
|
||||
* regarding client authentication.
|
||||
* https://docs.aws.amazon.com/iot/latest/developerguide/client-authentication.html
|
||||
*
|
||||
* @note This certificate should be PEM-encoded.
|
||||
*
|
||||
* Must include the PEM header and footer:
|
||||
* "-----BEGIN CERTIFICATE-----\n"\
|
||||
* "...base64 data...\n"\
|
||||
* "-----END CERTIFICATE-----\n"
|
||||
*
|
||||
* #define democonfigCLIENT_CERTIFICATE_PEM "...insert here..."
|
||||
*/
|
||||
#define democonfigCLIENT_CERTIFICATE_PEM "...insert here..."
|
||||
/**
|
||||
* @brief Client's private key.
|
||||
*
|
||||
* For AWS IoT MQTT broker, refer to the AWS documentation below for details
|
||||
* regarding clientauthentication.
|
||||
* https://docs.aws.amazon.com/iot/latest/developerguide/client-authentication.html
|
||||
*
|
||||
* @note This private key should be PEM-encoded.
|
||||
*
|
||||
* Must include the PEM header and footer:
|
||||
* "-----BEGIN RSA PRIVATE KEY-----\n"\
|
||||
* "...base64 data...\n"\
|
||||
* "-----END RSA PRIVATE KEY-----\n"
|
||||
*
|
||||
* #define democonfigCLIENT_PRIVATE_KEY_PEM "...insert here..."
|
||||
*/
|
||||
#define democonfigCLIENT_PRIVATE_KEY_PEM "...insert here..."
|
||||
/**
|
||||
* @brief Set the stack size of the main demo task.
|
||||
*
|
||||
* In the Windows port, this stack only holds a structure. The actual
|
||||
* stack is created by an operating system thread.
|
||||
*/
|
||||
#define democonfigDEMO_STACKSIZE configMINIMAL_STACK_SIZE
|
||||
|
||||
/**
|
||||
* @brief Size of the network buffer for MQTT packets.
|
||||
*/
|
||||
#define democonfigNETWORK_BUFFER_SIZE ( 1024U )
|
||||
|
||||
#endif /* DEMO_CONFIG_H */
|
@ -0,0 +1,115 @@
|
||||
/*
|
||||
* FreeRTOS V202012.00
|
||||
* Copyright (C) 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
||||
*
|
||||
* Permission is hereby granted, free of charge, to any person obtaining a copy of
|
||||
* this software and associated documentation files (the "Software"), to deal in
|
||||
* the Software without restriction, including without limitation the rights to
|
||||
* use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
|
||||
* the Software, and to permit persons to whom the Software is furnished to do so,
|
||||
* subject to the following conditions:
|
||||
*
|
||||
* The above copyright notice and this permission notice shall be included in all
|
||||
* copies or substantial portions of the Software.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
|
||||
* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
|
||||
* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
|
||||
* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
||||
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||
*
|
||||
* https://www.FreeRTOS.org
|
||||
* https://github.com/FreeRTOS
|
||||
*
|
||||
*/
|
||||
#ifndef USER_SETTINGS_H
|
||||
#define USER_SETTINGS_H
|
||||
|
||||
#define FREERTOS_TCP
|
||||
#define WOLFSSL_USER_IO
|
||||
#define USE_WOLFSSL_IO
|
||||
#define WOLFSSL_IGNORE_FILE_WARN
|
||||
|
||||
/*-- Cipher related definitions -----------------------------------------------
|
||||
*
|
||||
*
|
||||
*----------------------------------------------------------------------------*/
|
||||
#define WOLFSSL_HAVE_MAX
|
||||
#define WOLFSSL_HAVE_MIN
|
||||
|
||||
#define WOLFSSL_TLS13
|
||||
#define HAVE_TLS_EXTENSIONS
|
||||
|
||||
#define HAVE_SUPPORTED_CURVES
|
||||
#define HAVE_FFDHE_2048
|
||||
|
||||
#ifndef WOLFSSL_OPTIONS_IGNORE_SYS
|
||||
#undef _POSIX_THREADS
|
||||
#define _POSIX_THREADS
|
||||
#endif
|
||||
|
||||
#define HAVE_THREAD_LS
|
||||
#define TFM_TIMING_RESISTANT
|
||||
#define ECC_TIMING_RESISTANT
|
||||
#define WC_RSA_BLINDING
|
||||
|
||||
#define HAVE_AESGCM
|
||||
#define HAVE_AESCCM
|
||||
#define HAVE_AES_ECB
|
||||
#define WOLFSSL_AES_COUNTER
|
||||
#define WOLFSSL_AES_DIRECT
|
||||
|
||||
#define WOLFSSL_SHA512
|
||||
#define WOLFSSL_SHA384
|
||||
#define HAVE_HKDF
|
||||
|
||||
#define HAVE_ECC
|
||||
#define TFM_ECC256
|
||||
#define ECC_SHAMIR
|
||||
#define WC_RSA_PSS
|
||||
#define WOLFSSL_BASE64_ENCODE
|
||||
|
||||
#define WOLFSSL_KEY_GEN
|
||||
|
||||
|
||||
#define HAVE_ECC_CDH
|
||||
#define WC_RSA_NO_PADDING
|
||||
#define WOLFSSL_VALIDATE_FFC_IMPORT
|
||||
#define WOLFSSL_VALIDATE_ECC_IMPORT
|
||||
#define HAVE_FFDHE_Q
|
||||
#define WOLFSSL_NO_SHAKE256
|
||||
|
||||
#define WOLFSSL_CMAC
|
||||
#define WOLFSSL_SHA224
|
||||
#define WOLFSSL_SHA3
|
||||
#define WOLFSSL_SHAKE256
|
||||
#define HAVE_HASHDRBG
|
||||
|
||||
#define HAVE_SUPPORTED_CURVES
|
||||
#define HAVE_EXTENDED_MASTER
|
||||
#define HAVE_ENCRYPT_THEN_MAC
|
||||
#define USE_FAST_MATH
|
||||
#define WOLFSSL_X86_64_BUILD
|
||||
#define WC_NO_ASYNC_THREADING
|
||||
#define HAVE_DH_DEFAULT_PARAMS
|
||||
#define HAVE___UINT128_T 1
|
||||
|
||||
#define NO_DSA
|
||||
#define NO_HC128
|
||||
#define NO_RABBIT
|
||||
#define NO_RC4
|
||||
#define NO_PSK
|
||||
#define NO_MD4
|
||||
#define NO_PWDBASED
|
||||
/*-- Debugging options ------------------------------------------------------
|
||||
*
|
||||
* "DEBUG_WOLFSSL" definition enables log to output into stdout.
|
||||
* Note: wolfSSL_Debugging_ON() must be called just after wolfSSL_Init().
|
||||
*----------------------------------------------------------------------------*/
|
||||
|
||||
/*#define DEBUG_WOLFSSL*/
|
||||
|
||||
|
||||
|
||||
#endif /* USER_SETTINGS_H */
|
@ -0,0 +1,454 @@
|
||||
/*
|
||||
* FreeRTOS V202012.00
|
||||
* Copyright (C) 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
||||
*
|
||||
* Permission is hereby granted, free of charge, to any person obtaining a copy of
|
||||
* this software and associated documentation files (the "Software"), to deal in
|
||||
* the Software without restriction, including without limitation the rights to
|
||||
* use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
|
||||
* the Software, and to permit persons to whom the Software is furnished to do so,
|
||||
* subject to the following conditions:
|
||||
*
|
||||
* The above copyright notice and this permission notice shall be included in all
|
||||
* copies or substantial portions of the Software.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
|
||||
* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
|
||||
* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
|
||||
* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
||||
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||
*
|
||||
* https://www.FreeRTOS.org
|
||||
* https://github.com/FreeRTOS
|
||||
*
|
||||
*/
|
||||
|
||||
/**
|
||||
* @file using_wolfSSL.c
|
||||
* @brief TLS transport interface implementations. This implementation uses
|
||||
* wolfSSL.
|
||||
*/
|
||||
|
||||
/* Standard includes. */
|
||||
#include <string.h>
|
||||
|
||||
/* FreeRTOS includes. */
|
||||
#include "FreeRTOS.h"
|
||||
|
||||
/* FreeRTOS+TCP includes. */
|
||||
#include "FreeRTOS_IP.h"
|
||||
#include "FreeRTOS_Sockets.h"
|
||||
|
||||
/* TLS transport header. */
|
||||
#include "using_wolfSSL.h"
|
||||
|
||||
/* FreeRTOS Socket wrapper include. */
|
||||
#include "sockets_wrapper.h"
|
||||
|
||||
|
||||
/* wolfSSL user settings header */
|
||||
#include "user_settings.h"
|
||||
|
||||
/* Demo Specific configs. */
|
||||
#include "demo_config.h"
|
||||
|
||||
/**
|
||||
* @brief Initialize the TLS structures in a network connection.
|
||||
*
|
||||
* @param[in] pSslContext The SSL context to initialize.
|
||||
*/
|
||||
static void sslContextInit( SSLContext_t * pSslContext );
|
||||
|
||||
/**
|
||||
* @brief Free the TLS structures in a network connection.
|
||||
*
|
||||
* @param[in] pSslContext The SSL context to free.
|
||||
*/
|
||||
static void sslContextFree( SSLContext_t * pSslContext );
|
||||
|
||||
/**
|
||||
* @brief Set up TLS on a TCP connection.
|
||||
*
|
||||
* @param[in] pNetworkContext Network context.
|
||||
* @param[in] pHostName Remote host name, used for server name indication.
|
||||
* @param[in] pNetworkCredentials TLS setup parameters.
|
||||
*
|
||||
* @return #TLS_TRANSPORT_SUCCESS, #TLS_TRANSPORT_INSUFFICIENT_MEMORY, #TLS_TRANSPORT_INVALID_CREDENTIALS,
|
||||
* #TLS_TRANSPORT_HANDSHAKE_FAILED, or #TLS_TRANSPORT_INTERNAL_ERROR.
|
||||
*/
|
||||
static TlsTransportStatus_t tlsSetup( NetworkContext_t * pNetworkContext,
|
||||
const char * pHostName,
|
||||
const NetworkCredentials_t * pNetworkCredentials );
|
||||
|
||||
/**
|
||||
* @brief Initialize TLS component.
|
||||
*
|
||||
* @return #TLS_TRANSPORT_SUCCESS, #TLS_TRANSPORT_INSUFFICIENT_MEMORY, or #TLS_TRANSPORT_INTERNAL_ERROR.
|
||||
*/
|
||||
static TlsTransportStatus_t initTLS(void);
|
||||
|
||||
/*
|
||||
* @brief Receive date from the socket passed as the context
|
||||
*
|
||||
* @param[in] ssl WOLFSSL object.
|
||||
* @param[in] buf Buffer for received data
|
||||
* @param[in] sz Size to receive
|
||||
* @param[in] context Socket to be received from
|
||||
*
|
||||
* @return received size( > 0 ), #WOLFSSL_CBIO_ERR_CONN_CLOSE, #WOLFSSL_CBIO_ERR_WANT_READ.
|
||||
*/
|
||||
static int wolfSSL_IORecvGlue(WOLFSSL* ssl, char* buf, int sz, void* context);
|
||||
|
||||
/*
|
||||
* @brief Send date to the socket passed as the context
|
||||
*
|
||||
* @param[in] ssl WOLFSSL object.
|
||||
* @param[in] buf Buffer for data to be sent
|
||||
* @param[in] sz Size to send
|
||||
* @param[in] context Socket to be sent to
|
||||
*
|
||||
* @return received size( > 0 ), #WOLFSSL_CBIO_ERR_CONN_CLOSE, #WOLFSSL_CBIO_ERR_WANT_WRITE.
|
||||
*/
|
||||
static int wolfSSL_IOSendGlue(WOLFSSL* ssl, char* buf, int sz, void* context);
|
||||
|
||||
|
||||
/*-----------------------------------------------------------*/
|
||||
static int wolfSSL_IORecvGlue(WOLFSSL* ssl, char* buf, int sz, void* context)
|
||||
{
|
||||
( void )ssl; /* to prevent unused warning*/
|
||||
|
||||
Socket_t xSocket = (Socket_t)context;
|
||||
|
||||
BaseType_t read;
|
||||
|
||||
read = FreeRTOS_recv(xSocket, (void*)buf, (size_t)sz, 0);
|
||||
|
||||
|
||||
if ((read == 0 ) ||
|
||||
(read == -pdFREERTOS_ERRNO_EWOULDBLOCK))
|
||||
{
|
||||
read = WOLFSSL_CBIO_ERR_WANT_READ;
|
||||
}
|
||||
else if (read == -pdFREERTOS_ERRNO_ENOTCONN)
|
||||
{
|
||||
read = WOLFSSL_CBIO_ERR_CONN_CLOSE;
|
||||
}
|
||||
else
|
||||
{
|
||||
/* do nothing */
|
||||
}
|
||||
return (int)read;
|
||||
}
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
static int wolfSSL_IOSendGlue(WOLFSSL* ssl, char* buf, int sz, void* context)
|
||||
{
|
||||
( void )ssl; /* to prevent unused warning*/
|
||||
|
||||
Socket_t xSocket = (Socket_t)context;
|
||||
|
||||
BaseType_t sent = FreeRTOS_send(xSocket, (void*)buf, (size_t)sz, 0);
|
||||
|
||||
if ( sent == -pdFREERTOS_ERRNO_EWOULDBLOCK )
|
||||
{
|
||||
sent = WOLFSSL_CBIO_ERR_WANT_WRITE;
|
||||
}
|
||||
else if ( sent == -pdFREERTOS_ERRNO_ENOTCONN )
|
||||
{
|
||||
sent = WOLFSSL_CBIO_ERR_CONN_CLOSE;
|
||||
}
|
||||
else
|
||||
{
|
||||
/* do nothing */
|
||||
}
|
||||
return (int)sent;
|
||||
}
|
||||
|
||||
/*-----------------------------------------------------------*/
|
||||
static TlsTransportStatus_t initTLS(void)
|
||||
{
|
||||
/* initialize wolfSSL */
|
||||
wolfSSL_Init();
|
||||
|
||||
#ifdef DEBUG_WOLFSSL
|
||||
wolfSSL_Debugging_ON();
|
||||
#endif
|
||||
|
||||
return TLS_TRANSPORT_SUCCESS;
|
||||
}
|
||||
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
static TlsTransportStatus_t tlsSetup(NetworkContext_t* pNetCtx,
|
||||
const char* pHostName,
|
||||
const NetworkCredentials_t* pNetCred )
|
||||
{
|
||||
TlsTransportStatus_t returnStatus = TLS_TRANSPORT_SUCCESS;
|
||||
|
||||
/*char errString[80];*/
|
||||
|
||||
configASSERT(pNetCtx != NULL);
|
||||
configASSERT(pHostName != NULL);
|
||||
configASSERT(pNetCred != NULL);
|
||||
configASSERT(pNetCred->pRootCa != NULL);
|
||||
configASSERT(pNetCtx->tcpSocket != NULL);
|
||||
|
||||
|
||||
if (pNetCtx->sslContext.ctx == NULL )
|
||||
{
|
||||
/* Attempt to create a context that uses the TLS 1.3 or 1.2 */
|
||||
pNetCtx->sslContext.ctx =
|
||||
wolfSSL_CTX_new( wolfSSLv23_client_method_ex( NULL ) );
|
||||
}
|
||||
|
||||
if (pNetCtx->sslContext.ctx != NULL )
|
||||
{
|
||||
/* attempt to load ca cert file, client cert file and client private key file */
|
||||
if( wolfSSL_CTX_load_verify_locations( pNetCtx->sslContext.ctx,
|
||||
(const char*)(pNetCred->pRootCa), NULL) == SSL_SUCCESS )
|
||||
{
|
||||
if( wolfSSL_CTX_use_certificate_file(pNetCtx->sslContext.ctx,
|
||||
(const char*)(pNetCred->pClientCert), SSL_FILETYPE_PEM)
|
||||
== SSL_SUCCESS )
|
||||
{
|
||||
if ( wolfSSL_CTX_use_PrivateKey_file(pNetCtx->sslContext.ctx,
|
||||
(const char*)(pNetCred->pPrivateKey), SSL_FILETYPE_PEM)
|
||||
== SSL_SUCCESS)
|
||||
{
|
||||
/* create a ssl object */
|
||||
pNetCtx->sslContext.ssl =
|
||||
wolfSSL_new(pNetCtx->sslContext.ctx);
|
||||
|
||||
if (pNetCtx->sslContext.ssl != NULL)
|
||||
{
|
||||
Socket_t xSocket = pNetCtx->tcpSocket;
|
||||
|
||||
/* set Recv/Send glue functions to the WOLFSSL object */
|
||||
wolfSSL_SSLSetIORecv(pNetCtx->sslContext.ssl,
|
||||
wolfSSL_IORecvGlue);
|
||||
wolfSSL_SSLSetIOSend(pNetCtx->sslContext.ssl,
|
||||
wolfSSL_IOSendGlue);
|
||||
|
||||
/* set socket as a context of read/send glue funcs */
|
||||
wolfSSL_SetIOReadCtx(pNetCtx->sslContext.ssl, xSocket);
|
||||
wolfSSL_SetIOWriteCtx(pNetCtx->sslContext.ssl, xSocket);
|
||||
|
||||
/* let wolfSSL perform tls handshake */
|
||||
if (wolfSSL_connect(pNetCtx->sslContext.ssl)
|
||||
== SSL_SUCCESS)
|
||||
{
|
||||
returnStatus = TLS_TRANSPORT_SUCCESS;
|
||||
}
|
||||
else
|
||||
{
|
||||
wolfSSL_shutdown(pNetCtx->sslContext.ssl);
|
||||
wolfSSL_free(pNetCtx->sslContext.ssl);
|
||||
pNetCtx->sslContext.ssl = NULL;
|
||||
wolfSSL_CTX_free(pNetCtx->sslContext.ctx);
|
||||
pNetCtx->sslContext.ctx = NULL;
|
||||
|
||||
LogError(("Failed to establish a TLS connection"));
|
||||
returnStatus = TLS_TRANSPORT_HANDSHAKE_FAILED;
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
wolfSSL_CTX_free(pNetCtx->sslContext.ctx);
|
||||
pNetCtx->sslContext.ctx = NULL;
|
||||
|
||||
LogError(("Failed to create wolfSSL object"));
|
||||
returnStatus = TLS_TRANSPORT_INTERNAL_ERROR;
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
wolfSSL_CTX_free(pNetCtx->sslContext.ctx);
|
||||
pNetCtx->sslContext.ctx = NULL;
|
||||
|
||||
LogError(("Failed to load client-private-key file"));
|
||||
returnStatus = TLS_TRANSPORT_INVALID_CREDENTIALS;
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
wolfSSL_CTX_free(pNetCtx->sslContext.ctx);
|
||||
pNetCtx->sslContext.ctx = NULL;
|
||||
|
||||
LogError(("Failed to load client-certificate file"));
|
||||
returnStatus = TLS_TRANSPORT_INVALID_CREDENTIALS;
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
wolfSSL_CTX_free(pNetCtx->sslContext.ctx);
|
||||
pNetCtx->sslContext.ctx = NULL;
|
||||
|
||||
LogError(("Failed to load ca-certificate file"));
|
||||
returnStatus = TLS_TRANSPORT_INVALID_CREDENTIALS;
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
LogError(("Failed to create a wolfSSL_CTX"));
|
||||
returnStatus = TLS_TRANSPORT_CONNECT_FAILURE;
|
||||
}
|
||||
|
||||
return returnStatus;
|
||||
}
|
||||
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
TlsTransportStatus_t TLS_FreeRTOS_Connect( NetworkContext_t * pNetworkContext,
|
||||
const char * pHostName,
|
||||
uint16_t port,
|
||||
const NetworkCredentials_t * pNetworkCredentials,
|
||||
uint32_t receiveTimeoutMs,
|
||||
uint32_t sendTimeoutMs )
|
||||
{
|
||||
TlsTransportStatus_t returnStatus = TLS_TRANSPORT_SUCCESS;
|
||||
BaseType_t socketStatus = 0;
|
||||
|
||||
|
||||
if( ( pNetworkContext == NULL ) ||
|
||||
( pHostName == NULL ) ||
|
||||
( pNetworkCredentials == NULL ) )
|
||||
{
|
||||
LogError( ( "Invalid input parameter(s): Arguments cannot be NULL. pNetworkContext=%p, "
|
||||
"pHostName=%p, pNetworkCredentials=%p.",
|
||||
pNetworkContext,
|
||||
pHostName,
|
||||
pNetworkCredentials ) );
|
||||
returnStatus = TLS_TRANSPORT_INVALID_PARAMETER;
|
||||
}
|
||||
else if( ( pNetworkCredentials->pRootCa == NULL ) )
|
||||
{
|
||||
LogError( ( "pRootCa cannot be NULL." ) );
|
||||
returnStatus = TLS_TRANSPORT_INVALID_PARAMETER;
|
||||
}
|
||||
|
||||
/* Establish a TCP connection with the server. */
|
||||
if( returnStatus == TLS_TRANSPORT_SUCCESS )
|
||||
{
|
||||
socketStatus = Sockets_Connect( &( pNetworkContext->tcpSocket ),
|
||||
pHostName,
|
||||
port,
|
||||
receiveTimeoutMs,
|
||||
sendTimeoutMs );
|
||||
|
||||
if( socketStatus != 0 )
|
||||
{
|
||||
LogError( ( "Failed to connect to %s with error %d.",
|
||||
pHostName,
|
||||
socketStatus ) );
|
||||
returnStatus = TLS_TRANSPORT_CONNECT_FAILURE;
|
||||
}
|
||||
}
|
||||
|
||||
/* Initialize tls. */
|
||||
if( returnStatus == TLS_TRANSPORT_SUCCESS )
|
||||
{
|
||||
returnStatus = initTLS();
|
||||
}
|
||||
|
||||
/* Perform TLS handshake. */
|
||||
if( returnStatus == TLS_TRANSPORT_SUCCESS )
|
||||
{
|
||||
returnStatus = tlsSetup( pNetworkContext, pHostName, pNetworkCredentials );
|
||||
}
|
||||
|
||||
/* Clean up on failure. */
|
||||
if( returnStatus != TLS_TRANSPORT_SUCCESS )
|
||||
{
|
||||
if( pNetworkContext->tcpSocket != FREERTOS_INVALID_SOCKET )
|
||||
{
|
||||
FreeRTOS_closesocket( pNetworkContext->tcpSocket );
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
LogInfo( ( "(Network connection %p) Connection to %s established.",
|
||||
pNetworkContext,
|
||||
pHostName ) );
|
||||
}
|
||||
|
||||
return returnStatus;
|
||||
}
|
||||
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
void TLS_FreeRTOS_Disconnect( NetworkContext_t * pNetworkContext )
|
||||
{
|
||||
WOLFSSL* pSsl = pNetworkContext->sslContext.ssl;
|
||||
|
||||
/* shutdown an active TLS connection */
|
||||
wolfSSL_shutdown(pSsl);
|
||||
|
||||
/* cleanup WOLFSSL object */
|
||||
wolfSSL_free(pSsl);
|
||||
pNetworkContext->sslContext.ssl = NULL;
|
||||
|
||||
/* Call socket shutdown function to close connection. */
|
||||
Sockets_Disconnect(pNetworkContext->tcpSocket);
|
||||
|
||||
/* free WOLFSSL_CTX object*/
|
||||
WOLFSSL_CTX* pCtx = pNetworkContext->sslContext.ctx;
|
||||
wolfSSL_CTX_free(pCtx);
|
||||
pNetworkContext->sslContext.ctx = NULL;
|
||||
|
||||
wolfSSL_Cleanup();
|
||||
}
|
||||
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
int32_t TLS_FreeRTOS_recv( NetworkContext_t * pNetworkContext,
|
||||
void * pBuffer,
|
||||
size_t bytesToRecv )
|
||||
{
|
||||
int32_t tlsStatus = 0;
|
||||
int iResult = 0;
|
||||
WOLFSSL* pSsl = pNetworkContext->sslContext.ssl;
|
||||
|
||||
iResult = wolfSSL_read( pSsl, pBuffer, bytesToRecv );
|
||||
|
||||
if (iResult > 0)
|
||||
tlsStatus = iResult;
|
||||
else if ( wolfSSL_want_read( pSsl ) == 1 )
|
||||
tlsStatus = 0;
|
||||
else
|
||||
{
|
||||
tlsStatus = wolfSSL_state( pSsl );
|
||||
LogError(("Error from wolfSSL_read %d : %s ",
|
||||
iResult, wolfSSL_ERR_reason_error_string( tlsStatus )));
|
||||
}
|
||||
return tlsStatus;
|
||||
}
|
||||
|
||||
/*-----------------------------------------------------------*/
|
||||
|
||||
int32_t TLS_FreeRTOS_send( NetworkContext_t * pNetworkContext,
|
||||
const void * pBuffer,
|
||||
size_t bytesToSend )
|
||||
{
|
||||
int32_t tlsStatus = 0;
|
||||
int iResult = 0;
|
||||
WOLFSSL* pSsl = pNetworkContext->sslContext.ssl;
|
||||
|
||||
iResult = wolfSSL_write( pSsl, pBuffer, bytesToSend );
|
||||
|
||||
if (iResult > 0)
|
||||
tlsStatus = iResult;
|
||||
else if( wolfSSL_want_write( pSsl ) == 1)
|
||||
tlsStatus = 0;
|
||||
else
|
||||
{
|
||||
tlsStatus = wolfSSL_state(pSsl);
|
||||
LogError(("Error from wolfSL_write %d : %s ",
|
||||
iResult, wolfSSL_ERR_reason_error_string( tlsStatus )));
|
||||
}
|
||||
return tlsStatus;
|
||||
}
|
||||
/*-----------------------------------------------------------*/
|
@ -0,0 +1,199 @@
|
||||
/*
|
||||
* FreeRTOS V202012.00
|
||||
* Copyright (C) 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
||||
*
|
||||
* Permission is hereby granted, free of charge, to any person obtaining a copy of
|
||||
* this software and associated documentation files (the "Software"), to deal in
|
||||
* the Software without restriction, including without limitation the rights to
|
||||
* use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
|
||||
* the Software, and to permit persons to whom the Software is furnished to do so,
|
||||
* subject to the following conditions:
|
||||
*
|
||||
* The above copyright notice and this permission notice shall be included in all
|
||||
* copies or substantial portions of the Software.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
|
||||
* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
|
||||
* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
|
||||
* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
||||
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||
*
|
||||
* https://www.FreeRTOS.org
|
||||
* https://github.com/FreeRTOS
|
||||
*
|
||||
*/
|
||||
|
||||
/**
|
||||
* @file using_wolfSSL.h
|
||||
* @brief TLS transport interface header.
|
||||
*/
|
||||
|
||||
#ifndef USING_WOLFSSL_H
|
||||
#define USING_WOLFSSL_H
|
||||
|
||||
/**************************************************/
|
||||
/******* DO NOT CHANGE the following order ********/
|
||||
/**************************************************/
|
||||
|
||||
/* Logging related header files are required to be included in the following order:
|
||||
* 1. Include the header file "logging_levels.h".
|
||||
* 2. Define LIBRARY_LOG_NAME and LIBRARY_LOG_LEVEL.
|
||||
* 3. Include the header file "logging_stack.h".
|
||||
*/
|
||||
|
||||
/* Include header that defines log levels. */
|
||||
#include "logging_levels.h"
|
||||
|
||||
/* Logging configuration for the Sockets. */
|
||||
#ifndef LIBRARY_LOG_NAME
|
||||
#define LIBRARY_LOG_NAME "TlsTransport"
|
||||
#endif
|
||||
#ifndef LIBRARY_LOG_LEVEL
|
||||
#define LIBRARY_LOG_LEVEL LOG_INFO
|
||||
#endif
|
||||
|
||||
#include "logging_stack.h"
|
||||
|
||||
/************ End of logging configuration ****************/
|
||||
|
||||
/* FreeRTOS+TCP include. */
|
||||
#include "FreeRTOS_Sockets.h"
|
||||
|
||||
/* Transport interface include. */
|
||||
#include "transport_interface.h"
|
||||
|
||||
/* wolfSSL interface include. */
|
||||
#include "wolfssl/ssl.h"
|
||||
|
||||
/**
|
||||
* @brief Secured connection context.
|
||||
*/
|
||||
typedef struct SSLContext
|
||||
{
|
||||
WOLFSSL_CTX* ctx; /**< @brief wolfSSL context */
|
||||
WOLFSSL* ssl; /**< @brief wolfSSL ssl session context */
|
||||
} SSLContext_t;
|
||||
|
||||
/**
|
||||
* @brief Definition of the network context for the transport interface
|
||||
* implementation that uses mbedTLS and FreeRTOS+TLS sockets.
|
||||
*/
|
||||
struct NetworkContext
|
||||
{
|
||||
Socket_t tcpSocket;
|
||||
SSLContext_t sslContext;
|
||||
};
|
||||
|
||||
/**
|
||||
* @brief Contains the credentials necessary for tls connection setup.
|
||||
*/
|
||||
typedef struct NetworkCredentials
|
||||
{
|
||||
/**
|
||||
* @brief Set this to a non-NULL value to use ALPN.
|
||||
*
|
||||
* This string must be NULL-terminated.
|
||||
*
|
||||
* See [this link]
|
||||
* (https://aws.amazon.com/blogs/iot/mqtt-with-tls-client-authentication-on-port-443-why-it-is-useful-and-how-it-works/)
|
||||
* for more information.
|
||||
*/
|
||||
const char * pAlpnProtos;
|
||||
|
||||
/**
|
||||
* @brief Disable server name indication (SNI) for a TLS session.
|
||||
*/
|
||||
BaseType_t disableSni;
|
||||
|
||||
const unsigned char * pRootCa; /**< @brief String representing a trusted server root certificate. */
|
||||
size_t rootCaSize; /**< @brief Size associated with #IotNetworkCredentials.pRootCa. */
|
||||
const unsigned char * pClientCert; /**< @brief String representing the client certificate. */
|
||||
size_t clientCertSize; /**< @brief Size associated with #IotNetworkCredentials.pClientCert. */
|
||||
const unsigned char * pPrivateKey; /**< @brief String representing the client certificate's private key. */
|
||||
size_t privateKeySize; /**< @brief Size associated with #IotNetworkCredentials.pPrivateKey. */
|
||||
const unsigned char * pUserName; /**< @brief String representing the username for MQTT. */
|
||||
size_t userNameSize; /**< @brief Size associated with #IotNetworkCredentials.pUserName. */
|
||||
const unsigned char * pPassword; /**< @brief String representing the password for MQTT. */
|
||||
size_t passwordSize; /**< @brief Size associated with #IotNetworkCredentials.pPassword. */
|
||||
} NetworkCredentials_t;
|
||||
|
||||
/**
|
||||
* @brief TLS Connect / Disconnect return status.
|
||||
*/
|
||||
typedef enum TlsTransportStatus
|
||||
{
|
||||
TLS_TRANSPORT_SUCCESS = 0, /**< Function successfully completed. */
|
||||
TLS_TRANSPORT_INVALID_PARAMETER, /**< At least one parameter was invalid. */
|
||||
TLS_TRANSPORT_INSUFFICIENT_MEMORY, /**< Insufficient memory required to establish connection. */
|
||||
TLS_TRANSPORT_INVALID_CREDENTIALS, /**< Provided credentials were invalid. */
|
||||
TLS_TRANSPORT_HANDSHAKE_FAILED, /**< Performing TLS handshake with server failed. */
|
||||
TLS_TRANSPORT_INTERNAL_ERROR, /**< A call to a system API resulted in an internal error. */
|
||||
TLS_TRANSPORT_CONNECT_FAILURE /**< Initial connection to the server failed. */
|
||||
} TlsTransportStatus_t;
|
||||
|
||||
/**
|
||||
* @brief Create a TLS connection with FreeRTOS sockets.
|
||||
*
|
||||
* @param[out] pNetworkContext Pointer to a network context to contain the
|
||||
* initialized socket handle.
|
||||
* @param[in] pHostName The hostname of the remote endpoint.
|
||||
* @param[in] port The destination port.
|
||||
* @param[in] pNetworkCredentials Credentials for the TLS connection.
|
||||
* @param[in] receiveTimeoutMs Receive socket timeout.
|
||||
* @param[in] sendTimeoutMs Send socket timeout.
|
||||
*
|
||||
* @return #TLS_TRANSPORT_SUCCESS, #TLS_TRANSPORT_INSUFFICIENT_MEMORY, #TLS_TRANSPORT_INVALID_CREDENTIALS,
|
||||
* #TLS_TRANSPORT_HANDSHAKE_FAILED, #TLS_TRANSPORT_INTERNAL_ERROR, or #TLS_TRANSPORT_CONNECT_FAILURE.
|
||||
*/
|
||||
TlsTransportStatus_t TLS_FreeRTOS_Connect( NetworkContext_t * pNetworkContext,
|
||||
const char * pHostName,
|
||||
uint16_t port,
|
||||
const NetworkCredentials_t * pNetworkCredentials,
|
||||
uint32_t receiveTimeoutMs,
|
||||
uint32_t sendTimeoutMs );
|
||||
|
||||
/**
|
||||
* @brief Gracefully disconnect an established TLS connection.
|
||||
*
|
||||
* @param[in] pNetworkContext Network context.
|
||||
*/
|
||||
void TLS_FreeRTOS_Disconnect( NetworkContext_t * pNetworkContext );
|
||||
|
||||
/**
|
||||
* @brief Receives data from an established TLS connection.
|
||||
*
|
||||
* This is the TLS version of the transport interface's
|
||||
* #TransportRecv_t function.
|
||||
*
|
||||
* @param[in] pNetworkContext The Network context.
|
||||
* @param[out] pBuffer Buffer to receive bytes into.
|
||||
* @param[in] bytesToRecv Number of bytes to receive from the network.
|
||||
*
|
||||
* @return Number of bytes (> 0) received if successful;
|
||||
* 0 if the socket times out without reading any bytes;
|
||||
* negative value on error.
|
||||
*/
|
||||
int32_t TLS_FreeRTOS_recv( NetworkContext_t * pNetworkContext,
|
||||
void * pBuffer,
|
||||
size_t bytesToRecv );
|
||||
|
||||
/**
|
||||
* @brief Sends data over an established TLS connection.
|
||||
*
|
||||
* This is the TLS version of the transport interface's
|
||||
* #TransportSend_t function.
|
||||
*
|
||||
* @param[in] pNetworkContext The network context.
|
||||
* @param[in] pBuffer Buffer containing the bytes to send.
|
||||
* @param[in] bytesToSend Number of bytes to send from the buffer.
|
||||
*
|
||||
* @return Number of bytes (> 0) sent on success;
|
||||
* 0 if the socket times out without sending any bytes;
|
||||
* else a negative value to represent error.
|
||||
*/
|
||||
int32_t TLS_FreeRTOS_send( NetworkContext_t * pNetworkContext,
|
||||
const void * pBuffer,
|
||||
size_t bytesToSend );
|
||||
|
||||
#endif /* ifndef USING_WOLFSSL_H */
|
Loading…
Reference in New Issue