|
41 | 41 | * a new on-device key pair and output public key. When set to 0, the device |
42 | 42 | * should keep existing key pair. |
43 | 43 | */ |
44 | | -#define FORCE_GENERATE_NEW_KEY_PAIR 0 |
| 44 | +#define FORCE_GENERATE_NEW_KEY_PAIR 0 |
45 | 45 |
|
46 | 46 | /** |
47 | 47 | * @brief Endpoint of the MQTT broker to connect to in mqtt test. |
48 | 48 | */ |
49 | | -#define MQTT_SERVER_ENDPOINT clientcredentialMQTT_BROKER_ENDPOINT |
| 49 | +#define MQTT_SERVER_ENDPOINT clientcredentialMQTT_BROKER_ENDPOINT |
50 | 50 |
|
51 | 51 | /** |
52 | 52 | * @brief Port of the MQTT broker to connect to in mqtt test. |
53 | 53 | */ |
54 | | -#define MQTT_SERVER_PORT clientcredentialMQTT_BROKER_PORT |
| 54 | +#define MQTT_SERVER_PORT clientcredentialMQTT_BROKER_PORT |
55 | 55 |
|
56 | 56 | /** |
57 | 57 | * @brief The client identifier for MQTT test. |
58 | 58 | */ |
59 | | -#define MQTT_TEST_CLIENT_IDENTIFIER clientcredentialIOT_THING_NAME |
| 59 | +#define MQTT_TEST_CLIENT_IDENTIFIER clientcredentialIOT_THING_NAME |
60 | 60 |
|
61 | 61 | /** |
62 | 62 | * @brief Network buffer size specified in bytes. Must be large enough to hold the maximum |
63 | 63 | * anticipated MQTT payload. |
64 | 64 | */ |
65 | | -#define MQTT_TEST_NETWORK_BUFFER_SIZE (1000) |
| 65 | +#define MQTT_TEST_NETWORK_BUFFER_SIZE ( 1000 ) |
66 | 66 |
|
67 | 67 | /** |
68 | 68 | * @brief Timeout for MQTT_ProcessLoop() function in milliseconds. |
69 | 69 | * The timeout value is appropriately chosen for receiving an incoming |
70 | 70 | * PUBLISH message and ack responses for QoS 1 and QoS 2 communications |
71 | 71 | * with the broker. |
72 | 72 | */ |
73 | | -#define MQTT_TEST_PROCESS_LOOP_TIMEOUT_MS (4000) |
| 73 | +#define MQTT_TEST_PROCESS_LOOP_TIMEOUT_MS ( 4000 ) |
74 | 74 |
|
75 | 75 | /** |
76 | 76 | * @brief Root certificate of the IoT Core. |
|
114 | 114 | * "...base64 data...\n"\ |
115 | 115 | * "-----END CERTIFICATE-----\n" |
116 | 116 | */ |
117 | | -#define MQTT_CLIENT_CERTIFICATE keyCLIENT_CERTIFICATE_PEM |
| 117 | +#define MQTT_CLIENT_CERTIFICATE keyCLIENT_CERTIFICATE_PEM |
118 | 118 |
|
119 | 119 | /** |
120 | 120 | * @brief Client private key to connect to MQTT server. |
|
123 | 123 | * |
124 | 124 | * For qualification, the key should be generated on-device. |
125 | 125 | */ |
126 | | -#define MQTT_CLIENT_PRIVATE_KEY keyCLIENT_PRIVATE_KEY_PEM |
| 126 | +#define MQTT_CLIENT_PRIVATE_KEY keyCLIENT_PRIVATE_KEY_PEM |
127 | 127 |
|
128 | 128 | /** |
129 | 129 | * @brief Endpoint of the echo server to connect to in transport interface test. |
130 | 130 | */ |
131 | | -#define ECHO_SERVER_ENDPOINT "localhost" |
| 131 | +#define ECHO_SERVER_ENDPOINT "localhost" |
132 | 132 |
|
133 | 133 | /** |
134 | 134 | * @brief Port of the echo server to connect to in transport interface test. |
135 | 135 | */ |
136 | | -#define ECHO_SERVER_PORT (9000) |
| 136 | +#define ECHO_SERVER_PORT ( 9000 ) |
137 | 137 |
|
138 | 138 | /** |
139 | 139 | * @brief Root certificate of the echo server. |
|
179 | 179 | * #define TEST_START_DELAY_MS 5000 |
180 | 180 | */ |
181 | 181 |
|
182 | | -#define OTA_RSA_SHA1 1 |
183 | | -#define OTA_RSA_SHA256 2 |
184 | | -#define OTA_ECDSA_SHA256 3 |
| 182 | +#define OTA_RSA_SHA1 1 |
| 183 | +#define OTA_RSA_SHA256 2 |
| 184 | +#define OTA_ECDSA_SHA256 3 |
185 | 185 |
|
186 | 186 | /** |
187 | 187 | * @brief Certificate type for OTA PAL test. |
188 | 188 | * Valid options are: OTA_RSA_SHA1, OTA_RSA_SHA256, OTA_ECDSA_SHA256. |
189 | 189 | */ |
190 | | -#define OTA_PAL_TEST_CERT_TYPE OTA_RSA_SHA256 |
| 190 | +#define OTA_PAL_TEST_CERT_TYPE OTA_RSA_SHA256 |
191 | 191 |
|
192 | 192 | /** |
193 | 193 | * @brief Path to cert for OTA test PAL. Used to verify signature. |
194 | 194 | * If applicable, the device must be pre-provisioned with this certificate. Please see |
195 | 195 | * test/common/ota/test_files for the set of certificates. |
196 | 196 | */ |
197 | | -#define OTA_PAL_CERTIFICATE_FILE "ecdsa-sha256-signer.crt.pem" |
| 197 | +#define OTA_PAL_CERTIFICATE_FILE "ecdsa-sha256-signer.crt.pem" |
198 | 198 |
|
199 | 199 | /** |
200 | 200 | * @brief Some devices have a hard-coded name for the firmware image to boot. |
201 | 201 | */ |
202 | | -#define OTA_PAL_FIRMWARE_FILE "non_secure image" |
| 202 | +#define OTA_PAL_FIRMWARE_FILE "non_secure image" |
203 | 203 |
|
204 | 204 | /** |
205 | 205 | * @brief Some boards OTA PAL layers will use the file names passed into it for the |
206 | 206 | * image and the certificates because their non-volatile memory is abstracted by a |
207 | 207 | * file system. Set this to 1 if that is the case for your device. |
208 | 208 | */ |
209 | | -#define OTA_PAL_USE_FILE_SYSTEM 0 |
| 209 | +#define OTA_PAL_USE_FILE_SYSTEM 0 |
210 | 210 |
|
211 | 211 | /** |
212 | 212 | * @brief The PKCS #11 supports RSA key function. |
213 | 213 | * |
214 | 214 | * Set to 1 if RSA private keys are supported by the platform. 0 if not. |
215 | 215 | */ |
216 | | -#define PKCS11_TEST_RSA_KEY_SUPPORT (1) |
| 216 | +#define PKCS11_TEST_RSA_KEY_SUPPORT ( 1 ) |
217 | 217 |
|
218 | 218 | /** |
219 | 219 | * @brief The PKCS #11 supports EC key function. |
220 | 220 | * |
221 | 221 | * Set to 1 if elliptic curve private keys are supported by the platform. 0 if not. |
222 | 222 | */ |
223 | | -#define PKCS11_TEST_EC_KEY_SUPPORT (0) |
| 223 | +#define PKCS11_TEST_EC_KEY_SUPPORT ( 0 ) |
224 | 224 |
|
225 | 225 | /** |
226 | 226 | * @brief The PKCS #11 supports import key method. |
227 | 227 | * |
228 | 228 | * Set to 1 if importing device private key via C_CreateObject is supported. 0 if not. |
229 | 229 | */ |
230 | | -#define PKCS11_TEST_IMPORT_PRIVATE_KEY_SUPPORT (0) |
| 230 | +#define PKCS11_TEST_IMPORT_PRIVATE_KEY_SUPPORT ( 0 ) |
231 | 231 |
|
232 | 232 | /** |
233 | 233 | * @brief The PKCS #11 supports generate keypair method. |
234 | 234 | * |
235 | 235 | * Set to 1 if generating a device private-public key pair via C_GenerateKeyPair. 0 if not. |
236 | 236 | */ |
237 | | -#define PKCS11_TEST_GENERATE_KEYPAIR_SUPPORT (1) |
| 237 | +#define PKCS11_TEST_GENERATE_KEYPAIR_SUPPORT ( 1 ) |
238 | 238 |
|
239 | 239 | /** |
240 | 240 | * @brief The PKCS #11 supports preprovisioning method. |
241 | 241 | * |
242 | 242 | * Set to 1 if preprovisioning is supported. |
243 | 243 | */ |
244 | | -#define PKCS11_TEST_PREPROVISIONED_SUPPORT (0) |
| 244 | +#define PKCS11_TEST_PREPROVISIONED_SUPPORT ( 0 ) |
245 | 245 |
|
246 | 246 | /** |
247 | 247 | * @brief The PKCS #11 label for device private key for test. |
|
250 | 250 | * For devices with secure elements or hardware limitations, this may be defined |
251 | 251 | * to a different label to preserve AWS IoT credentials for other test suites. |
252 | 252 | */ |
253 | | -#define PKCS11_TEST_LABEL_DEVICE_PRIVATE_KEY_FOR_TLS pkcs11configLABEL_DEVICE_PRIVATE_KEY_FOR_TLS |
| 253 | +#define PKCS11_TEST_LABEL_DEVICE_PRIVATE_KEY_FOR_TLS pkcs11configLABEL_DEVICE_PRIVATE_KEY_FOR_TLS |
254 | 254 |
|
255 | 255 | /** |
256 | 256 | * @brief The PKCS #11 label for device public key. |
|
259 | 259 | * For devices with secure elements or hardware limitations, this may be defined |
260 | 260 | * to a different label to preserve AWS IoT credentials for other test suites. |
261 | 261 | */ |
262 | | -#define PKCS11_TEST_LABEL_DEVICE_PUBLIC_KEY_FOR_TLS pkcs11configLABEL_DEVICE_PUBLIC_KEY_FOR_TLS |
| 262 | +#define PKCS11_TEST_LABEL_DEVICE_PUBLIC_KEY_FOR_TLS pkcs11configLABEL_DEVICE_PUBLIC_KEY_FOR_TLS |
263 | 263 |
|
264 | 264 | /** |
265 | 265 | * @brief The PKCS #11 label for the device certificate. |
|
268 | 268 | * For devices with secure elements or hardware limitations, this may be defined |
269 | 269 | * to a different label to preserve AWS IoT credentials for other test suites. |
270 | 270 | */ |
271 | | -#define PKCS11_TEST_LABEL_DEVICE_CERTIFICATE_FOR_TLS pkcs11configLABEL_DEVICE_CERTIFICATE_FOR_TLS |
| 271 | +#define PKCS11_TEST_LABEL_DEVICE_CERTIFICATE_FOR_TLS pkcs11configLABEL_DEVICE_CERTIFICATE_FOR_TLS |
272 | 272 |
|
273 | 273 | /** |
274 | 274 | * @brief The PKCS #11 supports storage for JITP. |
|
280 | 280 | * Set to 1 if PKCS #11 supports storage for JITP certificate, code verify certificate, |
281 | 281 | * and trusted server root certificate. |
282 | 282 | */ |
283 | | -#define PKCS11_TEST_JITP_CODEVERIFY_ROOT_CERT_SUPPORTED pkcs11configJITP_CODEVERIFY_ROOT_CERT_SUPPORTED |
| 283 | +#define PKCS11_TEST_JITP_CODEVERIFY_ROOT_CERT_SUPPORTED pkcs11configJITP_CODEVERIFY_ROOT_CERT_SUPPORTED |
284 | 284 |
|
285 | 285 | /** |
286 | 286 | * @brief The PKCS #11 label for the object to be used for code verification. |
287 | 287 | * |
288 | 288 | * This label has to be defined if PKCS11_TEST_JITP_CODEVERIFY_ROOT_CERT_SUPPORTED is set to 1. |
289 | 289 | */ |
290 | | -#define PKCS11_TEST_LABEL_CODE_VERIFICATION_KEY pkcs11configLABEL_CODE_VERIFICATION_KEY |
| 290 | +#define PKCS11_TEST_LABEL_CODE_VERIFICATION_KEY pkcs11configLABEL_CODE_VERIFICATION_KEY |
291 | 291 |
|
292 | 292 | /** |
293 | 293 | * @brief The PKCS #11 label for Just-In-Time-Provisioning. |
294 | 294 | * |
295 | 295 | * This label has to be defined if PKCS11_TEST_JITP_CODEVERIFY_ROOT_CERT_SUPPORTED is set to 1. |
296 | 296 | */ |
297 | | -#define PKCS11_TEST_LABEL_JITP_CERTIFICATE pkcs11configLABEL_JITP_CERTIFICATE |
| 297 | +#define PKCS11_TEST_LABEL_JITP_CERTIFICATE pkcs11configLABEL_JITP_CERTIFICATE |
298 | 298 |
|
299 | 299 | /** |
300 | 300 | * @brief The PKCS #11 label for the AWS Trusted Root Certificate. |
301 | 301 | * |
302 | 302 | * This label has to be defined if PKCS11_TEST_JITP_CODEVERIFY_ROOT_CERT_SUPPORTED is set to 1. |
303 | 303 | */ |
304 | | -#define PKCS11_TEST_LABEL_ROOT_CERTIFICATE pkcs11configLABEL_ROOT_CERTIFICATE |
| 304 | +#define PKCS11_TEST_LABEL_ROOT_CERTIFICATE pkcs11configLABEL_ROOT_CERTIFICATE |
305 | 305 |
|
306 | 306 | /** |
307 | 307 | * @brief The IoT Thing name for the device for OTA test. |
308 | 308 | */ |
309 | | -#define IOT_THING_NAME clientcredentialIOT_THING_NAME |
| 309 | +#define IOT_THING_NAME clientcredentialIOT_THING_NAME |
310 | 310 |
|
311 | 311 | /** |
312 | 312 | * @brief Major version for OTA E2E test. |
313 | 313 | */ |
314 | | -#define OTA_APP_VERSION_MAJOR 0 |
| 314 | +#define OTA_APP_VERSION_MAJOR 0 |
315 | 315 |
|
316 | 316 | /** |
317 | 317 | * @brief Major version for OTA E2E test. |
318 | 318 | */ |
319 | | -#define OTA_APP_VERSION_MINOR 9 |
| 319 | +#define OTA_APP_VERSION_MINOR 9 |
320 | 320 |
|
321 | 321 | /** |
322 | 322 | * @brief Major version for OTA E2E test. |
323 | 323 | */ |
324 | | -#define OTA_APP_VERSION_BUILD 1 |
| 324 | +#define OTA_APP_VERSION_BUILD 1 |
325 | 325 |
|
326 | | -#define OUTGOING_PUBLISH_RECORD_COUNT 20 |
327 | | -#define INCOMING_PUBLISH_RECORD_COUNT 20 |
| 326 | +#define OUTGOING_PUBLISH_RECORD_COUNT 20 |
| 327 | +#define INCOMING_PUBLISH_RECORD_COUNT 20 |
328 | 328 |
|
329 | 329 | #endif /* TEST_PARAM_CONFIG_H */ |
0 commit comments