HelloMQTT over TLS.
Fork of HelloMQTT by
HelloMQTT over TLS
This program is a fork of HelloMQTT. Added TLS capability by using TLSSocket library. Tested on K64F.
This sample program connects to iot.eclipse.org:8883
by default. Verifies server identification. Subscribes a certain topic. Then publishes three messages with different QoSs, i.e. QoS0
, QoS1
, and QoS2
.
Warning
Some brokers do not accept QoS2 and/or QoS1 message. For example, AWS IoT Message Broker doesn't accept QoS2. In such broker, this program doesn't work as is. Change QoS level.
Output from console
HelloMQTT: version is 0.70 Opening network interface... Network interface opened successfully. Connecting to host iot.eclipse.org:8883 ... Connection established. MQTT client is trying to connect the server ... Client connected. Client is trying to subscribe a topic "mbed-test". Client has subscribed a topic "mbed-test". Client publishes messages ... Publishing message QoS 0. QoS 0 message published. ! Message arrived: qos 0, retained 0, dup 0, packetid 6257 ! Payload Hello World! QoS 0 message from app version 0.700000 Publishing message QoS 1. QoS 1 message published. ! Message arrived: qos 1, retained 0, dup 0, packetid 1 ! Payload Hello World! QoS 1 message from app version 0.700000 Publishing message QoS 2. QoS 2 message published. ! Message arrived: qos 2, retained 0, dup 0, packetid 2 ! Payload Hello World! QoS 2 message from app version 0.700000 Version 0.70: finish 3 msgs
Known Issues
On K64F, when serial baud rate is changed from 9600 to 115200, program fails.
Diff: MQTTNetwork.h
- Branch:
- mutualAuth
- Revision:
- 34:8f7a465c2192
- Parent:
- 24:e7cf8b02e012
- Child:
- 42:c88d777f2e00
--- a/MQTTNetwork.h Wed Apr 25 17:21:32 2018 +0900 +++ b/MQTTNetwork.h Thu Jun 07 15:50:02 2018 +0900 @@ -34,13 +34,14 @@ return socket->send(buffer, len); } - int connect(const char* hostname, int port, const char *ssl_ca_pem = NULL) { + int connect(const char* hostname, int port, const char *ssl_ca_pem = NULL, + const char *ssl_cli_pem = NULL, const char *ssl_pk_pem = NULL) { nsapi_error_t ret = 0; if((ret = socket->open(network)) != 0) { return ret; } #ifdef USE_TLS - socket->set_root_ca_pem(ssl_ca_pem); + socket->set_cert_key(ssl_ca_pem, ssl_cli_pem, ssl_pk_pem); #endif /* USE_TLS */ return socket->connect(hostname, port); }