Skip to content
This repository was archived by the owner on Jun 27, 2023. It is now read-only.

Commit f943d78

Browse files
authored
Update README.md
1 parent 419ac18 commit f943d78

File tree

1 file changed

+12
-7
lines changed

1 file changed

+12
-7
lines changed

README.md

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,13 @@ In order to compile and run the TLS client, DAVE IDE is required. Download from
4343
Development IDE:
4444
* IDE: [DAVE](https://infineoncommunity.com/dave-download_ID645)
4545

46-
Once, DAVE IDE has been downloaded and installed, the TLS client can be downloaded or clone using from this repository.
46+
Once, DAVE IDE has been downloaded and installed, the TLS client can be downloaded from a [release](https://github.com/Infineon/mbedtls-optiga-trust-m/releases) or cloned from this repository.
47+
48+
__Note: Please keep in mind there is submodule included, you need to clone with the `--recurse-submodules` option; i.e.:__
49+
50+
```c
51+
$ git clone --recurse-submodules https://github.com/Infineon/mbedtls-optiga-trust-m.git
52+
```
4753

4854
Import the DAVE project from the following path <amazon-freertos-optiga-trust-m>\example_tls_client_xmc\infineon\xmc4800_iotkit_trustm\dave4\
4955

@@ -490,12 +496,7 @@ Configure the **FreeRTOSConfig.h** for the server connectivity. The server must
490496

491497
Refer the key generation in **make_ecc_cert.sh** script.
492498

493-
### Secret key stored in Trust M Provisioning
494-
495-
Infineon generates the first manufacturer key pair in 0xE0E0 and 0xE0F0 in the Infineon factory. This key pair can also be used for mutual authentication during the TLS handshaking.
496-
497-
498-
## Appendix Generate Server and Client Certificate
499+
## How to Generate Server and Client Certificates
499500
A set of Server Private and Public Key is created. The Server Public Key is signed using the Server Private key and generated as a Certificate. This can be created using the **make_ecc_cert.sh** script. The script also helps to generate client private key and certificate stored in flash. On the client side, a set of Client Private and Public Key is created. The Client Public Key is signed using the Client Private key and generated as a Certificate. The Server Certificate is served as a Server CA certificate and placed in the Client (XMC4800 IoT kit). The Client Certificate is served as a Client CA certificate and placed in TLS server.
500501

501502
As the CA Certificate (essentially a Public Key) is the same key pair of the private key, verification will certain pass if done correctly.
@@ -565,6 +566,10 @@ Note: Using the script below generates certificate valid for 30 days only.
565566

566567
For more information on Amazon FreeRTOS, refer to the [Getting Started section of Amazon FreeRTOS webpage](https://aws.amazon.com/freertos).
567568

569+
### Secret key stored in Trust M Provisioning
570+
571+
Infineon generates the first manufacturer key pair in 0xE0E0 and 0xE0F0 in the Infineon factory. This key pair can also be used for mutual authentication during the TLS handshaking.
572+
568573
## Testing the TLS connection
569574
The s_server command can be used to implement a generic SSL/TLS server that listens for connections on a given port using SSL/TLS. It can be used for TLS client testing.
570575

0 commit comments

Comments
 (0)