This is an implementation of the MQTT Client written in C for embedded use, which supports SSL/TLS via the wolfSSL library. This library was built from the ground up to be multi-platform, space conscience and extensible. Integrates with wolfSSL to provide TLS support.
./autogen.sh
(if cloned from GitHub)./configure
(to see a list of build options use./configure --help
)make
sudo make install
If wolfssl
was recently installed run sudo ldconfig
to update the linker cache.
For building wolfMQTT with TLS support in Visual Studio:
- Open the
wolfssl-root>/wolfssl64.sln
. - Re-target for your Visual Studio version (right-click on solution and choose
Retarget solution
). - Make sure the
Debug DLL
orRelease DLL
configuration is selected. Make note if you are building 32-bitx86
or 64-bitx64
. - Build the wolfSSL solution.
- Copy the
wolfssl.lib
andwolfssl.dll
files into<wolfmqtt-root>
.- For
DLL Debug
withx86
the files are in:DLL Debug
. - For
DLL Release
withx86
the files are in:DLL Release
. - For
DLL Debug
withx64
the files are in:x64/DLL Debug
. - For
DLL Release
withx64
the files are in:x64/DLL Release
.
- For
- Open the
<wolfmqtt-root>/wolfmqtt.sln
solution. - Make sure you have the same architecture (
x86
orx64
selected) as used in wolfSSL above. - By default the include path for the wolfssl headers is
./../wolfssl/
. If your wolfssl root location is different you can go into the project settings and adjust this inC/C++
->General
->Additional Include Directories
. - Configure your Visual Studio build settings using
wolfmqtt/vs_settings.h
. - Build the wolfMQTT solution.
See README.md
at IDE/ARDUINO/README.md
The library has three components.
This is where the top level application interfaces for the MQTT client reside.
int MqttClient_Init(MqttClient *client, MqttNet *net, MqttMsgCb msg_cb, byte *tx_buf, int tx_buf_len, byte *rx_buf, int rx_buf_len, int cmd_timeout_ms);
These API's are blocking on MqttNet.read
until error/timeout (cmd_timeout_ms
):
int MqttClient_Connect(MqttClient *client, MqttConnect *connect);
int MqttClient_Publish(MqttClient *client, MqttPublish *publish);
int MqttClient_Subscribe(MqttClient *client, MqttSubscribe *subscribe);
int MqttClient_Unsubscribe(MqttClient *client, MqttUnsubscribe *unsubscribe);
int MqttClient_Ping(MqttClient *client);
int MqttClient_Disconnect(MqttClient *client);
This function blocks waiting for a new publish message to arrive for a maximum duration of timeout_ms
.
int MqttClient_WaitMessage(MqttClient *client, MqttMessage *message, int timeout_ms);
These are the network connect / disconnect interfaces that wrap the MqttNet callbacks and handle WolfSSL TLS:
int MqttClient_NetConnect(MqttClient *client, const char* host, word16 port, int timeout_ms, int use_tls, MqttTlsCb cb);
int MqttClient_NetDisconnect(MqttClient *client);
Helper functions:
const char* MqttClient_ReturnCodeToString(int return_code);
This is where all the packet encoding/decoding is handled.
The header contains the MQTT Packet structures for:
- Connect:
MqttConnect
- Publish / Message:
MqttPublish
/MqttMessage
(they are the same) - Subscribe:
MqttSubscribe
- Unsubscribe:
MqttUnsubscribe
This is where the transport socket optionally wraps TLS and uses the MqttNet
callbacks for the platform specific network handling.
The header contains the MQTT Network structure MqttNet
for network callback and context.
Here are the steps for creating your own implementation.
- Create network callback functions for Connect, Read, Write and Disconnect. See
examples/mqttnet.c
andexamples/mqttnet.h
. - Define the callback functions and context in a
MqttNet
structure. - Call
MqttClient_Init
passing in aMqttClient
structure pointer,MqttNet
structure pointer,MqttMsgCb
function pointer, TX/RX buffers with maximum length and command timeout. - Call
MqttClient_NetConnect
to connect to broker over network. Ifuse_tls
is non-zero value then it will perform a TLS connection. The TLS callbackMqttTlsCb
should be defined for wolfSSL certificate configuration. - Call
MqttClient_Connect
passing pointer toMqttConnect
structure to send MQTT connect command and wait for Connect Ack. - Call
MqttClient_Subscribe
passing pointer toMqttSubscribe
structure to send MQTT Subscribe command and wait for Subscribe Ack (depending on QoS level). - Call
MqttClient_WaitMessage
passing pointer toMqttMessage
to wait for incoming MQTT Publish message.
The example MQTT client is located in /examples/mqttclient/
. This example exercises many of the exposed API’s and prints any incoming publish messages for subscription topic “wolfMQTT/example/testTopic”. This client contains examples of many MQTTv5 features, including the property callback and server assignment of client ID. The mqqtclient example is a good starting template for your MQTT application.
The example MQTT client is located in /examples/nbclient/
. This example uses non-blocking I/O for message exchange. The wolfMQTT library must be configured with the --enable-nonblock
option (or built with WOLFMQTT_NONBLOCK
).
The MQTT firmware update is located in /examples/firmware/
. This example has two parts. The first is called “fwpush”, which signs and publishes a firmware image. The second is called “fwclient”, which receives the firmware image and verifies the signature. This example publishes message on the topic “wolfMQTT/example/firmware”. The "fwpush" application is an example of using a publish callback to send the payload data.
We setup a wolfMQTT IoT Hub on the Azure server for testing. We added a device called demoDevice
, which you can connect and publish to. The example demonstrates creation of a SasToken, which is used as the password for the MQTT connect packet. It also shows the topic names for publishing events and listening to devicebound
messages. This example only works with ENABLE_MQTT_TLS
set and the wolfSSL library present because it requires Base64 Encode/Decode and HMAC-SHA256. Note: The wolfSSL library must be built with ./configure --enable-base64encode
or #define WOLFSSL_BASE64_ENCODE
. The wc_GetTime
API was added in 3.9.1 and if not present you'll need to implement your own version of this to get current UTC seconds or update your wolfSSL library.
We setup an AWS IoT endpoint and testing device certificate for testing. The AWS server uses TLS client certificate for authentication. The example is located in /examples/aws/
. The example subscribes to $aws/things/"AWSIOT_DEVICE_ID"/shadow/update/delta
and publishes to $aws/things/"AWSIOT_DEVICE_ID"/shadow/update
.
This example enables the wolfMQTT client to connect to the IBM Watson Internet of Things (WIOT) Platform. The WIOT Platform has a limited test broker called "Quickstart" that allows non-secure connections to exercise the component. The example is located in /examples/wiot/
. Works with MQTT v5 support enabled.
The Sensor Network client implements the MQTT-SN protocol for low-bandwidth networks. There are several differences from MQTT, including the ability to use a two byte Topic ID instead the full topic during subscribe and publish. The SN client requires an MQTT-SN gateway. The gateway acts as an intermediary between the SN clients and the broker. This client was tested with the Eclipse Paho MQTT-SN Gateway, which connects by default to the public Eclipse broker, much like our wolfMQTT Client example. The address of the gateway must be configured as the host. The example is located in /examples/sn-client/
.
This example exercises the multithreading capabilities of the client library. The client implements two tasks: one that publishes to the broker; and another that waits for messages from the broker. The publish thread is created NUM_PUB_TASKS
times (10 by default) and sends unique messages to the broker. This feature is enabled using the --enable-mt
configuration option. The example is located in /examples/multithread/
.
The initially supported version with full specification support for all features and packets type such as:
- QoS 0-2
- Last Will and Testament (LWT)
- Client examples for: AWS, Azure IoT, IBM Watson, Firmware update, non-blocking and generic.
The wolfMQTT client supports connecting to v5 enabled brokers when configured with the --enable-mqtt5
option. Handling properties received from the server is accomplished via a callback when the --enable-propcb
option is set. The following v5.0 specification features are supported by the wolfMQTT client:
- AUTH packet
- User properties
- Server connect ACK properties
- Format and content type for publish
- Server disconnect
- Reason codes and strings
- Maximum packet size
- Server assigned client identifier
- Subscription ID
- Topic Alias
The v5 enabled wolfMQTT client was tested with the following MQTT v5 brokers:
- Flespi
** Requires an account tied token that is regenerated hourly.
**
./examples/mqttclient/mqttclient -h "mqtt.flespi.io" -u "<your-flespi-token>"
- VerneMQ MQTTv5 preview
** Runs locally.
**
./examples/mqttclient/mqttclient -h localhost
- HiveMQ 4.0.0 EAP
** Runs locally.
**
./examples/mqttclient/mqttclient -h localhost
- Watson IoT Quickserver
**
./examples/wiot/wiot
The wolfMQTT SN Client implementation is based on the OASIS MQTT-SN v1.2 specification. The SN API is configured with the --enable-sn
option. There is a separate API for the sensor network API, which all begin with the "SN_" prefix. The wolfMQTT SN Client operates over UDP, which is distinct from the wolfMQTT clients that use TCP. The following features are supported by the wolfMQTT SN Client:
- Register
- Will topic and message set up
- Will topic and message update
- All QoS levels
- Variable-sized packet length field
Unsupported features:
- Automatic gateway discovery is not implemented
- Multiple gateway handling
The SN client was tested using the Eclipse Paho MQTT-SN Gateway (https://github.com/eclipse/paho.mqtt-sn.embedded-c) running locally and on a separate network node. Instructions for building and running the gateway are in the project README.