blob: 27a840a5b6762cc67011a20713f773a345d0a4ad [file] [log] [blame]
Paul Bakker3c18a832012-01-23 09:44:43 +00001/**
Jaeden Amero25facdd2018-01-23 15:36:58 +00002 * \file doc_mainpage.h
3 *
4 * \brief Main page documentation file.
5 */
6/*
Manuel Pégourié-Gonnard8119dad2015-08-06 10:59:26 +02007 *
8 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02009 * SPDX-License-Identifier: Apache-2.0
10 *
11 * Licensed under the Apache License, Version 2.0 (the "License"); you may
12 * not use this file except in compliance with the License.
13 * You may obtain a copy of the License at
14 *
15 * http://www.apache.org/licenses/LICENSE-2.0
16 *
17 * Unless required by applicable law or agreed to in writing, software
18 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
19 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
20 * See the License for the specific language governing permissions and
21 * limitations under the License.
Manuel Pégourié-Gonnard8119dad2015-08-06 10:59:26 +020022 *
23 * This file is part of mbed TLS (https://tls.mbed.org)
Paul Bakker37ca75d2011-01-06 12:28:03 +000024 */
25
26/**
Janos Follath0435cd82020-06-26 12:26:55 +010027 * @mainpage mbed TLS v2.23.0 source code documentation
Paul Bakkerdcbfdcc2013-09-10 16:16:50 +020028 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +000029 * This documentation describes the internal structure of mbed TLS. It was
Paul Bakker37ca75d2011-01-06 12:28:03 +000030 * automatically generated from specially formatted comment blocks in
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +000031 * mbed TLS's source code using Doxygen. (See
Paul Bakker37ca75d2011-01-06 12:28:03 +000032 * http://www.stack.nl/~dimitri/doxygen/ for more information on Doxygen)
Paul Bakkerdcbfdcc2013-09-10 16:16:50 +020033 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +000034 * mbed TLS has a simple setup: it provides the ingredients for an SSL/TLS
Paul Bakkerdcbfdcc2013-09-10 16:16:50 +020035 * implementation. These ingredients are listed as modules in the
36 * \ref mainpage_modules "Modules section". This "Modules section" introduces
37 * the high-level module concepts used throughout this documentation.\n
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +000038 * Some examples of mbed TLS usage can be found in the \ref mainpage_examples
Paul Bakker37ca75d2011-01-06 12:28:03 +000039 * "Examples section".
Paul Bakkerdcbfdcc2013-09-10 16:16:50 +020040 *
Paul Bakker37ca75d2011-01-06 12:28:03 +000041 * @section mainpage_modules Modules
Paul Bakkerdcbfdcc2013-09-10 16:16:50 +020042 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +000043 * mbed TLS supports SSLv3 up to TLSv1.2 communication by providing the
Paul Bakker37ca75d2011-01-06 12:28:03 +000044 * following:
45 * - TCP/IP communication functions: listen, connect, accept, read/write.
46 * - SSL/TLS communication functions: init, handshake, read/write.
47 * - X.509 functions: CRT, CRL and key handling
48 * - Random number generation
49 * - Hashing
50 * - Encryption/decryption
51 *
Paul Bakkerdcbfdcc2013-09-10 16:16:50 +020052 * Above functions are split up neatly into logical interfaces. These can be
53 * used separately to provide any of the above functions or to mix-and-match
54 * into an SSL server/client solution that utilises a X.509 PKI. Examples of
55 * such implementations are amply provided with the source code.
56 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +000057 * Note that mbed TLS does not provide a control channel or (multiple) session
Paul Bakkerdcbfdcc2013-09-10 16:16:50 +020058 * handling without additional work from the developer.
Paul Bakker37ca75d2011-01-06 12:28:03 +000059 *
60 * @section mainpage_examples Examples
Paul Bakkerdcbfdcc2013-09-10 16:16:50 +020061 *
Paul Bakker37ca75d2011-01-06 12:28:03 +000062 * Example server setup:
63 *
Paul Bakkerdcbfdcc2013-09-10 16:16:50 +020064 * \b Prerequisites:
Paul Bakker37ca75d2011-01-06 12:28:03 +000065 * - X.509 certificate and private key
66 * - session handling functions
67 *
68 * \b Setup:
69 * - Load your certificate and your private RSA key (X.509 interface)
70 * - Setup the listening TCP socket (TCP/IP interface)
71 * - Accept incoming client connection (TCP/IP interface)
72 * - Initialise as an SSL-server (SSL/TLS interface)
73 * - Set parameters, e.g. authentication, ciphers, CA-chain, key exchange
74 * - Set callback functions RNG, IO, session handling
75 * - Perform an SSL-handshake (SSL/TLS interface)
76 * - Read/write data (SSL/TLS interface)
77 * - Close and cleanup (all interfaces)
78 *
Paul Bakker37ca75d2011-01-06 12:28:03 +000079 * Example client setup:
80 *
81 * \b Prerequisites:
82 * - X.509 certificate and private key
83 * - X.509 trusted CA certificates
84 *
85 * \b Setup:
86 * - Load the trusted CA certificates (X.509 interface)
87 * - Load your certificate and your private RSA key (X.509 interface)
88 * - Setup a TCP/IP connection (TCP/IP interface)
89 * - Initialise as an SSL-client (SSL/TLS interface)
90 * - Set parameters, e.g. authentication mode, ciphers, CA-chain, session
91 * - Set callback functions RNG, IO
92 * - Perform an SSL-handshake (SSL/TLS interface)
93 * - Verify the server certificate (SSL/TLS interface)
94 * - Write/read data (SSL/TLS interface)
95 * - Close and cleanup (all interfaces)
Paul Bakker37ca75d2011-01-06 12:28:03 +000096 */