doc_mainpage.h 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122
  1. /**
  2. * \file doc_mainpage.h
  3. *
  4. * \brief Main page documentation file.
  5. */
  6. /*
  7. *
  8. * Copyright The Mbed TLS Contributors
  9. * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
  10. *
  11. * This file is provided under the Apache License 2.0, or the
  12. * GNU General Public License v2.0 or later.
  13. *
  14. * **********
  15. * Apache License 2.0:
  16. *
  17. * Licensed under the Apache License, Version 2.0 (the "License"); you may
  18. * not use this file except in compliance with the License.
  19. * You may obtain a copy of the License at
  20. *
  21. * http://www.apache.org/licenses/LICENSE-2.0
  22. *
  23. * Unless required by applicable law or agreed to in writing, software
  24. * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
  25. * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  26. * See the License for the specific language governing permissions and
  27. * limitations under the License.
  28. *
  29. * **********
  30. *
  31. * **********
  32. * GNU General Public License v2.0 or later:
  33. *
  34. * This program is free software; you can redistribute it and/or modify
  35. * it under the terms of the GNU General Public License as published by
  36. * the Free Software Foundation; either version 2 of the License, or
  37. * (at your option) any later version.
  38. *
  39. * This program is distributed in the hope that it will be useful,
  40. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  41. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  42. * GNU General Public License for more details.
  43. *
  44. * You should have received a copy of the GNU General Public License along
  45. * with this program; if not, write to the Free Software Foundation, Inc.,
  46. * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  47. *
  48. * **********
  49. */
  50. /**
  51. * @mainpage mbed TLS v2.16.10 source code documentation
  52. *
  53. * This documentation describes the internal structure of mbed TLS. It was
  54. * automatically generated from specially formatted comment blocks in
  55. * mbed TLS's source code using Doxygen. (See
  56. * http://www.stack.nl/~dimitri/doxygen/ for more information on Doxygen)
  57. *
  58. * mbed TLS has a simple setup: it provides the ingredients for an SSL/TLS
  59. * implementation. These ingredients are listed as modules in the
  60. * \ref mainpage_modules "Modules section". This "Modules section" introduces
  61. * the high-level module concepts used throughout this documentation.\n
  62. * Some examples of mbed TLS usage can be found in the \ref mainpage_examples
  63. * "Examples section".
  64. *
  65. * @section mainpage_modules Modules
  66. *
  67. * mbed TLS supports SSLv3 up to TLSv1.2 communication by providing the
  68. * following:
  69. * - TCP/IP communication functions: listen, connect, accept, read/write.
  70. * - SSL/TLS communication functions: init, handshake, read/write.
  71. * - X.509 functions: CRT, CRL and key handling
  72. * - Random number generation
  73. * - Hashing
  74. * - Encryption/decryption
  75. *
  76. * Above functions are split up neatly into logical interfaces. These can be
  77. * used separately to provide any of the above functions or to mix-and-match
  78. * into an SSL server/client solution that utilises a X.509 PKI. Examples of
  79. * such implementations are amply provided with the source code.
  80. *
  81. * Note that mbed TLS does not provide a control channel or (multiple) session
  82. * handling without additional work from the developer.
  83. *
  84. * @section mainpage_examples Examples
  85. *
  86. * Example server setup:
  87. *
  88. * \b Prerequisites:
  89. * - X.509 certificate and private key
  90. * - session handling functions
  91. *
  92. * \b Setup:
  93. * - Load your certificate and your private RSA key (X.509 interface)
  94. * - Setup the listening TCP socket (TCP/IP interface)
  95. * - Accept incoming client connection (TCP/IP interface)
  96. * - Initialise as an SSL-server (SSL/TLS interface)
  97. * - Set parameters, e.g. authentication, ciphers, CA-chain, key exchange
  98. * - Set callback functions RNG, IO, session handling
  99. * - Perform an SSL-handshake (SSL/TLS interface)
  100. * - Read/write data (SSL/TLS interface)
  101. * - Close and cleanup (all interfaces)
  102. *
  103. * Example client setup:
  104. *
  105. * \b Prerequisites:
  106. * - X.509 certificate and private key
  107. * - X.509 trusted CA certificates
  108. *
  109. * \b Setup:
  110. * - Load the trusted CA certificates (X.509 interface)
  111. * - Load your certificate and your private RSA key (X.509 interface)
  112. * - Setup a TCP/IP connection (TCP/IP interface)
  113. * - Initialise as an SSL-client (SSL/TLS interface)
  114. * - Set parameters, e.g. authentication mode, ciphers, CA-chain, session
  115. * - Set callback functions RNG, IO
  116. * - Perform an SSL-handshake (SSL/TLS interface)
  117. * - Verify the server certificate (SSL/TLS interface)
  118. * - Write/read data (SSL/TLS interface)
  119. * - Close and cleanup (all interfaces)
  120. */