blob: 39b6ffa0c4f43418f04f3fb9686b3652af233ac5 [file] [log] [blame]
Paul Bakker3c18a832012-01-23 09:44:43 +00001/**
Jaeden Amero25facdd2018-01-23 15:36:58 +00002 * \file doc_mainpage.h
3 *
4 * \brief Main page documentation file.
5 */
6/*
Manuel Pégourié-Gonnard8119dad2015-08-06 10:59:26 +02007 *
8 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
Bence Szépkúti4e9f7122020-06-05 13:02:18 +02009 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
10 *
11 * This file is provided under the Apache License 2.0, or the
12 * GNU General Public License v2.0 or later.
13 *
14 * **********
15 * Apache License 2.0:
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +020016 *
17 * Licensed under the Apache License, Version 2.0 (the "License"); you may
18 * not use this file except in compliance with the License.
19 * You may obtain a copy of the License at
20 *
21 * http://www.apache.org/licenses/LICENSE-2.0
22 *
23 * Unless required by applicable law or agreed to in writing, software
24 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
25 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
26 * See the License for the specific language governing permissions and
27 * limitations under the License.
Manuel Pégourié-Gonnard8119dad2015-08-06 10:59:26 +020028 *
Bence Szépkúti4e9f7122020-06-05 13:02:18 +020029 * **********
30 *
31 * **********
32 * GNU General Public License v2.0 or later:
33 *
34 * This program is free software; you can redistribute it and/or modify
35 * it under the terms of the GNU General Public License as published by
36 * the Free Software Foundation; either version 2 of the License, or
37 * (at your option) any later version.
38 *
39 * This program is distributed in the hope that it will be useful,
40 * but WITHOUT ANY WARRANTY; without even the implied warranty of
41 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
42 * GNU General Public License for more details.
43 *
44 * You should have received a copy of the GNU General Public License along
45 * with this program; if not, write to the Free Software Foundation, Inc.,
46 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
47 *
48 * **********
49 *
Manuel Pégourié-Gonnard8119dad2015-08-06 10:59:26 +020050 * This file is part of mbed TLS (https://tls.mbed.org)
Paul Bakker37ca75d2011-01-06 12:28:03 +000051 */
52
53/**
Janos Follath2a4f8992020-06-26 12:37:57 +010054 * @mainpage mbed TLS v2.7.16 source code documentation
Paul Bakkerdcbfdcc2013-09-10 16:16:50 +020055 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +000056 * This documentation describes the internal structure of mbed TLS. It was
Paul Bakker37ca75d2011-01-06 12:28:03 +000057 * automatically generated from specially formatted comment blocks in
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +000058 * mbed TLS's source code using Doxygen. (See
Paul Bakker37ca75d2011-01-06 12:28:03 +000059 * http://www.stack.nl/~dimitri/doxygen/ for more information on Doxygen)
Paul Bakkerdcbfdcc2013-09-10 16:16:50 +020060 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +000061 * mbed TLS has a simple setup: it provides the ingredients for an SSL/TLS
Paul Bakkerdcbfdcc2013-09-10 16:16:50 +020062 * implementation. These ingredients are listed as modules in the
63 * \ref mainpage_modules "Modules section". This "Modules section" introduces
64 * the high-level module concepts used throughout this documentation.\n
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +000065 * Some examples of mbed TLS usage can be found in the \ref mainpage_examples
Paul Bakker37ca75d2011-01-06 12:28:03 +000066 * "Examples section".
Paul Bakkerdcbfdcc2013-09-10 16:16:50 +020067 *
Paul Bakker37ca75d2011-01-06 12:28:03 +000068 * @section mainpage_modules Modules
Paul Bakkerdcbfdcc2013-09-10 16:16:50 +020069 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +000070 * mbed TLS supports SSLv3 up to TLSv1.2 communication by providing the
Paul Bakker37ca75d2011-01-06 12:28:03 +000071 * following:
72 * - TCP/IP communication functions: listen, connect, accept, read/write.
73 * - SSL/TLS communication functions: init, handshake, read/write.
74 * - X.509 functions: CRT, CRL and key handling
75 * - Random number generation
76 * - Hashing
77 * - Encryption/decryption
78 *
Paul Bakkerdcbfdcc2013-09-10 16:16:50 +020079 * Above functions are split up neatly into logical interfaces. These can be
80 * used separately to provide any of the above functions or to mix-and-match
81 * into an SSL server/client solution that utilises a X.509 PKI. Examples of
82 * such implementations are amply provided with the source code.
83 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +000084 * Note that mbed TLS does not provide a control channel or (multiple) session
Paul Bakkerdcbfdcc2013-09-10 16:16:50 +020085 * handling without additional work from the developer.
Paul Bakker37ca75d2011-01-06 12:28:03 +000086 *
87 * @section mainpage_examples Examples
Paul Bakkerdcbfdcc2013-09-10 16:16:50 +020088 *
Paul Bakker37ca75d2011-01-06 12:28:03 +000089 * Example server setup:
90 *
Paul Bakkerdcbfdcc2013-09-10 16:16:50 +020091 * \b Prerequisites:
Paul Bakker37ca75d2011-01-06 12:28:03 +000092 * - X.509 certificate and private key
93 * - session handling functions
94 *
95 * \b Setup:
96 * - Load your certificate and your private RSA key (X.509 interface)
97 * - Setup the listening TCP socket (TCP/IP interface)
98 * - Accept incoming client connection (TCP/IP interface)
99 * - Initialise as an SSL-server (SSL/TLS interface)
100 * - Set parameters, e.g. authentication, ciphers, CA-chain, key exchange
101 * - Set callback functions RNG, IO, session handling
102 * - Perform an SSL-handshake (SSL/TLS interface)
103 * - Read/write data (SSL/TLS interface)
104 * - Close and cleanup (all interfaces)
105 *
Paul Bakker37ca75d2011-01-06 12:28:03 +0000106 * Example client setup:
107 *
108 * \b Prerequisites:
109 * - X.509 certificate and private key
110 * - X.509 trusted CA certificates
111 *
112 * \b Setup:
113 * - Load the trusted CA certificates (X.509 interface)
114 * - Load your certificate and your private RSA key (X.509 interface)
115 * - Setup a TCP/IP connection (TCP/IP interface)
116 * - Initialise as an SSL-client (SSL/TLS interface)
117 * - Set parameters, e.g. authentication mode, ciphers, CA-chain, session
118 * - Set callback functions RNG, IO
119 * - Perform an SSL-handshake (SSL/TLS interface)
120 * - Verify the server certificate (SSL/TLS interface)
121 * - Write/read data (SSL/TLS interface)
122 * - Close and cleanup (all interfaces)
Paul Bakker37ca75d2011-01-06 12:28:03 +0000123 */