| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980 | 
							- l/**
 
-  * @file
 
-  * Main page documentation file.
 
-  */
 
- /**
 
-  * @mainpage PolarSSL v1.0.0 source code documentation
 
-  * 
 
-  * This documentation describes the internal structure of PolarSSL.  It was
 
-  * automatically generated from specially formatted comment blocks in
 
-  * PolarSSL's source code using Doxygen.  (See
 
-  * http://www.stack.nl/~dimitri/doxygen/ for more information on Doxygen)
 
-  * 
 
-  * PolarSSL has a simple setup: it provides the ingredients for an SSL/TLS 
 
-  * implementation. These ingredients are listed as modules in the 
 
-  * \ref mainpage_modules "Modules section". This "Modules section" introduces 
 
-  * the high-level module concepts used throughout this documentation.\n 
 
-  * Some examples of PolarSSL usage can be found in the \ref mainpage_examples
 
-  * "Examples section".
 
-  * 
 
-  * 
 
-  * @section mainpage_modules Modules
 
-  * 
 
-  * PolarSSL supports SSLv3 up to TLSv1.1 communication by providing the 
 
-  * following:
 
-  * - TCP/IP communication functions: listen, connect, accept, read/write.
 
-  * - SSL/TLS communication functions: init, handshake, read/write.
 
-  * - X.509 functions: CRT, CRL and key handling
 
-  * - Random number generation
 
-  * - Hashing
 
-  * - Encryption/decryption
 
-  *
 
-  * Above functions are split up neatly into logical interfaces. These can be 
 
-  * used separately to provide any of the above functions or to mix-and-match 
 
-  * into an SSL server/client solution that utilises a X.509 PKI. Examples of 
 
-  * such implementations are amply provided with the source code. Note that 
 
-  * there is also an OpenSSL wrapper provided.\n
 
-  * Note that PolarSSL does not provide a control channel or (multiple) session
 
-  * handling. 
 
-  *
 
-  * @section mainpage_examples Examples
 
-  * 
 
-  * Example server setup:
 
-  *
 
-  * \b Prerequisites: 
 
-  * - X.509 certificate and private key
 
-  * - session handling functions
 
-  *
 
-  * \b Setup:
 
-  * - Load your certificate and your private RSA key (X.509 interface)
 
-  * - Setup the listening TCP socket (TCP/IP interface)
 
-  * - Accept incoming client connection (TCP/IP interface)
 
-  * - Initialise as an SSL-server (SSL/TLS interface)
 
-  *   - Set parameters, e.g. authentication, ciphers, CA-chain, key exchange
 
-  *   - Set callback functions RNG, IO, session handling
 
-  * - Perform an SSL-handshake (SSL/TLS interface)
 
-  * - Read/write data (SSL/TLS interface)
 
-  * - Close and cleanup (all interfaces)
 
-  *
 
-  *
 
-  * Example client setup:
 
-  *
 
-  * \b Prerequisites:
 
-  * - X.509 certificate and private key
 
-  * - X.509 trusted CA certificates
 
-  *
 
-  * \b Setup:
 
-  * - Load the trusted CA certificates (X.509 interface)
 
-  * - Load your certificate and your private RSA key (X.509 interface)
 
-  * - Setup a TCP/IP connection (TCP/IP interface)
 
-  * - Initialise as an SSL-client (SSL/TLS interface)
 
-  *   - Set parameters, e.g. authentication mode, ciphers, CA-chain, session
 
-  *   - Set callback functions RNG, IO
 
-  * - Perform an SSL-handshake (SSL/TLS interface)
 
-  * - Verify the server certificate (SSL/TLS interface)
 
-  * - Write/read data (SSL/TLS interface)
 
-  * - Close and cleanup (all interfaces)
 
-  *
 
-  * 
 
-  */
 
 
  |