Skip to content
Bryan Hunt edited this page Feb 2, 2019 · 4 revisions

mbedTLS Integration Examples

Getting Started

  • Clone the mbedtls-examples repository and it's submodules (i.e. using the --recursive option)
  • Configure the project for your platform. On Windows and Linux this will be by running cmake. For example:
mbedtls-examples> mkdir build
mbedtls-examples> cd build
mbedtls-examples> cmake ../
  • On embedded platforms the sources will have to be included. Examples for embedded projects can be found in the boards folder.

Programs/Application Sources

There are three application "programs" that are used in order and can be considered the steps required to take a new device and use it in a final application.

  1. Configure - Is used to configure a new device with a configuration that is generally useful for TLS applications. This step is done once.
  2. Provision - Is used to write certificates into a device. This step also only needs to be done once. See Creating an Example PKI for more details on the requirements for this step.
  3. Connect - Is used to demonstrate mbedTLS integration by invoking a connection that will utilize ECDH and ECDSA operations of an ATECC508A/ATECC608A

See the sections listed above for more details on how to utilize these functions.