-
Notifications
You must be signed in to change notification settings - Fork 10
Home
Bryan Hunt edited this page Feb 2, 2019
·
4 revisions
- Clone the mbedtls-examples repository and it's submodules (i.e. using the --recursive option)
- Configure the project for your platform. On Windows and Linux this will be by running cmake. For example:
mbedtls-examples> mkdir build
mbedtls-examples> cd build
mbedtls-examples> cmake ../
- On embedded platforms the sources will have to be included. Examples for embedded projects can be found in the
boards
folder.
There are three application "programs" that are used in order and can be considered the steps required to take a new device and use it in a final application.
- Configure - Is used to configure a new device with a configuration that is generally useful for TLS applications. This step is done once.
- Provision - Is used to write certificates into a device. This step also only needs to be done once. See Creating an Example PKI for more details on the requirements for this step.
- Connect - Is used to demonstrate mbedTLS integration by invoking a connection that will utilize ECDH and ECDSA operations of an ATECC508A/ATECC608A
See the sections listed above for more details on how to utilize these functions.