Next: Upgrading from previous versions, Previous: Other included programs, Up: Top [Contents][Index]
This chapter is to give a brief description of the way GnuTLS works. The focus is to give an idea to potential developers and those who want to know what happens inside the black box.
| • The TLS Protocol: | ||
| • TLS Handshake Protocol: | ||
| • TLS Authentication Methods: | ||
| • TLS Extension Handling: | ||
| • Cryptographic Backend: |