Next: Upgrading from previous versions, Previous: Other included programs, Up: Top [Contents][Index]
This chapter is to give a brief description of the way GnuTLS works. The focus is to give an idea to potential developers and those who want to know what happens inside the black box.
• The TLS Protocol | ||
• TLS Handshake Protocol | ||
• TLS Authentication Methods | ||
• TLS Hello Extension Handling | ||
• Cryptographic Backend | ||
• Random Number Generators-internals | ||
• FIPS140-2 mode |