This chapter is to give a brief description of the way GnuTLS works. The focus is to give an idea to potential developers and those who want to know what happens inside the black box.
|• The TLS Protocol:|
|• TLS Handshake Protocol:|
|• TLS Authentication Methods:|
|• TLS Extension Handling:|
|• Cryptographic Backend:|
|• Random Number Generators-internals:|
|• FIPS140-2 mode:|