This chapter is to give a brief description of the way GnuTLS works. The focus is to give an idea to potential developers and those who want to know what happens inside the black box.
|• The TLS Protocol:|
|• TLS Handshake Protocol:|
|• TLS Authentication Methods:|
|• TLS Extension Handling:|
|• Cryptographic Backend:|