Next: , Up: Internal architecture of GnuTLS   [Contents][Index]

10.1 The TLS Protocol

The main use case for the TLS protocol is shown in Figure 10.1. A user of a library implementing the protocol expects no less than this functionality, i.e., to be able to set parameters such as the accepted security level, perform a negotiation with the peer and be able to exchange data.


Figure 10.1: TLS protocol use case.