Next: Upgrading from previous versions, Previous: Other included programs, Up: Top [Contents][Index]
This chapter is to give a brief description of the way GnuTLS works. The focus is to give an idea to potential developers and those who want to know what happens inside the black box.
| • The TLS Protocol | ||
| • TLS Handshake Protocol | ||
| • TLS Authentication Methods | ||
| • TLS Hello Extension Handling | ||
| • Cryptographic Backend | ||
| • Random Number Generators-internals | ||
| • FIPS140-2 mode |