This chapter is to give a brief description of the way GnuTLS works. The focus is to give an idea to potential developers and those who want to know what happens inside the black box.
|• The TLS Protocol|
|• TLS Handshake Protocol|
|• TLS Authentication Methods|
|• TLS Hello Extension Handling|
|• Cryptographic Backend|
|• Random Number Generators-internals|
|• FIPS140-2 mode|