summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2001-08-02 13:09:56 +0000
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2001-08-02 13:09:56 +0000
commitaf73a46729f6ebbb8546bf3c3125767e86c5c8ae (patch)
treeb671d54a161e8a4572c6487767e21801705c612e
parent105b47168ebd4fe32d4dde4a26fe38cc52ad865d (diff)
downloadgnutls-af73a46729f6ebbb8546bf3c3125767e86c5c8ae.tar.gz
*** empty log message ***
-rw-r--r--doc/tex/cover.tex8
-rw-r--r--doc/tex/ex3.tex8
-rw-r--r--doc/tex/gnutls.tex35
-rw-r--r--doc/tex/macros.tex2
4 files changed, 38 insertions, 15 deletions
diff --git a/doc/tex/cover.tex b/doc/tex/cover.tex
index a85dc86500..3b3bb4beef 100644
--- a/doc/tex/cover.tex
+++ b/doc/tex/cover.tex
@@ -7,10 +7,11 @@
{\Huge GNUTLS\\[.1mm]}
\HRule
\begin{flushright}
- a Transport Layer Security Library
+ a Transport Layer Security Library\\[1mm]
+ This document applies to \gnutls 0.2.0
\end{flushright}
- \vspace*{\stretch{3}}
+ \vspace*{\stretch{2}}
{\Large By Nikos Mavroyanopoulos and Fabio Fiorina\\[.1mm]}
\HRule
@@ -29,3 +30,6 @@ no Back-Cover Texts. A copy of the license is included in the
chapter entitled "GNU Free Documentation License".
\end{center}
+\setlength{\parindent}{2mm}
+
+\setlength{\parskip}{1mm}
diff --git a/doc/tex/ex3.tex b/doc/tex/ex3.tex
index e22d22f899..75c3ef9471 100644
--- a/doc/tex/ex3.tex
+++ b/doc/tex/ex3.tex
@@ -1,5 +1,13 @@
\begin{verbatim}
+#define PRINTX(x,y) if (y[0]!=0) printf(" - %s %s\n", x, y)
+#define PRINT_DN(X) PRINTX( "CN:", x509_info->X.common_name); \
+ PRINTX( "OU:", x509_info->X.organizational_unit_name); \
+ PRINTX( "O:", x509_info->X.organization); \
+ PRINTX( "L:", x509_info->X.locality_name); \
+ PRINTX( "S:", x509_info->X.state_or_province_name); \
+ PRINTX( "C:", x509_info->X.country);
+
int print_info(GNUTLS_STATE state)
{
const char *tmp;
diff --git a/doc/tex/gnutls.tex b/doc/tex/gnutls.tex
index 14f2c6f5bd..575731a95f 100644
--- a/doc/tex/gnutls.tex
+++ b/doc/tex/gnutls.tex
@@ -1,7 +1,6 @@
\documentclass{book}
\usepackage{html}
\usepackage{fancyheadings}
-\usepackage{times}
\input{macros}
@@ -20,32 +19,44 @@
\chapter{The Library}
\section{Introduction}
\par
-\gnutls is a library which implements the {\bf TLS 1.0} and {\bf SSL 3.0} protocols.
+\gnutls is a portable library which implements the {\emph TLS 1.0} and
+{\emph SSL 3.0} protocols.
TLS stands for 'Transport Layer Security' and is the sucessor of SSL\footnote{
SSL or Secure Sockets Layer is a protocol designed by Netscape. TLS 1.0 is based on
-{\bf SSL 3.0} protocol. {\bf SSL 2.0} is very old protocol which is vulnerable to several attacks. SSL 2.0 is not
-implemented in \gnutls}.
-{\bf TLS 1.0} is described is {\it RFC 2246} and is an Internet protocol,
+{\emph SSL 3.0} protocol. {\emph SSL 2.0} is a very old protocol which is vulnerable
+to several attacks. SSL 2.0 is not implemented in \gnutls}.
+{\emph TLS 1.0}\footnote{described in {\it RFC 2246}} is an Internet protocol,
defined by IETF\footnote{IETF or Internet Engineering Task Force
is a large open international community of network
designers, operators, vendors, and researchers concerned with the evolution of
the Internet architecture and the smooth operation of the Internet. It is open to any interested individual.}
-that provides confidentiality, and authentication layers.
-TLS is mostly used over {\bf TCP/IP} although this is not restrictive, you may
-use it over any reliable transport layer.
+that provides confidentiality, and authentication layers over a {reliable
+transport layer}\footnote{TLS is mostly used over {\emph TCP/IP} although this is not restrictive, you may
+use it over any reliable transport layer.}. \gnutls implements the
+above protocols in reentrant way in order to be used in multiple threads of
+execution (without the need for Critical Sections).
+
+\par
Currently \gnutls implements:
\begin{itemize}
\item the {\bf TLS 1.0} and {\bf{ SSL 3.0}} protocols, without any (US) export-controlled algorithms
\item {\bf X509} Public Key Infrastructure (with several limitations).
\item {\bf SRP} for TLS authentication.
- \item TLS {\bf Extensions}
+ \item TLS {\bf Extension mechanism}
\end{itemize}
\subsection{Confidentiality}
\par
-Confidentiality is provided by using symmetric encryption algorithms like {\bf 3DES}, {\bf AES}, or
-stream algorithms like {\bf ARCFOUR}. A symmetric encryption algorithm uses a single (secret) key
-to encrypt and decrypt data.
+Confidentiality is provided by using symmetric encryption algorithms like {\bf 3DES},
+{\bf AES\footnote{AES or Advanced Encryption Standard is actually the RIJNDAEL algorithm. This is the
+algorithm that will replace DES.}}, or
+stream algorithms like {\bf ARCFOUR\footnote{ARCFOUR is a compatible
+algorithm with RSA's RC4 algorithm.}}. A symmetric encryption algorithm uses a single (secret) key
+to encrypt and decrypt data. Block algorithms in TLS also provide protection
+against statistical analysis of the data. \gnutls makes use of this property
+thus, if you're operating in TLS 1.0 mode, a random number of blocks will be
+appended to the data. This will prevent eavesdroppers from guessing the
+actual data size.
\subsection{Authentication}
\par
diff --git a/doc/tex/macros.tex b/doc/tex/macros.tex
index 61da577f32..a29528a741 100644
--- a/doc/tex/macros.tex
+++ b/doc/tex/macros.tex
@@ -1,2 +1,2 @@
-\newcommand{\gnutls}{{\it gnuTLS} }
+\newcommand{\gnutls}{{\emph GNUTLS} }
\newcommand{\HRule}{\rule{\linewidth}{0.4mm}}