summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2003-11-27 20:13:12 +0000
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2003-11-27 20:13:12 +0000
commit84d04f0b3dcc9905c9d8942b6c872a0c44850ade (patch)
tree7315f0949dffeedb6d20dff9def2a95087b3aef0
parent8edde49bd31a39521dd165af1faa4a7f61949a00 (diff)
downloadgnutls-84d04f0b3dcc9905c9d8942b6c872a0c44850ade.tar.gz
*** empty log message ***
-rw-r--r--doc/TODO2
-rw-r--r--doc/tex/preface.tex20
2 files changed, 14 insertions, 8 deletions
diff --git a/doc/TODO b/doc/TODO
index d92ff49150..1dd7b4c11c 100644
--- a/doc/TODO
+++ b/doc/TODO
@@ -9,6 +9,8 @@ Current list:
* Add gnutls_certificate_set_openpgp_key() and gnutls_certificate_set_openpgp_keyring()
functions, similar to gnutls_certificate_set_x509_key().
* Add gnutls_openpgp_key_get_key_usage().
+* Use subkeys with the 0x20 flag in openpgp keys (if present),
+ instead of the main key.
* Add support for generating and handling DSA keys
* Convert documentation to texinfo format
* Audit the code
diff --git a/doc/tex/preface.tex b/doc/tex/preface.tex
index 1c06bb5f57..9e265083d3 100644
--- a/doc/tex/preface.tex
+++ b/doc/tex/preface.tex
@@ -2,12 +2,16 @@
This document tries to demonstrate and explain the \gnutls{} library API.
A brief introduction to the protocols and the technology involved, is
-also included. This is also important for a \tls{} application programmer
-to know, because security and cryptographic protocols are involved.
-Those require the programmer
-to make correct use of these protocols, or risks to offer a false feeling
-of security, on an unsecured application.
-
-Although this document tries to be self contained, basic
-network programming and PKI knowlegde is assumed in most of this document.
+also included. That way a \tls{} application programmer can better understand
+the \gnutls{} purpose and actual offerings.
+Even if \gnutls{} is a typical library software, it operates over several
+security and cryptographic protocols, which require the programmer
+to make careful and correct usage of them. Otherwise he risks to offer
+just a false sense of security. Also note that a program should not be
+considered secure just because it uses \gnutls{} or any other cryptographic library.
+There are several ways to compromise a program or a communication line
+and \gnutls{} only helps with some of them.
+\par
+This document tries to be self contained, although basic
+network programming and PKI knowlegde is assumed in most of it.
\cite{GUTPKI} is a good introduction to Public Key Infrastructure.