Next: TLS Handshake Protocol, Up: Internal architecture of GnuTLS [Contents][Index]
The main use case for the TLS protocol is shown in Figure 10.1. A user of a library implementing the protocol expects no less than this functionality, i.e., to be able to set parameters such as the accepted security level, perform a negotiation with the peer and be able to exchange data.