Next: How to use GnuTLS in applications, Previous: More on certificate authentication, Up: Top
This chapter is intended to provide some hints on how to use the TLS over simple custom made application protocols. The discussion below mainly refers to the TCP/IP transport layer but may be extended to other ones too.