1 This is gnutls.info, produced by makeinfo version 4.13.90 from
4 This manual is last updated 6 January 2012 for version 2.12.20 of
7 Copyright (C) 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010
8 Free Software Foundation, Inc.
10 Permission is granted to copy, distribute and/or modify this
11 document under the terms of the GNU Free Documentation License,
12 Version 1.3 or any later version published by the Free Software
13 Foundation; with no Invariant Sections, no Front-Cover Texts, and
14 no Back-Cover Texts. A copy of the license is included in the
15 section entitled "GNU Free Documentation License".
16 INFO-DIR-SECTION Software libraries
18 * GnuTLS: (gnutls). GNU Transport Layer Security Library.
21 INFO-DIR-SECTION System Administration
23 * certtool: (gnutls)Invoking certtool. Manipulate certificates and keys.
24 * gnutls-serv: (gnutls)Invoking gnutls-serv. GnuTLS test server.
25 * gnutls-cli: (gnutls)Invoking gnutls-cli. GnuTLS test client.
26 * gnutls-cli-debug: (gnutls)Invoking gnutls-cli-debug. GnuTLS debug client.
27 * psktool: (gnutls)Invoking psktool. Simple TLS-Pre-Shared-Keys manager.
28 * srptool: (gnutls)Invoking srptool. Simple SRP password tool.
32 File: gnutls.info, Node: Concept Index, Next: Function and Data Index, Prev: Function and Data Index, Up: Top
40 * Abstract types: Abstract data types. (line 6)
41 * Alert protocol: The TLS Alert Protocol.
43 * Anonymous authentication: Anonymous authentication.
45 * Bad record MAC: On Record Padding. (line 6)
46 * Callback functions: Callback functions. (line 6)
47 * Certificate authentication: More on certificate authentication.
49 * Certificate requests: PKCS #10 certificate requests.
51 * certtool: Invoking certtool. (line 6)
52 * Channel Bindings: Channel Bindings. (line 6)
53 * Ciphersuites: All the supported ciphersuites in GnuTLS.
55 * Client Certificate authentication: Client Authentication.
57 * Compression algorithms: Compression algorithms used in the record layer.
59 * constant: Enumerates and Constants.
61 * Contributing: Contributing. (line 6)
62 * debug server: Invoking gnutls-serv. (line 61)
63 * Digital signatures: Digital signatures. (line 6)
64 * Download: Downloading and Installing.
66 * enumerate: Enumerates and Constants.
68 * Error codes: Error codes and descriptions.
70 * errors: Exception Handling. (line 6)
71 * Example programs: How to use GnuTLS in applications.
73 * exceptions: Exception Handling. (line 6)
74 * Exporting Keying Material: Keying Material Exporters.
76 * FDL, GNU Free Documentation License: GNU Free Documentation License.
78 * Function reference: Function reference. (line 6)
79 * generating parameters: Parameter generation. (line 6)
80 * gnutls-cli: Invoking gnutls-cli. (line 6)
81 * gnutls-cli-debug: Invoking gnutls-cli-debug.
83 * 'gnutls-error': Exception Handling. (line 6)
84 * GnuTLS-extra functions: GnuTLS-extra functions.
86 * gnutls-serv: Invoking gnutls-serv. (line 6)
87 * GPL, GNU General Public License: GNU GPL. (line 6)
88 * Hacking: Contributing. (line 6)
89 * Handshake protocol: The TLS Handshake Protocol.
91 * homogeneous vector: Representation of Binary Data.
93 * HTTPS server: Invoking gnutls-serv. (line 61)
94 * Inner Application (TLS/IA) functions: TLS Inner Application (TLS/IA) functions.
96 * Installation: Downloading and Installing.
98 * Internal architecture: Internal architecture of GnuTLS.
100 * key sizes: Selecting cryptographic key sizes.
102 * Keying Material Exporters: Keying Material Exporters.
104 * LGPL, GNU Lesser General Public License: GNU LGPL. (line 6)
105 * License, GNU GPL: GNU GPL. (line 6)
106 * License, GNU LGPL: GNU LGPL. (line 6)
107 * Maximum fragment length: TLS Extensions. (line 20)
108 * Netconf: Example client PSK connection.
110 * OpenPGP functions: OpenPGP functions. (line 6)
111 * OpenPGP Keys: Certificate authentication.
113 * OpenPGP Keys <1>: The OpenPGP trust model.
115 * OpenPGP Server: Echo Server with OpenPGP authentication.
117 * OpenSSL: Compatibility with the OpenSSL library.
119 * p11tool: Invoking p11tool. (line 6)
120 * parameter generation: Parameter generation. (line 6)
121 * PCT: On SSL 2 and older protocols.
123 * PKCS #10: PKCS #10 certificate requests.
125 * PKCS #11 tokens: PKCS #11 tokens. (line 5)
126 * PKCS #12: PKCS #12 structures. (line 6)
127 * PSK authentication: Authentication using PSK.
129 * PSK client: Example client PSK connection.
131 * PSK server: Example server PSK connection.
133 * psktool: Invoking psktool. (line 6)
134 * Record padding: On Record Padding. (line 6)
135 * Record protocol: The TLS record protocol.
137 * renegotiation: TLS Extensions. (line 59)
138 * Reporting Bugs: Bug Reports. (line 6)
139 * Resuming sessions: Resuming Sessions. (line 6)
140 * Server name indication: TLS Extensions. (line 29)
141 * Session Tickets: TLS Extensions. (line 43)
142 * SRFI-4: Representation of Binary Data.
144 * SRP authentication: Authentication using SRP.
146 * srptool: Invoking srptool. (line 6)
147 * SSL 2: On SSL 2 and older protocols.
149 * Symmetric encryption algorithms: Encryption algorithms used in the record layer.
151 * Ticket: TLS Extensions. (line 43)
152 * TLS Extensions: TLS Extensions. (line 6)
153 * TLS Extensions <1>: TLS Extensions. (line 20)
154 * TLS Extensions <2>: TLS Extensions. (line 29)
155 * TLS Extensions <3>: TLS Extensions. (line 43)
156 * TLS Inner Application (TLS/IA) functions: TLS Inner Application (TLS/IA) functions.
158 * TLS Layers: TLS layers. (line 6)
159 * Transport protocol: The transport layer. (line 6)
160 * Verifying certificate paths: Verifying X.509 certificate paths.
162 * X.509 certificates: Certificate authentication.
164 * X.509 certificates <1>: The X.509 trust model.
166 * X.509 Functions: X.509 certificate functions.