1 \input texinfo @c -*-texinfo-*-
2 @comment %**start of header
3 @setfilename gnutls.info
5 @settitle GnuTLS @value{VERSION}
7 @c don't indent the paragraphs.
10 @c Unify some of the indices.
14 @comment %**end of header
17 This manual is last updated @value{UPDATED} for version
18 @value{VERSION} of GnuTLS.
20 Copyright @copyright{} 2001-2012 Free Software Foundation, Inc.
23 Permission is granted to copy, distribute and/or modify this document
24 under the terms of the GNU Free Documentation License, Version 1.3 or
25 any later version published by the Free Software Foundation; with no
26 Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A
27 copy of the license is included in the section entitled ``GNU Free
28 Documentation License''.
32 @dircategory Software libraries
34 * GnuTLS: (gnutls). GNU Transport Layer Security Library.
37 @dircategory System Administration
39 * certtool: (gnutls)Invoking certtool. Manipulate certificates and keys.
40 * gnutls-serv: (gnutls)Invoking gnutls-serv. GnuTLS test server.
41 * gnutls-cli: (gnutls)Invoking gnutls-cli. GnuTLS test client.
42 * gnutls-cli-debug: (gnutls)Invoking gnutls-cli-debug. GnuTLS debug client.
43 * psktool: (gnutls)Invoking psktool. Simple TLS-Pre-Shared-Keys manager.
44 * srptool: (gnutls)Invoking srptool. Simple SRP password tool.
49 @subtitle Transport Layer Security Library for the GNU system
50 @subtitle for version @value{VERSION}, @value{UPDATED}
52 @center @image{gnutls-logo,6cm,6cm}
53 @author Nikos Mavrogiannopoulos
54 @author Simon Josefsson (@email{bug-gnutls@@gnu.org})
56 @vskip 0pt plus 1filll
60 @c reference to an internal function.
73 @macro funcintref{ref}
83 @macro showfuncB{ref1,ref2}
90 @macro showfuncC{ref1,ref2,ref3}
98 @macro showfuncD{ref1,ref2,ref3,ref4}
107 @macro showfuncE{ref1,ref2,ref3,ref4,ref5}
117 @macro showfuncF{ref1,ref2,ref3,ref4,ref5,ref6}
128 @macro showfuncdesc{ref}
134 @macro showenumdesc{ref,cap}
152 * Introduction to GnuTLS::
153 * Introduction to TLS::
154 * Certificate authentication::
155 * Shared-key and anonymous authentication::
156 * More on certificate authentication::
157 * How to use GnuTLS in applications::
158 * GnuTLS application examples::
159 * Other included programs::
160 * Internal architecture of GnuTLS::
163 * Supported ciphersuites::
165 * Copying Information::
167 * Function and Data Index::
172 @include cha-preface.texi
174 @include cha-library.texi
176 @include cha-intro-tls.texi
178 @include cha-cert-auth.texi
180 @include cha-shared-key.texi
182 @include cha-cert-auth2.texi
184 @include cha-gtls-app.texi
186 @include cha-gtls-examples.texi
188 @include cha-programs.texi
190 @include cha-internals.texi
194 @include cha-support.texi
196 @include cha-errors.texi
198 @include cha-ciphersuites.texi
200 @include cha-functions.texi
202 @include cha-copying.texi
204 @include cha-bib.texi
206 @node Function and Data Index
207 @unnumbered Function and Data Index
212 @unnumbered Concept Index