Next: , Previous: How to use TLS in application protocols, Up: Top


7 How to use GnuTLS in applications