Alternatively, you might find that you do need to come up with your own protocol. For those cases, we do document the SSL cryptographic API.
Using available SSL API you can apply your own protocol (ie. how an algorithm is applied to get the necessary security). eg. How key is exchanged and how such information is cahed etc.
Share this highlighthttp://www.safaribooksonline.com/a/network-security-with/14507595/