Previous:
Selecting cryptographic key sizes
, Up:
How to use GnuTLS in applications
[
Contents
][
Index
]
6.12 Advanced topics
•
Virtual hosts and credentials
•
Session resumption
•
Certificate verification
•
TLS 1.2 re-authentication
•
TLS 1.3 re-authentication and re-key
•
Parameter generation
•
Deriving keys for other applications/protocols
•
Channel Bindings
•
Interoperability
•
Compatibility with the OpenSSL library