Previous:
Selecting cryptographic key sizes
, Up:
How to use
GnuTLS
in applications
[
Contents
][
Index
]
6.12 Advanced topics
¶
Virtual hosts and credentials
Session resumption
Certificate verification
TLS 1.2 re-authentication
TLS 1.3 re-authentication and re-key
Parameter generation
Deriving keys for other applications/protocols
Channel bindings
Interoperability
Compatibility with the OpenSSL library