IPSEC API
How can an application request cryptographic protection?
How can an application determine the protection level? The peer’s identity?
How are different cryptographic strengths indicated?
How is certificate selection done?
Previous slide
Next slide
Back to first slide
View graphic version