9 Index
A
Abstract data model
B
bitspeerauth interface (section 3.1, section 3.2)
C
Client
ExchangePublicKeys (Opnum 0) method
D
Data model - abstract
E
Encoded certificate from Windows Vista example
Events
Examples
encoded certificate from Windows Vista example
typical encoded certificate from windows vista
ExchangePublicKeys (Opnum 0) method (section 3.1.4.1, section 3.2.4.1)
F
G
I
Implementer - security considerations
Initialization
Interfaces - client
Interfaces - server
K
L
Local certificate
Local events
M
Message processing
Messages
Methods
ExchangePublicKeys (Opnum 0) (section 3.1.4.1, section 3.2.4.1)
N
O
P
Peer certificates - table
Protocol Details
R
Relationship to other protocols
S
Security
Sequencing rules
Server
ExchangePublicKeys (Opnum 0) method
T
Table of peer certificates
Timer events
Timers
Typical encoded certificate from windows vista example
Typical success scenario example
V