equal
deleted
inserted
replaced
15 client interface for communication through end points known as <i>Secure Sockets</i>. |
15 client interface for communication through end points known as <i>Secure Sockets</i>. |
16 The required security protocol modules can be plugged into the Secure Sockets |
16 The required security protocol modules can be plugged into the Secure Sockets |
17 interface. </p> |
17 interface. </p> |
18 <p>The following figure shows the relationship between applications, secure |
18 <p>The following figure shows the relationship between applications, secure |
19 socket classes, and secure socket plug-ins.</p> |
19 socket classes, and secure socket plug-ins.</p> |
20 <fig id="GUID-80DE6518-CDBE-4652-9FE2-1663A1874822"><title>Relationship between applications and secure socket</title><image href="GUID-B913762A-2C87-4218-8D20-EBF88F9756DC_d0e14320_href.png"/></fig> |
20 <fig id="GUID-80DE6518-CDBE-4652-9FE2-1663A1874822"><title>Relationship between applications and secure socket</title><image href="GUID-B913762A-2C87-4218-8D20-EBF88F9756DC_d0e14434_href.png"/></fig> |
21 </conbody></concept> |
21 </conbody></concept> |