summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@redhat.com>2017-11-16 16:43:21 +0100
committerNikos Mavrogiannopoulos <nmav@redhat.com>2017-11-16 16:44:40 +0100
commitf299d1f2fea8da6bbff595a3eb3e64d01cc9c8ab (patch)
tree8b06205727935f28492954af48b31ec48140af0c
parent1b7e3bde043cadc380e4ff2524dbc339e1edd90f (diff)
downloadgnutls-f299d1f2fea8da6bbff595a3eb3e64d01cc9c8ab.tar.gz
doc: citations translate into references in texinfo
That makes the citations to be links in the generated html manual. Resolves: #321 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
-rw-r--r--doc/cha-bib.texi9
-rw-r--r--doc/cha-gtls-app.texi4
-rw-r--r--doc/cha-intro-tls.texi4
-rw-r--r--doc/gnutls.texi2
4 files changed, 14 insertions, 5 deletions
diff --git a/doc/cha-bib.texi b/doc/cha-bib.texi
index af316bd6f5..457187cd8c 100644
--- a/doc/cha-bib.texi
+++ b/doc/cha-bib.texi
@@ -35,6 +35,11 @@ Y. Cheng and J. Chu and S. Radhakrishnan and A. Jain, "TCP Fast Open",
December 2014, Available from
@url{http://www.ietf.org/rfc/rfc7413.txt}.
+@item @anchor{RFC7918}[RFC7918]
+A. Langley, N. Modadugu, B. Moeller, "Transport Layer Security (TLS) False Start",
+August 2016, Available from
+@url{http://www.ietf.org/rfc/rfc7918.txt}.
+
@item @anchor{RFC6125}[RFC6125]
Peter Saint-Andre and Jeff Hodges, "Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)",
March 2011, Available from
@@ -234,6 +239,10 @@ at @url{http://www.ecrypt.eu.org/documents/D.SPA.13.pdf}.
N. Williams, "On the Use of Channel Bindings to Secure Channels",
November 2007, available from @url{http://www.ietf.org/rfc/rfc5056}.
+@item @anchor{RFC5764}[RFC5764]
+D. McGrew, E. Rescorla, "Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP)On the Use of Channel Bindings to Secure Channels",
+May 2010, available from @url{http://www.ietf.org/rfc/rfc5764}.
+
@item @anchor{RFC5929}[RFC5929]
J. Altman, N. Williams, L. Zhu, "Channel Bindings for TLS", July 2010,
available from @url{http://www.ietf.org/rfc/rfc5929}.
diff --git a/doc/cha-gtls-app.texi b/doc/cha-gtls-app.texi
index dd336120e0..3dda329e7a 100644
--- a/doc/cha-gtls-app.texi
+++ b/doc/cha-gtls-app.texi
@@ -129,7 +129,7 @@ See @ref{Error codes}, for a description of the available error codes.
All strings that are to provided as input to @acronym{GnuTLS} functions
should be in UTF-8 unless otherwise specified. Output strings are also
in UTF-8 format unless otherwise specified. When functions take as input
-passwords, they will normalize them using @xcite{rfc7613} rules (since
+passwords, they will normalize them using @xcite{RFC7613} rules (since
GnuTLS 3.5.7).
When data of a fixed size are provided to @acronym{GnuTLS} functions then
@@ -1303,7 +1303,7 @@ to be causing issues with a commonly used firewall (see the %DUMBFW option).
@item %DUMBFW @tab
will add a private extension with bogus data that make the client
hello exceed 512 bytes. This avoids a black hole behavior in some
-firewalls. This is the @xcite{rfc7685} client hello padding extension, also enabled
+firewalls. This is the @xcite{RFC7685} client hello padding extension, also enabled
with %COMPAT.
@item %NO_EXTENSIONS @tab
diff --git a/doc/cha-intro-tls.texi b/doc/cha-intro-tls.texi
index 3f1ea66126..2ac7404735 100644
--- a/doc/cha-intro-tls.texi
+++ b/doc/cha-intro-tls.texi
@@ -636,7 +636,7 @@ Other helper functions are listed below.
@cindex False Start
@cindex TLS False Start
-The TLS protocol was extended in @xcite{draft-ietf-tls-falsestart-01} to allow the client
+The TLS protocol was extended in @xcite{RFC7918} to allow the client
to send data to server in a single round trip. This change however operates on the borderline
of the TLS protocol security guarrantees and should be used for the cases where the reduced
latency outperforms the risk of an adversary intercepting the transferred data. In GnuTLS
@@ -657,7 +657,7 @@ whitelisted for false start or on insufficient key sizes, the handshake
process will complete properly (i.e., no early return). To verify that false start was used you
may use @funcref{gnutls_session_get_flags} and check for the @acronym{GNUTLS_SFLAGS_FALSE_START}
flag. For GnuTLS the false start is whitelisted for the following
-key exchange methods (see @xcite{draft-ietf-tls-falsestart-01} for rationale)
+key exchange methods (see @xcite{RFC7918} for rationale)
@itemize
@item DHE
@item ECDHE
diff --git a/doc/gnutls.texi b/doc/gnutls.texi
index e7359c599b..a1c2c4c3a1 100644
--- a/doc/gnutls.texi
+++ b/doc/gnutls.texi
@@ -63,7 +63,7 @@ Documentation License''.
@end macro
@macro xcite{ref}
-[@emph{\ref\}]
+[@ref{\ref\}]
@end macro
@macro funcref{ref}