diff options
author | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2011-08-12 10:50:19 +0200 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2011-08-12 15:20:29 +0200 |
commit | c5444982b322a1917b477a2053845bc9fab970ad (patch) | |
tree | 59f00e0762496f15fa98cfe953d7d79344e3d55a /doc/cha-auth.texi | |
parent | c67dcd8b833b63f26d1a34b7205d2758e0758542 (diff) | |
download | gnutls-c5444982b322a1917b477a2053845bc9fab970ad.tar.gz |
Documentation updates. gnutls_x509_crq_sign2() and gnutls_x509_crl_sign2() were removed from the deprecate list to ease generation of crl and crq structures.
Diffstat (limited to 'doc/cha-auth.texi')
-rw-r--r-- | doc/cha-auth.texi | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/doc/cha-auth.texi b/doc/cha-auth.texi index 1d1209a0e6..f42fba2154 100644 --- a/doc/cha-auth.texi +++ b/doc/cha-auth.texi @@ -45,7 +45,7 @@ we elaborate on supported authentication methods. @acronym{X.509} certificates contain the public parameters, of a public key algorithm, and an authority's signature, which proves the -authenticity of the parameters. See @ref{The X.509 trust model}, for +authenticity of the parameters. See @ref{X.509 certificates}, for more information on @acronym{X.509} protocols. @subsection Authentication using @acronym{OpenPGP} keys @@ -57,7 +57,7 @@ whether a signer is trusted the key is considered trusted or not. @acronym{GnuTLS}'s @acronym{OpenPGP} authentication implementation is based on the @xcite{TLSPGP} proposal. -More information on the @acronym{OpenPGP} trusted model is provided in @ref{The OpenPGP trust model}. +More information on the @acronym{OpenPGP} trusted model is provided in @ref{OpenPGP certificates}. For a more detailed introduction to @acronym{OpenPGP} and @acronym{GnuPG} see @xcite{GPGH}. @subsection Using certificate authentication @@ -111,7 +111,7 @@ has been used, to verify the certificate's signature. An alternative way, which reports a more detailed verification output, is to use @funcref{gnutls_certificate_get_peers} to obtain the raw certificate of the peer and verify it using the -functions discussed in @ref{The X.509 trust model}. +functions discussed in @ref{X.509 certificates}. @showfuncdesc{gnutls_certificate_verify_peers2} |