summaryrefslogtreecommitdiff
path: root/doc/cha-auth.texi
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2011-08-12 10:50:19 +0200
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2011-08-12 15:20:29 +0200
commitc5444982b322a1917b477a2053845bc9fab970ad (patch)
tree59f00e0762496f15fa98cfe953d7d79344e3d55a /doc/cha-auth.texi
parentc67dcd8b833b63f26d1a34b7205d2758e0758542 (diff)
downloadgnutls-c5444982b322a1917b477a2053845bc9fab970ad.tar.gz
Documentation updates. gnutls_x509_crq_sign2() and gnutls_x509_crl_sign2() were removed from the deprecate list to ease generation of crl and crq structures.
Diffstat (limited to 'doc/cha-auth.texi')
-rw-r--r--doc/cha-auth.texi6
1 files changed, 3 insertions, 3 deletions
diff --git a/doc/cha-auth.texi b/doc/cha-auth.texi
index 1d1209a0e6..f42fba2154 100644
--- a/doc/cha-auth.texi
+++ b/doc/cha-auth.texi
@@ -45,7 +45,7 @@ we elaborate on supported authentication methods.
@acronym{X.509} certificates contain the public parameters, of a
public key algorithm, and an authority's signature, which proves the
-authenticity of the parameters. See @ref{The X.509 trust model}, for
+authenticity of the parameters. See @ref{X.509 certificates}, for
more information on @acronym{X.509} protocols.
@subsection Authentication using @acronym{OpenPGP} keys
@@ -57,7 +57,7 @@ whether a signer is trusted the key is considered trusted or not.
@acronym{GnuTLS}'s @acronym{OpenPGP} authentication implementation is
based on the @xcite{TLSPGP} proposal.
-More information on the @acronym{OpenPGP} trusted model is provided in @ref{The OpenPGP trust model}.
+More information on the @acronym{OpenPGP} trusted model is provided in @ref{OpenPGP certificates}.
For a more detailed introduction to @acronym{OpenPGP} and @acronym{GnuPG} see @xcite{GPGH}.
@subsection Using certificate authentication
@@ -111,7 +111,7 @@ has been used, to verify the certificate's signature.
An alternative way, which reports a more detailed
verification output, is to use @funcref{gnutls_certificate_get_peers} to
obtain the raw certificate of the peer and verify it using the
-functions discussed in @ref{The X.509 trust model}.
+functions discussed in @ref{X.509 certificates}.
@showfuncdesc{gnutls_certificate_verify_peers2}