summaryrefslogtreecommitdiff
path: root/doc/cha-cert-auth.texi
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@redhat.com>2018-04-04 14:51:08 +0200
committerNikos Mavrogiannopoulos <nmav@redhat.com>2018-04-06 13:38:10 +0200
commit9f9b69de66ecbe56e61fd3fca6487f3721864a32 (patch)
tree15ab5448dbd95d57b5f6d385943a09c48f9875e6 /doc/cha-cert-auth.texi
parent77bdacf5c843bdb472a35ddc8e26225d5d803f04 (diff)
downloadgnutls-9f9b69de66ecbe56e61fd3fca6487f3721864a32.tar.gz
doc: re-organized and modernized examples
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Diffstat (limited to 'doc/cha-cert-auth.texi')
-rw-r--r--doc/cha-cert-auth.texi2
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/cha-cert-auth.texi b/doc/cha-cert-auth.texi
index 5c106da4f4..d48e1bb814 100644
--- a/doc/cha-cert-auth.texi
+++ b/doc/cha-cert-auth.texi
@@ -513,7 +513,7 @@ failure is not enough to compromise the system. For example a server compromise
may be detected using OCSP, and a CA compromise can be detected using
the trust on first use method.
Such a hybrid system with X.509 and trust on first use authentication is
-shown in @ref{Simple client example with SSH-style certificate verification}.
+shown in @ref{Client example with SSH-style certificate verification}.
See @ref{Certificate verification} on how to use the available functionality.