diff options
author | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2018-04-04 14:51:08 +0200 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2018-04-06 13:38:10 +0200 |
commit | 9f9b69de66ecbe56e61fd3fca6487f3721864a32 (patch) | |
tree | 15ab5448dbd95d57b5f6d385943a09c48f9875e6 /doc/cha-cert-auth.texi | |
parent | 77bdacf5c843bdb472a35ddc8e26225d5d803f04 (diff) | |
download | gnutls-9f9b69de66ecbe56e61fd3fca6487f3721864a32.tar.gz |
doc: re-organized and modernized examples
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Diffstat (limited to 'doc/cha-cert-auth.texi')
-rw-r--r-- | doc/cha-cert-auth.texi | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/cha-cert-auth.texi b/doc/cha-cert-auth.texi index 5c106da4f4..d48e1bb814 100644 --- a/doc/cha-cert-auth.texi +++ b/doc/cha-cert-auth.texi @@ -513,7 +513,7 @@ failure is not enough to compromise the system. For example a server compromise may be detected using OCSP, and a CA compromise can be detected using the trust on first use method. Such a hybrid system with X.509 and trust on first use authentication is -shown in @ref{Simple client example with SSH-style certificate verification}. +shown in @ref{Client example with SSH-style certificate verification}. See @ref{Certificate verification} on how to use the available functionality. |