diff options
author | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2017-11-16 16:43:21 +0100 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2017-11-16 16:44:40 +0100 |
commit | f299d1f2fea8da6bbff595a3eb3e64d01cc9c8ab (patch) | |
tree | 8b06205727935f28492954af48b31ec48140af0c /doc | |
parent | 1b7e3bde043cadc380e4ff2524dbc339e1edd90f (diff) | |
download | gnutls-f299d1f2fea8da6bbff595a3eb3e64d01cc9c8ab.tar.gz |
doc: citations translate into references in texinfo
That makes the citations to be links in the generated html manual.
Resolves: #321
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Diffstat (limited to 'doc')
-rw-r--r-- | doc/cha-bib.texi | 9 | ||||
-rw-r--r-- | doc/cha-gtls-app.texi | 4 | ||||
-rw-r--r-- | doc/cha-intro-tls.texi | 4 | ||||
-rw-r--r-- | doc/gnutls.texi | 2 |
4 files changed, 14 insertions, 5 deletions
diff --git a/doc/cha-bib.texi b/doc/cha-bib.texi index af316bd6f5..457187cd8c 100644 --- a/doc/cha-bib.texi +++ b/doc/cha-bib.texi @@ -35,6 +35,11 @@ Y. Cheng and J. Chu and S. Radhakrishnan and A. Jain, "TCP Fast Open", December 2014, Available from @url{http://www.ietf.org/rfc/rfc7413.txt}. +@item @anchor{RFC7918}[RFC7918] +A. Langley, N. Modadugu, B. Moeller, "Transport Layer Security (TLS) False Start", +August 2016, Available from +@url{http://www.ietf.org/rfc/rfc7918.txt}. + @item @anchor{RFC6125}[RFC6125] Peter Saint-Andre and Jeff Hodges, "Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)", March 2011, Available from @@ -234,6 +239,10 @@ at @url{http://www.ecrypt.eu.org/documents/D.SPA.13.pdf}. N. Williams, "On the Use of Channel Bindings to Secure Channels", November 2007, available from @url{http://www.ietf.org/rfc/rfc5056}. +@item @anchor{RFC5764}[RFC5764] +D. McGrew, E. Rescorla, "Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP)On the Use of Channel Bindings to Secure Channels", +May 2010, available from @url{http://www.ietf.org/rfc/rfc5764}. + @item @anchor{RFC5929}[RFC5929] J. Altman, N. Williams, L. Zhu, "Channel Bindings for TLS", July 2010, available from @url{http://www.ietf.org/rfc/rfc5929}. diff --git a/doc/cha-gtls-app.texi b/doc/cha-gtls-app.texi index dd336120e0..3dda329e7a 100644 --- a/doc/cha-gtls-app.texi +++ b/doc/cha-gtls-app.texi @@ -129,7 +129,7 @@ See @ref{Error codes}, for a description of the available error codes. All strings that are to provided as input to @acronym{GnuTLS} functions should be in UTF-8 unless otherwise specified. Output strings are also in UTF-8 format unless otherwise specified. When functions take as input -passwords, they will normalize them using @xcite{rfc7613} rules (since +passwords, they will normalize them using @xcite{RFC7613} rules (since GnuTLS 3.5.7). When data of a fixed size are provided to @acronym{GnuTLS} functions then @@ -1303,7 +1303,7 @@ to be causing issues with a commonly used firewall (see the %DUMBFW option). @item %DUMBFW @tab will add a private extension with bogus data that make the client hello exceed 512 bytes. This avoids a black hole behavior in some -firewalls. This is the @xcite{rfc7685} client hello padding extension, also enabled +firewalls. This is the @xcite{RFC7685} client hello padding extension, also enabled with %COMPAT. @item %NO_EXTENSIONS @tab diff --git a/doc/cha-intro-tls.texi b/doc/cha-intro-tls.texi index 3f1ea66126..2ac7404735 100644 --- a/doc/cha-intro-tls.texi +++ b/doc/cha-intro-tls.texi @@ -636,7 +636,7 @@ Other helper functions are listed below. @cindex False Start @cindex TLS False Start -The TLS protocol was extended in @xcite{draft-ietf-tls-falsestart-01} to allow the client +The TLS protocol was extended in @xcite{RFC7918} to allow the client to send data to server in a single round trip. This change however operates on the borderline of the TLS protocol security guarrantees and should be used for the cases where the reduced latency outperforms the risk of an adversary intercepting the transferred data. In GnuTLS @@ -657,7 +657,7 @@ whitelisted for false start or on insufficient key sizes, the handshake process will complete properly (i.e., no early return). To verify that false start was used you may use @funcref{gnutls_session_get_flags} and check for the @acronym{GNUTLS_SFLAGS_FALSE_START} flag. For GnuTLS the false start is whitelisted for the following -key exchange methods (see @xcite{draft-ietf-tls-falsestart-01} for rationale) +key exchange methods (see @xcite{RFC7918} for rationale) @itemize @item DHE @item ECDHE diff --git a/doc/gnutls.texi b/doc/gnutls.texi index e7359c599b..a1c2c4c3a1 100644 --- a/doc/gnutls.texi +++ b/doc/gnutls.texi @@ -63,7 +63,7 @@ Documentation License''. @end macro @macro xcite{ref} -[@emph{\ref\}] +[@ref{\ref\}] @end macro @macro funcref{ref} |