summaryrefslogtreecommitdiff
path: root/doc/cha-cert-auth.texi
diff options
context:
space:
mode:
Diffstat (limited to 'doc/cha-cert-auth.texi')
-rw-r--r--doc/cha-cert-auth.texi16
1 files changed, 8 insertions, 8 deletions
diff --git a/doc/cha-cert-auth.texi b/doc/cha-cert-auth.texi
index 2065badd87..52c853fec8 100644
--- a/doc/cha-cert-auth.texi
+++ b/doc/cha-cert-auth.texi
@@ -27,7 +27,7 @@ One needs to trust one or more CAs for his secure communications. In
that case only the certificates issued by the trusted authorities are
acceptable. See the figure above for a typical example. The API for
handling @acronym{X.509} certificates is described at section
-@ref{sec:x509api}. Some examples are listed below.
+@ref{sec-x509api}. Some examples are listed below.
@menu
* X.509 certificates::
@@ -125,7 +125,7 @@ private keys with the @code{gnutls_x509_privkey_t} type. All the
available functions for @acronym{X.509} certificate handling have
their prototypes in @file{gnutls/x509.h}. An example program to
demonstrate the @acronym{X.509} parsing capabilities can be found at
-section @ref{ex:x509-info}.
+section @ref{ex-x509-info}.
@node Verifying X.509 certificate paths
@subsection Verifying @acronym{X.509} Certificate Paths
@@ -208,7 +208,7 @@ Although the verification of a certificate path indicates that the
certificate is signed by trusted authority, does not reveal anything
about the peer's identity. It is required to verify if the
certificate's owner is the one you expect. For more information
-consult @xcite{RFC2818} and section @ref{ex:verify} for an example.
+consult @xcite{RFC2818} and section @ref{ex-verify} for an example.
@node PKCS #10 certificate requests
@subsection @acronym{PKCS} #10 Certificate Requests
@@ -224,7 +224,7 @@ such as PKIX's @xcite{RFC4211} are not currently supported.
In @acronym{GnuTLS} the @acronym{PKCS} #10 structures are handled
using the @code{gnutls_x509_crq_t} type. An example of a certificate
-request generation can be found at section @ref{ex:crq}.
+request generation can be found at section @ref{ex-crq}.
@node PKCS #12 structures
@subsection @acronym{PKCS} #12 Structures
@@ -242,7 +242,7 @@ keys or encrypted data. An Bag of type encrypted should be decrypted
in order for its data to be accessed.
An example of a @acronym{PKCS} #12 structure generation can be found
-at section @ref{ex:pkcs12}.
+at section @ref{ex-pkcs12}.
@node The OpenPGP trust model
@section The @acronym{OpenPGP} Trust Model
@@ -321,7 +321,7 @@ MD5. These algorithms have been broken and should not be trusted.
@node PKCS #11 tokens
@section @acronym{PKCS #11} tokens
-@anchor{sec:pkcs11}
+@anchor{sec-pkcs11}
@cindex @acronym{PKCS #11} tokens
@subsection Introduction
@@ -509,7 +509,7 @@ to a token. This can be achieved with the following functions
@subsection Using a @acronym{PKCS #11} token with TLS
It is possible to use a @acronym{PKCS #11} token to a TLS
-session, as shown in @ref{ex:pkcs11-client}. In addition
+session, as shown in @ref{ex-pkcs11-client}. In addition
the following functions can be used to load PKCS #11 key and
certificates.
@@ -524,7 +524,7 @@ certificates.
@node Abstract data types
@section Abstract data types
-@anchor{sec:abstract}
+@anchor{sec-abstract}
@cindex Abstract types
Since there are many forms of a public or private keys supported by @acronym{GnuTLS} such as