diff options
author | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2013-10-27 19:52:26 +0100 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2013-10-27 19:52:26 +0100 |
commit | b8d2631717e836154ac729a50e77666fcbafa235 (patch) | |
tree | 4afccbb20a6267f29ea7c73f69dc67a303ac020e | |
parent | d9fe4440411649ac0b93eadbf15a9dd5c8a9d664 (diff) | |
download | gnutls-b8d2631717e836154ac729a50e77666fcbafa235.tar.gz |
updated
-rw-r--r-- | faq.html | 2 | ||||
-rw-r--r-- | faq.wml | 2 |
2 files changed, 2 insertions, 2 deletions
@@ -177,7 +177,7 @@ versions of GnuTLS may also allow such key usage violations (and will only outpu <h1><a href="#key-usage-violation2">"The server software I use outputs the following error: "Insufficient credentials for that request." after a client connects.</a></h1> <p><b>Answer:</b> -If the server uses X.509 certificates, most probably the server certificate doesn't allow +If the server uses an X.509 certificate with RSA keys, most probably the server certificate doesn't allow any of the ciphersuites requested by the client (this is related to <a href="#key-usage-violation">key-usage-violation</a>). There are three possibilities: <ul> @@ -53,7 +53,7 @@ versions of GnuTLS may also allow such key usage violations (and will only outpu "Insufficient credentials for that request." after a client connects.</a></h1> <p><b>Answer:</b> -If the server uses X.509 certificates, most probably the server certificate doesn't allow +If the server uses an X.509 certificate with RSA keys, most probably the server certificate doesn't allow any of the ciphersuites requested by the client (this is related to <a href="#key-usage-violation">key-usage-violation</a>). There are three possibilities: <ul> |