summaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2003-01-14 09:11:09 +0000
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2003-01-14 09:11:09 +0000
commit2439dda89480e805ee42ad1119171f100e960a7c (patch)
tree9f9d7482bb29954fd9257f5940058ffe31549534 /doc
parent8b6afb86e2ade40fe4065fe5b24a92c4d6f771c2 (diff)
downloadgnutls-2439dda89480e805ee42ad1119171f100e960a7c.tar.gz
*** empty log message ***
Diffstat (limited to 'doc')
-rw-r--r--doc/tex/appendix.tex1
-rw-r--r--doc/tex/library.tex4
-rw-r--r--doc/tex/srp.tex3
3 files changed, 1 insertions, 7 deletions
diff --git a/doc/tex/appendix.tex b/doc/tex/appendix.tex
index 01f852a431..928195d3d2 100644
--- a/doc/tex/appendix.tex
+++ b/doc/tex/appendix.tex
@@ -1,4 +1,3 @@
-\input{patents}
\chapter{Certificate to XML\index{Certificate to XML convertion} convertion functions}
diff --git a/doc/tex/library.tex b/doc/tex/library.tex
index 5ef9b58f29..ac180c4c91 100644
--- a/doc/tex/library.tex
+++ b/doc/tex/library.tex
@@ -11,9 +11,7 @@ eavesdropping, tampering, or message forgery.
Technically \gnutls{} is a portable ANSI {\bf C} based library which implements the
\tlsI{}\footnote{See section \ref{sec:tlsintro} on page \pageref{sec:tlsintro} for
a more detailed description of the protocols.} and \sslIII{} protocols.
-The library does not include any patented\footnote{See appendix \ref{ap:patents} on
-page \pageref{ap:patents}} algorithms and is available
-under the GNU Lesser GPL license\footnote{A copy of the license is included
+The library is available under the GNU Lesser GPL license\footnote{A copy of the license is included
in the distribution}.
Important features of the \gnutls{} library include:
diff --git a/doc/tex/srp.tex b/doc/tex/srp.tex
index 5f8a1f2e77..5499267c59 100644
--- a/doc/tex/srp.tex
+++ b/doc/tex/srp.tex
@@ -13,9 +13,6 @@ the user's password. This kind of protection is similar to the one used traditio
in the \emph{UNIX} ``passwd'' file, where the contents of this file did not cause
harm to the system security if they were revealed.
\par
-Before using SRP authentication, it is recommended to read \ref{ap:srppatent} on page
-\pageref{ap:srppatent}, about the patents that relate to SRP.
-
The implementation in \gnutls{} is based on paper \cite{TLSSRP}.
Available key exchange methods are shown in \hyperref{figure}{figure }{}{fig:srp}.