summaryrefslogtreecommitdiff
path: root/faq.html
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2013-10-27 19:52:26 +0100
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2013-10-27 19:52:26 +0100
commitb8d2631717e836154ac729a50e77666fcbafa235 (patch)
tree4afccbb20a6267f29ea7c73f69dc67a303ac020e /faq.html
parentd9fe4440411649ac0b93eadbf15a9dd5c8a9d664 (diff)
downloadgnutls-b8d2631717e836154ac729a50e77666fcbafa235.tar.gz
updated
Diffstat (limited to 'faq.html')
-rw-r--r--faq.html2
1 files changed, 1 insertions, 1 deletions
diff --git a/faq.html b/faq.html
index 1ffd8d503b..c173a13b1b 100644
--- a/faq.html
+++ b/faq.html
@@ -177,7 +177,7 @@ versions of GnuTLS may also allow such key usage violations (and will only outpu
<h1><a href="#key-usage-violation2">"The server software I use outputs the following error:
"Insufficient credentials for that request." after a client connects.</a></h1>
<p><b>Answer:</b>
-If the server uses X.509 certificates, most probably the server certificate doesn't allow
+If the server uses an X.509 certificate with RSA keys, most probably the server certificate doesn't allow
any of the ciphersuites requested by the client (this is related to <a href="#key-usage-violation">key-usage-violation</a>).
There are three possibilities:
<ul>