summaryrefslogtreecommitdiff
path: root/doc/cha-shared-key.texi
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2012-05-25 22:25:51 +0200
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2012-05-25 22:25:51 +0200
commitd869e863c32d685d7e795616db4e6e6bf4fa1d22 (patch)
tree75f85c37a5110b6792a0282981f7dcfcba30a83b /doc/cha-shared-key.texi
parentc724a415c7b33177c259ca85930690826318e80e (diff)
downloadgnutls-d869e863c32d685d7e795616db4e6e6bf4fa1d22.tar.gz
updated doc
Diffstat (limited to 'doc/cha-shared-key.texi')
-rw-r--r--doc/cha-shared-key.texi3
1 files changed, 2 insertions, 1 deletions
diff --git a/doc/cha-shared-key.texi b/doc/cha-shared-key.texi
index c9605de2b1..1d3186a6c1 100644
--- a/doc/cha-shared-key.texi
+++ b/doc/cha-shared-key.texi
@@ -132,7 +132,8 @@ with the peer. Moreover it is useful when complete anonymity is required.
Unless in one of the above cases, do not use anonymous authentication.
The available key exchange algorithms for anonymous authentication are
-shown below.
+shown below, but note that few public servers support them. They typically
+have to be explicitly enabled.
@table @code