|
842 | 842 | [SSL_CIPHER_get_name](https://www.openssl.org/docs/man1.1.1/man3/SSL_CIPHER_get_name.html)
|
843 | 843 | for more information.
|
844 | 844 |
|
845 |
| -### tlsSocket.getSharedSigalgs() |
846 |
| -<!-- YAML |
847 |
| -added: v12.11.0 |
848 |
| ---> |
849 |
| - |
850 |
| -* Returns: {Array} List of signature algorithms shared between the server and |
851 |
| -the client in the order of decreasing preference. |
852 |
| - |
853 |
| -See |
854 |
| -[SSL_get_shared_sigalgs](https://www.openssl.org/docs/man1.1.1/man3/SSL_get_shared_sigalgs.html) |
855 |
| -for more information. |
856 |
| - |
857 | 845 | ### tlsSocket.getEphemeralKeyInfo()
|
858 | 846 | <!-- YAML
|
859 | 847 | added: v5.0.0
|
@@ -1049,6 +1037,18 @@ See [Session Resumption][] for more information.
|
1049 | 1037 | Note: `getSession()` works only for TLSv1.2 and below. For TLSv1.3, applications
|
1050 | 1038 | must use the [`'session'`][] event (it also works for TLSv1.2 and below).
|
1051 | 1039 |
|
| 1040 | +### tlsSocket.getSharedSigalgs() |
| 1041 | +<!-- YAML |
| 1042 | +added: v12.11.0 |
| 1043 | +--> |
| 1044 | + |
| 1045 | +* Returns: {Array} List of signature algorithms shared between the server and |
| 1046 | +the client in the order of decreasing preference. |
| 1047 | + |
| 1048 | +See |
| 1049 | +[SSL_get_shared_sigalgs](https://www.openssl.org/docs/man1.1.1/man3/SSL_get_shared_sigalgs.html) |
| 1050 | +for more information. |
| 1051 | + |
1052 | 1052 | ### tlsSocket.getTLSTicket()
|
1053 | 1053 | <!-- YAML
|
1054 | 1054 | added: v0.11.4
|
@@ -1422,7 +1422,7 @@ changes:
|
1422 | 1422 | order as their private keys in `key`. If the intermediate certificates are
|
1423 | 1423 | not provided, the peer will not be able to validate the certificate, and the
|
1424 | 1424 | handshake will fail.
|
1425 |
| - * `sigalgs` {string}` Colon-separated list of supported signature algorithms. |
| 1425 | + * `sigalgs` {string} Colon-separated list of supported signature algorithms. |
1426 | 1426 | The list can contain digest algorithms (`SHA256`, `MD5` etc.), public key
|
1427 | 1427 | algorithms (`RSA-PSS`, `ECDSA` etc.), combination of both (e.g
|
1428 | 1428 | 'RSA+SHA384') or TLS v1.3 scheme names (e.g. `rsa_pss_pss_sha512`).
|
|
0 commit comments