You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Passes the list down to SSL_CTX_set1_sigalgs_list.
Option to get the list of shared signature algorithms
from a TLS socket added as well for testing.
Signed-off-by: Anton Gerasimov <[email protected]>
PR-URL: #29598
Reviewed-By: Sam Roberts <[email protected]>
Reviewed-By: Ben Noordhuis <[email protected]>
Reviewed-By: Anna Henningsen <[email protected]>
order as their private keys in `key`. If the intermediate certificates are
1407
1423
not provided, the peer will not be able to validate the certificate, and the
1408
1424
handshake will fail.
1425
+
*`sigalgs` {string}` Colon-separated list of supported signature algorithms.
1426
+
The list can contain digest algorithms (`SHA256`, `MD5` etc.), public key
1427
+
algorithms (`RSA-PSS`, `ECDSA` etc.), combination of both (e.g
1428
+
'RSA+SHA384') or TLS v1.3 scheme names (e.g. `rsa_pss_pss_sha512`).
1429
+
See [OpenSSL man pages](https://www.openssl.org/docs/man1.1.1/man3/SSL_CTX_set1_sigalgs_list.html)
1430
+
for more info.
1409
1431
*`ciphers` {string} Cipher suite specification, replacing the default. For
1410
1432
more information, see [modifying the default cipher suite][]. Permitted
1411
1433
ciphers can be obtained via [`tls.getCiphers()`][]. Cipher names must be
0 commit comments