We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
nodejs
Learn more about funding links in repositories.
Report abuse
1 parent d14018e commit e4a5d62Copy full SHA for e4a5d62
doc/api/tls.md
@@ -173,8 +173,8 @@ low-entropy sources is not secure.
173
PSK ciphers are disabled by default, and using TLS-PSK thus requires explicitly
174
specifying a cipher suite with the `ciphers` option. The list of available
175
ciphers can be retrieved via `openssl ciphers -v 'PSK'`. All TLS 1.3
176
-ciphers are eligible for PSK but currently only those that use SHA256 digest are
177
-supported they can be retrieved via `openssl ciphers -v -s -tls1_3 -psk`.
+ciphers are eligible for PSK and can be retrieved via
+`openssl ciphers -v -s -tls1_3 -psk`.
178
179
According to the [RFC 4279][], PSK identities up to 128 bytes in length and
180
PSKs up to 64 bytes in length must be supported. As of OpenSSL 1.1.0
0 commit comments