diff --git a/README.md b/README.md index e3b9773..fbb924c 100644 --- a/README.md +++ b/README.md @@ -43,7 +43,7 @@ If parsing fails, this method will throw an error, but will still ensure all dat The returned promise resolves to an object, containing: * `serverName` - The server name requested in the client hello (or undefined if SNI was not used) -* `alpnProtocols` - A array of ALPN protcol names requested in the client hello (or undefined if ALPN was not used) +* `alpnProtocols` - An array of ALPN protocol names requested in the client hello (or undefined if ALPN was not used) * `fingerprintData` - An array containing the raw components used for JA3 TLS fingerprinting: 1. The TLS version number as a Uint16 (771 for TLS 1.2+) 2. An array of cipher ids (excluding GREASE) @@ -60,4 +60,4 @@ To calculate TLS fingerprints manually, there are a few options exported from th * `getTlsFingerprintAsJa4` - Reads from a stream, just like `readTlsClientHello` above, but returns a promise for the JA4 hash string, e.g. `t13d591000_a33745022dd6_1f22a2ca17c4`, instead of the raw hello components. * `readTlsClientHello(stream)` - Reads the entire hello (see above). In the returned object, you can read the raw data components used for JA3 fingerprinting from the `fingerprintData` property. * `calculateJa3FromFingerprintData(data)` - Takes raw TLS fingerprint data, and returns the corresponding JA3 hash. -* `calculateJa4FromHelloData(data)` - Takes the full hello data, including the serverName, alpnProtocols & fingerprinting parameters returned by `readTlsClientHello`, and returns the corresponding JA4 hash, eg. `t13d591000_a33745022dd6_1f22a2ca17c4`. \ No newline at end of file +* `calculateJa4FromHelloData(data)` - Takes the full hello data, including the serverName, alpnProtocols & fingerprinting parameters returned by `readTlsClientHello`, and returns the corresponding JA4 hash, eg. `t13d591000_a33745022dd6_1f22a2ca17c4`.