Lines Matching refs:options
90 } = require('internal/options');
107 const kConnectOptions = Symbol('connect-options');
525 validateBoolean(enableTrace, 'options.enableTrace');
679 const options = this._tlsOptions;
681 handle = options.pipe ?
688 const context = options.secureContext ||
689 options.credentials ||
690 tls.createSecureContext(options);
697 !!options.isServer,
798 const options = this._tlsOptions;
800 this.server = options.server;
803 options.isServer ? 'server' : 'client',
809 const requestCert = !!options.requestCert || !options.isServer;
810 const rejectUnauthorized = !!options.rejectUnauthorized;
824 if (options.isServer) {
833 if (options.ALPNCallback) {
834 if (typeof options.ALPNCallback !== 'function') {
835 throw new ERR_INVALID_ARG_TYPE('options.ALPNCallback', 'Function', options.ALPNCallback);
837 assert(typeof options.ALPNCallback === 'function');
838 this[kALPNCallback] = options.ALPNCallback;
860 if (options.session)
861 ssl.setSession(options.session);
893 if (options.isServer &&
894 options.SNICallback &&
895 (options.SNICallback !== SNICallback ||
896 (options.server && options.server._contexts.length))) {
897 assert(typeof options.SNICallback === 'function');
898 this._SNICallback = options.SNICallback;
902 if (options.ALPNProtocols)
903 ssl.setALPNProtocols(options.ALPNProtocols);
905 if (options.pskCallback && ssl.enablePskCallback) {
906 validateFunction(options.pskCallback, 'pskCallback');
908 ssl[kOnPskExchange] = options.isServer ?
911 this[kPskCallback] = options.pskCallback;
914 if (options.pskIdentityHint) {
915 validateString(options.pskIdentityHint, 'options.pskIdentityHint');
916 ssl.setPskIdentityHint(options.pskIdentityHint);
923 if (!options.isServer && connectOptions) {
929 if (options.handshakeTimeout > 0)
930 this.setTimeout(options.handshakeTimeout, this._handleTimeout);
952 TLSSocket.prototype.renegotiate = function(options, callback) {
953 validateObject(options, 'options');
969 if (options.requestCert !== undefined)
970 requestCert = !!options.requestCert;
971 if (options.rejectUnauthorized !== undefined)
972 rejectUnauthorized = !!options.rejectUnauthorized;
1304 function Server(options, listener) {
1306 return new Server(options, listener);
1308 if (typeof options === 'function') {
1309 listener = options;
1310 options = kEmptyObject;
1311 } else if (options == null || typeof options === 'object') {
1312 options = options ?? kEmptyObject;
1314 throw new ERR_INVALID_ARG_TYPE('options', 'Object', options);
1318 this.requestCert = options.requestCert === true;
1319 this.rejectUnauthorized = options.rejectUnauthorized !== false;
1321 this.ALPNCallback = options.ALPNCallback;
1322 if (this.ALPNCallback && options.ALPNProtocols) {
1326 if (options.sessionTimeout)
1327 this.sessionTimeout = options.sessionTimeout;
1329 if (options.ticketKeys)
1330 this.ticketKeys = options.ticketKeys;
1332 if (options.ALPNProtocols)
1333 tls.convertALPNProtocols(options.ALPNProtocols, this);
1335 this.setSecureContext(options);
1337 this[kHandshakeTimeout] = options.handshakeTimeout || (120 * 1000);
1338 this[kSNICallback] = options.SNICallback;
1339 this[kPskCallback] = options.pskCallback;
1340 this[kPskIdentityHint] = options.pskIdentityHint;
1342 validateNumber(this[kHandshakeTimeout], 'options.handshakeTimeout');
1345 validateFunction(this[kSNICallback], 'options.SNICallback');
1349 validateFunction(this[kPskCallback], 'options.pskCallback');
1353 validateString(this[kPskIdentityHint], 'options.pskIdentityHint');
1357 ReflectApply(net.Server, this, [options, tlsConnectionListener]);
1363 this[kEnableTrace] = options.enableTrace;
1369 exports.createServer = function createServer(options, listener) {
1370 return new Server(options, listener);
1374 Server.prototype.setSecureContext = function(options) {
1375 validateObject(options, 'options');
1377 if (options.pfx)
1378 this.pfx = options.pfx;
1382 if (options.key)
1383 this.key = options.key;
1387 if (options.passphrase)
1388 this.passphrase = options.passphrase;
1392 if (options.cert)
1393 this.cert = options.cert;
1397 if (options.clientCertEngine)
1398 this.clientCertEngine = options.clientCertEngine;
1402 if (options.ca)
1403 this.ca = options.ca;
1407 if (options.minVersion)
1408 this.minVersion = options.minVersion;
1412 if (options.maxVersion)
1413 this.maxVersion = options.maxVersion;
1417 if (options.secureProtocol)
1418 this.secureProtocol = options.secureProtocol;
1422 if (options.crl)
1423 this.crl = options.crl;
1427 this.sigalgs = options.sigalgs;
1429 if (options.ciphers)
1430 this.ciphers = options.ciphers;
1434 this.ecdhCurve = options.ecdhCurve;
1436 if (options.dhparam)
1437 this.dhparam = options.dhparam;
1441 if (options.honorCipherOrder !== undefined)
1442 this.honorCipherOrder = !!options.honorCipherOrder;
1446 const secureOptions = options.secureOptions || 0;
1453 if (options.sessionIdContext) {
1454 this.sessionIdContext = options.sessionIdContext;
1462 if (options.sessionTimeout)
1463 this.sessionTimeout = options.sessionTimeout;
1465 if (options.ticketKeys)
1466 this.ticketKeys = options.ticketKeys;
1468 this.privateKeyIdentifier = options.privateKeyIdentifier;
1469 this.privateKeyEngine = options.privateKeyEngine;
1522 Server.prototype.setOptions = deprecate(function(options) {
1523 this.requestCert = options.requestCert === true;
1524 this.rejectUnauthorized = options.rejectUnauthorized !== false;
1526 if (options.pfx) this.pfx = options.pfx;
1527 if (options.key) this.key = options.key;
1528 if (options.passphrase) this.passphrase = options.passphrase;
1529 if (options.cert) this.cert = options.cert;
1530 if (options.clientCertEngine)
1531 this.clientCertEngine = options.clientCertEngine;
1532 if (options.ca) this.ca = options.ca;
1533 if (options.minVersion) this.minVersion = options.minVersion;
1534 if (options.maxVersion) this.maxVersion = options.maxVersion;
1535 if (options.secureProtocol) this.secureProtocol = options.secureProtocol;
1536 if (options.crl) this.crl = options.crl;
1537 if (options.ciphers) this.ciphers = options.ciphers;
1538 if (options.ecdhCurve !== undefined)
1539 this.ecdhCurve = options.ecdhCurve;
1540 if (options.dhparam) this.dhparam = options.dhparam;
1541 if (options.sessionTimeout) this.sessionTimeout = options.sessionTimeout;
1542 if (options.ticketKeys) this.ticketKeys = options.ticketKeys;
1543 const secureOptions = options.secureOptions || 0;
1544 if (options.honorCipherOrder !== undefined)
1545 this.honorCipherOrder = !!options.honorCipherOrder;
1549 if (options.ALPNProtocols)
1550 tls.convertALPNProtocols(options.ALPNProtocols, this);
1551 if (options.sessionIdContext) {
1552 this.sessionIdContext = options.sessionIdContext;
1559 if (options.pskCallback) this[kPskCallback] = options.pskCallback;
1560 if (options.pskIdentityHint) this[kPskIdentityHint] = options.pskIdentityHint;
1561 if (options.sigalgs) this.sigalgs = options.sigalgs;
1562 if (options.privateKeyIdentifier !== undefined)
1563 this.privateKeyIdentifier = options.privateKeyIdentifier;
1564 if (options.privateKeyEngine !== undefined)
1565 this.privateKeyEngine = options.privateKeyEngine;
1628 const options = args[0];
1631 // If args[0] was options, then normalize dealt with it.
1633 // find the options and merge them in, normalize's options has only
1634 // the host/port/path args that it knows about, not the tls options.
1635 // This means that options.host overrides a host arg.
1637 ObjectAssign(options, listArgs[1]);
1639 ObjectAssign(options, listArgs[2]);
1642 return cb ? [options, cb] : [options];
1646 const options = this[kConnectOptions];
1649 // specified in options.
1651 if (ekeyinfo.type === 'DH' && ekeyinfo.size < options.minDHSize) {
1664 const hostname = options.servername ||
1665 options.host ||
1666 (options.socket && options.socket._host) ||
1669 verifyError = options.checkServerIdentity(hostname, cert);
1678 // it to the tlssock connection options, explicitly check if it is false
1684 if (options.rejectUnauthorized !== false) {
1689 'authorizationError: %s', options.rejectUnauthorized,
1712 const options = this[kConnectOptions];
1717 error.path = options.path;
1718 error.host = options.host;
1719 error.port = options.port;
1720 error.localAddress = options.localAddress;
1725 // Arguments: [port,] [host,] [options,] [cb]
1728 let options = args[0];
1732 options = {
1737 ...options,
1740 if (!options.keepAlive)
1741 options.singleUse = true;
1743 assert(typeof options.checkServerIdentity === 'function');
1744 assert(typeof options.minDHSize === 'number',
1745 'options.minDHSize is not a number: ' + options.minDHSize);
1746 assert(options.minDHSize > 0,
1747 'options.minDHSize is not a positive number: ' +
1748 options.minDHSize);
1750 const context = options.secureContext || tls.createSecureContext(options);
1752 const tlssock = new TLSSocket(options.socket, {
1753 allowHalfOpen: options.allowHalfOpen,
1754 pipe: !!options.path,
1758 rejectUnauthorized: options.rejectUnauthorized !== false,
1759 session: options.session,
1760 ALPNProtocols: options.ALPNProtocols,
1761 requestOCSP: options.requestOCSP,
1762 enableTrace: options.enableTrace,
1763 pskCallback: options.pskCallback,
1764 highWaterMark: options.highWaterMark,
1765 onread: options.onread,
1766 signal: options.signal,
1771 // it to the tlssock connection options, explicitly check if it is false
1774 options.rejectUnauthorized = options.rejectUnauthorized !== false;
1776 tlssock[kConnectOptions] = options;
1781 if (!options.socket) {
1784 if (options.timeout) {
1785 tlssock.setTimeout(options.timeout);
1788 tlssock.connect(options, tlssock._start);
1793 if (options.session)
1794 tlssock.setSession(options.session);
1796 if (options.servername) {
1797 if (!ipServernameWarned && net.isIP(options.servername)) {
1806 tlssock.setServername(options.servername);
1809 if (options.socket)