112 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			Haxe
		
	
	
	
	
	
		
		
			
		
	
	
			112 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			Haxe
		
	
	
	
	
	
| 
								 | 
							
								/*
							 | 
						||
| 
								 | 
							
								 * Copyright (C)2014-2020 Haxe Foundation
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Permission is hereby granted, free of charge, to any person obtaining a
							 | 
						||
| 
								 | 
							
								 * copy of this software and associated documentation files (the "Software"),
							 | 
						||
| 
								 | 
							
								 * to deal in the Software without restriction, including without limitation
							 | 
						||
| 
								 | 
							
								 * the rights to use, copy, modify, merge, publish, distribute, sublicense,
							 | 
						||
| 
								 | 
							
								 * and/or sell copies of the Software, and to permit persons to whom the
							 | 
						||
| 
								 | 
							
								 * Software is furnished to do so, subject to the following conditions:
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The above copyright notice and this permission notice shall be included in
							 | 
						||
| 
								 | 
							
								 * all copies or substantial portions of the Software.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
							 | 
						||
| 
								 | 
							
								 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
							 | 
						||
| 
								 | 
							
								 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
							 | 
						||
| 
								 | 
							
								 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
							 | 
						||
| 
								 | 
							
								 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
							 | 
						||
| 
								 | 
							
								 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
							 | 
						||
| 
								 | 
							
								 * DEALINGS IN THE SOFTWARE.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								package js.node.tls;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								import haxe.extern.EitherType;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								typedef SecureContextOptions = {
							 | 
						||
| 
								 | 
							
									/**
							 | 
						||
| 
								 | 
							
										private key, certificate and CA certs of the server in PFX or PKCS12 format.
							 | 
						||
| 
								 | 
							
									**/
							 | 
						||
| 
								 | 
							
									@:optional var pfx:EitherType<String, Buffer>;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									/**
							 | 
						||
| 
								 | 
							
										passphrase for the private key or pfx.
							 | 
						||
| 
								 | 
							
									**/
							 | 
						||
| 
								 | 
							
									@:optional var passphrase:String;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									/**
							 | 
						||
| 
								 | 
							
										private key of the server in PEM format.
							 | 
						||
| 
								 | 
							
									**/
							 | 
						||
| 
								 | 
							
									@:optional var key:EitherType<String, Buffer>;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									/**
							 | 
						||
| 
								 | 
							
										certificate key of the server in PEM format.
							 | 
						||
| 
								 | 
							
									**/
							 | 
						||
| 
								 | 
							
									@:optional var cert:EitherType<String, Buffer>;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									/**
							 | 
						||
| 
								 | 
							
										trusted certificates in PEM format.
							 | 
						||
| 
								 | 
							
										If this is omitted several well known "root" CAs will be used, like VeriSign.
							 | 
						||
| 
								 | 
							
										These are used to authorize connections.
							 | 
						||
| 
								 | 
							
									**/
							 | 
						||
| 
								 | 
							
									@:optional var ca:Array<EitherType<String, Buffer>>;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									/**
							 | 
						||
| 
								 | 
							
										PEM encoded CRLs (Certificate Revocation List)
							 | 
						||
| 
								 | 
							
									**/
							 | 
						||
| 
								 | 
							
									@:optional var crl:EitherType<String, Array<String>>;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									/**
							 | 
						||
| 
								 | 
							
										ciphers to use or exclude.
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										To mitigate BEAST attacks it is recommended that you use this option in conjunction with the `honorCipherOrder`
							 | 
						||
| 
								 | 
							
										option described below to prioritize the non-CBC cipher.
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										Defaults to AES128-GCM-SHA256:RC4:HIGH:!MD5:!aNULL:!EDH.
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										Consult the OpenSSL cipher list format documentation for details on the format.
							 | 
						||
| 
								 | 
							
										ECDH (Elliptic Curve Diffie-Hellman) ciphers are not yet supported.
							 | 
						||
| 
								 | 
							
									**/
							 | 
						||
| 
								 | 
							
									@:optional var ciphers:String;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									/**
							 | 
						||
| 
								 | 
							
										named curve to use for ECDH key agreement or false to disable ECDH.
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										Defaults to prime256v1 (NIST P-256). Use `Crypto.getCurves` to obtain a list of available curve names.
							 | 
						||
| 
								 | 
							
										On recent releases, openssl ecparam -list_curves will also display the name and description
							 | 
						||
| 
								 | 
							
										of each available elliptic curve.
							 | 
						||
| 
								 | 
							
									**/
							 | 
						||
| 
								 | 
							
									@:optional var ecdhCurve:String;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									/**
							 | 
						||
| 
								 | 
							
										Diffie Hellman parameters, required for Perfect Forward Secrecy.
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
										Use openssl dhparam to create it. Its key length should be greater than or equal to 1024 bits,
							 | 
						||
| 
								 | 
							
										otherwise it throws an error. It is strongly recommended to use 2048 bits or more for stronger security.
							 | 
						||
| 
								 | 
							
										If omitted or invalid, it is silently discarded and DHE ciphers won't be available.
							 | 
						||
| 
								 | 
							
									**/
							 | 
						||
| 
								 | 
							
									@:optional var dhparam:EitherType<String, Buffer>;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									/**
							 | 
						||
| 
								 | 
							
										The SSL method to use, e.g. SSLv3_method to force SSL version 3.
							 | 
						||
| 
								 | 
							
										The possible values depend on your installation of OpenSSL and are defined in the constant SSL_METHODS.
							 | 
						||
| 
								 | 
							
									**/
							 | 
						||
| 
								 | 
							
									@:optional var secureProtocol:String;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									/**
							 | 
						||
| 
								 | 
							
										opaque identifier for session resumption.
							 | 
						||
| 
								 | 
							
										If `requestCert` is true, the default is MD5 hash value generated from command-line.
							 | 
						||
| 
								 | 
							
										Otherwise, the default is not provided.
							 | 
						||
| 
								 | 
							
									**/
							 | 
						||
| 
								 | 
							
									@:optional var sessionIdContext:String;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
									/**
							 | 
						||
| 
								 | 
							
										When choosing a cipher, use the server's preferences instead of the client preferences.
							 | 
						||
| 
								 | 
							
										Default: true.
							 | 
						||
| 
								 | 
							
									**/
							 | 
						||
| 
								 | 
							
									@:optional var honorCipherOrder:Bool;
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								extern class SecureContext {}
							 |