112 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			Haxe
		
	
	
	
	
	
			
		
		
	
	
			112 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			Haxe
		
	
	
	
	
	
/*
 | 
						|
 * Copyright (C)2014-2020 Haxe Foundation
 | 
						|
 *
 | 
						|
 * Permission is hereby granted, free of charge, to any person obtaining a
 | 
						|
 * copy of this software and associated documentation files (the "Software"),
 | 
						|
 * to deal in the Software without restriction, including without limitation
 | 
						|
 * the rights to use, copy, modify, merge, publish, distribute, sublicense,
 | 
						|
 * and/or sell copies of the Software, and to permit persons to whom the
 | 
						|
 * Software is furnished to do so, subject to the following conditions:
 | 
						|
 *
 | 
						|
 * The above copyright notice and this permission notice shall be included in
 | 
						|
 * all copies or substantial portions of the Software.
 | 
						|
 *
 | 
						|
 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 | 
						|
 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 | 
						|
 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
 | 
						|
 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
 | 
						|
 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
 | 
						|
 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
 | 
						|
 * DEALINGS IN THE SOFTWARE.
 | 
						|
 */
 | 
						|
 | 
						|
package js.node.tls;
 | 
						|
 | 
						|
import haxe.extern.EitherType;
 | 
						|
 | 
						|
typedef SecureContextOptions = {
 | 
						|
	/**
 | 
						|
		private key, certificate and CA certs of the server in PFX or PKCS12 format.
 | 
						|
	**/
 | 
						|
	@:optional var pfx:EitherType<String, Buffer>;
 | 
						|
 | 
						|
	/**
 | 
						|
		passphrase for the private key or pfx.
 | 
						|
	**/
 | 
						|
	@:optional var passphrase:String;
 | 
						|
 | 
						|
	/**
 | 
						|
		private key of the server in PEM format.
 | 
						|
	**/
 | 
						|
	@:optional var key:EitherType<String, Buffer>;
 | 
						|
 | 
						|
	/**
 | 
						|
		certificate key of the server in PEM format.
 | 
						|
	**/
 | 
						|
	@:optional var cert:EitherType<String, Buffer>;
 | 
						|
 | 
						|
	/**
 | 
						|
		trusted certificates in PEM format.
 | 
						|
		If this is omitted several well known "root" CAs will be used, like VeriSign.
 | 
						|
		These are used to authorize connections.
 | 
						|
	**/
 | 
						|
	@:optional var ca:Array<EitherType<String, Buffer>>;
 | 
						|
 | 
						|
	/**
 | 
						|
		PEM encoded CRLs (Certificate Revocation List)
 | 
						|
	**/
 | 
						|
	@:optional var crl:EitherType<String, Array<String>>;
 | 
						|
 | 
						|
	/**
 | 
						|
		ciphers to use or exclude.
 | 
						|
 | 
						|
		To mitigate BEAST attacks it is recommended that you use this option in conjunction with the `honorCipherOrder`
 | 
						|
		option described below to prioritize the non-CBC cipher.
 | 
						|
 | 
						|
		Defaults to AES128-GCM-SHA256:RC4:HIGH:!MD5:!aNULL:!EDH.
 | 
						|
 | 
						|
		Consult the OpenSSL cipher list format documentation for details on the format.
 | 
						|
		ECDH (Elliptic Curve Diffie-Hellman) ciphers are not yet supported.
 | 
						|
	**/
 | 
						|
	@:optional var ciphers:String;
 | 
						|
 | 
						|
	/**
 | 
						|
		named curve to use for ECDH key agreement or false to disable ECDH.
 | 
						|
 | 
						|
		Defaults to prime256v1 (NIST P-256). Use `Crypto.getCurves` to obtain a list of available curve names.
 | 
						|
		On recent releases, openssl ecparam -list_curves will also display the name and description
 | 
						|
		of each available elliptic curve.
 | 
						|
	**/
 | 
						|
	@:optional var ecdhCurve:String;
 | 
						|
 | 
						|
	/**
 | 
						|
		Diffie Hellman parameters, required for Perfect Forward Secrecy.
 | 
						|
 | 
						|
		Use openssl dhparam to create it. Its key length should be greater than or equal to 1024 bits,
 | 
						|
		otherwise it throws an error. It is strongly recommended to use 2048 bits or more for stronger security.
 | 
						|
		If omitted or invalid, it is silently discarded and DHE ciphers won't be available.
 | 
						|
	**/
 | 
						|
	@:optional var dhparam:EitherType<String, Buffer>;
 | 
						|
 | 
						|
	/**
 | 
						|
		The SSL method to use, e.g. SSLv3_method to force SSL version 3.
 | 
						|
		The possible values depend on your installation of OpenSSL and are defined in the constant SSL_METHODS.
 | 
						|
	**/
 | 
						|
	@:optional var secureProtocol:String;
 | 
						|
 | 
						|
	/**
 | 
						|
		opaque identifier for session resumption.
 | 
						|
		If `requestCert` is true, the default is MD5 hash value generated from command-line.
 | 
						|
		Otherwise, the default is not provided.
 | 
						|
	**/
 | 
						|
	@:optional var sessionIdContext:String;
 | 
						|
 | 
						|
	/**
 | 
						|
		When choosing a cipher, use the server's preferences instead of the client preferences.
 | 
						|
		Default: true.
 | 
						|
	**/
 | 
						|
	@:optional var honorCipherOrder:Bool;
 | 
						|
}
 | 
						|
 | 
						|
extern class SecureContext {}
 |