Home
last modified time | relevance | path

Searched refs:sessionIdContext (Results 1 – 10 of 10) sorted by relevance

/third_party/node/lib/
D_tls_wrap.js1313 if (options.sessionIdContext) {
1314 this.sessionIdContext = options.sessionIdContext;
1316 this.sessionIdContext = crypto.createHash('sha1')
1348 sessionIdContext: this.sessionIdContext, property
1411 if (options.sessionIdContext) {
1412 this.sessionIdContext = options.sessionIdContext;
1414 this.sessionIdContext = crypto.createHash('sha1')
Dhttps.js275 if (options.sessionIdContext)
276 name += options.sessionIdContext;
D_tls_common.js249 if (options.sessionIdContext) {
250 c.context.setSessionIdContext(options.sessionIdContext);
/third_party/node/test/parallel/
Dtest-https-agent-getname.js37 sessionIdContext: 'sessionIdContext', property
/third_party/node/doc/api/
Dhttps.md287 `secureOptions`, `secureProtocol`, `servername`, `sessionIdContext`,
Dtls.md1727 * `sessionIdContext` {string} Opaque identifier used by servers to ensure
1739 from `process.argv` as the default value of the `sessionIdContext` option, other
/third_party/node/src/
Dnode_crypto.cc1362 const node::Utf8Value sessionIdContext(args.GetIsolate(), args[0]); in SetSessionIdContext() local
1364 reinterpret_cast<const unsigned char*>(*sessionIdContext); in SetSessionIdContext()
1365 unsigned int sid_ctx_len = sessionIdContext.length(); in SetSessionIdContext()
/third_party/node/doc/changelogs/
DCHANGELOG_V5.md1421 * **tls**: The default `sessionIdContext` now uses SHA1 in FIPS mode rather than MD5 (Stefan Budean…
1557 …/github.com/nodejs/node/commit/2f16be2b70)] - **tls**: Use SHA1 for sessionIdContext in FIPS mode …
DCHANGELOG_V6.md4919 * SHA1 used for sessionIdContext
5021 …node/commit/df268f97bc)] - **(SEMVER-MAJOR)** **tls**: use SHA1 for sessionIdContext (Stefan Budea…
DCHANGELOG_V4.md2880 …/github.com/nodejs/node/commit/0eb0119d64)] - **tls**: Use SHA1 for sessionIdContext in FIPS mode …