/third_party/node/test/parallel/ |
D | test-tls-exportkeyingmaterial.js | 19 const tlsSocket = new tls.TLSSocket(s, { constant 26 tlsSocket.exportKeyingMaterial(128, 'label'); 33 tlsSocket.on('secure', common.mustCall(() => { 36 const validKeyingMaterial = tlsSocket.exportKeyingMaterial(128, label); 39 const validKeyingMaterialWithContext = tlsSocket 46 const validKeyingMaterialWithEmptyContext = tlsSocket 51 tlsSocket.exportKeyingMaterial(128, label, 'stringAsContextNotSupported'); 58 tlsSocket.exportKeyingMaterial(128, label, 1234); 65 tlsSocket.exportKeyingMaterial(10, null); 72 tlsSocket.exportKeyingMaterial('length', 1234); [all …]
|
D | test-tls-socket-close.js | 27 let tlsSocket; variable 30 tlsSocket = socket; 59 assert(tlsSocket); 67 if (tlsSocket._handle._parent.bytesRead === 0) { 68 tlsSocket.write('bar');
|
D | test-tls-socket-constructor-alpn-options-parsing.js | 24 const tlsSocket = new tls.TLSSocket(s, { constant 32 tlsSocket.on('secure', common.mustCall(() => { 33 assert.strictEqual(tlsSocket.alpnProtocol, 'http/1.1'); 34 tlsSocket.end();
|
D | test-gc-tls-external-memory.js | 42 const tlsSocket = tls.connect({ socket: clientSide }); 43 tlsSocket.on('error', common.mustCall(connect)); 44 onGC(tlsSocket, { ongc });
|
D | test-tls-starttls-server.js | 20 const tlsSocket = new tls.TLSSocket(s, { constant 33 tlsSocket.on('secure', common.mustCall(() => { 34 tlsSocket.end();
|
D | test-tls-keylog-tlsv13.js | 24 server.on('keylog', common.mustCall((line, tlsSocket) => { 26 assert.strictEqual(tlsSocket.encrypted, true);
|
D | test-https-agent-keylog.js | 39 const verifyKeylog = (line, tlsSocket) => { argument 41 assert.strictEqual(tlsSocket.encrypted, true);
|
/third_party/node/test/internet/ |
D | test-https-issue-43963.js | 10 common.mustCall((exception, tlsSocket) => { 12 assert.strictEqual(Object.keys(tlsSocket.address()).length !== 0, true); 13 assert.strictEqual(tlsSocket.localAddress !== undefined, true); 14 assert.strictEqual(tlsSocket.localPort !== undefined, true); 15 assert.strictEqual(tlsSocket.remoteAddress !== undefined, true); 16 assert.strictEqual(tlsSocket.remoteFamily !== undefined, true); 17 assert.strictEqual(tlsSocket.remotePort !== undefined, true);
|
/third_party/node/deps/npm/node_modules/socks-proxy-agent/dist/ |
D | index.js | 156 const cleanup = (tlsSocket) => { argument 159 if (tlsSocket) 160 tlsSocket.destroy(); 174 …const tlsSocket = tls_1.default.connect(Object.assign(Object.assign(Object.assign({}, omit(opts, '… 176 tlsSocket.once('error', (error) => { 178 cleanup(tlsSocket); 180 return tlsSocket;
|
/third_party/node/doc/api/ |
D | tls.md | 551 * `tlsSocket` {tls.TLSSocket} The `tls.TLSSocket` instance on which it was 566 server.on('keylog', (line, tlsSocket) => { 567 if (tlsSocket.remoteAddress !== '...') 695 * `tlsSocket` {tls.TLSSocket} The established TLS socket. 697 The `tlsSocket.authorized` property is a `boolean` indicating whether the 699 server. If `tlsSocket.authorized` is `false`, then `socket.authorizationError` 703 The `tlsSocket.alpnProtocol` property is a string that contains the selected 704 ALPN protocol. When ALPN has no selected protocol, `tlsSocket.alpnProtocol` 707 The `tlsSocket.servername` property is a string containing the server name 721 * `tlsSocket` {tls.TLSSocket} The `tls.TLSSocket` instance from which the [all …]
|
D | https.md | 98 * `tlsSocket` {tls.TLSSocket} The `tls.TLSSocket` instance on which it was 112 https.globalAgent.on('keylog', (line, tlsSocket) => {
|
/third_party/node/lib/ |
D | _tls_wrap.js | 446 function initRead(tlsSocket, socket) { argument 448 tlsSocket._tlsOptions.isServer ? 'server' : 'client', 449 'handle?', !!tlsSocket._handle, 453 if (!tlsSocket._handle) 460 tlsSocket._handle.receive(buf); 463 tlsSocket.read(0);
|
/third_party/node/deps/corepack/dist/lib/ |
D | corepack.cjs | 8992 const cleanup = (tlsSocket) => { 8995 if (tlsSocket) 8996 tlsSocket.destroy(); 9008 const tlsSocket = tls.connect({ 9013 tlsSocket.once("error", (error) => { 9015 cleanup(tlsSocket); 9017 return tlsSocket; 12943 const tlsSocket = (0, tls_1.connect)(tlsOptions, () => { 12945 if (expectCertificate && !tlsSocket.authorized) { 12946 reject(tlsSocket.authorizationError); [all …]
|
/third_party/node/doc/changelogs/ |
D | CHANGELOG_V5.md | 650 * **tls**: Add a new `tlsSocket.getProtocol()` method to get the negotiated TLS protocol version of… 705 …m/nodejs/node/commit/275f6dbcbb)] - **(SEMVER-MINOR)** **doc**: correct tlsSocket.getCipher() desc…
|
D | CHANGELOG_V18.md | 2714 …tps://github.com/nodejs/node/commit/46f8fb8e53)] - **doc**: clarify tls.tlsSocket.getCipher().vers… 3895 * \[[`a0461255c0`](https://github.com/nodejs/node/commit/a0461255c0)] - **doc**: mark tlsSocket.aut…
|
D | CHANGELOG_V8.md | 1323 …ejs/node/commit/eb377f38f6)] - **(SEMVER-MINOR)** **crypto**: hard-code tlsSocket.getCipher().vers… 3311 …b.com/nodejs/node/commit/e84c9d7176)] - **(SEMVER-MINOR)** **tls**: add tlsSocket.disableRenegotia…
|
D | CHANGELOG_V9.md | 1871 …ejs/node/commit/8a8ac8ce4d)] - **(SEMVER-MINOR)** **crypto**: hard-code tlsSocket.getCipher().vers…
|
D | CHANGELOG_V16.md | 2375 * \[[`f6745e9370`](https://github.com/nodejs/node/commit/f6745e9370)] - **tls**: fix `tlsSocket.set…
|
D | CHANGELOG_V12.md | 5523 * \[[`4716caa12e`](https://github.com/nodejs/node/commit/4716caa12e)] - **tls**: set tlsSocket.serv… 5590 …https://github.com/nodejs/node/commit/9f5b6900e7)] - **doc**: corrected tlsSocket.getPeerCertifica…
|