Options
All
  • Public
  • Public/Protected
  • All
Menu

Hierarchy

Index

Properties

Optional ALPNProtocols

ALPNProtocols: string[] | Uint8Array[] | Uint8Array

An array of strings or a Buffer naming possible ALPN protocols. (Protocols should be ordered by their priority.)

Optional SNICallback

SNICallback: undefined | function

SNICallback(servername, cb) A function that will be called if the client supports SNI TLS extension. Two arguments will be passed when called: servername and cb. SNICallback should invoke cb(null, ctx), where ctx is a SecureContext instance. (tls.createSecureContext(...) can be used to get a proper SecureContext.) If SNICallback wasn't provided the default callback with high-level API will be used (see below).

Optional ca

ca: string | Buffer | Array<string | Buffer>

Optional cert

cert: string | Buffer | Array<string | Buffer>

Optional ciphers

ciphers: undefined | string

Optional clientCertEngine

clientCertEngine: undefined | string

Optional crl

crl: string | Buffer | Array<string | Buffer>

Optional dhparam

dhparam: string | Buffer

Optional ecdhCurve

ecdhCurve: undefined | string

Optional enableTrace

enableTrace: undefined | false | true

When enabled, TLS packet trace information is written to stderr. This can be used to debug TLS connection problems.

default

false

Optional handshakeTimeout

handshakeTimeout: undefined | number

Optional honorCipherOrder

honorCipherOrder: undefined | false | true

Optional key

key: string | Buffer | Array<Buffer | Object>

Optional maxVersion

maxVersion: SecureVersion

Optionally set the maximum TLS version to allow. One of 'TLSv1.3', 'TLSv1.2', 'TLSv1.1', or 'TLSv1'. Cannot be specified along with the secureProtocol option, use one or the other. Default: 'TLSv1.3', unless changed using CLI options. Using --tls-max-v1.2 sets the default to 'TLSv1.2'. Using --tls-max-v1.3 sets the default to 'TLSv1.3'. If multiple of the options are provided, the highest maximum is used.

Optional minVersion

minVersion: SecureVersion

Optionally set the minimum TLS version to allow. One of 'TLSv1.3', 'TLSv1.2', 'TLSv1.1', or 'TLSv1'. Cannot be specified along with the secureProtocol option, use one or the other. It is not recommended to use less than TLSv1.2, but it may be required for interoperability. Default: 'TLSv1.2', unless changed using CLI options. Using --tls-v1.0 sets the default to 'TLSv1'. Using --tls-v1.1 sets the default to 'TLSv1.1'. Using --tls-min-v1.3 sets the default to 'TLSv1.3'. If multiple of the options are provided, the lowest minimum is used.

Optional passphrase

passphrase: undefined | string

Optional pfx

pfx: string | Buffer | Array<string | Buffer | Object>

Optional rejectUnauthorized

rejectUnauthorized: undefined | false | true

If true the server will reject any connection which is not authorized with the list of supplied CAs. This option only has an effect if requestCert is true.

default

true

Optional requestCert

requestCert: undefined | false | true

If true the server will request a certificate from clients that connect and attempt to verify that certificate. Defaults to false.

Optional secureContext

secureContext: SecureContext

An optional TLS context object from tls.createSecureContext()

Optional secureOptions

secureOptions: undefined | number

Optional secureProtocol

secureProtocol: undefined | string

Optional sessionIdContext

sessionIdContext: undefined | string

Optional sessionTimeout

sessionTimeout: undefined | number

Optional ticketKeys

ticketKeys: Buffer

Generated using TypeDoc