@@ -171,7 +171,7 @@ function onhandshakedone() {
171
171
function loadSession ( hello ) {
172
172
debug ( 'server onclienthello' ,
173
173
'sessionid.len' , hello . sessionId . length ,
174
- 'ticket?' , hello . tlsTicket
174
+ 'ticket?' , hello . tlsTicket ,
175
175
) ;
176
176
const owner = this [ owner_symbol ] ;
177
177
@@ -350,7 +350,7 @@ function onPskServerCallback(identity, maxPskLen) {
350
350
throw new ERR_INVALID_ARG_TYPE (
351
351
'ret' ,
352
352
[ 'Object' , 'Buffer' , 'TypedArray' , 'DataView' ] ,
353
- ret
353
+ ret ,
354
354
) ;
355
355
}
356
356
psk = ret . psk ;
@@ -361,7 +361,7 @@ function onPskServerCallback(identity, maxPskLen) {
361
361
throw new ERR_INVALID_ARG_VALUE (
362
362
'psk' ,
363
363
psk ,
364
- `Pre-shared key exceeds ${ maxPskLen } bytes`
364
+ `Pre-shared key exceeds ${ maxPskLen } bytes` ,
365
365
) ;
366
366
}
367
367
@@ -381,7 +381,7 @@ function onPskClientCallback(hint, maxPskLen, maxIdentityLen) {
381
381
throw new ERR_INVALID_ARG_VALUE (
382
382
'psk' ,
383
383
ret . psk ,
384
- `Pre-shared key exceeds ${ maxPskLen } bytes`
384
+ `Pre-shared key exceeds ${ maxPskLen } bytes` ,
385
385
) ;
386
386
}
387
387
@@ -390,7 +390,7 @@ function onPskClientCallback(hint, maxPskLen, maxIdentityLen) {
390
390
throw new ERR_INVALID_ARG_VALUE (
391
391
'identity' ,
392
392
ret . identity ,
393
- `PSK identity exceeds ${ maxIdentityLen } bytes`
393
+ `PSK identity exceeds ${ maxIdentityLen } bytes` ,
394
394
) ;
395
395
}
396
396
@@ -447,7 +447,7 @@ function initRead(tlsSocket, socket) {
447
447
debug ( '%s initRead' ,
448
448
tlsSocket . _tlsOptions . isServer ? 'server' : 'client' ,
449
449
'handle?' , ! ! tlsSocket . _handle ,
450
- 'buffered?' , ! ! socket && socket . readableLength
450
+ 'buffered?' , ! ! socket && socket . readableLength ,
451
451
) ;
452
452
// If we were destroyed already don't bother reading
453
453
if ( ! tlsSocket . _handle )
@@ -689,7 +689,7 @@ TLSSocket.prototype._init = function(socket, wrap) {
689
689
690
690
debug ( '%s _init' ,
691
691
options . isServer ? 'server' : 'client' ,
692
- 'handle?' , ! ! ssl
692
+ 'handle?' , ! ! ssl ,
693
693
) ;
694
694
695
695
// Clients (!isServer) always request a cert, servers request a client cert
@@ -846,7 +846,7 @@ TLSSocket.prototype.renegotiate = function(options, callback) {
846
846
847
847
debug ( '%s renegotiate()' ,
848
848
this . _tlsOptions . isServer ? 'server' : 'client' ,
849
- 'destroyed?' , this . destroyed
849
+ 'destroyed?' , this . destroyed ,
850
850
) ;
851
851
852
852
if ( this . destroyed )
@@ -1456,7 +1456,7 @@ Server.prototype.addContext = function(servername, context) {
1456
1456
1457
1457
const re = new RegExp ( '^' + StringPrototypeReplaceAll (
1458
1458
RegExpPrototypeSymbolReplace ( / ( [ . ^ $ + ? \- \\ [ \] { } ] ) / g, servername , '\\$1' ) ,
1459
- '*' , '[^.]*'
1459
+ '*' , '[^.]*' ,
1460
1460
) + '$' ) ;
1461
1461
ArrayPrototypePush ( this . _contexts ,
1462
1462
[ re , tls . createSecureContext ( context ) . context ] ) ;
@@ -1680,7 +1680,7 @@ exports.connect = function connect(...args) {
1680
1680
'Setting the TLS ServerName to an IP address is not permitted by ' +
1681
1681
'RFC 6066. This will be ignored in a future version.' ,
1682
1682
'DeprecationWarning' ,
1683
- 'DEP0123'
1683
+ 'DEP0123' ,
1684
1684
) ;
1685
1685
ipServernameWarned = true ;
1686
1686
}
0 commit comments