OLD | NEW |
1 // Copyright (c) 2012, the Dart project authors. Please see the AUTHORS file | 1 // Copyright (c) 2012, the Dart project authors. Please see the AUTHORS file |
2 // for details. All rights reserved. Use of this source code is governed by a | 2 // for details. All rights reserved. Use of this source code is governed by a |
3 // BSD-style license that can be found in the LICENSE file. | 3 // BSD-style license that can be found in the LICENSE file. |
4 | 4 |
5 /** | 5 /** |
6 * SecureSocket provides a secure (SSL or TLS) client connection to a server. | 6 * SecureSocket provides a secure (SSL or TLS) client connection to a server. |
7 * The certificate provided by the server is checked | 7 * The certificate provided by the server is checked |
8 * using the certificate database provided in setCertificateDatabase. | 8 * using the certificate database provided in setCertificateDatabase. |
9 */ | 9 */ |
10 abstract class SecureSocket implements Socket { | 10 abstract class SecureSocket implements Socket { |
11 /** | 11 /** |
12 * Constructs a new secure client socket and connect it to the given | 12 * Constructs a new secure client socket and connect it to the given |
13 * host on the given port. The returned socket is not yet connected | 13 * host on the given port. The returned socket is not yet connected |
14 * but ready for registration of callbacks. | 14 * but ready for registration of callbacks. |
15 */ | 15 */ |
16 factory SecureSocket(String host, int port) => new _SecureSocket(host, port); | 16 factory SecureSocket(String host, int port) => new _SecureSocket(host, port); |
17 | 17 |
18 /** | 18 /** |
19 * Initializes the NSS library with the path to a certificate database | 19 * Initializes the NSS library with the path to a certificate database |
20 * containing root certificates for verifying certificate paths on | 20 * containing root certificates for verifying certificate paths on |
21 * client connections, and server certificates to provide on server | 21 * client connections, and server certificates to provide on server |
22 * connections. The password argument should be used when creating | 22 * connections. The password argument should be used when creating |
23 * secure server sockets, to allow the private key of the server | 23 * secure server sockets, to allow the private key of the server |
24 * certificate to be fetched. | 24 * certificate to be fetched. If useBuiltinRoots is true (the default), |
| 25 * then a built-in set of root certificates for trusted certificate |
| 26 * authorities is merged with the certificates in the database. |
25 * | 27 * |
26 * The database should be an NSS certificate database directory | 28 * The database should be an NSS certificate database directory |
27 * containing a cert9.db file, not a cert8.db file. This version of | 29 * containing a cert9.db file, not a cert8.db file. This version of |
28 * the database can be created using the NSS certutil tool with "sql:" in | 30 * the database can be created using the NSS certutil tool with "sql:" in |
29 * front of the absolute path of the database directory, or setting the | 31 * front of the absolute path of the database directory, or setting the |
30 * environment variable NSS_DEFAULT_DB_TYPE to "sql". | 32 * environment variable NSS_DEFAULT_DB_TYPE to "sql". |
31 */ | 33 */ |
32 external static void setCertificateDatabase(String certificateDatabase, | 34 external static void initialize({String database, |
33 [String password]); | 35 String password, |
| 36 bool useBuiltinRoots: true}); |
34 } | 37 } |
35 | 38 |
36 | 39 |
37 class _SecureSocket implements SecureSocket { | 40 class _SecureSocket implements SecureSocket { |
38 // Status states | 41 // Status states |
39 static final int NOT_CONNECTED = 200; | 42 static final int NOT_CONNECTED = 200; |
40 static final int HANDSHAKE = 201; | 43 static final int HANDSHAKE = 201; |
41 static final int CONNECTED = 202; | 44 static final int CONNECTED = 202; |
42 static final int CLOSED = 203; | 45 static final int CLOSED = 203; |
43 | 46 |
(...skipping 247 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
291 // We must be able to set onWrite from the onWrite callback. | 294 // We must be able to set onWrite from the onWrite callback. |
292 var handler = _socketWriteHandler; | 295 var handler = _socketWriteHandler; |
293 // Reset the one-shot handler. | 296 // Reset the one-shot handler. |
294 _socketWriteHandler = null; | 297 _socketWriteHandler = null; |
295 handler(); | 298 handler(); |
296 } | 299 } |
297 } | 300 } |
298 | 301 |
299 void _secureDataHandler() { | 302 void _secureDataHandler() { |
300 if (_status == HANDSHAKE) { | 303 if (_status == HANDSHAKE) { |
301 _secureHandshake(); | 304 try { |
| 305 _secureHandshake(); |
| 306 } catch (e) { _reportError(e, "SecureSocket error"); } |
302 } else { | 307 } else { |
303 _writeEncryptedData(); // TODO(whesse): Removing this causes a failure. | 308 try { |
304 _readEncryptedData(); | 309 _writeEncryptedData(); // TODO(whesse): Removing this causes a failure. |
| 310 _readEncryptedData(); |
| 311 } catch (e) { _reportError(e, "SecureSocket error"); } |
305 if (!_filterReadEmpty) { | 312 if (!_filterReadEmpty) { |
306 // Call the onData event. | 313 // Call the onData event. |
307 if (scheduledDataEvent != null) { | 314 if (scheduledDataEvent != null) { |
308 scheduledDataEvent.cancel(); | 315 scheduledDataEvent.cancel(); |
309 scheduledDataEvent = null; | 316 scheduledDataEvent = null; |
310 } | 317 } |
311 if (_socketDataHandler != null) { | 318 if (_socketDataHandler != null) { |
312 _socketDataHandler(); | 319 _socketDataHandler(); |
313 } | 320 } |
314 } | 321 } |
315 } | 322 } |
316 } | 323 } |
317 | 324 |
318 void _secureErrorHandler(e) { | 325 void _secureErrorHandler(e) { |
319 _reportError(e, 'Error on underlying Socket'); | 326 _reportError(e, 'Error on underlying Socket'); |
320 } | 327 } |
321 | 328 |
322 void _reportError(error, String message) { | 329 void _reportError(error, String message) { |
323 // TODO(whesse): Call _reportError from all internal functions that throw. | 330 // TODO(whesse): Call _reportError from all internal functions that throw. |
324 var e; | 331 var e; |
325 if (error is SocketIOException) { | 332 if (error is SocketIOException) { |
326 e = new SocketIOException('$message (${error.message})', error.osError); | 333 e = new SocketIOException('$message (${error.message})', error.osError); |
327 } else if (error is OSError) { | 334 } else if (error is OSError) { |
328 e = new SocketIOException(message, error); | 335 e = new SocketIOException(message, error); |
329 } else { | 336 } else { |
330 e = new SocketIOException('$message (${error.toString()})', null); | 337 e = new SocketIOException('$message (${error.toString()})', null); |
331 } | 338 } |
| 339 close(false); |
332 bool reported = false; | 340 bool reported = false; |
333 if (_socketErrorHandler != null) { | 341 if (_socketErrorHandler != null) { |
334 reported = true; | 342 reported = true; |
335 _socketErrorHandler(e); | 343 _socketErrorHandler(e); |
336 } | 344 } |
337 if (_inputStream != null) { | 345 if (_inputStream != null) { |
338 reported = reported || _inputStream._onSocketError(e); | 346 reported = reported || _inputStream._onSocketError(e); |
339 } | 347 } |
340 if (_outputStream != null) { | 348 if (_outputStream != null) { |
341 reported = reported || _outputStream._onSocketError(e); | 349 reported = reported || _outputStream._onSocketError(e); |
342 } | 350 } |
343 | |
344 if (!reported) throw e; | 351 if (!reported) throw e; |
345 } | 352 } |
346 | 353 |
347 void _secureCloseHandler() { | 354 void _secureCloseHandler() { |
348 _socketClosedRead = true; | 355 _socketClosedRead = true; |
349 if (_filterReadEmpty) { | 356 if (_filterReadEmpty) { |
350 _closedRead = true; | 357 _closedRead = true; |
351 _fireCloseEvent(); | 358 _fireCloseEvent(); |
352 if (_socketClosedWrite) { | 359 if (_socketClosedWrite) { |
353 _secureFilter.destroy(); | 360 _secureFilter.destroy(); |
(...skipping 207 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
561 bool is_server, | 568 bool is_server, |
562 String certificateName); | 569 String certificateName); |
563 void destroy(); | 570 void destroy(); |
564 void handshake(); | 571 void handshake(); |
565 void init(); | 572 void init(); |
566 int processBuffer(int bufferIndex); | 573 int processBuffer(int bufferIndex); |
567 void registerHandshakeCompleteCallback(Function handshakeCompleteHandler); | 574 void registerHandshakeCompleteCallback(Function handshakeCompleteHandler); |
568 | 575 |
569 List<_ExternalBuffer> get buffers; | 576 List<_ExternalBuffer> get buffers; |
570 } | 577 } |
OLD | NEW |