Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(952)

Unified Diff: sdk/lib/io/secure_socket.dart

Issue 14034012: Support upgrading sockets to secure sockets (Closed) Base URL: https://dart.googlecode.com/svn/branches/bleeding_edge/dart
Patch Set: Created 7 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « runtime/bin/socket_patch.dart ('k') | tests/standalone/io/socket_upgrade_to_secure_test.dart » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: sdk/lib/io/secure_socket.dart
diff --git a/sdk/lib/io/secure_socket.dart b/sdk/lib/io/secure_socket.dart
index 26bbf123438119b6e6362f90b92ea44faa046632..6153a3b72cbe26dc003e4b7ea2616df993cf4e2d 100644
--- a/sdk/lib/io/secure_socket.dart
+++ b/sdk/lib/io/secure_socket.dart
@@ -49,6 +49,85 @@ abstract class SecureSocket implements Socket {
}
/**
+ * Takes an already connected [socket] and starts client side TLS
+ * handshake to make the communication secure. When the returned
+ * future completes the [SecureSocket] has completed the TLS
+ * handshake. Using this function requires that the other end of the
+ * connection is prepared for TLS handshake.
+ *
+ * If the [socket] already has a subscription, this subscription
+ * will no longer receive and events. In most cases calling
+ * [:pause:] on this subscription before starting TLS handshake is
+ * the right thing to do.
+ *
+ * See [connect] for more information on the arguments.
+ *
+ */
+ static Future<SecureSocket> secure(
+ Socket socket,
+ {bool sendClientCertificate: false,
+ String certificateName,
+ bool onBadCertificate(X509Certificate certificate)}) {
+ var completer = new Completer();
+ socket._detachRaw()
+ .then((detachedRaw) {
+ return RawSecureSocket.secure(
+ detachedRaw[0],
+ subscription: detachedRaw[1],
+ sendClientCertificate: sendClientCertificate,
+ onBadCertificate: onBadCertificate);
+ })
+ .then((raw) {
+ completer.complete(new SecureSocket._(raw));
+ });
+ return completer.future;
+ }
+
+ /**
+ * Takes an already connected [socket] and starts server side TLS
+ * handshake to make the communication secure. When the returned
+ * future completes the [SecureSocket] has completed the TLS
+ * handshake. Using this function requires that the other end of the
+ * connection is going to start the TLS handshake.
+ *
+ * If the [socket] already has a subscription, this subscription
+ * will no longer receive and events. In most cases calling
+ * [:pause:] on this subscription before starting TLS handshake is
+ * the right thing to do.
+ *
+ * If some of the data of the TLS handshake has already been read
+ * from the socket this data can be passed in the [carryOverData]
+ * parameter. This data will be processed before any other data
+ * available on the socket.
+ *
+ * See [SecureServerSocket.bind] for more information on the
+ * arguments.
+ *
+ */
+ static Future<SecureSocket> secureServer(
Anders Johnsen 2013/04/22 14:08:17 secureServer can be a bit ambivalent. What about m
Søren Gjesse 2013/04/23 06:51:21 The problem with this is that for the server end t
+ Socket socket,
+ String certificateName,
+ {List<int> carryOverData,
+ bool requestClientCertificate: false,
+ bool requireClientCertificate: false}) {
+ var completer = new Completer();
+ socket._detachRaw()
+ .then((detachedRaw) {
+ return RawSecureSocket.secureServer(
+ detachedRaw[0],
+ certificateName,
+ subscription: detachedRaw[1],
+ carryOverData: carryOverData,
+ requestClientCertificate: requestClientCertificate,
+ requireClientCertificate: requireClientCertificate);
+ })
+ .then((raw) {
+ completer.complete(new SecureSocket._(raw));
+ });
+ return completer.future;
+ }
+
+ /**
* Get the peer certificate for a connected SecureSocket. If this
* SecureSocket is the server end of a secure socket connection,
* [peerCertificate] will return the client certificate, or null, if no
« no previous file with comments | « runtime/bin/socket_patch.dart ('k') | tests/standalone/io/socket_upgrade_to_secure_test.dart » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698