| Index: runtime/bin/secure_socket_patch.dart
|
| diff --git a/runtime/bin/secure_socket_patch.dart b/runtime/bin/secure_socket_patch.dart
|
| index 735ba3b29fdf88aa58303bc8a56b8d3fbc2fff45..ad29bd5f0fa79f22bce2e66af01c2498df054197 100644
|
| --- a/runtime/bin/secure_socket_patch.dart
|
| +++ b/runtime/bin/secure_socket_patch.dart
|
| @@ -2,23 +2,18 @@
|
| // for details. All rights reserved. Use of this source code is governed by a
|
| // BSD-style license that can be found in the LICENSE file.
|
|
|
| -@patch
|
| -class SecureSocket {
|
| - @patch
|
| - factory SecureSocket._(RawSecureSocket rawSocket) =>
|
| +@patch class SecureSocket {
|
| + @patch factory SecureSocket._(RawSecureSocket rawSocket) =>
|
| new _SecureSocket(rawSocket);
|
| }
|
|
|
| -@patch
|
| -class _SecureFilter {
|
| - @patch
|
| - factory _SecureFilter() => new _SecureFilterImpl();
|
| +
|
| +@patch class _SecureFilter {
|
| + @patch factory _SecureFilter() => new _SecureFilterImpl();
|
| }
|
|
|
| -@patch
|
| -class X509Certificate {
|
| - @patch
|
| - factory X509Certificate._() => new _X509CertificateImpl();
|
| +@patch class X509Certificate {
|
| + @patch factory X509Certificate._() => new _X509CertificateImpl();
|
| }
|
|
|
| class _SecureSocket extends _Socket implements SecureSocket {
|
| @@ -31,31 +26,30 @@ class _SecureSocket extends _Socket implements SecureSocket {
|
| _raw.onBadCertificate = callback;
|
| }
|
|
|
| - void renegotiate(
|
| - {bool useSessionCache: true,
|
| - bool requestClientCertificate: false,
|
| - bool requireClientCertificate: false}) {
|
| - _raw.renegotiate(
|
| - useSessionCache: useSessionCache,
|
| - requestClientCertificate: requestClientCertificate,
|
| - requireClientCertificate: requireClientCertificate);
|
| + void renegotiate({bool useSessionCache: true,
|
| + bool requestClientCertificate: false,
|
| + bool requireClientCertificate: false}) {
|
| + _raw.renegotiate(useSessionCache: useSessionCache,
|
| + requestClientCertificate: requestClientCertificate,
|
| + requireClientCertificate: requireClientCertificate);
|
| }
|
|
|
| X509Certificate get peerCertificate {
|
| if (_raw == null) {
|
| - throw new StateError("peerCertificate called on destroyed SecureSocket");
|
| + throw new StateError("peerCertificate called on destroyed SecureSocket");
|
| }
|
| return _raw.peerCertificate;
|
| }
|
|
|
| String get selectedProtocol {
|
| if (_raw == null) {
|
| - throw new StateError("selectedProtocol called on destroyed SecureSocket");
|
| + throw new StateError("selectedProtocol called on destroyed SecureSocket");
|
| }
|
| return _raw.selectedProtocol;
|
| }
|
| }
|
|
|
| +
|
| /**
|
| * _SecureFilterImpl wraps a filter that encrypts and decrypts data travelling
|
| * over an encrypted socket. The filter also handles the handshaking
|
| @@ -65,7 +59,8 @@ class _SecureSocket extends _Socket implements SecureSocket {
|
| * are backed by an external C array of bytes, so that both Dart code and
|
| * native code can access the same data.
|
| */
|
| -class _SecureFilterImpl extends NativeFieldWrapperClass1
|
| +class _SecureFilterImpl
|
| + extends NativeFieldWrapperClass1
|
| implements _SecureFilter {
|
| // Performance is improved if a full buffer of plaintext fits
|
| // in the encrypted buffer, when encrypted.
|
| @@ -75,18 +70,18 @@ class _SecureFilterImpl extends NativeFieldWrapperClass1
|
| _SecureFilterImpl() {
|
| buffers = new List<_ExternalBuffer>(_RawSecureSocket.NUM_BUFFERS);
|
| for (int i = 0; i < _RawSecureSocket.NUM_BUFFERS; ++i) {
|
| - buffers[i] = new _ExternalBuffer(
|
| - _RawSecureSocket._isBufferEncrypted(i) ? ENCRYPTED_SIZE : SIZE);
|
| + buffers[i] = new _ExternalBuffer(_RawSecureSocket._isBufferEncrypted(i) ?
|
| + ENCRYPTED_SIZE :
|
| + SIZE);
|
| }
|
| }
|
|
|
| - void connect(
|
| - String hostName,
|
| - SecurityContext context,
|
| - bool is_server,
|
| - bool requestClientCertificate,
|
| - bool requireClientCertificate,
|
| - Uint8List protocols) native "SecureSocket_Connect";
|
| + void connect(String hostName,
|
| + SecurityContext context,
|
| + bool is_server,
|
| + bool requestClientCertificate,
|
| + bool requireClientCertificate,
|
| + Uint8List protocols) native "SecureSocket_Connect";
|
|
|
| void destroy() {
|
| buffers = null;
|
| @@ -99,8 +94,10 @@ class _SecureFilterImpl extends NativeFieldWrapperClass1
|
|
|
| String selectedProtocol() native "SecureSocket_GetSelectedProtocol";
|
|
|
| - void renegotiate(bool useSessionCache, bool requestClientCertificate,
|
| - bool requireClientCertificate) native "SecureSocket_Renegotiate";
|
| + void renegotiate(bool useSessionCache,
|
| + bool requestClientCertificate,
|
| + bool requireClientCertificate)
|
| + native "SecureSocket_Renegotiate";
|
|
|
| void init() native "SecureSocket_Init";
|
|
|
| @@ -118,25 +115,22 @@ class _SecureFilterImpl extends NativeFieldWrapperClass1
|
| List<_ExternalBuffer> buffers;
|
| }
|
|
|
| -@patch
|
| -class SecurityContext {
|
| - @patch
|
| - factory SecurityContext() {
|
| +@patch class SecurityContext {
|
| + @patch factory SecurityContext() {
|
| return new _SecurityContext();
|
| }
|
|
|
| - @patch
|
| - static SecurityContext get defaultContext {
|
| + @patch static SecurityContext get defaultContext {
|
| return _SecurityContext.defaultContext;
|
| }
|
|
|
| - @patch
|
| - static bool get alpnSupported {
|
| + @patch static bool get alpnSupported {
|
| return _SecurityContext.alpnSupported;
|
| }
|
| }
|
|
|
| -class _SecurityContext extends NativeFieldWrapperClass1
|
| +class _SecurityContext
|
| + extends NativeFieldWrapperClass1
|
| implements SecurityContext {
|
| _SecurityContext() {
|
| _createNativeContext();
|
| @@ -144,14 +138,13 @@ class _SecurityContext extends NativeFieldWrapperClass1
|
|
|
| void _createNativeContext() native "SecurityContext_Allocate";
|
|
|
| - static final SecurityContext defaultContext = new _SecurityContext()
|
| - .._trustBuiltinRoots();
|
| + static final SecurityContext defaultContext =
|
| + new _SecurityContext().._trustBuiltinRoots();
|
|
|
| void usePrivateKey(String file, {String password}) {
|
| List<int> bytes = (new File(file)).readAsBytesSync();
|
| usePrivateKeyBytes(bytes, password: password);
|
| }
|
| -
|
| void usePrivateKeyBytes(List<int> keyBytes, {String password})
|
| native "SecurityContext_UsePrivateKeyBytes";
|
|
|
| @@ -159,7 +152,6 @@ class _SecurityContext extends NativeFieldWrapperClass1
|
| List<int> bytes = (new File(file)).readAsBytesSync();
|
| setTrustedCertificatesBytes(bytes, password: password);
|
| }
|
| -
|
| void setTrustedCertificatesBytes(List<int> certBytes, {String password})
|
| native "SecurityContext_SetTrustedCertificatesBytes";
|
|
|
| @@ -167,7 +159,6 @@ class _SecurityContext extends NativeFieldWrapperClass1
|
| List<int> bytes = (new File(file)).readAsBytesSync();
|
| useCertificateChainBytes(bytes, password: password);
|
| }
|
| -
|
| void useCertificateChainBytes(List<int> chainBytes, {String password})
|
| native "SecurityContext_UseCertificateChainBytes";
|
|
|
| @@ -175,7 +166,6 @@ class _SecurityContext extends NativeFieldWrapperClass1
|
| List<int> bytes = (new File(file)).readAsBytesSync();
|
| setClientAuthoritiesBytes(bytes, password: password);
|
| }
|
| -
|
| void setClientAuthoritiesBytes(List<int> authCertBytes, {String password})
|
| native "SecurityContext_SetClientAuthoritiesBytes";
|
|
|
| @@ -186,10 +176,10 @@ class _SecurityContext extends NativeFieldWrapperClass1
|
| SecurityContext._protocolsToLengthEncoding(protocols);
|
| _setAlpnProtocols(encodedProtocols, isServer);
|
| }
|
| -
|
| void _setAlpnProtocols(Uint8List protocols, bool isServer)
|
| native "SecurityContext_SetAlpnProtocols";
|
| - void _trustBuiltinRoots() native "SecurityContext_TrustBuiltinRoots";
|
| + void _trustBuiltinRoots()
|
| + native "SecurityContext_TrustBuiltinRoots";
|
| }
|
|
|
| /**
|
| @@ -206,13 +196,12 @@ class _X509CertificateImpl extends NativeFieldWrapperClass1
|
| String get issuer native "X509_Issuer";
|
| DateTime get startValidity {
|
| return new DateTime.fromMillisecondsSinceEpoch(_startValidity(),
|
| - isUtc: true);
|
| + isUtc: true);
|
| }
|
| -
|
| DateTime get endValidity {
|
| - return new DateTime.fromMillisecondsSinceEpoch(_endValidity(), isUtc: true);
|
| + return new DateTime.fromMillisecondsSinceEpoch(_endValidity(),
|
| + isUtc: true);
|
| }
|
| -
|
| int _startValidity() native "X509_StartValidity";
|
| int _endValidity() native "X509_EndValidity";
|
| }
|
|
|