OLD | NEW |
1 // Copyright (c) 2012, the Dart project authors. Please see the AUTHORS file | 1 // Copyright (c) 2012, the Dart project authors. Please see the AUTHORS file |
2 // for details. All rights reserved. Use of this source code is governed by a | 2 // for details. All rights reserved. Use of this source code is governed by a |
3 // BSD-style license that can be found in the LICENSE file. | 3 // BSD-style license that can be found in the LICENSE file. |
4 | 4 |
5 part of dart.io; | 5 part of dart.io; |
6 | 6 |
7 /** | 7 /** |
8 * The [SecureServerSocket] is a server socket, providing a stream of high-level | 8 * The [SecureServerSocket] is a server socket, providing a stream of high-level |
9 * [Socket]s. | 9 * [Socket]s. |
10 * | 10 * |
(...skipping 165 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
176 * [address] must be given as a numeric address, not a host name. | 176 * [address] must be given as a numeric address, not a host name. |
177 * | 177 * |
178 * To request or require that clients authenticate by providing an SSL (TLS) | 178 * To request or require that clients authenticate by providing an SSL (TLS) |
179 * client certificate, set the optional parameters requestClientCertificate or | 179 * client certificate, set the optional parameters requestClientCertificate or |
180 * requireClientCertificate to true. Require implies request, so one doesn't | 180 * requireClientCertificate to true. Require implies request, so one doesn't |
181 * need to specify both. To check whether a client certificate was received, | 181 * need to specify both. To check whether a client certificate was received, |
182 * check SecureSocket.peerCertificate after connecting. If no certificate | 182 * check SecureSocket.peerCertificate after connecting. If no certificate |
183 * was received, the result will be null. | 183 * was received, the result will be null. |
184 * | 184 * |
185 * [supportedProtocols] is an optional list of protocols (in decreasing | 185 * [supportedProtocols] is an optional list of protocols (in decreasing |
186 * order of preference) to use during the ALPN protocol negogiation with | 186 * order of preference) to use during the ALPN protocol negotiation with |
187 * clients. Example values are "http/1.1" or "h2". The selected protocol | 187 * clients. Example values are "http/1.1" or "h2". The selected protocol |
188 * can be obtained via [RawSecureSocket.selectedProtocol]. | 188 * can be obtained via [RawSecureSocket.selectedProtocol]. |
189 * | 189 * |
190 * The optional argument [shared] specifies whether additional | 190 * The optional argument [shared] specifies whether additional |
191 * RawSecureServerSocket objects can bind to the same combination of | 191 * RawSecureServerSocket objects can bind to the same combination of |
192 * `address`, `port` and `v6Only`. If `shared` is `true` and more | 192 * `address`, `port` and `v6Only`. If `shared` is `true` and more |
193 * `RawSecureServerSocket`s from this isolate or other isolates are bound to | 193 * `RawSecureServerSocket`s from this isolate or other isolates are bound to |
194 * the port, then the incoming connections will be distributed among all the | 194 * the port, then the incoming connections will be distributed among all the |
195 * bound `RawSecureServerSocket`s. Connections can be distributed over | 195 * bound `RawSecureServerSocket`s. Connections can be distributed over |
196 * multiple isolates this way. | 196 * multiple isolates this way. |
(...skipping 85 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
282 onError: _controller.addError, onDone: _controller.close); | 282 onError: _controller.addError, onDone: _controller.close); |
283 } else { | 283 } else { |
284 close(); | 284 close(); |
285 } | 285 } |
286 } | 286 } |
287 | 287 |
288 void set _owner(owner) { | 288 void set _owner(owner) { |
289 (_socket as dynamic)._owner = owner; | 289 (_socket as dynamic)._owner = owner; |
290 } | 290 } |
291 } | 291 } |
OLD | NEW |