| OLD | NEW |
| 1 // Copyright (c) 2012, the Dart project authors. Please see the AUTHORS file | 1 // Copyright (c) 2012, the Dart project authors. Please see the AUTHORS file |
| 2 // for details. All rights reserved. Use of this source code is governed by a | 2 // for details. All rights reserved. Use of this source code is governed by a |
| 3 // BSD-style license that can be found in the LICENSE file. | 3 // BSD-style license that can be found in the LICENSE file. |
| 4 | 4 |
| 5 part of dart.io; | 5 part of dart.io; |
| 6 | 6 |
| 7 /** | 7 /** |
| 8 * The [SecureServerSocket] is a server socket, providing a stream of high-level | 8 * The [SecureServerSocket] is a server socket, providing a stream of high-level |
| 9 * [Socket]s. | 9 * [Socket]s. |
| 10 * | 10 * |
| (...skipping 29 matching lines...) Expand all Loading... |
| 40 * value of [:0:] (the default) a reasonable value will be chosen by | 40 * value of [:0:] (the default) a reasonable value will be chosen by |
| 41 * the system. | 41 * the system. |
| 42 * | 42 * |
| 43 * Incoming client connections are promoted to secure connections, using | 43 * Incoming client connections are promoted to secure connections, using |
| 44 * the server certificate given by [certificateName]. | 44 * the server certificate given by [certificateName]. |
| 45 * | 45 * |
| 46 * [address] must be given as a numeric address, not a host name. | 46 * [address] must be given as a numeric address, not a host name. |
| 47 * | 47 * |
| 48 * [certificateName] is the nickname or the distinguished name (DN) of | 48 * [certificateName] is the nickname or the distinguished name (DN) of |
| 49 * the certificate in the certificate database. It is looked up in the | 49 * the certificate in the certificate database. It is looked up in the |
| 50 * NSS certificate database set by SecureSocket.setCertificateDatabase. | 50 * NSS certificate database set by SecureSocket.initialize. |
| 51 * If [certificateName] contains "CN=", it is assumed to be a distinguished | 51 * If [certificateName] contains "CN=", it is assumed to be a distinguished |
| 52 * name. Otherwise, it is looked up as a nickname. | 52 * name. Otherwise, it is looked up as a nickname. |
| 53 * | 53 * |
| 54 * To request or require that clients authenticate by providing an SSL (TLS) | 54 * To request or require that clients authenticate by providing an SSL (TLS) |
| 55 * client certificate, set the optional parameter [requestClientCertificate] | 55 * client certificate, set the optional parameter [requestClientCertificate] |
| 56 * or [requireClientCertificate] to true. Requiring a certificate implies | 56 * or [requireClientCertificate] to true. Requiring a certificate implies |
| 57 * requesting a certificate, so one doesn't need to set both to true. | 57 * requesting a certificate, so one doesn't need to set both to true. |
| 58 * To check whether a client certificate was received, check | 58 * To check whether a client certificate was received, check |
| 59 * SecureSocket.peerCertificate after connecting. If no certificate | 59 * SecureSocket.peerCertificate after connecting. If no certificate |
| 60 * was received, the result will be null. | 60 * was received, the result will be null. |
| (...skipping 217 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 278 onError: _onError); | 278 onError: _onError); |
| 279 } else { | 279 } else { |
| 280 close(); | 280 close(); |
| 281 } | 281 } |
| 282 } | 282 } |
| 283 | 283 |
| 284 void set _owner(owner) { (_socket as dynamic)._owner = owner; } | 284 void set _owner(owner) { (_socket as dynamic)._owner = owner; } |
| 285 } | 285 } |
| 286 | 286 |
| 287 | 287 |
| OLD | NEW |