[html5] r1843 - [] (0) Handle TLS errors in the Web Socket Protocol. (and minor editorial fixes)

whatwg at whatwg.org whatwg at whatwg.org
Thu Jul 3 02:05:57 PDT 2008


Author: ianh
Date: 2008-07-03 02:05:56 -0700 (Thu, 03 Jul 2008)
New Revision: 1843

Modified:
   index
   source
Log:
[] (0) Handle TLS errors in the Web Socket Protocol. (and minor editorial fixes)

Modified: index
===================================================================
--- index	2008-07-03 09:03:17 UTC (rev 1842)
+++ index	2008-07-03 09:05:56 UTC (rev 1843)
@@ -41507,7 +41507,7 @@
    <li>
     <p>If the user agent is configured to use a proxy to connect to port <var
      title="">port</var>, then connect to that proxy and ask it to open a
-     TCP/IP connection to the host given by <var title="">host</var> to the
+     TCP/IP connection to the host given by <var title="">host</var> and the
      port given by <var title="">port</var>.</p>
 
     <div class=example>
@@ -41525,7 +41525,7 @@
 
     <p>Otherwise, if the user agent is not configured to use a proxy, then
      open a TCP/IP connection to the host given by <var title="">host</var>
-     to the port given by <var title="">port</var>.</p>
+     and the port given by <var title="">port</var>.</p>
 
    <li>
     <p>If the connection could not be opened, then <a href="#fail-the">fail
@@ -41533,8 +41533,11 @@
 
    <li>
     <p>If <var title="">secure</var> is true, perform a TLS handshake over
-     the connection. All further communication on this channel must run
-     through the encrypted tunnel. <a href="#refsRFC2246">[RFC2246]</a>
+     the connection. If this fails (e.g. the server's certificate could not
+     be verified), then <a href="#fail-the">fail the Web Socket
+     connection</a> and abort these steps. Otherwise, all further
+     communication on this channel must run through the encrypted tunnel. <a
+     href="#refsRFC2246">[RFC2246]</a>
 
    <li>
     <p>Send the following bytes to the remote side (the server):</p>

Modified: source
===================================================================
--- source	2008-07-03 09:03:17 UTC (rev 1842)
+++ source	2008-07-03 09:05:56 UTC (rev 1843)
@@ -39063,7 +39063,7 @@
     <p>If the user agent is configured to use a proxy to connect to
     port <var title="">port</var>, then connect to that proxy and ask
     it to open a TCP/IP connection to the host given by <var
-    title="">host</var> to the port given by <var
+    title="">host</var> and the port given by <var
     title="">port</var>.</p>
 
     <div class="example">
@@ -39083,7 +39083,7 @@
 
     <p>Otherwise, if the user agent is not configured to use a proxy,
     then open a TCP/IP connection to the host given by <var
-    title="">host</var> to the port given by <var
+    title="">host</var> and the port given by <var
     title="">port</var>.</p>
 
    </li>
@@ -39092,9 +39092,11 @@
    Web Socket connection</span> and abort these steps.</p></li>
 
    <li><p>If <var title="">secure</var> is true, perform a TLS
-   handshake over the connection. All further communication on this
-   channel must run through the encrypted tunnel. <a
-   href="#refsRFC2246">[RFC2246]</a></p></li>
+   handshake over the connection. If this fails (e.g. the server's
+   certificate could not be verified), then <span>fail the Web Socket
+   connection</span> and abort these steps. Otherwise, all further
+   communication on this channel must run through the encrypted
+   tunnel. <a href="#refsRFC2246">[RFC2246]</a></p></li>
 
    <li>
 




More information about the Commit-Watchers mailing list