You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					4283 lines
				
				130 KiB
			
		
		
			
		
	
	
					4283 lines
				
				130 KiB
			| 
								 
											2 years ago
										 
									 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * A Javascript implementation of Transport Layer Security (TLS).
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @author Dave Longley
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Copyright (c) 2009-2014 Digital Bazaar, Inc.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The TLS Handshake Protocol involves the following steps:
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * - Exchange hello messages to agree on algorithms, exchange random values,
							 | 
						||
| 
								 | 
							
								 * and check for session resumption.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * - Exchange the necessary cryptographic parameters to allow the client and
							 | 
						||
| 
								 | 
							
								 * server to agree on a premaster secret.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * - Exchange certificates and cryptographic information to allow the client
							 | 
						||
| 
								 | 
							
								 * and server to authenticate themselves.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * - Generate a master secret from the premaster secret and exchanged random
							 | 
						||
| 
								 | 
							
								 * values.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * - Provide security parameters to the record layer.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * - Allow the client and server to verify that their peer has calculated the
							 | 
						||
| 
								 | 
							
								 * same security parameters and that the handshake occurred without tampering
							 | 
						||
| 
								 | 
							
								 * by an attacker.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Up to 4 different messages may be sent during a key exchange. The server
							 | 
						||
| 
								 | 
							
								 * certificate, the server key exchange, the client certificate, and the
							 | 
						||
| 
								 | 
							
								 * client key exchange.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * A typical handshake (from the client's perspective).
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * 1. Client sends ClientHello.
							 | 
						||
| 
								 | 
							
								 * 2. Client receives ServerHello.
							 | 
						||
| 
								 | 
							
								 * 3. Client receives optional Certificate.
							 | 
						||
| 
								 | 
							
								 * 4. Client receives optional ServerKeyExchange.
							 | 
						||
| 
								 | 
							
								 * 5. Client receives ServerHelloDone.
							 | 
						||
| 
								 | 
							
								 * 6. Client sends optional Certificate.
							 | 
						||
| 
								 | 
							
								 * 7. Client sends ClientKeyExchange.
							 | 
						||
| 
								 | 
							
								 * 8. Client sends optional CertificateVerify.
							 | 
						||
| 
								 | 
							
								 * 9. Client sends ChangeCipherSpec.
							 | 
						||
| 
								 | 
							
								 * 10. Client sends Finished.
							 | 
						||
| 
								 | 
							
								 * 11. Client receives ChangeCipherSpec.
							 | 
						||
| 
								 | 
							
								 * 12. Client receives Finished.
							 | 
						||
| 
								 | 
							
								 * 13. Client sends/receives application data.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * To reuse an existing session:
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * 1. Client sends ClientHello with session ID for reuse.
							 | 
						||
| 
								 | 
							
								 * 2. Client receives ServerHello with same session ID if reusing.
							 | 
						||
| 
								 | 
							
								 * 3. Client receives ChangeCipherSpec message if reusing.
							 | 
						||
| 
								 | 
							
								 * 4. Client receives Finished.
							 | 
						||
| 
								 | 
							
								 * 5. Client sends ChangeCipherSpec.
							 | 
						||
| 
								 | 
							
								 * 6. Client sends Finished.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Note: Client ignores HelloRequest if in the middle of a handshake.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Record Layer:
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The record layer fragments information blocks into TLSPlaintext records
							 | 
						||
| 
								 | 
							
								 * carrying data in chunks of 2^14 bytes or less. Client message boundaries are
							 | 
						||
| 
								 | 
							
								 * not preserved in the record layer (i.e., multiple client messages of the
							 | 
						||
| 
								 | 
							
								 * same ContentType MAY be coalesced into a single TLSPlaintext record, or a
							 | 
						||
| 
								 | 
							
								 * single message MAY be fragmented across several records).
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   uint8 major;
							 | 
						||
| 
								 | 
							
								 *   uint8 minor;
							 | 
						||
| 
								 | 
							
								 * } ProtocolVersion;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   ContentType type;
							 | 
						||
| 
								 | 
							
								 *   ProtocolVersion version;
							 | 
						||
| 
								 | 
							
								 *   uint16 length;
							 | 
						||
| 
								 | 
							
								 *   opaque fragment[TLSPlaintext.length];
							 | 
						||
| 
								 | 
							
								 * } TLSPlaintext;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * type:
							 | 
						||
| 
								 | 
							
								 *   The higher-level protocol used to process the enclosed fragment.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * version:
							 | 
						||
| 
								 | 
							
								 *   The version of the protocol being employed. TLS Version 1.2 uses version
							 | 
						||
| 
								 | 
							
								 *   {3, 3}. TLS Version 1.0 uses version {3, 1}. Note that a client that
							 | 
						||
| 
								 | 
							
								 *   supports multiple versions of TLS may not know what version will be
							 | 
						||
| 
								 | 
							
								 *   employed before it receives the ServerHello.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * length:
							 | 
						||
| 
								 | 
							
								 *   The length (in bytes) of the following TLSPlaintext.fragment. The length
							 | 
						||
| 
								 | 
							
								 *   MUST NOT exceed 2^14 = 16384 bytes.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * fragment:
							 | 
						||
| 
								 | 
							
								 *   The application data. This data is transparent and treated as an
							 | 
						||
| 
								 | 
							
								 *   independent block to be dealt with by the higher-level protocol specified
							 | 
						||
| 
								 | 
							
								 *   by the type field.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Implementations MUST NOT send zero-length fragments of Handshake, Alert, or
							 | 
						||
| 
								 | 
							
								 * ChangeCipherSpec content types. Zero-length fragments of Application data
							 | 
						||
| 
								 | 
							
								 * MAY be sent as they are potentially useful as a traffic analysis
							 | 
						||
| 
								 | 
							
								 * countermeasure.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Note: Data of different TLS record layer content types MAY be interleaved.
							 | 
						||
| 
								 | 
							
								 * Application data is generally of lower precedence for transmission than
							 | 
						||
| 
								 | 
							
								 * other content types. However, records MUST be delivered to the network in
							 | 
						||
| 
								 | 
							
								 * the same order as they are protected by the record layer. Recipients MUST
							 | 
						||
| 
								 | 
							
								 * receive and process interleaved application layer traffic during handshakes
							 | 
						||
| 
								 | 
							
								 * subsequent to the first one on a connection.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   ContentType type;       // same as TLSPlaintext.type
							 | 
						||
| 
								 | 
							
								 *   ProtocolVersion version;// same as TLSPlaintext.version
							 | 
						||
| 
								 | 
							
								 *   uint16 length;
							 | 
						||
| 
								 | 
							
								 *   opaque fragment[TLSCompressed.length];
							 | 
						||
| 
								 | 
							
								 * } TLSCompressed;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * length:
							 | 
						||
| 
								 | 
							
								 *   The length (in bytes) of the following TLSCompressed.fragment.
							 | 
						||
| 
								 | 
							
								 *   The length MUST NOT exceed 2^14 + 1024.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * fragment:
							 | 
						||
| 
								 | 
							
								 *   The compressed form of TLSPlaintext.fragment.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Note: A CompressionMethod.null operation is an identity operation; no fields
							 | 
						||
| 
								 | 
							
								 * are altered. In this implementation, since no compression is supported,
							 | 
						||
| 
								 | 
							
								 * uncompressed records are always the same as compressed records.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Encryption Information:
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The encryption and MAC functions translate a TLSCompressed structure into a
							 | 
						||
| 
								 | 
							
								 * TLSCiphertext. The decryption functions reverse the process. The MAC of the
							 | 
						||
| 
								 | 
							
								 * record also includes a sequence number so that missing, extra, or repeated
							 | 
						||
| 
								 | 
							
								 * messages are detectable.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   ContentType type;
							 | 
						||
| 
								 | 
							
								 *   ProtocolVersion version;
							 | 
						||
| 
								 | 
							
								 *   uint16 length;
							 | 
						||
| 
								 | 
							
								 *   select (SecurityParameters.cipher_type) {
							 | 
						||
| 
								 | 
							
								 *     case stream: GenericStreamCipher;
							 | 
						||
| 
								 | 
							
								 *     case block:  GenericBlockCipher;
							 | 
						||
| 
								 | 
							
								 *     case aead:   GenericAEADCipher;
							 | 
						||
| 
								 | 
							
								 *   } fragment;
							 | 
						||
| 
								 | 
							
								 * } TLSCiphertext;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * type:
							 | 
						||
| 
								 | 
							
								 *   The type field is identical to TLSCompressed.type.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * version:
							 | 
						||
| 
								 | 
							
								 *   The version field is identical to TLSCompressed.version.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * length:
							 | 
						||
| 
								 | 
							
								 *   The length (in bytes) of the following TLSCiphertext.fragment.
							 | 
						||
| 
								 | 
							
								 *   The length MUST NOT exceed 2^14 + 2048.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * fragment:
							 | 
						||
| 
								 | 
							
								 *   The encrypted form of TLSCompressed.fragment, with the MAC.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Note: Only CBC Block Ciphers are supported by this implementation.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The TLSCompressed.fragment structures are converted to/from block
							 | 
						||
| 
								 | 
							
								 * TLSCiphertext.fragment structures.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   opaque IV[SecurityParameters.record_iv_length];
							 | 
						||
| 
								 | 
							
								 *   block-ciphered struct {
							 | 
						||
| 
								 | 
							
								 *     opaque content[TLSCompressed.length];
							 | 
						||
| 
								 | 
							
								 *     opaque MAC[SecurityParameters.mac_length];
							 | 
						||
| 
								 | 
							
								 *     uint8 padding[GenericBlockCipher.padding_length];
							 | 
						||
| 
								 | 
							
								 *     uint8 padding_length;
							 | 
						||
| 
								 | 
							
								 *   };
							 | 
						||
| 
								 | 
							
								 * } GenericBlockCipher;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The MAC is generated as described in Section 6.2.3.1.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * IV:
							 | 
						||
| 
								 | 
							
								 *   The Initialization Vector (IV) SHOULD be chosen at random, and MUST be
							 | 
						||
| 
								 | 
							
								 *   unpredictable. Note that in versions of TLS prior to 1.1, there was no
							 | 
						||
| 
								 | 
							
								 *   IV field, and the last ciphertext block of the previous record (the "CBC
							 | 
						||
| 
								 | 
							
								 *   residue") was used as the IV. This was changed to prevent the attacks
							 | 
						||
| 
								 | 
							
								 *   described in [CBCATT]. For block ciphers, the IV length is of length
							 | 
						||
| 
								 | 
							
								 *   SecurityParameters.record_iv_length, which is equal to the
							 | 
						||
| 
								 | 
							
								 *   SecurityParameters.block_size.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * padding:
							 | 
						||
| 
								 | 
							
								 *   Padding that is added to force the length of the plaintext to be an
							 | 
						||
| 
								 | 
							
								 *   integral multiple of the block cipher's block length. The padding MAY be
							 | 
						||
| 
								 | 
							
								 *   any length up to 255 bytes, as long as it results in the
							 | 
						||
| 
								 | 
							
								 *   TLSCiphertext.length being an integral multiple of the block length.
							 | 
						||
| 
								 | 
							
								 *   Lengths longer than necessary might be desirable to frustrate attacks on
							 | 
						||
| 
								 | 
							
								 *   a protocol that are based on analysis of the lengths of exchanged
							 | 
						||
| 
								 | 
							
								 *   messages. Each uint8 in the padding data vector MUST be filled with the
							 | 
						||
| 
								 | 
							
								 *   padding length value. The receiver MUST check this padding and MUST use
							 | 
						||
| 
								 | 
							
								 *   the bad_record_mac alert to indicate padding errors.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * padding_length:
							 | 
						||
| 
								 | 
							
								 *   The padding length MUST be such that the total size of the
							 | 
						||
| 
								 | 
							
								 *   GenericBlockCipher structure is a multiple of the cipher's block length.
							 | 
						||
| 
								 | 
							
								 *   Legal values range from zero to 255, inclusive. This length specifies the
							 | 
						||
| 
								 | 
							
								 *   length of the padding field exclusive of the padding_length field itself.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The encrypted data length (TLSCiphertext.length) is one more than the sum of
							 | 
						||
| 
								 | 
							
								 * SecurityParameters.block_length, TLSCompressed.length,
							 | 
						||
| 
								 | 
							
								 * SecurityParameters.mac_length, and padding_length.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Example: If the block length is 8 bytes, the content length
							 | 
						||
| 
								 | 
							
								 * (TLSCompressed.length) is 61 bytes, and the MAC length is 20 bytes, then the
							 | 
						||
| 
								 | 
							
								 * length before padding is 82 bytes (this does not include the IV. Thus, the
							 | 
						||
| 
								 | 
							
								 * padding length modulo 8 must be equal to 6 in order to make the total length
							 | 
						||
| 
								 | 
							
								 * an even multiple of 8 bytes (the block length). The padding length can be
							 | 
						||
| 
								 | 
							
								 * 6, 14, 22, and so on, through 254. If the padding length were the minimum
							 | 
						||
| 
								 | 
							
								 * necessary, 6, the padding would be 6 bytes, each containing the value 6.
							 | 
						||
| 
								 | 
							
								 * Thus, the last 8 octets of the GenericBlockCipher before block encryption
							 | 
						||
| 
								 | 
							
								 * would be xx 06 06 06 06 06 06 06, where xx is the last octet of the MAC.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Note: With block ciphers in CBC mode (Cipher Block Chaining), it is critical
							 | 
						||
| 
								 | 
							
								 * that the entire plaintext of the record be known before any ciphertext is
							 | 
						||
| 
								 | 
							
								 * transmitted. Otherwise, it is possible for the attacker to mount the attack
							 | 
						||
| 
								 | 
							
								 * described in [CBCATT].
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Implementation note: Canvel et al. [CBCTIME] have demonstrated a timing
							 | 
						||
| 
								 | 
							
								 * attack on CBC padding based on the time required to compute the MAC. In
							 | 
						||
| 
								 | 
							
								 * order to defend against this attack, implementations MUST ensure that
							 | 
						||
| 
								 | 
							
								 * record processing time is essentially the same whether or not the padding
							 | 
						||
| 
								 | 
							
								 * is correct. In general, the best way to do this is to compute the MAC even
							 | 
						||
| 
								 | 
							
								 * if the padding is incorrect, and only then reject the packet. For instance,
							 | 
						||
| 
								 | 
							
								 * if the pad appears to be incorrect, the implementation might assume a
							 | 
						||
| 
								 | 
							
								 * zero-length pad and then compute the MAC. This leaves a small timing
							 | 
						||
| 
								 | 
							
								 * channel, since MAC performance depends, to some extent, on the size of the
							 | 
						||
| 
								 | 
							
								 * data fragment, but it is not believed to be large enough to be exploitable,
							 | 
						||
| 
								 | 
							
								 * due to the large block size of existing MACs and the small size of the
							 | 
						||
| 
								 | 
							
								 * timing signal.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								var forge = require('./forge');
							 | 
						||
| 
								 | 
							
								require('./asn1');
							 | 
						||
| 
								 | 
							
								require('./hmac');
							 | 
						||
| 
								 | 
							
								require('./md5');
							 | 
						||
| 
								 | 
							
								require('./pem');
							 | 
						||
| 
								 | 
							
								require('./pki');
							 | 
						||
| 
								 | 
							
								require('./random');
							 | 
						||
| 
								 | 
							
								require('./sha1');
							 | 
						||
| 
								 | 
							
								require('./util');
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Generates pseudo random bytes by mixing the result of two hash functions,
							 | 
						||
| 
								 | 
							
								 * MD5 and SHA-1.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * prf_TLS1(secret, label, seed) =
							 | 
						||
| 
								 | 
							
								 *   P_MD5(S1, label + seed) XOR P_SHA-1(S2, label + seed);
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Each P_hash function functions as follows:
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * P_hash(secret, seed) = HMAC_hash(secret, A(1) + seed) +
							 | 
						||
| 
								 | 
							
								 *                        HMAC_hash(secret, A(2) + seed) +
							 | 
						||
| 
								 | 
							
								 *                        HMAC_hash(secret, A(3) + seed) + ...
							 | 
						||
| 
								 | 
							
								 * A() is defined as:
							 | 
						||
| 
								 | 
							
								 *   A(0) = seed
							 | 
						||
| 
								 | 
							
								 *   A(i) = HMAC_hash(secret, A(i-1))
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The '+' operator denotes concatenation.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * As many iterations A(N) as are needed are performed to generate enough
							 | 
						||
| 
								 | 
							
								 * pseudo random byte output. If an iteration creates more data than is
							 | 
						||
| 
								 | 
							
								 * necessary, then it is truncated.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Therefore:
							 | 
						||
| 
								 | 
							
								 * A(1) = HMAC_hash(secret, A(0))
							 | 
						||
| 
								 | 
							
								 *      = HMAC_hash(secret, seed)
							 | 
						||
| 
								 | 
							
								 * A(2) = HMAC_hash(secret, A(1))
							 | 
						||
| 
								 | 
							
								 *      = HMAC_hash(secret, HMAC_hash(secret, seed))
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Therefore:
							 | 
						||
| 
								 | 
							
								 * P_hash(secret, seed) =
							 | 
						||
| 
								 | 
							
								 *   HMAC_hash(secret, HMAC_hash(secret, A(0)) + seed) +
							 | 
						||
| 
								 | 
							
								 *   HMAC_hash(secret, HMAC_hash(secret, A(1)) + seed) +
							 | 
						||
| 
								 | 
							
								 *   ...
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Therefore:
							 | 
						||
| 
								 | 
							
								 * P_hash(secret, seed) =
							 | 
						||
| 
								 | 
							
								 *   HMAC_hash(secret, HMAC_hash(secret, seed) + seed) +
							 | 
						||
| 
								 | 
							
								 *   HMAC_hash(secret, HMAC_hash(secret, HMAC_hash(secret, seed)) + seed) +
							 | 
						||
| 
								 | 
							
								 *   ...
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param secret the secret to use.
							 | 
						||
| 
								 | 
							
								 * @param label the label to use.
							 | 
						||
| 
								 | 
							
								 * @param seed the seed value to use.
							 | 
						||
| 
								 | 
							
								 * @param length the number of bytes to generate.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the pseudo random bytes in a byte buffer.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								var prf_TLS1 = function(secret, label, seed, length) {
							 | 
						||
| 
								 | 
							
								  var rval = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  /* For TLS 1.0, the secret is split in half, into two secrets of equal
							 | 
						||
| 
								 | 
							
								    length. If the secret has an odd length then the last byte of the first
							 | 
						||
| 
								 | 
							
								    half will be the same as the first byte of the second. The length of the
							 | 
						||
| 
								 | 
							
								    two secrets is half of the secret rounded up. */
							 | 
						||
| 
								 | 
							
								  var idx = (secret.length >> 1);
							 | 
						||
| 
								 | 
							
								  var slen = idx + (secret.length & 1);
							 | 
						||
| 
								 | 
							
								  var s1 = secret.substr(0, slen);
							 | 
						||
| 
								 | 
							
								  var s2 = secret.substr(idx, slen);
							 | 
						||
| 
								 | 
							
								  var ai = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  var hmac = forge.hmac.create();
							 | 
						||
| 
								 | 
							
								  seed = label + seed;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // determine the number of iterations that must be performed to generate
							 | 
						||
| 
								 | 
							
								  // enough output bytes, md5 creates 16 byte hashes, sha1 creates 20
							 | 
						||
| 
								 | 
							
								  var md5itr = Math.ceil(length / 16);
							 | 
						||
| 
								 | 
							
								  var sha1itr = Math.ceil(length / 20);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // do md5 iterations
							 | 
						||
| 
								 | 
							
								  hmac.start('MD5', s1);
							 | 
						||
| 
								 | 
							
								  var md5bytes = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  ai.putBytes(seed);
							 | 
						||
| 
								 | 
							
								  for(var i = 0; i < md5itr; ++i) {
							 | 
						||
| 
								 | 
							
								    // HMAC_hash(secret, A(i-1))
							 | 
						||
| 
								 | 
							
								    hmac.start(null, null);
							 | 
						||
| 
								 | 
							
								    hmac.update(ai.getBytes());
							 | 
						||
| 
								 | 
							
								    ai.putBuffer(hmac.digest());
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // HMAC_hash(secret, A(i) + seed)
							 | 
						||
| 
								 | 
							
								    hmac.start(null, null);
							 | 
						||
| 
								 | 
							
								    hmac.update(ai.bytes() + seed);
							 | 
						||
| 
								 | 
							
								    md5bytes.putBuffer(hmac.digest());
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // do sha1 iterations
							 | 
						||
| 
								 | 
							
								  hmac.start('SHA1', s2);
							 | 
						||
| 
								 | 
							
								  var sha1bytes = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  ai.clear();
							 | 
						||
| 
								 | 
							
								  ai.putBytes(seed);
							 | 
						||
| 
								 | 
							
								  for(var i = 0; i < sha1itr; ++i) {
							 | 
						||
| 
								 | 
							
								    // HMAC_hash(secret, A(i-1))
							 | 
						||
| 
								 | 
							
								    hmac.start(null, null);
							 | 
						||
| 
								 | 
							
								    hmac.update(ai.getBytes());
							 | 
						||
| 
								 | 
							
								    ai.putBuffer(hmac.digest());
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // HMAC_hash(secret, A(i) + seed)
							 | 
						||
| 
								 | 
							
								    hmac.start(null, null);
							 | 
						||
| 
								 | 
							
								    hmac.update(ai.bytes() + seed);
							 | 
						||
| 
								 | 
							
								    sha1bytes.putBuffer(hmac.digest());
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // XOR the md5 bytes with the sha1 bytes
							 | 
						||
| 
								 | 
							
								  rval.putBytes(forge.util.xorBytes(
							 | 
						||
| 
								 | 
							
								    md5bytes.getBytes(), sha1bytes.getBytes(), length));
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Generates pseudo random bytes using a SHA256 algorithm. For TLS 1.2.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param secret the secret to use.
							 | 
						||
| 
								 | 
							
								 * @param label the label to use.
							 | 
						||
| 
								 | 
							
								 * @param seed the seed value to use.
							 | 
						||
| 
								 | 
							
								 * @param length the number of bytes to generate.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the pseudo random bytes in a byte buffer.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								var prf_sha256 = function(secret, label, seed, length) {
							 | 
						||
| 
								 | 
							
								   // FIXME: implement me for TLS 1.2
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Gets a MAC for a record using the SHA-1 hash algorithm.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param key the mac key.
							 | 
						||
| 
								 | 
							
								 * @param state the sequence number (array of two 32-bit integers).
							 | 
						||
| 
								 | 
							
								 * @param record the record.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the sha-1 hash (20 bytes) for the given record.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								var hmac_sha1 = function(key, seqNum, record) {
							 | 
						||
| 
								 | 
							
								  /* MAC is computed like so:
							 | 
						||
| 
								 | 
							
								  HMAC_hash(
							 | 
						||
| 
								 | 
							
								    key, seqNum +
							 | 
						||
| 
								 | 
							
								      TLSCompressed.type +
							 | 
						||
| 
								 | 
							
								      TLSCompressed.version +
							 | 
						||
| 
								 | 
							
								      TLSCompressed.length +
							 | 
						||
| 
								 | 
							
								      TLSCompressed.fragment)
							 | 
						||
| 
								 | 
							
								  */
							 | 
						||
| 
								 | 
							
								  var hmac = forge.hmac.create();
							 | 
						||
| 
								 | 
							
								  hmac.start('SHA1', key);
							 | 
						||
| 
								 | 
							
								  var b = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  b.putInt32(seqNum[0]);
							 | 
						||
| 
								 | 
							
								  b.putInt32(seqNum[1]);
							 | 
						||
| 
								 | 
							
								  b.putByte(record.type);
							 | 
						||
| 
								 | 
							
								  b.putByte(record.version.major);
							 | 
						||
| 
								 | 
							
								  b.putByte(record.version.minor);
							 | 
						||
| 
								 | 
							
								  b.putInt16(record.length);
							 | 
						||
| 
								 | 
							
								  b.putBytes(record.fragment.bytes());
							 | 
						||
| 
								 | 
							
								  hmac.update(b.getBytes());
							 | 
						||
| 
								 | 
							
								  return hmac.digest().getBytes();
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Compresses the TLSPlaintext record into a TLSCompressed record using the
							 | 
						||
| 
								 | 
							
								 * deflate algorithm.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the TLS connection.
							 | 
						||
| 
								 | 
							
								 * @param record the TLSPlaintext record to compress.
							 | 
						||
| 
								 | 
							
								 * @param s the ConnectionState to use.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return true on success, false on failure.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								var deflate = function(c, record, s) {
							 | 
						||
| 
								 | 
							
								  var rval = false;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  try {
							 | 
						||
| 
								 | 
							
								    var bytes = c.deflate(record.fragment.getBytes());
							 | 
						||
| 
								 | 
							
								    record.fragment = forge.util.createBuffer(bytes);
							 | 
						||
| 
								 | 
							
								    record.length = bytes.length;
							 | 
						||
| 
								 | 
							
								    rval = true;
							 | 
						||
| 
								 | 
							
								  } catch(ex) {
							 | 
						||
| 
								 | 
							
								    // deflate error, fail out
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Decompresses the TLSCompressed record into a TLSPlaintext record using the
							 | 
						||
| 
								 | 
							
								 * deflate algorithm.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the TLS connection.
							 | 
						||
| 
								 | 
							
								 * @param record the TLSCompressed record to decompress.
							 | 
						||
| 
								 | 
							
								 * @param s the ConnectionState to use.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return true on success, false on failure.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								var inflate = function(c, record, s) {
							 | 
						||
| 
								 | 
							
								  var rval = false;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  try {
							 | 
						||
| 
								 | 
							
								    var bytes = c.inflate(record.fragment.getBytes());
							 | 
						||
| 
								 | 
							
								    record.fragment = forge.util.createBuffer(bytes);
							 | 
						||
| 
								 | 
							
								    record.length = bytes.length;
							 | 
						||
| 
								 | 
							
								    rval = true;
							 | 
						||
| 
								 | 
							
								  } catch(ex) {
							 | 
						||
| 
								 | 
							
								    // inflate error, fail out
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Reads a TLS variable-length vector from a byte buffer.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Variable-length vectors are defined by specifying a subrange of legal
							 | 
						||
| 
								 | 
							
								 * lengths, inclusively, using the notation <floor..ceiling>. When these are
							 | 
						||
| 
								 | 
							
								 * encoded, the actual length precedes the vector's contents in the byte
							 | 
						||
| 
								 | 
							
								 * stream. The length will be in the form of a number consuming as many bytes
							 | 
						||
| 
								 | 
							
								 * as required to hold the vector's specified maximum (ceiling) length. A
							 | 
						||
| 
								 | 
							
								 * variable-length vector with an actual length field of zero is referred to
							 | 
						||
| 
								 | 
							
								 * as an empty vector.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param b the byte buffer.
							 | 
						||
| 
								 | 
							
								 * @param lenBytes the number of bytes required to store the length.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the resulting byte buffer.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								var readVector = function(b, lenBytes) {
							 | 
						||
| 
								 | 
							
								  var len = 0;
							 | 
						||
| 
								 | 
							
								  switch(lenBytes) {
							 | 
						||
| 
								 | 
							
								  case 1:
							 | 
						||
| 
								 | 
							
								    len = b.getByte();
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case 2:
							 | 
						||
| 
								 | 
							
								    len = b.getInt16();
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case 3:
							 | 
						||
| 
								 | 
							
								    len = b.getInt24();
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case 4:
							 | 
						||
| 
								 | 
							
								    len = b.getInt32();
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // read vector bytes into a new buffer
							 | 
						||
| 
								 | 
							
								  return forge.util.createBuffer(b.getBytes(len));
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Writes a TLS variable-length vector to a byte buffer.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param b the byte buffer.
							 | 
						||
| 
								 | 
							
								 * @param lenBytes the number of bytes required to store the length.
							 | 
						||
| 
								 | 
							
								 * @param v the byte buffer vector.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								var writeVector = function(b, lenBytes, v) {
							 | 
						||
| 
								 | 
							
								  // encode length at the start of the vector, where the number of bytes for
							 | 
						||
| 
								 | 
							
								  // the length is the maximum number of bytes it would take to encode the
							 | 
						||
| 
								 | 
							
								  // vector's ceiling
							 | 
						||
| 
								 | 
							
								  b.putInt(v.length(), lenBytes << 3);
							 | 
						||
| 
								 | 
							
								  b.putBuffer(v);
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * The tls implementation.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								var tls = {};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Version: TLS 1.2 = 3.3, TLS 1.1 = 3.2, TLS 1.0 = 3.1. Both TLS 1.1 and
							 | 
						||
| 
								 | 
							
								 * TLS 1.2 were still too new (ie: openSSL didn't implement them) at the time
							 | 
						||
| 
								 | 
							
								 * of this implementation so TLS 1.0 was implemented instead.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.Versions = {
							 | 
						||
| 
								 | 
							
								  TLS_1_0: {major: 3, minor: 1},
							 | 
						||
| 
								 | 
							
								  TLS_1_1: {major: 3, minor: 2},
							 | 
						||
| 
								 | 
							
								  TLS_1_2: {major: 3, minor: 3}
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								tls.SupportedVersions = [
							 | 
						||
| 
								 | 
							
								  tls.Versions.TLS_1_1,
							 | 
						||
| 
								 | 
							
								  tls.Versions.TLS_1_0
							 | 
						||
| 
								 | 
							
								];
							 | 
						||
| 
								 | 
							
								tls.Version = tls.SupportedVersions[0];
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Maximum fragment size. True maximum is 16384, but we fragment before that
							 | 
						||
| 
								 | 
							
								 * to allow for unusual small increases during compression.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.MaxFragment = 16384 - 1024;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Whether this entity is considered the "client" or "server".
							 | 
						||
| 
								 | 
							
								 * enum { server, client } ConnectionEnd;
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.ConnectionEnd = {
							 | 
						||
| 
								 | 
							
								  server: 0,
							 | 
						||
| 
								 | 
							
								  client: 1
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Pseudo-random function algorithm used to generate keys from the master
							 | 
						||
| 
								 | 
							
								 * secret.
							 | 
						||
| 
								 | 
							
								 * enum { tls_prf_sha256 } PRFAlgorithm;
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.PRFAlgorithm = {
							 | 
						||
| 
								 | 
							
								  tls_prf_sha256: 0
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Bulk encryption algorithms.
							 | 
						||
| 
								 | 
							
								 * enum { null, rc4, des3, aes } BulkCipherAlgorithm;
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.BulkCipherAlgorithm = {
							 | 
						||
| 
								 | 
							
								  none: null,
							 | 
						||
| 
								 | 
							
								  rc4: 0,
							 | 
						||
| 
								 | 
							
								  des3: 1,
							 | 
						||
| 
								 | 
							
								  aes: 2
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Cipher types.
							 | 
						||
| 
								 | 
							
								 * enum { stream, block, aead } CipherType;
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.CipherType = {
							 | 
						||
| 
								 | 
							
								  stream: 0,
							 | 
						||
| 
								 | 
							
								  block: 1,
							 | 
						||
| 
								 | 
							
								  aead: 2
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * MAC (Message Authentication Code) algorithms.
							 | 
						||
| 
								 | 
							
								 * enum { null, hmac_md5, hmac_sha1, hmac_sha256,
							 | 
						||
| 
								 | 
							
								 *   hmac_sha384, hmac_sha512} MACAlgorithm;
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.MACAlgorithm = {
							 | 
						||
| 
								 | 
							
								  none: null,
							 | 
						||
| 
								 | 
							
								  hmac_md5: 0,
							 | 
						||
| 
								 | 
							
								  hmac_sha1: 1,
							 | 
						||
| 
								 | 
							
								  hmac_sha256: 2,
							 | 
						||
| 
								 | 
							
								  hmac_sha384: 3,
							 | 
						||
| 
								 | 
							
								  hmac_sha512: 4
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Compression algorithms.
							 | 
						||
| 
								 | 
							
								 * enum { null(0), deflate(1), (255) } CompressionMethod;
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.CompressionMethod = {
							 | 
						||
| 
								 | 
							
								  none: 0,
							 | 
						||
| 
								 | 
							
								  deflate: 1
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * TLS record content types.
							 | 
						||
| 
								 | 
							
								 * enum {
							 | 
						||
| 
								 | 
							
								 *   change_cipher_spec(20), alert(21), handshake(22),
							 | 
						||
| 
								 | 
							
								 *   application_data(23), (255)
							 | 
						||
| 
								 | 
							
								 * } ContentType;
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.ContentType = {
							 | 
						||
| 
								 | 
							
								  change_cipher_spec: 20,
							 | 
						||
| 
								 | 
							
								  alert: 21,
							 | 
						||
| 
								 | 
							
								  handshake: 22,
							 | 
						||
| 
								 | 
							
								  application_data: 23,
							 | 
						||
| 
								 | 
							
								  heartbeat: 24
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * TLS handshake types.
							 | 
						||
| 
								 | 
							
								 * enum {
							 | 
						||
| 
								 | 
							
								 *   hello_request(0), client_hello(1), server_hello(2),
							 | 
						||
| 
								 | 
							
								 *   certificate(11), server_key_exchange (12),
							 | 
						||
| 
								 | 
							
								 *   certificate_request(13), server_hello_done(14),
							 | 
						||
| 
								 | 
							
								 *   certificate_verify(15), client_key_exchange(16),
							 | 
						||
| 
								 | 
							
								 *   finished(20), (255)
							 | 
						||
| 
								 | 
							
								 * } HandshakeType;
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.HandshakeType = {
							 | 
						||
| 
								 | 
							
								  hello_request: 0,
							 | 
						||
| 
								 | 
							
								  client_hello: 1,
							 | 
						||
| 
								 | 
							
								  server_hello: 2,
							 | 
						||
| 
								 | 
							
								  certificate: 11,
							 | 
						||
| 
								 | 
							
								  server_key_exchange: 12,
							 | 
						||
| 
								 | 
							
								  certificate_request: 13,
							 | 
						||
| 
								 | 
							
								  server_hello_done: 14,
							 | 
						||
| 
								 | 
							
								  certificate_verify: 15,
							 | 
						||
| 
								 | 
							
								  client_key_exchange: 16,
							 | 
						||
| 
								 | 
							
								  finished: 20
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * TLS Alert Protocol.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * enum { warning(1), fatal(2), (255) } AlertLevel;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * enum {
							 | 
						||
| 
								 | 
							
								 *   close_notify(0),
							 | 
						||
| 
								 | 
							
								 *   unexpected_message(10),
							 | 
						||
| 
								 | 
							
								 *   bad_record_mac(20),
							 | 
						||
| 
								 | 
							
								 *   decryption_failed(21),
							 | 
						||
| 
								 | 
							
								 *   record_overflow(22),
							 | 
						||
| 
								 | 
							
								 *   decompression_failure(30),
							 | 
						||
| 
								 | 
							
								 *   handshake_failure(40),
							 | 
						||
| 
								 | 
							
								 *   bad_certificate(42),
							 | 
						||
| 
								 | 
							
								 *   unsupported_certificate(43),
							 | 
						||
| 
								 | 
							
								 *   certificate_revoked(44),
							 | 
						||
| 
								 | 
							
								 *   certificate_expired(45),
							 | 
						||
| 
								 | 
							
								 *   certificate_unknown(46),
							 | 
						||
| 
								 | 
							
								 *   illegal_parameter(47),
							 | 
						||
| 
								 | 
							
								 *   unknown_ca(48),
							 | 
						||
| 
								 | 
							
								 *   access_denied(49),
							 | 
						||
| 
								 | 
							
								 *   decode_error(50),
							 | 
						||
| 
								 | 
							
								 *   decrypt_error(51),
							 | 
						||
| 
								 | 
							
								 *   export_restriction(60),
							 | 
						||
| 
								 | 
							
								 *   protocol_version(70),
							 | 
						||
| 
								 | 
							
								 *   insufficient_security(71),
							 | 
						||
| 
								 | 
							
								 *   internal_error(80),
							 | 
						||
| 
								 | 
							
								 *   user_canceled(90),
							 | 
						||
| 
								 | 
							
								 *   no_renegotiation(100),
							 | 
						||
| 
								 | 
							
								 *   (255)
							 | 
						||
| 
								 | 
							
								 * } AlertDescription;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   AlertLevel level;
							 | 
						||
| 
								 | 
							
								 *   AlertDescription description;
							 | 
						||
| 
								 | 
							
								 * } Alert;
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.Alert = {};
							 | 
						||
| 
								 | 
							
								tls.Alert.Level = {
							 | 
						||
| 
								 | 
							
								  warning: 1,
							 | 
						||
| 
								 | 
							
								  fatal: 2
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								tls.Alert.Description = {
							 | 
						||
| 
								 | 
							
								  close_notify: 0,
							 | 
						||
| 
								 | 
							
								  unexpected_message: 10,
							 | 
						||
| 
								 | 
							
								  bad_record_mac: 20,
							 | 
						||
| 
								 | 
							
								  decryption_failed: 21,
							 | 
						||
| 
								 | 
							
								  record_overflow: 22,
							 | 
						||
| 
								 | 
							
								  decompression_failure: 30,
							 | 
						||
| 
								 | 
							
								  handshake_failure: 40,
							 | 
						||
| 
								 | 
							
								  bad_certificate: 42,
							 | 
						||
| 
								 | 
							
								  unsupported_certificate: 43,
							 | 
						||
| 
								 | 
							
								  certificate_revoked: 44,
							 | 
						||
| 
								 | 
							
								  certificate_expired: 45,
							 | 
						||
| 
								 | 
							
								  certificate_unknown: 46,
							 | 
						||
| 
								 | 
							
								  illegal_parameter: 47,
							 | 
						||
| 
								 | 
							
								  unknown_ca: 48,
							 | 
						||
| 
								 | 
							
								  access_denied: 49,
							 | 
						||
| 
								 | 
							
								  decode_error: 50,
							 | 
						||
| 
								 | 
							
								  decrypt_error: 51,
							 | 
						||
| 
								 | 
							
								  export_restriction: 60,
							 | 
						||
| 
								 | 
							
								  protocol_version: 70,
							 | 
						||
| 
								 | 
							
								  insufficient_security: 71,
							 | 
						||
| 
								 | 
							
								  internal_error: 80,
							 | 
						||
| 
								 | 
							
								  user_canceled: 90,
							 | 
						||
| 
								 | 
							
								  no_renegotiation: 100
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * TLS Heartbeat Message types.
							 | 
						||
| 
								 | 
							
								 * enum {
							 | 
						||
| 
								 | 
							
								 *   heartbeat_request(1),
							 | 
						||
| 
								 | 
							
								 *   heartbeat_response(2),
							 | 
						||
| 
								 | 
							
								 *   (255)
							 | 
						||
| 
								 | 
							
								 * } HeartbeatMessageType;
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.HeartbeatMessageType = {
							 | 
						||
| 
								 | 
							
								  heartbeat_request: 1,
							 | 
						||
| 
								 | 
							
								  heartbeat_response: 2
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Supported cipher suites.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.CipherSuites = {};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Gets a supported cipher suite from its 2 byte ID.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param twoBytes two bytes in a string.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the matching supported cipher suite or null.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.getCipherSuite = function(twoBytes) {
							 | 
						||
| 
								 | 
							
								  var rval = null;
							 | 
						||
| 
								 | 
							
								  for(var key in tls.CipherSuites) {
							 | 
						||
| 
								 | 
							
								    var cs = tls.CipherSuites[key];
							 | 
						||
| 
								 | 
							
								    if(cs.id[0] === twoBytes.charCodeAt(0) &&
							 | 
						||
| 
								 | 
							
								      cs.id[1] === twoBytes.charCodeAt(1)) {
							 | 
						||
| 
								 | 
							
								      rval = cs;
							 | 
						||
| 
								 | 
							
								      break;
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Called when an unexpected record is encountered.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param record the record.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.handleUnexpected = function(c, record) {
							 | 
						||
| 
								 | 
							
								  // if connection is client and closed, ignore unexpected messages
							 | 
						||
| 
								 | 
							
								  var ignore = (!c.open && c.entity === tls.ConnectionEnd.client);
							 | 
						||
| 
								 | 
							
								  if(!ignore) {
							 | 
						||
| 
								 | 
							
								    c.error(c, {
							 | 
						||
| 
								 | 
							
								      message: 'Unexpected message. Received TLS record out of order.',
							 | 
						||
| 
								 | 
							
								      send: true,
							 | 
						||
| 
								 | 
							
								      alert: {
							 | 
						||
| 
								 | 
							
								        level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								        description: tls.Alert.Description.unexpected_message
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Called when a client receives a HelloRequest record.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param record the record.
							 | 
						||
| 
								 | 
							
								 * @param length the length of the handshake message.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.handleHelloRequest = function(c, record, length) {
							 | 
						||
| 
								 | 
							
								  // ignore renegotiation requests from the server during a handshake, but
							 | 
						||
| 
								 | 
							
								  // if handshaking, send a warning alert that renegotation is denied
							 | 
						||
| 
								 | 
							
								  if(!c.handshaking && c.handshakes > 0) {
							 | 
						||
| 
								 | 
							
								    // send alert warning
							 | 
						||
| 
								 | 
							
								    tls.queue(c, tls.createAlert(c, {
							 | 
						||
| 
								 | 
							
								       level: tls.Alert.Level.warning,
							 | 
						||
| 
								 | 
							
								       description: tls.Alert.Description.no_renegotiation
							 | 
						||
| 
								 | 
							
								    }));
							 | 
						||
| 
								 | 
							
								    tls.flush(c);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // continue
							 | 
						||
| 
								 | 
							
								  c.process();
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Parses a hello message from a ClientHello or ServerHello record.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param record the record to parse.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the parsed message.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.parseHelloMessage = function(c, record, length) {
							 | 
						||
| 
								 | 
							
								  var msg = null;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  var client = (c.entity === tls.ConnectionEnd.client);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // minimum of 38 bytes in message
							 | 
						||
| 
								 | 
							
								  if(length < 38) {
							 | 
						||
| 
								 | 
							
								    c.error(c, {
							 | 
						||
| 
								 | 
							
								      message: client ?
							 | 
						||
| 
								 | 
							
								        'Invalid ServerHello message. Message too short.' :
							 | 
						||
| 
								 | 
							
								        'Invalid ClientHello message. Message too short.',
							 | 
						||
| 
								 | 
							
								      send: true,
							 | 
						||
| 
								 | 
							
								      alert: {
							 | 
						||
| 
								 | 
							
								        level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								        description: tls.Alert.Description.illegal_parameter
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								  } else {
							 | 
						||
| 
								 | 
							
								    // use 'remaining' to calculate # of remaining bytes in the message
							 | 
						||
| 
								 | 
							
								    var b = record.fragment;
							 | 
						||
| 
								 | 
							
								    var remaining = b.length();
							 | 
						||
| 
								 | 
							
								    msg = {
							 | 
						||
| 
								 | 
							
								      version: {
							 | 
						||
| 
								 | 
							
								        major: b.getByte(),
							 | 
						||
| 
								 | 
							
								        minor: b.getByte()
							 | 
						||
| 
								 | 
							
								      },
							 | 
						||
| 
								 | 
							
								      random: forge.util.createBuffer(b.getBytes(32)),
							 | 
						||
| 
								 | 
							
								      session_id: readVector(b, 1),
							 | 
						||
| 
								 | 
							
								      extensions: []
							 | 
						||
| 
								 | 
							
								    };
							 | 
						||
| 
								 | 
							
								    if(client) {
							 | 
						||
| 
								 | 
							
								      msg.cipher_suite = b.getBytes(2);
							 | 
						||
| 
								 | 
							
								      msg.compression_method = b.getByte();
							 | 
						||
| 
								 | 
							
								    } else {
							 | 
						||
| 
								 | 
							
								      msg.cipher_suites = readVector(b, 2);
							 | 
						||
| 
								 | 
							
								      msg.compression_methods = readVector(b, 1);
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // read extensions if there are any bytes left in the message
							 | 
						||
| 
								 | 
							
								    remaining = length - (remaining - b.length());
							 | 
						||
| 
								 | 
							
								    if(remaining > 0) {
							 | 
						||
| 
								 | 
							
								      // parse extensions
							 | 
						||
| 
								 | 
							
								      var exts = readVector(b, 2);
							 | 
						||
| 
								 | 
							
								      while(exts.length() > 0) {
							 | 
						||
| 
								 | 
							
								        msg.extensions.push({
							 | 
						||
| 
								 | 
							
								          type: [exts.getByte(), exts.getByte()],
							 | 
						||
| 
								 | 
							
								          data: readVector(exts, 2)
							 | 
						||
| 
								 | 
							
								        });
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // TODO: make extension support modular
							 | 
						||
| 
								 | 
							
								      if(!client) {
							 | 
						||
| 
								 | 
							
								        for(var i = 0; i < msg.extensions.length; ++i) {
							 | 
						||
| 
								 | 
							
								          var ext = msg.extensions[i];
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								          // support SNI extension
							 | 
						||
| 
								 | 
							
								          if(ext.type[0] === 0x00 && ext.type[1] === 0x00) {
							 | 
						||
| 
								 | 
							
								            // get server name list
							 | 
						||
| 
								 | 
							
								            var snl = readVector(ext.data, 2);
							 | 
						||
| 
								 | 
							
								            while(snl.length() > 0) {
							 | 
						||
| 
								 | 
							
								              // read server name type
							 | 
						||
| 
								 | 
							
								              var snType = snl.getByte();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								              // only HostName type (0x00) is known, break out if
							 | 
						||
| 
								 | 
							
								              // another type is detected
							 | 
						||
| 
								 | 
							
								              if(snType !== 0x00) {
							 | 
						||
| 
								 | 
							
								                break;
							 | 
						||
| 
								 | 
							
								              }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								              // add host name to server name list
							 | 
						||
| 
								 | 
							
								              c.session.extensions.server_name.serverNameList.push(
							 | 
						||
| 
								 | 
							
								                readVector(snl, 2).getBytes());
							 | 
						||
| 
								 | 
							
								            }
							 | 
						||
| 
								 | 
							
								          }
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // version already set, do not allow version change
							 | 
						||
| 
								 | 
							
								    if(c.session.version) {
							 | 
						||
| 
								 | 
							
								      if(msg.version.major !== c.session.version.major ||
							 | 
						||
| 
								 | 
							
								        msg.version.minor !== c.session.version.minor) {
							 | 
						||
| 
								 | 
							
								        return c.error(c, {
							 | 
						||
| 
								 | 
							
								          message: 'TLS version change is disallowed during renegotiation.',
							 | 
						||
| 
								 | 
							
								          send: true,
							 | 
						||
| 
								 | 
							
								          alert: {
							 | 
						||
| 
								 | 
							
								            level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								            description: tls.Alert.Description.protocol_version
							 | 
						||
| 
								 | 
							
								          }
							 | 
						||
| 
								 | 
							
								        });
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // get the chosen (ServerHello) cipher suite
							 | 
						||
| 
								 | 
							
								    if(client) {
							 | 
						||
| 
								 | 
							
								      // FIXME: should be checking configured acceptable cipher suites
							 | 
						||
| 
								 | 
							
								      c.session.cipherSuite = tls.getCipherSuite(msg.cipher_suite);
							 | 
						||
| 
								 | 
							
								    } else {
							 | 
						||
| 
								 | 
							
								      // get a supported preferred (ClientHello) cipher suite
							 | 
						||
| 
								 | 
							
								      // choose the first supported cipher suite
							 | 
						||
| 
								 | 
							
								      var tmp = forge.util.createBuffer(msg.cipher_suites.bytes());
							 | 
						||
| 
								 | 
							
								      while(tmp.length() > 0) {
							 | 
						||
| 
								 | 
							
								        // FIXME: should be checking configured acceptable suites
							 | 
						||
| 
								 | 
							
								        // cipher suites take up 2 bytes
							 | 
						||
| 
								 | 
							
								        c.session.cipherSuite = tls.getCipherSuite(tmp.getBytes(2));
							 | 
						||
| 
								 | 
							
								        if(c.session.cipherSuite !== null) {
							 | 
						||
| 
								 | 
							
								          break;
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // cipher suite not supported
							 | 
						||
| 
								 | 
							
								    if(c.session.cipherSuite === null) {
							 | 
						||
| 
								 | 
							
								      return c.error(c, {
							 | 
						||
| 
								 | 
							
								        message: 'No cipher suites in common.',
							 | 
						||
| 
								 | 
							
								        send: true,
							 | 
						||
| 
								 | 
							
								        alert: {
							 | 
						||
| 
								 | 
							
								          level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								          description: tls.Alert.Description.handshake_failure
							 | 
						||
| 
								 | 
							
								        },
							 | 
						||
| 
								 | 
							
								        cipherSuite: forge.util.bytesToHex(msg.cipher_suite)
							 | 
						||
| 
								 | 
							
								      });
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // TODO: handle compression methods
							 | 
						||
| 
								 | 
							
								    if(client) {
							 | 
						||
| 
								 | 
							
								      c.session.compressionMethod = msg.compression_method;
							 | 
						||
| 
								 | 
							
								    } else {
							 | 
						||
| 
								 | 
							
								      // no compression
							 | 
						||
| 
								 | 
							
								      c.session.compressionMethod = tls.CompressionMethod.none;
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  return msg;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Creates security parameters for the given connection based on the given
							 | 
						||
| 
								 | 
							
								 * hello message.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the TLS connection.
							 | 
						||
| 
								 | 
							
								 * @param msg the hello message.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.createSecurityParameters = function(c, msg) {
							 | 
						||
| 
								 | 
							
								  /* Note: security params are from TLS 1.2, some values like prf_algorithm
							 | 
						||
| 
								 | 
							
								  are ignored for TLS 1.0/1.1 and the builtin as specified in the spec is
							 | 
						||
| 
								 | 
							
								  used. */
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // TODO: handle other options from server when more supported
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // get client and server randoms
							 | 
						||
| 
								 | 
							
								  var client = (c.entity === tls.ConnectionEnd.client);
							 | 
						||
| 
								 | 
							
								  var msgRandom = msg.random.bytes();
							 | 
						||
| 
								 | 
							
								  var cRandom = client ? c.session.sp.client_random : msgRandom;
							 | 
						||
| 
								 | 
							
								  var sRandom = client ? msgRandom : tls.createRandom().getBytes();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // create new security parameters
							 | 
						||
| 
								 | 
							
								  c.session.sp = {
							 | 
						||
| 
								 | 
							
								    entity: c.entity,
							 | 
						||
| 
								 | 
							
								    prf_algorithm: tls.PRFAlgorithm.tls_prf_sha256,
							 | 
						||
| 
								 | 
							
								    bulk_cipher_algorithm: null,
							 | 
						||
| 
								 | 
							
								    cipher_type: null,
							 | 
						||
| 
								 | 
							
								    enc_key_length: null,
							 | 
						||
| 
								 | 
							
								    block_length: null,
							 | 
						||
| 
								 | 
							
								    fixed_iv_length: null,
							 | 
						||
| 
								 | 
							
								    record_iv_length: null,
							 | 
						||
| 
								 | 
							
								    mac_algorithm: null,
							 | 
						||
| 
								 | 
							
								    mac_length: null,
							 | 
						||
| 
								 | 
							
								    mac_key_length: null,
							 | 
						||
| 
								 | 
							
								    compression_algorithm: c.session.compressionMethod,
							 | 
						||
| 
								 | 
							
								    pre_master_secret: null,
							 | 
						||
| 
								 | 
							
								    master_secret: null,
							 | 
						||
| 
								 | 
							
								    client_random: cRandom,
							 | 
						||
| 
								 | 
							
								    server_random: sRandom
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Called when a client receives a ServerHello record.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * When a ServerHello message will be sent:
							 | 
						||
| 
								 | 
							
								 *   The server will send this message in response to a client hello message
							 | 
						||
| 
								 | 
							
								 *   when it was able to find an acceptable set of algorithms. If it cannot
							 | 
						||
| 
								 | 
							
								 *   find such a match, it will respond with a handshake failure alert.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * uint24 length;
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   ProtocolVersion server_version;
							 | 
						||
| 
								 | 
							
								 *   Random random;
							 | 
						||
| 
								 | 
							
								 *   SessionID session_id;
							 | 
						||
| 
								 | 
							
								 *   CipherSuite cipher_suite;
							 | 
						||
| 
								 | 
							
								 *   CompressionMethod compression_method;
							 | 
						||
| 
								 | 
							
								 *   select(extensions_present) {
							 | 
						||
| 
								 | 
							
								 *     case false:
							 | 
						||
| 
								 | 
							
								 *       struct {};
							 | 
						||
| 
								 | 
							
								 *     case true:
							 | 
						||
| 
								 | 
							
								 *       Extension extensions<0..2^16-1>;
							 | 
						||
| 
								 | 
							
								 *   };
							 | 
						||
| 
								 | 
							
								 * } ServerHello;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param record the record.
							 | 
						||
| 
								 | 
							
								 * @param length the length of the handshake message.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.handleServerHello = function(c, record, length) {
							 | 
						||
| 
								 | 
							
								  var msg = tls.parseHelloMessage(c, record, length);
							 | 
						||
| 
								 | 
							
								  if(c.fail) {
							 | 
						||
| 
								 | 
							
								    return;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // ensure server version is compatible
							 | 
						||
| 
								 | 
							
								  if(msg.version.minor <= c.version.minor) {
							 | 
						||
| 
								 | 
							
								    c.version.minor = msg.version.minor;
							 | 
						||
| 
								 | 
							
								  } else {
							 | 
						||
| 
								 | 
							
								    return c.error(c, {
							 | 
						||
| 
								 | 
							
								      message: 'Incompatible TLS version.',
							 | 
						||
| 
								 | 
							
								      send: true,
							 | 
						||
| 
								 | 
							
								      alert: {
							 | 
						||
| 
								 | 
							
								        level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								        description: tls.Alert.Description.protocol_version
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // indicate session version has been set
							 | 
						||
| 
								 | 
							
								  c.session.version = c.version;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // get the session ID from the message
							 | 
						||
| 
								 | 
							
								  var sessionId = msg.session_id.bytes();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // if the session ID is not blank and matches the cached one, resume
							 | 
						||
| 
								 | 
							
								  // the session
							 | 
						||
| 
								 | 
							
								  if(sessionId.length > 0 && sessionId === c.session.id) {
							 | 
						||
| 
								 | 
							
								    // resuming session, expect a ChangeCipherSpec next
							 | 
						||
| 
								 | 
							
								    c.expect = SCC;
							 | 
						||
| 
								 | 
							
								    c.session.resuming = true;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // get new server random
							 | 
						||
| 
								 | 
							
								    c.session.sp.server_random = msg.random.bytes();
							 | 
						||
| 
								 | 
							
								  } else {
							 | 
						||
| 
								 | 
							
								    // not resuming, expect a server Certificate message next
							 | 
						||
| 
								 | 
							
								    c.expect = SCE;
							 | 
						||
| 
								 | 
							
								    c.session.resuming = false;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // create new security parameters
							 | 
						||
| 
								 | 
							
								    tls.createSecurityParameters(c, msg);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // set new session ID
							 | 
						||
| 
								 | 
							
								  c.session.id = sessionId;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // continue
							 | 
						||
| 
								 | 
							
								  c.process();
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Called when a server receives a ClientHello record.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * When a ClientHello message will be sent:
							 | 
						||
| 
								 | 
							
								 *   When a client first connects to a server it is required to send the
							 | 
						||
| 
								 | 
							
								 *   client hello as its first message. The client can also send a client
							 | 
						||
| 
								 | 
							
								 *   hello in response to a hello request or on its own initiative in order
							 | 
						||
| 
								 | 
							
								 *   to renegotiate the security parameters in an existing connection.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param record the record.
							 | 
						||
| 
								 | 
							
								 * @param length the length of the handshake message.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.handleClientHello = function(c, record, length) {
							 | 
						||
| 
								 | 
							
								  var msg = tls.parseHelloMessage(c, record, length);
							 | 
						||
| 
								 | 
							
								  if(c.fail) {
							 | 
						||
| 
								 | 
							
								    return;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // get the session ID from the message
							 | 
						||
| 
								 | 
							
								  var sessionId = msg.session_id.bytes();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // see if the given session ID is in the cache
							 | 
						||
| 
								 | 
							
								  var session = null;
							 | 
						||
| 
								 | 
							
								  if(c.sessionCache) {
							 | 
						||
| 
								 | 
							
								    session = c.sessionCache.getSession(sessionId);
							 | 
						||
| 
								 | 
							
								    if(session === null) {
							 | 
						||
| 
								 | 
							
								      // session ID not found
							 | 
						||
| 
								 | 
							
								      sessionId = '';
							 | 
						||
| 
								 | 
							
								    } else if(session.version.major !== msg.version.major ||
							 | 
						||
| 
								 | 
							
								      session.version.minor > msg.version.minor) {
							 | 
						||
| 
								 | 
							
								      // if session version is incompatible with client version, do not resume
							 | 
						||
| 
								 | 
							
								      session = null;
							 | 
						||
| 
								 | 
							
								      sessionId = '';
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // no session found to resume, generate a new session ID
							 | 
						||
| 
								 | 
							
								  if(sessionId.length === 0) {
							 | 
						||
| 
								 | 
							
								    sessionId = forge.random.getBytes(32);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // update session
							 | 
						||
| 
								 | 
							
								  c.session.id = sessionId;
							 | 
						||
| 
								 | 
							
								  c.session.clientHelloVersion = msg.version;
							 | 
						||
| 
								 | 
							
								  c.session.sp = {};
							 | 
						||
| 
								 | 
							
								  if(session) {
							 | 
						||
| 
								 | 
							
								    // use version and security parameters from resumed session
							 | 
						||
| 
								 | 
							
								    c.version = c.session.version = session.version;
							 | 
						||
| 
								 | 
							
								    c.session.sp = session.sp;
							 | 
						||
| 
								 | 
							
								  } else {
							 | 
						||
| 
								 | 
							
								    // use highest compatible minor version
							 | 
						||
| 
								 | 
							
								    var version;
							 | 
						||
| 
								 | 
							
								    for(var i = 1; i < tls.SupportedVersions.length; ++i) {
							 | 
						||
| 
								 | 
							
								      version = tls.SupportedVersions[i];
							 | 
						||
| 
								 | 
							
								      if(version.minor <= msg.version.minor) {
							 | 
						||
| 
								 | 
							
								        break;
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								    c.version = {major: version.major, minor: version.minor};
							 | 
						||
| 
								 | 
							
								    c.session.version = c.version;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // if a session is set, resume it
							 | 
						||
| 
								 | 
							
								  if(session !== null) {
							 | 
						||
| 
								 | 
							
								    // resuming session, expect a ChangeCipherSpec next
							 | 
						||
| 
								 | 
							
								    c.expect = CCC;
							 | 
						||
| 
								 | 
							
								    c.session.resuming = true;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // get new client random
							 | 
						||
| 
								 | 
							
								    c.session.sp.client_random = msg.random.bytes();
							 | 
						||
| 
								 | 
							
								  } else {
							 | 
						||
| 
								 | 
							
								    // not resuming, expect a Certificate or ClientKeyExchange
							 | 
						||
| 
								 | 
							
								    c.expect = (c.verifyClient !== false) ? CCE : CKE;
							 | 
						||
| 
								 | 
							
								    c.session.resuming = false;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // create new security parameters
							 | 
						||
| 
								 | 
							
								    tls.createSecurityParameters(c, msg);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // connection now open
							 | 
						||
| 
								 | 
							
								  c.open = true;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // queue server hello
							 | 
						||
| 
								 | 
							
								  tls.queue(c, tls.createRecord(c, {
							 | 
						||
| 
								 | 
							
								    type: tls.ContentType.handshake,
							 | 
						||
| 
								 | 
							
								    data: tls.createServerHello(c)
							 | 
						||
| 
								 | 
							
								  }));
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  if(c.session.resuming) {
							 | 
						||
| 
								 | 
							
								    // queue change cipher spec message
							 | 
						||
| 
								 | 
							
								    tls.queue(c, tls.createRecord(c, {
							 | 
						||
| 
								 | 
							
								      type: tls.ContentType.change_cipher_spec,
							 | 
						||
| 
								 | 
							
								      data: tls.createChangeCipherSpec()
							 | 
						||
| 
								 | 
							
								    }));
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // create pending state
							 | 
						||
| 
								 | 
							
								    c.state.pending = tls.createConnectionState(c);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // change current write state to pending write state
							 | 
						||
| 
								 | 
							
								    c.state.current.write = c.state.pending.write;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // queue finished
							 | 
						||
| 
								 | 
							
								    tls.queue(c, tls.createRecord(c, {
							 | 
						||
| 
								 | 
							
								      type: tls.ContentType.handshake,
							 | 
						||
| 
								 | 
							
								      data: tls.createFinished(c)
							 | 
						||
| 
								 | 
							
								    }));
							 | 
						||
| 
								 | 
							
								  } else {
							 | 
						||
| 
								 | 
							
								    // queue server certificate
							 | 
						||
| 
								 | 
							
								    tls.queue(c, tls.createRecord(c, {
							 | 
						||
| 
								 | 
							
								      type: tls.ContentType.handshake,
							 | 
						||
| 
								 | 
							
								      data: tls.createCertificate(c)
							 | 
						||
| 
								 | 
							
								    }));
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    if(!c.fail) {
							 | 
						||
| 
								 | 
							
								      // queue server key exchange
							 | 
						||
| 
								 | 
							
								      tls.queue(c, tls.createRecord(c, {
							 | 
						||
| 
								 | 
							
								        type: tls.ContentType.handshake,
							 | 
						||
| 
								 | 
							
								        data: tls.createServerKeyExchange(c)
							 | 
						||
| 
								 | 
							
								      }));
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // request client certificate if set
							 | 
						||
| 
								 | 
							
								      if(c.verifyClient !== false) {
							 | 
						||
| 
								 | 
							
								        // queue certificate request
							 | 
						||
| 
								 | 
							
								        tls.queue(c, tls.createRecord(c, {
							 | 
						||
| 
								 | 
							
								          type: tls.ContentType.handshake,
							 | 
						||
| 
								 | 
							
								          data: tls.createCertificateRequest(c)
							 | 
						||
| 
								 | 
							
								        }));
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // queue server hello done
							 | 
						||
| 
								 | 
							
								      tls.queue(c, tls.createRecord(c, {
							 | 
						||
| 
								 | 
							
								        type: tls.ContentType.handshake,
							 | 
						||
| 
								 | 
							
								        data: tls.createServerHelloDone(c)
							 | 
						||
| 
								 | 
							
								      }));
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // send records
							 | 
						||
| 
								 | 
							
								  tls.flush(c);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // continue
							 | 
						||
| 
								 | 
							
								  c.process();
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Called when a client receives a Certificate record.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * When this message will be sent:
							 | 
						||
| 
								 | 
							
								 *   The server must send a certificate whenever the agreed-upon key exchange
							 | 
						||
| 
								 | 
							
								 *   method is not an anonymous one. This message will always immediately
							 | 
						||
| 
								 | 
							
								 *   follow the server hello message.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Meaning of this message:
							 | 
						||
| 
								 | 
							
								 *   The certificate type must be appropriate for the selected cipher suite's
							 | 
						||
| 
								 | 
							
								 *   key exchange algorithm, and is generally an X.509v3 certificate. It must
							 | 
						||
| 
								 | 
							
								 *   contain a key which matches the key exchange method, as follows. Unless
							 | 
						||
| 
								 | 
							
								 *   otherwise specified, the signing algorithm for the certificate must be
							 | 
						||
| 
								 | 
							
								 *   the same as the algorithm for the certificate key. Unless otherwise
							 | 
						||
| 
								 | 
							
								 *   specified, the public key may be of any length.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * opaque ASN.1Cert<1..2^24-1>;
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   ASN.1Cert certificate_list<1..2^24-1>;
							 | 
						||
| 
								 | 
							
								 * } Certificate;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param record the record.
							 | 
						||
| 
								 | 
							
								 * @param length the length of the handshake message.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.handleCertificate = function(c, record, length) {
							 | 
						||
| 
								 | 
							
								  // minimum of 3 bytes in message
							 | 
						||
| 
								 | 
							
								  if(length < 3) {
							 | 
						||
| 
								 | 
							
								    return c.error(c, {
							 | 
						||
| 
								 | 
							
								      message: 'Invalid Certificate message. Message too short.',
							 | 
						||
| 
								 | 
							
								      send: true,
							 | 
						||
| 
								 | 
							
								      alert: {
							 | 
						||
| 
								 | 
							
								        level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								        description: tls.Alert.Description.illegal_parameter
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  var b = record.fragment;
							 | 
						||
| 
								 | 
							
								  var msg = {
							 | 
						||
| 
								 | 
							
								    certificate_list: readVector(b, 3)
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  /* The sender's certificate will be first in the list (chain), each
							 | 
						||
| 
								 | 
							
								    subsequent one that follows will certify the previous one, but root
							 | 
						||
| 
								 | 
							
								    certificates (self-signed) that specify the certificate authority may
							 | 
						||
| 
								 | 
							
								    be omitted under the assumption that clients must already possess it. */
							 | 
						||
| 
								 | 
							
								  var cert, asn1;
							 | 
						||
| 
								 | 
							
								  var certs = [];
							 | 
						||
| 
								 | 
							
								  try {
							 | 
						||
| 
								 | 
							
								    while(msg.certificate_list.length() > 0) {
							 | 
						||
| 
								 | 
							
								      // each entry in msg.certificate_list is a vector with 3 len bytes
							 | 
						||
| 
								 | 
							
								      cert = readVector(msg.certificate_list, 3);
							 | 
						||
| 
								 | 
							
								      asn1 = forge.asn1.fromDer(cert);
							 | 
						||
| 
								 | 
							
								      cert = forge.pki.certificateFromAsn1(asn1, true);
							 | 
						||
| 
								 | 
							
								      certs.push(cert);
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  } catch(ex) {
							 | 
						||
| 
								 | 
							
								    return c.error(c, {
							 | 
						||
| 
								 | 
							
								      message: 'Could not parse certificate list.',
							 | 
						||
| 
								 | 
							
								      cause: ex,
							 | 
						||
| 
								 | 
							
								      send: true,
							 | 
						||
| 
								 | 
							
								      alert: {
							 | 
						||
| 
								 | 
							
								        level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								        description: tls.Alert.Description.bad_certificate
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // ensure at least 1 certificate was provided if in client-mode
							 | 
						||
| 
								 | 
							
								  // or if verifyClient was set to true to require a certificate
							 | 
						||
| 
								 | 
							
								  // (as opposed to 'optional')
							 | 
						||
| 
								 | 
							
								  var client = (c.entity === tls.ConnectionEnd.client);
							 | 
						||
| 
								 | 
							
								  if((client || c.verifyClient === true) && certs.length === 0) {
							 | 
						||
| 
								 | 
							
								    // error, no certificate
							 | 
						||
| 
								 | 
							
								    c.error(c, {
							 | 
						||
| 
								 | 
							
								      message: client ?
							 | 
						||
| 
								 | 
							
								        'No server certificate provided.' :
							 | 
						||
| 
								 | 
							
								        'No client certificate provided.',
							 | 
						||
| 
								 | 
							
								      send: true,
							 | 
						||
| 
								 | 
							
								      alert: {
							 | 
						||
| 
								 | 
							
								        level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								        description: tls.Alert.Description.illegal_parameter
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								  } else if(certs.length === 0) {
							 | 
						||
| 
								 | 
							
								    // no certs to verify
							 | 
						||
| 
								 | 
							
								    // expect a ServerKeyExchange or ClientKeyExchange message next
							 | 
						||
| 
								 | 
							
								    c.expect = client ? SKE : CKE;
							 | 
						||
| 
								 | 
							
								  } else {
							 | 
						||
| 
								 | 
							
								    // save certificate in session
							 | 
						||
| 
								 | 
							
								    if(client) {
							 | 
						||
| 
								 | 
							
								      c.session.serverCertificate = certs[0];
							 | 
						||
| 
								 | 
							
								    } else {
							 | 
						||
| 
								 | 
							
								      c.session.clientCertificate = certs[0];
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    if(tls.verifyCertificateChain(c, certs)) {
							 | 
						||
| 
								 | 
							
								      // expect a ServerKeyExchange or ClientKeyExchange message next
							 | 
						||
| 
								 | 
							
								      c.expect = client ? SKE : CKE;
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // continue
							 | 
						||
| 
								 | 
							
								  c.process();
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Called when a client receives a ServerKeyExchange record.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * When this message will be sent:
							 | 
						||
| 
								 | 
							
								 *   This message will be sent immediately after the server certificate
							 | 
						||
| 
								 | 
							
								 *   message (or the server hello message, if this is an anonymous
							 | 
						||
| 
								 | 
							
								 *   negotiation).
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 *   The server key exchange message is sent by the server only when the
							 | 
						||
| 
								 | 
							
								 *   server certificate message (if sent) does not contain enough data to
							 | 
						||
| 
								 | 
							
								 *   allow the client to exchange a premaster secret.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Meaning of this message:
							 | 
						||
| 
								 | 
							
								 *   This message conveys cryptographic information to allow the client to
							 | 
						||
| 
								 | 
							
								 *   communicate the premaster secret: either an RSA public key to encrypt
							 | 
						||
| 
								 | 
							
								 *   the premaster secret with, or a Diffie-Hellman public key with which the
							 | 
						||
| 
								 | 
							
								 *   client can complete a key exchange (with the result being the premaster
							 | 
						||
| 
								 | 
							
								 *   secret.)
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * enum {
							 | 
						||
| 
								 | 
							
								 *   dhe_dss, dhe_rsa, dh_anon, rsa, dh_dss, dh_rsa
							 | 
						||
| 
								 | 
							
								 * } KeyExchangeAlgorithm;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   opaque dh_p<1..2^16-1>;
							 | 
						||
| 
								 | 
							
								 *   opaque dh_g<1..2^16-1>;
							 | 
						||
| 
								 | 
							
								 *   opaque dh_Ys<1..2^16-1>;
							 | 
						||
| 
								 | 
							
								 * } ServerDHParams;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   select(KeyExchangeAlgorithm) {
							 | 
						||
| 
								 | 
							
								 *     case dh_anon:
							 | 
						||
| 
								 | 
							
								 *       ServerDHParams params;
							 | 
						||
| 
								 | 
							
								 *     case dhe_dss:
							 | 
						||
| 
								 | 
							
								 *     case dhe_rsa:
							 | 
						||
| 
								 | 
							
								 *       ServerDHParams params;
							 | 
						||
| 
								 | 
							
								 *       digitally-signed struct {
							 | 
						||
| 
								 | 
							
								 *         opaque client_random[32];
							 | 
						||
| 
								 | 
							
								 *         opaque server_random[32];
							 | 
						||
| 
								 | 
							
								 *         ServerDHParams params;
							 | 
						||
| 
								 | 
							
								 *       } signed_params;
							 | 
						||
| 
								 | 
							
								 *     case rsa:
							 | 
						||
| 
								 | 
							
								 *     case dh_dss:
							 | 
						||
| 
								 | 
							
								 *     case dh_rsa:
							 | 
						||
| 
								 | 
							
								 *       struct {};
							 | 
						||
| 
								 | 
							
								 *   };
							 | 
						||
| 
								 | 
							
								 * } ServerKeyExchange;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param record the record.
							 | 
						||
| 
								 | 
							
								 * @param length the length of the handshake message.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.handleServerKeyExchange = function(c, record, length) {
							 | 
						||
| 
								 | 
							
								  // this implementation only supports RSA, no Diffie-Hellman support
							 | 
						||
| 
								 | 
							
								  // so any length > 0 is invalid
							 | 
						||
| 
								 | 
							
								  if(length > 0) {
							 | 
						||
| 
								 | 
							
								    return c.error(c, {
							 | 
						||
| 
								 | 
							
								      message: 'Invalid key parameters. Only RSA is supported.',
							 | 
						||
| 
								 | 
							
								      send: true,
							 | 
						||
| 
								 | 
							
								      alert: {
							 | 
						||
| 
								 | 
							
								        level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								        description: tls.Alert.Description.unsupported_certificate
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // expect an optional CertificateRequest message next
							 | 
						||
| 
								 | 
							
								  c.expect = SCR;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // continue
							 | 
						||
| 
								 | 
							
								  c.process();
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Called when a client receives a ClientKeyExchange record.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param record the record.
							 | 
						||
| 
								 | 
							
								 * @param length the length of the handshake message.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.handleClientKeyExchange = function(c, record, length) {
							 | 
						||
| 
								 | 
							
								  // this implementation only supports RSA, no Diffie-Hellman support
							 | 
						||
| 
								 | 
							
								  // so any length < 48 is invalid
							 | 
						||
| 
								 | 
							
								  if(length < 48) {
							 | 
						||
| 
								 | 
							
								    return c.error(c, {
							 | 
						||
| 
								 | 
							
								      message: 'Invalid key parameters. Only RSA is supported.',
							 | 
						||
| 
								 | 
							
								      send: true,
							 | 
						||
| 
								 | 
							
								      alert: {
							 | 
						||
| 
								 | 
							
								        level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								        description: tls.Alert.Description.unsupported_certificate
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  var b = record.fragment;
							 | 
						||
| 
								 | 
							
								  var msg = {
							 | 
						||
| 
								 | 
							
								    enc_pre_master_secret: readVector(b, 2).getBytes()
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // do rsa decryption
							 | 
						||
| 
								 | 
							
								  var privateKey = null;
							 | 
						||
| 
								 | 
							
								  if(c.getPrivateKey) {
							 | 
						||
| 
								 | 
							
								    try {
							 | 
						||
| 
								 | 
							
								      privateKey = c.getPrivateKey(c, c.session.serverCertificate);
							 | 
						||
| 
								 | 
							
								      privateKey = forge.pki.privateKeyFromPem(privateKey);
							 | 
						||
| 
								 | 
							
								    } catch(ex) {
							 | 
						||
| 
								 | 
							
								      c.error(c, {
							 | 
						||
| 
								 | 
							
								        message: 'Could not get private key.',
							 | 
						||
| 
								 | 
							
								        cause: ex,
							 | 
						||
| 
								 | 
							
								        send: true,
							 | 
						||
| 
								 | 
							
								        alert: {
							 | 
						||
| 
								 | 
							
								          level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								          description: tls.Alert.Description.internal_error
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								      });
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  if(privateKey === null) {
							 | 
						||
| 
								 | 
							
								    return c.error(c, {
							 | 
						||
| 
								 | 
							
								      message: 'No private key set.',
							 | 
						||
| 
								 | 
							
								      send: true,
							 | 
						||
| 
								 | 
							
								      alert: {
							 | 
						||
| 
								 | 
							
								        level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								        description: tls.Alert.Description.internal_error
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  try {
							 | 
						||
| 
								 | 
							
								    // decrypt 48-byte pre-master secret
							 | 
						||
| 
								 | 
							
								    var sp = c.session.sp;
							 | 
						||
| 
								 | 
							
								    sp.pre_master_secret = privateKey.decrypt(msg.enc_pre_master_secret);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // ensure client hello version matches first 2 bytes
							 | 
						||
| 
								 | 
							
								    var version = c.session.clientHelloVersion;
							 | 
						||
| 
								 | 
							
								    if(version.major !== sp.pre_master_secret.charCodeAt(0) ||
							 | 
						||
| 
								 | 
							
								      version.minor !== sp.pre_master_secret.charCodeAt(1)) {
							 | 
						||
| 
								 | 
							
								      // error, do not send alert (see BLEI attack below)
							 | 
						||
| 
								 | 
							
								      throw new Error('TLS version rollback attack detected.');
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  } catch(ex) {
							 | 
						||
| 
								 | 
							
								    /* Note: Daniel Bleichenbacher [BLEI] can be used to attack a
							 | 
						||
| 
								 | 
							
								      TLS server which is using PKCS#1 encoded RSA, so instead of
							 | 
						||
| 
								 | 
							
								      failing here, we generate 48 random bytes and use that as
							 | 
						||
| 
								 | 
							
								      the pre-master secret. */
							 | 
						||
| 
								 | 
							
								    sp.pre_master_secret = forge.random.getBytes(48);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // expect a CertificateVerify message if a Certificate was received that
							 | 
						||
| 
								 | 
							
								  // does not have fixed Diffie-Hellman params, otherwise expect
							 | 
						||
| 
								 | 
							
								  // ChangeCipherSpec
							 | 
						||
| 
								 | 
							
								  c.expect = CCC;
							 | 
						||
| 
								 | 
							
								  if(c.session.clientCertificate !== null) {
							 | 
						||
| 
								 | 
							
								    // only RSA support, so expect CertificateVerify
							 | 
						||
| 
								 | 
							
								    // TODO: support Diffie-Hellman
							 | 
						||
| 
								 | 
							
								    c.expect = CCV;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // continue
							 | 
						||
| 
								 | 
							
								  c.process();
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Called when a client receives a CertificateRequest record.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * When this message will be sent:
							 | 
						||
| 
								 | 
							
								 *   A non-anonymous server can optionally request a certificate from the
							 | 
						||
| 
								 | 
							
								 *   client, if appropriate for the selected cipher suite. This message, if
							 | 
						||
| 
								 | 
							
								 *   sent, will immediately follow the Server Key Exchange message (if it is
							 | 
						||
| 
								 | 
							
								 *   sent; otherwise, the Server Certificate message).
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * enum {
							 | 
						||
| 
								 | 
							
								 *   rsa_sign(1), dss_sign(2), rsa_fixed_dh(3), dss_fixed_dh(4),
							 | 
						||
| 
								 | 
							
								 *   rsa_ephemeral_dh_RESERVED(5), dss_ephemeral_dh_RESERVED(6),
							 | 
						||
| 
								 | 
							
								 *   fortezza_dms_RESERVED(20), (255)
							 | 
						||
| 
								 | 
							
								 * } ClientCertificateType;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * opaque DistinguishedName<1..2^16-1>;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   ClientCertificateType certificate_types<1..2^8-1>;
							 | 
						||
| 
								 | 
							
								 *   SignatureAndHashAlgorithm supported_signature_algorithms<2^16-1>;
							 | 
						||
| 
								 | 
							
								 *   DistinguishedName certificate_authorities<0..2^16-1>;
							 | 
						||
| 
								 | 
							
								 * } CertificateRequest;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param record the record.
							 | 
						||
| 
								 | 
							
								 * @param length the length of the handshake message.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.handleCertificateRequest = function(c, record, length) {
							 | 
						||
| 
								 | 
							
								  // minimum of 3 bytes in message
							 | 
						||
| 
								 | 
							
								  if(length < 3) {
							 | 
						||
| 
								 | 
							
								    return c.error(c, {
							 | 
						||
| 
								 | 
							
								      message: 'Invalid CertificateRequest. Message too short.',
							 | 
						||
| 
								 | 
							
								      send: true,
							 | 
						||
| 
								 | 
							
								      alert: {
							 | 
						||
| 
								 | 
							
								        level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								        description: tls.Alert.Description.illegal_parameter
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // TODO: TLS 1.2+ has different format including
							 | 
						||
| 
								 | 
							
								  // SignatureAndHashAlgorithm after cert types
							 | 
						||
| 
								 | 
							
								  var b = record.fragment;
							 | 
						||
| 
								 | 
							
								  var msg = {
							 | 
						||
| 
								 | 
							
								    certificate_types: readVector(b, 1),
							 | 
						||
| 
								 | 
							
								    certificate_authorities: readVector(b, 2)
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // save certificate request in session
							 | 
						||
| 
								 | 
							
								  c.session.certificateRequest = msg;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // expect a ServerHelloDone message next
							 | 
						||
| 
								 | 
							
								  c.expect = SHD;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // continue
							 | 
						||
| 
								 | 
							
								  c.process();
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Called when a server receives a CertificateVerify record.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param record the record.
							 | 
						||
| 
								 | 
							
								 * @param length the length of the handshake message.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.handleCertificateVerify = function(c, record, length) {
							 | 
						||
| 
								 | 
							
								  if(length < 2) {
							 | 
						||
| 
								 | 
							
								    return c.error(c, {
							 | 
						||
| 
								 | 
							
								      message: 'Invalid CertificateVerify. Message too short.',
							 | 
						||
| 
								 | 
							
								      send: true,
							 | 
						||
| 
								 | 
							
								      alert: {
							 | 
						||
| 
								 | 
							
								        level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								        description: tls.Alert.Description.illegal_parameter
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // rewind to get full bytes for message so it can be manually
							 | 
						||
| 
								 | 
							
								  // digested below (special case for CertificateVerify messages because
							 | 
						||
| 
								 | 
							
								  // they must be digested *after* handling as opposed to all others)
							 | 
						||
| 
								 | 
							
								  var b = record.fragment;
							 | 
						||
| 
								 | 
							
								  b.read -= 4;
							 | 
						||
| 
								 | 
							
								  var msgBytes = b.bytes();
							 | 
						||
| 
								 | 
							
								  b.read += 4;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  var msg = {
							 | 
						||
| 
								 | 
							
								    signature: readVector(b, 2).getBytes()
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // TODO: add support for DSA
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // generate data to verify
							 | 
						||
| 
								 | 
							
								  var verify = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  verify.putBuffer(c.session.md5.digest());
							 | 
						||
| 
								 | 
							
								  verify.putBuffer(c.session.sha1.digest());
							 | 
						||
| 
								 | 
							
								  verify = verify.getBytes();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  try {
							 | 
						||
| 
								 | 
							
								    var cert = c.session.clientCertificate;
							 | 
						||
| 
								 | 
							
								    /*b = forge.pki.rsa.decrypt(
							 | 
						||
| 
								 | 
							
								      msg.signature, cert.publicKey, true, verify.length);
							 | 
						||
| 
								 | 
							
								    if(b !== verify) {*/
							 | 
						||
| 
								 | 
							
								    if(!cert.publicKey.verify(verify, msg.signature, 'NONE')) {
							 | 
						||
| 
								 | 
							
								      throw new Error('CertificateVerify signature does not match.');
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // digest message now that it has been handled
							 | 
						||
| 
								 | 
							
								    c.session.md5.update(msgBytes);
							 | 
						||
| 
								 | 
							
								    c.session.sha1.update(msgBytes);
							 | 
						||
| 
								 | 
							
								  } catch(ex) {
							 | 
						||
| 
								 | 
							
								    return c.error(c, {
							 | 
						||
| 
								 | 
							
								      message: 'Bad signature in CertificateVerify.',
							 | 
						||
| 
								 | 
							
								      send: true,
							 | 
						||
| 
								 | 
							
								      alert: {
							 | 
						||
| 
								 | 
							
								        level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								        description: tls.Alert.Description.handshake_failure
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // expect ChangeCipherSpec
							 | 
						||
| 
								 | 
							
								  c.expect = CCC;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // continue
							 | 
						||
| 
								 | 
							
								  c.process();
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Called when a client receives a ServerHelloDone record.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * When this message will be sent:
							 | 
						||
| 
								 | 
							
								 *   The server hello done message is sent by the server to indicate the end
							 | 
						||
| 
								 | 
							
								 *   of the server hello and associated messages. After sending this message
							 | 
						||
| 
								 | 
							
								 *   the server will wait for a client response.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Meaning of this message:
							 | 
						||
| 
								 | 
							
								 *   This message means that the server is done sending messages to support
							 | 
						||
| 
								 | 
							
								 *   the key exchange, and the client can proceed with its phase of the key
							 | 
						||
| 
								 | 
							
								 *   exchange.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 *   Upon receipt of the server hello done message the client should verify
							 | 
						||
| 
								 | 
							
								 *   that the server provided a valid certificate if required and check that
							 | 
						||
| 
								 | 
							
								 *   the server hello parameters are acceptable.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {} ServerHelloDone;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param record the record.
							 | 
						||
| 
								 | 
							
								 * @param length the length of the handshake message.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.handleServerHelloDone = function(c, record, length) {
							 | 
						||
| 
								 | 
							
								  // len must be 0 bytes
							 | 
						||
| 
								 | 
							
								  if(length > 0) {
							 | 
						||
| 
								 | 
							
								    return c.error(c, {
							 | 
						||
| 
								 | 
							
								      message: 'Invalid ServerHelloDone message. Invalid length.',
							 | 
						||
| 
								 | 
							
								      send: true,
							 | 
						||
| 
								 | 
							
								      alert: {
							 | 
						||
| 
								 | 
							
								        level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								        description: tls.Alert.Description.record_overflow
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  if(c.serverCertificate === null) {
							 | 
						||
| 
								 | 
							
								    // no server certificate was provided
							 | 
						||
| 
								 | 
							
								    var error = {
							 | 
						||
| 
								 | 
							
								      message: 'No server certificate provided. Not enough security.',
							 | 
						||
| 
								 | 
							
								      send: true,
							 | 
						||
| 
								 | 
							
								      alert: {
							 | 
						||
| 
								 | 
							
								        level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								        description: tls.Alert.Description.insufficient_security
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // call application callback
							 | 
						||
| 
								 | 
							
								    var depth = 0;
							 | 
						||
| 
								 | 
							
								    var ret = c.verify(c, error.alert.description, depth, []);
							 | 
						||
| 
								 | 
							
								    if(ret !== true) {
							 | 
						||
| 
								 | 
							
								      // check for custom alert info
							 | 
						||
| 
								 | 
							
								      if(ret || ret === 0) {
							 | 
						||
| 
								 | 
							
								        // set custom message and alert description
							 | 
						||
| 
								 | 
							
								        if(typeof ret === 'object' && !forge.util.isArray(ret)) {
							 | 
						||
| 
								 | 
							
								          if(ret.message) {
							 | 
						||
| 
								 | 
							
								            error.message = ret.message;
							 | 
						||
| 
								 | 
							
								          }
							 | 
						||
| 
								 | 
							
								          if(ret.alert) {
							 | 
						||
| 
								 | 
							
								            error.alert.description = ret.alert;
							 | 
						||
| 
								 | 
							
								          }
							 | 
						||
| 
								 | 
							
								        } else if(typeof ret === 'number') {
							 | 
						||
| 
								 | 
							
								          // set custom alert description
							 | 
						||
| 
								 | 
							
								          error.alert.description = ret;
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // send error
							 | 
						||
| 
								 | 
							
								      return c.error(c, error);
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // create client certificate message if requested
							 | 
						||
| 
								 | 
							
								  if(c.session.certificateRequest !== null) {
							 | 
						||
| 
								 | 
							
								    record = tls.createRecord(c, {
							 | 
						||
| 
								 | 
							
								      type: tls.ContentType.handshake,
							 | 
						||
| 
								 | 
							
								      data: tls.createCertificate(c)
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								    tls.queue(c, record);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // create client key exchange message
							 | 
						||
| 
								 | 
							
								  record = tls.createRecord(c, {
							 | 
						||
| 
								 | 
							
								     type: tls.ContentType.handshake,
							 | 
						||
| 
								 | 
							
								     data: tls.createClientKeyExchange(c)
							 | 
						||
| 
								 | 
							
								  });
							 | 
						||
| 
								 | 
							
								  tls.queue(c, record);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // expect no messages until the following callback has been called
							 | 
						||
| 
								 | 
							
								  c.expect = SER;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // create callback to handle client signature (for client-certs)
							 | 
						||
| 
								 | 
							
								  var callback = function(c, signature) {
							 | 
						||
| 
								 | 
							
								    if(c.session.certificateRequest !== null &&
							 | 
						||
| 
								 | 
							
								      c.session.clientCertificate !== null) {
							 | 
						||
| 
								 | 
							
								      // create certificate verify message
							 | 
						||
| 
								 | 
							
								      tls.queue(c, tls.createRecord(c, {
							 | 
						||
| 
								 | 
							
								        type: tls.ContentType.handshake,
							 | 
						||
| 
								 | 
							
								        data: tls.createCertificateVerify(c, signature)
							 | 
						||
| 
								 | 
							
								      }));
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // create change cipher spec message
							 | 
						||
| 
								 | 
							
								    tls.queue(c, tls.createRecord(c, {
							 | 
						||
| 
								 | 
							
								      type: tls.ContentType.change_cipher_spec,
							 | 
						||
| 
								 | 
							
								      data: tls.createChangeCipherSpec()
							 | 
						||
| 
								 | 
							
								    }));
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // create pending state
							 | 
						||
| 
								 | 
							
								    c.state.pending = tls.createConnectionState(c);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // change current write state to pending write state
							 | 
						||
| 
								 | 
							
								    c.state.current.write = c.state.pending.write;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // create finished message
							 | 
						||
| 
								 | 
							
								    tls.queue(c, tls.createRecord(c, {
							 | 
						||
| 
								 | 
							
								      type: tls.ContentType.handshake,
							 | 
						||
| 
								 | 
							
								      data: tls.createFinished(c)
							 | 
						||
| 
								 | 
							
								    }));
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // expect a server ChangeCipherSpec message next
							 | 
						||
| 
								 | 
							
								    c.expect = SCC;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // send records
							 | 
						||
| 
								 | 
							
								    tls.flush(c);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // continue
							 | 
						||
| 
								 | 
							
								    c.process();
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // if there is no certificate request or no client certificate, do
							 | 
						||
| 
								 | 
							
								  // callback immediately
							 | 
						||
| 
								 | 
							
								  if(c.session.certificateRequest === null ||
							 | 
						||
| 
								 | 
							
								    c.session.clientCertificate === null) {
							 | 
						||
| 
								 | 
							
								    return callback(c, null);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // otherwise get the client signature
							 | 
						||
| 
								 | 
							
								  tls.getClientSignature(c, callback);
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Called when a ChangeCipherSpec record is received.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param record the record.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.handleChangeCipherSpec = function(c, record) {
							 | 
						||
| 
								 | 
							
								  if(record.fragment.getByte() !== 0x01) {
							 | 
						||
| 
								 | 
							
								    return c.error(c, {
							 | 
						||
| 
								 | 
							
								      message: 'Invalid ChangeCipherSpec message received.',
							 | 
						||
| 
								 | 
							
								      send: true,
							 | 
						||
| 
								 | 
							
								      alert: {
							 | 
						||
| 
								 | 
							
								        level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								        description: tls.Alert.Description.illegal_parameter
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // create pending state if:
							 | 
						||
| 
								 | 
							
								  // 1. Resuming session in client mode OR
							 | 
						||
| 
								 | 
							
								  // 2. NOT resuming session in server mode
							 | 
						||
| 
								 | 
							
								  var client = (c.entity === tls.ConnectionEnd.client);
							 | 
						||
| 
								 | 
							
								  if((c.session.resuming && client) || (!c.session.resuming && !client)) {
							 | 
						||
| 
								 | 
							
								    c.state.pending = tls.createConnectionState(c);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // change current read state to pending read state
							 | 
						||
| 
								 | 
							
								  c.state.current.read = c.state.pending.read;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // clear pending state if:
							 | 
						||
| 
								 | 
							
								  // 1. NOT resuming session in client mode OR
							 | 
						||
| 
								 | 
							
								  // 2. resuming a session in server mode
							 | 
						||
| 
								 | 
							
								  if((!c.session.resuming && client) || (c.session.resuming && !client)) {
							 | 
						||
| 
								 | 
							
								    c.state.pending = null;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // expect a Finished record next
							 | 
						||
| 
								 | 
							
								  c.expect = client ? SFI : CFI;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // continue
							 | 
						||
| 
								 | 
							
								  c.process();
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Called when a Finished record is received.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * When this message will be sent:
							 | 
						||
| 
								 | 
							
								 *   A finished message is always sent immediately after a change
							 | 
						||
| 
								 | 
							
								 *   cipher spec message to verify that the key exchange and
							 | 
						||
| 
								 | 
							
								 *   authentication processes were successful. It is essential that a
							 | 
						||
| 
								 | 
							
								 *   change cipher spec message be received between the other
							 | 
						||
| 
								 | 
							
								 *   handshake messages and the Finished message.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Meaning of this message:
							 | 
						||
| 
								 | 
							
								 *   The finished message is the first protected with the just-
							 | 
						||
| 
								 | 
							
								 *   negotiated algorithms, keys, and secrets. Recipients of finished
							 | 
						||
| 
								 | 
							
								 *   messages must verify that the contents are correct.  Once a side
							 | 
						||
| 
								 | 
							
								 *   has sent its Finished message and received and validated the
							 | 
						||
| 
								 | 
							
								 *   Finished message from its peer, it may begin to send and receive
							 | 
						||
| 
								 | 
							
								 *   application data over the connection.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   opaque verify_data[verify_data_length];
							 | 
						||
| 
								 | 
							
								 * } Finished;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * verify_data
							 | 
						||
| 
								 | 
							
								 *   PRF(master_secret, finished_label, Hash(handshake_messages))
							 | 
						||
| 
								 | 
							
								 *     [0..verify_data_length-1];
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * finished_label
							 | 
						||
| 
								 | 
							
								 *   For Finished messages sent by the client, the string
							 | 
						||
| 
								 | 
							
								 *   "client finished". For Finished messages sent by the server, the
							 | 
						||
| 
								 | 
							
								 *   string "server finished".
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * verify_data_length depends on the cipher suite. If it is not specified
							 | 
						||
| 
								 | 
							
								 * by the cipher suite, then it is 12. Versions of TLS < 1.2 always used
							 | 
						||
| 
								 | 
							
								 * 12 bytes.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param record the record.
							 | 
						||
| 
								 | 
							
								 * @param length the length of the handshake message.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.handleFinished = function(c, record, length) {
							 | 
						||
| 
								 | 
							
								  // rewind to get full bytes for message so it can be manually
							 | 
						||
| 
								 | 
							
								  // digested below (special case for Finished messages because they
							 | 
						||
| 
								 | 
							
								  // must be digested *after* handling as opposed to all others)
							 | 
						||
| 
								 | 
							
								  var b = record.fragment;
							 | 
						||
| 
								 | 
							
								  b.read -= 4;
							 | 
						||
| 
								 | 
							
								  var msgBytes = b.bytes();
							 | 
						||
| 
								 | 
							
								  b.read += 4;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // message contains only verify_data
							 | 
						||
| 
								 | 
							
								  var vd = record.fragment.getBytes();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // ensure verify data is correct
							 | 
						||
| 
								 | 
							
								  b = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  b.putBuffer(c.session.md5.digest());
							 | 
						||
| 
								 | 
							
								  b.putBuffer(c.session.sha1.digest());
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // set label based on entity type
							 | 
						||
| 
								 | 
							
								  var client = (c.entity === tls.ConnectionEnd.client);
							 | 
						||
| 
								 | 
							
								  var label = client ? 'server finished' : 'client finished';
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // TODO: determine prf function and verify length for TLS 1.2
							 | 
						||
| 
								 | 
							
								  var sp = c.session.sp;
							 | 
						||
| 
								 | 
							
								  var vdl = 12;
							 | 
						||
| 
								 | 
							
								  var prf = prf_TLS1;
							 | 
						||
| 
								 | 
							
								  b = prf(sp.master_secret, label, b.getBytes(), vdl);
							 | 
						||
| 
								 | 
							
								  if(b.getBytes() !== vd) {
							 | 
						||
| 
								 | 
							
								    return c.error(c, {
							 | 
						||
| 
								 | 
							
								      message: 'Invalid verify_data in Finished message.',
							 | 
						||
| 
								 | 
							
								      send: true,
							 | 
						||
| 
								 | 
							
								      alert: {
							 | 
						||
| 
								 | 
							
								        level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								        description: tls.Alert.Description.decrypt_error
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    });
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // digest finished message now that it has been handled
							 | 
						||
| 
								 | 
							
								  c.session.md5.update(msgBytes);
							 | 
						||
| 
								 | 
							
								  c.session.sha1.update(msgBytes);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // resuming session as client or NOT resuming session as server
							 | 
						||
| 
								 | 
							
								  if((c.session.resuming && client) || (!c.session.resuming && !client)) {
							 | 
						||
| 
								 | 
							
								    // create change cipher spec message
							 | 
						||
| 
								 | 
							
								    tls.queue(c, tls.createRecord(c, {
							 | 
						||
| 
								 | 
							
								      type: tls.ContentType.change_cipher_spec,
							 | 
						||
| 
								 | 
							
								      data: tls.createChangeCipherSpec()
							 | 
						||
| 
								 | 
							
								    }));
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // change current write state to pending write state, clear pending
							 | 
						||
| 
								 | 
							
								    c.state.current.write = c.state.pending.write;
							 | 
						||
| 
								 | 
							
								    c.state.pending = null;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // create finished message
							 | 
						||
| 
								 | 
							
								    tls.queue(c, tls.createRecord(c, {
							 | 
						||
| 
								 | 
							
								      type: tls.ContentType.handshake,
							 | 
						||
| 
								 | 
							
								      data: tls.createFinished(c)
							 | 
						||
| 
								 | 
							
								    }));
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // expect application data next
							 | 
						||
| 
								 | 
							
								  c.expect = client ? SAD : CAD;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // handshake complete
							 | 
						||
| 
								 | 
							
								  c.handshaking = false;
							 | 
						||
| 
								 | 
							
								  ++c.handshakes;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // save access to peer certificate
							 | 
						||
| 
								 | 
							
								  c.peerCertificate = client ?
							 | 
						||
| 
								 | 
							
								    c.session.serverCertificate : c.session.clientCertificate;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // send records
							 | 
						||
| 
								 | 
							
								  tls.flush(c);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // now connected
							 | 
						||
| 
								 | 
							
								  c.isConnected = true;
							 | 
						||
| 
								 | 
							
								  c.connected(c);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // continue
							 | 
						||
| 
								 | 
							
								  c.process();
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Called when an Alert record is received.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param record the record.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.handleAlert = function(c, record) {
							 | 
						||
| 
								 | 
							
								  // read alert
							 | 
						||
| 
								 | 
							
								  var b = record.fragment;
							 | 
						||
| 
								 | 
							
								  var alert = {
							 | 
						||
| 
								 | 
							
								    level: b.getByte(),
							 | 
						||
| 
								 | 
							
								    description: b.getByte()
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // TODO: consider using a table?
							 | 
						||
| 
								 | 
							
								  // get appropriate message
							 | 
						||
| 
								 | 
							
								  var msg;
							 | 
						||
| 
								 | 
							
								  switch(alert.description) {
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.close_notify:
							 | 
						||
| 
								 | 
							
								    msg = 'Connection closed.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.unexpected_message:
							 | 
						||
| 
								 | 
							
								    msg = 'Unexpected message.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.bad_record_mac:
							 | 
						||
| 
								 | 
							
								    msg = 'Bad record MAC.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.decryption_failed:
							 | 
						||
| 
								 | 
							
								    msg = 'Decryption failed.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.record_overflow:
							 | 
						||
| 
								 | 
							
								    msg = 'Record overflow.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.decompression_failure:
							 | 
						||
| 
								 | 
							
								    msg = 'Decompression failed.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.handshake_failure:
							 | 
						||
| 
								 | 
							
								    msg = 'Handshake failure.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.bad_certificate:
							 | 
						||
| 
								 | 
							
								    msg = 'Bad certificate.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.unsupported_certificate:
							 | 
						||
| 
								 | 
							
								    msg = 'Unsupported certificate.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.certificate_revoked:
							 | 
						||
| 
								 | 
							
								    msg = 'Certificate revoked.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.certificate_expired:
							 | 
						||
| 
								 | 
							
								    msg = 'Certificate expired.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.certificate_unknown:
							 | 
						||
| 
								 | 
							
								    msg = 'Certificate unknown.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.illegal_parameter:
							 | 
						||
| 
								 | 
							
								    msg = 'Illegal parameter.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.unknown_ca:
							 | 
						||
| 
								 | 
							
								    msg = 'Unknown certificate authority.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.access_denied:
							 | 
						||
| 
								 | 
							
								    msg = 'Access denied.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.decode_error:
							 | 
						||
| 
								 | 
							
								    msg = 'Decode error.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.decrypt_error:
							 | 
						||
| 
								 | 
							
								    msg = 'Decrypt error.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.export_restriction:
							 | 
						||
| 
								 | 
							
								    msg = 'Export restriction.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.protocol_version:
							 | 
						||
| 
								 | 
							
								    msg = 'Unsupported protocol version.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.insufficient_security:
							 | 
						||
| 
								 | 
							
								    msg = 'Insufficient security.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.internal_error:
							 | 
						||
| 
								 | 
							
								    msg = 'Internal error.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.user_canceled:
							 | 
						||
| 
								 | 
							
								    msg = 'User canceled.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.no_renegotiation:
							 | 
						||
| 
								 | 
							
								    msg = 'Renegotiation not supported.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  default:
							 | 
						||
| 
								 | 
							
								    msg = 'Unknown error.';
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // close connection on close_notify, not an error
							 | 
						||
| 
								 | 
							
								  if(alert.description === tls.Alert.Description.close_notify) {
							 | 
						||
| 
								 | 
							
								    return c.close();
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // call error handler
							 | 
						||
| 
								 | 
							
								  c.error(c, {
							 | 
						||
| 
								 | 
							
								    message: msg,
							 | 
						||
| 
								 | 
							
								    send: false,
							 | 
						||
| 
								 | 
							
								    // origin is the opposite end
							 | 
						||
| 
								 | 
							
								    origin: (c.entity === tls.ConnectionEnd.client) ? 'server' : 'client',
							 | 
						||
| 
								 | 
							
								    alert: alert
							 | 
						||
| 
								 | 
							
								  });
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // continue
							 | 
						||
| 
								 | 
							
								  c.process();
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Called when a Handshake record is received.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param record the record.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.handleHandshake = function(c, record) {
							 | 
						||
| 
								 | 
							
								  // get the handshake type and message length
							 | 
						||
| 
								 | 
							
								  var b = record.fragment;
							 | 
						||
| 
								 | 
							
								  var type = b.getByte();
							 | 
						||
| 
								 | 
							
								  var length = b.getInt24();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // see if the record fragment doesn't yet contain the full message
							 | 
						||
| 
								 | 
							
								  if(length > b.length()) {
							 | 
						||
| 
								 | 
							
								    // cache the record, clear its fragment, and reset the buffer read
							 | 
						||
| 
								 | 
							
								    // pointer before the type and length were read
							 | 
						||
| 
								 | 
							
								    c.fragmented = record;
							 | 
						||
| 
								 | 
							
								    record.fragment = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								    b.read -= 4;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // continue
							 | 
						||
| 
								 | 
							
								    return c.process();
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // full message now available, clear cache, reset read pointer to
							 | 
						||
| 
								 | 
							
								  // before type and length
							 | 
						||
| 
								 | 
							
								  c.fragmented = null;
							 | 
						||
| 
								 | 
							
								  b.read -= 4;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // save the handshake bytes for digestion after handler is found
							 | 
						||
| 
								 | 
							
								  // (include type and length of handshake msg)
							 | 
						||
| 
								 | 
							
								  var bytes = b.bytes(length + 4);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // restore read pointer
							 | 
						||
| 
								 | 
							
								  b.read += 4;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // handle expected message
							 | 
						||
| 
								 | 
							
								  if(type in hsTable[c.entity][c.expect]) {
							 | 
						||
| 
								 | 
							
								    // initialize server session
							 | 
						||
| 
								 | 
							
								    if(c.entity === tls.ConnectionEnd.server && !c.open && !c.fail) {
							 | 
						||
| 
								 | 
							
								      c.handshaking = true;
							 | 
						||
| 
								 | 
							
								      c.session = {
							 | 
						||
| 
								 | 
							
								        version: null,
							 | 
						||
| 
								 | 
							
								        extensions: {
							 | 
						||
| 
								 | 
							
								          server_name: {
							 | 
						||
| 
								 | 
							
								            serverNameList: []
							 | 
						||
| 
								 | 
							
								          }
							 | 
						||
| 
								 | 
							
								        },
							 | 
						||
| 
								 | 
							
								        cipherSuite: null,
							 | 
						||
| 
								 | 
							
								        compressionMethod: null,
							 | 
						||
| 
								 | 
							
								        serverCertificate: null,
							 | 
						||
| 
								 | 
							
								        clientCertificate: null,
							 | 
						||
| 
								 | 
							
								        md5: forge.md.md5.create(),
							 | 
						||
| 
								 | 
							
								        sha1: forge.md.sha1.create()
							 | 
						||
| 
								 | 
							
								      };
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    /* Update handshake messages digest. Finished and CertificateVerify
							 | 
						||
| 
								 | 
							
								      messages are not digested here. They can't be digested as part of
							 | 
						||
| 
								 | 
							
								      the verify_data that they contain. These messages are manually
							 | 
						||
| 
								 | 
							
								      digested in their handlers. HelloRequest messages are simply never
							 | 
						||
| 
								 | 
							
								      included in the handshake message digest according to spec. */
							 | 
						||
| 
								 | 
							
								    if(type !== tls.HandshakeType.hello_request &&
							 | 
						||
| 
								 | 
							
								      type !== tls.HandshakeType.certificate_verify &&
							 | 
						||
| 
								 | 
							
								      type !== tls.HandshakeType.finished) {
							 | 
						||
| 
								 | 
							
								      c.session.md5.update(bytes);
							 | 
						||
| 
								 | 
							
								      c.session.sha1.update(bytes);
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // handle specific handshake type record
							 | 
						||
| 
								 | 
							
								    hsTable[c.entity][c.expect][type](c, record, length);
							 | 
						||
| 
								 | 
							
								  } else {
							 | 
						||
| 
								 | 
							
								    // unexpected record
							 | 
						||
| 
								 | 
							
								    tls.handleUnexpected(c, record);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Called when an ApplicationData record is received.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param record the record.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.handleApplicationData = function(c, record) {
							 | 
						||
| 
								 | 
							
								  // buffer data, notify that its ready
							 | 
						||
| 
								 | 
							
								  c.data.putBuffer(record.fragment);
							 | 
						||
| 
								 | 
							
								  c.dataReady(c);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // continue
							 | 
						||
| 
								 | 
							
								  c.process();
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Called when a Heartbeat record is received.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param record the record.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.handleHeartbeat = function(c, record) {
							 | 
						||
| 
								 | 
							
								  // get the heartbeat type and payload
							 | 
						||
| 
								 | 
							
								  var b = record.fragment;
							 | 
						||
| 
								 | 
							
								  var type = b.getByte();
							 | 
						||
| 
								 | 
							
								  var length = b.getInt16();
							 | 
						||
| 
								 | 
							
								  var payload = b.getBytes(length);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  if(type === tls.HeartbeatMessageType.heartbeat_request) {
							 | 
						||
| 
								 | 
							
								    // discard request during handshake or if length is too large
							 | 
						||
| 
								 | 
							
								    if(c.handshaking || length > payload.length) {
							 | 
						||
| 
								 | 
							
								      // continue
							 | 
						||
| 
								 | 
							
								      return c.process();
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								    // retransmit payload
							 | 
						||
| 
								 | 
							
								    tls.queue(c, tls.createRecord(c, {
							 | 
						||
| 
								 | 
							
								      type: tls.ContentType.heartbeat,
							 | 
						||
| 
								 | 
							
								      data: tls.createHeartbeat(
							 | 
						||
| 
								 | 
							
								        tls.HeartbeatMessageType.heartbeat_response, payload)
							 | 
						||
| 
								 | 
							
								    }));
							 | 
						||
| 
								 | 
							
								    tls.flush(c);
							 | 
						||
| 
								 | 
							
								  } else if(type === tls.HeartbeatMessageType.heartbeat_response) {
							 | 
						||
| 
								 | 
							
								    // check payload against expected payload, discard heartbeat if no match
							 | 
						||
| 
								 | 
							
								    if(payload !== c.expectedHeartbeatPayload) {
							 | 
						||
| 
								 | 
							
								      // continue
							 | 
						||
| 
								 | 
							
								      return c.process();
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // notify that a valid heartbeat was received
							 | 
						||
| 
								 | 
							
								    if(c.heartbeatReceived) {
							 | 
						||
| 
								 | 
							
								      c.heartbeatReceived(c, forge.util.createBuffer(payload));
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // continue
							 | 
						||
| 
								 | 
							
								  c.process();
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * The transistional state tables for receiving TLS records. It maps the
							 | 
						||
| 
								 | 
							
								 * current TLS engine state and a received record to a function to handle the
							 | 
						||
| 
								 | 
							
								 * record and update the state.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * For instance, if the current state is SHE, then the TLS engine is expecting
							 | 
						||
| 
								 | 
							
								 * a ServerHello record. Once a record is received, the handler function is
							 | 
						||
| 
								 | 
							
								 * looked up using the state SHE and the record's content type.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The resulting function will either be an error handler or a record handler.
							 | 
						||
| 
								 | 
							
								 * The function will take whatever action is appropriate and update the state
							 | 
						||
| 
								 | 
							
								 * for the next record.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The states are all based on possible server record types. Note that the
							 | 
						||
| 
								 | 
							
								 * client will never specifically expect to receive a HelloRequest or an alert
							 | 
						||
| 
								 | 
							
								 * from the server so there is no state that reflects this. These messages may
							 | 
						||
| 
								 | 
							
								 * occur at any time.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * There are two tables for mapping states because there is a second tier of
							 | 
						||
| 
								 | 
							
								 * types for handshake messages. Once a record with a content type of handshake
							 | 
						||
| 
								 | 
							
								 * is received, the handshake record handler will look up the handshake type in
							 | 
						||
| 
								 | 
							
								 * the secondary map to get its appropriate handler.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Valid message orders are as follows:
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * =======================FULL HANDSHAKE======================
							 | 
						||
| 
								 | 
							
								 * Client                                               Server
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * ClientHello                  -------->
							 | 
						||
| 
								 | 
							
								 *                                                 ServerHello
							 | 
						||
| 
								 | 
							
								 *                                                Certificate*
							 | 
						||
| 
								 | 
							
								 *                                          ServerKeyExchange*
							 | 
						||
| 
								 | 
							
								 *                                         CertificateRequest*
							 | 
						||
| 
								 | 
							
								 *                              <--------      ServerHelloDone
							 | 
						||
| 
								 | 
							
								 * Certificate*
							 | 
						||
| 
								 | 
							
								 * ClientKeyExchange
							 | 
						||
| 
								 | 
							
								 * CertificateVerify*
							 | 
						||
| 
								 | 
							
								 * [ChangeCipherSpec]
							 | 
						||
| 
								 | 
							
								 * Finished                     -------->
							 | 
						||
| 
								 | 
							
								 *                                          [ChangeCipherSpec]
							 | 
						||
| 
								 | 
							
								 *                              <--------             Finished
							 | 
						||
| 
								 | 
							
								 * Application Data             <------->     Application Data
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * =====================SESSION RESUMPTION=====================
							 | 
						||
| 
								 | 
							
								 * Client                                                Server
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * ClientHello                   -------->
							 | 
						||
| 
								 | 
							
								 *                                                  ServerHello
							 | 
						||
| 
								 | 
							
								 *                                           [ChangeCipherSpec]
							 | 
						||
| 
								 | 
							
								 *                               <--------             Finished
							 | 
						||
| 
								 | 
							
								 * [ChangeCipherSpec]
							 | 
						||
| 
								 | 
							
								 * Finished                      -------->
							 | 
						||
| 
								 | 
							
								 * Application Data              <------->     Application Data
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								// client expect states (indicate which records are expected to be received)
							 | 
						||
| 
								 | 
							
								var SHE = 0; // rcv server hello
							 | 
						||
| 
								 | 
							
								var SCE = 1; // rcv server certificate
							 | 
						||
| 
								 | 
							
								var SKE = 2; // rcv server key exchange
							 | 
						||
| 
								 | 
							
								var SCR = 3; // rcv certificate request
							 | 
						||
| 
								 | 
							
								var SHD = 4; // rcv server hello done
							 | 
						||
| 
								 | 
							
								var SCC = 5; // rcv change cipher spec
							 | 
						||
| 
								 | 
							
								var SFI = 6; // rcv finished
							 | 
						||
| 
								 | 
							
								var SAD = 7; // rcv application data
							 | 
						||
| 
								 | 
							
								var SER = 8; // not expecting any messages at this point
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								// server expect states
							 | 
						||
| 
								 | 
							
								var CHE = 0; // rcv client hello
							 | 
						||
| 
								 | 
							
								var CCE = 1; // rcv client certificate
							 | 
						||
| 
								 | 
							
								var CKE = 2; // rcv client key exchange
							 | 
						||
| 
								 | 
							
								var CCV = 3; // rcv certificate verify
							 | 
						||
| 
								 | 
							
								var CCC = 4; // rcv change cipher spec
							 | 
						||
| 
								 | 
							
								var CFI = 5; // rcv finished
							 | 
						||
| 
								 | 
							
								var CAD = 6; // rcv application data
							 | 
						||
| 
								 | 
							
								var CER = 7; // not expecting any messages at this point
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								// map client current expect state and content type to function
							 | 
						||
| 
								 | 
							
								var __ = tls.handleUnexpected;
							 | 
						||
| 
								 | 
							
								var R0 = tls.handleChangeCipherSpec;
							 | 
						||
| 
								 | 
							
								var R1 = tls.handleAlert;
							 | 
						||
| 
								 | 
							
								var R2 = tls.handleHandshake;
							 | 
						||
| 
								 | 
							
								var R3 = tls.handleApplicationData;
							 | 
						||
| 
								 | 
							
								var R4 = tls.handleHeartbeat;
							 | 
						||
| 
								 | 
							
								var ctTable = [];
							 | 
						||
| 
								 | 
							
								ctTable[tls.ConnectionEnd.client] = [
							 | 
						||
| 
								 | 
							
								//      CC,AL,HS,AD,HB
							 | 
						||
| 
								 | 
							
								/*SHE*/[__,R1,R2,__,R4],
							 | 
						||
| 
								 | 
							
								/*SCE*/[__,R1,R2,__,R4],
							 | 
						||
| 
								 | 
							
								/*SKE*/[__,R1,R2,__,R4],
							 | 
						||
| 
								 | 
							
								/*SCR*/[__,R1,R2,__,R4],
							 | 
						||
| 
								 | 
							
								/*SHD*/[__,R1,R2,__,R4],
							 | 
						||
| 
								 | 
							
								/*SCC*/[R0,R1,__,__,R4],
							 | 
						||
| 
								 | 
							
								/*SFI*/[__,R1,R2,__,R4],
							 | 
						||
| 
								 | 
							
								/*SAD*/[__,R1,R2,R3,R4],
							 | 
						||
| 
								 | 
							
								/*SER*/[__,R1,R2,__,R4]
							 | 
						||
| 
								 | 
							
								];
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								// map server current expect state and content type to function
							 | 
						||
| 
								 | 
							
								ctTable[tls.ConnectionEnd.server] = [
							 | 
						||
| 
								 | 
							
								//      CC,AL,HS,AD
							 | 
						||
| 
								 | 
							
								/*CHE*/[__,R1,R2,__,R4],
							 | 
						||
| 
								 | 
							
								/*CCE*/[__,R1,R2,__,R4],
							 | 
						||
| 
								 | 
							
								/*CKE*/[__,R1,R2,__,R4],
							 | 
						||
| 
								 | 
							
								/*CCV*/[__,R1,R2,__,R4],
							 | 
						||
| 
								 | 
							
								/*CCC*/[R0,R1,__,__,R4],
							 | 
						||
| 
								 | 
							
								/*CFI*/[__,R1,R2,__,R4],
							 | 
						||
| 
								 | 
							
								/*CAD*/[__,R1,R2,R3,R4],
							 | 
						||
| 
								 | 
							
								/*CER*/[__,R1,R2,__,R4]
							 | 
						||
| 
								 | 
							
								];
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								// map client current expect state and handshake type to function
							 | 
						||
| 
								 | 
							
								var H0 = tls.handleHelloRequest;
							 | 
						||
| 
								 | 
							
								var H1 = tls.handleServerHello;
							 | 
						||
| 
								 | 
							
								var H2 = tls.handleCertificate;
							 | 
						||
| 
								 | 
							
								var H3 = tls.handleServerKeyExchange;
							 | 
						||
| 
								 | 
							
								var H4 = tls.handleCertificateRequest;
							 | 
						||
| 
								 | 
							
								var H5 = tls.handleServerHelloDone;
							 | 
						||
| 
								 | 
							
								var H6 = tls.handleFinished;
							 | 
						||
| 
								 | 
							
								var hsTable = [];
							 | 
						||
| 
								 | 
							
								hsTable[tls.ConnectionEnd.client] = [
							 | 
						||
| 
								 | 
							
								//      HR,01,SH,03,04,05,06,07,08,09,10,SC,SK,CR,HD,15,CK,17,18,19,FI
							 | 
						||
| 
								 | 
							
								/*SHE*/[__,__,H1,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__],
							 | 
						||
| 
								 | 
							
								/*SCE*/[H0,__,__,__,__,__,__,__,__,__,__,H2,H3,H4,H5,__,__,__,__,__,__],
							 | 
						||
| 
								 | 
							
								/*SKE*/[H0,__,__,__,__,__,__,__,__,__,__,__,H3,H4,H5,__,__,__,__,__,__],
							 | 
						||
| 
								 | 
							
								/*SCR*/[H0,__,__,__,__,__,__,__,__,__,__,__,__,H4,H5,__,__,__,__,__,__],
							 | 
						||
| 
								 | 
							
								/*SHD*/[H0,__,__,__,__,__,__,__,__,__,__,__,__,__,H5,__,__,__,__,__,__],
							 | 
						||
| 
								 | 
							
								/*SCC*/[H0,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__],
							 | 
						||
| 
								 | 
							
								/*SFI*/[H0,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,H6],
							 | 
						||
| 
								 | 
							
								/*SAD*/[H0,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__],
							 | 
						||
| 
								 | 
							
								/*SER*/[H0,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__]
							 | 
						||
| 
								 | 
							
								];
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								// map server current expect state and handshake type to function
							 | 
						||
| 
								 | 
							
								// Note: CAD[CH] does not map to FB because renegotation is prohibited
							 | 
						||
| 
								 | 
							
								var H7 = tls.handleClientHello;
							 | 
						||
| 
								 | 
							
								var H8 = tls.handleClientKeyExchange;
							 | 
						||
| 
								 | 
							
								var H9 = tls.handleCertificateVerify;
							 | 
						||
| 
								 | 
							
								hsTable[tls.ConnectionEnd.server] = [
							 | 
						||
| 
								 | 
							
								//      01,CH,02,03,04,05,06,07,08,09,10,CC,12,13,14,CV,CK,17,18,19,FI
							 | 
						||
| 
								 | 
							
								/*CHE*/[__,H7,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__],
							 | 
						||
| 
								 | 
							
								/*CCE*/[__,__,__,__,__,__,__,__,__,__,__,H2,__,__,__,__,__,__,__,__,__],
							 | 
						||
| 
								 | 
							
								/*CKE*/[__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,H8,__,__,__,__],
							 | 
						||
| 
								 | 
							
								/*CCV*/[__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,H9,__,__,__,__,__],
							 | 
						||
| 
								 | 
							
								/*CCC*/[__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__],
							 | 
						||
| 
								 | 
							
								/*CFI*/[__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,H6],
							 | 
						||
| 
								 | 
							
								/*CAD*/[__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__],
							 | 
						||
| 
								 | 
							
								/*CER*/[__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__]
							 | 
						||
| 
								 | 
							
								];
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Generates the master_secret and keys using the given security parameters.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The security parameters for a TLS connection state are defined as such:
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   ConnectionEnd          entity;
							 | 
						||
| 
								 | 
							
								 *   PRFAlgorithm           prf_algorithm;
							 | 
						||
| 
								 | 
							
								 *   BulkCipherAlgorithm    bulk_cipher_algorithm;
							 | 
						||
| 
								 | 
							
								 *   CipherType             cipher_type;
							 | 
						||
| 
								 | 
							
								 *   uint8                  enc_key_length;
							 | 
						||
| 
								 | 
							
								 *   uint8                  block_length;
							 | 
						||
| 
								 | 
							
								 *   uint8                  fixed_iv_length;
							 | 
						||
| 
								 | 
							
								 *   uint8                  record_iv_length;
							 | 
						||
| 
								 | 
							
								 *   MACAlgorithm           mac_algorithm;
							 | 
						||
| 
								 | 
							
								 *   uint8                  mac_length;
							 | 
						||
| 
								 | 
							
								 *   uint8                  mac_key_length;
							 | 
						||
| 
								 | 
							
								 *   CompressionMethod      compression_algorithm;
							 | 
						||
| 
								 | 
							
								 *   opaque                 master_secret[48];
							 | 
						||
| 
								 | 
							
								 *   opaque                 client_random[32];
							 | 
						||
| 
								 | 
							
								 *   opaque                 server_random[32];
							 | 
						||
| 
								 | 
							
								 * } SecurityParameters;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Note that this definition is from TLS 1.2. In TLS 1.0 some of these
							 | 
						||
| 
								 | 
							
								 * parameters are ignored because, for instance, the PRFAlgorithm is a
							 | 
						||
| 
								 | 
							
								 * builtin-fixed algorithm combining iterations of MD5 and SHA-1 in TLS 1.0.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The Record Protocol requires an algorithm to generate keys required by the
							 | 
						||
| 
								 | 
							
								 * current connection state.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The master secret is expanded into a sequence of secure bytes, which is then
							 | 
						||
| 
								 | 
							
								 * split to a client write MAC key, a server write MAC key, a client write
							 | 
						||
| 
								 | 
							
								 * encryption key, and a server write encryption key. In TLS 1.0 a client write
							 | 
						||
| 
								 | 
							
								 * IV and server write IV are also generated. Each of these is generated from
							 | 
						||
| 
								 | 
							
								 * the byte sequence in that order. Unused values are empty. In TLS 1.2, some
							 | 
						||
| 
								 | 
							
								 * AEAD ciphers may additionally require a client write IV and a server write
							 | 
						||
| 
								 | 
							
								 * IV (see Section 6.2.3.3).
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * When keys, MAC keys, and IVs are generated, the master secret is used as an
							 | 
						||
| 
								 | 
							
								 * entropy source.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * To generate the key material, compute:
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * master_secret = PRF(pre_master_secret, "master secret",
							 | 
						||
| 
								 | 
							
								 *                     ClientHello.random + ServerHello.random)
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * key_block = PRF(SecurityParameters.master_secret,
							 | 
						||
| 
								 | 
							
								 *                 "key expansion",
							 | 
						||
| 
								 | 
							
								 *                 SecurityParameters.server_random +
							 | 
						||
| 
								 | 
							
								 *                 SecurityParameters.client_random);
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * until enough output has been generated. Then, the key_block is
							 | 
						||
| 
								 | 
							
								 * partitioned as follows:
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * client_write_MAC_key[SecurityParameters.mac_key_length]
							 | 
						||
| 
								 | 
							
								 * server_write_MAC_key[SecurityParameters.mac_key_length]
							 | 
						||
| 
								 | 
							
								 * client_write_key[SecurityParameters.enc_key_length]
							 | 
						||
| 
								 | 
							
								 * server_write_key[SecurityParameters.enc_key_length]
							 | 
						||
| 
								 | 
							
								 * client_write_IV[SecurityParameters.fixed_iv_length]
							 | 
						||
| 
								 | 
							
								 * server_write_IV[SecurityParameters.fixed_iv_length]
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * In TLS 1.2, the client_write_IV and server_write_IV are only generated for
							 | 
						||
| 
								 | 
							
								 * implicit nonce techniques as described in Section 3.2.1 of [AEAD]. This
							 | 
						||
| 
								 | 
							
								 * implementation uses TLS 1.0 so IVs are generated.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Implementation note: The currently defined cipher suite which requires the
							 | 
						||
| 
								 | 
							
								 * most material is AES_256_CBC_SHA256. It requires 2 x 32 byte keys and 2 x 32
							 | 
						||
| 
								 | 
							
								 * byte MAC keys, for a total 128 bytes of key material. In TLS 1.0 it also
							 | 
						||
| 
								 | 
							
								 * requires 2 x 16 byte IVs, so it actually takes 160 bytes of key material.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param sp the security parameters to use.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the security keys.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.generateKeys = function(c, sp) {
							 | 
						||
| 
								 | 
							
								  // TLS_RSA_WITH_AES_128_CBC_SHA (required to be compliant with TLS 1.2) &
							 | 
						||
| 
								 | 
							
								  // TLS_RSA_WITH_AES_256_CBC_SHA are the only cipher suites implemented
							 | 
						||
| 
								 | 
							
								  // at present
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA is required to be compliant with
							 | 
						||
| 
								 | 
							
								  // TLS 1.0 but we don't care right now because AES is better and we have
							 | 
						||
| 
								 | 
							
								  // an implementation for it
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // TODO: TLS 1.2 implementation
							 | 
						||
| 
								 | 
							
								  /*
							 | 
						||
| 
								 | 
							
								  // determine the PRF
							 | 
						||
| 
								 | 
							
								  var prf;
							 | 
						||
| 
								 | 
							
								  switch(sp.prf_algorithm) {
							 | 
						||
| 
								 | 
							
								  case tls.PRFAlgorithm.tls_prf_sha256:
							 | 
						||
| 
								 | 
							
								    prf = prf_sha256;
							 | 
						||
| 
								 | 
							
								    break;
							 | 
						||
| 
								 | 
							
								  default:
							 | 
						||
| 
								 | 
							
								    // should never happen
							 | 
						||
| 
								 | 
							
								    throw new Error('Invalid PRF');
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  */
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // TLS 1.0/1.1 implementation
							 | 
						||
| 
								 | 
							
								  var prf = prf_TLS1;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // concatenate server and client random
							 | 
						||
| 
								 | 
							
								  var random = sp.client_random + sp.server_random;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // only create master secret if session is new
							 | 
						||
| 
								 | 
							
								  if(!c.session.resuming) {
							 | 
						||
| 
								 | 
							
								    // create master secret, clean up pre-master secret
							 | 
						||
| 
								 | 
							
								    sp.master_secret = prf(
							 | 
						||
| 
								 | 
							
								      sp.pre_master_secret, 'master secret', random, 48).bytes();
							 | 
						||
| 
								 | 
							
								    sp.pre_master_secret = null;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // generate the amount of key material needed
							 | 
						||
| 
								 | 
							
								  random = sp.server_random + sp.client_random;
							 | 
						||
| 
								 | 
							
								  var length = 2 * sp.mac_key_length + 2 * sp.enc_key_length;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // include IV for TLS/1.0
							 | 
						||
| 
								 | 
							
								  var tls10 = (c.version.major === tls.Versions.TLS_1_0.major &&
							 | 
						||
| 
								 | 
							
								    c.version.minor === tls.Versions.TLS_1_0.minor);
							 | 
						||
| 
								 | 
							
								  if(tls10) {
							 | 
						||
| 
								 | 
							
								    length += 2 * sp.fixed_iv_length;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  var km = prf(sp.master_secret, 'key expansion', random, length);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // split the key material into the MAC and encryption keys
							 | 
						||
| 
								 | 
							
								  var rval = {
							 | 
						||
| 
								 | 
							
								    client_write_MAC_key: km.getBytes(sp.mac_key_length),
							 | 
						||
| 
								 | 
							
								    server_write_MAC_key: km.getBytes(sp.mac_key_length),
							 | 
						||
| 
								 | 
							
								    client_write_key: km.getBytes(sp.enc_key_length),
							 | 
						||
| 
								 | 
							
								    server_write_key: km.getBytes(sp.enc_key_length)
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // include TLS 1.0 IVs
							 | 
						||
| 
								 | 
							
								  if(tls10) {
							 | 
						||
| 
								 | 
							
								    rval.client_write_IV = km.getBytes(sp.fixed_iv_length);
							 | 
						||
| 
								 | 
							
								    rval.server_write_IV = km.getBytes(sp.fixed_iv_length);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Creates a new initialized TLS connection state. A connection state has
							 | 
						||
| 
								 | 
							
								 * a read mode and a write mode.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * compression state:
							 | 
						||
| 
								 | 
							
								 *   The current state of the compression algorithm.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * cipher state:
							 | 
						||
| 
								 | 
							
								 *   The current state of the encryption algorithm. This will consist of the
							 | 
						||
| 
								 | 
							
								 *   scheduled key for that connection. For stream ciphers, this will also
							 | 
						||
| 
								 | 
							
								 *   contain whatever state information is necessary to allow the stream to
							 | 
						||
| 
								 | 
							
								 *   continue to encrypt or decrypt data.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * MAC key:
							 | 
						||
| 
								 | 
							
								 *   The MAC key for the connection.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * sequence number:
							 | 
						||
| 
								 | 
							
								 *   Each connection state contains a sequence number, which is maintained
							 | 
						||
| 
								 | 
							
								 *   separately for read and write states. The sequence number MUST be set to
							 | 
						||
| 
								 | 
							
								 *   zero whenever a connection state is made the active state. Sequence
							 | 
						||
| 
								 | 
							
								 *   numbers are of type uint64 and may not exceed 2^64-1. Sequence numbers do
							 | 
						||
| 
								 | 
							
								 *   not wrap. If a TLS implementation would need to wrap a sequence number,
							 | 
						||
| 
								 | 
							
								 *   it must renegotiate instead. A sequence number is incremented after each
							 | 
						||
| 
								 | 
							
								 *   record: specifically, the first record transmitted under a particular
							 | 
						||
| 
								 | 
							
								 *   connection state MUST use sequence number 0.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the new initialized TLS connection state.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.createConnectionState = function(c) {
							 | 
						||
| 
								 | 
							
								  var client = (c.entity === tls.ConnectionEnd.client);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  var createMode = function() {
							 | 
						||
| 
								 | 
							
								    var mode = {
							 | 
						||
| 
								 | 
							
								      // two 32-bit numbers, first is most significant
							 | 
						||
| 
								 | 
							
								      sequenceNumber: [0, 0],
							 | 
						||
| 
								 | 
							
								      macKey: null,
							 | 
						||
| 
								 | 
							
								      macLength: 0,
							 | 
						||
| 
								 | 
							
								      macFunction: null,
							 | 
						||
| 
								 | 
							
								      cipherState: null,
							 | 
						||
| 
								 | 
							
								      cipherFunction: function(record) {return true;},
							 | 
						||
| 
								 | 
							
								      compressionState: null,
							 | 
						||
| 
								 | 
							
								      compressFunction: function(record) {return true;},
							 | 
						||
| 
								 | 
							
								      updateSequenceNumber: function() {
							 | 
						||
| 
								 | 
							
								        if(mode.sequenceNumber[1] === 0xFFFFFFFF) {
							 | 
						||
| 
								 | 
							
								          mode.sequenceNumber[1] = 0;
							 | 
						||
| 
								 | 
							
								          ++mode.sequenceNumber[0];
							 | 
						||
| 
								 | 
							
								        } else {
							 | 
						||
| 
								 | 
							
								          ++mode.sequenceNumber[1];
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    };
							 | 
						||
| 
								 | 
							
								    return mode;
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								  var state = {
							 | 
						||
| 
								 | 
							
								    read: createMode(),
							 | 
						||
| 
								 | 
							
								    write: createMode()
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // update function in read mode will decrypt then decompress a record
							 | 
						||
| 
								 | 
							
								  state.read.update = function(c, record) {
							 | 
						||
| 
								 | 
							
								    if(!state.read.cipherFunction(record, state.read)) {
							 | 
						||
| 
								 | 
							
								      c.error(c, {
							 | 
						||
| 
								 | 
							
								        message: 'Could not decrypt record or bad MAC.',
							 | 
						||
| 
								 | 
							
								        send: true,
							 | 
						||
| 
								 | 
							
								        alert: {
							 | 
						||
| 
								 | 
							
								          level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								          // doesn't matter if decryption failed or MAC was
							 | 
						||
| 
								 | 
							
								          // invalid, return the same error so as not to reveal
							 | 
						||
| 
								 | 
							
								          // which one occurred
							 | 
						||
| 
								 | 
							
								          description: tls.Alert.Description.bad_record_mac
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								      });
							 | 
						||
| 
								 | 
							
								    } else if(!state.read.compressFunction(c, record, state.read)) {
							 | 
						||
| 
								 | 
							
								      c.error(c, {
							 | 
						||
| 
								 | 
							
								        message: 'Could not decompress record.',
							 | 
						||
| 
								 | 
							
								        send: true,
							 | 
						||
| 
								 | 
							
								        alert: {
							 | 
						||
| 
								 | 
							
								          level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								          description: tls.Alert.Description.decompression_failure
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								      });
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								    return !c.fail;
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // update function in write mode will compress then encrypt a record
							 | 
						||
| 
								 | 
							
								  state.write.update = function(c, record) {
							 | 
						||
| 
								 | 
							
								    if(!state.write.compressFunction(c, record, state.write)) {
							 | 
						||
| 
								 | 
							
								      // error, but do not send alert since it would require
							 | 
						||
| 
								 | 
							
								      // compression as well
							 | 
						||
| 
								 | 
							
								      c.error(c, {
							 | 
						||
| 
								 | 
							
								        message: 'Could not compress record.',
							 | 
						||
| 
								 | 
							
								        send: false,
							 | 
						||
| 
								 | 
							
								        alert: {
							 | 
						||
| 
								 | 
							
								          level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								          description: tls.Alert.Description.internal_error
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								      });
							 | 
						||
| 
								 | 
							
								    } else if(!state.write.cipherFunction(record, state.write)) {
							 | 
						||
| 
								 | 
							
								      // error, but do not send alert since it would require
							 | 
						||
| 
								 | 
							
								      // encryption as well
							 | 
						||
| 
								 | 
							
								      c.error(c, {
							 | 
						||
| 
								 | 
							
								        message: 'Could not encrypt record.',
							 | 
						||
| 
								 | 
							
								        send: false,
							 | 
						||
| 
								 | 
							
								        alert: {
							 | 
						||
| 
								 | 
							
								          level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								          description: tls.Alert.Description.internal_error
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								      });
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								    return !c.fail;
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // handle security parameters
							 | 
						||
| 
								 | 
							
								  if(c.session) {
							 | 
						||
| 
								 | 
							
								    var sp = c.session.sp;
							 | 
						||
| 
								 | 
							
								    c.session.cipherSuite.initSecurityParameters(sp);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // generate keys
							 | 
						||
| 
								 | 
							
								    sp.keys = tls.generateKeys(c, sp);
							 | 
						||
| 
								 | 
							
								    state.read.macKey = client ?
							 | 
						||
| 
								 | 
							
								      sp.keys.server_write_MAC_key : sp.keys.client_write_MAC_key;
							 | 
						||
| 
								 | 
							
								    state.write.macKey = client ?
							 | 
						||
| 
								 | 
							
								      sp.keys.client_write_MAC_key : sp.keys.server_write_MAC_key;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // cipher suite setup
							 | 
						||
| 
								 | 
							
								    c.session.cipherSuite.initConnectionState(state, c, sp);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // compression setup
							 | 
						||
| 
								 | 
							
								    switch(sp.compression_algorithm) {
							 | 
						||
| 
								 | 
							
								    case tls.CompressionMethod.none:
							 | 
						||
| 
								 | 
							
								      break;
							 | 
						||
| 
								 | 
							
								    case tls.CompressionMethod.deflate:
							 | 
						||
| 
								 | 
							
								      state.read.compressFunction = inflate;
							 | 
						||
| 
								 | 
							
								      state.write.compressFunction = deflate;
							 | 
						||
| 
								 | 
							
								      break;
							 | 
						||
| 
								 | 
							
								    default:
							 | 
						||
| 
								 | 
							
								      throw new Error('Unsupported compression algorithm.');
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  return state;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Creates a Random structure.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   uint32 gmt_unix_time;
							 | 
						||
| 
								 | 
							
								 *   opaque random_bytes[28];
							 | 
						||
| 
								 | 
							
								 * } Random;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * gmt_unix_time:
							 | 
						||
| 
								 | 
							
								 *   The current time and date in standard UNIX 32-bit format (seconds since
							 | 
						||
| 
								 | 
							
								 *   the midnight starting Jan 1, 1970, UTC, ignoring leap seconds) according
							 | 
						||
| 
								 | 
							
								 *   to the sender's internal clock. Clocks are not required to be set
							 | 
						||
| 
								 | 
							
								 *   correctly by the basic TLS protocol; higher-level or application
							 | 
						||
| 
								 | 
							
								 *   protocols may define additional requirements. Note that, for historical
							 | 
						||
| 
								 | 
							
								 *   reasons, the data element is named using GMT, the predecessor of the
							 | 
						||
| 
								 | 
							
								 *   current worldwide time base, UTC.
							 | 
						||
| 
								 | 
							
								 * random_bytes:
							 | 
						||
| 
								 | 
							
								 *   28 bytes generated by a secure random number generator.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the Random structure as a byte array.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.createRandom = function() {
							 | 
						||
| 
								 | 
							
								  // get UTC milliseconds
							 | 
						||
| 
								 | 
							
								  var d = new Date();
							 | 
						||
| 
								 | 
							
								  var utc = +d + d.getTimezoneOffset() * 60000;
							 | 
						||
| 
								 | 
							
								  var rval = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  rval.putInt32(utc);
							 | 
						||
| 
								 | 
							
								  rval.putBytes(forge.random.getBytes(28));
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Creates a TLS record with the given type and data.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param options:
							 | 
						||
| 
								 | 
							
								 *   type: the record type.
							 | 
						||
| 
								 | 
							
								 *   data: the plain text data in a byte buffer.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the created record.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.createRecord = function(c, options) {
							 | 
						||
| 
								 | 
							
								  if(!options.data) {
							 | 
						||
| 
								 | 
							
								    return null;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  var record = {
							 | 
						||
| 
								 | 
							
								    type: options.type,
							 | 
						||
| 
								 | 
							
								    version: {
							 | 
						||
| 
								 | 
							
								      major: c.version.major,
							 | 
						||
| 
								 | 
							
								      minor: c.version.minor
							 | 
						||
| 
								 | 
							
								    },
							 | 
						||
| 
								 | 
							
								    length: options.data.length(),
							 | 
						||
| 
								 | 
							
								    fragment: options.data
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								  return record;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Creates a TLS alert record.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param alert:
							 | 
						||
| 
								 | 
							
								 *   level: the TLS alert level.
							 | 
						||
| 
								 | 
							
								 *   description: the TLS alert description.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the created alert record.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.createAlert = function(c, alert) {
							 | 
						||
| 
								 | 
							
								  var b = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  b.putByte(alert.level);
							 | 
						||
| 
								 | 
							
								  b.putByte(alert.description);
							 | 
						||
| 
								 | 
							
								  return tls.createRecord(c, {
							 | 
						||
| 
								 | 
							
								    type: tls.ContentType.alert,
							 | 
						||
| 
								 | 
							
								    data: b
							 | 
						||
| 
								 | 
							
								  });
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/* The structure of a TLS handshake message.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *    HandshakeType msg_type;    // handshake type
							 | 
						||
| 
								 | 
							
								 *    uint24 length;             // bytes in message
							 | 
						||
| 
								 | 
							
								 *    select(HandshakeType) {
							 | 
						||
| 
								 | 
							
								 *       case hello_request:       HelloRequest;
							 | 
						||
| 
								 | 
							
								 *       case client_hello:        ClientHello;
							 | 
						||
| 
								 | 
							
								 *       case server_hello:        ServerHello;
							 | 
						||
| 
								 | 
							
								 *       case certificate:         Certificate;
							 | 
						||
| 
								 | 
							
								 *       case server_key_exchange: ServerKeyExchange;
							 | 
						||
| 
								 | 
							
								 *       case certificate_request: CertificateRequest;
							 | 
						||
| 
								 | 
							
								 *       case server_hello_done:   ServerHelloDone;
							 | 
						||
| 
								 | 
							
								 *       case certificate_verify:  CertificateVerify;
							 | 
						||
| 
								 | 
							
								 *       case client_key_exchange: ClientKeyExchange;
							 | 
						||
| 
								 | 
							
								 *       case finished:            Finished;
							 | 
						||
| 
								 | 
							
								 *    } body;
							 | 
						||
| 
								 | 
							
								 * } Handshake;
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Creates a ClientHello message.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * opaque SessionID<0..32>;
							 | 
						||
| 
								 | 
							
								 * enum { null(0), deflate(1), (255) } CompressionMethod;
							 | 
						||
| 
								 | 
							
								 * uint8 CipherSuite[2];
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   ProtocolVersion client_version;
							 | 
						||
| 
								 | 
							
								 *   Random random;
							 | 
						||
| 
								 | 
							
								 *   SessionID session_id;
							 | 
						||
| 
								 | 
							
								 *   CipherSuite cipher_suites<2..2^16-2>;
							 | 
						||
| 
								 | 
							
								 *   CompressionMethod compression_methods<1..2^8-1>;
							 | 
						||
| 
								 | 
							
								 *   select(extensions_present) {
							 | 
						||
| 
								 | 
							
								 *     case false:
							 | 
						||
| 
								 | 
							
								 *       struct {};
							 | 
						||
| 
								 | 
							
								 *     case true:
							 | 
						||
| 
								 | 
							
								 *       Extension extensions<0..2^16-1>;
							 | 
						||
| 
								 | 
							
								 *   };
							 | 
						||
| 
								 | 
							
								 * } ClientHello;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The extension format for extended client hellos and server hellos is:
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   ExtensionType extension_type;
							 | 
						||
| 
								 | 
							
								 *   opaque extension_data<0..2^16-1>;
							 | 
						||
| 
								 | 
							
								 * } Extension;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Here:
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * - "extension_type" identifies the particular extension type.
							 | 
						||
| 
								 | 
							
								 * - "extension_data" contains information specific to the particular
							 | 
						||
| 
								 | 
							
								 * extension type.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The extension types defined in this document are:
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * enum {
							 | 
						||
| 
								 | 
							
								 *   server_name(0), max_fragment_length(1),
							 | 
						||
| 
								 | 
							
								 *   client_certificate_url(2), trusted_ca_keys(3),
							 | 
						||
| 
								 | 
							
								 *   truncated_hmac(4), status_request(5), (65535)
							 | 
						||
| 
								 | 
							
								 * } ExtensionType;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the ClientHello byte buffer.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.createClientHello = function(c) {
							 | 
						||
| 
								 | 
							
								  // save hello version
							 | 
						||
| 
								 | 
							
								  c.session.clientHelloVersion = {
							 | 
						||
| 
								 | 
							
								    major: c.version.major,
							 | 
						||
| 
								 | 
							
								    minor: c.version.minor
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // create supported cipher suites
							 | 
						||
| 
								 | 
							
								  var cipherSuites = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  for(var i = 0; i < c.cipherSuites.length; ++i) {
							 | 
						||
| 
								 | 
							
								    var cs = c.cipherSuites[i];
							 | 
						||
| 
								 | 
							
								    cipherSuites.putByte(cs.id[0]);
							 | 
						||
| 
								 | 
							
								    cipherSuites.putByte(cs.id[1]);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  var cSuites = cipherSuites.length();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // create supported compression methods, null always supported, but
							 | 
						||
| 
								 | 
							
								  // also support deflate if connection has inflate and deflate methods
							 | 
						||
| 
								 | 
							
								  var compressionMethods = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  compressionMethods.putByte(tls.CompressionMethod.none);
							 | 
						||
| 
								 | 
							
								  // FIXME: deflate support disabled until issues with raw deflate data
							 | 
						||
| 
								 | 
							
								  // without zlib headers are resolved
							 | 
						||
| 
								 | 
							
								  /*
							 | 
						||
| 
								 | 
							
								  if(c.inflate !== null && c.deflate !== null) {
							 | 
						||
| 
								 | 
							
								    compressionMethods.putByte(tls.CompressionMethod.deflate);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  */
							 | 
						||
| 
								 | 
							
								  var cMethods = compressionMethods.length();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // create TLS SNI (server name indication) extension if virtual host
							 | 
						||
| 
								 | 
							
								  // has been specified, see RFC 3546
							 | 
						||
| 
								 | 
							
								  var extensions = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  if(c.virtualHost) {
							 | 
						||
| 
								 | 
							
								    // create extension struct
							 | 
						||
| 
								 | 
							
								    var ext = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								    ext.putByte(0x00); // type server_name (ExtensionType is 2 bytes)
							 | 
						||
| 
								 | 
							
								    ext.putByte(0x00);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    /* In order to provide the server name, clients MAY include an
							 | 
						||
| 
								 | 
							
								     * extension of type "server_name" in the (extended) client hello.
							 | 
						||
| 
								 | 
							
								     * The "extension_data" field of this extension SHALL contain
							 | 
						||
| 
								 | 
							
								     * "ServerNameList" where:
							 | 
						||
| 
								 | 
							
								     *
							 | 
						||
| 
								 | 
							
								     * struct {
							 | 
						||
| 
								 | 
							
								     *   NameType name_type;
							 | 
						||
| 
								 | 
							
								     *   select(name_type) {
							 | 
						||
| 
								 | 
							
								     *     case host_name: HostName;
							 | 
						||
| 
								 | 
							
								     *   } name;
							 | 
						||
| 
								 | 
							
								     * } ServerName;
							 | 
						||
| 
								 | 
							
								     *
							 | 
						||
| 
								 | 
							
								     * enum {
							 | 
						||
| 
								 | 
							
								     *   host_name(0), (255)
							 | 
						||
| 
								 | 
							
								     * } NameType;
							 | 
						||
| 
								 | 
							
								     *
							 | 
						||
| 
								 | 
							
								     * opaque HostName<1..2^16-1>;
							 | 
						||
| 
								 | 
							
								     *
							 | 
						||
| 
								 | 
							
								     * struct {
							 | 
						||
| 
								 | 
							
								     *   ServerName server_name_list<1..2^16-1>
							 | 
						||
| 
								 | 
							
								     * } ServerNameList;
							 | 
						||
| 
								 | 
							
								     */
							 | 
						||
| 
								 | 
							
								    var serverName = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								    serverName.putByte(0x00); // type host_name
							 | 
						||
| 
								 | 
							
								    writeVector(serverName, 2, forge.util.createBuffer(c.virtualHost));
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // ServerNameList is in extension_data
							 | 
						||
| 
								 | 
							
								    var snList = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								    writeVector(snList, 2, serverName);
							 | 
						||
| 
								 | 
							
								    writeVector(ext, 2, snList);
							 | 
						||
| 
								 | 
							
								    extensions.putBuffer(ext);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  var extLength = extensions.length();
							 | 
						||
| 
								 | 
							
								  if(extLength > 0) {
							 | 
						||
| 
								 | 
							
								    // add extension vector length
							 | 
						||
| 
								 | 
							
								    extLength += 2;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // determine length of the handshake message
							 | 
						||
| 
								 | 
							
								  // cipher suites and compression methods size will need to be
							 | 
						||
| 
								 | 
							
								  // updated if more get added to the list
							 | 
						||
| 
								 | 
							
								  var sessionId = c.session.id;
							 | 
						||
| 
								 | 
							
								  var length =
							 | 
						||
| 
								 | 
							
								    sessionId.length + 1 + // session ID vector
							 | 
						||
| 
								 | 
							
								    2 +                    // version (major + minor)
							 | 
						||
| 
								 | 
							
								    4 + 28 +               // random time and random bytes
							 | 
						||
| 
								 | 
							
								    2 + cSuites +          // cipher suites vector
							 | 
						||
| 
								 | 
							
								    1 + cMethods +         // compression methods vector
							 | 
						||
| 
								 | 
							
								    extLength;             // extensions vector
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // build record fragment
							 | 
						||
| 
								 | 
							
								  var rval = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  rval.putByte(tls.HandshakeType.client_hello);
							 | 
						||
| 
								 | 
							
								  rval.putInt24(length);                     // handshake length
							 | 
						||
| 
								 | 
							
								  rval.putByte(c.version.major);             // major version
							 | 
						||
| 
								 | 
							
								  rval.putByte(c.version.minor);             // minor version
							 | 
						||
| 
								 | 
							
								  rval.putBytes(c.session.sp.client_random); // random time + bytes
							 | 
						||
| 
								 | 
							
								  writeVector(rval, 1, forge.util.createBuffer(sessionId));
							 | 
						||
| 
								 | 
							
								  writeVector(rval, 2, cipherSuites);
							 | 
						||
| 
								 | 
							
								  writeVector(rval, 1, compressionMethods);
							 | 
						||
| 
								 | 
							
								  if(extLength > 0) {
							 | 
						||
| 
								 | 
							
								    writeVector(rval, 2, extensions);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Creates a ServerHello message.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the ServerHello byte buffer.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.createServerHello = function(c) {
							 | 
						||
| 
								 | 
							
								  // determine length of the handshake message
							 | 
						||
| 
								 | 
							
								  var sessionId = c.session.id;
							 | 
						||
| 
								 | 
							
								  var length =
							 | 
						||
| 
								 | 
							
								    sessionId.length + 1 + // session ID vector
							 | 
						||
| 
								 | 
							
								    2 +                    // version (major + minor)
							 | 
						||
| 
								 | 
							
								    4 + 28 +               // random time and random bytes
							 | 
						||
| 
								 | 
							
								    2 +                    // chosen cipher suite
							 | 
						||
| 
								 | 
							
								    1;                     // chosen compression method
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // build record fragment
							 | 
						||
| 
								 | 
							
								  var rval = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  rval.putByte(tls.HandshakeType.server_hello);
							 | 
						||
| 
								 | 
							
								  rval.putInt24(length);                     // handshake length
							 | 
						||
| 
								 | 
							
								  rval.putByte(c.version.major);             // major version
							 | 
						||
| 
								 | 
							
								  rval.putByte(c.version.minor);             // minor version
							 | 
						||
| 
								 | 
							
								  rval.putBytes(c.session.sp.server_random); // random time + bytes
							 | 
						||
| 
								 | 
							
								  writeVector(rval, 1, forge.util.createBuffer(sessionId));
							 | 
						||
| 
								 | 
							
								  rval.putByte(c.session.cipherSuite.id[0]);
							 | 
						||
| 
								 | 
							
								  rval.putByte(c.session.cipherSuite.id[1]);
							 | 
						||
| 
								 | 
							
								  rval.putByte(c.session.compressionMethod);
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Creates a Certificate message.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * When this message will be sent:
							 | 
						||
| 
								 | 
							
								 *   This is the first message the client can send after receiving a server
							 | 
						||
| 
								 | 
							
								 *   hello done message and the first message the server can send after
							 | 
						||
| 
								 | 
							
								 *   sending a ServerHello. This client message is only sent if the server
							 | 
						||
| 
								 | 
							
								 *   requests a certificate. If no suitable certificate is available, the
							 | 
						||
| 
								 | 
							
								 *   client should send a certificate message containing no certificates. If
							 | 
						||
| 
								 | 
							
								 *   client authentication is required by the server for the handshake to
							 | 
						||
| 
								 | 
							
								 *   continue, it may respond with a fatal handshake failure alert.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * opaque ASN.1Cert<1..2^24-1>;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   ASN.1Cert certificate_list<0..2^24-1>;
							 | 
						||
| 
								 | 
							
								 * } Certificate;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the Certificate byte buffer.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.createCertificate = function(c) {
							 | 
						||
| 
								 | 
							
								  // TODO: check certificate request to ensure types are supported
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // get a certificate (a certificate as a PEM string)
							 | 
						||
| 
								 | 
							
								  var client = (c.entity === tls.ConnectionEnd.client);
							 | 
						||
| 
								 | 
							
								  var cert = null;
							 | 
						||
| 
								 | 
							
								  if(c.getCertificate) {
							 | 
						||
| 
								 | 
							
								    var hint;
							 | 
						||
| 
								 | 
							
								    if(client) {
							 | 
						||
| 
								 | 
							
								      hint = c.session.certificateRequest;
							 | 
						||
| 
								 | 
							
								    } else {
							 | 
						||
| 
								 | 
							
								      hint = c.session.extensions.server_name.serverNameList;
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								    cert = c.getCertificate(c, hint);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // buffer to hold certificate list
							 | 
						||
| 
								 | 
							
								  var certList = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  if(cert !== null) {
							 | 
						||
| 
								 | 
							
								    try {
							 | 
						||
| 
								 | 
							
								      // normalize cert to a chain of certificates
							 | 
						||
| 
								 | 
							
								      if(!forge.util.isArray(cert)) {
							 | 
						||
| 
								 | 
							
								        cert = [cert];
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								      var asn1 = null;
							 | 
						||
| 
								 | 
							
								      for(var i = 0; i < cert.length; ++i) {
							 | 
						||
| 
								 | 
							
								        var msg = forge.pem.decode(cert[i])[0];
							 | 
						||
| 
								 | 
							
								        if(msg.type !== 'CERTIFICATE' &&
							 | 
						||
| 
								 | 
							
								          msg.type !== 'X509 CERTIFICATE' &&
							 | 
						||
| 
								 | 
							
								          msg.type !== 'TRUSTED CERTIFICATE') {
							 | 
						||
| 
								 | 
							
								          var error = new Error('Could not convert certificate from PEM; PEM ' +
							 | 
						||
| 
								 | 
							
								            'header type is not "CERTIFICATE", "X509 CERTIFICATE", or ' +
							 | 
						||
| 
								 | 
							
								            '"TRUSTED CERTIFICATE".');
							 | 
						||
| 
								 | 
							
								          error.headerType = msg.type;
							 | 
						||
| 
								 | 
							
								          throw error;
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								        if(msg.procType && msg.procType.type === 'ENCRYPTED') {
							 | 
						||
| 
								 | 
							
								          throw new Error('Could not convert certificate from PEM; PEM is encrypted.');
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								        var der = forge.util.createBuffer(msg.body);
							 | 
						||
| 
								 | 
							
								        if(asn1 === null) {
							 | 
						||
| 
								 | 
							
								          asn1 = forge.asn1.fromDer(der.bytes(), false);
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								        // certificate entry is itself a vector with 3 length bytes
							 | 
						||
| 
								 | 
							
								        var certBuffer = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								        writeVector(certBuffer, 3, der);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								        // add cert vector to cert list vector
							 | 
						||
| 
								 | 
							
								        certList.putBuffer(certBuffer);
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // save certificate
							 | 
						||
| 
								 | 
							
								      cert = forge.pki.certificateFromAsn1(asn1);
							 | 
						||
| 
								 | 
							
								      if(client) {
							 | 
						||
| 
								 | 
							
								        c.session.clientCertificate = cert;
							 | 
						||
| 
								 | 
							
								      } else {
							 | 
						||
| 
								 | 
							
								        c.session.serverCertificate = cert;
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    } catch(ex) {
							 | 
						||
| 
								 | 
							
								      return c.error(c, {
							 | 
						||
| 
								 | 
							
								        message: 'Could not send certificate list.',
							 | 
						||
| 
								 | 
							
								        cause: ex,
							 | 
						||
| 
								 | 
							
								        send: true,
							 | 
						||
| 
								 | 
							
								        alert: {
							 | 
						||
| 
								 | 
							
								          level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								          description: tls.Alert.Description.bad_certificate
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								      });
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // determine length of the handshake message
							 | 
						||
| 
								 | 
							
								  var length = 3 + certList.length(); // cert list vector
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // build record fragment
							 | 
						||
| 
								 | 
							
								  var rval = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  rval.putByte(tls.HandshakeType.certificate);
							 | 
						||
| 
								 | 
							
								  rval.putInt24(length);
							 | 
						||
| 
								 | 
							
								  writeVector(rval, 3, certList);
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Creates a ClientKeyExchange message.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * When this message will be sent:
							 | 
						||
| 
								 | 
							
								 *   This message is always sent by the client. It will immediately follow the
							 | 
						||
| 
								 | 
							
								 *   client certificate message, if it is sent. Otherwise it will be the first
							 | 
						||
| 
								 | 
							
								 *   message sent by the client after it receives the server hello done
							 | 
						||
| 
								 | 
							
								 *   message.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Meaning of this message:
							 | 
						||
| 
								 | 
							
								 *   With this message, the premaster secret is set, either though direct
							 | 
						||
| 
								 | 
							
								 *   transmission of the RSA-encrypted secret, or by the transmission of
							 | 
						||
| 
								 | 
							
								 *   Diffie-Hellman parameters which will allow each side to agree upon the
							 | 
						||
| 
								 | 
							
								 *   same premaster secret. When the key exchange method is DH_RSA or DH_DSS,
							 | 
						||
| 
								 | 
							
								 *   client certification has been requested, and the client was able to
							 | 
						||
| 
								 | 
							
								 *   respond with a certificate which contained a Diffie-Hellman public key
							 | 
						||
| 
								 | 
							
								 *   whose parameters (group and generator) matched those specified by the
							 | 
						||
| 
								 | 
							
								 *   server in its certificate, this message will not contain any data.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Meaning of this message:
							 | 
						||
| 
								 | 
							
								 *   If RSA is being used for key agreement and authentication, the client
							 | 
						||
| 
								 | 
							
								 *   generates a 48-byte premaster secret, encrypts it using the public key
							 | 
						||
| 
								 | 
							
								 *   from the server's certificate or the temporary RSA key provided in a
							 | 
						||
| 
								 | 
							
								 *   server key exchange message, and sends the result in an encrypted
							 | 
						||
| 
								 | 
							
								 *   premaster secret message. This structure is a variant of the client
							 | 
						||
| 
								 | 
							
								 *   key exchange message, not a message in itself.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   select(KeyExchangeAlgorithm) {
							 | 
						||
| 
								 | 
							
								 *     case rsa: EncryptedPreMasterSecret;
							 | 
						||
| 
								 | 
							
								 *     case diffie_hellman: ClientDiffieHellmanPublic;
							 | 
						||
| 
								 | 
							
								 *   } exchange_keys;
							 | 
						||
| 
								 | 
							
								 * } ClientKeyExchange;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   ProtocolVersion client_version;
							 | 
						||
| 
								 | 
							
								 *   opaque random[46];
							 | 
						||
| 
								 | 
							
								 * } PreMasterSecret;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   public-key-encrypted PreMasterSecret pre_master_secret;
							 | 
						||
| 
								 | 
							
								 * } EncryptedPreMasterSecret;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * A public-key-encrypted element is encoded as a vector <0..2^16-1>.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the ClientKeyExchange byte buffer.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.createClientKeyExchange = function(c) {
							 | 
						||
| 
								 | 
							
								  // create buffer to encrypt
							 | 
						||
| 
								 | 
							
								  var b = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // add highest client-supported protocol to help server avoid version
							 | 
						||
| 
								 | 
							
								  // rollback attacks
							 | 
						||
| 
								 | 
							
								  b.putByte(c.session.clientHelloVersion.major);
							 | 
						||
| 
								 | 
							
								  b.putByte(c.session.clientHelloVersion.minor);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // generate and add 46 random bytes
							 | 
						||
| 
								 | 
							
								  b.putBytes(forge.random.getBytes(46));
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // save pre-master secret
							 | 
						||
| 
								 | 
							
								  var sp = c.session.sp;
							 | 
						||
| 
								 | 
							
								  sp.pre_master_secret = b.getBytes();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // RSA-encrypt the pre-master secret
							 | 
						||
| 
								 | 
							
								  var key = c.session.serverCertificate.publicKey;
							 | 
						||
| 
								 | 
							
								  b = key.encrypt(sp.pre_master_secret);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  /* Note: The encrypted pre-master secret will be stored in a
							 | 
						||
| 
								 | 
							
								    public-key-encrypted opaque vector that has the length prefixed using
							 | 
						||
| 
								 | 
							
								    2 bytes, so include those 2 bytes in the handshake message length. This
							 | 
						||
| 
								 | 
							
								    is done as a minor optimization instead of calling writeVector(). */
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // determine length of the handshake message
							 | 
						||
| 
								 | 
							
								  var length = b.length + 2;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // build record fragment
							 | 
						||
| 
								 | 
							
								  var rval = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  rval.putByte(tls.HandshakeType.client_key_exchange);
							 | 
						||
| 
								 | 
							
								  rval.putInt24(length);
							 | 
						||
| 
								 | 
							
								  // add vector length bytes
							 | 
						||
| 
								 | 
							
								  rval.putInt16(b.length);
							 | 
						||
| 
								 | 
							
								  rval.putBytes(b);
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Creates a ServerKeyExchange message.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the ServerKeyExchange byte buffer.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.createServerKeyExchange = function(c) {
							 | 
						||
| 
								 | 
							
								  // this implementation only supports RSA, no Diffie-Hellman support,
							 | 
						||
| 
								 | 
							
								  // so this record is empty
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // determine length of the handshake message
							 | 
						||
| 
								 | 
							
								  var length = 0;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // build record fragment
							 | 
						||
| 
								 | 
							
								  var rval = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  if(length > 0) {
							 | 
						||
| 
								 | 
							
								    rval.putByte(tls.HandshakeType.server_key_exchange);
							 | 
						||
| 
								 | 
							
								    rval.putInt24(length);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Gets the signed data used to verify a client-side certificate. See
							 | 
						||
| 
								 | 
							
								 * tls.createCertificateVerify() for details.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param callback the callback to call once the signed data is ready.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.getClientSignature = function(c, callback) {
							 | 
						||
| 
								 | 
							
								  // generate data to RSA encrypt
							 | 
						||
| 
								 | 
							
								  var b = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  b.putBuffer(c.session.md5.digest());
							 | 
						||
| 
								 | 
							
								  b.putBuffer(c.session.sha1.digest());
							 | 
						||
| 
								 | 
							
								  b = b.getBytes();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // create default signing function as necessary
							 | 
						||
| 
								 | 
							
								  c.getSignature = c.getSignature || function(c, b, callback) {
							 | 
						||
| 
								 | 
							
								    // do rsa encryption, call callback
							 | 
						||
| 
								 | 
							
								    var privateKey = null;
							 | 
						||
| 
								 | 
							
								    if(c.getPrivateKey) {
							 | 
						||
| 
								 | 
							
								      try {
							 | 
						||
| 
								 | 
							
								        privateKey = c.getPrivateKey(c, c.session.clientCertificate);
							 | 
						||
| 
								 | 
							
								        privateKey = forge.pki.privateKeyFromPem(privateKey);
							 | 
						||
| 
								 | 
							
								      } catch(ex) {
							 | 
						||
| 
								 | 
							
								        c.error(c, {
							 | 
						||
| 
								 | 
							
								          message: 'Could not get private key.',
							 | 
						||
| 
								 | 
							
								          cause: ex,
							 | 
						||
| 
								 | 
							
								          send: true,
							 | 
						||
| 
								 | 
							
								          alert: {
							 | 
						||
| 
								 | 
							
								            level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								            description: tls.Alert.Description.internal_error
							 | 
						||
| 
								 | 
							
								          }
							 | 
						||
| 
								 | 
							
								        });
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								    if(privateKey === null) {
							 | 
						||
| 
								 | 
							
								      c.error(c, {
							 | 
						||
| 
								 | 
							
								        message: 'No private key set.',
							 | 
						||
| 
								 | 
							
								        send: true,
							 | 
						||
| 
								 | 
							
								        alert: {
							 | 
						||
| 
								 | 
							
								          level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								          description: tls.Alert.Description.internal_error
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								      });
							 | 
						||
| 
								 | 
							
								    } else {
							 | 
						||
| 
								 | 
							
								      b = privateKey.sign(b, null);
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								    callback(c, b);
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // get client signature
							 | 
						||
| 
								 | 
							
								  c.getSignature(c, b, callback);
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Creates a CertificateVerify message.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Meaning of this message:
							 | 
						||
| 
								 | 
							
								 *   This structure conveys the client's Diffie-Hellman public value
							 | 
						||
| 
								 | 
							
								 *   (Yc) if it was not already included in the client's certificate.
							 | 
						||
| 
								 | 
							
								 *   The encoding used for Yc is determined by the enumerated
							 | 
						||
| 
								 | 
							
								 *   PublicValueEncoding. This structure is a variant of the client
							 | 
						||
| 
								 | 
							
								 *   key exchange message, not a message in itself.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * When this message will be sent:
							 | 
						||
| 
								 | 
							
								 *   This message is used to provide explicit verification of a client
							 | 
						||
| 
								 | 
							
								 *   certificate. This message is only sent following a client
							 | 
						||
| 
								 | 
							
								 *   certificate that has signing capability (i.e. all certificates
							 | 
						||
| 
								 | 
							
								 *   except those containing fixed Diffie-Hellman parameters). When
							 | 
						||
| 
								 | 
							
								 *   sent, it will immediately follow the client key exchange message.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   Signature signature;
							 | 
						||
| 
								 | 
							
								 * } CertificateVerify;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * CertificateVerify.signature.md5_hash
							 | 
						||
| 
								 | 
							
								 *   MD5(handshake_messages);
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Certificate.signature.sha_hash
							 | 
						||
| 
								 | 
							
								 *   SHA(handshake_messages);
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * Here handshake_messages refers to all handshake messages sent or
							 | 
						||
| 
								 | 
							
								 * received starting at client hello up to but not including this
							 | 
						||
| 
								 | 
							
								 * message, including the type and length fields of the handshake
							 | 
						||
| 
								 | 
							
								 * messages.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * select(SignatureAlgorithm) {
							 | 
						||
| 
								 | 
							
								 *   case anonymous: struct { };
							 | 
						||
| 
								 | 
							
								 *   case rsa:
							 | 
						||
| 
								 | 
							
								 *     digitally-signed struct {
							 | 
						||
| 
								 | 
							
								 *       opaque md5_hash[16];
							 | 
						||
| 
								 | 
							
								 *       opaque sha_hash[20];
							 | 
						||
| 
								 | 
							
								 *     };
							 | 
						||
| 
								 | 
							
								 *   case dsa:
							 | 
						||
| 
								 | 
							
								 *     digitally-signed struct {
							 | 
						||
| 
								 | 
							
								 *       opaque sha_hash[20];
							 | 
						||
| 
								 | 
							
								 *     };
							 | 
						||
| 
								 | 
							
								 * } Signature;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * In digital signing, one-way hash functions are used as input for a
							 | 
						||
| 
								 | 
							
								 * signing algorithm. A digitally-signed element is encoded as an opaque
							 | 
						||
| 
								 | 
							
								 * vector <0..2^16-1>, where the length is specified by the signing
							 | 
						||
| 
								 | 
							
								 * algorithm and key.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * In RSA signing, a 36-byte structure of two hashes (one SHA and one
							 | 
						||
| 
								 | 
							
								 * MD5) is signed (encrypted with the private key). It is encoded with
							 | 
						||
| 
								 | 
							
								 * PKCS #1 block type 0 or type 1 as described in [PKCS1].
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * In DSS, the 20 bytes of the SHA hash are run directly through the
							 | 
						||
| 
								 | 
							
								 * Digital Signing Algorithm with no additional hashing.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param signature the signature to include in the message.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the CertificateVerify byte buffer.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.createCertificateVerify = function(c, signature) {
							 | 
						||
| 
								 | 
							
								  /* Note: The signature will be stored in a "digitally-signed" opaque
							 | 
						||
| 
								 | 
							
								    vector that has the length prefixed using 2 bytes, so include those
							 | 
						||
| 
								 | 
							
								    2 bytes in the handshake message length. This is done as a minor
							 | 
						||
| 
								 | 
							
								    optimization instead of calling writeVector(). */
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // determine length of the handshake message
							 | 
						||
| 
								 | 
							
								  var length = signature.length + 2;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // build record fragment
							 | 
						||
| 
								 | 
							
								  var rval = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  rval.putByte(tls.HandshakeType.certificate_verify);
							 | 
						||
| 
								 | 
							
								  rval.putInt24(length);
							 | 
						||
| 
								 | 
							
								  // add vector length bytes
							 | 
						||
| 
								 | 
							
								  rval.putInt16(signature.length);
							 | 
						||
| 
								 | 
							
								  rval.putBytes(signature);
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Creates a CertificateRequest message.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the CertificateRequest byte buffer.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.createCertificateRequest = function(c) {
							 | 
						||
| 
								 | 
							
								  // TODO: support other certificate types
							 | 
						||
| 
								 | 
							
								  var certTypes = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // common RSA certificate type
							 | 
						||
| 
								 | 
							
								  certTypes.putByte(0x01);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // add distinguished names from CA store
							 | 
						||
| 
								 | 
							
								  var cAs = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  for(var key in c.caStore.certs) {
							 | 
						||
| 
								 | 
							
								    var cert = c.caStore.certs[key];
							 | 
						||
| 
								 | 
							
								    var dn = forge.pki.distinguishedNameToAsn1(cert.subject);
							 | 
						||
| 
								 | 
							
								    var byteBuffer = forge.asn1.toDer(dn);
							 | 
						||
| 
								 | 
							
								    cAs.putInt16(byteBuffer.length());
							 | 
						||
| 
								 | 
							
								    cAs.putBuffer(byteBuffer);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // TODO: TLS 1.2+ has a different format
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // determine length of the handshake message
							 | 
						||
| 
								 | 
							
								  var length =
							 | 
						||
| 
								 | 
							
								    1 + certTypes.length() +
							 | 
						||
| 
								 | 
							
								    2 + cAs.length();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // build record fragment
							 | 
						||
| 
								 | 
							
								  var rval = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  rval.putByte(tls.HandshakeType.certificate_request);
							 | 
						||
| 
								 | 
							
								  rval.putInt24(length);
							 | 
						||
| 
								 | 
							
								  writeVector(rval, 1, certTypes);
							 | 
						||
| 
								 | 
							
								  writeVector(rval, 2, cAs);
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Creates a ServerHelloDone message.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the ServerHelloDone byte buffer.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.createServerHelloDone = function(c) {
							 | 
						||
| 
								 | 
							
								  // build record fragment
							 | 
						||
| 
								 | 
							
								  var rval = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  rval.putByte(tls.HandshakeType.server_hello_done);
							 | 
						||
| 
								 | 
							
								  rval.putInt24(0);
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Creates a ChangeCipherSpec message.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The change cipher spec protocol exists to signal transitions in
							 | 
						||
| 
								 | 
							
								 * ciphering strategies. The protocol consists of a single message,
							 | 
						||
| 
								 | 
							
								 * which is encrypted and compressed under the current (not the pending)
							 | 
						||
| 
								 | 
							
								 * connection state. The message consists of a single byte of value 1.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   enum { change_cipher_spec(1), (255) } type;
							 | 
						||
| 
								 | 
							
								 * } ChangeCipherSpec;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the ChangeCipherSpec byte buffer.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.createChangeCipherSpec = function() {
							 | 
						||
| 
								 | 
							
								  var rval = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  rval.putByte(0x01);
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Creates a Finished message.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   opaque verify_data[12];
							 | 
						||
| 
								 | 
							
								 * } Finished;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * verify_data
							 | 
						||
| 
								 | 
							
								 *   PRF(master_secret, finished_label, MD5(handshake_messages) +
							 | 
						||
| 
								 | 
							
								 *   SHA-1(handshake_messages)) [0..11];
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * finished_label
							 | 
						||
| 
								 | 
							
								 *   For Finished messages sent by the client, the string "client
							 | 
						||
| 
								 | 
							
								 *   finished". For Finished messages sent by the server, the
							 | 
						||
| 
								 | 
							
								 *   string "server finished".
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * handshake_messages
							 | 
						||
| 
								 | 
							
								 *   All of the data from all handshake messages up to but not
							 | 
						||
| 
								 | 
							
								 *   including this message. This is only data visible at the
							 | 
						||
| 
								 | 
							
								 *   handshake layer and does not include record layer headers.
							 | 
						||
| 
								 | 
							
								 *   This is the concatenation of all the Handshake structures as
							 | 
						||
| 
								 | 
							
								 *   defined in 7.4 exchanged thus far.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the Finished byte buffer.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.createFinished = function(c) {
							 | 
						||
| 
								 | 
							
								  // generate verify_data
							 | 
						||
| 
								 | 
							
								  var b = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  b.putBuffer(c.session.md5.digest());
							 | 
						||
| 
								 | 
							
								  b.putBuffer(c.session.sha1.digest());
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // TODO: determine prf function and verify length for TLS 1.2
							 | 
						||
| 
								 | 
							
								  var client = (c.entity === tls.ConnectionEnd.client);
							 | 
						||
| 
								 | 
							
								  var sp = c.session.sp;
							 | 
						||
| 
								 | 
							
								  var vdl = 12;
							 | 
						||
| 
								 | 
							
								  var prf = prf_TLS1;
							 | 
						||
| 
								 | 
							
								  var label = client ? 'client finished' : 'server finished';
							 | 
						||
| 
								 | 
							
								  b = prf(sp.master_secret, label, b.getBytes(), vdl);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // build record fragment
							 | 
						||
| 
								 | 
							
								  var rval = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  rval.putByte(tls.HandshakeType.finished);
							 | 
						||
| 
								 | 
							
								  rval.putInt24(b.length());
							 | 
						||
| 
								 | 
							
								  rval.putBuffer(b);
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Creates a HeartbeatMessage (See RFC 6520).
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * struct {
							 | 
						||
| 
								 | 
							
								 *   HeartbeatMessageType type;
							 | 
						||
| 
								 | 
							
								 *   uint16 payload_length;
							 | 
						||
| 
								 | 
							
								 *   opaque payload[HeartbeatMessage.payload_length];
							 | 
						||
| 
								 | 
							
								 *   opaque padding[padding_length];
							 | 
						||
| 
								 | 
							
								 * } HeartbeatMessage;
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The total length of a HeartbeatMessage MUST NOT exceed 2^14 or
							 | 
						||
| 
								 | 
							
								 * max_fragment_length when negotiated as defined in [RFC6066].
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * type: The message type, either heartbeat_request or heartbeat_response.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * payload_length: The length of the payload.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * payload: The payload consists of arbitrary content.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * padding: The padding is random content that MUST be ignored by the
							 | 
						||
| 
								 | 
							
								 *   receiver. The length of a HeartbeatMessage is TLSPlaintext.length
							 | 
						||
| 
								 | 
							
								 *   for TLS and DTLSPlaintext.length for DTLS. Furthermore, the
							 | 
						||
| 
								 | 
							
								 *   length of the type field is 1 byte, and the length of the
							 | 
						||
| 
								 | 
							
								 *   payload_length is 2. Therefore, the padding_length is
							 | 
						||
| 
								 | 
							
								 *   TLSPlaintext.length - payload_length - 3 for TLS and
							 | 
						||
| 
								 | 
							
								 *   DTLSPlaintext.length - payload_length - 3 for DTLS. The
							 | 
						||
| 
								 | 
							
								 *   padding_length MUST be at least 16.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The sender of a HeartbeatMessage MUST use a random padding of at
							 | 
						||
| 
								 | 
							
								 * least 16 bytes. The padding of a received HeartbeatMessage message
							 | 
						||
| 
								 | 
							
								 * MUST be ignored.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * If the payload_length of a received HeartbeatMessage is too large,
							 | 
						||
| 
								 | 
							
								 * the received HeartbeatMessage MUST be discarded silently.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param type the tls.HeartbeatMessageType.
							 | 
						||
| 
								 | 
							
								 * @param payload the heartbeat data to send as the payload.
							 | 
						||
| 
								 | 
							
								 * @param [payloadLength] the payload length to use, defaults to the
							 | 
						||
| 
								 | 
							
								 *          actual payload length.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the HeartbeatRequest byte buffer.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.createHeartbeat = function(type, payload, payloadLength) {
							 | 
						||
| 
								 | 
							
								  if(typeof payloadLength === 'undefined') {
							 | 
						||
| 
								 | 
							
								    payloadLength = payload.length;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  // build record fragment
							 | 
						||
| 
								 | 
							
								  var rval = forge.util.createBuffer();
							 | 
						||
| 
								 | 
							
								  rval.putByte(type);               // heartbeat message type
							 | 
						||
| 
								 | 
							
								  rval.putInt16(payloadLength);     // payload length
							 | 
						||
| 
								 | 
							
								  rval.putBytes(payload);           // payload
							 | 
						||
| 
								 | 
							
								  // padding
							 | 
						||
| 
								 | 
							
								  var plaintextLength = rval.length();
							 | 
						||
| 
								 | 
							
								  var paddingLength = Math.max(16, plaintextLength - payloadLength - 3);
							 | 
						||
| 
								 | 
							
								  rval.putBytes(forge.random.getBytes(paddingLength));
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Fragments, compresses, encrypts, and queues a record for delivery.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 * @param record the record to queue.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.queue = function(c, record) {
							 | 
						||
| 
								 | 
							
								  // error during record creation
							 | 
						||
| 
								 | 
							
								  if(!record) {
							 | 
						||
| 
								 | 
							
								    return;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  if(record.fragment.length() === 0) {
							 | 
						||
| 
								 | 
							
								    if(record.type === tls.ContentType.handshake ||
							 | 
						||
| 
								 | 
							
								      record.type === tls.ContentType.alert ||
							 | 
						||
| 
								 | 
							
								      record.type === tls.ContentType.change_cipher_spec) {
							 | 
						||
| 
								 | 
							
								      // Empty handshake, alert of change cipher spec messages are not allowed per the TLS specification and should not be sent.
							 | 
						||
| 
								 | 
							
								      return;
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // if the record is a handshake record, update handshake hashes
							 | 
						||
| 
								 | 
							
								  if(record.type === tls.ContentType.handshake) {
							 | 
						||
| 
								 | 
							
								    var bytes = record.fragment.bytes();
							 | 
						||
| 
								 | 
							
								    c.session.md5.update(bytes);
							 | 
						||
| 
								 | 
							
								    c.session.sha1.update(bytes);
							 | 
						||
| 
								 | 
							
								    bytes = null;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // handle record fragmentation
							 | 
						||
| 
								 | 
							
								  var records;
							 | 
						||
| 
								 | 
							
								  if(record.fragment.length() <= tls.MaxFragment) {
							 | 
						||
| 
								 | 
							
								    records = [record];
							 | 
						||
| 
								 | 
							
								  } else {
							 | 
						||
| 
								 | 
							
								    // fragment data as long as it is too long
							 | 
						||
| 
								 | 
							
								    records = [];
							 | 
						||
| 
								 | 
							
								    var data = record.fragment.bytes();
							 | 
						||
| 
								 | 
							
								    while(data.length > tls.MaxFragment) {
							 | 
						||
| 
								 | 
							
								      records.push(tls.createRecord(c, {
							 | 
						||
| 
								 | 
							
								        type: record.type,
							 | 
						||
| 
								 | 
							
								        data: forge.util.createBuffer(data.slice(0, tls.MaxFragment))
							 | 
						||
| 
								 | 
							
								      }));
							 | 
						||
| 
								 | 
							
								      data = data.slice(tls.MaxFragment);
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								    // add last record
							 | 
						||
| 
								 | 
							
								    if(data.length > 0) {
							 | 
						||
| 
								 | 
							
								      records.push(tls.createRecord(c, {
							 | 
						||
| 
								 | 
							
								        type: record.type,
							 | 
						||
| 
								 | 
							
								        data: forge.util.createBuffer(data)
							 | 
						||
| 
								 | 
							
								      }));
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // compress and encrypt all fragmented records
							 | 
						||
| 
								 | 
							
								  for(var i = 0; i < records.length && !c.fail; ++i) {
							 | 
						||
| 
								 | 
							
								    // update the record using current write state
							 | 
						||
| 
								 | 
							
								    var rec = records[i];
							 | 
						||
| 
								 | 
							
								    var s = c.state.current.write;
							 | 
						||
| 
								 | 
							
								    if(s.update(c, rec)) {
							 | 
						||
| 
								 | 
							
								      // store record
							 | 
						||
| 
								 | 
							
								      c.records.push(rec);
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Flushes all queued records to the output buffer and calls the
							 | 
						||
| 
								 | 
							
								 * tlsDataReady() handler on the given connection.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the connection.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return true on success, false on failure.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.flush = function(c) {
							 | 
						||
| 
								 | 
							
								  for(var i = 0; i < c.records.length; ++i) {
							 | 
						||
| 
								 | 
							
								    var record = c.records[i];
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // add record header and fragment
							 | 
						||
| 
								 | 
							
								    c.tlsData.putByte(record.type);
							 | 
						||
| 
								 | 
							
								    c.tlsData.putByte(record.version.major);
							 | 
						||
| 
								 | 
							
								    c.tlsData.putByte(record.version.minor);
							 | 
						||
| 
								 | 
							
								    c.tlsData.putInt16(record.fragment.length());
							 | 
						||
| 
								 | 
							
								    c.tlsData.putBuffer(c.records[i].fragment);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								  c.records = [];
							 | 
						||
| 
								 | 
							
								  return c.tlsDataReady(c);
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Maps a pki.certificateError to a tls.Alert.Description.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param error the error to map.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the alert description.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								var _certErrorToAlertDesc = function(error) {
							 | 
						||
| 
								 | 
							
								  switch(error) {
							 | 
						||
| 
								 | 
							
								  case true:
							 | 
						||
| 
								 | 
							
								    return true;
							 | 
						||
| 
								 | 
							
								  case forge.pki.certificateError.bad_certificate:
							 | 
						||
| 
								 | 
							
								    return tls.Alert.Description.bad_certificate;
							 | 
						||
| 
								 | 
							
								  case forge.pki.certificateError.unsupported_certificate:
							 | 
						||
| 
								 | 
							
								    return tls.Alert.Description.unsupported_certificate;
							 | 
						||
| 
								 | 
							
								  case forge.pki.certificateError.certificate_revoked:
							 | 
						||
| 
								 | 
							
								    return tls.Alert.Description.certificate_revoked;
							 | 
						||
| 
								 | 
							
								  case forge.pki.certificateError.certificate_expired:
							 | 
						||
| 
								 | 
							
								    return tls.Alert.Description.certificate_expired;
							 | 
						||
| 
								 | 
							
								  case forge.pki.certificateError.certificate_unknown:
							 | 
						||
| 
								 | 
							
								    return tls.Alert.Description.certificate_unknown;
							 | 
						||
| 
								 | 
							
								  case forge.pki.certificateError.unknown_ca:
							 | 
						||
| 
								 | 
							
								    return tls.Alert.Description.unknown_ca;
							 | 
						||
| 
								 | 
							
								  default:
							 | 
						||
| 
								 | 
							
								    return tls.Alert.Description.bad_certificate;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Maps a tls.Alert.Description to a pki.certificateError.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param desc the alert description.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the certificate error.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								var _alertDescToCertError = function(desc) {
							 | 
						||
| 
								 | 
							
								  switch(desc) {
							 | 
						||
| 
								 | 
							
								  case true:
							 | 
						||
| 
								 | 
							
								    return true;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.bad_certificate:
							 | 
						||
| 
								 | 
							
								    return forge.pki.certificateError.bad_certificate;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.unsupported_certificate:
							 | 
						||
| 
								 | 
							
								    return forge.pki.certificateError.unsupported_certificate;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.certificate_revoked:
							 | 
						||
| 
								 | 
							
								    return forge.pki.certificateError.certificate_revoked;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.certificate_expired:
							 | 
						||
| 
								 | 
							
								    return forge.pki.certificateError.certificate_expired;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.certificate_unknown:
							 | 
						||
| 
								 | 
							
								    return forge.pki.certificateError.certificate_unknown;
							 | 
						||
| 
								 | 
							
								  case tls.Alert.Description.unknown_ca:
							 | 
						||
| 
								 | 
							
								    return forge.pki.certificateError.unknown_ca;
							 | 
						||
| 
								 | 
							
								  default:
							 | 
						||
| 
								 | 
							
								    return forge.pki.certificateError.bad_certificate;
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Verifies a certificate chain against the given connection's
							 | 
						||
| 
								 | 
							
								 * Certificate Authority store.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param c the TLS connection.
							 | 
						||
| 
								 | 
							
								 * @param chain the certificate chain to verify, with the root or highest
							 | 
						||
| 
								 | 
							
								 *          authority at the end.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return true if successful, false if not.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.verifyCertificateChain = function(c, chain) {
							 | 
						||
| 
								 | 
							
								  try {
							 | 
						||
| 
								 | 
							
								    // Make a copy of c.verifyOptions so that we can modify options.verify
							 | 
						||
| 
								 | 
							
								    // without modifying c.verifyOptions.
							 | 
						||
| 
								 | 
							
								    var options = {};
							 | 
						||
| 
								 | 
							
								    for (var key in c.verifyOptions) {
							 | 
						||
| 
								 | 
							
								      options[key] = c.verifyOptions[key];
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    options.verify = function(vfd, depth, chain) {
							 | 
						||
| 
								 | 
							
								      // convert pki.certificateError to tls alert description
							 | 
						||
| 
								 | 
							
								      var desc = _certErrorToAlertDesc(vfd);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // call application callback
							 | 
						||
| 
								 | 
							
								      var ret = c.verify(c, vfd, depth, chain);
							 | 
						||
| 
								 | 
							
								      if(ret !== true) {
							 | 
						||
| 
								 | 
							
								        if(typeof ret === 'object' && !forge.util.isArray(ret)) {
							 | 
						||
| 
								 | 
							
								          // throw custom error
							 | 
						||
| 
								 | 
							
								          var error = new Error('The application rejected the certificate.');
							 | 
						||
| 
								 | 
							
								          error.send = true;
							 | 
						||
| 
								 | 
							
								          error.alert = {
							 | 
						||
| 
								 | 
							
								            level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								            description: tls.Alert.Description.bad_certificate
							 | 
						||
| 
								 | 
							
								          };
							 | 
						||
| 
								 | 
							
								          if(ret.message) {
							 | 
						||
| 
								 | 
							
								            error.message = ret.message;
							 | 
						||
| 
								 | 
							
								          }
							 | 
						||
| 
								 | 
							
								          if(ret.alert) {
							 | 
						||
| 
								 | 
							
								            error.alert.description = ret.alert;
							 | 
						||
| 
								 | 
							
								          }
							 | 
						||
| 
								 | 
							
								          throw error;
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								        // convert tls alert description to pki.certificateError
							 | 
						||
| 
								 | 
							
								        if(ret !== vfd) {
							 | 
						||
| 
								 | 
							
								          ret = _alertDescToCertError(ret);
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      return ret;
							 | 
						||
| 
								 | 
							
								    };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // verify chain
							 | 
						||
| 
								 | 
							
								    forge.pki.verifyCertificateChain(c.caStore, chain, options);
							 | 
						||
| 
								 | 
							
								  } catch(ex) {
							 | 
						||
| 
								 | 
							
								    // build tls error if not already customized
							 | 
						||
| 
								 | 
							
								    var err = ex;
							 | 
						||
| 
								 | 
							
								    if(typeof err !== 'object' || forge.util.isArray(err)) {
							 | 
						||
| 
								 | 
							
								      err = {
							 | 
						||
| 
								 | 
							
								        send: true,
							 | 
						||
| 
								 | 
							
								        alert: {
							 | 
						||
| 
								 | 
							
								          level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								          description: _certErrorToAlertDesc(ex)
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								      };
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								    if(!('send' in err)) {
							 | 
						||
| 
								 | 
							
								      err.send = true;
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								    if(!('alert' in err)) {
							 | 
						||
| 
								 | 
							
								      err.alert = {
							 | 
						||
| 
								 | 
							
								        level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								        description: _certErrorToAlertDesc(err.error)
							 | 
						||
| 
								 | 
							
								      };
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // send error
							 | 
						||
| 
								 | 
							
								    c.error(c, err);
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  return !c.fail;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Creates a new TLS session cache.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param cache optional map of session ID to cached session.
							 | 
						||
| 
								 | 
							
								 * @param capacity the maximum size for the cache (default: 100).
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the new TLS session cache.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.createSessionCache = function(cache, capacity) {
							 | 
						||
| 
								 | 
							
								  var rval = null;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // assume input is already a session cache object
							 | 
						||
| 
								 | 
							
								  if(cache && cache.getSession && cache.setSession && cache.order) {
							 | 
						||
| 
								 | 
							
								    rval = cache;
							 | 
						||
| 
								 | 
							
								  } else {
							 | 
						||
| 
								 | 
							
								    // create cache
							 | 
						||
| 
								 | 
							
								    rval = {};
							 | 
						||
| 
								 | 
							
								    rval.cache = cache || {};
							 | 
						||
| 
								 | 
							
								    rval.capacity = Math.max(capacity || 100, 1);
							 | 
						||
| 
								 | 
							
								    rval.order = [];
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // store order for sessions, delete session overflow
							 | 
						||
| 
								 | 
							
								    for(var key in cache) {
							 | 
						||
| 
								 | 
							
								      if(rval.order.length <= capacity) {
							 | 
						||
| 
								 | 
							
								        rval.order.push(key);
							 | 
						||
| 
								 | 
							
								      } else {
							 | 
						||
| 
								 | 
							
								        delete cache[key];
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // get a session from a session ID (or get any session)
							 | 
						||
| 
								 | 
							
								    rval.getSession = function(sessionId) {
							 | 
						||
| 
								 | 
							
								      var session = null;
							 | 
						||
| 
								 | 
							
								      var key = null;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // if session ID provided, use it
							 | 
						||
| 
								 | 
							
								      if(sessionId) {
							 | 
						||
| 
								 | 
							
								        key = forge.util.bytesToHex(sessionId);
							 | 
						||
| 
								 | 
							
								      } else if(rval.order.length > 0) {
							 | 
						||
| 
								 | 
							
								        // get first session from cache
							 | 
						||
| 
								 | 
							
								        key = rval.order[0];
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      if(key !== null && key in rval.cache) {
							 | 
						||
| 
								 | 
							
								        // get cached session and remove from cache
							 | 
						||
| 
								 | 
							
								        session = rval.cache[key];
							 | 
						||
| 
								 | 
							
								        delete rval.cache[key];
							 | 
						||
| 
								 | 
							
								        for(var i in rval.order) {
							 | 
						||
| 
								 | 
							
								          if(rval.order[i] === key) {
							 | 
						||
| 
								 | 
							
								            rval.order.splice(i, 1);
							 | 
						||
| 
								 | 
							
								            break;
							 | 
						||
| 
								 | 
							
								          }
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      return session;
							 | 
						||
| 
								 | 
							
								    };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // set a session in the cache
							 | 
						||
| 
								 | 
							
								    rval.setSession = function(sessionId, session) {
							 | 
						||
| 
								 | 
							
								      // remove session from cache if at capacity
							 | 
						||
| 
								 | 
							
								      if(rval.order.length === rval.capacity) {
							 | 
						||
| 
								 | 
							
								        var key = rval.order.shift();
							 | 
						||
| 
								 | 
							
								        delete rval.cache[key];
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								      // add session to cache
							 | 
						||
| 
								 | 
							
								      var key = forge.util.bytesToHex(sessionId);
							 | 
						||
| 
								 | 
							
								      rval.order.push(key);
							 | 
						||
| 
								 | 
							
								      rval.cache[key] = session;
							 | 
						||
| 
								 | 
							
								    };
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  return rval;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Creates a new TLS connection.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * See public createConnection() docs for more details.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param options the options for this connection.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the new TLS connection.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								tls.createConnection = function(options) {
							 | 
						||
| 
								 | 
							
								  var caStore = null;
							 | 
						||
| 
								 | 
							
								  if(options.caStore) {
							 | 
						||
| 
								 | 
							
								    // if CA store is an array, convert it to a CA store object
							 | 
						||
| 
								 | 
							
								    if(forge.util.isArray(options.caStore)) {
							 | 
						||
| 
								 | 
							
								      caStore = forge.pki.createCaStore(options.caStore);
							 | 
						||
| 
								 | 
							
								    } else {
							 | 
						||
| 
								 | 
							
								      caStore = options.caStore;
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  } else {
							 | 
						||
| 
								 | 
							
								    // create empty CA store
							 | 
						||
| 
								 | 
							
								    caStore = forge.pki.createCaStore();
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // setup default cipher suites
							 | 
						||
| 
								 | 
							
								  var cipherSuites = options.cipherSuites || null;
							 | 
						||
| 
								 | 
							
								  if(cipherSuites === null) {
							 | 
						||
| 
								 | 
							
								    cipherSuites = [];
							 | 
						||
| 
								 | 
							
								    for(var key in tls.CipherSuites) {
							 | 
						||
| 
								 | 
							
								      cipherSuites.push(tls.CipherSuites[key]);
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // set default entity
							 | 
						||
| 
								 | 
							
								  var entity = (options.server || false) ?
							 | 
						||
| 
								 | 
							
								    tls.ConnectionEnd.server : tls.ConnectionEnd.client;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // create session cache if requested
							 | 
						||
| 
								 | 
							
								  var sessionCache = options.sessionCache ?
							 | 
						||
| 
								 | 
							
								    tls.createSessionCache(options.sessionCache) : null;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // create TLS connection
							 | 
						||
| 
								 | 
							
								  var c = {
							 | 
						||
| 
								 | 
							
								    version: {major: tls.Version.major, minor: tls.Version.minor},
							 | 
						||
| 
								 | 
							
								    entity: entity,
							 | 
						||
| 
								 | 
							
								    sessionId: options.sessionId,
							 | 
						||
| 
								 | 
							
								    caStore: caStore,
							 | 
						||
| 
								 | 
							
								    sessionCache: sessionCache,
							 | 
						||
| 
								 | 
							
								    cipherSuites: cipherSuites,
							 | 
						||
| 
								 | 
							
								    connected: options.connected,
							 | 
						||
| 
								 | 
							
								    virtualHost: options.virtualHost || null,
							 | 
						||
| 
								 | 
							
								    verifyClient: options.verifyClient || false,
							 | 
						||
| 
								 | 
							
								    verify: options.verify || function(cn, vfd, dpth, cts) {return vfd;},
							 | 
						||
| 
								 | 
							
								    verifyOptions: options.verifyOptions || {},
							 | 
						||
| 
								 | 
							
								    getCertificate: options.getCertificate || null,
							 | 
						||
| 
								 | 
							
								    getPrivateKey: options.getPrivateKey || null,
							 | 
						||
| 
								 | 
							
								    getSignature: options.getSignature || null,
							 | 
						||
| 
								 | 
							
								    input: forge.util.createBuffer(),
							 | 
						||
| 
								 | 
							
								    tlsData: forge.util.createBuffer(),
							 | 
						||
| 
								 | 
							
								    data: forge.util.createBuffer(),
							 | 
						||
| 
								 | 
							
								    tlsDataReady: options.tlsDataReady,
							 | 
						||
| 
								 | 
							
								    dataReady: options.dataReady,
							 | 
						||
| 
								 | 
							
								    heartbeatReceived: options.heartbeatReceived,
							 | 
						||
| 
								 | 
							
								    closed: options.closed,
							 | 
						||
| 
								 | 
							
								    error: function(c, ex) {
							 | 
						||
| 
								 | 
							
								      // set origin if not set
							 | 
						||
| 
								 | 
							
								      ex.origin = ex.origin ||
							 | 
						||
| 
								 | 
							
								        ((c.entity === tls.ConnectionEnd.client) ? 'client' : 'server');
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // send TLS alert
							 | 
						||
| 
								 | 
							
								      if(ex.send) {
							 | 
						||
| 
								 | 
							
								        tls.queue(c, tls.createAlert(c, ex.alert));
							 | 
						||
| 
								 | 
							
								        tls.flush(c);
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // error is fatal by default
							 | 
						||
| 
								 | 
							
								      var fatal = (ex.fatal !== false);
							 | 
						||
| 
								 | 
							
								      if(fatal) {
							 | 
						||
| 
								 | 
							
								        // set fail flag
							 | 
						||
| 
								 | 
							
								        c.fail = true;
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // call error handler first
							 | 
						||
| 
								 | 
							
								      options.error(c, ex);
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      if(fatal) {
							 | 
						||
| 
								 | 
							
								        // fatal error, close connection, do not clear fail
							 | 
						||
| 
								 | 
							
								        c.close(false);
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    },
							 | 
						||
| 
								 | 
							
								    deflate: options.deflate || null,
							 | 
						||
| 
								 | 
							
								    inflate: options.inflate || null
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  /**
							 | 
						||
| 
								 | 
							
								   * Resets a closed TLS connection for reuse. Called in c.close().
							 | 
						||
| 
								 | 
							
								   *
							 | 
						||
| 
								 | 
							
								   * @param clearFail true to clear the fail flag (default: true).
							 | 
						||
| 
								 | 
							
								   */
							 | 
						||
| 
								 | 
							
								  c.reset = function(clearFail) {
							 | 
						||
| 
								 | 
							
								    c.version = {major: tls.Version.major, minor: tls.Version.minor};
							 | 
						||
| 
								 | 
							
								    c.record = null;
							 | 
						||
| 
								 | 
							
								    c.session = null;
							 | 
						||
| 
								 | 
							
								    c.peerCertificate = null;
							 | 
						||
| 
								 | 
							
								    c.state = {
							 | 
						||
| 
								 | 
							
								      pending: null,
							 | 
						||
| 
								 | 
							
								      current: null
							 | 
						||
| 
								 | 
							
								    };
							 | 
						||
| 
								 | 
							
								    c.expect = (c.entity === tls.ConnectionEnd.client) ? SHE : CHE;
							 | 
						||
| 
								 | 
							
								    c.fragmented = null;
							 | 
						||
| 
								 | 
							
								    c.records = [];
							 | 
						||
| 
								 | 
							
								    c.open = false;
							 | 
						||
| 
								 | 
							
								    c.handshakes = 0;
							 | 
						||
| 
								 | 
							
								    c.handshaking = false;
							 | 
						||
| 
								 | 
							
								    c.isConnected = false;
							 | 
						||
| 
								 | 
							
								    c.fail = !(clearFail || typeof(clearFail) === 'undefined');
							 | 
						||
| 
								 | 
							
								    c.input.clear();
							 | 
						||
| 
								 | 
							
								    c.tlsData.clear();
							 | 
						||
| 
								 | 
							
								    c.data.clear();
							 | 
						||
| 
								 | 
							
								    c.state.current = tls.createConnectionState(c);
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  // do initial reset of connection
							 | 
						||
| 
								 | 
							
								  c.reset();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  /**
							 | 
						||
| 
								 | 
							
								   * Updates the current TLS engine state based on the given record.
							 | 
						||
| 
								 | 
							
								   *
							 | 
						||
| 
								 | 
							
								   * @param c the TLS connection.
							 | 
						||
| 
								 | 
							
								   * @param record the TLS record to act on.
							 | 
						||
| 
								 | 
							
								   */
							 | 
						||
| 
								 | 
							
								  var _update = function(c, record) {
							 | 
						||
| 
								 | 
							
								    // get record handler (align type in table by subtracting lowest)
							 | 
						||
| 
								 | 
							
								    var aligned = record.type - tls.ContentType.change_cipher_spec;
							 | 
						||
| 
								 | 
							
								    var handlers = ctTable[c.entity][c.expect];
							 | 
						||
| 
								 | 
							
								    if(aligned in handlers) {
							 | 
						||
| 
								 | 
							
								      handlers[aligned](c, record);
							 | 
						||
| 
								 | 
							
								    } else {
							 | 
						||
| 
								 | 
							
								      // unexpected record
							 | 
						||
| 
								 | 
							
								      tls.handleUnexpected(c, record);
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  /**
							 | 
						||
| 
								 | 
							
								   * Reads the record header and initializes the next record on the given
							 | 
						||
| 
								 | 
							
								   * connection.
							 | 
						||
| 
								 | 
							
								   *
							 | 
						||
| 
								 | 
							
								   * @param c the TLS connection with the next record.
							 | 
						||
| 
								 | 
							
								   *
							 | 
						||
| 
								 | 
							
								   * @return 0 if the input data could be processed, otherwise the
							 | 
						||
| 
								 | 
							
								   *         number of bytes required for data to be processed.
							 | 
						||
| 
								 | 
							
								   */
							 | 
						||
| 
								 | 
							
								  var _readRecordHeader = function(c) {
							 | 
						||
| 
								 | 
							
								    var rval = 0;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // get input buffer and its length
							 | 
						||
| 
								 | 
							
								    var b = c.input;
							 | 
						||
| 
								 | 
							
								    var len = b.length();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // need at least 5 bytes to initialize a record
							 | 
						||
| 
								 | 
							
								    if(len < 5) {
							 | 
						||
| 
								 | 
							
								      rval = 5 - len;
							 | 
						||
| 
								 | 
							
								    } else {
							 | 
						||
| 
								 | 
							
								      // enough bytes for header
							 | 
						||
| 
								 | 
							
								      // initialize record
							 | 
						||
| 
								 | 
							
								      c.record = {
							 | 
						||
| 
								 | 
							
								        type: b.getByte(),
							 | 
						||
| 
								 | 
							
								        version: {
							 | 
						||
| 
								 | 
							
								          major: b.getByte(),
							 | 
						||
| 
								 | 
							
								          minor: b.getByte()
							 | 
						||
| 
								 | 
							
								        },
							 | 
						||
| 
								 | 
							
								        length: b.getInt16(),
							 | 
						||
| 
								 | 
							
								        fragment: forge.util.createBuffer(),
							 | 
						||
| 
								 | 
							
								        ready: false
							 | 
						||
| 
								 | 
							
								      };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // check record version
							 | 
						||
| 
								 | 
							
								      var compatibleVersion = (c.record.version.major === c.version.major);
							 | 
						||
| 
								 | 
							
								      if(compatibleVersion && c.session && c.session.version) {
							 | 
						||
| 
								 | 
							
								        // session version already set, require same minor version
							 | 
						||
| 
								 | 
							
								        compatibleVersion = (c.record.version.minor === c.version.minor);
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								      if(!compatibleVersion) {
							 | 
						||
| 
								 | 
							
								        c.error(c, {
							 | 
						||
| 
								 | 
							
								          message: 'Incompatible TLS version.',
							 | 
						||
| 
								 | 
							
								          send: true,
							 | 
						||
| 
								 | 
							
								          alert: {
							 | 
						||
| 
								 | 
							
								            level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								            description: tls.Alert.Description.protocol_version
							 | 
						||
| 
								 | 
							
								          }
							 | 
						||
| 
								 | 
							
								        });
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    return rval;
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  /**
							 | 
						||
| 
								 | 
							
								   * Reads the next record's contents and appends its message to any
							 | 
						||
| 
								 | 
							
								   * previously fragmented message.
							 | 
						||
| 
								 | 
							
								   *
							 | 
						||
| 
								 | 
							
								   * @param c the TLS connection with the next record.
							 | 
						||
| 
								 | 
							
								   *
							 | 
						||
| 
								 | 
							
								   * @return 0 if the input data could be processed, otherwise the
							 | 
						||
| 
								 | 
							
								   *         number of bytes required for data to be processed.
							 | 
						||
| 
								 | 
							
								   */
							 | 
						||
| 
								 | 
							
								  var _readRecord = function(c) {
							 | 
						||
| 
								 | 
							
								    var rval = 0;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // ensure there is enough input data to get the entire record
							 | 
						||
| 
								 | 
							
								    var b = c.input;
							 | 
						||
| 
								 | 
							
								    var len = b.length();
							 | 
						||
| 
								 | 
							
								    if(len < c.record.length) {
							 | 
						||
| 
								 | 
							
								      // not enough data yet, return how much is required
							 | 
						||
| 
								 | 
							
								      rval = c.record.length - len;
							 | 
						||
| 
								 | 
							
								    } else {
							 | 
						||
| 
								 | 
							
								      // there is enough data to parse the pending record
							 | 
						||
| 
								 | 
							
								      // fill record fragment and compact input buffer
							 | 
						||
| 
								 | 
							
								      c.record.fragment.putBytes(b.getBytes(c.record.length));
							 | 
						||
| 
								 | 
							
								      b.compact();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // update record using current read state
							 | 
						||
| 
								 | 
							
								      var s = c.state.current.read;
							 | 
						||
| 
								 | 
							
								      if(s.update(c, c.record)) {
							 | 
						||
| 
								 | 
							
								        // see if there is a previously fragmented message that the
							 | 
						||
| 
								 | 
							
								        // new record's message fragment should be appended to
							 | 
						||
| 
								 | 
							
								        if(c.fragmented !== null) {
							 | 
						||
| 
								 | 
							
								          // if the record type matches a previously fragmented
							 | 
						||
| 
								 | 
							
								          // record, append the record fragment to it
							 | 
						||
| 
								 | 
							
								          if(c.fragmented.type === c.record.type) {
							 | 
						||
| 
								 | 
							
								            // concatenate record fragments
							 | 
						||
| 
								 | 
							
								            c.fragmented.fragment.putBuffer(c.record.fragment);
							 | 
						||
| 
								 | 
							
								            c.record = c.fragmented;
							 | 
						||
| 
								 | 
							
								          } else {
							 | 
						||
| 
								 | 
							
								            // error, invalid fragmented record
							 | 
						||
| 
								 | 
							
								            c.error(c, {
							 | 
						||
| 
								 | 
							
								              message: 'Invalid fragmented record.',
							 | 
						||
| 
								 | 
							
								              send: true,
							 | 
						||
| 
								 | 
							
								              alert: {
							 | 
						||
| 
								 | 
							
								                level: tls.Alert.Level.fatal,
							 | 
						||
| 
								 | 
							
								                description:
							 | 
						||
| 
								 | 
							
								                  tls.Alert.Description.unexpected_message
							 | 
						||
| 
								 | 
							
								              }
							 | 
						||
| 
								 | 
							
								            });
							 | 
						||
| 
								 | 
							
								          }
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								        // record is now ready
							 | 
						||
| 
								 | 
							
								        c.record.ready = true;
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    return rval;
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  /**
							 | 
						||
| 
								 | 
							
								   * Performs a handshake using the TLS Handshake Protocol, as a client.
							 | 
						||
| 
								 | 
							
								   *
							 | 
						||
| 
								 | 
							
								   * This method should only be called if the connection is in client mode.
							 | 
						||
| 
								 | 
							
								   *
							 | 
						||
| 
								 | 
							
								   * @param sessionId the session ID to use, null to start a new one.
							 | 
						||
| 
								 | 
							
								   */
							 | 
						||
| 
								 | 
							
								  c.handshake = function(sessionId) {
							 | 
						||
| 
								 | 
							
								    // error to call this in non-client mode
							 | 
						||
| 
								 | 
							
								    if(c.entity !== tls.ConnectionEnd.client) {
							 | 
						||
| 
								 | 
							
								      // not fatal error
							 | 
						||
| 
								 | 
							
								      c.error(c, {
							 | 
						||
| 
								 | 
							
								        message: 'Cannot initiate handshake as a server.',
							 | 
						||
| 
								 | 
							
								        fatal: false
							 | 
						||
| 
								 | 
							
								      });
							 | 
						||
| 
								 | 
							
								    } else if(c.handshaking) {
							 | 
						||
| 
								 | 
							
								      // handshake is already in progress, fail but not fatal error
							 | 
						||
| 
								 | 
							
								      c.error(c, {
							 | 
						||
| 
								 | 
							
								        message: 'Handshake already in progress.',
							 | 
						||
| 
								 | 
							
								        fatal: false
							 | 
						||
| 
								 | 
							
								      });
							 | 
						||
| 
								 | 
							
								    } else {
							 | 
						||
| 
								 | 
							
								      // clear fail flag on reuse
							 | 
						||
| 
								 | 
							
								      if(c.fail && !c.open && c.handshakes === 0) {
							 | 
						||
| 
								 | 
							
								        c.fail = false;
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // now handshaking
							 | 
						||
| 
								 | 
							
								      c.handshaking = true;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // default to blank (new session)
							 | 
						||
| 
								 | 
							
								      sessionId = sessionId || '';
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // if a session ID was specified, try to find it in the cache
							 | 
						||
| 
								 | 
							
								      var session = null;
							 | 
						||
| 
								 | 
							
								      if(sessionId.length > 0) {
							 | 
						||
| 
								 | 
							
								        if(c.sessionCache) {
							 | 
						||
| 
								 | 
							
								          session = c.sessionCache.getSession(sessionId);
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								        // matching session not found in cache, clear session ID
							 | 
						||
| 
								 | 
							
								        if(session === null) {
							 | 
						||
| 
								 | 
							
								          sessionId = '';
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // no session given, grab a session from the cache, if available
							 | 
						||
| 
								 | 
							
								      if(sessionId.length === 0 && c.sessionCache) {
							 | 
						||
| 
								 | 
							
								        session = c.sessionCache.getSession();
							 | 
						||
| 
								 | 
							
								        if(session !== null) {
							 | 
						||
| 
								 | 
							
								          sessionId = session.id;
							 | 
						||
| 
								 | 
							
								        }
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // set up session
							 | 
						||
| 
								 | 
							
								      c.session = {
							 | 
						||
| 
								 | 
							
								        id: sessionId,
							 | 
						||
| 
								 | 
							
								        version: null,
							 | 
						||
| 
								 | 
							
								        cipherSuite: null,
							 | 
						||
| 
								 | 
							
								        compressionMethod: null,
							 | 
						||
| 
								 | 
							
								        serverCertificate: null,
							 | 
						||
| 
								 | 
							
								        certificateRequest: null,
							 | 
						||
| 
								 | 
							
								        clientCertificate: null,
							 | 
						||
| 
								 | 
							
								        sp: {},
							 | 
						||
| 
								 | 
							
								        md5: forge.md.md5.create(),
							 | 
						||
| 
								 | 
							
								        sha1: forge.md.sha1.create()
							 | 
						||
| 
								 | 
							
								      };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // use existing session information
							 | 
						||
| 
								 | 
							
								      if(session) {
							 | 
						||
| 
								 | 
							
								        // only update version on connection, session version not yet set
							 | 
						||
| 
								 | 
							
								        c.version = session.version;
							 | 
						||
| 
								 | 
							
								        c.session.sp = session.sp;
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // generate new client random
							 | 
						||
| 
								 | 
							
								      c.session.sp.client_random = tls.createRandom().getBytes();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // connection now open
							 | 
						||
| 
								 | 
							
								      c.open = true;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // send hello
							 | 
						||
| 
								 | 
							
								      tls.queue(c, tls.createRecord(c, {
							 | 
						||
| 
								 | 
							
								        type: tls.ContentType.handshake,
							 | 
						||
| 
								 | 
							
								        data: tls.createClientHello(c)
							 | 
						||
| 
								 | 
							
								      }));
							 | 
						||
| 
								 | 
							
								      tls.flush(c);
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  /**
							 | 
						||
| 
								 | 
							
								   * Called when TLS protocol data has been received from somewhere and should
							 | 
						||
| 
								 | 
							
								   * be processed by the TLS engine.
							 | 
						||
| 
								 | 
							
								   *
							 | 
						||
| 
								 | 
							
								   * @param data the TLS protocol data, as a string, to process.
							 | 
						||
| 
								 | 
							
								   *
							 | 
						||
| 
								 | 
							
								   * @return 0 if the data could be processed, otherwise the number of bytes
							 | 
						||
| 
								 | 
							
								   *         required for data to be processed.
							 | 
						||
| 
								 | 
							
								   */
							 | 
						||
| 
								 | 
							
								  c.process = function(data) {
							 | 
						||
| 
								 | 
							
								    var rval = 0;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // buffer input data
							 | 
						||
| 
								 | 
							
								    if(data) {
							 | 
						||
| 
								 | 
							
								      c.input.putBytes(data);
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // process next record if no failure, process will be called after
							 | 
						||
| 
								 | 
							
								    // each record is handled (since handling can be asynchronous)
							 | 
						||
| 
								 | 
							
								    if(!c.fail) {
							 | 
						||
| 
								 | 
							
								      // reset record if ready and now empty
							 | 
						||
| 
								 | 
							
								      if(c.record !== null &&
							 | 
						||
| 
								 | 
							
								        c.record.ready && c.record.fragment.isEmpty()) {
							 | 
						||
| 
								 | 
							
								        c.record = null;
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // if there is no pending record, try to read record header
							 | 
						||
| 
								 | 
							
								      if(c.record === null) {
							 | 
						||
| 
								 | 
							
								        rval = _readRecordHeader(c);
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // read the next record (if record not yet ready)
							 | 
						||
| 
								 | 
							
								      if(!c.fail && c.record !== null && !c.record.ready) {
							 | 
						||
| 
								 | 
							
								        rval = _readRecord(c);
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // record ready to be handled, update engine state
							 | 
						||
| 
								 | 
							
								      if(!c.fail && c.record !== null && c.record.ready) {
							 | 
						||
| 
								 | 
							
								        _update(c, c.record);
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    return rval;
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  /**
							 | 
						||
| 
								 | 
							
								   * Requests that application data be packaged into a TLS record. The
							 | 
						||
| 
								 | 
							
								   * tlsDataReady handler will be called when the TLS record(s) have been
							 | 
						||
| 
								 | 
							
								   * prepared.
							 | 
						||
| 
								 | 
							
								   *
							 | 
						||
| 
								 | 
							
								   * @param data the application data, as a raw 'binary' encoded string, to
							 | 
						||
| 
								 | 
							
								   *          be sent; to send utf-16/utf-8 string data, use the return value
							 | 
						||
| 
								 | 
							
								   *          of util.encodeUtf8(str).
							 | 
						||
| 
								 | 
							
								   *
							 | 
						||
| 
								 | 
							
								   * @return true on success, false on failure.
							 | 
						||
| 
								 | 
							
								   */
							 | 
						||
| 
								 | 
							
								  c.prepare = function(data) {
							 | 
						||
| 
								 | 
							
								    tls.queue(c, tls.createRecord(c, {
							 | 
						||
| 
								 | 
							
								      type: tls.ContentType.application_data,
							 | 
						||
| 
								 | 
							
								      data: forge.util.createBuffer(data)
							 | 
						||
| 
								 | 
							
								    }));
							 | 
						||
| 
								 | 
							
								    return tls.flush(c);
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  /**
							 | 
						||
| 
								 | 
							
								   * Requests that a heartbeat request be packaged into a TLS record for
							 | 
						||
| 
								 | 
							
								   * transmission. The tlsDataReady handler will be called when TLS record(s)
							 | 
						||
| 
								 | 
							
								   * have been prepared.
							 | 
						||
| 
								 | 
							
								   *
							 | 
						||
| 
								 | 
							
								   * When a heartbeat response has been received, the heartbeatReceived
							 | 
						||
| 
								 | 
							
								   * handler will be called with the matching payload. This handler can
							 | 
						||
| 
								 | 
							
								   * be used to clear a retransmission timer, etc.
							 | 
						||
| 
								 | 
							
								   *
							 | 
						||
| 
								 | 
							
								   * @param payload the heartbeat data to send as the payload in the message.
							 | 
						||
| 
								 | 
							
								   * @param [payloadLength] the payload length to use, defaults to the
							 | 
						||
| 
								 | 
							
								   *          actual payload length.
							 | 
						||
| 
								 | 
							
								   *
							 | 
						||
| 
								 | 
							
								   * @return true on success, false on failure.
							 | 
						||
| 
								 | 
							
								   */
							 | 
						||
| 
								 | 
							
								  c.prepareHeartbeatRequest = function(payload, payloadLength) {
							 | 
						||
| 
								 | 
							
								    if(payload instanceof forge.util.ByteBuffer) {
							 | 
						||
| 
								 | 
							
								      payload = payload.bytes();
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								    if(typeof payloadLength === 'undefined') {
							 | 
						||
| 
								 | 
							
								      payloadLength = payload.length;
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								    c.expectedHeartbeatPayload = payload;
							 | 
						||
| 
								 | 
							
								    tls.queue(c, tls.createRecord(c, {
							 | 
						||
| 
								 | 
							
								      type: tls.ContentType.heartbeat,
							 | 
						||
| 
								 | 
							
								      data: tls.createHeartbeat(
							 | 
						||
| 
								 | 
							
								        tls.HeartbeatMessageType.heartbeat_request, payload, payloadLength)
							 | 
						||
| 
								 | 
							
								    }));
							 | 
						||
| 
								 | 
							
								    return tls.flush(c);
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  /**
							 | 
						||
| 
								 | 
							
								   * Closes the connection (sends a close_notify alert).
							 | 
						||
| 
								 | 
							
								   *
							 | 
						||
| 
								 | 
							
								   * @param clearFail true to clear the fail flag (default: true).
							 | 
						||
| 
								 | 
							
								   */
							 | 
						||
| 
								 | 
							
								  c.close = function(clearFail) {
							 | 
						||
| 
								 | 
							
								    // save session if connection didn't fail
							 | 
						||
| 
								 | 
							
								    if(!c.fail && c.sessionCache && c.session) {
							 | 
						||
| 
								 | 
							
								      // only need to preserve session ID, version, and security params
							 | 
						||
| 
								 | 
							
								      var session = {
							 | 
						||
| 
								 | 
							
								        id: c.session.id,
							 | 
						||
| 
								 | 
							
								        version: c.session.version,
							 | 
						||
| 
								 | 
							
								        sp: c.session.sp
							 | 
						||
| 
								 | 
							
								      };
							 | 
						||
| 
								 | 
							
								      session.sp.keys = null;
							 | 
						||
| 
								 | 
							
								      c.sessionCache.setSession(session.id, session);
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    if(c.open) {
							 | 
						||
| 
								 | 
							
								      // connection no longer open, clear input
							 | 
						||
| 
								 | 
							
								      c.open = false;
							 | 
						||
| 
								 | 
							
								      c.input.clear();
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // if connected or handshaking, send an alert
							 | 
						||
| 
								 | 
							
								      if(c.isConnected || c.handshaking) {
							 | 
						||
| 
								 | 
							
								        c.isConnected = c.handshaking = false;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								        // send close_notify alert
							 | 
						||
| 
								 | 
							
								        tls.queue(c, tls.createAlert(c, {
							 | 
						||
| 
								 | 
							
								          level: tls.Alert.Level.warning,
							 | 
						||
| 
								 | 
							
								          description: tls.Alert.Description.close_notify
							 | 
						||
| 
								 | 
							
								        }));
							 | 
						||
| 
								 | 
							
								        tls.flush(c);
							 | 
						||
| 
								 | 
							
								      }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								      // call handler
							 | 
						||
| 
								 | 
							
								      c.closed(c);
							 | 
						||
| 
								 | 
							
								    }
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								    // reset TLS connection, do not clear fail flag
							 | 
						||
| 
								 | 
							
								    c.reset(clearFail);
							 | 
						||
| 
								 | 
							
								  };
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								  return c;
							 | 
						||
| 
								 | 
							
								};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/* TLS API */
							 | 
						||
| 
								 | 
							
								module.exports = forge.tls = forge.tls || {};
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								// expose non-functions
							 | 
						||
| 
								 | 
							
								for(var key in tls) {
							 | 
						||
| 
								 | 
							
								  if(typeof tls[key] !== 'function') {
							 | 
						||
| 
								 | 
							
								    forge.tls[key] = tls[key];
							 | 
						||
| 
								 | 
							
								  }
							 | 
						||
| 
								 | 
							
								}
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								// expose prf_tls1 for testing
							 | 
						||
| 
								 | 
							
								forge.tls.prf_tls1 = prf_TLS1;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								// expose sha1 hmac method
							 | 
						||
| 
								 | 
							
								forge.tls.hmac_sha1 = hmac_sha1;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								// expose session cache creation
							 | 
						||
| 
								 | 
							
								forge.tls.createSessionCache = tls.createSessionCache;
							 | 
						||
| 
								 | 
							
								
							 | 
						||
| 
								 | 
							
								/**
							 | 
						||
| 
								 | 
							
								 * Creates a new TLS connection. This does not make any assumptions about the
							 | 
						||
| 
								 | 
							
								 * transport layer that TLS is working on top of, ie: it does not assume there
							 | 
						||
| 
								 | 
							
								 * is a TCP/IP connection or establish one. A TLS connection is totally
							 | 
						||
| 
								 | 
							
								 * abstracted away from the layer is runs on top of, it merely establishes a
							 | 
						||
| 
								 | 
							
								 * secure channel between a client" and a "server".
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * A TLS connection contains 4 connection states: pending read and write, and
							 | 
						||
| 
								 | 
							
								 * current read and write.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * At initialization, the current read and write states will be null. Only once
							 | 
						||
| 
								 | 
							
								 * the security parameters have been set and the keys have been generated can
							 | 
						||
| 
								 | 
							
								 * the pending states be converted into current states. Current states will be
							 | 
						||
| 
								 | 
							
								 * updated for each record processed.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * A custom certificate verify callback may be provided to check information
							 | 
						||
| 
								 | 
							
								 * like the common name on the server's certificate. It will be called for
							 | 
						||
| 
								 | 
							
								 * every certificate in the chain. It has the following signature:
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * variable func(c, certs, index, preVerify)
							 | 
						||
| 
								 | 
							
								 * Where:
							 | 
						||
| 
								 | 
							
								 * c         The TLS connection
							 | 
						||
| 
								 | 
							
								 * verified  Set to true if certificate was verified, otherwise the alert
							 | 
						||
| 
								 | 
							
								 *           tls.Alert.Description for why the certificate failed.
							 | 
						||
| 
								 | 
							
								 * depth     The current index in the chain, where 0 is the server's cert.
							 | 
						||
| 
								 | 
							
								 * certs     The certificate chain, *NOTE* if the server was anonymous then
							 | 
						||
| 
								 | 
							
								 *           the chain will be empty.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * The function returns true on success and on failure either the appropriate
							 | 
						||
| 
								 | 
							
								 * tls.Alert.Description or an object with 'alert' set to the appropriate
							 | 
						||
| 
								 | 
							
								 * tls.Alert.Description and 'message' set to a custom error message. If true
							 | 
						||
| 
								 | 
							
								 * is not returned then the connection will abort using, in order of
							 | 
						||
| 
								 | 
							
								 * availability, first the returned alert description, second the preVerify
							 | 
						||
| 
								 | 
							
								 * alert description, and lastly the default 'bad_certificate'.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * There are three callbacks that can be used to make use of client-side
							 | 
						||
| 
								 | 
							
								 * certificates where each takes the TLS connection as the first parameter:
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * getCertificate(conn, hint)
							 | 
						||
| 
								 | 
							
								 *   The second parameter is a hint as to which certificate should be
							 | 
						||
| 
								 | 
							
								 *   returned. If the connection entity is a client, then the hint will be
							 | 
						||
| 
								 | 
							
								 *   the CertificateRequest message from the server that is part of the
							 | 
						||
| 
								 | 
							
								 *   TLS protocol. If the connection entity is a server, then it will be
							 | 
						||
| 
								 | 
							
								 *   the servername list provided via an SNI extension the ClientHello, if
							 | 
						||
| 
								 | 
							
								 *   one was provided (empty array if not). The hint can be examined to
							 | 
						||
| 
								 | 
							
								 *   determine which certificate to use (advanced). Most implementations
							 | 
						||
| 
								 | 
							
								 *   will just return a certificate. The return value must be a
							 | 
						||
| 
								 | 
							
								 *   PEM-formatted certificate or an array of PEM-formatted certificates
							 | 
						||
| 
								 | 
							
								 *   that constitute a certificate chain, with the first in the array/chain
							 | 
						||
| 
								 | 
							
								 *   being the client's certificate.
							 | 
						||
| 
								 | 
							
								 * getPrivateKey(conn, certificate)
							 | 
						||
| 
								 | 
							
								 *   The second parameter is an forge.pki X.509 certificate object that
							 | 
						||
| 
								 | 
							
								 *   is associated with the requested private key. The return value must
							 | 
						||
| 
								 | 
							
								 *   be a PEM-formatted private key.
							 | 
						||
| 
								 | 
							
								 * getSignature(conn, bytes, callback)
							 | 
						||
| 
								 | 
							
								 *   This callback can be used instead of getPrivateKey if the private key
							 | 
						||
| 
								 | 
							
								 *   is not directly accessible in javascript or should not be. For
							 | 
						||
| 
								 | 
							
								 *   instance, a secure external web service could provide the signature
							 | 
						||
| 
								 | 
							
								 *   in exchange for appropriate credentials. The second parameter is a
							 | 
						||
| 
								 | 
							
								 *   string of bytes to be signed that are part of the TLS protocol. These
							 | 
						||
| 
								 | 
							
								 *   bytes are used to verify that the private key for the previously
							 | 
						||
| 
								 | 
							
								 *   provided client-side certificate is accessible to the client. The
							 | 
						||
| 
								 | 
							
								 *   callback is a function that takes 2 parameters, the TLS connection
							 | 
						||
| 
								 | 
							
								 *   and the RSA encrypted (signed) bytes as a string. This callback must
							 | 
						||
| 
								 | 
							
								 *   be called once the signature is ready.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @param options the options for this connection:
							 | 
						||
| 
								 | 
							
								 *   server: true if the connection is server-side, false for client.
							 | 
						||
| 
								 | 
							
								 *   sessionId: a session ID to reuse, null for a new connection.
							 | 
						||
| 
								 | 
							
								 *   caStore: an array of certificates to trust.
							 | 
						||
| 
								 | 
							
								 *   sessionCache: a session cache to use.
							 | 
						||
| 
								 | 
							
								 *   cipherSuites: an optional array of cipher suites to use,
							 | 
						||
| 
								 | 
							
								 *     see tls.CipherSuites.
							 | 
						||
| 
								 | 
							
								 *   connected: function(conn) called when the first handshake completes.
							 | 
						||
| 
								 | 
							
								 *   virtualHost: the virtual server name to use in a TLS SNI extension.
							 | 
						||
| 
								 | 
							
								 *   verifyClient: true to require a client certificate in server mode,
							 | 
						||
| 
								 | 
							
								 *     'optional' to request one, false not to (default: false).
							 | 
						||
| 
								 | 
							
								 *   verify: a handler used to custom verify certificates in the chain.
							 | 
						||
| 
								 | 
							
								 *   verifyOptions: an object with options for the certificate chain validation.
							 | 
						||
| 
								 | 
							
								 *     See documentation of pki.verifyCertificateChain for possible options.
							 | 
						||
| 
								 | 
							
								 *     verifyOptions.verify is ignored. If you wish to specify a verify handler
							 | 
						||
| 
								 | 
							
								 *     use the verify key.
							 | 
						||
| 
								 | 
							
								 *   getCertificate: an optional callback used to get a certificate or
							 | 
						||
| 
								 | 
							
								 *     a chain of certificates (as an array).
							 | 
						||
| 
								 | 
							
								 *   getPrivateKey: an optional callback used to get a private key.
							 | 
						||
| 
								 | 
							
								 *   getSignature: an optional callback used to get a signature.
							 | 
						||
| 
								 | 
							
								 *   tlsDataReady: function(conn) called when TLS protocol data has been
							 | 
						||
| 
								 | 
							
								 *     prepared and is ready to be used (typically sent over a socket
							 | 
						||
| 
								 | 
							
								 *     connection to its destination), read from conn.tlsData buffer.
							 | 
						||
| 
								 | 
							
								 *   dataReady: function(conn) called when application data has
							 | 
						||
| 
								 | 
							
								 *     been parsed from a TLS record and should be consumed by the
							 | 
						||
| 
								 | 
							
								 *     application, read from conn.data buffer.
							 | 
						||
| 
								 | 
							
								 *   closed: function(conn) called when the connection has been closed.
							 | 
						||
| 
								 | 
							
								 *   error: function(conn, error) called when there was an error.
							 | 
						||
| 
								 | 
							
								 *   deflate: function(inBytes) if provided, will deflate TLS records using
							 | 
						||
| 
								 | 
							
								 *     the deflate algorithm if the server supports it.
							 | 
						||
| 
								 | 
							
								 *   inflate: function(inBytes) if provided, will inflate TLS records using
							 | 
						||
| 
								 | 
							
								 *     the deflate algorithm if the server supports it.
							 | 
						||
| 
								 | 
							
								 *
							 | 
						||
| 
								 | 
							
								 * @return the new TLS connection.
							 | 
						||
| 
								 | 
							
								 */
							 | 
						||
| 
								 | 
							
								forge.tls.createConnection = tls.createConnection;
							 |