123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921392239233924392539263927392839293930393139323933393439353936393739383939394039413942394339443945394639473948394939503951395239533954395539563957395839593960396139623963396439653966396739683969397039713972397339743975397639773978397939803981398239833984398539863987398839893990399139923993399439953996399739983999400040014002400340044005400640074008400940104011401240134014401540164017401840194020402140224023402440254026402740284029403040314032403340344035403640374038403940404041404240434044404540464047404840494050405140524053405440554056405740584059406040614062406340644065406640674068406940704071407240734074407540764077407840794080408140824083408440854086408740884089409040914092409340944095409640974098409941004101410241034104410541064107410841094110411141124113411441154116411741184119412041214122412341244125412641274128412941304131413241334134413541364137413841394140414141424143414441454146414741484149415041514152415341544155415641574158415941604161416241634164416541664167416841694170417141724173417441754176417741784179418041814182418341844185418641874188418941904191419241934194419541964197419841994200420142024203420442054206420742084209421042114212421342144215421642174218421942204221422242234224422542264227422842294230423142324233423442354236423742384239424042414242424342444245424642474248424942504251425242534254425542564257425842594260426142624263426442654266426742684269 |
- var forge = require('./forge');
- require('./asn1');
- require('./hmac');
- require('./md5');
- require('./pem');
- require('./pki');
- require('./random');
- require('./sha1');
- require('./util');
- var prf_TLS1 = function(secret, label, seed, length) {
- var rval = forge.util.createBuffer();
-
- var idx = (secret.length >> 1);
- var slen = idx + (secret.length & 1);
- var s1 = secret.substr(0, slen);
- var s2 = secret.substr(idx, slen);
- var ai = forge.util.createBuffer();
- var hmac = forge.hmac.create();
- seed = label + seed;
-
-
- var md5itr = Math.ceil(length / 16);
- var sha1itr = Math.ceil(length / 20);
-
- hmac.start('MD5', s1);
- var md5bytes = forge.util.createBuffer();
- ai.putBytes(seed);
- for(var i = 0; i < md5itr; ++i) {
-
- hmac.start(null, null);
- hmac.update(ai.getBytes());
- ai.putBuffer(hmac.digest());
-
- hmac.start(null, null);
- hmac.update(ai.bytes() + seed);
- md5bytes.putBuffer(hmac.digest());
- }
-
- hmac.start('SHA1', s2);
- var sha1bytes = forge.util.createBuffer();
- ai.clear();
- ai.putBytes(seed);
- for(var i = 0; i < sha1itr; ++i) {
-
- hmac.start(null, null);
- hmac.update(ai.getBytes());
- ai.putBuffer(hmac.digest());
-
- hmac.start(null, null);
- hmac.update(ai.bytes() + seed);
- sha1bytes.putBuffer(hmac.digest());
- }
-
- rval.putBytes(forge.util.xorBytes(
- md5bytes.getBytes(), sha1bytes.getBytes(), length));
- return rval;
- };
- var prf_sha256 = function(secret, label, seed, length) {
-
- };
- var hmac_sha1 = function(key, seqNum, record) {
-
- var hmac = forge.hmac.create();
- hmac.start('SHA1', key);
- var b = forge.util.createBuffer();
- b.putInt32(seqNum[0]);
- b.putInt32(seqNum[1]);
- b.putByte(record.type);
- b.putByte(record.version.major);
- b.putByte(record.version.minor);
- b.putInt16(record.length);
- b.putBytes(record.fragment.bytes());
- hmac.update(b.getBytes());
- return hmac.digest().getBytes();
- };
- var deflate = function(c, record, s) {
- var rval = false;
- try {
- var bytes = c.deflate(record.fragment.getBytes());
- record.fragment = forge.util.createBuffer(bytes);
- record.length = bytes.length;
- rval = true;
- } catch(ex) {
-
- }
- return rval;
- };
- var inflate = function(c, record, s) {
- var rval = false;
- try {
- var bytes = c.inflate(record.fragment.getBytes());
- record.fragment = forge.util.createBuffer(bytes);
- record.length = bytes.length;
- rval = true;
- } catch(ex) {
-
- }
- return rval;
- };
- var readVector = function(b, lenBytes) {
- var len = 0;
- switch(lenBytes) {
- case 1:
- len = b.getByte();
- break;
- case 2:
- len = b.getInt16();
- break;
- case 3:
- len = b.getInt24();
- break;
- case 4:
- len = b.getInt32();
- break;
- }
-
- return forge.util.createBuffer(b.getBytes(len));
- };
- var writeVector = function(b, lenBytes, v) {
-
-
-
- b.putInt(v.length(), lenBytes << 3);
- b.putBuffer(v);
- };
- var tls = {};
- tls.Versions = {
- TLS_1_0: {major: 3, minor: 1},
- TLS_1_1: {major: 3, minor: 2},
- TLS_1_2: {major: 3, minor: 3}
- };
- tls.SupportedVersions = [
- tls.Versions.TLS_1_1,
- tls.Versions.TLS_1_0
- ];
- tls.Version = tls.SupportedVersions[0];
- tls.MaxFragment = 16384 - 1024;
- tls.ConnectionEnd = {
- server: 0,
- client: 1
- };
- tls.PRFAlgorithm = {
- tls_prf_sha256: 0
- };
- tls.BulkCipherAlgorithm = {
- none: null,
- rc4: 0,
- des3: 1,
- aes: 2
- };
- tls.CipherType = {
- stream: 0,
- block: 1,
- aead: 2
- };
- tls.MACAlgorithm = {
- none: null,
- hmac_md5: 0,
- hmac_sha1: 1,
- hmac_sha256: 2,
- hmac_sha384: 3,
- hmac_sha512: 4
- };
- tls.CompressionMethod = {
- none: 0,
- deflate: 1
- };
- tls.ContentType = {
- change_cipher_spec: 20,
- alert: 21,
- handshake: 22,
- application_data: 23,
- heartbeat: 24
- };
- tls.HandshakeType = {
- hello_request: 0,
- client_hello: 1,
- server_hello: 2,
- certificate: 11,
- server_key_exchange: 12,
- certificate_request: 13,
- server_hello_done: 14,
- certificate_verify: 15,
- client_key_exchange: 16,
- finished: 20
- };
- tls.Alert = {};
- tls.Alert.Level = {
- warning: 1,
- fatal: 2
- };
- tls.Alert.Description = {
- close_notify: 0,
- unexpected_message: 10,
- bad_record_mac: 20,
- decryption_failed: 21,
- record_overflow: 22,
- decompression_failure: 30,
- handshake_failure: 40,
- bad_certificate: 42,
- unsupported_certificate: 43,
- certificate_revoked: 44,
- certificate_expired: 45,
- certificate_unknown: 46,
- illegal_parameter: 47,
- unknown_ca: 48,
- access_denied: 49,
- decode_error: 50,
- decrypt_error: 51,
- export_restriction: 60,
- protocol_version: 70,
- insufficient_security: 71,
- internal_error: 80,
- user_canceled: 90,
- no_renegotiation: 100
- };
- tls.HeartbeatMessageType = {
- heartbeat_request: 1,
- heartbeat_response: 2
- };
- tls.CipherSuites = {};
- tls.getCipherSuite = function(twoBytes) {
- var rval = null;
- for(var key in tls.CipherSuites) {
- var cs = tls.CipherSuites[key];
- if(cs.id[0] === twoBytes.charCodeAt(0) &&
- cs.id[1] === twoBytes.charCodeAt(1)) {
- rval = cs;
- break;
- }
- }
- return rval;
- };
- tls.handleUnexpected = function(c, record) {
-
- var ignore = (!c.open && c.entity === tls.ConnectionEnd.client);
- if(!ignore) {
- c.error(c, {
- message: 'Unexpected message. Received TLS record out of order.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.unexpected_message
- }
- });
- }
- };
- tls.handleHelloRequest = function(c, record, length) {
-
-
- if(!c.handshaking && c.handshakes > 0) {
-
- tls.queue(c, tls.createAlert(c, {
- level: tls.Alert.Level.warning,
- description: tls.Alert.Description.no_renegotiation
- }));
- tls.flush(c);
- }
-
- c.process();
- };
- tls.parseHelloMessage = function(c, record, length) {
- var msg = null;
- var client = (c.entity === tls.ConnectionEnd.client);
-
- if(length < 38) {
- c.error(c, {
- message: client ?
- 'Invalid ServerHello message. Message too short.' :
- 'Invalid ClientHello message. Message too short.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.illegal_parameter
- }
- });
- } else {
-
- var b = record.fragment;
- var remaining = b.length();
- msg = {
- version: {
- major: b.getByte(),
- minor: b.getByte()
- },
- random: forge.util.createBuffer(b.getBytes(32)),
- session_id: readVector(b, 1),
- extensions: []
- };
- if(client) {
- msg.cipher_suite = b.getBytes(2);
- msg.compression_method = b.getByte();
- } else {
- msg.cipher_suites = readVector(b, 2);
- msg.compression_methods = readVector(b, 1);
- }
-
- remaining = length - (remaining - b.length());
- if(remaining > 0) {
-
- var exts = readVector(b, 2);
- while(exts.length() > 0) {
- msg.extensions.push({
- type: [exts.getByte(), exts.getByte()],
- data: readVector(exts, 2)
- });
- }
-
- if(!client) {
- for(var i = 0; i < msg.extensions.length; ++i) {
- var ext = msg.extensions[i];
-
- if(ext.type[0] === 0x00 && ext.type[1] === 0x00) {
-
- var snl = readVector(ext.data, 2);
- while(snl.length() > 0) {
-
- var snType = snl.getByte();
-
-
- if(snType !== 0x00) {
- break;
- }
-
- c.session.extensions.server_name.serverNameList.push(
- readVector(snl, 2).getBytes());
- }
- }
- }
- }
- }
-
- if(c.session.version) {
- if(msg.version.major !== c.session.version.major ||
- msg.version.minor !== c.session.version.minor) {
- return c.error(c, {
- message: 'TLS version change is disallowed during renegotiation.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.protocol_version
- }
- });
- }
- }
-
- if(client) {
-
- c.session.cipherSuite = tls.getCipherSuite(msg.cipher_suite);
- } else {
-
-
- var tmp = forge.util.createBuffer(msg.cipher_suites.bytes());
- while(tmp.length() > 0) {
-
-
- c.session.cipherSuite = tls.getCipherSuite(tmp.getBytes(2));
- if(c.session.cipherSuite !== null) {
- break;
- }
- }
- }
-
- if(c.session.cipherSuite === null) {
- return c.error(c, {
- message: 'No cipher suites in common.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.handshake_failure
- },
- cipherSuite: forge.util.bytesToHex(msg.cipher_suite)
- });
- }
-
- if(client) {
- c.session.compressionMethod = msg.compression_method;
- } else {
-
- c.session.compressionMethod = tls.CompressionMethod.none;
- }
- }
- return msg;
- };
- tls.createSecurityParameters = function(c, msg) {
-
-
-
- var client = (c.entity === tls.ConnectionEnd.client);
- var msgRandom = msg.random.bytes();
- var cRandom = client ? c.session.sp.client_random : msgRandom;
- var sRandom = client ? msgRandom : tls.createRandom().getBytes();
-
- c.session.sp = {
- entity: c.entity,
- prf_algorithm: tls.PRFAlgorithm.tls_prf_sha256,
- bulk_cipher_algorithm: null,
- cipher_type: null,
- enc_key_length: null,
- block_length: null,
- fixed_iv_length: null,
- record_iv_length: null,
- mac_algorithm: null,
- mac_length: null,
- mac_key_length: null,
- compression_algorithm: c.session.compressionMethod,
- pre_master_secret: null,
- master_secret: null,
- client_random: cRandom,
- server_random: sRandom
- };
- };
- tls.handleServerHello = function(c, record, length) {
- var msg = tls.parseHelloMessage(c, record, length);
- if(c.fail) {
- return;
- }
-
- if(msg.version.minor <= c.version.minor) {
- c.version.minor = msg.version.minor;
- } else {
- return c.error(c, {
- message: 'Incompatible TLS version.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.protocol_version
- }
- });
- }
-
- c.session.version = c.version;
-
- var sessionId = msg.session_id.bytes();
-
-
- if(sessionId.length > 0 && sessionId === c.session.id) {
-
- c.expect = SCC;
- c.session.resuming = true;
-
- c.session.sp.server_random = msg.random.bytes();
- } else {
-
- c.expect = SCE;
- c.session.resuming = false;
-
- tls.createSecurityParameters(c, msg);
- }
-
- c.session.id = sessionId;
-
- c.process();
- };
- tls.handleClientHello = function(c, record, length) {
- var msg = tls.parseHelloMessage(c, record, length);
- if(c.fail) {
- return;
- }
-
- var sessionId = msg.session_id.bytes();
-
- var session = null;
- if(c.sessionCache) {
- session = c.sessionCache.getSession(sessionId);
- if(session === null) {
-
- sessionId = '';
- } else if(session.version.major !== msg.version.major ||
- session.version.minor > msg.version.minor) {
-
- session = null;
- sessionId = '';
- }
- }
-
- if(sessionId.length === 0) {
- sessionId = forge.random.getBytes(32);
- }
-
- c.session.id = sessionId;
- c.session.clientHelloVersion = msg.version;
- c.session.sp = {};
- if(session) {
-
- c.version = c.session.version = session.version;
- c.session.sp = session.sp;
- } else {
-
- var version;
- for(var i = 1; i < tls.SupportedVersions.length; ++i) {
- version = tls.SupportedVersions[i];
- if(version.minor <= msg.version.minor) {
- break;
- }
- }
- c.version = {major: version.major, minor: version.minor};
- c.session.version = c.version;
- }
-
- if(session !== null) {
-
- c.expect = CCC;
- c.session.resuming = true;
-
- c.session.sp.client_random = msg.random.bytes();
- } else {
-
- c.expect = (c.verifyClient !== false) ? CCE : CKE;
- c.session.resuming = false;
-
- tls.createSecurityParameters(c, msg);
- }
-
- c.open = true;
-
- tls.queue(c, tls.createRecord(c, {
- type: tls.ContentType.handshake,
- data: tls.createServerHello(c)
- }));
- if(c.session.resuming) {
-
- tls.queue(c, tls.createRecord(c, {
- type: tls.ContentType.change_cipher_spec,
- data: tls.createChangeCipherSpec()
- }));
-
- c.state.pending = tls.createConnectionState(c);
-
- c.state.current.write = c.state.pending.write;
-
- tls.queue(c, tls.createRecord(c, {
- type: tls.ContentType.handshake,
- data: tls.createFinished(c)
- }));
- } else {
-
- tls.queue(c, tls.createRecord(c, {
- type: tls.ContentType.handshake,
- data: tls.createCertificate(c)
- }));
- if(!c.fail) {
-
- tls.queue(c, tls.createRecord(c, {
- type: tls.ContentType.handshake,
- data: tls.createServerKeyExchange(c)
- }));
-
- if(c.verifyClient !== false) {
-
- tls.queue(c, tls.createRecord(c, {
- type: tls.ContentType.handshake,
- data: tls.createCertificateRequest(c)
- }));
- }
-
- tls.queue(c, tls.createRecord(c, {
- type: tls.ContentType.handshake,
- data: tls.createServerHelloDone(c)
- }));
- }
- }
-
- tls.flush(c);
-
- c.process();
- };
- tls.handleCertificate = function(c, record, length) {
-
- if(length < 3) {
- return c.error(c, {
- message: 'Invalid Certificate message. Message too short.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.illegal_parameter
- }
- });
- }
- var b = record.fragment;
- var msg = {
- certificate_list: readVector(b, 3)
- };
-
- var cert, asn1;
- var certs = [];
- try {
- while(msg.certificate_list.length() > 0) {
-
- cert = readVector(msg.certificate_list, 3);
- asn1 = forge.asn1.fromDer(cert);
- cert = forge.pki.certificateFromAsn1(asn1, true);
- certs.push(cert);
- }
- } catch(ex) {
- return c.error(c, {
- message: 'Could not parse certificate list.',
- cause: ex,
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.bad_certificate
- }
- });
- }
-
-
-
- var client = (c.entity === tls.ConnectionEnd.client);
- if((client || c.verifyClient === true) && certs.length === 0) {
-
- c.error(c, {
- message: client ?
- 'No server certificate provided.' :
- 'No client certificate provided.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.illegal_parameter
- }
- });
- } else if(certs.length === 0) {
-
-
- c.expect = client ? SKE : CKE;
- } else {
-
- if(client) {
- c.session.serverCertificate = certs[0];
- } else {
- c.session.clientCertificate = certs[0];
- }
- if(tls.verifyCertificateChain(c, certs)) {
-
- c.expect = client ? SKE : CKE;
- }
- }
-
- c.process();
- };
- tls.handleServerKeyExchange = function(c, record, length) {
-
-
- if(length > 0) {
- return c.error(c, {
- message: 'Invalid key parameters. Only RSA is supported.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.unsupported_certificate
- }
- });
- }
-
- c.expect = SCR;
-
- c.process();
- };
- tls.handleClientKeyExchange = function(c, record, length) {
-
-
- if(length < 48) {
- return c.error(c, {
- message: 'Invalid key parameters. Only RSA is supported.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.unsupported_certificate
- }
- });
- }
- var b = record.fragment;
- var msg = {
- enc_pre_master_secret: readVector(b, 2).getBytes()
- };
-
- var privateKey = null;
- if(c.getPrivateKey) {
- try {
- privateKey = c.getPrivateKey(c, c.session.serverCertificate);
- privateKey = forge.pki.privateKeyFromPem(privateKey);
- } catch(ex) {
- c.error(c, {
- message: 'Could not get private key.',
- cause: ex,
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.internal_error
- }
- });
- }
- }
- if(privateKey === null) {
- return c.error(c, {
- message: 'No private key set.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.internal_error
- }
- });
- }
- try {
-
- var sp = c.session.sp;
- sp.pre_master_secret = privateKey.decrypt(msg.enc_pre_master_secret);
-
- var version = c.session.clientHelloVersion;
- if(version.major !== sp.pre_master_secret.charCodeAt(0) ||
- version.minor !== sp.pre_master_secret.charCodeAt(1)) {
-
- throw new Error('TLS version rollback attack detected.');
- }
- } catch(ex) {
-
- sp.pre_master_secret = forge.random.getBytes(48);
- }
-
-
-
- c.expect = CCC;
- if(c.session.clientCertificate !== null) {
-
-
- c.expect = CCV;
- }
-
- c.process();
- };
- tls.handleCertificateRequest = function(c, record, length) {
-
- if(length < 3) {
- return c.error(c, {
- message: 'Invalid CertificateRequest. Message too short.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.illegal_parameter
- }
- });
- }
-
-
- var b = record.fragment;
- var msg = {
- certificate_types: readVector(b, 1),
- certificate_authorities: readVector(b, 2)
- };
-
- c.session.certificateRequest = msg;
-
- c.expect = SHD;
-
- c.process();
- };
- tls.handleCertificateVerify = function(c, record, length) {
- if(length < 2) {
- return c.error(c, {
- message: 'Invalid CertificateVerify. Message too short.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.illegal_parameter
- }
- });
- }
-
-
-
- var b = record.fragment;
- b.read -= 4;
- var msgBytes = b.bytes();
- b.read += 4;
- var msg = {
- signature: readVector(b, 2).getBytes()
- };
-
-
- var verify = forge.util.createBuffer();
- verify.putBuffer(c.session.md5.digest());
- verify.putBuffer(c.session.sha1.digest());
- verify = verify.getBytes();
- try {
- var cert = c.session.clientCertificate;
-
- if(!cert.publicKey.verify(verify, msg.signature, 'NONE')) {
- throw new Error('CertificateVerify signature does not match.');
- }
-
- c.session.md5.update(msgBytes);
- c.session.sha1.update(msgBytes);
- } catch(ex) {
- return c.error(c, {
- message: 'Bad signature in CertificateVerify.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.handshake_failure
- }
- });
- }
-
- c.expect = CCC;
-
- c.process();
- };
- tls.handleServerHelloDone = function(c, record, length) {
-
- if(length > 0) {
- return c.error(c, {
- message: 'Invalid ServerHelloDone message. Invalid length.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.record_overflow
- }
- });
- }
- if(c.serverCertificate === null) {
-
- var error = {
- message: 'No server certificate provided. Not enough security.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.insufficient_security
- }
- };
-
- var depth = 0;
- var ret = c.verify(c, error.alert.description, depth, []);
- if(ret !== true) {
-
- if(ret || ret === 0) {
-
- if(typeof ret === 'object' && !forge.util.isArray(ret)) {
- if(ret.message) {
- error.message = ret.message;
- }
- if(ret.alert) {
- error.alert.description = ret.alert;
- }
- } else if(typeof ret === 'number') {
-
- error.alert.description = ret;
- }
- }
-
- return c.error(c, error);
- }
- }
-
- if(c.session.certificateRequest !== null) {
- record = tls.createRecord(c, {
- type: tls.ContentType.handshake,
- data: tls.createCertificate(c)
- });
- tls.queue(c, record);
- }
-
- record = tls.createRecord(c, {
- type: tls.ContentType.handshake,
- data: tls.createClientKeyExchange(c)
- });
- tls.queue(c, record);
-
- c.expect = SER;
-
- var callback = function(c, signature) {
- if(c.session.certificateRequest !== null &&
- c.session.clientCertificate !== null) {
-
- tls.queue(c, tls.createRecord(c, {
- type: tls.ContentType.handshake,
- data: tls.createCertificateVerify(c, signature)
- }));
- }
-
- tls.queue(c, tls.createRecord(c, {
- type: tls.ContentType.change_cipher_spec,
- data: tls.createChangeCipherSpec()
- }));
-
- c.state.pending = tls.createConnectionState(c);
-
- c.state.current.write = c.state.pending.write;
-
- tls.queue(c, tls.createRecord(c, {
- type: tls.ContentType.handshake,
- data: tls.createFinished(c)
- }));
-
- c.expect = SCC;
-
- tls.flush(c);
-
- c.process();
- };
-
-
- if(c.session.certificateRequest === null ||
- c.session.clientCertificate === null) {
- return callback(c, null);
- }
-
- tls.getClientSignature(c, callback);
- };
- tls.handleChangeCipherSpec = function(c, record) {
- if(record.fragment.getByte() !== 0x01) {
- return c.error(c, {
- message: 'Invalid ChangeCipherSpec message received.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.illegal_parameter
- }
- });
- }
-
-
-
- var client = (c.entity === tls.ConnectionEnd.client);
- if((c.session.resuming && client) || (!c.session.resuming && !client)) {
- c.state.pending = tls.createConnectionState(c);
- }
-
- c.state.current.read = c.state.pending.read;
-
-
-
- if((!c.session.resuming && client) || (c.session.resuming && !client)) {
- c.state.pending = null;
- }
-
- c.expect = client ? SFI : CFI;
-
- c.process();
- };
- tls.handleFinished = function(c, record, length) {
-
-
-
- var b = record.fragment;
- b.read -= 4;
- var msgBytes = b.bytes();
- b.read += 4;
-
- var vd = record.fragment.getBytes();
-
- b = forge.util.createBuffer();
- b.putBuffer(c.session.md5.digest());
- b.putBuffer(c.session.sha1.digest());
-
- var client = (c.entity === tls.ConnectionEnd.client);
- var label = client ? 'server finished' : 'client finished';
-
- var sp = c.session.sp;
- var vdl = 12;
- var prf = prf_TLS1;
- b = prf(sp.master_secret, label, b.getBytes(), vdl);
- if(b.getBytes() !== vd) {
- return c.error(c, {
- message: 'Invalid verify_data in Finished message.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.decrypt_error
- }
- });
- }
-
- c.session.md5.update(msgBytes);
- c.session.sha1.update(msgBytes);
-
- if((c.session.resuming && client) || (!c.session.resuming && !client)) {
-
- tls.queue(c, tls.createRecord(c, {
- type: tls.ContentType.change_cipher_spec,
- data: tls.createChangeCipherSpec()
- }));
-
- c.state.current.write = c.state.pending.write;
- c.state.pending = null;
-
- tls.queue(c, tls.createRecord(c, {
- type: tls.ContentType.handshake,
- data: tls.createFinished(c)
- }));
- }
-
- c.expect = client ? SAD : CAD;
-
- c.handshaking = false;
- ++c.handshakes;
-
- c.peerCertificate = client ?
- c.session.serverCertificate : c.session.clientCertificate;
-
- tls.flush(c);
-
- c.isConnected = true;
- c.connected(c);
-
- c.process();
- };
- tls.handleAlert = function(c, record) {
-
- var b = record.fragment;
- var alert = {
- level: b.getByte(),
- description: b.getByte()
- };
-
-
- var msg;
- switch(alert.description) {
- case tls.Alert.Description.close_notify:
- msg = 'Connection closed.';
- break;
- case tls.Alert.Description.unexpected_message:
- msg = 'Unexpected message.';
- break;
- case tls.Alert.Description.bad_record_mac:
- msg = 'Bad record MAC.';
- break;
- case tls.Alert.Description.decryption_failed:
- msg = 'Decryption failed.';
- break;
- case tls.Alert.Description.record_overflow:
- msg = 'Record overflow.';
- break;
- case tls.Alert.Description.decompression_failure:
- msg = 'Decompression failed.';
- break;
- case tls.Alert.Description.handshake_failure:
- msg = 'Handshake failure.';
- break;
- case tls.Alert.Description.bad_certificate:
- msg = 'Bad certificate.';
- break;
- case tls.Alert.Description.unsupported_certificate:
- msg = 'Unsupported certificate.';
- break;
- case tls.Alert.Description.certificate_revoked:
- msg = 'Certificate revoked.';
- break;
- case tls.Alert.Description.certificate_expired:
- msg = 'Certificate expired.';
- break;
- case tls.Alert.Description.certificate_unknown:
- msg = 'Certificate unknown.';
- break;
- case tls.Alert.Description.illegal_parameter:
- msg = 'Illegal parameter.';
- break;
- case tls.Alert.Description.unknown_ca:
- msg = 'Unknown certificate authority.';
- break;
- case tls.Alert.Description.access_denied:
- msg = 'Access denied.';
- break;
- case tls.Alert.Description.decode_error:
- msg = 'Decode error.';
- break;
- case tls.Alert.Description.decrypt_error:
- msg = 'Decrypt error.';
- break;
- case tls.Alert.Description.export_restriction:
- msg = 'Export restriction.';
- break;
- case tls.Alert.Description.protocol_version:
- msg = 'Unsupported protocol version.';
- break;
- case tls.Alert.Description.insufficient_security:
- msg = 'Insufficient security.';
- break;
- case tls.Alert.Description.internal_error:
- msg = 'Internal error.';
- break;
- case tls.Alert.Description.user_canceled:
- msg = 'User canceled.';
- break;
- case tls.Alert.Description.no_renegotiation:
- msg = 'Renegotiation not supported.';
- break;
- default:
- msg = 'Unknown error.';
- break;
- }
-
- if(alert.description === tls.Alert.Description.close_notify) {
- return c.close();
- }
-
- c.error(c, {
- message: msg,
- send: false,
-
- origin: (c.entity === tls.ConnectionEnd.client) ? 'server' : 'client',
- alert: alert
- });
-
- c.process();
- };
- tls.handleHandshake = function(c, record) {
-
- var b = record.fragment;
- var type = b.getByte();
- var length = b.getInt24();
-
- if(length > b.length()) {
-
-
- c.fragmented = record;
- record.fragment = forge.util.createBuffer();
- b.read -= 4;
-
- return c.process();
- }
-
-
- c.fragmented = null;
- b.read -= 4;
-
-
- var bytes = b.bytes(length + 4);
-
- b.read += 4;
-
- if(type in hsTable[c.entity][c.expect]) {
-
- if(c.entity === tls.ConnectionEnd.server && !c.open && !c.fail) {
- c.handshaking = true;
- c.session = {
- version: null,
- extensions: {
- server_name: {
- serverNameList: []
- }
- },
- cipherSuite: null,
- compressionMethod: null,
- serverCertificate: null,
- clientCertificate: null,
- md5: forge.md.md5.create(),
- sha1: forge.md.sha1.create()
- };
- }
-
- if(type !== tls.HandshakeType.hello_request &&
- type !== tls.HandshakeType.certificate_verify &&
- type !== tls.HandshakeType.finished) {
- c.session.md5.update(bytes);
- c.session.sha1.update(bytes);
- }
-
- hsTable[c.entity][c.expect][type](c, record, length);
- } else {
-
- tls.handleUnexpected(c, record);
- }
- };
- tls.handleApplicationData = function(c, record) {
-
- c.data.putBuffer(record.fragment);
- c.dataReady(c);
-
- c.process();
- };
- tls.handleHeartbeat = function(c, record) {
-
- var b = record.fragment;
- var type = b.getByte();
- var length = b.getInt16();
- var payload = b.getBytes(length);
- if(type === tls.HeartbeatMessageType.heartbeat_request) {
-
- if(c.handshaking || length > payload.length) {
-
- return c.process();
- }
-
- tls.queue(c, tls.createRecord(c, {
- type: tls.ContentType.heartbeat,
- data: tls.createHeartbeat(
- tls.HeartbeatMessageType.heartbeat_response, payload)
- }));
- tls.flush(c);
- } else if(type === tls.HeartbeatMessageType.heartbeat_response) {
-
- if(payload !== c.expectedHeartbeatPayload) {
-
- return c.process();
- }
-
- if(c.heartbeatReceived) {
- c.heartbeatReceived(c, forge.util.createBuffer(payload));
- }
- }
-
- c.process();
- };
- var SHE = 0;
- var SCE = 1;
- var SKE = 2;
- var SCR = 3;
- var SHD = 4;
- var SCC = 5;
- var SFI = 6;
- var SAD = 7;
- var SER = 8;
- var CHE = 0;
- var CCE = 1;
- var CKE = 2;
- var CCV = 3;
- var CCC = 4;
- var CFI = 5;
- var CAD = 6;
- var CER = 7;
- var __ = tls.handleUnexpected;
- var R0 = tls.handleChangeCipherSpec;
- var R1 = tls.handleAlert;
- var R2 = tls.handleHandshake;
- var R3 = tls.handleApplicationData;
- var R4 = tls.handleHeartbeat;
- var ctTable = [];
- ctTable[tls.ConnectionEnd.client] = [
- [__,R1,R2,__,R4],
- [__,R1,R2,__,R4],
- [__,R1,R2,__,R4],
- [__,R1,R2,__,R4],
- [__,R1,R2,__,R4],
- [R0,R1,__,__,R4],
- [__,R1,R2,__,R4],
- [__,R1,R2,R3,R4],
- [__,R1,R2,__,R4]
- ];
- ctTable[tls.ConnectionEnd.server] = [
- [__,R1,R2,__,R4],
- [__,R1,R2,__,R4],
- [__,R1,R2,__,R4],
- [__,R1,R2,__,R4],
- [R0,R1,__,__,R4],
- [__,R1,R2,__,R4],
- [__,R1,R2,R3,R4],
- [__,R1,R2,__,R4]
- ];
- var H0 = tls.handleHelloRequest;
- var H1 = tls.handleServerHello;
- var H2 = tls.handleCertificate;
- var H3 = tls.handleServerKeyExchange;
- var H4 = tls.handleCertificateRequest;
- var H5 = tls.handleServerHelloDone;
- var H6 = tls.handleFinished;
- var hsTable = [];
- hsTable[tls.ConnectionEnd.client] = [
- [__,__,H1,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__],
- [H0,__,__,__,__,__,__,__,__,__,__,H2,H3,H4,H5,__,__,__,__,__,__],
- [H0,__,__,__,__,__,__,__,__,__,__,__,H3,H4,H5,__,__,__,__,__,__],
- [H0,__,__,__,__,__,__,__,__,__,__,__,__,H4,H5,__,__,__,__,__,__],
- [H0,__,__,__,__,__,__,__,__,__,__,__,__,__,H5,__,__,__,__,__,__],
- [H0,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__],
- [H0,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,H6],
- [H0,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__],
- [H0,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__]
- ];
- var H7 = tls.handleClientHello;
- var H8 = tls.handleClientKeyExchange;
- var H9 = tls.handleCertificateVerify;
- hsTable[tls.ConnectionEnd.server] = [
- [__,H7,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__],
- [__,__,__,__,__,__,__,__,__,__,__,H2,__,__,__,__,__,__,__,__,__],
- [__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,H8,__,__,__,__],
- [__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,H9,__,__,__,__,__],
- [__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__],
- [__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,H6],
- [__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__],
- [__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__]
- ];
- tls.generateKeys = function(c, sp) {
-
-
-
-
-
-
-
-
-
- var prf = prf_TLS1;
-
- var random = sp.client_random + sp.server_random;
-
- if(!c.session.resuming) {
-
- sp.master_secret = prf(
- sp.pre_master_secret, 'master secret', random, 48).bytes();
- sp.pre_master_secret = null;
- }
-
- random = sp.server_random + sp.client_random;
- var length = 2 * sp.mac_key_length + 2 * sp.enc_key_length;
-
- var tls10 = (c.version.major === tls.Versions.TLS_1_0.major &&
- c.version.minor === tls.Versions.TLS_1_0.minor);
- if(tls10) {
- length += 2 * sp.fixed_iv_length;
- }
- var km = prf(sp.master_secret, 'key expansion', random, length);
-
- var rval = {
- client_write_MAC_key: km.getBytes(sp.mac_key_length),
- server_write_MAC_key: km.getBytes(sp.mac_key_length),
- client_write_key: km.getBytes(sp.enc_key_length),
- server_write_key: km.getBytes(sp.enc_key_length)
- };
-
- if(tls10) {
- rval.client_write_IV = km.getBytes(sp.fixed_iv_length);
- rval.server_write_IV = km.getBytes(sp.fixed_iv_length);
- }
- return rval;
- };
- tls.createConnectionState = function(c) {
- var client = (c.entity === tls.ConnectionEnd.client);
- var createMode = function() {
- var mode = {
-
- sequenceNumber: [0, 0],
- macKey: null,
- macLength: 0,
- macFunction: null,
- cipherState: null,
- cipherFunction: function(record) {return true;},
- compressionState: null,
- compressFunction: function(record) {return true;},
- updateSequenceNumber: function() {
- if(mode.sequenceNumber[1] === 0xFFFFFFFF) {
- mode.sequenceNumber[1] = 0;
- ++mode.sequenceNumber[0];
- } else {
- ++mode.sequenceNumber[1];
- }
- }
- };
- return mode;
- };
- var state = {
- read: createMode(),
- write: createMode()
- };
-
- state.read.update = function(c, record) {
- if(!state.read.cipherFunction(record, state.read)) {
- c.error(c, {
- message: 'Could not decrypt record or bad MAC.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
-
-
-
- description: tls.Alert.Description.bad_record_mac
- }
- });
- } else if(!state.read.compressFunction(c, record, state.read)) {
- c.error(c, {
- message: 'Could not decompress record.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.decompression_failure
- }
- });
- }
- return !c.fail;
- };
-
- state.write.update = function(c, record) {
- if(!state.write.compressFunction(c, record, state.write)) {
-
-
- c.error(c, {
- message: 'Could not compress record.',
- send: false,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.internal_error
- }
- });
- } else if(!state.write.cipherFunction(record, state.write)) {
-
-
- c.error(c, {
- message: 'Could not encrypt record.',
- send: false,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.internal_error
- }
- });
- }
- return !c.fail;
- };
-
- if(c.session) {
- var sp = c.session.sp;
- c.session.cipherSuite.initSecurityParameters(sp);
-
- sp.keys = tls.generateKeys(c, sp);
- state.read.macKey = client ?
- sp.keys.server_write_MAC_key : sp.keys.client_write_MAC_key;
- state.write.macKey = client ?
- sp.keys.client_write_MAC_key : sp.keys.server_write_MAC_key;
-
- c.session.cipherSuite.initConnectionState(state, c, sp);
-
- switch(sp.compression_algorithm) {
- case tls.CompressionMethod.none:
- break;
- case tls.CompressionMethod.deflate:
- state.read.compressFunction = inflate;
- state.write.compressFunction = deflate;
- break;
- default:
- throw new Error('Unsupported compression algorithm.');
- }
- }
- return state;
- };
- tls.createRandom = function() {
-
- var d = new Date();
- var utc = +d + d.getTimezoneOffset() * 60000;
- var rval = forge.util.createBuffer();
- rval.putInt32(utc);
- rval.putBytes(forge.random.getBytes(28));
- return rval;
- };
- tls.createRecord = function(c, options) {
- if(!options.data) {
- return null;
- }
- var record = {
- type: options.type,
- version: {
- major: c.version.major,
- minor: c.version.minor
- },
- length: options.data.length(),
- fragment: options.data
- };
- return record;
- };
- tls.createAlert = function(c, alert) {
- var b = forge.util.createBuffer();
- b.putByte(alert.level);
- b.putByte(alert.description);
- return tls.createRecord(c, {
- type: tls.ContentType.alert,
- data: b
- });
- };
- tls.createClientHello = function(c) {
-
- c.session.clientHelloVersion = {
- major: c.version.major,
- minor: c.version.minor
- };
-
- var cipherSuites = forge.util.createBuffer();
- for(var i = 0; i < c.cipherSuites.length; ++i) {
- var cs = c.cipherSuites[i];
- cipherSuites.putByte(cs.id[0]);
- cipherSuites.putByte(cs.id[1]);
- }
- var cSuites = cipherSuites.length();
-
-
- var compressionMethods = forge.util.createBuffer();
- compressionMethods.putByte(tls.CompressionMethod.none);
-
-
-
- var cMethods = compressionMethods.length();
-
-
- var extensions = forge.util.createBuffer();
- if(c.virtualHost) {
-
- var ext = forge.util.createBuffer();
- ext.putByte(0x00);
- ext.putByte(0x00);
-
- var serverName = forge.util.createBuffer();
- serverName.putByte(0x00);
- writeVector(serverName, 2, forge.util.createBuffer(c.virtualHost));
-
- var snList = forge.util.createBuffer();
- writeVector(snList, 2, serverName);
- writeVector(ext, 2, snList);
- extensions.putBuffer(ext);
- }
- var extLength = extensions.length();
- if(extLength > 0) {
-
- extLength += 2;
- }
-
-
-
- var sessionId = c.session.id;
- var length =
- sessionId.length + 1 +
- 2 +
- 4 + 28 +
- 2 + cSuites +
- 1 + cMethods +
- extLength;
-
- var rval = forge.util.createBuffer();
- rval.putByte(tls.HandshakeType.client_hello);
- rval.putInt24(length);
- rval.putByte(c.version.major);
- rval.putByte(c.version.minor);
- rval.putBytes(c.session.sp.client_random);
- writeVector(rval, 1, forge.util.createBuffer(sessionId));
- writeVector(rval, 2, cipherSuites);
- writeVector(rval, 1, compressionMethods);
- if(extLength > 0) {
- writeVector(rval, 2, extensions);
- }
- return rval;
- };
- tls.createServerHello = function(c) {
-
- var sessionId = c.session.id;
- var length =
- sessionId.length + 1 +
- 2 +
- 4 + 28 +
- 2 +
- 1;
-
- var rval = forge.util.createBuffer();
- rval.putByte(tls.HandshakeType.server_hello);
- rval.putInt24(length);
- rval.putByte(c.version.major);
- rval.putByte(c.version.minor);
- rval.putBytes(c.session.sp.server_random);
- writeVector(rval, 1, forge.util.createBuffer(sessionId));
- rval.putByte(c.session.cipherSuite.id[0]);
- rval.putByte(c.session.cipherSuite.id[1]);
- rval.putByte(c.session.compressionMethod);
- return rval;
- };
- tls.createCertificate = function(c) {
-
-
- var client = (c.entity === tls.ConnectionEnd.client);
- var cert = null;
- if(c.getCertificate) {
- var hint;
- if(client) {
- hint = c.session.certificateRequest;
- } else {
- hint = c.session.extensions.server_name.serverNameList;
- }
- cert = c.getCertificate(c, hint);
- }
-
- var certList = forge.util.createBuffer();
- if(cert !== null) {
- try {
-
- if(!forge.util.isArray(cert)) {
- cert = [cert];
- }
- var asn1 = null;
- for(var i = 0; i < cert.length; ++i) {
- var msg = forge.pem.decode(cert[i])[0];
- if(msg.type !== 'CERTIFICATE' &&
- msg.type !== 'X509 CERTIFICATE' &&
- msg.type !== 'TRUSTED CERTIFICATE') {
- var error = new Error('Could not convert certificate from PEM; PEM ' +
- 'header type is not "CERTIFICATE", "X509 CERTIFICATE", or ' +
- '"TRUSTED CERTIFICATE".');
- error.headerType = msg.type;
- throw error;
- }
- if(msg.procType && msg.procType.type === 'ENCRYPTED') {
- throw new Error('Could not convert certificate from PEM; PEM is encrypted.');
- }
- var der = forge.util.createBuffer(msg.body);
- if(asn1 === null) {
- asn1 = forge.asn1.fromDer(der.bytes(), false);
- }
-
- var certBuffer = forge.util.createBuffer();
- writeVector(certBuffer, 3, der);
-
- certList.putBuffer(certBuffer);
- }
-
- cert = forge.pki.certificateFromAsn1(asn1);
- if(client) {
- c.session.clientCertificate = cert;
- } else {
- c.session.serverCertificate = cert;
- }
- } catch(ex) {
- return c.error(c, {
- message: 'Could not send certificate list.',
- cause: ex,
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.bad_certificate
- }
- });
- }
- }
-
- var length = 3 + certList.length();
-
- var rval = forge.util.createBuffer();
- rval.putByte(tls.HandshakeType.certificate);
- rval.putInt24(length);
- writeVector(rval, 3, certList);
- return rval;
- };
- tls.createClientKeyExchange = function(c) {
-
- var b = forge.util.createBuffer();
-
-
- b.putByte(c.session.clientHelloVersion.major);
- b.putByte(c.session.clientHelloVersion.minor);
-
- b.putBytes(forge.random.getBytes(46));
-
- var sp = c.session.sp;
- sp.pre_master_secret = b.getBytes();
-
- var key = c.session.serverCertificate.publicKey;
- b = key.encrypt(sp.pre_master_secret);
-
-
- var length = b.length + 2;
-
- var rval = forge.util.createBuffer();
- rval.putByte(tls.HandshakeType.client_key_exchange);
- rval.putInt24(length);
-
- rval.putInt16(b.length);
- rval.putBytes(b);
- return rval;
- };
- tls.createServerKeyExchange = function(c) {
-
-
-
- var length = 0;
-
- var rval = forge.util.createBuffer();
- if(length > 0) {
- rval.putByte(tls.HandshakeType.server_key_exchange);
- rval.putInt24(length);
- }
- return rval;
- };
- tls.getClientSignature = function(c, callback) {
-
- var b = forge.util.createBuffer();
- b.putBuffer(c.session.md5.digest());
- b.putBuffer(c.session.sha1.digest());
- b = b.getBytes();
-
- c.getSignature = c.getSignature || function(c, b, callback) {
-
- var privateKey = null;
- if(c.getPrivateKey) {
- try {
- privateKey = c.getPrivateKey(c, c.session.clientCertificate);
- privateKey = forge.pki.privateKeyFromPem(privateKey);
- } catch(ex) {
- c.error(c, {
- message: 'Could not get private key.',
- cause: ex,
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.internal_error
- }
- });
- }
- }
- if(privateKey === null) {
- c.error(c, {
- message: 'No private key set.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.internal_error
- }
- });
- } else {
- b = privateKey.sign(b, null);
- }
- callback(c, b);
- };
-
- c.getSignature(c, b, callback);
- };
- tls.createCertificateVerify = function(c, signature) {
-
-
- var length = signature.length + 2;
-
- var rval = forge.util.createBuffer();
- rval.putByte(tls.HandshakeType.certificate_verify);
- rval.putInt24(length);
-
- rval.putInt16(signature.length);
- rval.putBytes(signature);
- return rval;
- };
- tls.createCertificateRequest = function(c) {
-
- var certTypes = forge.util.createBuffer();
-
- certTypes.putByte(0x01);
-
- var cAs = forge.util.createBuffer();
- for(var key in c.caStore.certs) {
- var cert = c.caStore.certs[key];
- var dn = forge.pki.distinguishedNameToAsn1(cert.subject);
- var byteBuffer = forge.asn1.toDer(dn);
- cAs.putInt16(byteBuffer.length());
- cAs.putBuffer(byteBuffer);
- }
-
-
- var length =
- 1 + certTypes.length() +
- 2 + cAs.length();
-
- var rval = forge.util.createBuffer();
- rval.putByte(tls.HandshakeType.certificate_request);
- rval.putInt24(length);
- writeVector(rval, 1, certTypes);
- writeVector(rval, 2, cAs);
- return rval;
- };
- tls.createServerHelloDone = function(c) {
-
- var rval = forge.util.createBuffer();
- rval.putByte(tls.HandshakeType.server_hello_done);
- rval.putInt24(0);
- return rval;
- };
- tls.createChangeCipherSpec = function() {
- var rval = forge.util.createBuffer();
- rval.putByte(0x01);
- return rval;
- };
- tls.createFinished = function(c) {
-
- var b = forge.util.createBuffer();
- b.putBuffer(c.session.md5.digest());
- b.putBuffer(c.session.sha1.digest());
-
- var client = (c.entity === tls.ConnectionEnd.client);
- var sp = c.session.sp;
- var vdl = 12;
- var prf = prf_TLS1;
- var label = client ? 'client finished' : 'server finished';
- b = prf(sp.master_secret, label, b.getBytes(), vdl);
-
- var rval = forge.util.createBuffer();
- rval.putByte(tls.HandshakeType.finished);
- rval.putInt24(b.length());
- rval.putBuffer(b);
- return rval;
- };
- tls.createHeartbeat = function(type, payload, payloadLength) {
- if(typeof payloadLength === 'undefined') {
- payloadLength = payload.length;
- }
-
- var rval = forge.util.createBuffer();
- rval.putByte(type);
- rval.putInt16(payloadLength);
- rval.putBytes(payload);
-
- var plaintextLength = rval.length();
- var paddingLength = Math.max(16, plaintextLength - payloadLength - 3);
- rval.putBytes(forge.random.getBytes(paddingLength));
- return rval;
- };
- tls.queue = function(c, record) {
-
- if(!record) {
- return;
- }
- if(record.fragment.length() === 0) {
- if(record.type === tls.ContentType.handshake ||
- record.type === tls.ContentType.alert ||
- record.type === tls.ContentType.change_cipher_spec) {
-
- return;
- }
- }
-
- if(record.type === tls.ContentType.handshake) {
- var bytes = record.fragment.bytes();
- c.session.md5.update(bytes);
- c.session.sha1.update(bytes);
- bytes = null;
- }
-
- var records;
- if(record.fragment.length() <= tls.MaxFragment) {
- records = [record];
- } else {
-
- records = [];
- var data = record.fragment.bytes();
- while(data.length > tls.MaxFragment) {
- records.push(tls.createRecord(c, {
- type: record.type,
- data: forge.util.createBuffer(data.slice(0, tls.MaxFragment))
- }));
- data = data.slice(tls.MaxFragment);
- }
-
- if(data.length > 0) {
- records.push(tls.createRecord(c, {
- type: record.type,
- data: forge.util.createBuffer(data)
- }));
- }
- }
-
- for(var i = 0; i < records.length && !c.fail; ++i) {
-
- var rec = records[i];
- var s = c.state.current.write;
- if(s.update(c, rec)) {
-
- c.records.push(rec);
- }
- }
- };
- tls.flush = function(c) {
- for(var i = 0; i < c.records.length; ++i) {
- var record = c.records[i];
-
- c.tlsData.putByte(record.type);
- c.tlsData.putByte(record.version.major);
- c.tlsData.putByte(record.version.minor);
- c.tlsData.putInt16(record.fragment.length());
- c.tlsData.putBuffer(c.records[i].fragment);
- }
- c.records = [];
- return c.tlsDataReady(c);
- };
- var _certErrorToAlertDesc = function(error) {
- switch(error) {
- case true:
- return true;
- case forge.pki.certificateError.bad_certificate:
- return tls.Alert.Description.bad_certificate;
- case forge.pki.certificateError.unsupported_certificate:
- return tls.Alert.Description.unsupported_certificate;
- case forge.pki.certificateError.certificate_revoked:
- return tls.Alert.Description.certificate_revoked;
- case forge.pki.certificateError.certificate_expired:
- return tls.Alert.Description.certificate_expired;
- case forge.pki.certificateError.certificate_unknown:
- return tls.Alert.Description.certificate_unknown;
- case forge.pki.certificateError.unknown_ca:
- return tls.Alert.Description.unknown_ca;
- default:
- return tls.Alert.Description.bad_certificate;
- }
- };
- var _alertDescToCertError = function(desc) {
- switch(desc) {
- case true:
- return true;
- case tls.Alert.Description.bad_certificate:
- return forge.pki.certificateError.bad_certificate;
- case tls.Alert.Description.unsupported_certificate:
- return forge.pki.certificateError.unsupported_certificate;
- case tls.Alert.Description.certificate_revoked:
- return forge.pki.certificateError.certificate_revoked;
- case tls.Alert.Description.certificate_expired:
- return forge.pki.certificateError.certificate_expired;
- case tls.Alert.Description.certificate_unknown:
- return forge.pki.certificateError.certificate_unknown;
- case tls.Alert.Description.unknown_ca:
- return forge.pki.certificateError.unknown_ca;
- default:
- return forge.pki.certificateError.bad_certificate;
- }
- };
- tls.verifyCertificateChain = function(c, chain) {
- try {
-
- forge.pki.verifyCertificateChain(c.caStore, chain,
- function verify(vfd, depth, chain) {
-
- var desc = _certErrorToAlertDesc(vfd);
-
- var ret = c.verify(c, vfd, depth, chain);
- if(ret !== true) {
- if(typeof ret === 'object' && !forge.util.isArray(ret)) {
-
- var error = new Error('The application rejected the certificate.');
- error.send = true;
- error.alert = {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.bad_certificate
- };
- if(ret.message) {
- error.message = ret.message;
- }
- if(ret.alert) {
- error.alert.description = ret.alert;
- }
- throw error;
- }
-
- if(ret !== vfd) {
- ret = _alertDescToCertError(ret);
- }
- }
- return ret;
- });
- } catch(ex) {
-
- var err = ex;
- if(typeof err !== 'object' || forge.util.isArray(err)) {
- err = {
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: _certErrorToAlertDesc(ex)
- }
- };
- }
- if(!('send' in err)) {
- err.send = true;
- }
- if(!('alert' in err)) {
- err.alert = {
- level: tls.Alert.Level.fatal,
- description: _certErrorToAlertDesc(err.error)
- };
- }
-
- c.error(c, err);
- }
- return !c.fail;
- };
- tls.createSessionCache = function(cache, capacity) {
- var rval = null;
-
- if(cache && cache.getSession && cache.setSession && cache.order) {
- rval = cache;
- } else {
-
- rval = {};
- rval.cache = cache || {};
- rval.capacity = Math.max(capacity || 100, 1);
- rval.order = [];
-
- for(var key in cache) {
- if(rval.order.length <= capacity) {
- rval.order.push(key);
- } else {
- delete cache[key];
- }
- }
-
- rval.getSession = function(sessionId) {
- var session = null;
- var key = null;
-
- if(sessionId) {
- key = forge.util.bytesToHex(sessionId);
- } else if(rval.order.length > 0) {
-
- key = rval.order[0];
- }
- if(key !== null && key in rval.cache) {
-
- session = rval.cache[key];
- delete rval.cache[key];
- for(var i in rval.order) {
- if(rval.order[i] === key) {
- rval.order.splice(i, 1);
- break;
- }
- }
- }
- return session;
- };
-
- rval.setSession = function(sessionId, session) {
-
- if(rval.order.length === rval.capacity) {
- var key = rval.order.shift();
- delete rval.cache[key];
- }
-
- var key = forge.util.bytesToHex(sessionId);
- rval.order.push(key);
- rval.cache[key] = session;
- };
- }
- return rval;
- };
- tls.createConnection = function(options) {
- var caStore = null;
- if(options.caStore) {
-
- if(forge.util.isArray(options.caStore)) {
- caStore = forge.pki.createCaStore(options.caStore);
- } else {
- caStore = options.caStore;
- }
- } else {
-
- caStore = forge.pki.createCaStore();
- }
-
- var cipherSuites = options.cipherSuites || null;
- if(cipherSuites === null) {
- cipherSuites = [];
- for(var key in tls.CipherSuites) {
- cipherSuites.push(tls.CipherSuites[key]);
- }
- }
-
- var entity = (options.server || false) ?
- tls.ConnectionEnd.server : tls.ConnectionEnd.client;
-
- var sessionCache = options.sessionCache ?
- tls.createSessionCache(options.sessionCache) : null;
-
- var c = {
- version: {major: tls.Version.major, minor: tls.Version.minor},
- entity: entity,
- sessionId: options.sessionId,
- caStore: caStore,
- sessionCache: sessionCache,
- cipherSuites: cipherSuites,
- connected: options.connected,
- virtualHost: options.virtualHost || null,
- verifyClient: options.verifyClient || false,
- verify: options.verify || function(cn, vfd, dpth, cts) {return vfd;},
- getCertificate: options.getCertificate || null,
- getPrivateKey: options.getPrivateKey || null,
- getSignature: options.getSignature || null,
- input: forge.util.createBuffer(),
- tlsData: forge.util.createBuffer(),
- data: forge.util.createBuffer(),
- tlsDataReady: options.tlsDataReady,
- dataReady: options.dataReady,
- heartbeatReceived: options.heartbeatReceived,
- closed: options.closed,
- error: function(c, ex) {
-
- ex.origin = ex.origin ||
- ((c.entity === tls.ConnectionEnd.client) ? 'client' : 'server');
-
- if(ex.send) {
- tls.queue(c, tls.createAlert(c, ex.alert));
- tls.flush(c);
- }
-
- var fatal = (ex.fatal !== false);
- if(fatal) {
-
- c.fail = true;
- }
-
- options.error(c, ex);
- if(fatal) {
-
- c.close(false);
- }
- },
- deflate: options.deflate || null,
- inflate: options.inflate || null
- };
-
- c.reset = function(clearFail) {
- c.version = {major: tls.Version.major, minor: tls.Version.minor};
- c.record = null;
- c.session = null;
- c.peerCertificate = null;
- c.state = {
- pending: null,
- current: null
- };
- c.expect = (c.entity === tls.ConnectionEnd.client) ? SHE : CHE;
- c.fragmented = null;
- c.records = [];
- c.open = false;
- c.handshakes = 0;
- c.handshaking = false;
- c.isConnected = false;
- c.fail = !(clearFail || typeof(clearFail) === 'undefined');
- c.input.clear();
- c.tlsData.clear();
- c.data.clear();
- c.state.current = tls.createConnectionState(c);
- };
-
- c.reset();
-
- var _update = function(c, record) {
-
- var aligned = record.type - tls.ContentType.change_cipher_spec;
- var handlers = ctTable[c.entity][c.expect];
- if(aligned in handlers) {
- handlers[aligned](c, record);
- } else {
-
- tls.handleUnexpected(c, record);
- }
- };
-
- var _readRecordHeader = function(c) {
- var rval = 0;
-
- var b = c.input;
- var len = b.length();
-
- if(len < 5) {
- rval = 5 - len;
- } else {
-
-
- c.record = {
- type: b.getByte(),
- version: {
- major: b.getByte(),
- minor: b.getByte()
- },
- length: b.getInt16(),
- fragment: forge.util.createBuffer(),
- ready: false
- };
-
- var compatibleVersion = (c.record.version.major === c.version.major);
- if(compatibleVersion && c.session && c.session.version) {
-
- compatibleVersion = (c.record.version.minor === c.version.minor);
- }
- if(!compatibleVersion) {
- c.error(c, {
- message: 'Incompatible TLS version.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description: tls.Alert.Description.protocol_version
- }
- });
- }
- }
- return rval;
- };
-
- var _readRecord = function(c) {
- var rval = 0;
-
- var b = c.input;
- var len = b.length();
- if(len < c.record.length) {
-
- rval = c.record.length - len;
- } else {
-
-
- c.record.fragment.putBytes(b.getBytes(c.record.length));
- b.compact();
-
- var s = c.state.current.read;
- if(s.update(c, c.record)) {
-
-
- if(c.fragmented !== null) {
-
-
- if(c.fragmented.type === c.record.type) {
-
- c.fragmented.fragment.putBuffer(c.record.fragment);
- c.record = c.fragmented;
- } else {
-
- c.error(c, {
- message: 'Invalid fragmented record.',
- send: true,
- alert: {
- level: tls.Alert.Level.fatal,
- description:
- tls.Alert.Description.unexpected_message
- }
- });
- }
- }
-
- c.record.ready = true;
- }
- }
- return rval;
- };
-
- c.handshake = function(sessionId) {
-
- if(c.entity !== tls.ConnectionEnd.client) {
-
- c.error(c, {
- message: 'Cannot initiate handshake as a server.',
- fatal: false
- });
- } else if(c.handshaking) {
-
- c.error(c, {
- message: 'Handshake already in progress.',
- fatal: false
- });
- } else {
-
- if(c.fail && !c.open && c.handshakes === 0) {
- c.fail = false;
- }
-
- c.handshaking = true;
-
- sessionId = sessionId || '';
-
- var session = null;
- if(sessionId.length > 0) {
- if(c.sessionCache) {
- session = c.sessionCache.getSession(sessionId);
- }
-
- if(session === null) {
- sessionId = '';
- }
- }
-
- if(sessionId.length === 0 && c.sessionCache) {
- session = c.sessionCache.getSession();
- if(session !== null) {
- sessionId = session.id;
- }
- }
-
- c.session = {
- id: sessionId,
- version: null,
- cipherSuite: null,
- compressionMethod: null,
- serverCertificate: null,
- certificateRequest: null,
- clientCertificate: null,
- sp: {},
- md5: forge.md.md5.create(),
- sha1: forge.md.sha1.create()
- };
-
- if(session) {
-
- c.version = session.version;
- c.session.sp = session.sp;
- }
-
- c.session.sp.client_random = tls.createRandom().getBytes();
-
- c.open = true;
-
- tls.queue(c, tls.createRecord(c, {
- type: tls.ContentType.handshake,
- data: tls.createClientHello(c)
- }));
- tls.flush(c);
- }
- };
-
- c.process = function(data) {
- var rval = 0;
-
- if(data) {
- c.input.putBytes(data);
- }
-
-
- if(!c.fail) {
-
- if(c.record !== null &&
- c.record.ready && c.record.fragment.isEmpty()) {
- c.record = null;
- }
-
- if(c.record === null) {
- rval = _readRecordHeader(c);
- }
-
- if(!c.fail && c.record !== null && !c.record.ready) {
- rval = _readRecord(c);
- }
-
- if(!c.fail && c.record !== null && c.record.ready) {
- _update(c, c.record);
- }
- }
- return rval;
- };
-
- c.prepare = function(data) {
- tls.queue(c, tls.createRecord(c, {
- type: tls.ContentType.application_data,
- data: forge.util.createBuffer(data)
- }));
- return tls.flush(c);
- };
-
- c.prepareHeartbeatRequest = function(payload, payloadLength) {
- if(payload instanceof forge.util.ByteBuffer) {
- payload = payload.bytes();
- }
- if(typeof payloadLength === 'undefined') {
- payloadLength = payload.length;
- }
- c.expectedHeartbeatPayload = payload;
- tls.queue(c, tls.createRecord(c, {
- type: tls.ContentType.heartbeat,
- data: tls.createHeartbeat(
- tls.HeartbeatMessageType.heartbeat_request, payload, payloadLength)
- }));
- return tls.flush(c);
- };
-
- c.close = function(clearFail) {
-
- if(!c.fail && c.sessionCache && c.session) {
-
- var session = {
- id: c.session.id,
- version: c.session.version,
- sp: c.session.sp
- };
- session.sp.keys = null;
- c.sessionCache.setSession(session.id, session);
- }
- if(c.open) {
-
- c.open = false;
- c.input.clear();
-
- if(c.isConnected || c.handshaking) {
- c.isConnected = c.handshaking = false;
-
- tls.queue(c, tls.createAlert(c, {
- level: tls.Alert.Level.warning,
- description: tls.Alert.Description.close_notify
- }));
- tls.flush(c);
- }
-
- c.closed(c);
- }
-
- c.reset(clearFail);
- };
- return c;
- };
- module.exports = forge.tls = forge.tls || {};
- for(var key in tls) {
- if(typeof tls[key] !== 'function') {
- forge.tls[key] = tls[key];
- }
- }
- forge.tls.prf_tls1 = prf_TLS1;
- forge.tls.hmac_sha1 = hmac_sha1;
- forge.tls.createSessionCache = tls.createSessionCache;
- forge.tls.createConnection = tls.createConnection;
|