| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282 | 
							- /**
 
-  * A Javascript implementation of Transport Layer Security (TLS).
 
-  *
 
-  * @author Dave Longley
 
-  *
 
-  * Copyright (c) 2009-2014 Digital Bazaar, Inc.
 
-  *
 
-  * The TLS Handshake Protocol involves the following steps:
 
-  *
 
-  * - Exchange hello messages to agree on algorithms, exchange random values,
 
-  * and check for session resumption.
 
-  *
 
-  * - Exchange the necessary cryptographic parameters to allow the client and
 
-  * server to agree on a premaster secret.
 
-  *
 
-  * - Exchange certificates and cryptographic information to allow the client
 
-  * and server to authenticate themselves.
 
-  *
 
-  * - Generate a master secret from the premaster secret and exchanged random
 
-  * values.
 
-  *
 
-  * - Provide security parameters to the record layer.
 
-  *
 
-  * - Allow the client and server to verify that their peer has calculated the
 
-  * same security parameters and that the handshake occurred without tampering
 
-  * by an attacker.
 
-  *
 
-  * Up to 4 different messages may be sent during a key exchange. The server
 
-  * certificate, the server key exchange, the client certificate, and the
 
-  * client key exchange.
 
-  *
 
-  * A typical handshake (from the client's perspective).
 
-  *
 
-  * 1. Client sends ClientHello.
 
-  * 2. Client receives ServerHello.
 
-  * 3. Client receives optional Certificate.
 
-  * 4. Client receives optional ServerKeyExchange.
 
-  * 5. Client receives ServerHelloDone.
 
-  * 6. Client sends optional Certificate.
 
-  * 7. Client sends ClientKeyExchange.
 
-  * 8. Client sends optional CertificateVerify.
 
-  * 9. Client sends ChangeCipherSpec.
 
-  * 10. Client sends Finished.
 
-  * 11. Client receives ChangeCipherSpec.
 
-  * 12. Client receives Finished.
 
-  * 13. Client sends/receives application data.
 
-  *
 
-  * To reuse an existing session:
 
-  *
 
-  * 1. Client sends ClientHello with session ID for reuse.
 
-  * 2. Client receives ServerHello with same session ID if reusing.
 
-  * 3. Client receives ChangeCipherSpec message if reusing.
 
-  * 4. Client receives Finished.
 
-  * 5. Client sends ChangeCipherSpec.
 
-  * 6. Client sends Finished.
 
-  *
 
-  * Note: Client ignores HelloRequest if in the middle of a handshake.
 
-  *
 
-  * Record Layer:
 
-  *
 
-  * The record layer fragments information blocks into TLSPlaintext records
 
-  * carrying data in chunks of 2^14 bytes or less. Client message boundaries are
 
-  * not preserved in the record layer (i.e., multiple client messages of the
 
-  * same ContentType MAY be coalesced into a single TLSPlaintext record, or a
 
-  * single message MAY be fragmented across several records).
 
-  *
 
-  * struct {
 
-  *   uint8 major;
 
-  *   uint8 minor;
 
-  * } ProtocolVersion;
 
-  *
 
-  * struct {
 
-  *   ContentType type;
 
-  *   ProtocolVersion version;
 
-  *   uint16 length;
 
-  *   opaque fragment[TLSPlaintext.length];
 
-  * } TLSPlaintext;
 
-  *
 
-  * type:
 
-  *   The higher-level protocol used to process the enclosed fragment.
 
-  *
 
-  * version:
 
-  *   The version of the protocol being employed. TLS Version 1.2 uses version
 
-  *   {3, 3}. TLS Version 1.0 uses version {3, 1}. Note that a client that
 
-  *   supports multiple versions of TLS may not know what version will be
 
-  *   employed before it receives the ServerHello.
 
-  *
 
-  * length:
 
-  *   The length (in bytes) of the following TLSPlaintext.fragment. The length
 
-  *   MUST NOT exceed 2^14 = 16384 bytes.
 
-  *
 
-  * fragment:
 
-  *   The application data. This data is transparent and treated as an
 
-  *   independent block to be dealt with by the higher-level protocol specified
 
-  *   by the type field.
 
-  *
 
-  * Implementations MUST NOT send zero-length fragments of Handshake, Alert, or
 
-  * ChangeCipherSpec content types. Zero-length fragments of Application data
 
-  * MAY be sent as they are potentially useful as a traffic analysis
 
-  * countermeasure.
 
-  *
 
-  * Note: Data of different TLS record layer content types MAY be interleaved.
 
-  * Application data is generally of lower precedence for transmission than
 
-  * other content types. However, records MUST be delivered to the network in
 
-  * the same order as they are protected by the record layer. Recipients MUST
 
-  * receive and process interleaved application layer traffic during handshakes
 
-  * subsequent to the first one on a connection.
 
-  *
 
-  * struct {
 
-  *   ContentType type;       // same as TLSPlaintext.type
 
-  *   ProtocolVersion version;// same as TLSPlaintext.version
 
-  *   uint16 length;
 
-  *   opaque fragment[TLSCompressed.length];
 
-  * } TLSCompressed;
 
-  *
 
-  * length:
 
-  *   The length (in bytes) of the following TLSCompressed.fragment.
 
-  *   The length MUST NOT exceed 2^14 + 1024.
 
-  *
 
-  * fragment:
 
-  *   The compressed form of TLSPlaintext.fragment.
 
-  *
 
-  * Note: A CompressionMethod.null operation is an identity operation; no fields
 
-  * are altered. In this implementation, since no compression is supported,
 
-  * uncompressed records are always the same as compressed records.
 
-  *
 
-  * Encryption Information:
 
-  *
 
-  * The encryption and MAC functions translate a TLSCompressed structure into a
 
-  * TLSCiphertext. The decryption functions reverse the process. The MAC of the
 
-  * record also includes a sequence number so that missing, extra, or repeated
 
-  * messages are detectable.
 
-  *
 
-  * struct {
 
-  *   ContentType type;
 
-  *   ProtocolVersion version;
 
-  *   uint16 length;
 
-  *   select (SecurityParameters.cipher_type) {
 
-  *     case stream: GenericStreamCipher;
 
-  *     case block:  GenericBlockCipher;
 
-  *     case aead:   GenericAEADCipher;
 
-  *   } fragment;
 
-  * } TLSCiphertext;
 
-  *
 
-  * type:
 
-  *   The type field is identical to TLSCompressed.type.
 
-  *
 
-  * version:
 
-  *   The version field is identical to TLSCompressed.version.
 
-  *
 
-  * length:
 
-  *   The length (in bytes) of the following TLSCiphertext.fragment.
 
-  *   The length MUST NOT exceed 2^14 + 2048.
 
-  *
 
-  * fragment:
 
-  *   The encrypted form of TLSCompressed.fragment, with the MAC.
 
-  *
 
-  * Note: Only CBC Block Ciphers are supported by this implementation.
 
-  *
 
-  * The TLSCompressed.fragment structures are converted to/from block
 
-  * TLSCiphertext.fragment structures.
 
-  *
 
-  * struct {
 
-  *   opaque IV[SecurityParameters.record_iv_length];
 
-  *   block-ciphered struct {
 
-  *     opaque content[TLSCompressed.length];
 
-  *     opaque MAC[SecurityParameters.mac_length];
 
-  *     uint8 padding[GenericBlockCipher.padding_length];
 
-  *     uint8 padding_length;
 
-  *   };
 
-  * } GenericBlockCipher;
 
-  *
 
-  * The MAC is generated as described in Section 6.2.3.1.
 
-  *
 
-  * IV:
 
-  *   The Initialization Vector (IV) SHOULD be chosen at random, and MUST be
 
-  *   unpredictable. Note that in versions of TLS prior to 1.1, there was no
 
-  *   IV field, and the last ciphertext block of the previous record (the "CBC
 
-  *   residue") was used as the IV. This was changed to prevent the attacks
 
-  *   described in [CBCATT]. For block ciphers, the IV length is of length
 
-  *   SecurityParameters.record_iv_length, which is equal to the
 
-  *   SecurityParameters.block_size.
 
-  *
 
-  * padding:
 
-  *   Padding that is added to force the length of the plaintext to be an
 
-  *   integral multiple of the block cipher's block length. The padding MAY be
 
-  *   any length up to 255 bytes, as long as it results in the
 
-  *   TLSCiphertext.length being an integral multiple of the block length.
 
-  *   Lengths longer than necessary might be desirable to frustrate attacks on
 
-  *   a protocol that are based on analysis of the lengths of exchanged
 
-  *   messages. Each uint8 in the padding data vector MUST be filled with the
 
-  *   padding length value. The receiver MUST check this padding and MUST use
 
-  *   the bad_record_mac alert to indicate padding errors.
 
-  *
 
-  * padding_length:
 
-  *   The padding length MUST be such that the total size of the
 
-  *   GenericBlockCipher structure is a multiple of the cipher's block length.
 
-  *   Legal values range from zero to 255, inclusive. This length specifies the
 
-  *   length of the padding field exclusive of the padding_length field itself.
 
-  *
 
-  * The encrypted data length (TLSCiphertext.length) is one more than the sum of
 
-  * SecurityParameters.block_length, TLSCompressed.length,
 
-  * SecurityParameters.mac_length, and padding_length.
 
-  *
 
-  * Example: If the block length is 8 bytes, the content length
 
-  * (TLSCompressed.length) is 61 bytes, and the MAC length is 20 bytes, then the
 
-  * length before padding is 82 bytes (this does not include the IV. Thus, the
 
-  * padding length modulo 8 must be equal to 6 in order to make the total length
 
-  * an even multiple of 8 bytes (the block length). The padding length can be
 
-  * 6, 14, 22, and so on, through 254. If the padding length were the minimum
 
-  * necessary, 6, the padding would be 6 bytes, each containing the value 6.
 
-  * Thus, the last 8 octets of the GenericBlockCipher before block encryption
 
-  * would be xx 06 06 06 06 06 06 06, where xx is the last octet of the MAC.
 
-  *
 
-  * Note: With block ciphers in CBC mode (Cipher Block Chaining), it is critical
 
-  * that the entire plaintext of the record be known before any ciphertext is
 
-  * transmitted. Otherwise, it is possible for the attacker to mount the attack
 
-  * described in [CBCATT].
 
-  *
 
-  * Implementation note: Canvel et al. [CBCTIME] have demonstrated a timing
 
-  * attack on CBC padding based on the time required to compute the MAC. In
 
-  * order to defend against this attack, implementations MUST ensure that
 
-  * record processing time is essentially the same whether or not the padding
 
-  * is correct. In general, the best way to do this is to compute the MAC even
 
-  * if the padding is incorrect, and only then reject the packet. For instance,
 
-  * if the pad appears to be incorrect, the implementation might assume a
 
-  * zero-length pad and then compute the MAC. This leaves a small timing
 
-  * channel, since MAC performance depends, to some extent, on the size of the
 
-  * data fragment, but it is not believed to be large enough to be exploitable,
 
-  * due to the large block size of existing MACs and the small size of the
 
-  * timing signal.
 
-  */
 
- var forge = require('./forge');
 
- require('./asn1');
 
- require('./hmac');
 
- require('./md5');
 
- require('./pem');
 
- require('./pki');
 
- require('./random');
 
- require('./sha1');
 
- require('./util');
 
- /**
 
-  * Generates pseudo random bytes by mixing the result of two hash functions,
 
-  * MD5 and SHA-1.
 
-  *
 
-  * prf_TLS1(secret, label, seed) =
 
-  *   P_MD5(S1, label + seed) XOR P_SHA-1(S2, label + seed);
 
-  *
 
-  * Each P_hash function functions as follows:
 
-  *
 
-  * P_hash(secret, seed) = HMAC_hash(secret, A(1) + seed) +
 
-  *                        HMAC_hash(secret, A(2) + seed) +
 
-  *                        HMAC_hash(secret, A(3) + seed) + ...
 
-  * A() is defined as:
 
-  *   A(0) = seed
 
-  *   A(i) = HMAC_hash(secret, A(i-1))
 
-  *
 
-  * The '+' operator denotes concatenation.
 
-  *
 
-  * As many iterations A(N) as are needed are performed to generate enough
 
-  * pseudo random byte output. If an iteration creates more data than is
 
-  * necessary, then it is truncated.
 
-  *
 
-  * Therefore:
 
-  * A(1) = HMAC_hash(secret, A(0))
 
-  *      = HMAC_hash(secret, seed)
 
-  * A(2) = HMAC_hash(secret, A(1))
 
-  *      = HMAC_hash(secret, HMAC_hash(secret, seed))
 
-  *
 
-  * Therefore:
 
-  * P_hash(secret, seed) =
 
-  *   HMAC_hash(secret, HMAC_hash(secret, A(0)) + seed) +
 
-  *   HMAC_hash(secret, HMAC_hash(secret, A(1)) + seed) +
 
-  *   ...
 
-  *
 
-  * Therefore:
 
-  * P_hash(secret, seed) =
 
-  *   HMAC_hash(secret, HMAC_hash(secret, seed) + seed) +
 
-  *   HMAC_hash(secret, HMAC_hash(secret, HMAC_hash(secret, seed)) + seed) +
 
-  *   ...
 
-  *
 
-  * @param secret the secret to use.
 
-  * @param label the label to use.
 
-  * @param seed the seed value to use.
 
-  * @param length the number of bytes to generate.
 
-  *
 
-  * @return the pseudo random bytes in a byte buffer.
 
-  */
 
- var prf_TLS1 = function(secret, label, seed, length) {
 
-   var rval = forge.util.createBuffer();
 
-   /* For TLS 1.0, the secret is split in half, into two secrets of equal
 
-     length. If the secret has an odd length then the last byte of the first
 
-     half will be the same as the first byte of the second. The length of the
 
-     two secrets is half of the secret rounded up. */
 
-   var idx = (secret.length >> 1);
 
-   var slen = idx + (secret.length & 1);
 
-   var s1 = secret.substr(0, slen);
 
-   var s2 = secret.substr(idx, slen);
 
-   var ai = forge.util.createBuffer();
 
-   var hmac = forge.hmac.create();
 
-   seed = label + seed;
 
-   // determine the number of iterations that must be performed to generate
 
-   // enough output bytes, md5 creates 16 byte hashes, sha1 creates 20
 
-   var md5itr = Math.ceil(length / 16);
 
-   var sha1itr = Math.ceil(length / 20);
 
-   // do md5 iterations
 
-   hmac.start('MD5', s1);
 
-   var md5bytes = forge.util.createBuffer();
 
-   ai.putBytes(seed);
 
-   for(var i = 0; i < md5itr; ++i) {
 
-     // HMAC_hash(secret, A(i-1))
 
-     hmac.start(null, null);
 
-     hmac.update(ai.getBytes());
 
-     ai.putBuffer(hmac.digest());
 
-     // HMAC_hash(secret, A(i) + seed)
 
-     hmac.start(null, null);
 
-     hmac.update(ai.bytes() + seed);
 
-     md5bytes.putBuffer(hmac.digest());
 
-   }
 
-   // do sha1 iterations
 
-   hmac.start('SHA1', s2);
 
-   var sha1bytes = forge.util.createBuffer();
 
-   ai.clear();
 
-   ai.putBytes(seed);
 
-   for(var i = 0; i < sha1itr; ++i) {
 
-     // HMAC_hash(secret, A(i-1))
 
-     hmac.start(null, null);
 
-     hmac.update(ai.getBytes());
 
-     ai.putBuffer(hmac.digest());
 
-     // HMAC_hash(secret, A(i) + seed)
 
-     hmac.start(null, null);
 
-     hmac.update(ai.bytes() + seed);
 
-     sha1bytes.putBuffer(hmac.digest());
 
-   }
 
-   // XOR the md5 bytes with the sha1 bytes
 
-   rval.putBytes(forge.util.xorBytes(
 
-     md5bytes.getBytes(), sha1bytes.getBytes(), length));
 
-   return rval;
 
- };
 
- /**
 
-  * Generates pseudo random bytes using a SHA256 algorithm. For TLS 1.2.
 
-  *
 
-  * @param secret the secret to use.
 
-  * @param label the label to use.
 
-  * @param seed the seed value to use.
 
-  * @param length the number of bytes to generate.
 
-  *
 
-  * @return the pseudo random bytes in a byte buffer.
 
-  */
 
- var prf_sha256 = function(secret, label, seed, length) {
 
-    // FIXME: implement me for TLS 1.2
 
- };
 
- /**
 
-  * Gets a MAC for a record using the SHA-1 hash algorithm.
 
-  *
 
-  * @param key the mac key.
 
-  * @param state the sequence number (array of two 32-bit integers).
 
-  * @param record the record.
 
-  *
 
-  * @return the sha-1 hash (20 bytes) for the given record.
 
-  */
 
- var hmac_sha1 = function(key, seqNum, record) {
 
-   /* MAC is computed like so:
 
-   HMAC_hash(
 
-     key, seqNum +
 
-       TLSCompressed.type +
 
-       TLSCompressed.version +
 
-       TLSCompressed.length +
 
-       TLSCompressed.fragment)
 
-   */
 
-   var hmac = forge.hmac.create();
 
-   hmac.start('SHA1', key);
 
-   var b = forge.util.createBuffer();
 
-   b.putInt32(seqNum[0]);
 
-   b.putInt32(seqNum[1]);
 
-   b.putByte(record.type);
 
-   b.putByte(record.version.major);
 
-   b.putByte(record.version.minor);
 
-   b.putInt16(record.length);
 
-   b.putBytes(record.fragment.bytes());
 
-   hmac.update(b.getBytes());
 
-   return hmac.digest().getBytes();
 
- };
 
- /**
 
-  * Compresses the TLSPlaintext record into a TLSCompressed record using the
 
-  * deflate algorithm.
 
-  *
 
-  * @param c the TLS connection.
 
-  * @param record the TLSPlaintext record to compress.
 
-  * @param s the ConnectionState to use.
 
-  *
 
-  * @return true on success, false on failure.
 
-  */
 
- var deflate = function(c, record, s) {
 
-   var rval = false;
 
-   try {
 
-     var bytes = c.deflate(record.fragment.getBytes());
 
-     record.fragment = forge.util.createBuffer(bytes);
 
-     record.length = bytes.length;
 
-     rval = true;
 
-   } catch(ex) {
 
-     // deflate error, fail out
 
-   }
 
-   return rval;
 
- };
 
- /**
 
-  * Decompresses the TLSCompressed record into a TLSPlaintext record using the
 
-  * deflate algorithm.
 
-  *
 
-  * @param c the TLS connection.
 
-  * @param record the TLSCompressed record to decompress.
 
-  * @param s the ConnectionState to use.
 
-  *
 
-  * @return true on success, false on failure.
 
-  */
 
- var inflate = function(c, record, s) {
 
-   var rval = false;
 
-   try {
 
-     var bytes = c.inflate(record.fragment.getBytes());
 
-     record.fragment = forge.util.createBuffer(bytes);
 
-     record.length = bytes.length;
 
-     rval = true;
 
-   } catch(ex) {
 
-     // inflate error, fail out
 
-   }
 
-   return rval;
 
- };
 
- /**
 
-  * Reads a TLS variable-length vector from a byte buffer.
 
-  *
 
-  * Variable-length vectors are defined by specifying a subrange of legal
 
-  * lengths, inclusively, using the notation <floor..ceiling>. When these are
 
-  * encoded, the actual length precedes the vector's contents in the byte
 
-  * stream. The length will be in the form of a number consuming as many bytes
 
-  * as required to hold the vector's specified maximum (ceiling) length. A
 
-  * variable-length vector with an actual length field of zero is referred to
 
-  * as an empty vector.
 
-  *
 
-  * @param b the byte buffer.
 
-  * @param lenBytes the number of bytes required to store the length.
 
-  *
 
-  * @return the resulting byte buffer.
 
-  */
 
- var readVector = function(b, lenBytes) {
 
-   var len = 0;
 
-   switch(lenBytes) {
 
-   case 1:
 
-     len = b.getByte();
 
-     break;
 
-   case 2:
 
-     len = b.getInt16();
 
-     break;
 
-   case 3:
 
-     len = b.getInt24();
 
-     break;
 
-   case 4:
 
-     len = b.getInt32();
 
-     break;
 
-   }
 
-   // read vector bytes into a new buffer
 
-   return forge.util.createBuffer(b.getBytes(len));
 
- };
 
- /**
 
-  * Writes a TLS variable-length vector to a byte buffer.
 
-  *
 
-  * @param b the byte buffer.
 
-  * @param lenBytes the number of bytes required to store the length.
 
-  * @param v the byte buffer vector.
 
-  */
 
- var writeVector = function(b, lenBytes, v) {
 
-   // encode length at the start of the vector, where the number of bytes for
 
-   // the length is the maximum number of bytes it would take to encode the
 
-   // vector's ceiling
 
-   b.putInt(v.length(), lenBytes << 3);
 
-   b.putBuffer(v);
 
- };
 
- /**
 
-  * The tls implementation.
 
-  */
 
- var tls = {};
 
- /**
 
-  * Version: TLS 1.2 = 3.3, TLS 1.1 = 3.2, TLS 1.0 = 3.1. Both TLS 1.1 and
 
-  * TLS 1.2 were still too new (ie: openSSL didn't implement them) at the time
 
-  * of this implementation so TLS 1.0 was implemented instead.
 
-  */
 
- tls.Versions = {
 
-   TLS_1_0: {major: 3, minor: 1},
 
-   TLS_1_1: {major: 3, minor: 2},
 
-   TLS_1_2: {major: 3, minor: 3}
 
- };
 
- tls.SupportedVersions = [
 
-   tls.Versions.TLS_1_1,
 
-   tls.Versions.TLS_1_0
 
- ];
 
- tls.Version = tls.SupportedVersions[0];
 
- /**
 
-  * Maximum fragment size. True maximum is 16384, but we fragment before that
 
-  * to allow for unusual small increases during compression.
 
-  */
 
- tls.MaxFragment = 16384 - 1024;
 
- /**
 
-  * Whether this entity is considered the "client" or "server".
 
-  * enum { server, client } ConnectionEnd;
 
-  */
 
- tls.ConnectionEnd = {
 
-   server: 0,
 
-   client: 1
 
- };
 
- /**
 
-  * Pseudo-random function algorithm used to generate keys from the master
 
-  * secret.
 
-  * enum { tls_prf_sha256 } PRFAlgorithm;
 
-  */
 
- tls.PRFAlgorithm = {
 
-   tls_prf_sha256: 0
 
- };
 
- /**
 
-  * Bulk encryption algorithms.
 
-  * enum { null, rc4, des3, aes } BulkCipherAlgorithm;
 
-  */
 
- tls.BulkCipherAlgorithm = {
 
-   none: null,
 
-   rc4: 0,
 
-   des3: 1,
 
-   aes: 2
 
- };
 
- /**
 
-  * Cipher types.
 
-  * enum { stream, block, aead } CipherType;
 
-  */
 
- tls.CipherType = {
 
-   stream: 0,
 
-   block: 1,
 
-   aead: 2
 
- };
 
- /**
 
-  * MAC (Message Authentication Code) algorithms.
 
-  * enum { null, hmac_md5, hmac_sha1, hmac_sha256,
 
-  *   hmac_sha384, hmac_sha512} MACAlgorithm;
 
-  */
 
- tls.MACAlgorithm = {
 
-   none: null,
 
-   hmac_md5: 0,
 
-   hmac_sha1: 1,
 
-   hmac_sha256: 2,
 
-   hmac_sha384: 3,
 
-   hmac_sha512: 4
 
- };
 
- /**
 
-  * Compression algorithms.
 
-  * enum { null(0), deflate(1), (255) } CompressionMethod;
 
-  */
 
- tls.CompressionMethod = {
 
-   none: 0,
 
-   deflate: 1
 
- };
 
- /**
 
-  * TLS record content types.
 
-  * enum {
 
-  *   change_cipher_spec(20), alert(21), handshake(22),
 
-  *   application_data(23), (255)
 
-  * } ContentType;
 
-  */
 
- tls.ContentType = {
 
-   change_cipher_spec: 20,
 
-   alert: 21,
 
-   handshake: 22,
 
-   application_data: 23,
 
-   heartbeat: 24
 
- };
 
- /**
 
-  * TLS handshake types.
 
-  * enum {
 
-  *   hello_request(0), client_hello(1), server_hello(2),
 
-  *   certificate(11), server_key_exchange (12),
 
-  *   certificate_request(13), server_hello_done(14),
 
-  *   certificate_verify(15), client_key_exchange(16),
 
-  *   finished(20), (255)
 
-  * } HandshakeType;
 
-  */
 
- tls.HandshakeType = {
 
-   hello_request: 0,
 
-   client_hello: 1,
 
-   server_hello: 2,
 
-   certificate: 11,
 
-   server_key_exchange: 12,
 
-   certificate_request: 13,
 
-   server_hello_done: 14,
 
-   certificate_verify: 15,
 
-   client_key_exchange: 16,
 
-   finished: 20
 
- };
 
- /**
 
-  * TLS Alert Protocol.
 
-  *
 
-  * enum { warning(1), fatal(2), (255) } AlertLevel;
 
-  *
 
-  * enum {
 
-  *   close_notify(0),
 
-  *   unexpected_message(10),
 
-  *   bad_record_mac(20),
 
-  *   decryption_failed(21),
 
-  *   record_overflow(22),
 
-  *   decompression_failure(30),
 
-  *   handshake_failure(40),
 
-  *   bad_certificate(42),
 
-  *   unsupported_certificate(43),
 
-  *   certificate_revoked(44),
 
-  *   certificate_expired(45),
 
-  *   certificate_unknown(46),
 
-  *   illegal_parameter(47),
 
-  *   unknown_ca(48),
 
-  *   access_denied(49),
 
-  *   decode_error(50),
 
-  *   decrypt_error(51),
 
-  *   export_restriction(60),
 
-  *   protocol_version(70),
 
-  *   insufficient_security(71),
 
-  *   internal_error(80),
 
-  *   user_canceled(90),
 
-  *   no_renegotiation(100),
 
-  *   (255)
 
-  * } AlertDescription;
 
-  *
 
-  * struct {
 
-  *   AlertLevel level;
 
-  *   AlertDescription description;
 
-  * } Alert;
 
-  */
 
- tls.Alert = {};
 
- tls.Alert.Level = {
 
-   warning: 1,
 
-   fatal: 2
 
- };
 
- tls.Alert.Description = {
 
-   close_notify: 0,
 
-   unexpected_message: 10,
 
-   bad_record_mac: 20,
 
-   decryption_failed: 21,
 
-   record_overflow: 22,
 
-   decompression_failure: 30,
 
-   handshake_failure: 40,
 
-   bad_certificate: 42,
 
-   unsupported_certificate: 43,
 
-   certificate_revoked: 44,
 
-   certificate_expired: 45,
 
-   certificate_unknown: 46,
 
-   illegal_parameter: 47,
 
-   unknown_ca: 48,
 
-   access_denied: 49,
 
-   decode_error: 50,
 
-   decrypt_error: 51,
 
-   export_restriction: 60,
 
-   protocol_version: 70,
 
-   insufficient_security: 71,
 
-   internal_error: 80,
 
-   user_canceled: 90,
 
-   no_renegotiation: 100
 
- };
 
- /**
 
-  * TLS Heartbeat Message types.
 
-  * enum {
 
-  *   heartbeat_request(1),
 
-  *   heartbeat_response(2),
 
-  *   (255)
 
-  * } HeartbeatMessageType;
 
-  */
 
- tls.HeartbeatMessageType = {
 
-   heartbeat_request: 1,
 
-   heartbeat_response: 2
 
- };
 
- /**
 
-  * Supported cipher suites.
 
-  */
 
- tls.CipherSuites = {};
 
- /**
 
-  * Gets a supported cipher suite from its 2 byte ID.
 
-  *
 
-  * @param twoBytes two bytes in a string.
 
-  *
 
-  * @return the matching supported cipher suite or null.
 
-  */
 
- tls.getCipherSuite = function(twoBytes) {
 
-   var rval = null;
 
-   for(var key in tls.CipherSuites) {
 
-     var cs = tls.CipherSuites[key];
 
-     if(cs.id[0] === twoBytes.charCodeAt(0) &&
 
-       cs.id[1] === twoBytes.charCodeAt(1)) {
 
-       rval = cs;
 
-       break;
 
-     }
 
-   }
 
-   return rval;
 
- };
 
- /**
 
-  * Called when an unexpected record is encountered.
 
-  *
 
-  * @param c the connection.
 
-  * @param record the record.
 
-  */
 
- tls.handleUnexpected = function(c, record) {
 
-   // if connection is client and closed, ignore unexpected messages
 
-   var ignore = (!c.open && c.entity === tls.ConnectionEnd.client);
 
-   if(!ignore) {
 
-     c.error(c, {
 
-       message: 'Unexpected message. Received TLS record out of order.',
 
-       send: true,
 
-       alert: {
 
-         level: tls.Alert.Level.fatal,
 
-         description: tls.Alert.Description.unexpected_message
 
-       }
 
-     });
 
-   }
 
- };
 
- /**
 
-  * Called when a client receives a HelloRequest record.
 
-  *
 
-  * @param c the connection.
 
-  * @param record the record.
 
-  * @param length the length of the handshake message.
 
-  */
 
- tls.handleHelloRequest = function(c, record, length) {
 
-   // ignore renegotiation requests from the server during a handshake, but
 
-   // if handshaking, send a warning alert that renegotation is denied
 
-   if(!c.handshaking && c.handshakes > 0) {
 
-     // send alert warning
 
-     tls.queue(c, tls.createAlert(c, {
 
-        level: tls.Alert.Level.warning,
 
-        description: tls.Alert.Description.no_renegotiation
 
-     }));
 
-     tls.flush(c);
 
-   }
 
-   // continue
 
-   c.process();
 
- };
 
- /**
 
-  * Parses a hello message from a ClientHello or ServerHello record.
 
-  *
 
-  * @param record the record to parse.
 
-  *
 
-  * @return the parsed message.
 
-  */
 
- tls.parseHelloMessage = function(c, record, length) {
 
-   var msg = null;
 
-   var client = (c.entity === tls.ConnectionEnd.client);
 
-   // minimum of 38 bytes in message
 
-   if(length < 38) {
 
-     c.error(c, {
 
-       message: client ?
 
-         'Invalid ServerHello message. Message too short.' :
 
-         'Invalid ClientHello message. Message too short.',
 
-       send: true,
 
-       alert: {
 
-         level: tls.Alert.Level.fatal,
 
-         description: tls.Alert.Description.illegal_parameter
 
-       }
 
-     });
 
-   } else {
 
-     // use 'remaining' to calculate # of remaining bytes in the message
 
-     var b = record.fragment;
 
-     var remaining = b.length();
 
-     msg = {
 
-       version: {
 
-         major: b.getByte(),
 
-         minor: b.getByte()
 
-       },
 
-       random: forge.util.createBuffer(b.getBytes(32)),
 
-       session_id: readVector(b, 1),
 
-       extensions: []
 
-     };
 
-     if(client) {
 
-       msg.cipher_suite = b.getBytes(2);
 
-       msg.compression_method = b.getByte();
 
-     } else {
 
-       msg.cipher_suites = readVector(b, 2);
 
-       msg.compression_methods = readVector(b, 1);
 
-     }
 
-     // read extensions if there are any bytes left in the message
 
-     remaining = length - (remaining - b.length());
 
-     if(remaining > 0) {
 
-       // parse extensions
 
-       var exts = readVector(b, 2);
 
-       while(exts.length() > 0) {
 
-         msg.extensions.push({
 
-           type: [exts.getByte(), exts.getByte()],
 
-           data: readVector(exts, 2)
 
-         });
 
-       }
 
-       // TODO: make extension support modular
 
-       if(!client) {
 
-         for(var i = 0; i < msg.extensions.length; ++i) {
 
-           var ext = msg.extensions[i];
 
-           // support SNI extension
 
-           if(ext.type[0] === 0x00 && ext.type[1] === 0x00) {
 
-             // get server name list
 
-             var snl = readVector(ext.data, 2);
 
-             while(snl.length() > 0) {
 
-               // read server name type
 
-               var snType = snl.getByte();
 
-               // only HostName type (0x00) is known, break out if
 
-               // another type is detected
 
-               if(snType !== 0x00) {
 
-                 break;
 
-               }
 
-               // add host name to server name list
 
-               c.session.extensions.server_name.serverNameList.push(
 
-                 readVector(snl, 2).getBytes());
 
-             }
 
-           }
 
-         }
 
-       }
 
-     }
 
-     // version already set, do not allow version change
 
-     if(c.session.version) {
 
-       if(msg.version.major !== c.session.version.major ||
 
-         msg.version.minor !== c.session.version.minor) {
 
-         return c.error(c, {
 
-           message: 'TLS version change is disallowed during renegotiation.',
 
-           send: true,
 
-           alert: {
 
-             level: tls.Alert.Level.fatal,
 
-             description: tls.Alert.Description.protocol_version
 
-           }
 
-         });
 
-       }
 
-     }
 
-     // get the chosen (ServerHello) cipher suite
 
-     if(client) {
 
-       // FIXME: should be checking configured acceptable cipher suites
 
-       c.session.cipherSuite = tls.getCipherSuite(msg.cipher_suite);
 
-     } else {
 
-       // get a supported preferred (ClientHello) cipher suite
 
-       // choose the first supported cipher suite
 
-       var tmp = forge.util.createBuffer(msg.cipher_suites.bytes());
 
-       while(tmp.length() > 0) {
 
-         // FIXME: should be checking configured acceptable suites
 
-         // cipher suites take up 2 bytes
 
-         c.session.cipherSuite = tls.getCipherSuite(tmp.getBytes(2));
 
-         if(c.session.cipherSuite !== null) {
 
-           break;
 
-         }
 
-       }
 
-     }
 
-     // cipher suite not supported
 
-     if(c.session.cipherSuite === null) {
 
-       return c.error(c, {
 
-         message: 'No cipher suites in common.',
 
-         send: true,
 
-         alert: {
 
-           level: tls.Alert.Level.fatal,
 
-           description: tls.Alert.Description.handshake_failure
 
-         },
 
-         cipherSuite: forge.util.bytesToHex(msg.cipher_suite)
 
-       });
 
-     }
 
-     // TODO: handle compression methods
 
-     if(client) {
 
-       c.session.compressionMethod = msg.compression_method;
 
-     } else {
 
-       // no compression
 
-       c.session.compressionMethod = tls.CompressionMethod.none;
 
-     }
 
-   }
 
-   return msg;
 
- };
 
- /**
 
-  * Creates security parameters for the given connection based on the given
 
-  * hello message.
 
-  *
 
-  * @param c the TLS connection.
 
-  * @param msg the hello message.
 
-  */
 
- tls.createSecurityParameters = function(c, msg) {
 
-   /* Note: security params are from TLS 1.2, some values like prf_algorithm
 
-   are ignored for TLS 1.0/1.1 and the builtin as specified in the spec is
 
-   used. */
 
-   // TODO: handle other options from server when more supported
 
-   // get client and server randoms
 
-   var client = (c.entity === tls.ConnectionEnd.client);
 
-   var msgRandom = msg.random.bytes();
 
-   var cRandom = client ? c.session.sp.client_random : msgRandom;
 
-   var sRandom = client ? msgRandom : tls.createRandom().getBytes();
 
-   // create new security parameters
 
-   c.session.sp = {
 
-     entity: c.entity,
 
-     prf_algorithm: tls.PRFAlgorithm.tls_prf_sha256,
 
-     bulk_cipher_algorithm: null,
 
-     cipher_type: null,
 
-     enc_key_length: null,
 
-     block_length: null,
 
-     fixed_iv_length: null,
 
-     record_iv_length: null,
 
-     mac_algorithm: null,
 
-     mac_length: null,
 
-     mac_key_length: null,
 
-     compression_algorithm: c.session.compressionMethod,
 
-     pre_master_secret: null,
 
-     master_secret: null,
 
-     client_random: cRandom,
 
-     server_random: sRandom
 
-   };
 
- };
 
- /**
 
-  * Called when a client receives a ServerHello record.
 
-  *
 
-  * When a ServerHello message will be sent:
 
-  *   The server will send this message in response to a client hello message
 
-  *   when it was able to find an acceptable set of algorithms. If it cannot
 
-  *   find such a match, it will respond with a handshake failure alert.
 
-  *
 
-  * uint24 length;
 
-  * struct {
 
-  *   ProtocolVersion server_version;
 
-  *   Random random;
 
-  *   SessionID session_id;
 
-  *   CipherSuite cipher_suite;
 
-  *   CompressionMethod compression_method;
 
-  *   select(extensions_present) {
 
-  *     case false:
 
-  *       struct {};
 
-  *     case true:
 
-  *       Extension extensions<0..2^16-1>;
 
-  *   };
 
-  * } ServerHello;
 
-  *
 
-  * @param c the connection.
 
-  * @param record the record.
 
-  * @param length the length of the handshake message.
 
-  */
 
- tls.handleServerHello = function(c, record, length) {
 
-   var msg = tls.parseHelloMessage(c, record, length);
 
-   if(c.fail) {
 
-     return;
 
-   }
 
-   // ensure server version is compatible
 
-   if(msg.version.minor <= c.version.minor) {
 
-     c.version.minor = msg.version.minor;
 
-   } else {
 
-     return c.error(c, {
 
-       message: 'Incompatible TLS version.',
 
-       send: true,
 
-       alert: {
 
-         level: tls.Alert.Level.fatal,
 
-         description: tls.Alert.Description.protocol_version
 
-       }
 
-     });
 
-   }
 
-   // indicate session version has been set
 
-   c.session.version = c.version;
 
-   // get the session ID from the message
 
-   var sessionId = msg.session_id.bytes();
 
-   // if the session ID is not blank and matches the cached one, resume
 
-   // the session
 
-   if(sessionId.length > 0 && sessionId === c.session.id) {
 
-     // resuming session, expect a ChangeCipherSpec next
 
-     c.expect = SCC;
 
-     c.session.resuming = true;
 
-     // get new server random
 
-     c.session.sp.server_random = msg.random.bytes();
 
-   } else {
 
-     // not resuming, expect a server Certificate message next
 
-     c.expect = SCE;
 
-     c.session.resuming = false;
 
-     // create new security parameters
 
-     tls.createSecurityParameters(c, msg);
 
-   }
 
-   // set new session ID
 
-   c.session.id = sessionId;
 
-   // continue
 
-   c.process();
 
- };
 
- /**
 
-  * Called when a server receives a ClientHello record.
 
-  *
 
-  * When a ClientHello message will be sent:
 
-  *   When a client first connects to a server it is required to send the
 
-  *   client hello as its first message. The client can also send a client
 
-  *   hello in response to a hello request or on its own initiative in order
 
-  *   to renegotiate the security parameters in an existing connection.
 
-  *
 
-  * @param c the connection.
 
-  * @param record the record.
 
-  * @param length the length of the handshake message.
 
-  */
 
- tls.handleClientHello = function(c, record, length) {
 
-   var msg = tls.parseHelloMessage(c, record, length);
 
-   if(c.fail) {
 
-     return;
 
-   }
 
-   // get the session ID from the message
 
-   var sessionId = msg.session_id.bytes();
 
-   // see if the given session ID is in the cache
 
-   var session = null;
 
-   if(c.sessionCache) {
 
-     session = c.sessionCache.getSession(sessionId);
 
-     if(session === null) {
 
-       // session ID not found
 
-       sessionId = '';
 
-     } else if(session.version.major !== msg.version.major ||
 
-       session.version.minor > msg.version.minor) {
 
-       // if session version is incompatible with client version, do not resume
 
-       session = null;
 
-       sessionId = '';
 
-     }
 
-   }
 
-   // no session found to resume, generate a new session ID
 
-   if(sessionId.length === 0) {
 
-     sessionId = forge.random.getBytes(32);
 
-   }
 
-   // update session
 
-   c.session.id = sessionId;
 
-   c.session.clientHelloVersion = msg.version;
 
-   c.session.sp = {};
 
-   if(session) {
 
-     // use version and security parameters from resumed session
 
-     c.version = c.session.version = session.version;
 
-     c.session.sp = session.sp;
 
-   } else {
 
-     // use highest compatible minor version
 
-     var version;
 
-     for(var i = 1; i < tls.SupportedVersions.length; ++i) {
 
-       version = tls.SupportedVersions[i];
 
-       if(version.minor <= msg.version.minor) {
 
-         break;
 
-       }
 
-     }
 
-     c.version = {major: version.major, minor: version.minor};
 
-     c.session.version = c.version;
 
-   }
 
-   // if a session is set, resume it
 
-   if(session !== null) {
 
-     // resuming session, expect a ChangeCipherSpec next
 
-     c.expect = CCC;
 
-     c.session.resuming = true;
 
-     // get new client random
 
-     c.session.sp.client_random = msg.random.bytes();
 
-   } else {
 
-     // not resuming, expect a Certificate or ClientKeyExchange
 
-     c.expect = (c.verifyClient !== false) ? CCE : CKE;
 
-     c.session.resuming = false;
 
-     // create new security parameters
 
-     tls.createSecurityParameters(c, msg);
 
-   }
 
-   // connection now open
 
-   c.open = true;
 
-   // queue server hello
 
-   tls.queue(c, tls.createRecord(c, {
 
-     type: tls.ContentType.handshake,
 
-     data: tls.createServerHello(c)
 
-   }));
 
-   if(c.session.resuming) {
 
-     // queue change cipher spec message
 
-     tls.queue(c, tls.createRecord(c, {
 
-       type: tls.ContentType.change_cipher_spec,
 
-       data: tls.createChangeCipherSpec()
 
-     }));
 
-     // create pending state
 
-     c.state.pending = tls.createConnectionState(c);
 
-     // change current write state to pending write state
 
-     c.state.current.write = c.state.pending.write;
 
-     // queue finished
 
-     tls.queue(c, tls.createRecord(c, {
 
-       type: tls.ContentType.handshake,
 
-       data: tls.createFinished(c)
 
-     }));
 
-   } else {
 
-     // queue server certificate
 
-     tls.queue(c, tls.createRecord(c, {
 
-       type: tls.ContentType.handshake,
 
-       data: tls.createCertificate(c)
 
-     }));
 
-     if(!c.fail) {
 
-       // queue server key exchange
 
-       tls.queue(c, tls.createRecord(c, {
 
-         type: tls.ContentType.handshake,
 
-         data: tls.createServerKeyExchange(c)
 
-       }));
 
-       // request client certificate if set
 
-       if(c.verifyClient !== false) {
 
-         // queue certificate request
 
-         tls.queue(c, tls.createRecord(c, {
 
-           type: tls.ContentType.handshake,
 
-           data: tls.createCertificateRequest(c)
 
-         }));
 
-       }
 
-       // queue server hello done
 
-       tls.queue(c, tls.createRecord(c, {
 
-         type: tls.ContentType.handshake,
 
-         data: tls.createServerHelloDone(c)
 
-       }));
 
-     }
 
-   }
 
-   // send records
 
-   tls.flush(c);
 
-   // continue
 
-   c.process();
 
- };
 
- /**
 
-  * Called when a client receives a Certificate record.
 
-  *
 
-  * When this message will be sent:
 
-  *   The server must send a certificate whenever the agreed-upon key exchange
 
-  *   method is not an anonymous one. This message will always immediately
 
-  *   follow the server hello message.
 
-  *
 
-  * Meaning of this message:
 
-  *   The certificate type must be appropriate for the selected cipher suite's
 
-  *   key exchange algorithm, and is generally an X.509v3 certificate. It must
 
-  *   contain a key which matches the key exchange method, as follows. Unless
 
-  *   otherwise specified, the signing algorithm for the certificate must be
 
-  *   the same as the algorithm for the certificate key. Unless otherwise
 
-  *   specified, the public key may be of any length.
 
-  *
 
-  * opaque ASN.1Cert<1..2^24-1>;
 
-  * struct {
 
-  *   ASN.1Cert certificate_list<1..2^24-1>;
 
-  * } Certificate;
 
-  *
 
-  * @param c the connection.
 
-  * @param record the record.
 
-  * @param length the length of the handshake message.
 
-  */
 
- tls.handleCertificate = function(c, record, length) {
 
-   // minimum of 3 bytes in message
 
-   if(length < 3) {
 
-     return c.error(c, {
 
-       message: 'Invalid Certificate message. Message too short.',
 
-       send: true,
 
-       alert: {
 
-         level: tls.Alert.Level.fatal,
 
-         description: tls.Alert.Description.illegal_parameter
 
-       }
 
-     });
 
-   }
 
-   var b = record.fragment;
 
-   var msg = {
 
-     certificate_list: readVector(b, 3)
 
-   };
 
-   /* The sender's certificate will be first in the list (chain), each
 
-     subsequent one that follows will certify the previous one, but root
 
-     certificates (self-signed) that specify the certificate authority may
 
-     be omitted under the assumption that clients must already possess it. */
 
-   var cert, asn1;
 
-   var certs = [];
 
-   try {
 
-     while(msg.certificate_list.length() > 0) {
 
-       // each entry in msg.certificate_list is a vector with 3 len bytes
 
-       cert = readVector(msg.certificate_list, 3);
 
-       asn1 = forge.asn1.fromDer(cert);
 
-       cert = forge.pki.certificateFromAsn1(asn1, true);
 
-       certs.push(cert);
 
-     }
 
-   } catch(ex) {
 
-     return c.error(c, {
 
-       message: 'Could not parse certificate list.',
 
-       cause: ex,
 
-       send: true,
 
-       alert: {
 
-         level: tls.Alert.Level.fatal,
 
-         description: tls.Alert.Description.bad_certificate
 
-       }
 
-     });
 
-   }
 
-   // ensure at least 1 certificate was provided if in client-mode
 
-   // or if verifyClient was set to true to require a certificate
 
-   // (as opposed to 'optional')
 
-   var client = (c.entity === tls.ConnectionEnd.client);
 
-   if((client || c.verifyClient === true) && certs.length === 0) {
 
-     // error, no certificate
 
-     c.error(c, {
 
-       message: client ?
 
-         'No server certificate provided.' :
 
-         'No client certificate provided.',
 
-       send: true,
 
-       alert: {
 
-         level: tls.Alert.Level.fatal,
 
-         description: tls.Alert.Description.illegal_parameter
 
-       }
 
-     });
 
-   } else if(certs.length === 0) {
 
-     // no certs to verify
 
-     // expect a ServerKeyExchange or ClientKeyExchange message next
 
-     c.expect = client ? SKE : CKE;
 
-   } else {
 
-     // save certificate in session
 
-     if(client) {
 
-       c.session.serverCertificate = certs[0];
 
-     } else {
 
-       c.session.clientCertificate = certs[0];
 
-     }
 
-     if(tls.verifyCertificateChain(c, certs)) {
 
-       // expect a ServerKeyExchange or ClientKeyExchange message next
 
-       c.expect = client ? SKE : CKE;
 
-     }
 
-   }
 
-   // continue
 
-   c.process();
 
- };
 
- /**
 
-  * Called when a client receives a ServerKeyExchange record.
 
-  *
 
-  * When this message will be sent:
 
-  *   This message will be sent immediately after the server certificate
 
-  *   message (or the server hello message, if this is an anonymous
 
-  *   negotiation).
 
-  *
 
-  *   The server key exchange message is sent by the server only when the
 
-  *   server certificate message (if sent) does not contain enough data to
 
-  *   allow the client to exchange a premaster secret.
 
-  *
 
-  * Meaning of this message:
 
-  *   This message conveys cryptographic information to allow the client to
 
-  *   communicate the premaster secret: either an RSA public key to encrypt
 
-  *   the premaster secret with, or a Diffie-Hellman public key with which the
 
-  *   client can complete a key exchange (with the result being the premaster
 
-  *   secret.)
 
-  *
 
-  * enum {
 
-  *   dhe_dss, dhe_rsa, dh_anon, rsa, dh_dss, dh_rsa
 
-  * } KeyExchangeAlgorithm;
 
-  *
 
-  * struct {
 
-  *   opaque dh_p<1..2^16-1>;
 
-  *   opaque dh_g<1..2^16-1>;
 
-  *   opaque dh_Ys<1..2^16-1>;
 
-  * } ServerDHParams;
 
-  *
 
-  * struct {
 
-  *   select(KeyExchangeAlgorithm) {
 
-  *     case dh_anon:
 
-  *       ServerDHParams params;
 
-  *     case dhe_dss:
 
-  *     case dhe_rsa:
 
-  *       ServerDHParams params;
 
-  *       digitally-signed struct {
 
-  *         opaque client_random[32];
 
-  *         opaque server_random[32];
 
-  *         ServerDHParams params;
 
-  *       } signed_params;
 
-  *     case rsa:
 
-  *     case dh_dss:
 
-  *     case dh_rsa:
 
-  *       struct {};
 
-  *   };
 
-  * } ServerKeyExchange;
 
-  *
 
-  * @param c the connection.
 
-  * @param record the record.
 
-  * @param length the length of the handshake message.
 
-  */
 
- tls.handleServerKeyExchange = function(c, record, length) {
 
-   // this implementation only supports RSA, no Diffie-Hellman support
 
-   // so any length > 0 is invalid
 
-   if(length > 0) {
 
-     return c.error(c, {
 
-       message: 'Invalid key parameters. Only RSA is supported.',
 
-       send: true,
 
-       alert: {
 
-         level: tls.Alert.Level.fatal,
 
-         description: tls.Alert.Description.unsupported_certificate
 
-       }
 
-     });
 
-   }
 
-   // expect an optional CertificateRequest message next
 
-   c.expect = SCR;
 
-   // continue
 
-   c.process();
 
- };
 
- /**
 
-  * Called when a client receives a ClientKeyExchange record.
 
-  *
 
-  * @param c the connection.
 
-  * @param record the record.
 
-  * @param length the length of the handshake message.
 
-  */
 
- tls.handleClientKeyExchange = function(c, record, length) {
 
-   // this implementation only supports RSA, no Diffie-Hellman support
 
-   // so any length < 48 is invalid
 
-   if(length < 48) {
 
-     return c.error(c, {
 
-       message: 'Invalid key parameters. Only RSA is supported.',
 
-       send: true,
 
-       alert: {
 
-         level: tls.Alert.Level.fatal,
 
-         description: tls.Alert.Description.unsupported_certificate
 
-       }
 
-     });
 
-   }
 
-   var b = record.fragment;
 
-   var msg = {
 
-     enc_pre_master_secret: readVector(b, 2).getBytes()
 
-   };
 
-   // do rsa decryption
 
-   var privateKey = null;
 
-   if(c.getPrivateKey) {
 
-     try {
 
-       privateKey = c.getPrivateKey(c, c.session.serverCertificate);
 
-       privateKey = forge.pki.privateKeyFromPem(privateKey);
 
-     } catch(ex) {
 
-       c.error(c, {
 
-         message: 'Could not get private key.',
 
-         cause: ex,
 
-         send: true,
 
-         alert: {
 
-           level: tls.Alert.Level.fatal,
 
-           description: tls.Alert.Description.internal_error
 
-         }
 
-       });
 
-     }
 
-   }
 
-   if(privateKey === null) {
 
-     return c.error(c, {
 
-       message: 'No private key set.',
 
-       send: true,
 
-       alert: {
 
-         level: tls.Alert.Level.fatal,
 
-         description: tls.Alert.Description.internal_error
 
-       }
 
-     });
 
-   }
 
-   try {
 
-     // decrypt 48-byte pre-master secret
 
-     var sp = c.session.sp;
 
-     sp.pre_master_secret = privateKey.decrypt(msg.enc_pre_master_secret);
 
-     // ensure client hello version matches first 2 bytes
 
-     var version = c.session.clientHelloVersion;
 
-     if(version.major !== sp.pre_master_secret.charCodeAt(0) ||
 
-       version.minor !== sp.pre_master_secret.charCodeAt(1)) {
 
-       // error, do not send alert (see BLEI attack below)
 
-       throw new Error('TLS version rollback attack detected.');
 
-     }
 
-   } catch(ex) {
 
-     /* Note: Daniel Bleichenbacher [BLEI] can be used to attack a
 
-       TLS server which is using PKCS#1 encoded RSA, so instead of
 
-       failing here, we generate 48 random bytes and use that as
 
-       the pre-master secret. */
 
-     sp.pre_master_secret = forge.random.getBytes(48);
 
-   }
 
-   // expect a CertificateVerify message if a Certificate was received that
 
-   // does not have fixed Diffie-Hellman params, otherwise expect
 
-   // ChangeCipherSpec
 
-   c.expect = CCC;
 
-   if(c.session.clientCertificate !== null) {
 
-     // only RSA support, so expect CertificateVerify
 
-     // TODO: support Diffie-Hellman
 
-     c.expect = CCV;
 
-   }
 
-   // continue
 
-   c.process();
 
- };
 
- /**
 
-  * Called when a client receives a CertificateRequest record.
 
-  *
 
-  * When this message will be sent:
 
-  *   A non-anonymous server can optionally request a certificate from the
 
-  *   client, if appropriate for the selected cipher suite. This message, if
 
-  *   sent, will immediately follow the Server Key Exchange message (if it is
 
-  *   sent; otherwise, the Server Certificate message).
 
-  *
 
-  * enum {
 
-  *   rsa_sign(1), dss_sign(2), rsa_fixed_dh(3), dss_fixed_dh(4),
 
-  *   rsa_ephemeral_dh_RESERVED(5), dss_ephemeral_dh_RESERVED(6),
 
-  *   fortezza_dms_RESERVED(20), (255)
 
-  * } ClientCertificateType;
 
-  *
 
-  * opaque DistinguishedName<1..2^16-1>;
 
-  *
 
-  * struct {
 
-  *   ClientCertificateType certificate_types<1..2^8-1>;
 
-  *   SignatureAndHashAlgorithm supported_signature_algorithms<2^16-1>;
 
-  *   DistinguishedName certificate_authorities<0..2^16-1>;
 
-  * } CertificateRequest;
 
-  *
 
-  * @param c the connection.
 
-  * @param record the record.
 
-  * @param length the length of the handshake message.
 
-  */
 
- tls.handleCertificateRequest = function(c, record, length) {
 
-   // minimum of 3 bytes in message
 
-   if(length < 3) {
 
-     return c.error(c, {
 
-       message: 'Invalid CertificateRequest. Message too short.',
 
-       send: true,
 
-       alert: {
 
-         level: tls.Alert.Level.fatal,
 
-         description: tls.Alert.Description.illegal_parameter
 
-       }
 
-     });
 
-   }
 
-   // TODO: TLS 1.2+ has different format including
 
-   // SignatureAndHashAlgorithm after cert types
 
-   var b = record.fragment;
 
-   var msg = {
 
-     certificate_types: readVector(b, 1),
 
-     certificate_authorities: readVector(b, 2)
 
-   };
 
-   // save certificate request in session
 
-   c.session.certificateRequest = msg;
 
-   // expect a ServerHelloDone message next
 
-   c.expect = SHD;
 
-   // continue
 
-   c.process();
 
- };
 
- /**
 
-  * Called when a server receives a CertificateVerify record.
 
-  *
 
-  * @param c the connection.
 
-  * @param record the record.
 
-  * @param length the length of the handshake message.
 
-  */
 
- tls.handleCertificateVerify = function(c, record, length) {
 
-   if(length < 2) {
 
-     return c.error(c, {
 
-       message: 'Invalid CertificateVerify. Message too short.',
 
-       send: true,
 
-       alert: {
 
-         level: tls.Alert.Level.fatal,
 
-         description: tls.Alert.Description.illegal_parameter
 
-       }
 
-     });
 
-   }
 
-   // rewind to get full bytes for message so it can be manually
 
-   // digested below (special case for CertificateVerify messages because
 
-   // they must be digested *after* handling as opposed to all others)
 
-   var b = record.fragment;
 
-   b.read -= 4;
 
-   var msgBytes = b.bytes();
 
-   b.read += 4;
 
-   var msg = {
 
-     signature: readVector(b, 2).getBytes()
 
-   };
 
-   // TODO: add support for DSA
 
-   // generate data to verify
 
-   var verify = forge.util.createBuffer();
 
-   verify.putBuffer(c.session.md5.digest());
 
-   verify.putBuffer(c.session.sha1.digest());
 
-   verify = verify.getBytes();
 
-   try {
 
-     var cert = c.session.clientCertificate;
 
-     /*b = forge.pki.rsa.decrypt(
 
-       msg.signature, cert.publicKey, true, verify.length);
 
-     if(b !== verify) {*/
 
-     if(!cert.publicKey.verify(verify, msg.signature, 'NONE')) {
 
-       throw new Error('CertificateVerify signature does not match.');
 
-     }
 
-     // digest message now that it has been handled
 
-     c.session.md5.update(msgBytes);
 
-     c.session.sha1.update(msgBytes);
 
-   } catch(ex) {
 
-     return c.error(c, {
 
-       message: 'Bad signature in CertificateVerify.',
 
-       send: true,
 
-       alert: {
 
-         level: tls.Alert.Level.fatal,
 
-         description: tls.Alert.Description.handshake_failure
 
-       }
 
-     });
 
-   }
 
-   // expect ChangeCipherSpec
 
-   c.expect = CCC;
 
-   // continue
 
-   c.process();
 
- };
 
- /**
 
-  * Called when a client receives a ServerHelloDone record.
 
-  *
 
-  * When this message will be sent:
 
-  *   The server hello done message is sent by the server to indicate the end
 
-  *   of the server hello and associated messages. After sending this message
 
-  *   the server will wait for a client response.
 
-  *
 
-  * Meaning of this message:
 
-  *   This message means that the server is done sending messages to support
 
-  *   the key exchange, and the client can proceed with its phase of the key
 
-  *   exchange.
 
-  *
 
-  *   Upon receipt of the server hello done message the client should verify
 
-  *   that the server provided a valid certificate if required and check that
 
-  *   the server hello parameters are acceptable.
 
-  *
 
-  * struct {} ServerHelloDone;
 
-  *
 
-  * @param c the connection.
 
-  * @param record the record.
 
-  * @param length the length of the handshake message.
 
-  */
 
- tls.handleServerHelloDone = function(c, record, length) {
 
-   // len must be 0 bytes
 
-   if(length > 0) {
 
-     return c.error(c, {
 
-       message: 'Invalid ServerHelloDone message. Invalid length.',
 
-       send: true,
 
-       alert: {
 
-         level: tls.Alert.Level.fatal,
 
-         description: tls.Alert.Description.record_overflow
 
-       }
 
-     });
 
-   }
 
-   if(c.serverCertificate === null) {
 
-     // no server certificate was provided
 
-     var error = {
 
-       message: 'No server certificate provided. Not enough security.',
 
-       send: true,
 
-       alert: {
 
-         level: tls.Alert.Level.fatal,
 
-         description: tls.Alert.Description.insufficient_security
 
-       }
 
-     };
 
-     // call application callback
 
-     var depth = 0;
 
-     var ret = c.verify(c, error.alert.description, depth, []);
 
-     if(ret !== true) {
 
-       // check for custom alert info
 
-       if(ret || ret === 0) {
 
-         // set custom message and alert description
 
-         if(typeof ret === 'object' && !forge.util.isArray(ret)) {
 
-           if(ret.message) {
 
-             error.message = ret.message;
 
-           }
 
-           if(ret.alert) {
 
-             error.alert.description = ret.alert;
 
-           }
 
-         } else if(typeof ret === 'number') {
 
-           // set custom alert description
 
-           error.alert.description = ret;
 
-         }
 
-       }
 
-       // send error
 
-       return c.error(c, error);
 
-     }
 
-   }
 
-   // create client certificate message if requested
 
-   if(c.session.certificateRequest !== null) {
 
-     record = tls.createRecord(c, {
 
-       type: tls.ContentType.handshake,
 
-       data: tls.createCertificate(c)
 
-     });
 
-     tls.queue(c, record);
 
-   }
 
-   // create client key exchange message
 
-   record = tls.createRecord(c, {
 
-      type: tls.ContentType.handshake,
 
-      data: tls.createClientKeyExchange(c)
 
-   });
 
-   tls.queue(c, record);
 
-   // expect no messages until the following callback has been called
 
-   c.expect = SER;
 
-   // create callback to handle client signature (for client-certs)
 
-   var callback = function(c, signature) {
 
-     if(c.session.certificateRequest !== null &&
 
-       c.session.clientCertificate !== null) {
 
-       // create certificate verify message
 
-       tls.queue(c, tls.createRecord(c, {
 
-         type: tls.ContentType.handshake,
 
-         data: tls.createCertificateVerify(c, signature)
 
-       }));
 
-     }
 
-     // create change cipher spec message
 
-     tls.queue(c, tls.createRecord(c, {
 
-       type: tls.ContentType.change_cipher_spec,
 
-       data: tls.createChangeCipherSpec()
 
-     }));
 
-     // create pending state
 
-     c.state.pending = tls.createConnectionState(c);
 
-     // change current write state to pending write state
 
-     c.state.current.write = c.state.pending.write;
 
-     // create finished message
 
-     tls.queue(c, tls.createRecord(c, {
 
-       type: tls.ContentType.handshake,
 
-       data: tls.createFinished(c)
 
-     }));
 
-     // expect a server ChangeCipherSpec message next
 
-     c.expect = SCC;
 
-     // send records
 
-     tls.flush(c);
 
-     // continue
 
-     c.process();
 
-   };
 
-   // if there is no certificate request or no client certificate, do
 
-   // callback immediately
 
-   if(c.session.certificateRequest === null ||
 
-     c.session.clientCertificate === null) {
 
-     return callback(c, null);
 
-   }
 
-   // otherwise get the client signature
 
-   tls.getClientSignature(c, callback);
 
- };
 
- /**
 
-  * Called when a ChangeCipherSpec record is received.
 
-  *
 
-  * @param c the connection.
 
-  * @param record the record.
 
-  */
 
- tls.handleChangeCipherSpec = function(c, record) {
 
-   if(record.fragment.getByte() !== 0x01) {
 
-     return c.error(c, {
 
-       message: 'Invalid ChangeCipherSpec message received.',
 
-       send: true,
 
-       alert: {
 
-         level: tls.Alert.Level.fatal,
 
-         description: tls.Alert.Description.illegal_parameter
 
-       }
 
-     });
 
-   }
 
-   // create pending state if:
 
-   // 1. Resuming session in client mode OR
 
-   // 2. NOT resuming session in server mode
 
-   var client = (c.entity === tls.ConnectionEnd.client);
 
-   if((c.session.resuming && client) || (!c.session.resuming && !client)) {
 
-     c.state.pending = tls.createConnectionState(c);
 
-   }
 
-   // change current read state to pending read state
 
-   c.state.current.read = c.state.pending.read;
 
-   // clear pending state if:
 
-   // 1. NOT resuming session in client mode OR
 
-   // 2. resuming a session in server mode
 
-   if((!c.session.resuming && client) || (c.session.resuming && !client)) {
 
-     c.state.pending = null;
 
-   }
 
-   // expect a Finished record next
 
-   c.expect = client ? SFI : CFI;
 
-   // continue
 
-   c.process();
 
- };
 
- /**
 
-  * Called when a Finished record is received.
 
-  *
 
-  * When this message will be sent:
 
-  *   A finished message is always sent immediately after a change
 
-  *   cipher spec message to verify that the key exchange and
 
-  *   authentication processes were successful. It is essential that a
 
-  *   change cipher spec message be received between the other
 
-  *   handshake messages and the Finished message.
 
-  *
 
-  * Meaning of this message:
 
-  *   The finished message is the first protected with the just-
 
-  *   negotiated algorithms, keys, and secrets. Recipients of finished
 
-  *   messages must verify that the contents are correct.  Once a side
 
-  *   has sent its Finished message and received and validated the
 
-  *   Finished message from its peer, it may begin to send and receive
 
-  *   application data over the connection.
 
-  *
 
-  * struct {
 
-  *   opaque verify_data[verify_data_length];
 
-  * } Finished;
 
-  *
 
-  * verify_data
 
-  *   PRF(master_secret, finished_label, Hash(handshake_messages))
 
-  *     [0..verify_data_length-1];
 
-  *
 
-  * finished_label
 
-  *   For Finished messages sent by the client, the string
 
-  *   "client finished". For Finished messages sent by the server, the
 
-  *   string "server finished".
 
-  *
 
-  * verify_data_length depends on the cipher suite. If it is not specified
 
-  * by the cipher suite, then it is 12. Versions of TLS < 1.2 always used
 
-  * 12 bytes.
 
-  *
 
-  * @param c the connection.
 
-  * @param record the record.
 
-  * @param length the length of the handshake message.
 
-  */
 
- tls.handleFinished = function(c, record, length) {
 
-   // rewind to get full bytes for message so it can be manually
 
-   // digested below (special case for Finished messages because they
 
-   // must be digested *after* handling as opposed to all others)
 
-   var b = record.fragment;
 
-   b.read -= 4;
 
-   var msgBytes = b.bytes();
 
-   b.read += 4;
 
-   // message contains only verify_data
 
-   var vd = record.fragment.getBytes();
 
-   // ensure verify data is correct
 
-   b = forge.util.createBuffer();
 
-   b.putBuffer(c.session.md5.digest());
 
-   b.putBuffer(c.session.sha1.digest());
 
-   // set label based on entity type
 
-   var client = (c.entity === tls.ConnectionEnd.client);
 
-   var label = client ? 'server finished' : 'client finished';
 
-   // TODO: determine prf function and verify length for TLS 1.2
 
-   var sp = c.session.sp;
 
-   var vdl = 12;
 
-   var prf = prf_TLS1;
 
-   b = prf(sp.master_secret, label, b.getBytes(), vdl);
 
-   if(b.getBytes() !== vd) {
 
-     return c.error(c, {
 
-       message: 'Invalid verify_data in Finished message.',
 
-       send: true,
 
-       alert: {
 
-         level: tls.Alert.Level.fatal,
 
-         description: tls.Alert.Description.decrypt_error
 
-       }
 
-     });
 
-   }
 
-   // digest finished message now that it has been handled
 
-   c.session.md5.update(msgBytes);
 
-   c.session.sha1.update(msgBytes);
 
-   // resuming session as client or NOT resuming session as server
 
-   if((c.session.resuming && client) || (!c.session.resuming && !client)) {
 
-     // create change cipher spec message
 
-     tls.queue(c, tls.createRecord(c, {
 
-       type: tls.ContentType.change_cipher_spec,
 
-       data: tls.createChangeCipherSpec()
 
-     }));
 
-     // change current write state to pending write state, clear pending
 
-     c.state.current.write = c.state.pending.write;
 
-     c.state.pending = null;
 
-     // create finished message
 
-     tls.queue(c, tls.createRecord(c, {
 
-       type: tls.ContentType.handshake,
 
-       data: tls.createFinished(c)
 
-     }));
 
-   }
 
-   // expect application data next
 
-   c.expect = client ? SAD : CAD;
 
-   // handshake complete
 
-   c.handshaking = false;
 
-   ++c.handshakes;
 
-   // save access to peer certificate
 
-   c.peerCertificate = client ?
 
-     c.session.serverCertificate : c.session.clientCertificate;
 
-   // send records
 
-   tls.flush(c);
 
-   // now connected
 
-   c.isConnected = true;
 
-   c.connected(c);
 
-   // continue
 
-   c.process();
 
- };
 
- /**
 
-  * Called when an Alert record is received.
 
-  *
 
-  * @param c the connection.
 
-  * @param record the record.
 
-  */
 
- tls.handleAlert = function(c, record) {
 
-   // read alert
 
-   var b = record.fragment;
 
-   var alert = {
 
-     level: b.getByte(),
 
-     description: b.getByte()
 
-   };
 
-   // TODO: consider using a table?
 
-   // get appropriate message
 
-   var msg;
 
-   switch(alert.description) {
 
-   case tls.Alert.Description.close_notify:
 
-     msg = 'Connection closed.';
 
-     break;
 
-   case tls.Alert.Description.unexpected_message:
 
-     msg = 'Unexpected message.';
 
-     break;
 
-   case tls.Alert.Description.bad_record_mac:
 
-     msg = 'Bad record MAC.';
 
-     break;
 
-   case tls.Alert.Description.decryption_failed:
 
-     msg = 'Decryption failed.';
 
-     break;
 
-   case tls.Alert.Description.record_overflow:
 
-     msg = 'Record overflow.';
 
-     break;
 
-   case tls.Alert.Description.decompression_failure:
 
-     msg = 'Decompression failed.';
 
-     break;
 
-   case tls.Alert.Description.handshake_failure:
 
-     msg = 'Handshake failure.';
 
-     break;
 
-   case tls.Alert.Description.bad_certificate:
 
-     msg = 'Bad certificate.';
 
-     break;
 
-   case tls.Alert.Description.unsupported_certificate:
 
-     msg = 'Unsupported certificate.';
 
-     break;
 
-   case tls.Alert.Description.certificate_revoked:
 
-     msg = 'Certificate revoked.';
 
-     break;
 
-   case tls.Alert.Description.certificate_expired:
 
-     msg = 'Certificate expired.';
 
-     break;
 
-   case tls.Alert.Description.certificate_unknown:
 
-     msg = 'Certificate unknown.';
 
-     break;
 
-   case tls.Alert.Description.illegal_parameter:
 
-     msg = 'Illegal parameter.';
 
-     break;
 
-   case tls.Alert.Description.unknown_ca:
 
-     msg = 'Unknown certificate authority.';
 
-     break;
 
-   case tls.Alert.Description.access_denied:
 
-     msg = 'Access denied.';
 
-     break;
 
-   case tls.Alert.Description.decode_error:
 
-     msg = 'Decode error.';
 
-     break;
 
-   case tls.Alert.Description.decrypt_error:
 
-     msg = 'Decrypt error.';
 
-     break;
 
-   case tls.Alert.Description.export_restriction:
 
-     msg = 'Export restriction.';
 
-     break;
 
-   case tls.Alert.Description.protocol_version:
 
-     msg = 'Unsupported protocol version.';
 
-     break;
 
-   case tls.Alert.Description.insufficient_security:
 
-     msg = 'Insufficient security.';
 
-     break;
 
-   case tls.Alert.Description.internal_error:
 
-     msg = 'Internal error.';
 
-     break;
 
-   case tls.Alert.Description.user_canceled:
 
-     msg = 'User canceled.';
 
-     break;
 
-   case tls.Alert.Description.no_renegotiation:
 
-     msg = 'Renegotiation not supported.';
 
-     break;
 
-   default:
 
-     msg = 'Unknown error.';
 
-     break;
 
-   }
 
-   // close connection on close_notify, not an error
 
-   if(alert.description === tls.Alert.Description.close_notify) {
 
-     return c.close();
 
-   }
 
-   // call error handler
 
-   c.error(c, {
 
-     message: msg,
 
-     send: false,
 
-     // origin is the opposite end
 
-     origin: (c.entity === tls.ConnectionEnd.client) ? 'server' : 'client',
 
-     alert: alert
 
-   });
 
-   // continue
 
-   c.process();
 
- };
 
- /**
 
-  * Called when a Handshake record is received.
 
-  *
 
-  * @param c the connection.
 
-  * @param record the record.
 
-  */
 
- tls.handleHandshake = function(c, record) {
 
-   // get the handshake type and message length
 
-   var b = record.fragment;
 
-   var type = b.getByte();
 
-   var length = b.getInt24();
 
-   // see if the record fragment doesn't yet contain the full message
 
-   if(length > b.length()) {
 
-     // cache the record, clear its fragment, and reset the buffer read
 
-     // pointer before the type and length were read
 
-     c.fragmented = record;
 
-     record.fragment = forge.util.createBuffer();
 
-     b.read -= 4;
 
-     // continue
 
-     return c.process();
 
-   }
 
-   // full message now available, clear cache, reset read pointer to
 
-   // before type and length
 
-   c.fragmented = null;
 
-   b.read -= 4;
 
-   // save the handshake bytes for digestion after handler is found
 
-   // (include type and length of handshake msg)
 
-   var bytes = b.bytes(length + 4);
 
-   // restore read pointer
 
-   b.read += 4;
 
-   // handle expected message
 
-   if(type in hsTable[c.entity][c.expect]) {
 
-     // initialize server session
 
-     if(c.entity === tls.ConnectionEnd.server && !c.open && !c.fail) {
 
-       c.handshaking = true;
 
-       c.session = {
 
-         version: null,
 
-         extensions: {
 
-           server_name: {
 
-             serverNameList: []
 
-           }
 
-         },
 
-         cipherSuite: null,
 
-         compressionMethod: null,
 
-         serverCertificate: null,
 
-         clientCertificate: null,
 
-         md5: forge.md.md5.create(),
 
-         sha1: forge.md.sha1.create()
 
-       };
 
-     }
 
-     /* Update handshake messages digest. Finished and CertificateVerify
 
-       messages are not digested here. They can't be digested as part of
 
-       the verify_data that they contain. These messages are manually
 
-       digested in their handlers. HelloRequest messages are simply never
 
-       included in the handshake message digest according to spec. */
 
-     if(type !== tls.HandshakeType.hello_request &&
 
-       type !== tls.HandshakeType.certificate_verify &&
 
-       type !== tls.HandshakeType.finished) {
 
-       c.session.md5.update(bytes);
 
-       c.session.sha1.update(bytes);
 
-     }
 
-     // handle specific handshake type record
 
-     hsTable[c.entity][c.expect][type](c, record, length);
 
-   } else {
 
-     // unexpected record
 
-     tls.handleUnexpected(c, record);
 
-   }
 
- };
 
- /**
 
-  * Called when an ApplicationData record is received.
 
-  *
 
-  * @param c the connection.
 
-  * @param record the record.
 
-  */
 
- tls.handleApplicationData = function(c, record) {
 
-   // buffer data, notify that its ready
 
-   c.data.putBuffer(record.fragment);
 
-   c.dataReady(c);
 
-   // continue
 
-   c.process();
 
- };
 
- /**
 
-  * Called when a Heartbeat record is received.
 
-  *
 
-  * @param c the connection.
 
-  * @param record the record.
 
-  */
 
- tls.handleHeartbeat = function(c, record) {
 
-   // get the heartbeat type and payload
 
-   var b = record.fragment;
 
-   var type = b.getByte();
 
-   var length = b.getInt16();
 
-   var payload = b.getBytes(length);
 
-   if(type === tls.HeartbeatMessageType.heartbeat_request) {
 
-     // discard request during handshake or if length is too large
 
-     if(c.handshaking || length > payload.length) {
 
-       // continue
 
-       return c.process();
 
-     }
 
-     // retransmit payload
 
-     tls.queue(c, tls.createRecord(c, {
 
-       type: tls.ContentType.heartbeat,
 
-       data: tls.createHeartbeat(
 
-         tls.HeartbeatMessageType.heartbeat_response, payload)
 
-     }));
 
-     tls.flush(c);
 
-   } else if(type === tls.HeartbeatMessageType.heartbeat_response) {
 
-     // check payload against expected payload, discard heartbeat if no match
 
-     if(payload !== c.expectedHeartbeatPayload) {
 
-       // continue
 
-       return c.process();
 
-     }
 
-     // notify that a valid heartbeat was received
 
-     if(c.heartbeatReceived) {
 
-       c.heartbeatReceived(c, forge.util.createBuffer(payload));
 
-     }
 
-   }
 
-   // continue
 
-   c.process();
 
- };
 
- /**
 
-  * The transistional state tables for receiving TLS records. It maps the
 
-  * current TLS engine state and a received record to a function to handle the
 
-  * record and update the state.
 
-  *
 
-  * For instance, if the current state is SHE, then the TLS engine is expecting
 
-  * a ServerHello record. Once a record is received, the handler function is
 
-  * looked up using the state SHE and the record's content type.
 
-  *
 
-  * The resulting function will either be an error handler or a record handler.
 
-  * The function will take whatever action is appropriate and update the state
 
-  * for the next record.
 
-  *
 
-  * The states are all based on possible server record types. Note that the
 
-  * client will never specifically expect to receive a HelloRequest or an alert
 
-  * from the server so there is no state that reflects this. These messages may
 
-  * occur at any time.
 
-  *
 
-  * There are two tables for mapping states because there is a second tier of
 
-  * types for handshake messages. Once a record with a content type of handshake
 
-  * is received, the handshake record handler will look up the handshake type in
 
-  * the secondary map to get its appropriate handler.
 
-  *
 
-  * Valid message orders are as follows:
 
-  *
 
-  * =======================FULL HANDSHAKE======================
 
-  * Client                                               Server
 
-  *
 
-  * ClientHello                  -------->
 
-  *                                                 ServerHello
 
-  *                                                Certificate*
 
-  *                                          ServerKeyExchange*
 
-  *                                         CertificateRequest*
 
-  *                              <--------      ServerHelloDone
 
-  * Certificate*
 
-  * ClientKeyExchange
 
-  * CertificateVerify*
 
-  * [ChangeCipherSpec]
 
-  * Finished                     -------->
 
-  *                                          [ChangeCipherSpec]
 
-  *                              <--------             Finished
 
-  * Application Data             <------->     Application Data
 
-  *
 
-  * =====================SESSION RESUMPTION=====================
 
-  * Client                                                Server
 
-  *
 
-  * ClientHello                   -------->
 
-  *                                                  ServerHello
 
-  *                                           [ChangeCipherSpec]
 
-  *                               <--------             Finished
 
-  * [ChangeCipherSpec]
 
-  * Finished                      -------->
 
-  * Application Data              <------->     Application Data
 
-  */
 
- // client expect states (indicate which records are expected to be received)
 
- var SHE = 0; // rcv server hello
 
- var SCE = 1; // rcv server certificate
 
- var SKE = 2; // rcv server key exchange
 
- var SCR = 3; // rcv certificate request
 
- var SHD = 4; // rcv server hello done
 
- var SCC = 5; // rcv change cipher spec
 
- var SFI = 6; // rcv finished
 
- var SAD = 7; // rcv application data
 
- var SER = 8; // not expecting any messages at this point
 
- // server expect states
 
- var CHE = 0; // rcv client hello
 
- var CCE = 1; // rcv client certificate
 
- var CKE = 2; // rcv client key exchange
 
- var CCV = 3; // rcv certificate verify
 
- var CCC = 4; // rcv change cipher spec
 
- var CFI = 5; // rcv finished
 
- var CAD = 6; // rcv application data
 
- var CER = 7; // not expecting any messages at this point
 
- // map client current expect state and content type to function
 
- var __ = tls.handleUnexpected;
 
- var R0 = tls.handleChangeCipherSpec;
 
- var R1 = tls.handleAlert;
 
- var R2 = tls.handleHandshake;
 
- var R3 = tls.handleApplicationData;
 
- var R4 = tls.handleHeartbeat;
 
- var ctTable = [];
 
- ctTable[tls.ConnectionEnd.client] = [
 
- //      CC,AL,HS,AD,HB
 
- /*SHE*/[__,R1,R2,__,R4],
 
- /*SCE*/[__,R1,R2,__,R4],
 
- /*SKE*/[__,R1,R2,__,R4],
 
- /*SCR*/[__,R1,R2,__,R4],
 
- /*SHD*/[__,R1,R2,__,R4],
 
- /*SCC*/[R0,R1,__,__,R4],
 
- /*SFI*/[__,R1,R2,__,R4],
 
- /*SAD*/[__,R1,R2,R3,R4],
 
- /*SER*/[__,R1,R2,__,R4]
 
- ];
 
- // map server current expect state and content type to function
 
- ctTable[tls.ConnectionEnd.server] = [
 
- //      CC,AL,HS,AD
 
- /*CHE*/[__,R1,R2,__,R4],
 
- /*CCE*/[__,R1,R2,__,R4],
 
- /*CKE*/[__,R1,R2,__,R4],
 
- /*CCV*/[__,R1,R2,__,R4],
 
- /*CCC*/[R0,R1,__,__,R4],
 
- /*CFI*/[__,R1,R2,__,R4],
 
- /*CAD*/[__,R1,R2,R3,R4],
 
- /*CER*/[__,R1,R2,__,R4]
 
- ];
 
- // map client current expect state and handshake type to function
 
- var H0 = tls.handleHelloRequest;
 
- var H1 = tls.handleServerHello;
 
- var H2 = tls.handleCertificate;
 
- var H3 = tls.handleServerKeyExchange;
 
- var H4 = tls.handleCertificateRequest;
 
- var H5 = tls.handleServerHelloDone;
 
- var H6 = tls.handleFinished;
 
- var hsTable = [];
 
- hsTable[tls.ConnectionEnd.client] = [
 
- //      HR,01,SH,03,04,05,06,07,08,09,10,SC,SK,CR,HD,15,CK,17,18,19,FI
 
- /*SHE*/[__,__,H1,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__],
 
- /*SCE*/[H0,__,__,__,__,__,__,__,__,__,__,H2,H3,H4,H5,__,__,__,__,__,__],
 
- /*SKE*/[H0,__,__,__,__,__,__,__,__,__,__,__,H3,H4,H5,__,__,__,__,__,__],
 
- /*SCR*/[H0,__,__,__,__,__,__,__,__,__,__,__,__,H4,H5,__,__,__,__,__,__],
 
- /*SHD*/[H0,__,__,__,__,__,__,__,__,__,__,__,__,__,H5,__,__,__,__,__,__],
 
- /*SCC*/[H0,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__],
 
- /*SFI*/[H0,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,H6],
 
- /*SAD*/[H0,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__],
 
- /*SER*/[H0,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__]
 
- ];
 
- // map server current expect state and handshake type to function
 
- // Note: CAD[CH] does not map to FB because renegotation is prohibited
 
- var H7 = tls.handleClientHello;
 
- var H8 = tls.handleClientKeyExchange;
 
- var H9 = tls.handleCertificateVerify;
 
- hsTable[tls.ConnectionEnd.server] = [
 
- //      01,CH,02,03,04,05,06,07,08,09,10,CC,12,13,14,CV,CK,17,18,19,FI
 
- /*CHE*/[__,H7,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__],
 
- /*CCE*/[__,__,__,__,__,__,__,__,__,__,__,H2,__,__,__,__,__,__,__,__,__],
 
- /*CKE*/[__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,H8,__,__,__,__],
 
- /*CCV*/[__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,H9,__,__,__,__,__],
 
- /*CCC*/[__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__],
 
- /*CFI*/[__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,H6],
 
- /*CAD*/[__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__],
 
- /*CER*/[__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__,__]
 
- ];
 
- /**
 
-  * Generates the master_secret and keys using the given security parameters.
 
-  *
 
-  * The security parameters for a TLS connection state are defined as such:
 
-  *
 
-  * struct {
 
-  *   ConnectionEnd          entity;
 
-  *   PRFAlgorithm           prf_algorithm;
 
-  *   BulkCipherAlgorithm    bulk_cipher_algorithm;
 
-  *   CipherType             cipher_type;
 
-  *   uint8                  enc_key_length;
 
-  *   uint8                  block_length;
 
-  *   uint8                  fixed_iv_length;
 
-  *   uint8                  record_iv_length;
 
-  *   MACAlgorithm           mac_algorithm;
 
-  *   uint8                  mac_length;
 
-  *   uint8                  mac_key_length;
 
-  *   CompressionMethod      compression_algorithm;
 
-  *   opaque                 master_secret[48];
 
-  *   opaque                 client_random[32];
 
-  *   opaque                 server_random[32];
 
-  * } SecurityParameters;
 
-  *
 
-  * Note that this definition is from TLS 1.2. In TLS 1.0 some of these
 
-  * parameters are ignored because, for instance, the PRFAlgorithm is a
 
-  * builtin-fixed algorithm combining iterations of MD5 and SHA-1 in TLS 1.0.
 
-  *
 
-  * The Record Protocol requires an algorithm to generate keys required by the
 
-  * current connection state.
 
-  *
 
-  * The master secret is expanded into a sequence of secure bytes, which is then
 
-  * split to a client write MAC key, a server write MAC key, a client write
 
-  * encryption key, and a server write encryption key. In TLS 1.0 a client write
 
-  * IV and server write IV are also generated. Each of these is generated from
 
-  * the byte sequence in that order. Unused values are empty. In TLS 1.2, some
 
-  * AEAD ciphers may additionally require a client write IV and a server write
 
-  * IV (see Section 6.2.3.3).
 
-  *
 
-  * When keys, MAC keys, and IVs are generated, the master secret is used as an
 
-  * entropy source.
 
-  *
 
-  * To generate the key material, compute:
 
-  *
 
-  * master_secret = PRF(pre_master_secret, "master secret",
 
-  *                     ClientHello.random + ServerHello.random)
 
-  *
 
-  * key_block = PRF(SecurityParameters.master_secret,
 
-  *                 "key expansion",
 
-  *                 SecurityParameters.server_random +
 
-  *                 SecurityParameters.client_random);
 
-  *
 
-  * until enough output has been generated. Then, the key_block is
 
-  * partitioned as follows:
 
-  *
 
-  * client_write_MAC_key[SecurityParameters.mac_key_length]
 
-  * server_write_MAC_key[SecurityParameters.mac_key_length]
 
-  * client_write_key[SecurityParameters.enc_key_length]
 
-  * server_write_key[SecurityParameters.enc_key_length]
 
-  * client_write_IV[SecurityParameters.fixed_iv_length]
 
-  * server_write_IV[SecurityParameters.fixed_iv_length]
 
-  *
 
-  * In TLS 1.2, the client_write_IV and server_write_IV are only generated for
 
-  * implicit nonce techniques as described in Section 3.2.1 of [AEAD]. This
 
-  * implementation uses TLS 1.0 so IVs are generated.
 
-  *
 
-  * Implementation note: The currently defined cipher suite which requires the
 
-  * most material is AES_256_CBC_SHA256. It requires 2 x 32 byte keys and 2 x 32
 
-  * byte MAC keys, for a total 128 bytes of key material. In TLS 1.0 it also
 
-  * requires 2 x 16 byte IVs, so it actually takes 160 bytes of key material.
 
-  *
 
-  * @param c the connection.
 
-  * @param sp the security parameters to use.
 
-  *
 
-  * @return the security keys.
 
-  */
 
- tls.generateKeys = function(c, sp) {
 
-   // TLS_RSA_WITH_AES_128_CBC_SHA (required to be compliant with TLS 1.2) &
 
-   // TLS_RSA_WITH_AES_256_CBC_SHA are the only cipher suites implemented
 
-   // at present
 
-   // TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA is required to be compliant with
 
-   // TLS 1.0 but we don't care right now because AES is better and we have
 
-   // an implementation for it
 
-   // TODO: TLS 1.2 implementation
 
-   /*
 
-   // determine the PRF
 
-   var prf;
 
-   switch(sp.prf_algorithm) {
 
-   case tls.PRFAlgorithm.tls_prf_sha256:
 
-     prf = prf_sha256;
 
-     break;
 
-   default:
 
-     // should never happen
 
-     throw new Error('Invalid PRF');
 
-   }
 
-   */
 
-   // TLS 1.0/1.1 implementation
 
-   var prf = prf_TLS1;
 
-   // concatenate server and client random
 
-   var random = sp.client_random + sp.server_random;
 
-   // only create master secret if session is new
 
-   if(!c.session.resuming) {
 
-     // create master secret, clean up pre-master secret
 
-     sp.master_secret = prf(
 
-       sp.pre_master_secret, 'master secret', random, 48).bytes();
 
-     sp.pre_master_secret = null;
 
-   }
 
-   // generate the amount of key material needed
 
-   random = sp.server_random + sp.client_random;
 
-   var length = 2 * sp.mac_key_length + 2 * sp.enc_key_length;
 
-   // include IV for TLS/1.0
 
-   var tls10 = (c.version.major === tls.Versions.TLS_1_0.major &&
 
-     c.version.minor === tls.Versions.TLS_1_0.minor);
 
-   if(tls10) {
 
-     length += 2 * sp.fixed_iv_length;
 
-   }
 
-   var km = prf(sp.master_secret, 'key expansion', random, length);
 
-   // split the key material into the MAC and encryption keys
 
-   var rval = {
 
-     client_write_MAC_key: km.getBytes(sp.mac_key_length),
 
-     server_write_MAC_key: km.getBytes(sp.mac_key_length),
 
-     client_write_key: km.getBytes(sp.enc_key_length),
 
-     server_write_key: km.getBytes(sp.enc_key_length)
 
-   };
 
-   // include TLS 1.0 IVs
 
-   if(tls10) {
 
-     rval.client_write_IV = km.getBytes(sp.fixed_iv_length);
 
-     rval.server_write_IV = km.getBytes(sp.fixed_iv_length);
 
-   }
 
-   return rval;
 
- };
 
- /**
 
-  * Creates a new initialized TLS connection state. A connection state has
 
-  * a read mode and a write mode.
 
-  *
 
-  * compression state:
 
-  *   The current state of the compression algorithm.
 
-  *
 
-  * cipher state:
 
-  *   The current state of the encryption algorithm. This will consist of the
 
-  *   scheduled key for that connection. For stream ciphers, this will also
 
-  *   contain whatever state information is necessary to allow the stream to
 
-  *   continue to encrypt or decrypt data.
 
-  *
 
-  * MAC key:
 
-  *   The MAC key for the connection.
 
-  *
 
-  * sequence number:
 
-  *   Each connection state contains a sequence number, which is maintained
 
-  *   separately for read and write states. The sequence number MUST be set to
 
-  *   zero whenever a connection state is made the active state. Sequence
 
-  *   numbers are of type uint64 and may not exceed 2^64-1. Sequence numbers do
 
-  *   not wrap. If a TLS implementation would need to wrap a sequence number,
 
-  *   it must renegotiate instead. A sequence number is incremented after each
 
-  *   record: specifically, the first record transmitted under a particular
 
-  *   connection state MUST use sequence number 0.
 
-  *
 
-  * @param c the connection.
 
-  *
 
-  * @return the new initialized TLS connection state.
 
-  */
 
- tls.createConnectionState = function(c) {
 
-   var client = (c.entity === tls.ConnectionEnd.client);
 
-   var createMode = function() {
 
-     var mode = {
 
-       // two 32-bit numbers, first is most significant
 
-       sequenceNumber: [0, 0],
 
-       macKey: null,
 
-       macLength: 0,
 
-       macFunction: null,
 
-       cipherState: null,
 
-       cipherFunction: function(record) {return true;},
 
-       compressionState: null,
 
-       compressFunction: function(record) {return true;},
 
-       updateSequenceNumber: function() {
 
-         if(mode.sequenceNumber[1] === 0xFFFFFFFF) {
 
-           mode.sequenceNumber[1] = 0;
 
-           ++mode.sequenceNumber[0];
 
-         } else {
 
-           ++mode.sequenceNumber[1];
 
-         }
 
-       }
 
-     };
 
-     return mode;
 
-   };
 
-   var state = {
 
-     read: createMode(),
 
-     write: createMode()
 
-   };
 
-   // update function in read mode will decrypt then decompress a record
 
-   state.read.update = function(c, record) {
 
-     if(!state.read.cipherFunction(record, state.read)) {
 
-       c.error(c, {
 
-         message: 'Could not decrypt record or bad MAC.',
 
-         send: true,
 
-         alert: {
 
-           level: tls.Alert.Level.fatal,
 
-           // doesn't matter if decryption failed or MAC was
 
-           // invalid, return the same error so as not to reveal
 
-           // which one occurred
 
-           description: tls.Alert.Description.bad_record_mac
 
-         }
 
-       });
 
-     } else if(!state.read.compressFunction(c, record, state.read)) {
 
-       c.error(c, {
 
-         message: 'Could not decompress record.',
 
-         send: true,
 
-         alert: {
 
-           level: tls.Alert.Level.fatal,
 
-           description: tls.Alert.Description.decompression_failure
 
-         }
 
-       });
 
-     }
 
-     return !c.fail;
 
-   };
 
-   // update function in write mode will compress then encrypt a record
 
-   state.write.update = function(c, record) {
 
-     if(!state.write.compressFunction(c, record, state.write)) {
 
-       // error, but do not send alert since it would require
 
-       // compression as well
 
-       c.error(c, {
 
-         message: 'Could not compress record.',
 
-         send: false,
 
-         alert: {
 
-           level: tls.Alert.Level.fatal,
 
-           description: tls.Alert.Description.internal_error
 
-         }
 
-       });
 
-     } else if(!state.write.cipherFunction(record, state.write)) {
 
-       // error, but do not send alert since it would require
 
-       // encryption as well
 
-       c.error(c, {
 
-         message: 'Could not encrypt record.',
 
-         send: false,
 
-         alert: {
 
-           level: tls.Alert.Level.fatal,
 
-           description: tls.Alert.Description.internal_error
 
-         }
 
-       });
 
-     }
 
-     return !c.fail;
 
-   };
 
-   // handle security parameters
 
-   if(c.session) {
 
-     var sp = c.session.sp;
 
-     c.session.cipherSuite.initSecurityParameters(sp);
 
-     // generate keys
 
-     sp.keys = tls.generateKeys(c, sp);
 
-     state.read.macKey = client ?
 
-       sp.keys.server_write_MAC_key : sp.keys.client_write_MAC_key;
 
-     state.write.macKey = client ?
 
-       sp.keys.client_write_MAC_key : sp.keys.server_write_MAC_key;
 
-     // cipher suite setup
 
-     c.session.cipherSuite.initConnectionState(state, c, sp);
 
-     // compression setup
 
-     switch(sp.compression_algorithm) {
 
-     case tls.CompressionMethod.none:
 
-       break;
 
-     case tls.CompressionMethod.deflate:
 
-       state.read.compressFunction = inflate;
 
-       state.write.compressFunction = deflate;
 
-       break;
 
-     default:
 
-       throw new Error('Unsupported compression algorithm.');
 
-     }
 
-   }
 
-   return state;
 
- };
 
- /**
 
-  * Creates a Random structure.
 
-  *
 
-  * struct {
 
-  *   uint32 gmt_unix_time;
 
-  *   opaque random_bytes[28];
 
-  * } Random;
 
-  *
 
-  * gmt_unix_time:
 
-  *   The current time and date in standard UNIX 32-bit format (seconds since
 
-  *   the midnight starting Jan 1, 1970, UTC, ignoring leap seconds) according
 
-  *   to the sender's internal clock. Clocks are not required to be set
 
-  *   correctly by the basic TLS protocol; higher-level or application
 
-  *   protocols may define additional requirements. Note that, for historical
 
-  *   reasons, the data element is named using GMT, the predecessor of the
 
-  *   current worldwide time base, UTC.
 
-  * random_bytes:
 
-  *   28 bytes generated by a secure random number generator.
 
-  *
 
-  * @return the Random structure as a byte array.
 
-  */
 
- tls.createRandom = function() {
 
-   // get UTC milliseconds
 
-   var d = new Date();
 
-   var utc = +d + d.getTimezoneOffset() * 60000;
 
-   var rval = forge.util.createBuffer();
 
-   rval.putInt32(utc);
 
-   rval.putBytes(forge.random.getBytes(28));
 
-   return rval;
 
- };
 
- /**
 
-  * Creates a TLS record with the given type and data.
 
-  *
 
-  * @param c the connection.
 
-  * @param options:
 
-  *   type: the record type.
 
-  *   data: the plain text data in a byte buffer.
 
-  *
 
-  * @return the created record.
 
-  */
 
- tls.createRecord = function(c, options) {
 
-   if(!options.data) {
 
-     return null;
 
-   }
 
-   var record = {
 
-     type: options.type,
 
-     version: {
 
-       major: c.version.major,
 
-       minor: c.version.minor
 
-     },
 
-     length: options.data.length(),
 
-     fragment: options.data
 
-   };
 
-   return record;
 
- };
 
- /**
 
-  * Creates a TLS alert record.
 
-  *
 
-  * @param c the connection.
 
-  * @param alert:
 
-  *   level: the TLS alert level.
 
-  *   description: the TLS alert description.
 
-  *
 
-  * @return the created alert record.
 
-  */
 
- tls.createAlert = function(c, alert) {
 
-   var b = forge.util.createBuffer();
 
-   b.putByte(alert.level);
 
-   b.putByte(alert.description);
 
-   return tls.createRecord(c, {
 
-     type: tls.ContentType.alert,
 
-     data: b
 
-   });
 
- };
 
- /* The structure of a TLS handshake message.
 
-  *
 
-  * struct {
 
-  *    HandshakeType msg_type;    // handshake type
 
-  *    uint24 length;             // bytes in message
 
-  *    select(HandshakeType) {
 
-  *       case hello_request:       HelloRequest;
 
-  *       case client_hello:        ClientHello;
 
-  *       case server_hello:        ServerHello;
 
-  *       case certificate:         Certificate;
 
-  *       case server_key_exchange: ServerKeyExchange;
 
-  *       case certificate_request: CertificateRequest;
 
-  *       case server_hello_done:   ServerHelloDone;
 
-  *       case certificate_verify:  CertificateVerify;
 
-  *       case client_key_exchange: ClientKeyExchange;
 
-  *       case finished:            Finished;
 
-  *    } body;
 
-  * } Handshake;
 
-  */
 
- /**
 
-  * Creates a ClientHello message.
 
-  *
 
-  * opaque SessionID<0..32>;
 
-  * enum { null(0), deflate(1), (255) } CompressionMethod;
 
-  * uint8 CipherSuite[2];
 
-  *
 
-  * struct {
 
-  *   ProtocolVersion client_version;
 
-  *   Random random;
 
-  *   SessionID session_id;
 
-  *   CipherSuite cipher_suites<2..2^16-2>;
 
-  *   CompressionMethod compression_methods<1..2^8-1>;
 
-  *   select(extensions_present) {
 
-  *     case false:
 
-  *       struct {};
 
-  *     case true:
 
-  *       Extension extensions<0..2^16-1>;
 
-  *   };
 
-  * } ClientHello;
 
-  *
 
-  * The extension format for extended client hellos and server hellos is:
 
-  *
 
-  * struct {
 
-  *   ExtensionType extension_type;
 
-  *   opaque extension_data<0..2^16-1>;
 
-  * } Extension;
 
-  *
 
-  * Here:
 
-  *
 
-  * - "extension_type" identifies the particular extension type.
 
-  * - "extension_data" contains information specific to the particular
 
-  * extension type.
 
-  *
 
-  * The extension types defined in this document are:
 
-  *
 
-  * enum {
 
-  *   server_name(0), max_fragment_length(1),
 
-  *   client_certificate_url(2), trusted_ca_keys(3),
 
-  *   truncated_hmac(4), status_request(5), (65535)
 
-  * } ExtensionType;
 
-  *
 
-  * @param c the connection.
 
-  *
 
-  * @return the ClientHello byte buffer.
 
-  */
 
- tls.createClientHello = function(c) {
 
-   // save hello version
 
-   c.session.clientHelloVersion = {
 
-     major: c.version.major,
 
-     minor: c.version.minor
 
-   };
 
-   // create supported cipher suites
 
-   var cipherSuites = forge.util.createBuffer();
 
-   for(var i = 0; i < c.cipherSuites.length; ++i) {
 
-     var cs = c.cipherSuites[i];
 
-     cipherSuites.putByte(cs.id[0]);
 
-     cipherSuites.putByte(cs.id[1]);
 
-   }
 
-   var cSuites = cipherSuites.length();
 
-   // create supported compression methods, null always supported, but
 
-   // also support deflate if connection has inflate and deflate methods
 
-   var compressionMethods = forge.util.createBuffer();
 
-   compressionMethods.putByte(tls.CompressionMethod.none);
 
-   // FIXME: deflate support disabled until issues with raw deflate data
 
-   // without zlib headers are resolved
 
-   /*
 
-   if(c.inflate !== null && c.deflate !== null) {
 
-     compressionMethods.putByte(tls.CompressionMethod.deflate);
 
-   }
 
-   */
 
-   var cMethods = compressionMethods.length();
 
-   // create TLS SNI (server name indication) extension if virtual host
 
-   // has been specified, see RFC 3546
 
-   var extensions = forge.util.createBuffer();
 
-   if(c.virtualHost) {
 
-     // create extension struct
 
-     var ext = forge.util.createBuffer();
 
-     ext.putByte(0x00); // type server_name (ExtensionType is 2 bytes)
 
-     ext.putByte(0x00);
 
-     /* In order to provide the server name, clients MAY include an
 
-      * extension of type "server_name" in the (extended) client hello.
 
-      * The "extension_data" field of this extension SHALL contain
 
-      * "ServerNameList" where:
 
-      *
 
-      * struct {
 
-      *   NameType name_type;
 
-      *   select(name_type) {
 
-      *     case host_name: HostName;
 
-      *   } name;
 
-      * } ServerName;
 
-      *
 
-      * enum {
 
-      *   host_name(0), (255)
 
-      * } NameType;
 
-      *
 
-      * opaque HostName<1..2^16-1>;
 
-      *
 
-      * struct {
 
-      *   ServerName server_name_list<1..2^16-1>
 
-      * } ServerNameList;
 
-      */
 
-     var serverName = forge.util.createBuffer();
 
-     serverName.putByte(0x00); // type host_name
 
-     writeVector(serverName, 2, forge.util.createBuffer(c.virtualHost));
 
-     // ServerNameList is in extension_data
 
-     var snList = forge.util.createBuffer();
 
-     writeVector(snList, 2, serverName);
 
-     writeVector(ext, 2, snList);
 
-     extensions.putBuffer(ext);
 
-   }
 
-   var extLength = extensions.length();
 
-   if(extLength > 0) {
 
-     // add extension vector length
 
-     extLength += 2;
 
-   }
 
-   // determine length of the handshake message
 
-   // cipher suites and compression methods size will need to be
 
-   // updated if more get added to the list
 
-   var sessionId = c.session.id;
 
-   var length =
 
-     sessionId.length + 1 + // session ID vector
 
-     2 +                    // version (major + minor)
 
-     4 + 28 +               // random time and random bytes
 
-     2 + cSuites +          // cipher suites vector
 
-     1 + cMethods +         // compression methods vector
 
-     extLength;             // extensions vector
 
-   // build record fragment
 
-   var rval = forge.util.createBuffer();
 
-   rval.putByte(tls.HandshakeType.client_hello);
 
-   rval.putInt24(length);                     // handshake length
 
-   rval.putByte(c.version.major);             // major version
 
-   rval.putByte(c.version.minor);             // minor version
 
-   rval.putBytes(c.session.sp.client_random); // random time + bytes
 
-   writeVector(rval, 1, forge.util.createBuffer(sessionId));
 
-   writeVector(rval, 2, cipherSuites);
 
-   writeVector(rval, 1, compressionMethods);
 
-   if(extLength > 0) {
 
-     writeVector(rval, 2, extensions);
 
-   }
 
-   return rval;
 
- };
 
- /**
 
-  * Creates a ServerHello message.
 
-  *
 
-  * @param c the connection.
 
-  *
 
-  * @return the ServerHello byte buffer.
 
-  */
 
- tls.createServerHello = function(c) {
 
-   // determine length of the handshake message
 
-   var sessionId = c.session.id;
 
-   var length =
 
-     sessionId.length + 1 + // session ID vector
 
-     2 +                    // version (major + minor)
 
-     4 + 28 +               // random time and random bytes
 
-     2 +                    // chosen cipher suite
 
-     1;                     // chosen compression method
 
-   // build record fragment
 
-   var rval = forge.util.createBuffer();
 
-   rval.putByte(tls.HandshakeType.server_hello);
 
-   rval.putInt24(length);                     // handshake length
 
-   rval.putByte(c.version.major);             // major version
 
-   rval.putByte(c.version.minor);             // minor version
 
-   rval.putBytes(c.session.sp.server_random); // random time + bytes
 
-   writeVector(rval, 1, forge.util.createBuffer(sessionId));
 
-   rval.putByte(c.session.cipherSuite.id[0]);
 
-   rval.putByte(c.session.cipherSuite.id[1]);
 
-   rval.putByte(c.session.compressionMethod);
 
-   return rval;
 
- };
 
- /**
 
-  * Creates a Certificate message.
 
-  *
 
-  * When this message will be sent:
 
-  *   This is the first message the client can send after receiving a server
 
-  *   hello done message and the first message the server can send after
 
-  *   sending a ServerHello. This client message is only sent if the server
 
-  *   requests a certificate. If no suitable certificate is available, the
 
-  *   client should send a certificate message containing no certificates. If
 
-  *   client authentication is required by the server for the handshake to
 
-  *   continue, it may respond with a fatal handshake failure alert.
 
-  *
 
-  * opaque ASN.1Cert<1..2^24-1>;
 
-  *
 
-  * struct {
 
-  *   ASN.1Cert certificate_list<0..2^24-1>;
 
-  * } Certificate;
 
-  *
 
-  * @param c the connection.
 
-  *
 
-  * @return the Certificate byte buffer.
 
-  */
 
- tls.createCertificate = function(c) {
 
-   // TODO: check certificate request to ensure types are supported
 
-   // get a certificate (a certificate as a PEM string)
 
-   var client = (c.entity === tls.ConnectionEnd.client);
 
-   var cert = null;
 
-   if(c.getCertificate) {
 
-     var hint;
 
-     if(client) {
 
-       hint = c.session.certificateRequest;
 
-     } else {
 
-       hint = c.session.extensions.server_name.serverNameList;
 
-     }
 
-     cert = c.getCertificate(c, hint);
 
-   }
 
-   // buffer to hold certificate list
 
-   var certList = forge.util.createBuffer();
 
-   if(cert !== null) {
 
-     try {
 
-       // normalize cert to a chain of certificates
 
-       if(!forge.util.isArray(cert)) {
 
-         cert = [cert];
 
-       }
 
-       var asn1 = null;
 
-       for(var i = 0; i < cert.length; ++i) {
 
-         var msg = forge.pem.decode(cert[i])[0];
 
-         if(msg.type !== 'CERTIFICATE' &&
 
-           msg.type !== 'X509 CERTIFICATE' &&
 
-           msg.type !== 'TRUSTED CERTIFICATE') {
 
-           var error = new Error('Could not convert certificate from PEM; PEM ' +
 
-             'header type is not "CERTIFICATE", "X509 CERTIFICATE", or ' +
 
-             '"TRUSTED CERTIFICATE".');
 
-           error.headerType = msg.type;
 
-           throw error;
 
-         }
 
-         if(msg.procType && msg.procType.type === 'ENCRYPTED') {
 
-           throw new Error('Could not convert certificate from PEM; PEM is encrypted.');
 
-         }
 
-         var der = forge.util.createBuffer(msg.body);
 
-         if(asn1 === null) {
 
-           asn1 = forge.asn1.fromDer(der.bytes(), false);
 
-         }
 
-         // certificate entry is itself a vector with 3 length bytes
 
-         var certBuffer = forge.util.createBuffer();
 
-         writeVector(certBuffer, 3, der);
 
-         // add cert vector to cert list vector
 
-         certList.putBuffer(certBuffer);
 
-       }
 
-       // save certificate
 
-       cert = forge.pki.certificateFromAsn1(asn1);
 
-       if(client) {
 
-         c.session.clientCertificate = cert;
 
-       } else {
 
-         c.session.serverCertificate = cert;
 
-       }
 
-     } catch(ex) {
 
-       return c.error(c, {
 
-         message: 'Could not send certificate list.',
 
-         cause: ex,
 
-         send: true,
 
-         alert: {
 
-           level: tls.Alert.Level.fatal,
 
-           description: tls.Alert.Description.bad_certificate
 
-         }
 
-       });
 
-     }
 
-   }
 
-   // determine length of the handshake message
 
-   var length = 3 + certList.length(); // cert list vector
 
-   // build record fragment
 
-   var rval = forge.util.createBuffer();
 
-   rval.putByte(tls.HandshakeType.certificate);
 
-   rval.putInt24(length);
 
-   writeVector(rval, 3, certList);
 
-   return rval;
 
- };
 
- /**
 
-  * Creates a ClientKeyExchange message.
 
-  *
 
-  * When this message will be sent:
 
-  *   This message is always sent by the client. It will immediately follow the
 
-  *   client certificate message, if it is sent. Otherwise it will be the first
 
-  *   message sent by the client after it receives the server hello done
 
-  *   message.
 
-  *
 
-  * Meaning of this message:
 
-  *   With this message, the premaster secret is set, either though direct
 
-  *   transmission of the RSA-encrypted secret, or by the transmission of
 
-  *   Diffie-Hellman parameters which will allow each side to agree upon the
 
-  *   same premaster secret. When the key exchange method is DH_RSA or DH_DSS,
 
-  *   client certification has been requested, and the client was able to
 
-  *   respond with a certificate which contained a Diffie-Hellman public key
 
-  *   whose parameters (group and generator) matched those specified by the
 
-  *   server in its certificate, this message will not contain any data.
 
-  *
 
-  * Meaning of this message:
 
-  *   If RSA is being used for key agreement and authentication, the client
 
-  *   generates a 48-byte premaster secret, encrypts it using the public key
 
-  *   from the server's certificate or the temporary RSA key provided in a
 
-  *   server key exchange message, and sends the result in an encrypted
 
-  *   premaster secret message. This structure is a variant of the client
 
-  *   key exchange message, not a message in itself.
 
-  *
 
-  * struct {
 
-  *   select(KeyExchangeAlgorithm) {
 
-  *     case rsa: EncryptedPreMasterSecret;
 
-  *     case diffie_hellman: ClientDiffieHellmanPublic;
 
-  *   } exchange_keys;
 
-  * } ClientKeyExchange;
 
-  *
 
-  * struct {
 
-  *   ProtocolVersion client_version;
 
-  *   opaque random[46];
 
-  * } PreMasterSecret;
 
-  *
 
-  * struct {
 
-  *   public-key-encrypted PreMasterSecret pre_master_secret;
 
-  * } EncryptedPreMasterSecret;
 
-  *
 
-  * A public-key-encrypted element is encoded as a vector <0..2^16-1>.
 
-  *
 
-  * @param c the connection.
 
-  *
 
-  * @return the ClientKeyExchange byte buffer.
 
-  */
 
- tls.createClientKeyExchange = function(c) {
 
-   // create buffer to encrypt
 
-   var b = forge.util.createBuffer();
 
-   // add highest client-supported protocol to help server avoid version
 
-   // rollback attacks
 
-   b.putByte(c.session.clientHelloVersion.major);
 
-   b.putByte(c.session.clientHelloVersion.minor);
 
-   // generate and add 46 random bytes
 
-   b.putBytes(forge.random.getBytes(46));
 
-   // save pre-master secret
 
-   var sp = c.session.sp;
 
-   sp.pre_master_secret = b.getBytes();
 
-   // RSA-encrypt the pre-master secret
 
-   var key = c.session.serverCertificate.publicKey;
 
-   b = key.encrypt(sp.pre_master_secret);
 
-   /* Note: The encrypted pre-master secret will be stored in a
 
-     public-key-encrypted opaque vector that has the length prefixed using
 
-     2 bytes, so include those 2 bytes in the handshake message length. This
 
-     is done as a minor optimization instead of calling writeVector(). */
 
-   // determine length of the handshake message
 
-   var length = b.length + 2;
 
-   // build record fragment
 
-   var rval = forge.util.createBuffer();
 
-   rval.putByte(tls.HandshakeType.client_key_exchange);
 
-   rval.putInt24(length);
 
-   // add vector length bytes
 
-   rval.putInt16(b.length);
 
-   rval.putBytes(b);
 
-   return rval;
 
- };
 
- /**
 
-  * Creates a ServerKeyExchange message.
 
-  *
 
-  * @param c the connection.
 
-  *
 
-  * @return the ServerKeyExchange byte buffer.
 
-  */
 
- tls.createServerKeyExchange = function(c) {
 
-   // this implementation only supports RSA, no Diffie-Hellman support,
 
-   // so this record is empty
 
-   // determine length of the handshake message
 
-   var length = 0;
 
-   // build record fragment
 
-   var rval = forge.util.createBuffer();
 
-   if(length > 0) {
 
-     rval.putByte(tls.HandshakeType.server_key_exchange);
 
-     rval.putInt24(length);
 
-   }
 
-   return rval;
 
- };
 
- /**
 
-  * Gets the signed data used to verify a client-side certificate. See
 
-  * tls.createCertificateVerify() for details.
 
-  *
 
-  * @param c the connection.
 
-  * @param callback the callback to call once the signed data is ready.
 
-  */
 
- tls.getClientSignature = function(c, callback) {
 
-   // generate data to RSA encrypt
 
-   var b = forge.util.createBuffer();
 
-   b.putBuffer(c.session.md5.digest());
 
-   b.putBuffer(c.session.sha1.digest());
 
-   b = b.getBytes();
 
-   // create default signing function as necessary
 
-   c.getSignature = c.getSignature || function(c, b, callback) {
 
-     // do rsa encryption, call callback
 
-     var privateKey = null;
 
-     if(c.getPrivateKey) {
 
-       try {
 
-         privateKey = c.getPrivateKey(c, c.session.clientCertificate);
 
-         privateKey = forge.pki.privateKeyFromPem(privateKey);
 
-       } catch(ex) {
 
-         c.error(c, {
 
-           message: 'Could not get private key.',
 
-           cause: ex,
 
-           send: true,
 
-           alert: {
 
-             level: tls.Alert.Level.fatal,
 
-             description: tls.Alert.Description.internal_error
 
-           }
 
-         });
 
-       }
 
-     }
 
-     if(privateKey === null) {
 
-       c.error(c, {
 
-         message: 'No private key set.',
 
-         send: true,
 
-         alert: {
 
-           level: tls.Alert.Level.fatal,
 
-           description: tls.Alert.Description.internal_error
 
-         }
 
-       });
 
-     } else {
 
-       b = privateKey.sign(b, null);
 
-     }
 
-     callback(c, b);
 
-   };
 
-   // get client signature
 
-   c.getSignature(c, b, callback);
 
- };
 
- /**
 
-  * Creates a CertificateVerify message.
 
-  *
 
-  * Meaning of this message:
 
-  *   This structure conveys the client's Diffie-Hellman public value
 
-  *   (Yc) if it was not already included in the client's certificate.
 
-  *   The encoding used for Yc is determined by the enumerated
 
-  *   PublicValueEncoding. This structure is a variant of the client
 
-  *   key exchange message, not a message in itself.
 
-  *
 
-  * When this message will be sent:
 
-  *   This message is used to provide explicit verification of a client
 
-  *   certificate. This message is only sent following a client
 
-  *   certificate that has signing capability (i.e. all certificates
 
-  *   except those containing fixed Diffie-Hellman parameters). When
 
-  *   sent, it will immediately follow the client key exchange message.
 
-  *
 
-  * struct {
 
-  *   Signature signature;
 
-  * } CertificateVerify;
 
-  *
 
-  * CertificateVerify.signature.md5_hash
 
-  *   MD5(handshake_messages);
 
-  *
 
-  * Certificate.signature.sha_hash
 
-  *   SHA(handshake_messages);
 
-  *
 
-  * Here handshake_messages refers to all handshake messages sent or
 
-  * received starting at client hello up to but not including this
 
-  * message, including the type and length fields of the handshake
 
-  * messages.
 
-  *
 
-  * select(SignatureAlgorithm) {
 
-  *   case anonymous: struct { };
 
-  *   case rsa:
 
-  *     digitally-signed struct {
 
-  *       opaque md5_hash[16];
 
-  *       opaque sha_hash[20];
 
-  *     };
 
-  *   case dsa:
 
-  *     digitally-signed struct {
 
-  *       opaque sha_hash[20];
 
-  *     };
 
-  * } Signature;
 
-  *
 
-  * In digital signing, one-way hash functions are used as input for a
 
-  * signing algorithm. A digitally-signed element is encoded as an opaque
 
-  * vector <0..2^16-1>, where the length is specified by the signing
 
-  * algorithm and key.
 
-  *
 
-  * In RSA signing, a 36-byte structure of two hashes (one SHA and one
 
-  * MD5) is signed (encrypted with the private key). It is encoded with
 
-  * PKCS #1 block type 0 or type 1 as described in [PKCS1].
 
-  *
 
-  * In DSS, the 20 bytes of the SHA hash are run directly through the
 
-  * Digital Signing Algorithm with no additional hashing.
 
-  *
 
-  * @param c the connection.
 
-  * @param signature the signature to include in the message.
 
-  *
 
-  * @return the CertificateVerify byte buffer.
 
-  */
 
- tls.createCertificateVerify = function(c, signature) {
 
-   /* Note: The signature will be stored in a "digitally-signed" opaque
 
-     vector that has the length prefixed using 2 bytes, so include those
 
-     2 bytes in the handshake message length. This is done as a minor
 
-     optimization instead of calling writeVector(). */
 
-   // determine length of the handshake message
 
-   var length = signature.length + 2;
 
-   // build record fragment
 
-   var rval = forge.util.createBuffer();
 
-   rval.putByte(tls.HandshakeType.certificate_verify);
 
-   rval.putInt24(length);
 
-   // add vector length bytes
 
-   rval.putInt16(signature.length);
 
-   rval.putBytes(signature);
 
-   return rval;
 
- };
 
- /**
 
-  * Creates a CertificateRequest message.
 
-  *
 
-  * @param c the connection.
 
-  *
 
-  * @return the CertificateRequest byte buffer.
 
-  */
 
- tls.createCertificateRequest = function(c) {
 
-   // TODO: support other certificate types
 
-   var certTypes = forge.util.createBuffer();
 
-   // common RSA certificate type
 
-   certTypes.putByte(0x01);
 
-   // add distinguished names from CA store
 
-   var cAs = forge.util.createBuffer();
 
-   for(var key in c.caStore.certs) {
 
-     var cert = c.caStore.certs[key];
 
-     var dn = forge.pki.distinguishedNameToAsn1(cert.subject);
 
-     var byteBuffer = forge.asn1.toDer(dn);
 
-     cAs.putInt16(byteBuffer.length());
 
-     cAs.putBuffer(byteBuffer);
 
-   }
 
-   // TODO: TLS 1.2+ has a different format
 
-   // determine length of the handshake message
 
-   var length =
 
-     1 + certTypes.length() +
 
-     2 + cAs.length();
 
-   // build record fragment
 
-   var rval = forge.util.createBuffer();
 
-   rval.putByte(tls.HandshakeType.certificate_request);
 
-   rval.putInt24(length);
 
-   writeVector(rval, 1, certTypes);
 
-   writeVector(rval, 2, cAs);
 
-   return rval;
 
- };
 
- /**
 
-  * Creates a ServerHelloDone message.
 
-  *
 
-  * @param c the connection.
 
-  *
 
-  * @return the ServerHelloDone byte buffer.
 
-  */
 
- tls.createServerHelloDone = function(c) {
 
-   // build record fragment
 
-   var rval = forge.util.createBuffer();
 
-   rval.putByte(tls.HandshakeType.server_hello_done);
 
-   rval.putInt24(0);
 
-   return rval;
 
- };
 
- /**
 
-  * Creates a ChangeCipherSpec message.
 
-  *
 
-  * The change cipher spec protocol exists to signal transitions in
 
-  * ciphering strategies. The protocol consists of a single message,
 
-  * which is encrypted and compressed under the current (not the pending)
 
-  * connection state. The message consists of a single byte of value 1.
 
-  *
 
-  * struct {
 
-  *   enum { change_cipher_spec(1), (255) } type;
 
-  * } ChangeCipherSpec;
 
-  *
 
-  * @return the ChangeCipherSpec byte buffer.
 
-  */
 
- tls.createChangeCipherSpec = function() {
 
-   var rval = forge.util.createBuffer();
 
-   rval.putByte(0x01);
 
-   return rval;
 
- };
 
- /**
 
-  * Creates a Finished message.
 
-  *
 
-  * struct {
 
-  *   opaque verify_data[12];
 
-  * } Finished;
 
-  *
 
-  * verify_data
 
-  *   PRF(master_secret, finished_label, MD5(handshake_messages) +
 
-  *   SHA-1(handshake_messages)) [0..11];
 
-  *
 
-  * finished_label
 
-  *   For Finished messages sent by the client, the string "client
 
-  *   finished". For Finished messages sent by the server, the
 
-  *   string "server finished".
 
-  *
 
-  * handshake_messages
 
-  *   All of the data from all handshake messages up to but not
 
-  *   including this message. This is only data visible at the
 
-  *   handshake layer and does not include record layer headers.
 
-  *   This is the concatenation of all the Handshake structures as
 
-  *   defined in 7.4 exchanged thus far.
 
-  *
 
-  * @param c the connection.
 
-  *
 
-  * @return the Finished byte buffer.
 
-  */
 
- tls.createFinished = function(c) {
 
-   // generate verify_data
 
-   var b = forge.util.createBuffer();
 
-   b.putBuffer(c.session.md5.digest());
 
-   b.putBuffer(c.session.sha1.digest());
 
-   // TODO: determine prf function and verify length for TLS 1.2
 
-   var client = (c.entity === tls.ConnectionEnd.client);
 
-   var sp = c.session.sp;
 
-   var vdl = 12;
 
-   var prf = prf_TLS1;
 
-   var label = client ? 'client finished' : 'server finished';
 
-   b = prf(sp.master_secret, label, b.getBytes(), vdl);
 
-   // build record fragment
 
-   var rval = forge.util.createBuffer();
 
-   rval.putByte(tls.HandshakeType.finished);
 
-   rval.putInt24(b.length());
 
-   rval.putBuffer(b);
 
-   return rval;
 
- };
 
- /**
 
-  * Creates a HeartbeatMessage (See RFC 6520).
 
-  *
 
-  * struct {
 
-  *   HeartbeatMessageType type;
 
-  *   uint16 payload_length;
 
-  *   opaque payload[HeartbeatMessage.payload_length];
 
-  *   opaque padding[padding_length];
 
-  * } HeartbeatMessage;
 
-  *
 
-  * The total length of a HeartbeatMessage MUST NOT exceed 2^14 or
 
-  * max_fragment_length when negotiated as defined in [RFC6066].
 
-  *
 
-  * type: The message type, either heartbeat_request or heartbeat_response.
 
-  *
 
-  * payload_length: The length of the payload.
 
-  *
 
-  * payload: The payload consists of arbitrary content.
 
-  *
 
-  * padding: The padding is random content that MUST be ignored by the
 
-  *   receiver. The length of a HeartbeatMessage is TLSPlaintext.length
 
-  *   for TLS and DTLSPlaintext.length for DTLS. Furthermore, the
 
-  *   length of the type field is 1 byte, and the length of the
 
-  *   payload_length is 2. Therefore, the padding_length is
 
-  *   TLSPlaintext.length - payload_length - 3 for TLS and
 
-  *   DTLSPlaintext.length - payload_length - 3 for DTLS. The
 
-  *   padding_length MUST be at least 16.
 
-  *
 
-  * The sender of a HeartbeatMessage MUST use a random padding of at
 
-  * least 16 bytes. The padding of a received HeartbeatMessage message
 
-  * MUST be ignored.
 
-  *
 
-  * If the payload_length of a received HeartbeatMessage is too large,
 
-  * the received HeartbeatMessage MUST be discarded silently.
 
-  *
 
-  * @param c the connection.
 
-  * @param type the tls.HeartbeatMessageType.
 
-  * @param payload the heartbeat data to send as the payload.
 
-  * @param [payloadLength] the payload length to use, defaults to the
 
-  *          actual payload length.
 
-  *
 
-  * @return the HeartbeatRequest byte buffer.
 
-  */
 
- tls.createHeartbeat = function(type, payload, payloadLength) {
 
-   if(typeof payloadLength === 'undefined') {
 
-     payloadLength = payload.length;
 
-   }
 
-   // build record fragment
 
-   var rval = forge.util.createBuffer();
 
-   rval.putByte(type);               // heartbeat message type
 
-   rval.putInt16(payloadLength);     // payload length
 
-   rval.putBytes(payload);           // payload
 
-   // padding
 
-   var plaintextLength = rval.length();
 
-   var paddingLength = Math.max(16, plaintextLength - payloadLength - 3);
 
-   rval.putBytes(forge.random.getBytes(paddingLength));
 
-   return rval;
 
- };
 
- /**
 
-  * Fragments, compresses, encrypts, and queues a record for delivery.
 
-  *
 
-  * @param c the connection.
 
-  * @param record the record to queue.
 
-  */
 
- tls.queue = function(c, record) {
 
-   // error during record creation
 
-   if(!record) {
 
-     return;
 
-   }
 
-   if(record.fragment.length() === 0) {
 
-     if(record.type === tls.ContentType.handshake ||
 
-       record.type === tls.ContentType.alert ||
 
-       record.type === tls.ContentType.change_cipher_spec) {
 
-       // Empty handshake, alert of change cipher spec messages are not allowed per the TLS specification and should not be sent.
 
-       return;
 
-     }
 
-   }
 
-   // if the record is a handshake record, update handshake hashes
 
-   if(record.type === tls.ContentType.handshake) {
 
-     var bytes = record.fragment.bytes();
 
-     c.session.md5.update(bytes);
 
-     c.session.sha1.update(bytes);
 
-     bytes = null;
 
-   }
 
-   // handle record fragmentation
 
-   var records;
 
-   if(record.fragment.length() <= tls.MaxFragment) {
 
-     records = [record];
 
-   } else {
 
-     // fragment data as long as it is too long
 
-     records = [];
 
-     var data = record.fragment.bytes();
 
-     while(data.length > tls.MaxFragment) {
 
-       records.push(tls.createRecord(c, {
 
-         type: record.type,
 
-         data: forge.util.createBuffer(data.slice(0, tls.MaxFragment))
 
-       }));
 
-       data = data.slice(tls.MaxFragment);
 
-     }
 
-     // add last record
 
-     if(data.length > 0) {
 
-       records.push(tls.createRecord(c, {
 
-         type: record.type,
 
-         data: forge.util.createBuffer(data)
 
-       }));
 
-     }
 
-   }
 
-   // compress and encrypt all fragmented records
 
-   for(var i = 0; i < records.length && !c.fail; ++i) {
 
-     // update the record using current write state
 
-     var rec = records[i];
 
-     var s = c.state.current.write;
 
-     if(s.update(c, rec)) {
 
-       // store record
 
-       c.records.push(rec);
 
-     }
 
-   }
 
- };
 
- /**
 
-  * Flushes all queued records to the output buffer and calls the
 
-  * tlsDataReady() handler on the given connection.
 
-  *
 
-  * @param c the connection.
 
-  *
 
-  * @return true on success, false on failure.
 
-  */
 
- tls.flush = function(c) {
 
-   for(var i = 0; i < c.records.length; ++i) {
 
-     var record = c.records[i];
 
-     // add record header and fragment
 
-     c.tlsData.putByte(record.type);
 
-     c.tlsData.putByte(record.version.major);
 
-     c.tlsData.putByte(record.version.minor);
 
-     c.tlsData.putInt16(record.fragment.length());
 
-     c.tlsData.putBuffer(c.records[i].fragment);
 
-   }
 
-   c.records = [];
 
-   return c.tlsDataReady(c);
 
- };
 
- /**
 
-  * Maps a pki.certificateError to a tls.Alert.Description.
 
-  *
 
-  * @param error the error to map.
 
-  *
 
-  * @return the alert description.
 
-  */
 
- var _certErrorToAlertDesc = function(error) {
 
-   switch(error) {
 
-   case true:
 
-     return true;
 
-   case forge.pki.certificateError.bad_certificate:
 
-     return tls.Alert.Description.bad_certificate;
 
-   case forge.pki.certificateError.unsupported_certificate:
 
-     return tls.Alert.Description.unsupported_certificate;
 
-   case forge.pki.certificateError.certificate_revoked:
 
-     return tls.Alert.Description.certificate_revoked;
 
-   case forge.pki.certificateError.certificate_expired:
 
-     return tls.Alert.Description.certificate_expired;
 
-   case forge.pki.certificateError.certificate_unknown:
 
-     return tls.Alert.Description.certificate_unknown;
 
-   case forge.pki.certificateError.unknown_ca:
 
-     return tls.Alert.Description.unknown_ca;
 
-   default:
 
-     return tls.Alert.Description.bad_certificate;
 
-   }
 
- };
 
- /**
 
-  * Maps a tls.Alert.Description to a pki.certificateError.
 
-  *
 
-  * @param desc the alert description.
 
-  *
 
-  * @return the certificate error.
 
-  */
 
- var _alertDescToCertError = function(desc) {
 
-   switch(desc) {
 
-   case true:
 
-     return true;
 
-   case tls.Alert.Description.bad_certificate:
 
-     return forge.pki.certificateError.bad_certificate;
 
-   case tls.Alert.Description.unsupported_certificate:
 
-     return forge.pki.certificateError.unsupported_certificate;
 
-   case tls.Alert.Description.certificate_revoked:
 
-     return forge.pki.certificateError.certificate_revoked;
 
-   case tls.Alert.Description.certificate_expired:
 
-     return forge.pki.certificateError.certificate_expired;
 
-   case tls.Alert.Description.certificate_unknown:
 
-     return forge.pki.certificateError.certificate_unknown;
 
-   case tls.Alert.Description.unknown_ca:
 
-     return forge.pki.certificateError.unknown_ca;
 
-   default:
 
-     return forge.pki.certificateError.bad_certificate;
 
-   }
 
- };
 
- /**
 
-  * Verifies a certificate chain against the given connection's
 
-  * Certificate Authority store.
 
-  *
 
-  * @param c the TLS connection.
 
-  * @param chain the certificate chain to verify, with the root or highest
 
-  *          authority at the end.
 
-  *
 
-  * @return true if successful, false if not.
 
-  */
 
- tls.verifyCertificateChain = function(c, chain) {
 
-   try {
 
-     // Make a copy of c.verifyOptions so that we can modify options.verify
 
-     // without modifying c.verifyOptions.
 
-     var options = {};
 
-     for (var key in c.verifyOptions) {
 
-       options[key] = c.verifyOptions[key];
 
-     }
 
-     options.verify = function(vfd, depth, chain) {
 
-       // convert pki.certificateError to tls alert description
 
-       var desc = _certErrorToAlertDesc(vfd);
 
-       // call application callback
 
-       var ret = c.verify(c, vfd, depth, chain);
 
-       if(ret !== true) {
 
-         if(typeof ret === 'object' && !forge.util.isArray(ret)) {
 
-           // throw custom error
 
-           var error = new Error('The application rejected the certificate.');
 
-           error.send = true;
 
-           error.alert = {
 
-             level: tls.Alert.Level.fatal,
 
-             description: tls.Alert.Description.bad_certificate
 
-           };
 
-           if(ret.message) {
 
-             error.message = ret.message;
 
-           }
 
-           if(ret.alert) {
 
-             error.alert.description = ret.alert;
 
-           }
 
-           throw error;
 
-         }
 
-         // convert tls alert description to pki.certificateError
 
-         if(ret !== vfd) {
 
-           ret = _alertDescToCertError(ret);
 
-         }
 
-       }
 
-       return ret;
 
-     };
 
-     // verify chain
 
-     forge.pki.verifyCertificateChain(c.caStore, chain, options);
 
-   } catch(ex) {
 
-     // build tls error if not already customized
 
-     var err = ex;
 
-     if(typeof err !== 'object' || forge.util.isArray(err)) {
 
-       err = {
 
-         send: true,
 
-         alert: {
 
-           level: tls.Alert.Level.fatal,
 
-           description: _certErrorToAlertDesc(ex)
 
-         }
 
-       };
 
-     }
 
-     if(!('send' in err)) {
 
-       err.send = true;
 
-     }
 
-     if(!('alert' in err)) {
 
-       err.alert = {
 
-         level: tls.Alert.Level.fatal,
 
-         description: _certErrorToAlertDesc(err.error)
 
-       };
 
-     }
 
-     // send error
 
-     c.error(c, err);
 
-   }
 
-   return !c.fail;
 
- };
 
- /**
 
-  * Creates a new TLS session cache.
 
-  *
 
-  * @param cache optional map of session ID to cached session.
 
-  * @param capacity the maximum size for the cache (default: 100).
 
-  *
 
-  * @return the new TLS session cache.
 
-  */
 
- tls.createSessionCache = function(cache, capacity) {
 
-   var rval = null;
 
-   // assume input is already a session cache object
 
-   if(cache && cache.getSession && cache.setSession && cache.order) {
 
-     rval = cache;
 
-   } else {
 
-     // create cache
 
-     rval = {};
 
-     rval.cache = cache || {};
 
-     rval.capacity = Math.max(capacity || 100, 1);
 
-     rval.order = [];
 
-     // store order for sessions, delete session overflow
 
-     for(var key in cache) {
 
-       if(rval.order.length <= capacity) {
 
-         rval.order.push(key);
 
-       } else {
 
-         delete cache[key];
 
-       }
 
-     }
 
-     // get a session from a session ID (or get any session)
 
-     rval.getSession = function(sessionId) {
 
-       var session = null;
 
-       var key = null;
 
-       // if session ID provided, use it
 
-       if(sessionId) {
 
-         key = forge.util.bytesToHex(sessionId);
 
-       } else if(rval.order.length > 0) {
 
-         // get first session from cache
 
-         key = rval.order[0];
 
-       }
 
-       if(key !== null && key in rval.cache) {
 
-         // get cached session and remove from cache
 
-         session = rval.cache[key];
 
-         delete rval.cache[key];
 
-         for(var i in rval.order) {
 
-           if(rval.order[i] === key) {
 
-             rval.order.splice(i, 1);
 
-             break;
 
-           }
 
-         }
 
-       }
 
-       return session;
 
-     };
 
-     // set a session in the cache
 
-     rval.setSession = function(sessionId, session) {
 
-       // remove session from cache if at capacity
 
-       if(rval.order.length === rval.capacity) {
 
-         var key = rval.order.shift();
 
-         delete rval.cache[key];
 
-       }
 
-       // add session to cache
 
-       var key = forge.util.bytesToHex(sessionId);
 
-       rval.order.push(key);
 
-       rval.cache[key] = session;
 
-     };
 
-   }
 
-   return rval;
 
- };
 
- /**
 
-  * Creates a new TLS connection.
 
-  *
 
-  * See public createConnection() docs for more details.
 
-  *
 
-  * @param options the options for this connection.
 
-  *
 
-  * @return the new TLS connection.
 
-  */
 
- tls.createConnection = function(options) {
 
-   var caStore = null;
 
-   if(options.caStore) {
 
-     // if CA store is an array, convert it to a CA store object
 
-     if(forge.util.isArray(options.caStore)) {
 
-       caStore = forge.pki.createCaStore(options.caStore);
 
-     } else {
 
-       caStore = options.caStore;
 
-     }
 
-   } else {
 
-     // create empty CA store
 
-     caStore = forge.pki.createCaStore();
 
-   }
 
-   // setup default cipher suites
 
-   var cipherSuites = options.cipherSuites || null;
 
-   if(cipherSuites === null) {
 
-     cipherSuites = [];
 
-     for(var key in tls.CipherSuites) {
 
-       cipherSuites.push(tls.CipherSuites[key]);
 
-     }
 
-   }
 
-   // set default entity
 
-   var entity = (options.server || false) ?
 
-     tls.ConnectionEnd.server : tls.ConnectionEnd.client;
 
-   // create session cache if requested
 
-   var sessionCache = options.sessionCache ?
 
-     tls.createSessionCache(options.sessionCache) : null;
 
-   // create TLS connection
 
-   var c = {
 
-     version: {major: tls.Version.major, minor: tls.Version.minor},
 
-     entity: entity,
 
-     sessionId: options.sessionId,
 
-     caStore: caStore,
 
-     sessionCache: sessionCache,
 
-     cipherSuites: cipherSuites,
 
-     connected: options.connected,
 
-     virtualHost: options.virtualHost || null,
 
-     verifyClient: options.verifyClient || false,
 
-     verify: options.verify || function(cn, vfd, dpth, cts) {return vfd;},
 
-     verifyOptions: options.verifyOptions || {},
 
-     getCertificate: options.getCertificate || null,
 
-     getPrivateKey: options.getPrivateKey || null,
 
-     getSignature: options.getSignature || null,
 
-     input: forge.util.createBuffer(),
 
-     tlsData: forge.util.createBuffer(),
 
-     data: forge.util.createBuffer(),
 
-     tlsDataReady: options.tlsDataReady,
 
-     dataReady: options.dataReady,
 
-     heartbeatReceived: options.heartbeatReceived,
 
-     closed: options.closed,
 
-     error: function(c, ex) {
 
-       // set origin if not set
 
-       ex.origin = ex.origin ||
 
-         ((c.entity === tls.ConnectionEnd.client) ? 'client' : 'server');
 
-       // send TLS alert
 
-       if(ex.send) {
 
-         tls.queue(c, tls.createAlert(c, ex.alert));
 
-         tls.flush(c);
 
-       }
 
-       // error is fatal by default
 
-       var fatal = (ex.fatal !== false);
 
-       if(fatal) {
 
-         // set fail flag
 
-         c.fail = true;
 
-       }
 
-       // call error handler first
 
-       options.error(c, ex);
 
-       if(fatal) {
 
-         // fatal error, close connection, do not clear fail
 
-         c.close(false);
 
-       }
 
-     },
 
-     deflate: options.deflate || null,
 
-     inflate: options.inflate || null
 
-   };
 
-   /**
 
-    * Resets a closed TLS connection for reuse. Called in c.close().
 
-    *
 
-    * @param clearFail true to clear the fail flag (default: true).
 
-    */
 
-   c.reset = function(clearFail) {
 
-     c.version = {major: tls.Version.major, minor: tls.Version.minor};
 
-     c.record = null;
 
-     c.session = null;
 
-     c.peerCertificate = null;
 
-     c.state = {
 
-       pending: null,
 
-       current: null
 
-     };
 
-     c.expect = (c.entity === tls.ConnectionEnd.client) ? SHE : CHE;
 
-     c.fragmented = null;
 
-     c.records = [];
 
-     c.open = false;
 
-     c.handshakes = 0;
 
-     c.handshaking = false;
 
-     c.isConnected = false;
 
-     c.fail = !(clearFail || typeof(clearFail) === 'undefined');
 
-     c.input.clear();
 
-     c.tlsData.clear();
 
-     c.data.clear();
 
-     c.state.current = tls.createConnectionState(c);
 
-   };
 
-   // do initial reset of connection
 
-   c.reset();
 
-   /**
 
-    * Updates the current TLS engine state based on the given record.
 
-    *
 
-    * @param c the TLS connection.
 
-    * @param record the TLS record to act on.
 
-    */
 
-   var _update = function(c, record) {
 
-     // get record handler (align type in table by subtracting lowest)
 
-     var aligned = record.type - tls.ContentType.change_cipher_spec;
 
-     var handlers = ctTable[c.entity][c.expect];
 
-     if(aligned in handlers) {
 
-       handlers[aligned](c, record);
 
-     } else {
 
-       // unexpected record
 
-       tls.handleUnexpected(c, record);
 
-     }
 
-   };
 
-   /**
 
-    * Reads the record header and initializes the next record on the given
 
-    * connection.
 
-    *
 
-    * @param c the TLS connection with the next record.
 
-    *
 
-    * @return 0 if the input data could be processed, otherwise the
 
-    *         number of bytes required for data to be processed.
 
-    */
 
-   var _readRecordHeader = function(c) {
 
-     var rval = 0;
 
-     // get input buffer and its length
 
-     var b = c.input;
 
-     var len = b.length();
 
-     // need at least 5 bytes to initialize a record
 
-     if(len < 5) {
 
-       rval = 5 - len;
 
-     } else {
 
-       // enough bytes for header
 
-       // initialize record
 
-       c.record = {
 
-         type: b.getByte(),
 
-         version: {
 
-           major: b.getByte(),
 
-           minor: b.getByte()
 
-         },
 
-         length: b.getInt16(),
 
-         fragment: forge.util.createBuffer(),
 
-         ready: false
 
-       };
 
-       // check record version
 
-       var compatibleVersion = (c.record.version.major === c.version.major);
 
-       if(compatibleVersion && c.session && c.session.version) {
 
-         // session version already set, require same minor version
 
-         compatibleVersion = (c.record.version.minor === c.version.minor);
 
-       }
 
-       if(!compatibleVersion) {
 
-         c.error(c, {
 
-           message: 'Incompatible TLS version.',
 
-           send: true,
 
-           alert: {
 
-             level: tls.Alert.Level.fatal,
 
-             description: tls.Alert.Description.protocol_version
 
-           }
 
-         });
 
-       }
 
-     }
 
-     return rval;
 
-   };
 
-   /**
 
-    * Reads the next record's contents and appends its message to any
 
-    * previously fragmented message.
 
-    *
 
-    * @param c the TLS connection with the next record.
 
-    *
 
-    * @return 0 if the input data could be processed, otherwise the
 
-    *         number of bytes required for data to be processed.
 
-    */
 
-   var _readRecord = function(c) {
 
-     var rval = 0;
 
-     // ensure there is enough input data to get the entire record
 
-     var b = c.input;
 
-     var len = b.length();
 
-     if(len < c.record.length) {
 
-       // not enough data yet, return how much is required
 
-       rval = c.record.length - len;
 
-     } else {
 
-       // there is enough data to parse the pending record
 
-       // fill record fragment and compact input buffer
 
-       c.record.fragment.putBytes(b.getBytes(c.record.length));
 
-       b.compact();
 
-       // update record using current read state
 
-       var s = c.state.current.read;
 
-       if(s.update(c, c.record)) {
 
-         // see if there is a previously fragmented message that the
 
-         // new record's message fragment should be appended to
 
-         if(c.fragmented !== null) {
 
-           // if the record type matches a previously fragmented
 
-           // record, append the record fragment to it
 
-           if(c.fragmented.type === c.record.type) {
 
-             // concatenate record fragments
 
-             c.fragmented.fragment.putBuffer(c.record.fragment);
 
-             c.record = c.fragmented;
 
-           } else {
 
-             // error, invalid fragmented record
 
-             c.error(c, {
 
-               message: 'Invalid fragmented record.',
 
-               send: true,
 
-               alert: {
 
-                 level: tls.Alert.Level.fatal,
 
-                 description:
 
-                   tls.Alert.Description.unexpected_message
 
-               }
 
-             });
 
-           }
 
-         }
 
-         // record is now ready
 
-         c.record.ready = true;
 
-       }
 
-     }
 
-     return rval;
 
-   };
 
-   /**
 
-    * Performs a handshake using the TLS Handshake Protocol, as a client.
 
-    *
 
-    * This method should only be called if the connection is in client mode.
 
-    *
 
-    * @param sessionId the session ID to use, null to start a new one.
 
-    */
 
-   c.handshake = function(sessionId) {
 
-     // error to call this in non-client mode
 
-     if(c.entity !== tls.ConnectionEnd.client) {
 
-       // not fatal error
 
-       c.error(c, {
 
-         message: 'Cannot initiate handshake as a server.',
 
-         fatal: false
 
-       });
 
-     } else if(c.handshaking) {
 
-       // handshake is already in progress, fail but not fatal error
 
-       c.error(c, {
 
-         message: 'Handshake already in progress.',
 
-         fatal: false
 
-       });
 
-     } else {
 
-       // clear fail flag on reuse
 
-       if(c.fail && !c.open && c.handshakes === 0) {
 
-         c.fail = false;
 
-       }
 
-       // now handshaking
 
-       c.handshaking = true;
 
-       // default to blank (new session)
 
-       sessionId = sessionId || '';
 
-       // if a session ID was specified, try to find it in the cache
 
-       var session = null;
 
-       if(sessionId.length > 0) {
 
-         if(c.sessionCache) {
 
-           session = c.sessionCache.getSession(sessionId);
 
-         }
 
-         // matching session not found in cache, clear session ID
 
-         if(session === null) {
 
-           sessionId = '';
 
-         }
 
-       }
 
-       // no session given, grab a session from the cache, if available
 
-       if(sessionId.length === 0 && c.sessionCache) {
 
-         session = c.sessionCache.getSession();
 
-         if(session !== null) {
 
-           sessionId = session.id;
 
-         }
 
-       }
 
-       // set up session
 
-       c.session = {
 
-         id: sessionId,
 
-         version: null,
 
-         cipherSuite: null,
 
-         compressionMethod: null,
 
-         serverCertificate: null,
 
-         certificateRequest: null,
 
-         clientCertificate: null,
 
-         sp: {},
 
-         md5: forge.md.md5.create(),
 
-         sha1: forge.md.sha1.create()
 
-       };
 
-       // use existing session information
 
-       if(session) {
 
-         // only update version on connection, session version not yet set
 
-         c.version = session.version;
 
-         c.session.sp = session.sp;
 
-       }
 
-       // generate new client random
 
-       c.session.sp.client_random = tls.createRandom().getBytes();
 
-       // connection now open
 
-       c.open = true;
 
-       // send hello
 
-       tls.queue(c, tls.createRecord(c, {
 
-         type: tls.ContentType.handshake,
 
-         data: tls.createClientHello(c)
 
-       }));
 
-       tls.flush(c);
 
-     }
 
-   };
 
-   /**
 
-    * Called when TLS protocol data has been received from somewhere and should
 
-    * be processed by the TLS engine.
 
-    *
 
-    * @param data the TLS protocol data, as a string, to process.
 
-    *
 
-    * @return 0 if the data could be processed, otherwise the number of bytes
 
-    *         required for data to be processed.
 
-    */
 
-   c.process = function(data) {
 
-     var rval = 0;
 
-     // buffer input data
 
-     if(data) {
 
-       c.input.putBytes(data);
 
-     }
 
-     // process next record if no failure, process will be called after
 
-     // each record is handled (since handling can be asynchronous)
 
-     if(!c.fail) {
 
-       // reset record if ready and now empty
 
-       if(c.record !== null &&
 
-         c.record.ready && c.record.fragment.isEmpty()) {
 
-         c.record = null;
 
-       }
 
-       // if there is no pending record, try to read record header
 
-       if(c.record === null) {
 
-         rval = _readRecordHeader(c);
 
-       }
 
-       // read the next record (if record not yet ready)
 
-       if(!c.fail && c.record !== null && !c.record.ready) {
 
-         rval = _readRecord(c);
 
-       }
 
-       // record ready to be handled, update engine state
 
-       if(!c.fail && c.record !== null && c.record.ready) {
 
-         _update(c, c.record);
 
-       }
 
-     }
 
-     return rval;
 
-   };
 
-   /**
 
-    * Requests that application data be packaged into a TLS record. The
 
-    * tlsDataReady handler will be called when the TLS record(s) have been
 
-    * prepared.
 
-    *
 
-    * @param data the application data, as a raw 'binary' encoded string, to
 
-    *          be sent; to send utf-16/utf-8 string data, use the return value
 
-    *          of util.encodeUtf8(str).
 
-    *
 
-    * @return true on success, false on failure.
 
-    */
 
-   c.prepare = function(data) {
 
-     tls.queue(c, tls.createRecord(c, {
 
-       type: tls.ContentType.application_data,
 
-       data: forge.util.createBuffer(data)
 
-     }));
 
-     return tls.flush(c);
 
-   };
 
-   /**
 
-    * Requests that a heartbeat request be packaged into a TLS record for
 
-    * transmission. The tlsDataReady handler will be called when TLS record(s)
 
-    * have been prepared.
 
-    *
 
-    * When a heartbeat response has been received, the heartbeatReceived
 
-    * handler will be called with the matching payload. This handler can
 
-    * be used to clear a retransmission timer, etc.
 
-    *
 
-    * @param payload the heartbeat data to send as the payload in the message.
 
-    * @param [payloadLength] the payload length to use, defaults to the
 
-    *          actual payload length.
 
-    *
 
-    * @return true on success, false on failure.
 
-    */
 
-   c.prepareHeartbeatRequest = function(payload, payloadLength) {
 
-     if(payload instanceof forge.util.ByteBuffer) {
 
-       payload = payload.bytes();
 
-     }
 
-     if(typeof payloadLength === 'undefined') {
 
-       payloadLength = payload.length;
 
-     }
 
-     c.expectedHeartbeatPayload = payload;
 
-     tls.queue(c, tls.createRecord(c, {
 
-       type: tls.ContentType.heartbeat,
 
-       data: tls.createHeartbeat(
 
-         tls.HeartbeatMessageType.heartbeat_request, payload, payloadLength)
 
-     }));
 
-     return tls.flush(c);
 
-   };
 
-   /**
 
-    * Closes the connection (sends a close_notify alert).
 
-    *
 
-    * @param clearFail true to clear the fail flag (default: true).
 
-    */
 
-   c.close = function(clearFail) {
 
-     // save session if connection didn't fail
 
-     if(!c.fail && c.sessionCache && c.session) {
 
-       // only need to preserve session ID, version, and security params
 
-       var session = {
 
-         id: c.session.id,
 
-         version: c.session.version,
 
-         sp: c.session.sp
 
-       };
 
-       session.sp.keys = null;
 
-       c.sessionCache.setSession(session.id, session);
 
-     }
 
-     if(c.open) {
 
-       // connection no longer open, clear input
 
-       c.open = false;
 
-       c.input.clear();
 
-       // if connected or handshaking, send an alert
 
-       if(c.isConnected || c.handshaking) {
 
-         c.isConnected = c.handshaking = false;
 
-         // send close_notify alert
 
-         tls.queue(c, tls.createAlert(c, {
 
-           level: tls.Alert.Level.warning,
 
-           description: tls.Alert.Description.close_notify
 
-         }));
 
-         tls.flush(c);
 
-       }
 
-       // call handler
 
-       c.closed(c);
 
-     }
 
-     // reset TLS connection, do not clear fail flag
 
-     c.reset(clearFail);
 
-   };
 
-   return c;
 
- };
 
- /* TLS API */
 
- module.exports = forge.tls = forge.tls || {};
 
- // expose non-functions
 
- for(var key in tls) {
 
-   if(typeof tls[key] !== 'function') {
 
-     forge.tls[key] = tls[key];
 
-   }
 
- }
 
- // expose prf_tls1 for testing
 
- forge.tls.prf_tls1 = prf_TLS1;
 
- // expose sha1 hmac method
 
- forge.tls.hmac_sha1 = hmac_sha1;
 
- // expose session cache creation
 
- forge.tls.createSessionCache = tls.createSessionCache;
 
- /**
 
-  * Creates a new TLS connection. This does not make any assumptions about the
 
-  * transport layer that TLS is working on top of, ie: it does not assume there
 
-  * is a TCP/IP connection or establish one. A TLS connection is totally
 
-  * abstracted away from the layer is runs on top of, it merely establishes a
 
-  * secure channel between a client" and a "server".
 
-  *
 
-  * A TLS connection contains 4 connection states: pending read and write, and
 
-  * current read and write.
 
-  *
 
-  * At initialization, the current read and write states will be null. Only once
 
-  * the security parameters have been set and the keys have been generated can
 
-  * the pending states be converted into current states. Current states will be
 
-  * updated for each record processed.
 
-  *
 
-  * A custom certificate verify callback may be provided to check information
 
-  * like the common name on the server's certificate. It will be called for
 
-  * every certificate in the chain. It has the following signature:
 
-  *
 
-  * variable func(c, certs, index, preVerify)
 
-  * Where:
 
-  * c         The TLS connection
 
-  * verified  Set to true if certificate was verified, otherwise the alert
 
-  *           tls.Alert.Description for why the certificate failed.
 
-  * depth     The current index in the chain, where 0 is the server's cert.
 
-  * certs     The certificate chain, *NOTE* if the server was anonymous then
 
-  *           the chain will be empty.
 
-  *
 
-  * The function returns true on success and on failure either the appropriate
 
-  * tls.Alert.Description or an object with 'alert' set to the appropriate
 
-  * tls.Alert.Description and 'message' set to a custom error message. If true
 
-  * is not returned then the connection will abort using, in order of
 
-  * availability, first the returned alert description, second the preVerify
 
-  * alert description, and lastly the default 'bad_certificate'.
 
-  *
 
-  * There are three callbacks that can be used to make use of client-side
 
-  * certificates where each takes the TLS connection as the first parameter:
 
-  *
 
-  * getCertificate(conn, hint)
 
-  *   The second parameter is a hint as to which certificate should be
 
-  *   returned. If the connection entity is a client, then the hint will be
 
-  *   the CertificateRequest message from the server that is part of the
 
-  *   TLS protocol. If the connection entity is a server, then it will be
 
-  *   the servername list provided via an SNI extension the ClientHello, if
 
-  *   one was provided (empty array if not). The hint can be examined to
 
-  *   determine which certificate to use (advanced). Most implementations
 
-  *   will just return a certificate. The return value must be a
 
-  *   PEM-formatted certificate or an array of PEM-formatted certificates
 
-  *   that constitute a certificate chain, with the first in the array/chain
 
-  *   being the client's certificate.
 
-  * getPrivateKey(conn, certificate)
 
-  *   The second parameter is an forge.pki X.509 certificate object that
 
-  *   is associated with the requested private key. The return value must
 
-  *   be a PEM-formatted private key.
 
-  * getSignature(conn, bytes, callback)
 
-  *   This callback can be used instead of getPrivateKey if the private key
 
-  *   is not directly accessible in javascript or should not be. For
 
-  *   instance, a secure external web service could provide the signature
 
-  *   in exchange for appropriate credentials. The second parameter is a
 
-  *   string of bytes to be signed that are part of the TLS protocol. These
 
-  *   bytes are used to verify that the private key for the previously
 
-  *   provided client-side certificate is accessible to the client. The
 
-  *   callback is a function that takes 2 parameters, the TLS connection
 
-  *   and the RSA encrypted (signed) bytes as a string. This callback must
 
-  *   be called once the signature is ready.
 
-  *
 
-  * @param options the options for this connection:
 
-  *   server: true if the connection is server-side, false for client.
 
-  *   sessionId: a session ID to reuse, null for a new connection.
 
-  *   caStore: an array of certificates to trust.
 
-  *   sessionCache: a session cache to use.
 
-  *   cipherSuites: an optional array of cipher suites to use,
 
-  *     see tls.CipherSuites.
 
-  *   connected: function(conn) called when the first handshake completes.
 
-  *   virtualHost: the virtual server name to use in a TLS SNI extension.
 
-  *   verifyClient: true to require a client certificate in server mode,
 
-  *     'optional' to request one, false not to (default: false).
 
-  *   verify: a handler used to custom verify certificates in the chain.
 
-  *   verifyOptions: an object with options for the certificate chain validation.
 
-  *     See documentation of pki.verifyCertificateChain for possible options.
 
-  *     verifyOptions.verify is ignored. If you wish to specify a verify handler
 
-  *     use the verify key.
 
-  *   getCertificate: an optional callback used to get a certificate or
 
-  *     a chain of certificates (as an array).
 
-  *   getPrivateKey: an optional callback used to get a private key.
 
-  *   getSignature: an optional callback used to get a signature.
 
-  *   tlsDataReady: function(conn) called when TLS protocol data has been
 
-  *     prepared and is ready to be used (typically sent over a socket
 
-  *     connection to its destination), read from conn.tlsData buffer.
 
-  *   dataReady: function(conn) called when application data has
 
-  *     been parsed from a TLS record and should be consumed by the
 
-  *     application, read from conn.data buffer.
 
-  *   closed: function(conn) called when the connection has been closed.
 
-  *   error: function(conn, error) called when there was an error.
 
-  *   deflate: function(inBytes) if provided, will deflate TLS records using
 
-  *     the deflate algorithm if the server supports it.
 
-  *   inflate: function(inBytes) if provided, will inflate TLS records using
 
-  *     the deflate algorithm if the server supports it.
 
-  *
 
-  * @return the new TLS connection.
 
-  */
 
- forge.tls.createConnection = tls.createConnection;
 
 
  |