xmpp_parsers/
jingle_dtls_srtp.rs

1// Copyright (c) 2019 Emmanuel Gil Peyrot <linkmauve@linkmauve.fr>
2//
3// This Source Code Form is subject to the terms of the Mozilla Public
4// License, v. 2.0. If a copy of the MPL was not distributed with this
5// file, You can obtain one at http://mozilla.org/MPL/2.0/.
6
7use xso::{text::ColonSeparatedHex, AsXml, FromXml};
8
9use crate::hashes::{Algo, Hash};
10use crate::ns;
11use xso::error::Error;
12
13generate_attribute!(
14    /// Indicates which of the end points should initiate the TCP connection establishment.
15    Setup, "setup", {
16        /// The endpoint will initiate an outgoing connection.
17        Active => "active",
18
19        /// The endpoint will accept an incoming connection.
20        Passive => "passive",
21
22        /// The endpoint is willing to accept an incoming connection or to initiate an outgoing
23        /// connection.
24        Actpass => "actpass",
25
26        /*
27        /// The endpoint does not want the connection to be established for the time being.
28        ///
29        /// Note that this value isn’t used, as per the XEP.
30        Holdconn => "holdconn",
31        */
32    }
33);
34
35// TODO: use a hashes::Hash instead of two different fields here.
36/// Fingerprint of the key used for a DTLS handshake.
37#[derive(FromXml, AsXml, PartialEq, Debug, Clone)]
38#[xml(namespace = ns::JINGLE_DTLS, name = "fingerprint")]
39pub struct Fingerprint {
40    /// The hash algorithm used for this fingerprint.
41    #[xml(attribute)]
42    pub hash: Algo,
43
44    /// Indicates which of the end points should initiate the TCP connection establishment.
45    #[xml(attribute)]
46    pub setup: Setup,
47
48    /// Hash value of this fingerprint.
49    #[xml(text(codec = ColonSeparatedHex))]
50    pub value: Vec<u8>,
51}
52
53impl Fingerprint {
54    /// Create a new Fingerprint from a Setup and a Hash.
55    pub fn from_hash(setup: Setup, hash: Hash) -> Fingerprint {
56        Fingerprint {
57            hash: hash.algo,
58            setup,
59            value: hash.hash,
60        }
61    }
62
63    /// Create a new Fingerprint from a Setup and parsing the hash.
64    pub fn from_colon_separated_hex(
65        setup: Setup,
66        algo: &str,
67        hash: &str,
68    ) -> Result<Fingerprint, Error> {
69        let algo = algo.parse()?;
70        let hash = Hash::from_colon_separated_hex(algo, hash).map_err(Error::text_parse_error)?;
71        Ok(Fingerprint::from_hash(setup, hash))
72    }
73}
74
75#[cfg(test)]
76mod tests {
77    use super::*;
78    use minidom::Element;
79
80    #[cfg(target_pointer_width = "32")]
81    #[test]
82    fn test_size() {
83        assert_size!(Setup, 1);
84        assert_size!(Fingerprint, 28);
85    }
86
87    #[cfg(target_pointer_width = "64")]
88    #[test]
89    fn test_size() {
90        assert_size!(Setup, 1);
91        assert_size!(Fingerprint, 56);
92    }
93
94    #[test]
95    fn test_ex1() {
96        let elem: Element = "<fingerprint xmlns='urn:xmpp:jingle:apps:dtls:0' hash='sha-256' setup='actpass'>02:1A:CC:54:27:AB:EB:9C:53:3F:3E:4B:65:2E:7D:46:3F:54:42:CD:54:F1:7A:03:A2:7D:F9:B0:7F:46:19:B2</fingerprint>"
97                .parse()
98                .unwrap();
99        let fingerprint = Fingerprint::try_from(elem).unwrap();
100        assert_eq!(fingerprint.setup, Setup::Actpass);
101        assert_eq!(fingerprint.hash, Algo::Sha_256);
102        assert_eq!(
103            fingerprint.value,
104            [
105                2, 26, 204, 84, 39, 171, 235, 156, 83, 63, 62, 75, 101, 46, 125, 70, 63, 84, 66,
106                205, 84, 241, 122, 3, 162, 125, 249, 176, 127, 70, 25, 178
107            ]
108        );
109    }
110}