webrtc_dtls/handshake/
handshake_message_certificate_request.rs

1#[cfg(test)]
2mod handshake_message_certificate_request_test;
3
4use std::io::{Read, Write};
5
6use byteorder::{BigEndian, ReadBytesExt, WriteBytesExt};
7
8use super::*;
9use crate::client_certificate_type::*;
10use crate::signature_hash_algorithm::*;
11
12/*
13A non-anonymous server can optionally request a certificate from
14the client, if appropriate for the selected cipher suite.  This
15message, if sent, will immediately follow the ServerKeyExchange
16message (if it is sent; otherwise, this message follows the
17server's Certificate message).
18*/
19#[derive(Clone, Debug, PartialEq, Eq)]
20pub struct HandshakeMessageCertificateRequest {
21    pub(crate) certificate_types: Vec<ClientCertificateType>,
22    pub(crate) signature_hash_algorithms: Vec<SignatureHashAlgorithm>,
23}
24
25const HANDSHAKE_MESSAGE_CERTIFICATE_REQUEST_MIN_LENGTH: usize = 5;
26
27impl HandshakeMessageCertificateRequest {
28    pub fn handshake_type(&self) -> HandshakeType {
29        HandshakeType::CertificateRequest
30    }
31
32    pub fn size(&self) -> usize {
33        1 + self.certificate_types.len() + 2 + self.signature_hash_algorithms.len() * 2 + 2
34    }
35
36    pub fn marshal<W: Write>(&self, writer: &mut W) -> Result<()> {
37        writer.write_u8(self.certificate_types.len() as u8)?;
38        for v in &self.certificate_types {
39            writer.write_u8(*v as u8)?;
40        }
41
42        writer.write_u16::<BigEndian>(2 * self.signature_hash_algorithms.len() as u16)?;
43        for v in &self.signature_hash_algorithms {
44            writer.write_u8(v.hash as u8)?;
45            writer.write_u8(v.signature as u8)?;
46        }
47
48        writer.write_all(&[0x00, 0x00])?; // Distinguished Names Length
49
50        Ok(writer.flush()?)
51    }
52
53    pub fn unmarshal<R: Read>(reader: &mut R) -> Result<Self> {
54        let certificate_types_length = reader.read_u8()?;
55
56        let mut certificate_types = vec![];
57        for _ in 0..certificate_types_length {
58            let cert_type = reader.read_u8()?.into();
59            certificate_types.push(cert_type);
60        }
61
62        let signature_hash_algorithms_length = reader.read_u16::<BigEndian>()?;
63
64        let mut signature_hash_algorithms = vec![];
65        for _ in (0..signature_hash_algorithms_length).step_by(2) {
66            let hash = reader.read_u8()?.into();
67            let signature = reader.read_u8()?.into();
68
69            signature_hash_algorithms.push(SignatureHashAlgorithm { hash, signature });
70        }
71
72        Ok(HandshakeMessageCertificateRequest {
73            certificate_types,
74            signature_hash_algorithms,
75        })
76    }
77}