webrtc_dtls/handshake/
handshake_message_client_hello.rs1#[cfg(test)]
2mod handshake_message_client_hello_test;
3
4use std::fmt;
5use std::io::{BufReader, BufWriter};
6
7use byteorder::{BigEndian, ReadBytesExt, WriteBytesExt};
8
9use super::handshake_random::*;
10use super::*;
11use crate::cipher_suite::*;
12use crate::compression_methods::*;
13use crate::extension::*;
14use crate::record_layer::record_layer_header::*;
15
16#[derive(Clone)]
24pub struct HandshakeMessageClientHello {
25 pub(crate) version: ProtocolVersion,
26 pub(crate) random: HandshakeRandom,
27 pub(crate) cookie: Vec<u8>,
28
29 pub(crate) cipher_suites: Vec<CipherSuiteId>,
30 pub(crate) compression_methods: CompressionMethods,
31 pub(crate) extensions: Vec<Extension>,
32}
33
34impl PartialEq for HandshakeMessageClientHello {
35 fn eq(&self, other: &Self) -> bool {
36 if !(self.version == other.version
37 && self.random == other.random
38 && self.cookie == other.cookie
39 && self.compression_methods == other.compression_methods
40 && self.extensions == other.extensions
41 && self.cipher_suites.len() == other.cipher_suites.len())
42 {
43 return false;
44 }
45
46 for i in 0..self.cipher_suites.len() {
47 if self.cipher_suites[i] != other.cipher_suites[i] {
48 return false;
49 }
50 }
51
52 true
53 }
54}
55
56impl fmt::Debug for HandshakeMessageClientHello {
57 fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
58 let mut cipher_suites_str = String::new();
59 for cipher_suite in &self.cipher_suites {
60 cipher_suites_str += &cipher_suite.to_string();
61 cipher_suites_str += " ";
62 }
63 let s = [
64 format!("version: {:?} random: {:?}", self.version, self.random),
65 format!("cookie: {:?}", self.cookie),
66 format!("cipher_suites: {cipher_suites_str:?}"),
67 format!("compression_methods: {:?}", self.compression_methods),
68 format!("extensions: {:?}", self.extensions),
69 ];
70 write!(f, "{}", s.join(" "))
71 }
72}
73
74const HANDSHAKE_MESSAGE_CLIENT_HELLO_VARIABLE_WIDTH_START: usize = 34;
75
76impl HandshakeMessageClientHello {
77 pub fn handshake_type(&self) -> HandshakeType {
78 HandshakeType::ClientHello
79 }
80
81 pub fn size(&self) -> usize {
82 let mut len = 0;
83
84 len += 2; len += self.random.size();
86
87 len += 1;
89
90 len += 1 + self.cookie.len();
91
92 len += 2 + 2 * self.cipher_suites.len();
93
94 len += self.compression_methods.size();
95
96 len += 2;
97 for extension in &self.extensions {
98 len += extension.size();
99 }
100
101 len
102 }
103
104 pub fn marshal<W: Write>(&self, writer: &mut W) -> Result<()> {
105 if self.cookie.len() > 255 {
106 return Err(Error::ErrCookieTooLong);
107 }
108
109 writer.write_u8(self.version.major)?;
110 writer.write_u8(self.version.minor)?;
111 self.random.marshal(writer)?;
112
113 writer.write_u8(0x00)?;
115
116 writer.write_u8(self.cookie.len() as u8)?;
117 writer.write_all(&self.cookie)?;
118
119 writer.write_u16::<BigEndian>(2 * self.cipher_suites.len() as u16)?;
120 for cipher_suite in &self.cipher_suites {
121 writer.write_u16::<BigEndian>(*cipher_suite as u16)?;
122 }
123
124 self.compression_methods.marshal(writer)?;
125
126 let mut extension_buffer = vec![];
127 {
128 let mut extension_writer = BufWriter::<&mut Vec<u8>>::new(extension_buffer.as_mut());
129 for extension in &self.extensions {
130 extension.marshal(&mut extension_writer)?;
131 }
132 }
133
134 writer.write_u16::<BigEndian>(extension_buffer.len() as u16)?;
135 writer.write_all(&extension_buffer)?;
136
137 Ok(writer.flush()?)
138 }
139
140 pub fn unmarshal<R: Read>(reader: &mut R) -> Result<Self> {
141 let major = reader.read_u8()?;
142 let minor = reader.read_u8()?;
143 let random = HandshakeRandom::unmarshal(reader)?;
144
145 reader.read_u8()?;
147
148 let cookie_len = reader.read_u8()? as usize;
149 let mut cookie = vec![0; cookie_len];
150 reader.read_exact(&mut cookie)?;
151
152 let cipher_suites_len = reader.read_u16::<BigEndian>()? as usize / 2;
153 let mut cipher_suites = vec![];
154 for _ in 0..cipher_suites_len {
155 let id: CipherSuiteId = reader.read_u16::<BigEndian>()?.into();
156 cipher_suites.push(id);
158 }
159
160 let compression_methods = CompressionMethods::unmarshal(reader)?;
161 let mut extensions = vec![];
162
163 let extension_buffer_len = reader.read_u16::<BigEndian>()? as usize;
164 let mut extension_buffer = vec![0u8; extension_buffer_len];
165 reader.read_exact(&mut extension_buffer)?;
166
167 let mut offset = 0;
168 while offset < extension_buffer_len {
169 let mut extension_reader = BufReader::new(&extension_buffer[offset..]);
170 if let Ok(extension) = Extension::unmarshal(&mut extension_reader) {
171 extensions.push(extension);
172 } else {
173 log::warn!(
174 "Unsupported Extension Type {} {}",
175 extension_buffer[offset],
176 extension_buffer[offset + 1]
177 );
178 }
179
180 let extension_len =
181 u16::from_be_bytes([extension_buffer[offset + 2], extension_buffer[offset + 3]])
182 as usize;
183 offset += 4 + extension_len;
184 }
185
186 Ok(HandshakeMessageClientHello {
187 version: ProtocolVersion { major, minor },
188 random,
189 cookie,
190
191 cipher_suites,
192 compression_methods,
193 extensions,
194 })
195 }
196}