webrtc_dtls/handshake/
handshake_message_client_hello.rs

1#[cfg(test)]
2mod handshake_message_client_hello_test;
3
4use std::fmt;
5use std::io::{BufReader, BufWriter};
6
7use byteorder::{BigEndian, ReadBytesExt, WriteBytesExt};
8
9use super::handshake_random::*;
10use super::*;
11use crate::cipher_suite::*;
12use crate::compression_methods::*;
13use crate::extension::*;
14use crate::record_layer::record_layer_header::*;
15
16/*
17When a client first connects to a server it is required to send
18the client hello as its first message.  The client can also send a
19client hello in response to a hello request or on its own
20initiative in order to renegotiate the security parameters in an
21existing connection.
22*/
23#[derive(Clone)]
24pub struct HandshakeMessageClientHello {
25    pub(crate) version: ProtocolVersion,
26    pub(crate) random: HandshakeRandom,
27    pub(crate) cookie: Vec<u8>,
28
29    pub(crate) cipher_suites: Vec<CipherSuiteId>,
30    pub(crate) compression_methods: CompressionMethods,
31    pub(crate) extensions: Vec<Extension>,
32}
33
34impl PartialEq for HandshakeMessageClientHello {
35    fn eq(&self, other: &Self) -> bool {
36        if !(self.version == other.version
37            && self.random == other.random
38            && self.cookie == other.cookie
39            && self.compression_methods == other.compression_methods
40            && self.extensions == other.extensions
41            && self.cipher_suites.len() == other.cipher_suites.len())
42        {
43            return false;
44        }
45
46        for i in 0..self.cipher_suites.len() {
47            if self.cipher_suites[i] != other.cipher_suites[i] {
48                return false;
49            }
50        }
51
52        true
53    }
54}
55
56impl fmt::Debug for HandshakeMessageClientHello {
57    fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
58        let mut cipher_suites_str = String::new();
59        for cipher_suite in &self.cipher_suites {
60            cipher_suites_str += &cipher_suite.to_string();
61            cipher_suites_str += " ";
62        }
63        let s = [
64            format!("version: {:?} random: {:?}", self.version, self.random),
65            format!("cookie: {:?}", self.cookie),
66            format!("cipher_suites: {cipher_suites_str:?}"),
67            format!("compression_methods: {:?}", self.compression_methods),
68            format!("extensions: {:?}", self.extensions),
69        ];
70        write!(f, "{}", s.join(" "))
71    }
72}
73
74const HANDSHAKE_MESSAGE_CLIENT_HELLO_VARIABLE_WIDTH_START: usize = 34;
75
76impl HandshakeMessageClientHello {
77    pub fn handshake_type(&self) -> HandshakeType {
78        HandshakeType::ClientHello
79    }
80
81    pub fn size(&self) -> usize {
82        let mut len = 0;
83
84        len += 2; // version.major+minor
85        len += self.random.size();
86
87        // SessionID
88        len += 1;
89
90        len += 1 + self.cookie.len();
91
92        len += 2 + 2 * self.cipher_suites.len();
93
94        len += self.compression_methods.size();
95
96        len += 2;
97        for extension in &self.extensions {
98            len += extension.size();
99        }
100
101        len
102    }
103
104    pub fn marshal<W: Write>(&self, writer: &mut W) -> Result<()> {
105        if self.cookie.len() > 255 {
106            return Err(Error::ErrCookieTooLong);
107        }
108
109        writer.write_u8(self.version.major)?;
110        writer.write_u8(self.version.minor)?;
111        self.random.marshal(writer)?;
112
113        // SessionID
114        writer.write_u8(0x00)?;
115
116        writer.write_u8(self.cookie.len() as u8)?;
117        writer.write_all(&self.cookie)?;
118
119        writer.write_u16::<BigEndian>(2 * self.cipher_suites.len() as u16)?;
120        for cipher_suite in &self.cipher_suites {
121            writer.write_u16::<BigEndian>(*cipher_suite as u16)?;
122        }
123
124        self.compression_methods.marshal(writer)?;
125
126        let mut extension_buffer = vec![];
127        {
128            let mut extension_writer = BufWriter::<&mut Vec<u8>>::new(extension_buffer.as_mut());
129            for extension in &self.extensions {
130                extension.marshal(&mut extension_writer)?;
131            }
132        }
133
134        writer.write_u16::<BigEndian>(extension_buffer.len() as u16)?;
135        writer.write_all(&extension_buffer)?;
136
137        Ok(writer.flush()?)
138    }
139
140    pub fn unmarshal<R: Read>(reader: &mut R) -> Result<Self> {
141        let major = reader.read_u8()?;
142        let minor = reader.read_u8()?;
143        let random = HandshakeRandom::unmarshal(reader)?;
144
145        // Session ID
146        reader.read_u8()?;
147
148        let cookie_len = reader.read_u8()? as usize;
149        let mut cookie = vec![0; cookie_len];
150        reader.read_exact(&mut cookie)?;
151
152        let cipher_suites_len = reader.read_u16::<BigEndian>()? as usize / 2;
153        let mut cipher_suites = vec![];
154        for _ in 0..cipher_suites_len {
155            let id: CipherSuiteId = reader.read_u16::<BigEndian>()?.into();
156            //let cipher_suite = cipher_suite_for_id(id)?;
157            cipher_suites.push(id);
158        }
159
160        let compression_methods = CompressionMethods::unmarshal(reader)?;
161        let mut extensions = vec![];
162
163        let extension_buffer_len = reader.read_u16::<BigEndian>()? as usize;
164        let mut extension_buffer = vec![0u8; extension_buffer_len];
165        reader.read_exact(&mut extension_buffer)?;
166
167        let mut offset = 0;
168        while offset < extension_buffer_len {
169            let mut extension_reader = BufReader::new(&extension_buffer[offset..]);
170            if let Ok(extension) = Extension::unmarshal(&mut extension_reader) {
171                extensions.push(extension);
172            } else {
173                log::warn!(
174                    "Unsupported Extension Type {} {}",
175                    extension_buffer[offset],
176                    extension_buffer[offset + 1]
177                );
178            }
179
180            let extension_len =
181                u16::from_be_bytes([extension_buffer[offset + 2], extension_buffer[offset + 3]])
182                    as usize;
183            offset += 4 + extension_len;
184        }
185
186        Ok(HandshakeMessageClientHello {
187            version: ProtocolVersion { major, minor },
188            random,
189            cookie,
190
191            cipher_suites,
192            compression_methods,
193            extensions,
194        })
195    }
196}