2019-02-28 12:32:52 +00:00
|
|
|
|
// Copyright (c) 2019 Emmanuel Gil Peyrot <linkmauve@linkmauve.fr>
|
|
|
|
|
//
|
|
|
|
|
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
|
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
|
|
|
|
|
|
use crate::util::helpers::ColonSeparatedHex;
|
|
|
|
|
use crate::hashes::Algo;
|
|
|
|
|
|
|
|
|
|
generate_attribute!(
|
|
|
|
|
/// Indicates which of the end points should initiate the TCP connection establishment.
|
|
|
|
|
Setup, "setup", {
|
|
|
|
|
/// The endpoint will initiate an outgoing connection.
|
|
|
|
|
Active => "active",
|
|
|
|
|
|
|
|
|
|
/// The endpoint will accept an incoming connection.
|
|
|
|
|
Passive => "passive",
|
|
|
|
|
|
|
|
|
|
/// The endpoint is willing to accept an incoming connection or to initiate an outgoing
|
|
|
|
|
/// connection.
|
|
|
|
|
Actpass => "actpass",
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
/// The endpoint does not want the connection to be established for the time being.
|
|
|
|
|
///
|
|
|
|
|
/// Note that this value isn’t used, as per the XEP.
|
|
|
|
|
Holdconn => "holdconn",
|
|
|
|
|
*/
|
|
|
|
|
}
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
// TODO: use a hashes::Hash instead of two different fields here.
|
|
|
|
|
generate_element!(
|
|
|
|
|
/// Fingerprint of the key used for a DTLS handshake.
|
|
|
|
|
Fingerprint, "fingerprint", JINGLE_DTLS,
|
|
|
|
|
attributes: [
|
|
|
|
|
/// The hash algorithm used for this fingerprint.
|
|
|
|
|
hash: Required<Algo> = "hash",
|
|
|
|
|
|
|
|
|
|
/// Indicates which of the end points should initiate the TCP connection establishment.
|
|
|
|
|
setup: Required<Setup> = "setup"
|
|
|
|
|
],
|
|
|
|
|
text: (
|
|
|
|
|
/// Hash value of this fingerprint.
|
|
|
|
|
value: ColonSeparatedHex<Vec<u8>>
|
|
|
|
|
)
|
|
|
|
|
);
|
|
|
|
|
|
2019-03-20 16:48:37 +00:00
|
|
|
|
#[cfg(test)]
|
2019-02-28 12:32:52 +00:00
|
|
|
|
mod tests {
|
|
|
|
|
use super::*;
|
|
|
|
|
use minidom::Element;
|
2019-04-12 08:58:42 +00:00
|
|
|
|
use std::convert::TryFrom;
|
2019-02-28 12:32:52 +00:00
|
|
|
|
|
|
|
|
|
#[cfg(target_pointer_width = "32")]
|
|
|
|
|
#[test]
|
|
|
|
|
fn test_size() {
|
|
|
|
|
assert_size!(Setup, 1);
|
|
|
|
|
assert_size!(Fingerprint, 32);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[cfg(target_pointer_width = "64")]
|
|
|
|
|
#[test]
|
|
|
|
|
fn test_size() {
|
|
|
|
|
assert_size!(Setup, 1);
|
|
|
|
|
assert_size!(Fingerprint, 64);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[test]
|
|
|
|
|
fn test_ex1() {
|
|
|
|
|
let elem: Element = "<fingerprint xmlns='urn:xmpp:jingle:apps:dtls:0' hash='sha-256' setup='actpass'>02:1A:CC:54:27:AB:EB:9C:53:3F:3E:4B:65:2E:7D:46:3F:54:42:CD:54:F1:7A:03:A2:7D:F9:B0:7F:46:19:B2</fingerprint>"
|
|
|
|
|
.parse()
|
|
|
|
|
.unwrap();
|
|
|
|
|
let fingerprint = Fingerprint::try_from(elem).unwrap();
|
|
|
|
|
assert_eq!(fingerprint.setup, Setup::Actpass);
|
|
|
|
|
assert_eq!(fingerprint.hash, Algo::Sha_256);
|
|
|
|
|
assert_eq!(fingerprint.value, [2, 26, 204, 84, 39, 171, 235, 156, 83, 63, 62, 75, 101, 46, 125, 70, 63, 84, 66, 205, 84, 241, 122, 3, 162, 125, 249, 176, 127, 70, 25, 178]);
|
|
|
|
|
}
|
|
|
|
|
}
|