tlsa.rs 3.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123
  1. use log::*;
  2. use crate::wire::*;
  3. /// A **TLSA** _(TLS authentication)_ record, which contains a TLS certificate
  4. /// (or a public key, or its hash), associating it with a domain.
  5. ///
  6. /// # References
  7. ///
  8. /// [RFC 6698](https://tools.ietf.org/html/rfc6698) — The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security Protocol: TLSA (August 2012)
  9. #[derive(PartialEq, Debug)]
  10. pub struct TLSA {
  11. /// A number representing the purpose of the certificate.
  12. pub certificate_usage: u8,
  13. /// A number representing which part of the certificate is returned in the
  14. /// data. This could be the full certificate, or just the public key.
  15. pub selector: u8,
  16. /// A number representing whether a certificate should be associated with
  17. /// the exact data, or with a hash of it.
  18. pub matching_type: u8,
  19. /// A series of bytes representing the certificate.
  20. pub certificate_data: Vec<u8>,
  21. }
  22. impl Wire for TLSA {
  23. const NAME: &'static str = "TLSA";
  24. const RR_TYPE: u16 = 52;
  25. #[cfg_attr(all(test, feature = "with_mutagen"), ::mutagen::mutate)]
  26. fn read(stated_length: u16, c: &mut Cursor<&[u8]>) -> Result<Self, WireError> {
  27. let certificate_usage = c.read_u8()?;
  28. trace!("Parsed certificate_usage -> {:?}", certificate_usage);
  29. let selector = c.read_u8()?;
  30. trace!("Parsed selector -> {:?}", selector);
  31. let matching_type = c.read_u8()?;
  32. trace!("Parsed matching type -> {:?}", matching_type);
  33. if stated_length <= 3 {
  34. let mandated_length = MandatedLength::AtLeast(4);
  35. return Err(WireError::WrongRecordLength { stated_length, mandated_length });
  36. }
  37. let certificate_data_length = stated_length - 1 - 1 - 1;
  38. let mut certificate_data = Vec::new();
  39. for _ in 0 .. certificate_data_length {
  40. certificate_data.push(c.read_u8()?);
  41. }
  42. Ok(Self { certificate_usage, selector, matching_type, certificate_data })
  43. }
  44. }
  45. impl TLSA {
  46. /// Returns the hexadecimal representation of the fingerprint.
  47. pub fn hex_certificate_data(&self) -> String {
  48. self.certificate_data.iter()
  49. .map(|byte| format!("{:02x}", byte))
  50. .collect()
  51. }
  52. }
  53. #[cfg(test)]
  54. mod test {
  55. use super::*;
  56. #[test]
  57. fn parses() {
  58. let buf = &[
  59. 0x03, // certificate usage
  60. 0x01, // selector
  61. 0x01, // matching type
  62. 0x05, 0x95, 0x98, // data
  63. ];
  64. assert_eq!(TLSA::read(buf.len() as _, &mut Cursor::new(buf)).unwrap(),
  65. TLSA {
  66. certificate_usage: 3,
  67. selector: 1,
  68. matching_type: 1,
  69. certificate_data: vec![ 0x05, 0x95, 0x98 ],
  70. });
  71. }
  72. #[test]
  73. fn record_too_short() {
  74. let buf = &[
  75. 0x03, // certificate usage
  76. 0x01, // selector
  77. 0x01, // matching type
  78. ];
  79. assert_eq!(TLSA::read(buf.len() as _, &mut Cursor::new(buf)),
  80. Err(WireError::WrongRecordLength { stated_length: 3, mandated_length: MandatedLength::AtLeast(4) }));
  81. }
  82. #[test]
  83. fn record_empty() {
  84. assert_eq!(TLSA::read(0, &mut Cursor::new(&[])),
  85. Err(WireError::IO));
  86. }
  87. #[test]
  88. fn buffer_ends_abruptly() {
  89. let buf = &[
  90. 0x01, // certificate_usage
  91. ];
  92. assert_eq!(TLSA::read(6, &mut Cursor::new(buf)),
  93. Err(WireError::IO));
  94. }
  95. }