1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
use byteorder::{ByteOrder, NetworkEndian};
use crc::{crc32, Hasher32};
use crypto::digest::Digest;
use crypto::hmac::Hmac;
use crypto::mac::Mac;
use crypto::md5::Md5;
use crypto::sha1::Sha1;
pub use super::errors::{IntegrityKeyGenerationError, MessageDecodeError, MessageEncodeError};
use super::message::StunMessage;
use crate::definitions::{STUN_HEADER_SIZE, STUN_INTEGRITY_ATTR_SIZE};
impl StunMessage {
pub(super) fn set_encoded_message_length(encoded_message: &mut [u8], len: u16) {
NetworkEndian::write_u16(&mut encoded_message[2..4], len);
}
pub(super) fn set_message_length(&self, encoded_message: &mut [u8], placeholder_size: u16) {
let msg_len = encoded_message.len() as u16 - STUN_HEADER_SIZE as u16 + placeholder_size;
Self::set_encoded_message_length(encoded_message, msg_len);
}
pub(super) fn calculate_fingerprint(encoded_message: &[u8]) -> u32 {
let mut crc = crc32::Digest::new(crc32::IEEE);
crc.write(encoded_message);
crc.sum32() ^ 0x5354_554e
}
pub(super) fn calculate_integrity_key(
integrity_password: &str,
realm: Option<String>,
username: Option<String>,
) -> Result<Vec<u8>, IntegrityKeyGenerationError> {
let key = match realm {
Some(realm) => {
if let Some(username) = username {
let hash_input = format!(
"{}:{}:{}",
username,
realm,
stringprep::saslprep(integrity_password)?
);
let mut hasher = Md5::new();
hasher.input_str(&hash_input);
let mut res = vec![0u8; 16];
hasher.result(&mut res);
res
} else {
return Err(IntegrityKeyGenerationError::MissingUsername());
}
}
None => stringprep::saslprep(integrity_password)?
.as_bytes()
.to_vec(),
};
Ok(key)
}
pub(super) fn calculate_integrity_hash(key: &[u8], encoded_message: &[u8]) -> Vec<u8> {
let mut msg_integrity_buffer = encoded_message.to_vec();
let buffer_len = msg_integrity_buffer.len();
Self::set_encoded_message_length(
&mut msg_integrity_buffer,
(buffer_len - STUN_HEADER_SIZE + STUN_INTEGRITY_ATTR_SIZE) as u16,
);
let mut mac = Hmac::new(Sha1::new(), key);
mac.input(&msg_integrity_buffer);
mac.result().code().to_vec()
}
}