LCOV - code coverage report
Current view: top level - proxy/src/scram - signature.rs (source / functions) Coverage Total Hit
Test: 322b88762cba8ea666f63cda880cccab6936bf37.info Lines: 94.3 % 35 33
Test Date: 2024-02-29 11:57:12 Functions: 66.7 % 6 4

            Line data    Source code
       1              : //! Tools for client/server signature management.
       2              : 
       3              : use super::key::{ScramKey, SCRAM_KEY_LEN};
       4              : 
       5              : /// A collection of message parts needed to derive the client's signature.
       6            0 : #[derive(Debug)]
       7              : pub struct SignatureBuilder<'a> {
       8              :     pub client_first_message_bare: &'a str,
       9              :     pub server_first_message: &'a str,
      10              :     pub client_final_message_without_proof: &'a str,
      11              : }
      12              : 
      13              : impl SignatureBuilder<'_> {
      14           32 :     pub fn build(&self, key: &ScramKey) -> Signature {
      15           32 :         let parts = [
      16           32 :             self.client_first_message_bare.as_bytes(),
      17           32 :             b",",
      18           32 :             self.server_first_message.as_bytes(),
      19           32 :             b",",
      20           32 :             self.client_final_message_without_proof.as_bytes(),
      21           32 :         ];
      22           32 : 
      23           32 :         super::hmac_sha256(key.as_ref(), parts).into()
      24           32 :     }
      25              : }
      26              : 
      27              : /// A computed value which, when xored with `ClientProof`,
      28              : /// produces `ClientKey` that we need for authentication.
      29            0 : #[derive(Debug)]
      30              : #[repr(transparent)]
      31              : pub struct Signature {
      32              :     bytes: [u8; SCRAM_KEY_LEN],
      33              : }
      34              : 
      35              : impl Signature {
      36              :     /// Derive `ClientKey` from client's signature and proof.
      37           18 :     pub fn derive_client_key(&self, proof: &[u8; SCRAM_KEY_LEN]) -> ScramKey {
      38           18 :         // This is how the proof is calculated:
      39           18 :         //
      40           18 :         // 1. sha256(ClientKey) -> StoredKey
      41           18 :         // 2. hmac_sha256(StoredKey, [messages...]) -> ClientSignature
      42           18 :         // 3. ClientKey ^ ClientSignature -> ClientProof
      43           18 :         //
      44           18 :         // Step 3 implies that we can restore ClientKey from the proof
      45           18 :         // by xoring the latter with the ClientSignature. Afterwards we
      46           18 :         // can check that the presumed ClientKey meets our expectations.
      47           18 :         let mut signature = self.bytes;
      48          576 :         for (i, x) in proof.iter().enumerate() {
      49          576 :             signature[i] ^= x;
      50          576 :         }
      51              : 
      52           18 :         signature.into()
      53           18 :     }
      54              : }
      55              : 
      56              : impl From<[u8; SCRAM_KEY_LEN]> for Signature {
      57           32 :     fn from(bytes: [u8; SCRAM_KEY_LEN]) -> Self {
      58           32 :         Self { bytes }
      59           32 :     }
      60              : }
      61              : 
      62              : impl AsRef<[u8]> for Signature {
      63           14 :     fn as_ref(&self) -> &[u8] {
      64           14 :         &self.bytes
      65           14 :     }
      66              : }
        

Generated by: LCOV version 2.1-beta