1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
|
use crate::crypto;
use crate::packet;
use crate::Packet;
/// Holds an MDC packet.
///
/// A modification detection code packet. This packet appears after a
/// SEIP packet. See [Section 5.14 of RFC 4880] for details.
///
/// [Section 5.14 of RFC 4880]: https://tools.ietf.org/html/rfc4880#section-5.14
#[derive(PartialEq, Eq, Hash, Clone, Debug)]
pub struct MDC {
/// CTB packet header fields.
pub(crate) common: packet::Common,
/// Our SHA-1 hash.
computed_hash: [u8; 20],
/// A 20-octet SHA-1 hash of the preceding plaintext data.
hash: [u8; 20],
}
impl MDC {
/// Creates an MDC packet.
pub fn new(hash: [u8; 20], computed_hash: [u8; 20]) -> Self {
MDC {
common: Default::default(),
computed_hash: computed_hash,
hash: hash,
}
}
/// Gets the packet's hash value.
pub fn hash(&self) -> &[u8] {
&self.hash[..]
}
/// Gets the computed hash value.
pub fn computed_hash(&self) -> &[u8] {
&self.computed_hash[..]
}
/// Returns whether the data protected by the MDC is valid.
pub fn valid(&self) -> bool {
if self.hash == [ 0; 20 ] {
// If the computed_hash and hash are uninitialized, then
// return false.
false
} else {
self.computed_hash == self.hash
}
}
}
impl From<MDC> for Packet {
fn from(s: MDC) -> Self {
Packet::MDC(s)
}
}
impl From<[u8; 20]> for MDC {
fn from(hash: [u8; 20]) -> Self {
MDC {
common: Default::default(),
// All 0s.
computed_hash: Default::default(),
hash: hash,
}
}
}
impl From<crypto::hash::Context> for MDC {
fn from(mut hash: crypto::hash::Context) -> Self {
let mut value : [u8; 20] = Default::default();
hash.digest(&mut value[..]);
value.into()
}
}
|