headers/common/
sec_websocket_accept.rs

1use base64::engine::general_purpose::STANDARD as ENGINE;
2use base64::Engine;
3use bytes::Bytes;
4use sha1::{Digest, Sha1};
5
6use super::SecWebsocketKey;
7
8/// The `Sec-Websocket-Accept` header.
9///
10/// This header is used in the Websocket handshake, sent back by the
11/// server indicating a successful handshake. It is a signature
12/// of the `Sec-Websocket-Key` header.
13///
14/// # Example
15///
16/// ```no_run
17/// # extern crate headers;
18/// use headers::{SecWebsocketAccept, SecWebsocketKey};
19///
20/// let sec_key: SecWebsocketKey = /* from request headers */
21/// #    unimplemented!();
22///
23/// let sec_accept = SecWebsocketAccept::from(sec_key);
24/// ```
25#[derive(Clone, Debug, PartialEq, Eq, Hash)]
26pub struct SecWebsocketAccept(::HeaderValue);
27
28derive_header! {
29    SecWebsocketAccept(_),
30    name: SEC_WEBSOCKET_ACCEPT
31}
32
33impl From<SecWebsocketKey> for SecWebsocketAccept {
34    fn from(key: SecWebsocketKey) -> SecWebsocketAccept {
35        sign(key.0.as_bytes())
36    }
37}
38
39fn sign(key: &[u8]) -> SecWebsocketAccept {
40    let mut sha1 = Sha1::default();
41    sha1.update(key);
42    sha1.update(&b"258EAFA5-E914-47DA-95CA-C5AB0DC85B11"[..]);
43    let b64 = Bytes::from(ENGINE.encode(&sha1.finalize()));
44
45    let val = ::HeaderValue::from_maybe_shared(b64).expect("base64 is a valid value");
46
47    SecWebsocketAccept(val)
48}
49
50#[cfg(test)]
51mod tests {
52    use super::super::{test_decode, test_encode};
53    use super::*;
54
55    #[test]
56    fn key_to_accept() {
57        // From https://tools.ietf.org/html/rfc6455#section-1.2
58        let key = test_decode::<SecWebsocketKey>(&["dGhlIHNhbXBsZSBub25jZQ=="]).expect("key");
59        let accept = SecWebsocketAccept::from(key);
60        let headers = test_encode(accept);
61
62        assert_eq!(
63            headers["sec-websocket-accept"],
64            "s3pPLMBiTxaQ9kYGzzhZRbK+xOo="
65        );
66    }
67}