2019-07-11 21:26:44 +08:00
|
|
|
/**************************************************************************/
|
|
|
|
/* crypto.h */
|
|
|
|
/**************************************************************************/
|
|
|
|
/* This file is part of: */
|
|
|
|
/* GODOT ENGINE */
|
|
|
|
/* https://godotengine.org */
|
|
|
|
/**************************************************************************/
|
|
|
|
/* Copyright (c) 2014-present Godot Engine contributors (see AUTHORS.md). */
|
|
|
|
/* Copyright (c) 2007-2014 Juan Linietsky, Ariel Manzur. */
|
|
|
|
/* */
|
|
|
|
/* Permission is hereby granted, free of charge, to any person obtaining */
|
|
|
|
/* a copy of this software and associated documentation files (the */
|
|
|
|
/* "Software"), to deal in the Software without restriction, including */
|
|
|
|
/* without limitation the rights to use, copy, modify, merge, publish, */
|
|
|
|
/* distribute, sublicense, and/or sell copies of the Software, and to */
|
|
|
|
/* permit persons to whom the Software is furnished to do so, subject to */
|
|
|
|
/* the following conditions: */
|
|
|
|
/* */
|
|
|
|
/* The above copyright notice and this permission notice shall be */
|
|
|
|
/* included in all copies or substantial portions of the Software. */
|
|
|
|
/* */
|
|
|
|
/* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, */
|
|
|
|
/* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF */
|
|
|
|
/* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. */
|
|
|
|
/* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY */
|
|
|
|
/* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, */
|
|
|
|
/* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE */
|
|
|
|
/* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */
|
|
|
|
/**************************************************************************/
|
|
|
|
|
|
|
|
#ifndef CRYPTO_H
|
|
|
|
#define CRYPTO_H
|
|
|
|
|
2020-06-06 21:42:46 +08:00
|
|
|
#include "core/crypto/hashing_context.h"
|
2020-11-08 06:33:38 +08:00
|
|
|
#include "core/io/resource.h"
|
2019-07-11 21:26:44 +08:00
|
|
|
#include "core/io/resource_loader.h"
|
|
|
|
#include "core/io/resource_saver.h"
|
2021-06-05 00:03:15 +08:00
|
|
|
#include "core/object/ref_counted.h"
|
2019-07-11 21:26:44 +08:00
|
|
|
|
|
|
|
class CryptoKey : public Resource {
|
|
|
|
GDCLASS(CryptoKey, Resource);
|
|
|
|
|
|
|
|
protected:
|
|
|
|
static void _bind_methods();
|
2024-04-22 22:34:44 +08:00
|
|
|
static CryptoKey *(*_create)(bool p_notify_postinitialize);
|
2019-07-11 21:26:44 +08:00
|
|
|
|
|
|
|
public:
|
2024-04-22 22:34:44 +08:00
|
|
|
static CryptoKey *create(bool p_notify_postinitialize = true);
|
2024-01-09 09:36:19 +08:00
|
|
|
virtual Error load(const String &p_path, bool p_public_only = false) = 0;
|
|
|
|
virtual Error save(const String &p_path, bool p_public_only = false) = 0;
|
2020-06-06 03:28:16 +08:00
|
|
|
virtual String save_to_string(bool p_public_only = false) = 0;
|
2024-01-09 09:36:19 +08:00
|
|
|
virtual Error load_from_string(const String &p_string_key, bool p_public_only = false) = 0;
|
2020-06-06 03:28:16 +08:00
|
|
|
virtual bool is_public_only() const = 0;
|
2019-07-11 21:26:44 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
class X509Certificate : public Resource {
|
|
|
|
GDCLASS(X509Certificate, Resource);
|
|
|
|
|
|
|
|
protected:
|
|
|
|
static void _bind_methods();
|
2024-04-22 22:34:44 +08:00
|
|
|
static X509Certificate *(*_create)(bool p_notify_postinitialize);
|
2019-07-11 21:26:44 +08:00
|
|
|
|
|
|
|
public:
|
2024-04-22 22:34:44 +08:00
|
|
|
static X509Certificate *create(bool p_notify_postinitialize = true);
|
2024-01-09 09:36:19 +08:00
|
|
|
virtual Error load(const String &p_path) = 0;
|
2019-07-11 21:26:44 +08:00
|
|
|
virtual Error load_from_memory(const uint8_t *p_buffer, int p_len) = 0;
|
2024-01-09 09:36:19 +08:00
|
|
|
virtual Error save(const String &p_path) = 0;
|
2023-04-06 05:45:55 +08:00
|
|
|
virtual String save_to_string() = 0;
|
|
|
|
virtual Error load_from_string(const String &string) = 0;
|
2019-07-11 21:26:44 +08:00
|
|
|
};
|
|
|
|
|
2023-01-20 08:51:35 +08:00
|
|
|
class TLSOptions : public RefCounted {
|
|
|
|
GDCLASS(TLSOptions, RefCounted);
|
|
|
|
|
2024-06-11 17:13:22 +08:00
|
|
|
private:
|
|
|
|
enum Mode {
|
|
|
|
MODE_CLIENT = 0,
|
|
|
|
MODE_CLIENT_UNSAFE = 1,
|
|
|
|
MODE_SERVER = 2,
|
2023-01-20 08:51:35 +08:00
|
|
|
};
|
|
|
|
|
2024-06-11 17:13:22 +08:00
|
|
|
Mode mode = MODE_CLIENT;
|
2023-01-20 08:51:35 +08:00
|
|
|
String common_name;
|
|
|
|
Ref<X509Certificate> trusted_ca_chain;
|
|
|
|
Ref<X509Certificate> own_certificate;
|
|
|
|
Ref<CryptoKey> private_key;
|
|
|
|
|
|
|
|
protected:
|
|
|
|
static void _bind_methods();
|
|
|
|
|
|
|
|
public:
|
|
|
|
static Ref<TLSOptions> client(Ref<X509Certificate> p_trusted_chain = Ref<X509Certificate>(), const String &p_common_name_override = String());
|
|
|
|
static Ref<TLSOptions> client_unsafe(Ref<X509Certificate> p_trusted_chain);
|
|
|
|
static Ref<TLSOptions> server(Ref<CryptoKey> p_own_key, Ref<X509Certificate> p_own_certificate);
|
|
|
|
|
2024-06-11 17:13:22 +08:00
|
|
|
String get_common_name_override() const { return common_name; }
|
2023-01-20 08:51:35 +08:00
|
|
|
Ref<X509Certificate> get_trusted_ca_chain() const { return trusted_ca_chain; }
|
|
|
|
Ref<X509Certificate> get_own_certificate() const { return own_certificate; }
|
|
|
|
Ref<CryptoKey> get_private_key() const { return private_key; }
|
2024-06-11 17:13:22 +08:00
|
|
|
bool is_server() const { return mode == MODE_SERVER; }
|
|
|
|
bool is_unsafe_client() const { return mode == MODE_CLIENT_UNSAFE; }
|
2023-01-20 08:51:35 +08:00
|
|
|
};
|
|
|
|
|
2021-06-05 00:03:15 +08:00
|
|
|
class HMACContext : public RefCounted {
|
|
|
|
GDCLASS(HMACContext, RefCounted);
|
2020-11-14 20:42:47 +08:00
|
|
|
|
|
|
|
protected:
|
|
|
|
static void _bind_methods();
|
2024-04-22 22:34:44 +08:00
|
|
|
static HMACContext *(*_create)(bool p_notify_postinitialize);
|
2020-11-14 20:42:47 +08:00
|
|
|
|
|
|
|
public:
|
2024-04-22 22:34:44 +08:00
|
|
|
static HMACContext *create(bool p_notify_postinitialize = true);
|
2020-11-14 20:42:47 +08:00
|
|
|
|
2024-01-09 09:36:19 +08:00
|
|
|
virtual Error start(HashingContext::HashType p_hash_type, const PackedByteArray &p_key) = 0;
|
|
|
|
virtual Error update(const PackedByteArray &p_data) = 0;
|
2020-11-14 20:42:47 +08:00
|
|
|
virtual PackedByteArray finish() = 0;
|
|
|
|
|
|
|
|
HMACContext() {}
|
2021-07-03 22:12:55 +08:00
|
|
|
virtual ~HMACContext() {}
|
2020-11-14 20:42:47 +08:00
|
|
|
};
|
|
|
|
|
2021-06-05 00:03:15 +08:00
|
|
|
class Crypto : public RefCounted {
|
|
|
|
GDCLASS(Crypto, RefCounted);
|
2019-07-11 21:26:44 +08:00
|
|
|
|
|
|
|
protected:
|
|
|
|
static void _bind_methods();
|
2024-04-22 22:34:44 +08:00
|
|
|
static Crypto *(*_create)(bool p_notify_postinitialize);
|
2024-01-09 09:36:19 +08:00
|
|
|
static void (*_load_default_certificates)(const String &p_path);
|
2019-07-11 21:26:44 +08:00
|
|
|
|
|
|
|
public:
|
2024-04-22 22:34:44 +08:00
|
|
|
static Crypto *create(bool p_notify_postinitialize = true);
|
2024-01-09 09:36:19 +08:00
|
|
|
static void load_default_certificates(const String &p_path);
|
2019-07-11 21:26:44 +08:00
|
|
|
|
2020-06-06 21:47:51 +08:00
|
|
|
virtual PackedByteArray generate_random_bytes(int p_bytes) = 0;
|
|
|
|
virtual Ref<CryptoKey> generate_rsa(int p_bytes) = 0;
|
2024-01-09 09:36:19 +08:00
|
|
|
virtual Ref<X509Certificate> generate_self_signed_certificate(Ref<CryptoKey> p_key, const String &p_issuer_name, const String &p_not_before, const String &p_not_after) = 0;
|
2019-07-11 21:26:44 +08:00
|
|
|
|
2024-01-09 09:36:19 +08:00
|
|
|
virtual Vector<uint8_t> sign(HashingContext::HashType p_hash_type, const Vector<uint8_t> &p_hash, Ref<CryptoKey> p_key) = 0;
|
|
|
|
virtual bool verify(HashingContext::HashType p_hash_type, const Vector<uint8_t> &p_hash, const Vector<uint8_t> &p_signature, Ref<CryptoKey> p_key) = 0;
|
|
|
|
virtual Vector<uint8_t> encrypt(Ref<CryptoKey> p_key, const Vector<uint8_t> &p_plaintext) = 0;
|
|
|
|
virtual Vector<uint8_t> decrypt(Ref<CryptoKey> p_key, const Vector<uint8_t> &p_ciphertext) = 0;
|
2020-06-06 21:42:46 +08:00
|
|
|
|
2024-01-09 09:36:19 +08:00
|
|
|
PackedByteArray hmac_digest(HashingContext::HashType p_hash_type, const PackedByteArray &p_key, const PackedByteArray &p_msg);
|
2020-11-14 20:42:47 +08:00
|
|
|
|
|
|
|
// Compares two PackedByteArrays for equality without leaking timing information in order to prevent timing attacks.
|
|
|
|
// @see: https://paragonie.com/blog/2015/11/preventing-timing-attacks-on-string-comparison-with-double-hmac-strategy
|
2024-01-09 09:36:19 +08:00
|
|
|
bool constant_time_compare(const PackedByteArray &p_trusted, const PackedByteArray &p_received);
|
2020-11-14 20:42:47 +08:00
|
|
|
|
2020-05-12 23:01:17 +08:00
|
|
|
Crypto() {}
|
2019-07-11 21:26:44 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
class ResourceFormatLoaderCrypto : public ResourceFormatLoader {
|
|
|
|
public:
|
2024-03-25 04:06:34 +08:00
|
|
|
virtual Ref<Resource> load(const String &p_path, const String &p_original_path = "", Error *r_error = nullptr, bool p_use_sub_threads = false, float *r_progress = nullptr, CacheMode p_cache_mode = CACHE_MODE_REUSE) override;
|
|
|
|
virtual void get_recognized_extensions(List<String> *p_extensions) const override;
|
|
|
|
virtual bool handles_type(const String &p_type) const override;
|
|
|
|
virtual String get_resource_type(const String &p_path) const override;
|
2019-07-11 21:26:44 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
class ResourceFormatSaverCrypto : public ResourceFormatSaver {
|
|
|
|
public:
|
2024-03-25 04:06:34 +08:00
|
|
|
virtual Error save(const Ref<Resource> &p_resource, const String &p_path, uint32_t p_flags = 0) override;
|
|
|
|
virtual void get_recognized_extensions(const Ref<Resource> &p_resource, List<String> *p_extensions) const override;
|
|
|
|
virtual bool recognize(const Ref<Resource> &p_resource) const override;
|
2019-07-11 21:26:44 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
#endif // CRYPTO_H
|