mirror of
https://github.com/godotengine/godot.git
synced 2024-12-27 11:24:59 +08:00
40fa684c18
Keep module compatibility with mbedtls 2.x (old LTS branch). A patch has been added to allow compiling after removing all the `psa_*` files from the library folder (will look into upstreaming it). Note: mbedTLS 3.6 finally enabled TLSv1.3 by default, but it requires some module changes, and to enable PSA crypto (new "standard" API specification), so it might be best done in a separate commit/PR.
252 lines
9.8 KiB
C++
252 lines
9.8 KiB
C++
/**************************************************************************/
|
|
/* crypto_core.cpp */
|
|
/**************************************************************************/
|
|
/* This file is part of: */
|
|
/* GODOT ENGINE */
|
|
/* https://godotengine.org */
|
|
/**************************************************************************/
|
|
/* Copyright (c) 2014-present Godot Engine contributors (see AUTHORS.md). */
|
|
/* Copyright (c) 2007-2014 Juan Linietsky, Ariel Manzur. */
|
|
/* */
|
|
/* Permission is hereby granted, free of charge, to any person obtaining */
|
|
/* a copy of this software and associated documentation files (the */
|
|
/* "Software"), to deal in the Software without restriction, including */
|
|
/* without limitation the rights to use, copy, modify, merge, publish, */
|
|
/* distribute, sublicense, and/or sell copies of the Software, and to */
|
|
/* permit persons to whom the Software is furnished to do so, subject to */
|
|
/* the following conditions: */
|
|
/* */
|
|
/* The above copyright notice and this permission notice shall be */
|
|
/* included in all copies or substantial portions of the Software. */
|
|
/* */
|
|
/* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, */
|
|
/* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF */
|
|
/* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. */
|
|
/* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY */
|
|
/* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, */
|
|
/* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE */
|
|
/* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */
|
|
/**************************************************************************/
|
|
|
|
#include "crypto_core.h"
|
|
|
|
#include "core/os/os.h"
|
|
|
|
#include <mbedtls/aes.h>
|
|
#include <mbedtls/base64.h>
|
|
#include <mbedtls/ctr_drbg.h>
|
|
#include <mbedtls/entropy.h>
|
|
#include <mbedtls/md5.h>
|
|
#include <mbedtls/sha1.h>
|
|
#include <mbedtls/sha256.h>
|
|
#if MBEDTLS_VERSION_MAJOR >= 3
|
|
#include <mbedtls/compat-2.x.h>
|
|
#endif
|
|
|
|
// RandomGenerator
|
|
CryptoCore::RandomGenerator::RandomGenerator() {
|
|
entropy = memalloc(sizeof(mbedtls_entropy_context));
|
|
mbedtls_entropy_init((mbedtls_entropy_context *)entropy);
|
|
mbedtls_entropy_add_source((mbedtls_entropy_context *)entropy, &CryptoCore::RandomGenerator::_entropy_poll, nullptr, 256, MBEDTLS_ENTROPY_SOURCE_STRONG);
|
|
ctx = memalloc(sizeof(mbedtls_ctr_drbg_context));
|
|
mbedtls_ctr_drbg_init((mbedtls_ctr_drbg_context *)ctx);
|
|
}
|
|
|
|
CryptoCore::RandomGenerator::~RandomGenerator() {
|
|
mbedtls_ctr_drbg_free((mbedtls_ctr_drbg_context *)ctx);
|
|
memfree(ctx);
|
|
mbedtls_entropy_free((mbedtls_entropy_context *)entropy);
|
|
memfree(entropy);
|
|
}
|
|
|
|
int CryptoCore::RandomGenerator::_entropy_poll(void *p_data, unsigned char *r_buffer, size_t p_len, size_t *r_len) {
|
|
*r_len = 0;
|
|
Error err = OS::get_singleton()->get_entropy(r_buffer, p_len);
|
|
ERR_FAIL_COND_V(err, MBEDTLS_ERR_ENTROPY_SOURCE_FAILED);
|
|
*r_len = p_len;
|
|
return 0;
|
|
}
|
|
|
|
Error CryptoCore::RandomGenerator::init() {
|
|
int ret = mbedtls_ctr_drbg_seed((mbedtls_ctr_drbg_context *)ctx, mbedtls_entropy_func, (mbedtls_entropy_context *)entropy, nullptr, 0);
|
|
if (ret) {
|
|
ERR_FAIL_COND_V_MSG(ret, FAILED, " failed\n ! mbedtls_ctr_drbg_seed returned an error" + itos(ret));
|
|
}
|
|
return OK;
|
|
}
|
|
|
|
Error CryptoCore::RandomGenerator::get_random_bytes(uint8_t *r_buffer, size_t p_bytes) {
|
|
ERR_FAIL_NULL_V(ctx, ERR_UNCONFIGURED);
|
|
int ret = mbedtls_ctr_drbg_random((mbedtls_ctr_drbg_context *)ctx, r_buffer, p_bytes);
|
|
ERR_FAIL_COND_V_MSG(ret, FAILED, " failed\n ! mbedtls_ctr_drbg_seed returned an error" + itos(ret));
|
|
return OK;
|
|
}
|
|
|
|
// MD5
|
|
CryptoCore::MD5Context::MD5Context() {
|
|
ctx = memalloc(sizeof(mbedtls_md5_context));
|
|
mbedtls_md5_init((mbedtls_md5_context *)ctx);
|
|
}
|
|
|
|
CryptoCore::MD5Context::~MD5Context() {
|
|
mbedtls_md5_free((mbedtls_md5_context *)ctx);
|
|
memfree((mbedtls_md5_context *)ctx);
|
|
}
|
|
|
|
Error CryptoCore::MD5Context::start() {
|
|
int ret = mbedtls_md5_starts_ret((mbedtls_md5_context *)ctx);
|
|
return ret ? FAILED : OK;
|
|
}
|
|
|
|
Error CryptoCore::MD5Context::update(const uint8_t *p_src, size_t p_len) {
|
|
int ret = mbedtls_md5_update_ret((mbedtls_md5_context *)ctx, p_src, p_len);
|
|
return ret ? FAILED : OK;
|
|
}
|
|
|
|
Error CryptoCore::MD5Context::finish(unsigned char r_hash[16]) {
|
|
int ret = mbedtls_md5_finish_ret((mbedtls_md5_context *)ctx, r_hash);
|
|
return ret ? FAILED : OK;
|
|
}
|
|
|
|
// SHA1
|
|
CryptoCore::SHA1Context::SHA1Context() {
|
|
ctx = memalloc(sizeof(mbedtls_sha1_context));
|
|
mbedtls_sha1_init((mbedtls_sha1_context *)ctx);
|
|
}
|
|
|
|
CryptoCore::SHA1Context::~SHA1Context() {
|
|
mbedtls_sha1_free((mbedtls_sha1_context *)ctx);
|
|
memfree((mbedtls_sha1_context *)ctx);
|
|
}
|
|
|
|
Error CryptoCore::SHA1Context::start() {
|
|
int ret = mbedtls_sha1_starts_ret((mbedtls_sha1_context *)ctx);
|
|
return ret ? FAILED : OK;
|
|
}
|
|
|
|
Error CryptoCore::SHA1Context::update(const uint8_t *p_src, size_t p_len) {
|
|
int ret = mbedtls_sha1_update_ret((mbedtls_sha1_context *)ctx, p_src, p_len);
|
|
return ret ? FAILED : OK;
|
|
}
|
|
|
|
Error CryptoCore::SHA1Context::finish(unsigned char r_hash[20]) {
|
|
int ret = mbedtls_sha1_finish_ret((mbedtls_sha1_context *)ctx, r_hash);
|
|
return ret ? FAILED : OK;
|
|
}
|
|
|
|
// SHA256
|
|
CryptoCore::SHA256Context::SHA256Context() {
|
|
ctx = memalloc(sizeof(mbedtls_sha256_context));
|
|
mbedtls_sha256_init((mbedtls_sha256_context *)ctx);
|
|
}
|
|
|
|
CryptoCore::SHA256Context::~SHA256Context() {
|
|
mbedtls_sha256_free((mbedtls_sha256_context *)ctx);
|
|
memfree((mbedtls_sha256_context *)ctx);
|
|
}
|
|
|
|
Error CryptoCore::SHA256Context::start() {
|
|
int ret = mbedtls_sha256_starts_ret((mbedtls_sha256_context *)ctx, 0);
|
|
return ret ? FAILED : OK;
|
|
}
|
|
|
|
Error CryptoCore::SHA256Context::update(const uint8_t *p_src, size_t p_len) {
|
|
int ret = mbedtls_sha256_update_ret((mbedtls_sha256_context *)ctx, p_src, p_len);
|
|
return ret ? FAILED : OK;
|
|
}
|
|
|
|
Error CryptoCore::SHA256Context::finish(unsigned char r_hash[32]) {
|
|
int ret = mbedtls_sha256_finish_ret((mbedtls_sha256_context *)ctx, r_hash);
|
|
return ret ? FAILED : OK;
|
|
}
|
|
|
|
// AES256
|
|
CryptoCore::AESContext::AESContext() {
|
|
ctx = memalloc(sizeof(mbedtls_aes_context));
|
|
mbedtls_aes_init((mbedtls_aes_context *)ctx);
|
|
}
|
|
|
|
CryptoCore::AESContext::~AESContext() {
|
|
mbedtls_aes_free((mbedtls_aes_context *)ctx);
|
|
memfree((mbedtls_aes_context *)ctx);
|
|
}
|
|
|
|
Error CryptoCore::AESContext::set_encode_key(const uint8_t *p_key, size_t p_bits) {
|
|
int ret = mbedtls_aes_setkey_enc((mbedtls_aes_context *)ctx, p_key, p_bits);
|
|
return ret ? FAILED : OK;
|
|
}
|
|
|
|
Error CryptoCore::AESContext::set_decode_key(const uint8_t *p_key, size_t p_bits) {
|
|
int ret = mbedtls_aes_setkey_dec((mbedtls_aes_context *)ctx, p_key, p_bits);
|
|
return ret ? FAILED : OK;
|
|
}
|
|
|
|
Error CryptoCore::AESContext::encrypt_ecb(const uint8_t p_src[16], uint8_t r_dst[16]) {
|
|
int ret = mbedtls_aes_crypt_ecb((mbedtls_aes_context *)ctx, MBEDTLS_AES_ENCRYPT, p_src, r_dst);
|
|
return ret ? FAILED : OK;
|
|
}
|
|
|
|
Error CryptoCore::AESContext::encrypt_cbc(size_t p_length, uint8_t r_iv[16], const uint8_t *p_src, uint8_t *r_dst) {
|
|
int ret = mbedtls_aes_crypt_cbc((mbedtls_aes_context *)ctx, MBEDTLS_AES_ENCRYPT, p_length, r_iv, p_src, r_dst);
|
|
return ret ? FAILED : OK;
|
|
}
|
|
|
|
Error CryptoCore::AESContext::encrypt_cfb(size_t p_length, uint8_t p_iv[16], const uint8_t *p_src, uint8_t *r_dst) {
|
|
size_t iv_off = 0; // Ignore and assume 16-byte alignment.
|
|
int ret = mbedtls_aes_crypt_cfb128((mbedtls_aes_context *)ctx, MBEDTLS_AES_ENCRYPT, p_length, &iv_off, p_iv, p_src, r_dst);
|
|
return ret ? FAILED : OK;
|
|
}
|
|
|
|
Error CryptoCore::AESContext::decrypt_ecb(const uint8_t p_src[16], uint8_t r_dst[16]) {
|
|
int ret = mbedtls_aes_crypt_ecb((mbedtls_aes_context *)ctx, MBEDTLS_AES_DECRYPT, p_src, r_dst);
|
|
return ret ? FAILED : OK;
|
|
}
|
|
|
|
Error CryptoCore::AESContext::decrypt_cbc(size_t p_length, uint8_t r_iv[16], const uint8_t *p_src, uint8_t *r_dst) {
|
|
int ret = mbedtls_aes_crypt_cbc((mbedtls_aes_context *)ctx, MBEDTLS_AES_DECRYPT, p_length, r_iv, p_src, r_dst);
|
|
return ret ? FAILED : OK;
|
|
}
|
|
|
|
Error CryptoCore::AESContext::decrypt_cfb(size_t p_length, uint8_t p_iv[16], const uint8_t *p_src, uint8_t *r_dst) {
|
|
size_t iv_off = 0; // Ignore and assume 16-byte alignment.
|
|
int ret = mbedtls_aes_crypt_cfb128((mbedtls_aes_context *)ctx, MBEDTLS_AES_DECRYPT, p_length, &iv_off, p_iv, p_src, r_dst);
|
|
return ret ? FAILED : OK;
|
|
}
|
|
|
|
// CryptoCore
|
|
String CryptoCore::b64_encode_str(const uint8_t *p_src, int p_src_len) {
|
|
int b64len = p_src_len / 3 * 4 + 4 + 1;
|
|
Vector<uint8_t> b64buff;
|
|
b64buff.resize(b64len);
|
|
uint8_t *w64 = b64buff.ptrw();
|
|
size_t strlen = 0;
|
|
int ret = b64_encode(&w64[0], b64len, &strlen, p_src, p_src_len);
|
|
w64[strlen] = 0;
|
|
return ret ? String() : (const char *)&w64[0];
|
|
}
|
|
|
|
Error CryptoCore::b64_encode(uint8_t *r_dst, int p_dst_len, size_t *r_len, const uint8_t *p_src, int p_src_len) {
|
|
int ret = mbedtls_base64_encode(r_dst, p_dst_len, r_len, p_src, p_src_len);
|
|
return ret ? FAILED : OK;
|
|
}
|
|
|
|
Error CryptoCore::b64_decode(uint8_t *r_dst, int p_dst_len, size_t *r_len, const uint8_t *p_src, int p_src_len) {
|
|
int ret = mbedtls_base64_decode(r_dst, p_dst_len, r_len, p_src, p_src_len);
|
|
return ret ? FAILED : OK;
|
|
}
|
|
|
|
Error CryptoCore::md5(const uint8_t *p_src, int p_src_len, unsigned char r_hash[16]) {
|
|
int ret = mbedtls_md5_ret(p_src, p_src_len, r_hash);
|
|
return ret ? FAILED : OK;
|
|
}
|
|
|
|
Error CryptoCore::sha1(const uint8_t *p_src, int p_src_len, unsigned char r_hash[20]) {
|
|
int ret = mbedtls_sha1_ret(p_src, p_src_len, r_hash);
|
|
return ret ? FAILED : OK;
|
|
}
|
|
|
|
Error CryptoCore::sha256(const uint8_t *p_src, int p_src_len, unsigned char r_hash[32]) {
|
|
int ret = mbedtls_sha256_ret(p_src, p_src_len, r_hash, 0);
|
|
return ret ? FAILED : OK;
|
|
}
|