/**************************************************************************/ /* crypto.cpp */ /**************************************************************************/ /* This file is part of: */ /* GODOT ENGINE */ /* https://godotengine.org */ /**************************************************************************/ /* Copyright (c) 2014-present Godot Engine contributors (see AUTHORS.md). */ /* Copyright (c) 2007-2014 Juan Linietsky, Ariel Manzur. */ /* */ /* Permission is hereby granted, free of charge, to any person obtaining */ /* a copy of this software and associated documentation files (the */ /* "Software"), to deal in the Software without restriction, including */ /* without limitation the rights to use, copy, modify, merge, publish, */ /* distribute, sublicense, and/or sell copies of the Software, and to */ /* permit persons to whom the Software is furnished to do so, subject to */ /* the following conditions: */ /* */ /* The above copyright notice and this permission notice shall be */ /* included in all copies or substantial portions of the Software. */ /* */ /* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, */ /* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF */ /* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. */ /* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY */ /* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, */ /* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE */ /* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */ /**************************************************************************/ #include "crypto.h" #include "core/config/engine.h" #include "core/io/certs_compressed.gen.h" #include "core/io/compression.h" /// Resources CryptoKey *(*CryptoKey::_create)(bool p_notify_postinitialize) = nullptr; CryptoKey *CryptoKey::create(bool p_notify_postinitialize) { if (_create) { return _create(p_notify_postinitialize); } return nullptr; } void CryptoKey::_bind_methods() { ClassDB::bind_method(D_METHOD("save", "path", "public_only"), &CryptoKey::save, DEFVAL(false)); ClassDB::bind_method(D_METHOD("load", "path", "public_only"), &CryptoKey::load, DEFVAL(false)); ClassDB::bind_method(D_METHOD("is_public_only"), &CryptoKey::is_public_only); ClassDB::bind_method(D_METHOD("save_to_string", "public_only"), &CryptoKey::save_to_string, DEFVAL(false)); ClassDB::bind_method(D_METHOD("load_from_string", "string_key", "public_only"), &CryptoKey::load_from_string, DEFVAL(false)); } X509Certificate *(*X509Certificate::_create)(bool p_notify_postinitialize) = nullptr; X509Certificate *X509Certificate::create(bool p_notify_postinitialize) { if (_create) { return _create(p_notify_postinitialize); } return nullptr; } void X509Certificate::_bind_methods() { ClassDB::bind_method(D_METHOD("save", "path"), &X509Certificate::save); ClassDB::bind_method(D_METHOD("load", "path"), &X509Certificate::load); ClassDB::bind_method(D_METHOD("save_to_string"), &X509Certificate::save_to_string); ClassDB::bind_method(D_METHOD("load_from_string", "string"), &X509Certificate::load_from_string); } /// TLSOptions Ref TLSOptions::client(Ref p_trusted_chain, const String &p_common_name_override) { Ref opts; opts.instantiate(); opts->mode = MODE_CLIENT; opts->trusted_ca_chain = p_trusted_chain; opts->common_name = p_common_name_override; return opts; } Ref TLSOptions::client_unsafe(Ref p_trusted_chain) { Ref opts; opts.instantiate(); opts->mode = MODE_CLIENT_UNSAFE; opts->trusted_ca_chain = p_trusted_chain; return opts; } Ref TLSOptions::server(Ref p_own_key, Ref p_own_certificate) { Ref opts; opts.instantiate(); opts->mode = MODE_SERVER; opts->own_certificate = p_own_certificate; opts->private_key = p_own_key; return opts; } void TLSOptions::_bind_methods() { ClassDB::bind_static_method("TLSOptions", D_METHOD("client", "trusted_chain", "common_name_override"), &TLSOptions::client, DEFVAL(Ref()), DEFVAL(String())); ClassDB::bind_static_method("TLSOptions", D_METHOD("client_unsafe", "trusted_chain"), &TLSOptions::client_unsafe, DEFVAL(Ref())); ClassDB::bind_static_method("TLSOptions", D_METHOD("server", "key", "certificate"), &TLSOptions::server); ClassDB::bind_method(D_METHOD("is_server"), &TLSOptions::is_server); ClassDB::bind_method(D_METHOD("is_unsafe_client"), &TLSOptions::is_unsafe_client); ClassDB::bind_method(D_METHOD("get_common_name_override"), &TLSOptions::get_common_name_override); ClassDB::bind_method(D_METHOD("get_trusted_ca_chain"), &TLSOptions::get_trusted_ca_chain); ClassDB::bind_method(D_METHOD("get_private_key"), &TLSOptions::get_private_key); ClassDB::bind_method(D_METHOD("get_own_certificate"), &TLSOptions::get_own_certificate); } /// HMACContext void HMACContext::_bind_methods() { ClassDB::bind_method(D_METHOD("start", "hash_type", "key"), &HMACContext::start); ClassDB::bind_method(D_METHOD("update", "data"), &HMACContext::update); ClassDB::bind_method(D_METHOD("finish"), &HMACContext::finish); } HMACContext *(*HMACContext::_create)(bool p_notify_postinitialize) = nullptr; HMACContext *HMACContext::create(bool p_notify_postinitialize) { if (_create) { return _create(p_notify_postinitialize); } ERR_FAIL_V_MSG(nullptr, "HMACContext is not available when the mbedtls module is disabled."); } /// Crypto void (*Crypto::_load_default_certificates)(const String &p_path) = nullptr; Crypto *(*Crypto::_create)(bool p_notify_postinitialize) = nullptr; Crypto *Crypto::create(bool p_notify_postinitialize) { if (_create) { return _create(p_notify_postinitialize); } ERR_FAIL_V_MSG(nullptr, "Crypto is not available when the mbedtls module is disabled."); } void Crypto::load_default_certificates(const String &p_path) { if (_load_default_certificates) { _load_default_certificates(p_path); } } PackedByteArray Crypto::hmac_digest(HashingContext::HashType p_hash_type, const PackedByteArray &p_key, const PackedByteArray &p_msg) { Ref ctx = Ref(HMACContext::create()); ERR_FAIL_COND_V_MSG(ctx.is_null(), PackedByteArray(), "HMAC is not available without mbedtls module."); Error err = ctx->start(p_hash_type, p_key); ERR_FAIL_COND_V(err != OK, PackedByteArray()); err = ctx->update(p_msg); ERR_FAIL_COND_V(err != OK, PackedByteArray()); return ctx->finish(); } // Compares two HMACS for equality without leaking timing information in order to prevent timing attacks. // @see: https://paragonie.com/blog/2015/11/preventing-timing-attacks-on-string-comparison-with-double-hmac-strategy bool Crypto::constant_time_compare(const PackedByteArray &p_trusted, const PackedByteArray &p_received) { const uint8_t *t = p_trusted.ptr(); const uint8_t *r = p_received.ptr(); int tlen = p_trusted.size(); int rlen = p_received.size(); // If the lengths are different then nothing else matters. if (tlen != rlen) { return false; } uint8_t v = 0; for (int i = 0; i < tlen; i++) { v |= t[i] ^ r[i]; } return v == 0; } void Crypto::_bind_methods() { ClassDB::bind_method(D_METHOD("generate_random_bytes", "size"), &Crypto::generate_random_bytes); ClassDB::bind_method(D_METHOD("generate_rsa", "size"), &Crypto::generate_rsa); ClassDB::bind_method(D_METHOD("generate_self_signed_certificate", "key", "issuer_name", "not_before", "not_after"), &Crypto::generate_self_signed_certificate, DEFVAL("CN=myserver,O=myorganisation,C=IT"), DEFVAL("20140101000000"), DEFVAL("20340101000000")); ClassDB::bind_method(D_METHOD("sign", "hash_type", "hash", "key"), &Crypto::sign); ClassDB::bind_method(D_METHOD("verify", "hash_type", "hash", "signature", "key"), &Crypto::verify); ClassDB::bind_method(D_METHOD("encrypt", "key", "plaintext"), &Crypto::encrypt); ClassDB::bind_method(D_METHOD("decrypt", "key", "ciphertext"), &Crypto::decrypt); ClassDB::bind_method(D_METHOD("hmac_digest", "hash_type", "key", "msg"), &Crypto::hmac_digest); ClassDB::bind_method(D_METHOD("constant_time_compare", "trusted", "received"), &Crypto::constant_time_compare); } /// Resource loader/saver Ref ResourceFormatLoaderCrypto::load(const String &p_path, const String &p_original_path, Error *r_error, bool p_use_sub_threads, float *r_progress, CacheMode p_cache_mode) { String el = p_path.get_extension().to_lower(); if (el == "crt") { X509Certificate *cert = X509Certificate::create(); if (cert) { cert->load(p_path); } return cert; } else if (el == "key") { CryptoKey *key = CryptoKey::create(); if (key) { key->load(p_path, false); } return key; } else if (el == "pub") { CryptoKey *key = CryptoKey::create(); if (key) { key->load(p_path, true); } return key; } return nullptr; } void ResourceFormatLoaderCrypto::get_recognized_extensions(List *p_extensions) const { p_extensions->push_back("crt"); p_extensions->push_back("key"); p_extensions->push_back("pub"); } bool ResourceFormatLoaderCrypto::handles_type(const String &p_type) const { return p_type == "X509Certificate" || p_type == "CryptoKey"; } String ResourceFormatLoaderCrypto::get_resource_type(const String &p_path) const { String el = p_path.get_extension().to_lower(); if (el == "crt") { return "X509Certificate"; } else if (el == "key" || el == "pub") { return "CryptoKey"; } return ""; } Error ResourceFormatSaverCrypto::save(const Ref &p_resource, const String &p_path, uint32_t p_flags) { Error err; Ref cert = p_resource; Ref key = p_resource; if (cert.is_valid()) { err = cert->save(p_path); } else if (key.is_valid()) { String el = p_path.get_extension().to_lower(); err = key->save(p_path, el == "pub"); } else { ERR_FAIL_V(ERR_INVALID_PARAMETER); } ERR_FAIL_COND_V_MSG(err != OK, err, vformat("Cannot save Crypto resource to file '%s'.", p_path)); return OK; } void ResourceFormatSaverCrypto::get_recognized_extensions(const Ref &p_resource, List *p_extensions) const { const X509Certificate *cert = Object::cast_to(*p_resource); const CryptoKey *key = Object::cast_to(*p_resource); if (cert) { p_extensions->push_back("crt"); } if (key) { if (!key->is_public_only()) { p_extensions->push_back("key"); } p_extensions->push_back("pub"); } } bool ResourceFormatSaverCrypto::recognize(const Ref &p_resource) const { return Object::cast_to(*p_resource) || Object::cast_to(*p_resource); }