2019-07-19 15:17:22 +02:00
|
|
|
/**************************************************************************/
|
|
|
|
/* crypto_mbedtls.h */
|
|
|
|
/**************************************************************************/
|
|
|
|
/* This file is part of: */
|
|
|
|
/* GODOT ENGINE */
|
|
|
|
/* https://godotengine.org */
|
|
|
|
/**************************************************************************/
|
|
|
|
/* Copyright (c) 2014-present Godot Engine contributors (see AUTHORS.md). */
|
|
|
|
/* Copyright (c) 2007-2014 Juan Linietsky, Ariel Manzur. */
|
|
|
|
/* */
|
|
|
|
/* Permission is hereby granted, free of charge, to any person obtaining */
|
|
|
|
/* a copy of this software and associated documentation files (the */
|
|
|
|
/* "Software"), to deal in the Software without restriction, including */
|
|
|
|
/* without limitation the rights to use, copy, modify, merge, publish, */
|
|
|
|
/* distribute, sublicense, and/or sell copies of the Software, and to */
|
|
|
|
/* permit persons to whom the Software is furnished to do so, subject to */
|
|
|
|
/* the following conditions: */
|
|
|
|
/* */
|
|
|
|
/* The above copyright notice and this permission notice shall be */
|
|
|
|
/* included in all copies or substantial portions of the Software. */
|
|
|
|
/* */
|
|
|
|
/* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, */
|
|
|
|
/* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF */
|
|
|
|
/* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. */
|
|
|
|
/* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY */
|
|
|
|
/* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, */
|
|
|
|
/* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE */
|
|
|
|
/* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */
|
|
|
|
/**************************************************************************/
|
|
|
|
|
|
|
|
#ifndef CRYPTO_MBEDTLS_H
|
|
|
|
#define CRYPTO_MBEDTLS_H
|
|
|
|
|
|
|
|
#include "core/crypto/crypto.h"
|
2020-11-07 23:33:38 +01:00
|
|
|
#include "core/io/resource.h"
|
2019-07-19 15:17:22 +02:00
|
|
|
|
|
|
|
#include <mbedtls/ctr_drbg.h>
|
|
|
|
#include <mbedtls/entropy.h>
|
|
|
|
#include <mbedtls/ssl.h>
|
|
|
|
|
|
|
|
class CryptoMbedTLS;
|
2022-09-07 08:25:47 +02:00
|
|
|
class TLSContextMbedTLS;
|
2019-07-19 15:17:22 +02:00
|
|
|
class CryptoKeyMbedTLS : public CryptoKey {
|
|
|
|
private:
|
|
|
|
mbedtls_pk_context pkey;
|
2020-06-05 21:28:16 +02:00
|
|
|
int locks = 0;
|
|
|
|
bool public_only = true;
|
2019-07-19 15:17:22 +02:00
|
|
|
|
2023-09-25 05:04:06 +02:00
|
|
|
int _parse_key(const uint8_t *p_buf, int p_size);
|
|
|
|
|
2019-07-19 15:17:22 +02:00
|
|
|
public:
|
2024-04-22 16:34:44 +02:00
|
|
|
static CryptoKey *create(bool p_notify_postinitialize = true);
|
2019-07-19 15:17:22 +02:00
|
|
|
static void make_default() { CryptoKey::_create = create; }
|
2020-04-02 01:20:12 +02:00
|
|
|
static void finalize() { CryptoKey::_create = nullptr; }
|
2019-07-19 15:17:22 +02:00
|
|
|
|
2024-01-09 02:36:19 +01:00
|
|
|
virtual Error load(const String &p_path, bool p_public_only);
|
|
|
|
virtual Error save(const String &p_path, bool p_public_only);
|
2020-06-05 21:28:16 +02:00
|
|
|
virtual String save_to_string(bool p_public_only);
|
2024-01-09 02:36:19 +01:00
|
|
|
virtual Error load_from_string(const String &p_string_key, bool p_public_only);
|
2020-06-05 21:28:16 +02:00
|
|
|
virtual bool is_public_only() const { return public_only; };
|
2019-07-19 15:17:22 +02:00
|
|
|
|
|
|
|
CryptoKeyMbedTLS() {
|
|
|
|
mbedtls_pk_init(&pkey);
|
|
|
|
locks = 0;
|
|
|
|
}
|
|
|
|
~CryptoKeyMbedTLS() {
|
|
|
|
mbedtls_pk_free(&pkey);
|
|
|
|
}
|
|
|
|
|
|
|
|
_FORCE_INLINE_ void lock() { locks++; }
|
|
|
|
_FORCE_INLINE_ void unlock() { locks--; }
|
|
|
|
|
|
|
|
friend class CryptoMbedTLS;
|
2022-09-07 08:25:47 +02:00
|
|
|
friend class TLSContextMbedTLS;
|
2019-07-19 15:17:22 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
class X509CertificateMbedTLS : public X509Certificate {
|
|
|
|
private:
|
|
|
|
mbedtls_x509_crt cert;
|
|
|
|
int locks;
|
|
|
|
|
|
|
|
public:
|
2024-04-22 16:34:44 +02:00
|
|
|
static X509Certificate *create(bool p_notify_postinitialize = true);
|
2019-07-19 15:17:22 +02:00
|
|
|
static void make_default() { X509Certificate::_create = create; }
|
2020-04-02 01:20:12 +02:00
|
|
|
static void finalize() { X509Certificate::_create = nullptr; }
|
2019-07-19 15:17:22 +02:00
|
|
|
|
2024-01-09 02:36:19 +01:00
|
|
|
virtual Error load(const String &p_path);
|
2019-07-19 15:17:22 +02:00
|
|
|
virtual Error load_from_memory(const uint8_t *p_buffer, int p_len);
|
2024-01-09 02:36:19 +01:00
|
|
|
virtual Error save(const String &p_path);
|
2023-04-05 23:45:55 +02:00
|
|
|
virtual String save_to_string();
|
|
|
|
virtual Error load_from_string(const String &p_string_key);
|
2019-07-19 15:17:22 +02:00
|
|
|
|
|
|
|
X509CertificateMbedTLS() {
|
|
|
|
mbedtls_x509_crt_init(&cert);
|
|
|
|
locks = 0;
|
|
|
|
}
|
|
|
|
~X509CertificateMbedTLS() {
|
|
|
|
mbedtls_x509_crt_free(&cert);
|
|
|
|
}
|
|
|
|
|
|
|
|
_FORCE_INLINE_ void lock() { locks++; }
|
|
|
|
_FORCE_INLINE_ void unlock() { locks--; }
|
|
|
|
|
|
|
|
friend class CryptoMbedTLS;
|
2022-09-07 08:25:47 +02:00
|
|
|
friend class TLSContextMbedTLS;
|
2019-07-19 15:17:22 +02:00
|
|
|
};
|
|
|
|
|
2020-11-14 13:42:47 +01:00
|
|
|
class HMACContextMbedTLS : public HMACContext {
|
|
|
|
private:
|
|
|
|
HashingContext::HashType hash_type;
|
|
|
|
int hash_len = 0;
|
|
|
|
void *ctx = nullptr;
|
|
|
|
|
|
|
|
public:
|
2024-04-22 16:34:44 +02:00
|
|
|
static HMACContext *create(bool p_notify_postinitialize = true);
|
2020-11-14 13:42:47 +01:00
|
|
|
static void make_default() { HMACContext::_create = create; }
|
|
|
|
static void finalize() { HMACContext::_create = nullptr; }
|
|
|
|
|
|
|
|
static bool is_md_type_allowed(mbedtls_md_type_t p_md_type);
|
|
|
|
|
2024-01-09 02:36:19 +01:00
|
|
|
virtual Error start(HashingContext::HashType p_hash_type, const PackedByteArray &p_key);
|
|
|
|
virtual Error update(const PackedByteArray &p_data);
|
2020-11-14 13:42:47 +01:00
|
|
|
virtual PackedByteArray finish();
|
|
|
|
|
|
|
|
HMACContextMbedTLS() {}
|
2021-07-03 16:12:55 +02:00
|
|
|
~HMACContextMbedTLS();
|
2020-11-14 13:42:47 +01:00
|
|
|
};
|
|
|
|
|
2019-07-19 15:17:22 +02:00
|
|
|
class CryptoMbedTLS : public Crypto {
|
|
|
|
private:
|
|
|
|
mbedtls_entropy_context entropy;
|
|
|
|
mbedtls_ctr_drbg_context ctr_drbg;
|
|
|
|
static X509CertificateMbedTLS *default_certs;
|
|
|
|
|
|
|
|
public:
|
2024-04-22 16:34:44 +02:00
|
|
|
static Crypto *create(bool p_notify_postinitialize = true);
|
2019-07-19 15:17:22 +02:00
|
|
|
static void initialize_crypto();
|
|
|
|
static void finalize_crypto();
|
|
|
|
static X509CertificateMbedTLS *get_default_certificates();
|
2024-01-09 02:36:19 +01:00
|
|
|
static void load_default_certificates(const String &p_path);
|
2020-11-14 13:42:47 +01:00
|
|
|
static mbedtls_md_type_t md_type_from_hashtype(HashingContext::HashType p_hash_type, int &r_size);
|
2019-07-19 15:17:22 +02:00
|
|
|
|
2020-02-17 22:06:54 +01:00
|
|
|
virtual PackedByteArray generate_random_bytes(int p_bytes);
|
2019-07-19 15:17:22 +02:00
|
|
|
virtual Ref<CryptoKey> generate_rsa(int p_bytes);
|
2024-01-09 02:36:19 +01:00
|
|
|
virtual Ref<X509Certificate> generate_self_signed_certificate(Ref<CryptoKey> p_key, const String &p_issuer_name, const String &p_not_before, const String &p_not_after);
|
|
|
|
virtual Vector<uint8_t> sign(HashingContext::HashType p_hash_type, const Vector<uint8_t> &p_hash, Ref<CryptoKey> p_key);
|
|
|
|
virtual bool verify(HashingContext::HashType p_hash_type, const Vector<uint8_t> &p_hash, const Vector<uint8_t> &p_signature, Ref<CryptoKey> p_key);
|
|
|
|
virtual Vector<uint8_t> encrypt(Ref<CryptoKey> p_key, const Vector<uint8_t> &p_plaintext);
|
|
|
|
virtual Vector<uint8_t> decrypt(Ref<CryptoKey> p_key, const Vector<uint8_t> &p_ciphertext);
|
2019-07-19 15:17:22 +02:00
|
|
|
|
|
|
|
CryptoMbedTLS();
|
|
|
|
~CryptoMbedTLS();
|
|
|
|
};
|
|
|
|
|
|
|
|
#endif // CRYPTO_MBEDTLS_H
|