/**************************************************************************/ /* crypto.h */ /**************************************************************************/ /* This file is part of: */ /* GODOT ENGINE */ /* https://godotengine.org */ /**************************************************************************/ /* Copyright (c) 2014-present Godot Engine contributors (see AUTHORS.md). */ /* Copyright (c) 2007-2014 Juan Linietsky, Ariel Manzur. */ /* */ /* Permission is hereby granted, free of charge, to any person obtaining */ /* a copy of this software and associated documentation files (the */ /* "Software"), to deal in the Software without restriction, including */ /* without limitation the rights to use, copy, modify, merge, publish, */ /* distribute, sublicense, and/or sell copies of the Software, and to */ /* permit persons to whom the Software is furnished to do so, subject to */ /* the following conditions: */ /* */ /* The above copyright notice and this permission notice shall be */ /* included in all copies or substantial portions of the Software. */ /* */ /* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, */ /* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF */ /* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. */ /* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY */ /* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, */ /* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE */ /* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. */ /**************************************************************************/ #ifndef CRYPTO_H #define CRYPTO_H #include "core/crypto/hashing_context.h" #include "core/io/resource.h" #include "core/io/resource_loader.h" #include "core/io/resource_saver.h" #include "core/object/ref_counted.h" class CryptoKey : public Resource { GDCLASS(CryptoKey, Resource); protected: static void _bind_methods(); static CryptoKey *(*_create)(); public: static CryptoKey *create(); virtual Error load(const String &p_path, bool p_public_only = false) = 0; virtual Error save(const String &p_path, bool p_public_only = false) = 0; virtual String save_to_string(bool p_public_only = false) = 0; virtual Error load_from_string(const String &p_string_key, bool p_public_only = false) = 0; virtual bool is_public_only() const = 0; }; class X509Certificate : public Resource { GDCLASS(X509Certificate, Resource); protected: static void _bind_methods(); static X509Certificate *(*_create)(); public: static X509Certificate *create(); virtual Error load(const String &p_path) = 0; virtual Error load_from_memory(const uint8_t *p_buffer, int p_len) = 0; virtual Error save(const String &p_path) = 0; virtual String save_to_string() = 0; virtual Error load_from_string(const String &string) = 0; }; class TLSOptions : public RefCounted { GDCLASS(TLSOptions, RefCounted); public: enum TLSVerifyMode { TLS_VERIFY_NONE = 0, TLS_VERIFY_CERT = 1, TLS_VERIFY_FULL = 2, }; private: bool server_mode = false; String common_name; TLSVerifyMode verify_mode = TLS_VERIFY_FULL; Ref trusted_ca_chain; Ref own_certificate; Ref private_key; protected: static void _bind_methods(); public: static Ref client(Ref p_trusted_chain = Ref(), const String &p_common_name_override = String()); static Ref client_unsafe(Ref p_trusted_chain); static Ref server(Ref p_own_key, Ref p_own_certificate); TLSVerifyMode get_verify_mode() const { return verify_mode; } String get_common_name() const { return common_name; } Ref get_trusted_ca_chain() const { return trusted_ca_chain; } Ref get_own_certificate() const { return own_certificate; } Ref get_private_key() const { return private_key; } bool is_server() const { return server_mode; } }; class HMACContext : public RefCounted { GDCLASS(HMACContext, RefCounted); protected: static void _bind_methods(); static HMACContext *(*_create)(); public: static HMACContext *create(); virtual Error start(HashingContext::HashType p_hash_type, const PackedByteArray &p_key) = 0; virtual Error update(const PackedByteArray &p_data) = 0; virtual PackedByteArray finish() = 0; HMACContext() {} virtual ~HMACContext() {} }; class Crypto : public RefCounted { GDCLASS(Crypto, RefCounted); protected: static void _bind_methods(); static Crypto *(*_create)(); static void (*_load_default_certificates)(const String &p_path); public: static Crypto *create(); static void load_default_certificates(const String &p_path); virtual PackedByteArray generate_random_bytes(int p_bytes) = 0; virtual Ref generate_rsa(int p_bytes) = 0; virtual Ref generate_self_signed_certificate(Ref p_key, const String &p_issuer_name, const String &p_not_before, const String &p_not_after) = 0; virtual Vector sign(HashingContext::HashType p_hash_type, const Vector &p_hash, Ref p_key) = 0; virtual bool verify(HashingContext::HashType p_hash_type, const Vector &p_hash, const Vector &p_signature, Ref p_key) = 0; virtual Vector encrypt(Ref p_key, const Vector &p_plaintext) = 0; virtual Vector decrypt(Ref p_key, const Vector &p_ciphertext) = 0; PackedByteArray hmac_digest(HashingContext::HashType p_hash_type, const PackedByteArray &p_key, const PackedByteArray &p_msg); // Compares two PackedByteArrays for equality without leaking timing information in order to prevent timing attacks. // @see: https://paragonie.com/blog/2015/11/preventing-timing-attacks-on-string-comparison-with-double-hmac-strategy bool constant_time_compare(const PackedByteArray &p_trusted, const PackedByteArray &p_received); Crypto() {} }; class ResourceFormatLoaderCrypto : public ResourceFormatLoader { public: virtual Ref load(const String &p_path, const String &p_original_path = "", Error *r_error = nullptr, bool p_use_sub_threads = false, float *r_progress = nullptr, CacheMode p_cache_mode = CACHE_MODE_REUSE); virtual void get_recognized_extensions(List *p_extensions) const; virtual bool handles_type(const String &p_type) const; virtual String get_resource_type(const String &p_path) const; }; class ResourceFormatSaverCrypto : public ResourceFormatSaver { public: virtual Error save(const Ref &p_resource, const String &p_path, uint32_t p_flags = 0); virtual void get_recognized_extensions(const Ref &p_resource, List *p_extensions) const; virtual bool recognize(const Ref &p_resource) const; }; #endif // CRYPTO_H