| 
									
										
										
										
											2023-01-05 13:25:55 +01:00
										 |  |  | /**************************************************************************/ | 
					
						
							|  |  |  | /*  crypto.cpp                                                            */ | 
					
						
							|  |  |  | /**************************************************************************/ | 
					
						
							|  |  |  | /*                         This file is part of:                          */ | 
					
						
							|  |  |  | /*                             GODOT ENGINE                               */ | 
					
						
							|  |  |  | /*                        https://godotengine.org                         */ | 
					
						
							|  |  |  | /**************************************************************************/ | 
					
						
							|  |  |  | /* Copyright (c) 2014-present Godot Engine contributors (see AUTHORS.md). */ | 
					
						
							|  |  |  | /* Copyright (c) 2007-2014 Juan Linietsky, Ariel Manzur.                  */ | 
					
						
							|  |  |  | /*                                                                        */ | 
					
						
							|  |  |  | /* Permission is hereby granted, free of charge, to any person obtaining  */ | 
					
						
							|  |  |  | /* a copy of this software and associated documentation files (the        */ | 
					
						
							|  |  |  | /* "Software"), to deal in the Software without restriction, including    */ | 
					
						
							|  |  |  | /* without limitation the rights to use, copy, modify, merge, publish,    */ | 
					
						
							|  |  |  | /* distribute, sublicense, and/or sell copies of the Software, and to     */ | 
					
						
							|  |  |  | /* permit persons to whom the Software is furnished to do so, subject to  */ | 
					
						
							|  |  |  | /* the following conditions:                                              */ | 
					
						
							|  |  |  | /*                                                                        */ | 
					
						
							|  |  |  | /* The above copyright notice and this permission notice shall be         */ | 
					
						
							|  |  |  | /* included in all copies or substantial portions of the Software.        */ | 
					
						
							|  |  |  | /*                                                                        */ | 
					
						
							|  |  |  | /* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,        */ | 
					
						
							|  |  |  | /* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF     */ | 
					
						
							|  |  |  | /* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. */ | 
					
						
							|  |  |  | /* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY   */ | 
					
						
							|  |  |  | /* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,   */ | 
					
						
							|  |  |  | /* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE      */ | 
					
						
							|  |  |  | /* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.                 */ | 
					
						
							|  |  |  | /**************************************************************************/ | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | #include "crypto.h"
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-11-07 19:33:38 -03:00
										 |  |  | #include "core/config/engine.h"
 | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | #include "core/io/certs_compressed.gen.h"
 | 
					
						
							|  |  |  | #include "core/io/compression.h"
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /// Resources
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-04-22 22:34:44 +08:00
										 |  |  | CryptoKey *(*CryptoKey::_create)(bool p_notify_postinitialize) = nullptr; | 
					
						
							|  |  |  | CryptoKey *CryptoKey::create(bool p_notify_postinitialize) { | 
					
						
							| 
									
										
										
										
											2020-05-14 16:41:43 +02:00
										 |  |  | 	if (_create) { | 
					
						
							| 
									
										
										
										
											2024-04-22 22:34:44 +08:00
										 |  |  | 		return _create(p_notify_postinitialize); | 
					
						
							| 
									
										
										
										
											2020-05-14 16:41:43 +02:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2020-04-02 01:20:12 +02:00
										 |  |  | 	return nullptr; | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | void CryptoKey::_bind_methods() { | 
					
						
							| 
									
										
										
										
											2020-06-05 21:28:16 +02:00
										 |  |  | 	ClassDB::bind_method(D_METHOD("save", "path", "public_only"), &CryptoKey::save, DEFVAL(false)); | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("load", "path", "public_only"), &CryptoKey::load, DEFVAL(false)); | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("is_public_only"), &CryptoKey::is_public_only); | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("save_to_string", "public_only"), &CryptoKey::save_to_string, DEFVAL(false)); | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("load_from_string", "string_key", "public_only"), &CryptoKey::load_from_string, DEFVAL(false)); | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-04-22 22:34:44 +08:00
										 |  |  | X509Certificate *(*X509Certificate::_create)(bool p_notify_postinitialize) = nullptr; | 
					
						
							|  |  |  | X509Certificate *X509Certificate::create(bool p_notify_postinitialize) { | 
					
						
							| 
									
										
										
										
											2020-05-14 16:41:43 +02:00
										 |  |  | 	if (_create) { | 
					
						
							| 
									
										
										
										
											2024-04-22 22:34:44 +08:00
										 |  |  | 		return _create(p_notify_postinitialize); | 
					
						
							| 
									
										
										
										
											2020-05-14 16:41:43 +02:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2020-04-02 01:20:12 +02:00
										 |  |  | 	return nullptr; | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | void X509Certificate::_bind_methods() { | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("save", "path"), &X509Certificate::save); | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("load", "path"), &X509Certificate::load); | 
					
						
							| 
									
										
										
										
											2023-04-05 17:45:55 -04:00
										 |  |  | 	ClassDB::bind_method(D_METHOD("save_to_string"), &X509Certificate::save_to_string); | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("load_from_string", "string"), &X509Certificate::load_from_string); | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-01-20 01:51:35 +01:00
										 |  |  | /// TLSOptions
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | Ref<TLSOptions> TLSOptions::client(Ref<X509Certificate> p_trusted_chain, const String &p_common_name_override) { | 
					
						
							|  |  |  | 	Ref<TLSOptions> opts; | 
					
						
							|  |  |  | 	opts.instantiate(); | 
					
						
							| 
									
										
										
										
											2024-06-11 11:13:22 +02:00
										 |  |  | 	opts->mode = MODE_CLIENT; | 
					
						
							| 
									
										
										
										
											2023-01-20 01:51:35 +01:00
										 |  |  | 	opts->trusted_ca_chain = p_trusted_chain; | 
					
						
							|  |  |  | 	opts->common_name = p_common_name_override; | 
					
						
							|  |  |  | 	return opts; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | Ref<TLSOptions> TLSOptions::client_unsafe(Ref<X509Certificate> p_trusted_chain) { | 
					
						
							|  |  |  | 	Ref<TLSOptions> opts; | 
					
						
							|  |  |  | 	opts.instantiate(); | 
					
						
							| 
									
										
										
										
											2024-06-11 11:13:22 +02:00
										 |  |  | 	opts->mode = MODE_CLIENT_UNSAFE; | 
					
						
							| 
									
										
										
										
											2023-01-20 01:51:35 +01:00
										 |  |  | 	opts->trusted_ca_chain = p_trusted_chain; | 
					
						
							|  |  |  | 	return opts; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | Ref<TLSOptions> TLSOptions::server(Ref<CryptoKey> p_own_key, Ref<X509Certificate> p_own_certificate) { | 
					
						
							|  |  |  | 	Ref<TLSOptions> opts; | 
					
						
							|  |  |  | 	opts.instantiate(); | 
					
						
							| 
									
										
										
										
											2024-06-11 11:13:22 +02:00
										 |  |  | 	opts->mode = MODE_SERVER; | 
					
						
							| 
									
										
										
										
											2023-01-20 01:51:35 +01:00
										 |  |  | 	opts->own_certificate = p_own_certificate; | 
					
						
							|  |  |  | 	opts->private_key = p_own_key; | 
					
						
							|  |  |  | 	return opts; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | void TLSOptions::_bind_methods() { | 
					
						
							|  |  |  | 	ClassDB::bind_static_method("TLSOptions", D_METHOD("client", "trusted_chain", "common_name_override"), &TLSOptions::client, DEFVAL(Ref<X509Certificate>()), DEFVAL(String())); | 
					
						
							|  |  |  | 	ClassDB::bind_static_method("TLSOptions", D_METHOD("client_unsafe", "trusted_chain"), &TLSOptions::client_unsafe, DEFVAL(Ref<X509Certificate>())); | 
					
						
							|  |  |  | 	ClassDB::bind_static_method("TLSOptions", D_METHOD("server", "key", "certificate"), &TLSOptions::server); | 
					
						
							| 
									
										
										
										
											2024-06-11 11:13:22 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("is_server"), &TLSOptions::is_server); | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("is_unsafe_client"), &TLSOptions::is_unsafe_client); | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("get_common_name_override"), &TLSOptions::get_common_name_override); | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("get_trusted_ca_chain"), &TLSOptions::get_trusted_ca_chain); | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("get_private_key"), &TLSOptions::get_private_key); | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("get_own_certificate"), &TLSOptions::get_own_certificate); | 
					
						
							| 
									
										
										
										
											2023-01-20 01:51:35 +01:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-11-14 04:42:47 -08:00
										 |  |  | /// HMACContext
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | void HMACContext::_bind_methods() { | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("start", "hash_type", "key"), &HMACContext::start); | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("update", "data"), &HMACContext::update); | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("finish"), &HMACContext::finish); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-04-22 22:34:44 +08:00
										 |  |  | HMACContext *(*HMACContext::_create)(bool p_notify_postinitialize) = nullptr; | 
					
						
							|  |  |  | HMACContext *HMACContext::create(bool p_notify_postinitialize) { | 
					
						
							| 
									
										
										
										
											2020-11-14 04:42:47 -08:00
										 |  |  | 	if (_create) { | 
					
						
							| 
									
										
										
										
											2024-04-22 22:34:44 +08:00
										 |  |  | 		return _create(p_notify_postinitialize); | 
					
						
							| 
									
										
										
										
											2020-11-14 04:42:47 -08:00
										 |  |  | 	} | 
					
						
							|  |  |  | 	ERR_FAIL_V_MSG(nullptr, "HMACContext is not available when the mbedtls module is disabled."); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | /// Crypto
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-01-08 22:36:19 -03:00
										 |  |  | void (*Crypto::_load_default_certificates)(const String &p_path) = nullptr; | 
					
						
							| 
									
										
										
										
											2024-04-22 22:34:44 +08:00
										 |  |  | Crypto *(*Crypto::_create)(bool p_notify_postinitialize) = nullptr; | 
					
						
							|  |  |  | Crypto *Crypto::create(bool p_notify_postinitialize) { | 
					
						
							| 
									
										
										
										
											2020-05-14 16:41:43 +02:00
										 |  |  | 	if (_create) { | 
					
						
							| 
									
										
										
										
											2024-04-22 22:34:44 +08:00
										 |  |  | 		return _create(p_notify_postinitialize); | 
					
						
							| 
									
										
										
										
											2020-05-14 16:41:43 +02:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2020-06-06 15:47:51 +02:00
										 |  |  | 	ERR_FAIL_V_MSG(nullptr, "Crypto is not available when the mbedtls module is disabled."); | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-01-08 22:36:19 -03:00
										 |  |  | void Crypto::load_default_certificates(const String &p_path) { | 
					
						
							| 
									
										
										
										
											2020-05-14 16:41:43 +02:00
										 |  |  | 	if (_load_default_certificates) { | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | 		_load_default_certificates(p_path); | 
					
						
							| 
									
										
										
										
											2020-05-14 16:41:43 +02:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-01-08 22:36:19 -03:00
										 |  |  | PackedByteArray Crypto::hmac_digest(HashingContext::HashType p_hash_type, const PackedByteArray &p_key, const PackedByteArray &p_msg) { | 
					
						
							| 
									
										
										
										
											2020-11-14 04:42:47 -08:00
										 |  |  | 	Ref<HMACContext> ctx = Ref<HMACContext>(HMACContext::create()); | 
					
						
							| 
									
										
										
										
											2021-03-12 19:05:16 +05:30
										 |  |  | 	ERR_FAIL_COND_V_MSG(ctx.is_null(), PackedByteArray(), "HMAC is not available without mbedtls module."); | 
					
						
							| 
									
										
										
										
											2020-11-14 04:42:47 -08:00
										 |  |  | 	Error err = ctx->start(p_hash_type, p_key); | 
					
						
							|  |  |  | 	ERR_FAIL_COND_V(err != OK, PackedByteArray()); | 
					
						
							|  |  |  | 	err = ctx->update(p_msg); | 
					
						
							|  |  |  | 	ERR_FAIL_COND_V(err != OK, PackedByteArray()); | 
					
						
							|  |  |  | 	return ctx->finish(); | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-03-12 19:05:16 +05:30
										 |  |  | // Compares two HMACS for equality without leaking timing information in order to prevent timing attacks.
 | 
					
						
							| 
									
										
										
										
											2020-11-14 04:42:47 -08:00
										 |  |  | // @see: https://paragonie.com/blog/2015/11/preventing-timing-attacks-on-string-comparison-with-double-hmac-strategy
 | 
					
						
							| 
									
										
										
										
											2024-01-08 22:36:19 -03:00
										 |  |  | bool Crypto::constant_time_compare(const PackedByteArray &p_trusted, const PackedByteArray &p_received) { | 
					
						
							| 
									
										
										
										
											2020-11-14 04:42:47 -08:00
										 |  |  | 	const uint8_t *t = p_trusted.ptr(); | 
					
						
							|  |  |  | 	const uint8_t *r = p_received.ptr(); | 
					
						
							|  |  |  | 	int tlen = p_trusted.size(); | 
					
						
							|  |  |  | 	int rlen = p_received.size(); | 
					
						
							|  |  |  | 	// If the lengths are different then nothing else matters.
 | 
					
						
							|  |  |  | 	if (tlen != rlen) { | 
					
						
							|  |  |  | 		return false; | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	uint8_t v = 0; | 
					
						
							|  |  |  | 	for (int i = 0; i < tlen; i++) { | 
					
						
							|  |  |  | 		v |= t[i] ^ r[i]; | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	return v == 0; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | void Crypto::_bind_methods() { | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("generate_random_bytes", "size"), &Crypto::generate_random_bytes); | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("generate_rsa", "size"), &Crypto::generate_rsa); | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("generate_self_signed_certificate", "key", "issuer_name", "not_before", "not_after"), &Crypto::generate_self_signed_certificate, DEFVAL("CN=myserver,O=myorganisation,C=IT"), DEFVAL("20140101000000"), DEFVAL("20340101000000")); | 
					
						
							| 
									
										
										
										
											2020-06-06 15:42:46 +02:00
										 |  |  | 	ClassDB::bind_method(D_METHOD("sign", "hash_type", "hash", "key"), &Crypto::sign); | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("verify", "hash_type", "hash", "signature", "key"), &Crypto::verify); | 
					
						
							| 
									
										
										
										
											2020-06-06 16:09:28 +02:00
										 |  |  | 	ClassDB::bind_method(D_METHOD("encrypt", "key", "plaintext"), &Crypto::encrypt); | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("decrypt", "key", "ciphertext"), &Crypto::decrypt); | 
					
						
							| 
									
										
										
										
											2020-11-14 04:42:47 -08:00
										 |  |  | 	ClassDB::bind_method(D_METHOD("hmac_digest", "hash_type", "key", "msg"), &Crypto::hmac_digest); | 
					
						
							|  |  |  | 	ClassDB::bind_method(D_METHOD("constant_time_compare", "trusted", "received"), &Crypto::constant_time_compare); | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | /// Resource loader/saver
 | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-05-03 01:43:50 +02:00
										 |  |  | Ref<Resource> ResourceFormatLoaderCrypto::load(const String &p_path, const String &p_original_path, Error *r_error, bool p_use_sub_threads, float *r_progress, CacheMode p_cache_mode) { | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | 	String el = p_path.get_extension().to_lower(); | 
					
						
							|  |  |  | 	if (el == "crt") { | 
					
						
							|  |  |  | 		X509Certificate *cert = X509Certificate::create(); | 
					
						
							| 
									
										
										
										
											2020-05-14 16:41:43 +02:00
										 |  |  | 		if (cert) { | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | 			cert->load(p_path); | 
					
						
							| 
									
										
										
										
											2020-05-14 16:41:43 +02:00
										 |  |  | 		} | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | 		return cert; | 
					
						
							|  |  |  | 	} else if (el == "key") { | 
					
						
							|  |  |  | 		CryptoKey *key = CryptoKey::create(); | 
					
						
							| 
									
										
										
										
											2020-05-14 16:41:43 +02:00
										 |  |  | 		if (key) { | 
					
						
							| 
									
										
										
										
											2020-06-05 21:28:16 +02:00
										 |  |  | 			key->load(p_path, false); | 
					
						
							| 
									
										
										
										
											2020-05-14 16:41:43 +02:00
										 |  |  | 		} | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | 		return key; | 
					
						
							| 
									
										
										
										
											2020-06-05 21:28:16 +02:00
										 |  |  | 	} else if (el == "pub") { | 
					
						
							|  |  |  | 		CryptoKey *key = CryptoKey::create(); | 
					
						
							| 
									
										
										
										
											2021-04-05 14:09:59 +02:00
										 |  |  | 		if (key) { | 
					
						
							| 
									
										
										
										
											2020-06-05 21:28:16 +02:00
										 |  |  | 			key->load(p_path, true); | 
					
						
							| 
									
										
										
										
											2021-04-05 14:09:59 +02:00
										 |  |  | 		} | 
					
						
							| 
									
										
										
										
											2020-06-05 21:28:16 +02:00
										 |  |  | 		return key; | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2020-04-02 01:20:12 +02:00
										 |  |  | 	return nullptr; | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | void ResourceFormatLoaderCrypto::get_recognized_extensions(List<String> *p_extensions) const { | 
					
						
							|  |  |  | 	p_extensions->push_back("crt"); | 
					
						
							|  |  |  | 	p_extensions->push_back("key"); | 
					
						
							| 
									
										
										
										
											2020-06-05 21:28:16 +02:00
										 |  |  | 	p_extensions->push_back("pub"); | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | bool ResourceFormatLoaderCrypto::handles_type(const String &p_type) const { | 
					
						
							|  |  |  | 	return p_type == "X509Certificate" || p_type == "CryptoKey"; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | String ResourceFormatLoaderCrypto::get_resource_type(const String &p_path) const { | 
					
						
							|  |  |  | 	String el = p_path.get_extension().to_lower(); | 
					
						
							| 
									
										
										
										
											2020-05-14 16:41:43 +02:00
										 |  |  | 	if (el == "crt") { | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | 		return "X509Certificate"; | 
					
						
							| 
									
										
										
										
											2020-06-05 21:28:16 +02:00
										 |  |  | 	} else if (el == "key" || el == "pub") { | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | 		return "CryptoKey"; | 
					
						
							| 
									
										
										
										
											2020-05-14 16:41:43 +02:00
										 |  |  | 	} | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | 	return ""; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-06-03 01:33:42 +02:00
										 |  |  | Error ResourceFormatSaverCrypto::save(const Ref<Resource> &p_resource, const String &p_path, uint32_t p_flags) { | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | 	Error err; | 
					
						
							|  |  |  | 	Ref<X509Certificate> cert = p_resource; | 
					
						
							|  |  |  | 	Ref<CryptoKey> key = p_resource; | 
					
						
							|  |  |  | 	if (cert.is_valid()) { | 
					
						
							|  |  |  | 		err = cert->save(p_path); | 
					
						
							|  |  |  | 	} else if (key.is_valid()) { | 
					
						
							| 
									
										
										
										
											2020-06-05 21:28:16 +02:00
										 |  |  | 		String el = p_path.get_extension().to_lower(); | 
					
						
							|  |  |  | 		err = key->save(p_path, el == "pub"); | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | 	} else { | 
					
						
							|  |  |  | 		ERR_FAIL_V(ERR_INVALID_PARAMETER); | 
					
						
							|  |  |  | 	} | 
					
						
							| 
									
										
										
										
											2019-09-25 10:28:50 +02:00
										 |  |  | 	ERR_FAIL_COND_V_MSG(err != OK, err, "Cannot save Crypto resource to file '" + p_path + "'."); | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | 	return OK; | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-05-03 01:43:50 +02:00
										 |  |  | void ResourceFormatSaverCrypto::get_recognized_extensions(const Ref<Resource> &p_resource, List<String> *p_extensions) const { | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | 	const X509Certificate *cert = Object::cast_to<X509Certificate>(*p_resource); | 
					
						
							|  |  |  | 	const CryptoKey *key = Object::cast_to<CryptoKey>(*p_resource); | 
					
						
							|  |  |  | 	if (cert) { | 
					
						
							|  |  |  | 		p_extensions->push_back("crt"); | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	if (key) { | 
					
						
							| 
									
										
										
										
											2020-06-05 21:28:16 +02:00
										 |  |  | 		if (!key->is_public_only()) { | 
					
						
							|  |  |  | 			p_extensions->push_back("key"); | 
					
						
							|  |  |  | 		} | 
					
						
							|  |  |  | 		p_extensions->push_back("pub"); | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | 	} | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2020-05-14 14:29:06 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-05-03 01:43:50 +02:00
										 |  |  | bool ResourceFormatSaverCrypto::recognize(const Ref<Resource> &p_resource) const { | 
					
						
							| 
									
										
										
										
											2019-07-11 15:26:44 +02:00
										 |  |  | 	return Object::cast_to<X509Certificate>(*p_resource) || Object::cast_to<CryptoKey>(*p_resource); | 
					
						
							|  |  |  | } |