mirror of
				https://github.com/godotengine/godot.git
				synced 2025-10-31 05:31:01 +00:00 
			
		
		
		
	 b5334d14f7
			
		
	
	
		b5334d14f7
		
			
		
	
	
	
	
		
			
			Happy new year to the wonderful Godot community!
2020 has been a tough year for most of us personally, but a good year for
Godot development nonetheless with a huge amount of work done towards Godot
4.0 and great improvements backported to the long-lived 3.2 branch.
We've had close to 400 contributors to engine code this year, authoring near
7,000 commit! (And that's only for the `master` branch and for the engine code,
there's a lot more when counting docs, demos and other first-party repos.)
Here's to a great year 2021 for all Godot users 🎆
		
	
			
		
			
				
	
	
		
			115 lines
		
	
	
	
		
			5.3 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			115 lines
		
	
	
	
		
			5.3 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*************************************************************************/
 | |
| /*  aes_context.cpp                                                      */
 | |
| /*************************************************************************/
 | |
| /*                       This file is part of:                           */
 | |
| /*                           GODOT ENGINE                                */
 | |
| /*                      https://godotengine.org                          */
 | |
| /*************************************************************************/
 | |
| /* Copyright (c) 2007-2021 Juan Linietsky, Ariel Manzur.                 */
 | |
| /* Copyright (c) 2014-2021 Godot Engine contributors (cf. AUTHORS.md).   */
 | |
| /*                                                                       */
 | |
| /* Permission is hereby granted, free of charge, to any person obtaining */
 | |
| /* a copy of this software and associated documentation files (the       */
 | |
| /* "Software"), to deal in the Software without restriction, including   */
 | |
| /* without limitation the rights to use, copy, modify, merge, publish,   */
 | |
| /* distribute, sublicense, and/or sell copies of the Software, and to    */
 | |
| /* permit persons to whom the Software is furnished to do so, subject to */
 | |
| /* the following conditions:                                             */
 | |
| /*                                                                       */
 | |
| /* The above copyright notice and this permission notice shall be        */
 | |
| /* included in all copies or substantial portions of the Software.       */
 | |
| /*                                                                       */
 | |
| /* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,       */
 | |
| /* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF    */
 | |
| /* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.*/
 | |
| /* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY  */
 | |
| /* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,  */
 | |
| /* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE     */
 | |
| /* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.                */
 | |
| /*************************************************************************/
 | |
| 
 | |
| #include "core/crypto/aes_context.h"
 | |
| 
 | |
| Error AESContext::start(Mode p_mode, PackedByteArray p_key, PackedByteArray p_iv) {
 | |
| 	ERR_FAIL_COND_V_MSG(mode != MODE_MAX, ERR_ALREADY_IN_USE, "AESContext already started. Call 'finish' before starting a new one.");
 | |
| 	ERR_FAIL_COND_V_MSG(p_mode < 0 || p_mode >= MODE_MAX, ERR_INVALID_PARAMETER, "Invalid mode requested.");
 | |
| 	// Key check.
 | |
| 	int key_bits = p_key.size() << 3;
 | |
| 	ERR_FAIL_COND_V_MSG(key_bits != 128 && key_bits != 256, ERR_INVALID_PARAMETER, "AES key must be either 16 or 32 bytes");
 | |
| 	// Initialization vector.
 | |
| 	if (p_mode == MODE_CBC_ENCRYPT || p_mode == MODE_CBC_DECRYPT) {
 | |
| 		ERR_FAIL_COND_V_MSG(p_iv.size() != 16, ERR_INVALID_PARAMETER, "The initialization vector (IV) must be exactly 16 bytes.");
 | |
| 		iv.resize(0);
 | |
| 		iv.append_array(p_iv);
 | |
| 	}
 | |
| 	// Encryption/decryption key.
 | |
| 	if (p_mode == MODE_CBC_ENCRYPT || p_mode == MODE_ECB_ENCRYPT) {
 | |
| 		ctx.set_encode_key(p_key.ptr(), key_bits);
 | |
| 	} else {
 | |
| 		ctx.set_decode_key(p_key.ptr(), key_bits);
 | |
| 	}
 | |
| 	mode = p_mode;
 | |
| 	return OK;
 | |
| }
 | |
| 
 | |
| PackedByteArray AESContext::update(PackedByteArray p_src) {
 | |
| 	ERR_FAIL_COND_V_MSG(mode < 0 || mode >= MODE_MAX, PackedByteArray(), "AESContext not started. Call 'start' before calling 'update'.");
 | |
| 	int len = p_src.size();
 | |
| 	ERR_FAIL_COND_V_MSG(len % 16, PackedByteArray(), "The number of bytes to be encrypted must be multiple of 16. Add padding if needed");
 | |
| 	PackedByteArray out;
 | |
| 	out.resize(len);
 | |
| 	const uint8_t *src_ptr = p_src.ptr();
 | |
| 	uint8_t *out_ptr = out.ptrw();
 | |
| 	switch (mode) {
 | |
| 		case MODE_ECB_ENCRYPT: {
 | |
| 			for (int i = 0; i < len; i += 16) {
 | |
| 				Error err = ctx.encrypt_ecb(src_ptr + i, out_ptr + i);
 | |
| 				ERR_FAIL_COND_V(err != OK, PackedByteArray());
 | |
| 			}
 | |
| 		} break;
 | |
| 		case MODE_ECB_DECRYPT: {
 | |
| 			for (int i = 0; i < len; i += 16) {
 | |
| 				Error err = ctx.decrypt_ecb(src_ptr + i, out_ptr + i);
 | |
| 				ERR_FAIL_COND_V(err != OK, PackedByteArray());
 | |
| 			}
 | |
| 		} break;
 | |
| 		case MODE_CBC_ENCRYPT: {
 | |
| 			Error err = ctx.encrypt_cbc(len, iv.ptrw(), p_src.ptr(), out.ptrw());
 | |
| 			ERR_FAIL_COND_V(err != OK, PackedByteArray());
 | |
| 		} break;
 | |
| 		case MODE_CBC_DECRYPT: {
 | |
| 			Error err = ctx.decrypt_cbc(len, iv.ptrw(), p_src.ptr(), out.ptrw());
 | |
| 			ERR_FAIL_COND_V(err != OK, PackedByteArray());
 | |
| 		} break;
 | |
| 		default:
 | |
| 			ERR_FAIL_V_MSG(PackedByteArray(), "Bug!");
 | |
| 	}
 | |
| 	return out;
 | |
| }
 | |
| 
 | |
| PackedByteArray AESContext::get_iv_state() {
 | |
| 	ERR_FAIL_COND_V_MSG(mode != MODE_CBC_ENCRYPT && mode != MODE_CBC_DECRYPT, PackedByteArray(), "Calling 'get_iv_state' only makes sense when the context is started in CBC mode.");
 | |
| 	PackedByteArray out;
 | |
| 	out.append_array(iv);
 | |
| 	return out;
 | |
| }
 | |
| 
 | |
| void AESContext::finish() {
 | |
| 	mode = MODE_MAX;
 | |
| 	iv.resize(0);
 | |
| }
 | |
| 
 | |
| void AESContext::_bind_methods() {
 | |
| 	ClassDB::bind_method(D_METHOD("start", "mode", "key", "iv"), &AESContext::start, DEFVAL(PackedByteArray()));
 | |
| 	ClassDB::bind_method(D_METHOD("update", "src"), &AESContext::update);
 | |
| 	ClassDB::bind_method(D_METHOD("get_iv_state"), &AESContext::get_iv_state);
 | |
| 	ClassDB::bind_method(D_METHOD("finish"), &AESContext::finish);
 | |
| 	BIND_ENUM_CONSTANT(MODE_ECB_ENCRYPT);
 | |
| 	BIND_ENUM_CONSTANT(MODE_ECB_DECRYPT);
 | |
| 	BIND_ENUM_CONSTANT(MODE_CBC_ENCRYPT);
 | |
| 	BIND_ENUM_CONSTANT(MODE_CBC_DECRYPT);
 | |
| 	BIND_ENUM_CONSTANT(MODE_MAX);
 | |
| }
 | |
| 
 | |
| AESContext::AESContext() {
 | |
| }
 |