mirror of
				https://github.com/godotengine/godot.git
				synced 2025-10-30 21:21:10 +00:00 
			
		
		
		
	 b5334d14f7
			
		
	
	
		b5334d14f7
		
			
		
	
	
	
	
		
			
			Happy new year to the wonderful Godot community!
2020 has been a tough year for most of us personally, but a good year for
Godot development nonetheless with a huge amount of work done towards Godot
4.0 and great improvements backported to the long-lived 3.2 branch.
We've had close to 400 contributors to engine code this year, authoring near
7,000 commit! (And that's only for the `master` branch and for the engine code,
there's a lot more when counting docs, demos and other first-party repos.)
Here's to a great year 2021 for all Godot users 🎆
		
	
			
		
			
				
	
	
		
			205 lines
		
	
	
	
		
			8.1 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			205 lines
		
	
	
	
		
			8.1 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*************************************************************************/
 | |
| /*  crypto_core.cpp                                                      */
 | |
| /*************************************************************************/
 | |
| /*                       This file is part of:                           */
 | |
| /*                           GODOT ENGINE                                */
 | |
| /*                      https://godotengine.org                          */
 | |
| /*************************************************************************/
 | |
| /* Copyright (c) 2007-2021 Juan Linietsky, Ariel Manzur.                 */
 | |
| /* Copyright (c) 2014-2021 Godot Engine contributors (cf. AUTHORS.md).   */
 | |
| /*                                                                       */
 | |
| /* Permission is hereby granted, free of charge, to any person obtaining */
 | |
| /* a copy of this software and associated documentation files (the       */
 | |
| /* "Software"), to deal in the Software without restriction, including   */
 | |
| /* without limitation the rights to use, copy, modify, merge, publish,   */
 | |
| /* distribute, sublicense, and/or sell copies of the Software, and to    */
 | |
| /* permit persons to whom the Software is furnished to do so, subject to */
 | |
| /* the following conditions:                                             */
 | |
| /*                                                                       */
 | |
| /* The above copyright notice and this permission notice shall be        */
 | |
| /* included in all copies or substantial portions of the Software.       */
 | |
| /*                                                                       */
 | |
| /* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,       */
 | |
| /* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF    */
 | |
| /* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.*/
 | |
| /* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY  */
 | |
| /* CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,  */
 | |
| /* TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE     */
 | |
| /* SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.                */
 | |
| /*************************************************************************/
 | |
| 
 | |
| #include "crypto_core.h"
 | |
| 
 | |
| #include <mbedtls/aes.h>
 | |
| #include <mbedtls/base64.h>
 | |
| #include <mbedtls/md5.h>
 | |
| #include <mbedtls/sha1.h>
 | |
| #include <mbedtls/sha256.h>
 | |
| 
 | |
| // MD5
 | |
| CryptoCore::MD5Context::MD5Context() {
 | |
| 	ctx = memalloc(sizeof(mbedtls_md5_context));
 | |
| 	mbedtls_md5_init((mbedtls_md5_context *)ctx);
 | |
| }
 | |
| 
 | |
| CryptoCore::MD5Context::~MD5Context() {
 | |
| 	mbedtls_md5_free((mbedtls_md5_context *)ctx);
 | |
| 	memfree((mbedtls_md5_context *)ctx);
 | |
| }
 | |
| 
 | |
| Error CryptoCore::MD5Context::start() {
 | |
| 	int ret = mbedtls_md5_starts_ret((mbedtls_md5_context *)ctx);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 | |
| 
 | |
| Error CryptoCore::MD5Context::update(const uint8_t *p_src, size_t p_len) {
 | |
| 	int ret = mbedtls_md5_update_ret((mbedtls_md5_context *)ctx, p_src, p_len);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 | |
| 
 | |
| Error CryptoCore::MD5Context::finish(unsigned char r_hash[16]) {
 | |
| 	int ret = mbedtls_md5_finish_ret((mbedtls_md5_context *)ctx, r_hash);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 | |
| 
 | |
| // SHA1
 | |
| CryptoCore::SHA1Context::SHA1Context() {
 | |
| 	ctx = memalloc(sizeof(mbedtls_sha1_context));
 | |
| 	mbedtls_sha1_init((mbedtls_sha1_context *)ctx);
 | |
| }
 | |
| 
 | |
| CryptoCore::SHA1Context::~SHA1Context() {
 | |
| 	mbedtls_sha1_free((mbedtls_sha1_context *)ctx);
 | |
| 	memfree((mbedtls_sha1_context *)ctx);
 | |
| }
 | |
| 
 | |
| Error CryptoCore::SHA1Context::start() {
 | |
| 	int ret = mbedtls_sha1_starts_ret((mbedtls_sha1_context *)ctx);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 | |
| 
 | |
| Error CryptoCore::SHA1Context::update(const uint8_t *p_src, size_t p_len) {
 | |
| 	int ret = mbedtls_sha1_update_ret((mbedtls_sha1_context *)ctx, p_src, p_len);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 | |
| 
 | |
| Error CryptoCore::SHA1Context::finish(unsigned char r_hash[20]) {
 | |
| 	int ret = mbedtls_sha1_finish_ret((mbedtls_sha1_context *)ctx, r_hash);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 | |
| 
 | |
| // SHA256
 | |
| CryptoCore::SHA256Context::SHA256Context() {
 | |
| 	ctx = memalloc(sizeof(mbedtls_sha256_context));
 | |
| 	mbedtls_sha256_init((mbedtls_sha256_context *)ctx);
 | |
| }
 | |
| 
 | |
| CryptoCore::SHA256Context::~SHA256Context() {
 | |
| 	mbedtls_sha256_free((mbedtls_sha256_context *)ctx);
 | |
| 	memfree((mbedtls_sha256_context *)ctx);
 | |
| }
 | |
| 
 | |
| Error CryptoCore::SHA256Context::start() {
 | |
| 	int ret = mbedtls_sha256_starts_ret((mbedtls_sha256_context *)ctx, 0);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 | |
| 
 | |
| Error CryptoCore::SHA256Context::update(const uint8_t *p_src, size_t p_len) {
 | |
| 	int ret = mbedtls_sha256_update_ret((mbedtls_sha256_context *)ctx, p_src, p_len);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 | |
| 
 | |
| Error CryptoCore::SHA256Context::finish(unsigned char r_hash[32]) {
 | |
| 	int ret = mbedtls_sha256_finish_ret((mbedtls_sha256_context *)ctx, r_hash);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 | |
| 
 | |
| // AES256
 | |
| CryptoCore::AESContext::AESContext() {
 | |
| 	ctx = memalloc(sizeof(mbedtls_aes_context));
 | |
| 	mbedtls_aes_init((mbedtls_aes_context *)ctx);
 | |
| }
 | |
| 
 | |
| CryptoCore::AESContext::~AESContext() {
 | |
| 	mbedtls_aes_free((mbedtls_aes_context *)ctx);
 | |
| 	memfree((mbedtls_aes_context *)ctx);
 | |
| }
 | |
| 
 | |
| Error CryptoCore::AESContext::set_encode_key(const uint8_t *p_key, size_t p_bits) {
 | |
| 	int ret = mbedtls_aes_setkey_enc((mbedtls_aes_context *)ctx, p_key, p_bits);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 | |
| 
 | |
| Error CryptoCore::AESContext::set_decode_key(const uint8_t *p_key, size_t p_bits) {
 | |
| 	int ret = mbedtls_aes_setkey_dec((mbedtls_aes_context *)ctx, p_key, p_bits);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 | |
| 
 | |
| Error CryptoCore::AESContext::encrypt_ecb(const uint8_t p_src[16], uint8_t r_dst[16]) {
 | |
| 	int ret = mbedtls_aes_crypt_ecb((mbedtls_aes_context *)ctx, MBEDTLS_AES_ENCRYPT, p_src, r_dst);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 | |
| 
 | |
| Error CryptoCore::AESContext::encrypt_cbc(size_t p_length, uint8_t r_iv[16], const uint8_t *p_src, uint8_t *r_dst) {
 | |
| 	int ret = mbedtls_aes_crypt_cbc((mbedtls_aes_context *)ctx, MBEDTLS_AES_ENCRYPT, p_length, r_iv, p_src, r_dst);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 | |
| 
 | |
| Error CryptoCore::AESContext::encrypt_cfb(size_t p_length, uint8_t p_iv[16], const uint8_t *p_src, uint8_t *r_dst) {
 | |
| 	size_t iv_off = 0; // Ignore and assume 16-byte alignment.
 | |
| 	int ret = mbedtls_aes_crypt_cfb128((mbedtls_aes_context *)ctx, MBEDTLS_AES_ENCRYPT, p_length, &iv_off, p_iv, p_src, r_dst);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 | |
| 
 | |
| Error CryptoCore::AESContext::decrypt_ecb(const uint8_t p_src[16], uint8_t r_dst[16]) {
 | |
| 	int ret = mbedtls_aes_crypt_ecb((mbedtls_aes_context *)ctx, MBEDTLS_AES_DECRYPT, p_src, r_dst);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 | |
| 
 | |
| Error CryptoCore::AESContext::decrypt_cbc(size_t p_length, uint8_t r_iv[16], const uint8_t *p_src, uint8_t *r_dst) {
 | |
| 	int ret = mbedtls_aes_crypt_cbc((mbedtls_aes_context *)ctx, MBEDTLS_AES_DECRYPT, p_length, r_iv, p_src, r_dst);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 | |
| 
 | |
| Error CryptoCore::AESContext::decrypt_cfb(size_t p_length, uint8_t p_iv[16], const uint8_t *p_src, uint8_t *r_dst) {
 | |
| 	size_t iv_off = 0; // Ignore and assume 16-byte alignment.
 | |
| 	int ret = mbedtls_aes_crypt_cfb128((mbedtls_aes_context *)ctx, MBEDTLS_AES_DECRYPT, p_length, &iv_off, p_iv, p_src, r_dst);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 | |
| 
 | |
| // CryptoCore
 | |
| String CryptoCore::b64_encode_str(const uint8_t *p_src, int p_src_len) {
 | |
| 	int b64len = p_src_len / 3 * 4 + 4 + 1;
 | |
| 	Vector<uint8_t> b64buff;
 | |
| 	b64buff.resize(b64len);
 | |
| 	uint8_t *w64 = b64buff.ptrw();
 | |
| 	size_t strlen = 0;
 | |
| 	int ret = b64_encode(&w64[0], b64len, &strlen, p_src, p_src_len);
 | |
| 	w64[strlen] = 0;
 | |
| 	return ret ? String() : (const char *)&w64[0];
 | |
| }
 | |
| 
 | |
| Error CryptoCore::b64_encode(uint8_t *r_dst, int p_dst_len, size_t *r_len, const uint8_t *p_src, int p_src_len) {
 | |
| 	int ret = mbedtls_base64_encode(r_dst, p_dst_len, r_len, p_src, p_src_len);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 | |
| 
 | |
| Error CryptoCore::b64_decode(uint8_t *r_dst, int p_dst_len, size_t *r_len, const uint8_t *p_src, int p_src_len) {
 | |
| 	int ret = mbedtls_base64_decode(r_dst, p_dst_len, r_len, p_src, p_src_len);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 | |
| 
 | |
| Error CryptoCore::md5(const uint8_t *p_src, int p_src_len, unsigned char r_hash[16]) {
 | |
| 	int ret = mbedtls_md5_ret(p_src, p_src_len, r_hash);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 | |
| 
 | |
| Error CryptoCore::sha1(const uint8_t *p_src, int p_src_len, unsigned char r_hash[20]) {
 | |
| 	int ret = mbedtls_sha1_ret(p_src, p_src_len, r_hash);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 | |
| 
 | |
| Error CryptoCore::sha256(const uint8_t *p_src, int p_src_len, unsigned char r_hash[32]) {
 | |
| 	int ret = mbedtls_sha256_ret(p_src, p_src_len, r_hash, 0);
 | |
| 	return ret ? FAILED : OK;
 | |
| }
 |