mirror of
https://github.com/keepassxreboot/keepassxc.git
synced 2025-01-21 04:01:03 -05:00
412 lines
11 KiB
C++
412 lines
11 KiB
C++
/*
|
|
* Copyright (C) 2010 Felix Geyer <debfx@fobos.de>
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 2 or (at your option)
|
|
* version 3 of the License.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "KeePass2Reader.h"
|
|
|
|
#include <QBuffer>
|
|
#include <QFile>
|
|
#include <QIODevice>
|
|
|
|
#include "core/Database.h"
|
|
#include "core/Endian.h"
|
|
#include "crypto/CryptoHash.h"
|
|
#include "format/KeePass2.h"
|
|
#include "format/KeePass2RandomStream.h"
|
|
#include "format/KeePass2XmlReader.h"
|
|
#include "streams/HashedBlockStream.h"
|
|
#include "streams/QtIOCompressor"
|
|
#include "streams/StoreDataStream.h"
|
|
#include "streams/SymmetricCipherStream.h"
|
|
|
|
KeePass2Reader::KeePass2Reader()
|
|
: m_error(false)
|
|
, m_saveXml(false)
|
|
{
|
|
}
|
|
|
|
Database* KeePass2Reader::readDatabase(QIODevice* device, const CompositeKey& key)
|
|
{
|
|
QScopedPointer<Database> db(new Database());
|
|
m_db = db.data();
|
|
m_device = device;
|
|
m_error = false;
|
|
m_errorStr.clear();
|
|
m_headerEnd = false;
|
|
m_xmlData.clear();
|
|
m_masterSeed.clear();
|
|
m_transformSeed.clear();
|
|
m_encryptionIV.clear();
|
|
m_streamStartBytes.clear();
|
|
m_protectedStreamKey.clear();
|
|
|
|
StoreDataStream headerStream(m_device);
|
|
headerStream.open(QIODevice::ReadOnly);
|
|
m_headerStream = &headerStream;
|
|
|
|
bool ok;
|
|
|
|
quint32 signature1 = Endian::readUInt32(m_headerStream, KeePass2::BYTEORDER, &ok);
|
|
if (!ok || signature1 != KeePass2::SIGNATURE_1) {
|
|
raiseError(tr("Not a KeePass database."));
|
|
return Q_NULLPTR;
|
|
}
|
|
|
|
quint32 signature2 = Endian::readUInt32(m_headerStream, KeePass2::BYTEORDER, &ok);
|
|
if (!ok || signature2 != KeePass2::SIGNATURE_2) {
|
|
raiseError(tr("Not a KeePass database."));
|
|
return Q_NULLPTR;
|
|
}
|
|
|
|
quint32 version = Endian::readUInt32(m_headerStream, KeePass2::BYTEORDER, &ok)
|
|
& KeePass2::FILE_VERSION_CRITICAL_MASK;
|
|
quint32 maxVersion = KeePass2::FILE_VERSION & KeePass2::FILE_VERSION_CRITICAL_MASK;
|
|
if (!ok || (version < KeePass2::FILE_VERSION_MIN) || (version > maxVersion)) {
|
|
raiseError(tr("Unsupported KeePass database version."));
|
|
return Q_NULLPTR;
|
|
}
|
|
|
|
while (readHeaderField() && !hasError()) {
|
|
}
|
|
|
|
headerStream.close();
|
|
|
|
if (hasError()) {
|
|
return Q_NULLPTR;
|
|
}
|
|
|
|
// check if all required headers were present
|
|
if (m_masterSeed.isEmpty() || m_transformSeed.isEmpty() || m_encryptionIV.isEmpty()
|
|
|| m_streamStartBytes.isEmpty() || m_protectedStreamKey.isEmpty()
|
|
|| m_db->cipher().isNull()) {
|
|
raiseError("missing database headers");
|
|
return Q_NULLPTR;
|
|
}
|
|
|
|
if (!m_db->setKey(key, m_transformSeed, false)) {
|
|
raiseError(tr("Unable to calculate master key"));
|
|
return Q_NULLPTR;
|
|
}
|
|
|
|
CryptoHash hash(CryptoHash::Sha256);
|
|
hash.addData(m_masterSeed);
|
|
hash.addData(m_db->transformedMasterKey());
|
|
QByteArray finalKey = hash.result();
|
|
|
|
SymmetricCipherStream cipherStream(m_device, SymmetricCipher::Aes256,
|
|
SymmetricCipher::Cbc, SymmetricCipher::Decrypt);
|
|
if (!cipherStream.init(finalKey, m_encryptionIV)) {
|
|
raiseError(cipherStream.errorString());
|
|
return Q_NULLPTR;
|
|
}
|
|
if (!cipherStream.open(QIODevice::ReadOnly)) {
|
|
raiseError(cipherStream.errorString());
|
|
return Q_NULLPTR;
|
|
}
|
|
|
|
QByteArray realStart = cipherStream.read(32);
|
|
|
|
if (realStart != m_streamStartBytes) {
|
|
raiseError(tr("Wrong key or database file is corrupt."));
|
|
return Q_NULLPTR;
|
|
}
|
|
|
|
HashedBlockStream hashedStream(&cipherStream);
|
|
if (!hashedStream.open(QIODevice::ReadOnly)) {
|
|
raiseError(hashedStream.errorString());
|
|
return Q_NULLPTR;
|
|
}
|
|
|
|
QIODevice* xmlDevice;
|
|
QScopedPointer<QtIOCompressor> ioCompressor;
|
|
|
|
if (m_db->compressionAlgo() == Database::CompressionNone) {
|
|
xmlDevice = &hashedStream;
|
|
}
|
|
else {
|
|
ioCompressor.reset(new QtIOCompressor(&hashedStream));
|
|
ioCompressor->setStreamFormat(QtIOCompressor::GzipFormat);
|
|
if (!ioCompressor->open(QIODevice::ReadOnly)) {
|
|
raiseError(ioCompressor->errorString());
|
|
return Q_NULLPTR;
|
|
}
|
|
xmlDevice = ioCompressor.data();
|
|
}
|
|
|
|
KeePass2RandomStream randomStream;
|
|
if (!randomStream.init(m_protectedStreamKey)) {
|
|
raiseError(randomStream.errorString());
|
|
return Q_NULLPTR;
|
|
}
|
|
|
|
QScopedPointer<QBuffer> buffer;
|
|
|
|
if (m_saveXml) {
|
|
m_xmlData = xmlDevice->readAll();
|
|
buffer.reset(new QBuffer(&m_xmlData));
|
|
buffer->open(QIODevice::ReadOnly);
|
|
xmlDevice = buffer.data();
|
|
}
|
|
|
|
KeePass2XmlReader xmlReader;
|
|
xmlReader.readDatabase(xmlDevice, m_db, &randomStream);
|
|
|
|
if (xmlReader.hasError()) {
|
|
raiseError(xmlReader.errorString());
|
|
return Q_NULLPTR;
|
|
}
|
|
|
|
Q_ASSERT(version < 0x00030001 || !xmlReader.headerHash().isEmpty());
|
|
|
|
if (!xmlReader.headerHash().isEmpty()) {
|
|
QByteArray headerHash = CryptoHash::hash(headerStream.storedData(), CryptoHash::Sha256);
|
|
if (headerHash != xmlReader.headerHash()) {
|
|
raiseError("Head doesn't match hash");
|
|
return Q_NULLPTR;
|
|
}
|
|
}
|
|
|
|
return db.take();
|
|
}
|
|
|
|
Database* KeePass2Reader::readDatabase(const QString& filename, const CompositeKey& key)
|
|
{
|
|
QFile file(filename);
|
|
if (!file.open(QFile::ReadOnly)) {
|
|
raiseError(file.errorString());
|
|
return Q_NULLPTR;
|
|
}
|
|
|
|
QScopedPointer<Database> db(readDatabase(&file, key));
|
|
|
|
if (file.error() != QFile::NoError) {
|
|
raiseError(file.errorString());
|
|
return Q_NULLPTR;
|
|
}
|
|
|
|
return db.take();
|
|
}
|
|
|
|
bool KeePass2Reader::hasError()
|
|
{
|
|
return m_error;
|
|
}
|
|
|
|
QString KeePass2Reader::errorString()
|
|
{
|
|
return m_errorStr;
|
|
}
|
|
|
|
void KeePass2Reader::setSaveXml(bool save)
|
|
{
|
|
m_saveXml = save;
|
|
}
|
|
|
|
QByteArray KeePass2Reader::xmlData()
|
|
{
|
|
return m_xmlData;
|
|
}
|
|
|
|
void KeePass2Reader::raiseError(const QString& errorMessage)
|
|
{
|
|
m_error = true;
|
|
m_errorStr = errorMessage;
|
|
}
|
|
|
|
bool KeePass2Reader::readHeaderField()
|
|
{
|
|
QByteArray fieldIDArray = m_headerStream->read(1);
|
|
if (fieldIDArray.size() != 1) {
|
|
raiseError("Invalid header id size");
|
|
return false;
|
|
}
|
|
quint8 fieldID = fieldIDArray.at(0);
|
|
|
|
bool ok;
|
|
quint16 fieldLen = Endian::readUInt16(m_headerStream, KeePass2::BYTEORDER, &ok);
|
|
if (!ok) {
|
|
raiseError("Invalid header field length");
|
|
return false;
|
|
}
|
|
|
|
QByteArray fieldData;
|
|
if (fieldLen != 0) {
|
|
fieldData = m_headerStream->read(fieldLen);
|
|
if (fieldData.size() != fieldLen) {
|
|
raiseError("Invalid header data length");
|
|
return false;
|
|
}
|
|
}
|
|
|
|
switch (fieldID) {
|
|
case KeePass2::EndOfHeader:
|
|
m_headerEnd = true;
|
|
break;
|
|
|
|
case KeePass2::CipherID:
|
|
setCipher(fieldData);
|
|
break;
|
|
|
|
case KeePass2::CompressionFlags:
|
|
setCompressionFlags(fieldData);
|
|
break;
|
|
|
|
case KeePass2::MasterSeed:
|
|
setMasterSeed(fieldData);
|
|
break;
|
|
|
|
case KeePass2::TransformSeed:
|
|
setTransformSeed(fieldData);
|
|
break;
|
|
|
|
case KeePass2::TransformRounds:
|
|
setTansformRounds(fieldData);
|
|
break;
|
|
|
|
case KeePass2::EncryptionIV:
|
|
setEncryptionIV(fieldData);
|
|
break;
|
|
|
|
case KeePass2::ProtectedStreamKey:
|
|
setProtectedStreamKey(fieldData);
|
|
break;
|
|
|
|
case KeePass2::StreamStartBytes:
|
|
setStreamStartBytes(fieldData);
|
|
break;
|
|
|
|
case KeePass2::InnerRandomStreamID:
|
|
setInnerRandomStreamID(fieldData);
|
|
break;
|
|
|
|
default:
|
|
qWarning("Unknown header field read: id=%d", fieldID);
|
|
break;
|
|
}
|
|
|
|
return !m_headerEnd;
|
|
}
|
|
|
|
void KeePass2Reader::setCipher(const QByteArray& data)
|
|
{
|
|
if (data.size() != Uuid::Length) {
|
|
raiseError("Invalid cipher uuid length");
|
|
}
|
|
else {
|
|
Uuid uuid(data);
|
|
|
|
if (uuid != KeePass2::CIPHER_AES) {
|
|
raiseError("Unsupported cipher");
|
|
}
|
|
else {
|
|
m_db->setCipher(uuid);
|
|
}
|
|
}
|
|
}
|
|
|
|
void KeePass2Reader::setCompressionFlags(const QByteArray& data)
|
|
{
|
|
if (data.size() != 4) {
|
|
raiseError("Invalid compression flags length");
|
|
}
|
|
else {
|
|
quint32 id = Endian::bytesToUInt32(data, KeePass2::BYTEORDER);
|
|
|
|
if (id > Database::CompressionAlgorithmMax) {
|
|
raiseError("Unsupported compression algorithm");
|
|
}
|
|
else {
|
|
m_db->setCompressionAlgo(static_cast<Database::CompressionAlgorithm>(id));
|
|
}
|
|
}
|
|
}
|
|
|
|
void KeePass2Reader::setMasterSeed(const QByteArray& data)
|
|
{
|
|
if (data.size() != 32) {
|
|
raiseError("Invalid master seed size");
|
|
}
|
|
else {
|
|
m_masterSeed = data;
|
|
}
|
|
}
|
|
|
|
void KeePass2Reader::setTransformSeed(const QByteArray& data)
|
|
{
|
|
if (data.size() != 32) {
|
|
raiseError("Invalid transform seed size");
|
|
}
|
|
else {
|
|
m_transformSeed = data;
|
|
}
|
|
}
|
|
|
|
void KeePass2Reader::setTansformRounds(const QByteArray& data)
|
|
{
|
|
if (data.size() != 8) {
|
|
raiseError("Invalid transform rounds size");
|
|
}
|
|
else {
|
|
if (!m_db->setTransformRounds(Endian::bytesToUInt64(data, KeePass2::BYTEORDER))) {
|
|
raiseError(tr("Unable to calculate master key"));
|
|
}
|
|
}
|
|
}
|
|
|
|
void KeePass2Reader::setEncryptionIV(const QByteArray& data)
|
|
{
|
|
if (data.size() != 16) {
|
|
raiseError("Invalid encryption iv size");
|
|
}
|
|
else {
|
|
m_encryptionIV = data;
|
|
}
|
|
}
|
|
|
|
void KeePass2Reader::setProtectedStreamKey(const QByteArray& data)
|
|
{
|
|
if (data.size() != 32) {
|
|
raiseError("Invalid stream key size");
|
|
}
|
|
else {
|
|
m_protectedStreamKey = data;
|
|
}
|
|
}
|
|
|
|
void KeePass2Reader::setStreamStartBytes(const QByteArray& data)
|
|
{
|
|
if (data.size() != 32) {
|
|
raiseError("Invalid start bytes size");
|
|
}
|
|
else {
|
|
m_streamStartBytes = data;
|
|
}
|
|
}
|
|
|
|
void KeePass2Reader::setInnerRandomStreamID(const QByteArray& data)
|
|
{
|
|
if (data.size() != 4) {
|
|
raiseError("Invalid random stream id size");
|
|
}
|
|
else {
|
|
quint32 id = Endian::bytesToUInt32(data, KeePass2::BYTEORDER);
|
|
|
|
if (id != KeePass2::Salsa20) {
|
|
raiseError("Unsupported random stream algorithm");
|
|
}
|
|
}
|
|
}
|