mirror of
https://github.com/keepassxreboot/keepassxc.git
synced 2024-10-01 01:26:01 -04:00
259 lines
6.0 KiB
C++
259 lines
6.0 KiB
C++
/*
|
|
* Copyright (C) 2010 Felix Geyer <debfx@fobos.de>
|
|
* Copyright (C) 2017 KeePassXC Team <team@keepassxc.org>
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation, either version 2 or (at your option)
|
|
* version 3 of the License.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "CompositeKey.h"
|
|
#include "CompositeKey_p.h"
|
|
#include "ChallengeResponseKey.h"
|
|
|
|
#include <QElapsedTimer>
|
|
#include <QFile>
|
|
#include <QtConcurrent>
|
|
|
|
#include "core/Global.h"
|
|
#include "crypto/CryptoHash.h"
|
|
#include "crypto/SymmetricCipher.h"
|
|
#include "keys/FileKey.h"
|
|
#include "keys/PasswordKey.h"
|
|
|
|
CompositeKey::CompositeKey()
|
|
{
|
|
}
|
|
|
|
CompositeKey::CompositeKey(const CompositeKey& key)
|
|
{
|
|
*this = key;
|
|
}
|
|
|
|
CompositeKey::~CompositeKey()
|
|
{
|
|
clear();
|
|
}
|
|
|
|
void CompositeKey::clear()
|
|
{
|
|
qDeleteAll(m_keys);
|
|
m_keys.clear();
|
|
m_challengeResponseKeys.clear();
|
|
}
|
|
|
|
bool CompositeKey::isEmpty() const
|
|
{
|
|
return m_keys.isEmpty() && m_challengeResponseKeys.isEmpty();
|
|
}
|
|
|
|
CompositeKey* CompositeKey::clone() const
|
|
{
|
|
return new CompositeKey(*this);
|
|
}
|
|
|
|
CompositeKey& CompositeKey::operator=(const CompositeKey& key)
|
|
{
|
|
// handle self assignment as that would break when calling clear()
|
|
if (this == &key) {
|
|
return *this;
|
|
}
|
|
|
|
clear();
|
|
|
|
for (const Key* subKey : asConst(key.m_keys)) {
|
|
addKey(*subKey);
|
|
}
|
|
for (const auto subKey : asConst(key.m_challengeResponseKeys)) {
|
|
addChallengeResponseKey(subKey);
|
|
}
|
|
|
|
return *this;
|
|
}
|
|
|
|
/*
|
|
* Read a key from a line of input.
|
|
* If the line references a valid file
|
|
* path, the key is loaded from file.
|
|
*/
|
|
CompositeKey CompositeKey::readFromLine(QString line)
|
|
{
|
|
|
|
CompositeKey key;
|
|
if (QFile::exists(line)) {
|
|
FileKey fileKey;
|
|
fileKey.load(line);
|
|
key.addKey(fileKey);
|
|
}
|
|
else {
|
|
PasswordKey password;
|
|
password.setPassword(line);
|
|
key.addKey(password);
|
|
}
|
|
return key;
|
|
|
|
}
|
|
|
|
QByteArray CompositeKey::rawKey() const
|
|
{
|
|
CryptoHash cryptoHash(CryptoHash::Sha256);
|
|
|
|
for (const Key* key : m_keys) {
|
|
cryptoHash.addData(key->rawKey());
|
|
}
|
|
|
|
return cryptoHash.result();
|
|
}
|
|
|
|
QByteArray CompositeKey::transform(const QByteArray& seed, quint64 rounds,
|
|
bool* ok, QString* errorString) const
|
|
{
|
|
Q_ASSERT(seed.size() == 32);
|
|
Q_ASSERT(rounds > 0);
|
|
|
|
bool okLeft;
|
|
QString errorStringLeft;
|
|
bool okRight;
|
|
QString errorStringRight;
|
|
|
|
QByteArray key = rawKey();
|
|
|
|
QFuture<QByteArray> future = QtConcurrent::run(transformKeyRaw, key.left(16), seed, rounds,
|
|
&okLeft, &errorStringLeft);
|
|
QByteArray result2 = transformKeyRaw(key.right(16), seed, rounds, &okRight, &errorStringRight);
|
|
|
|
QByteArray transformed;
|
|
transformed.append(future.result());
|
|
transformed.append(result2);
|
|
|
|
*ok = (okLeft && okRight);
|
|
|
|
if (!okLeft) {
|
|
*errorString = errorStringLeft;
|
|
return QByteArray();
|
|
}
|
|
|
|
if (!okRight) {
|
|
*errorString = errorStringRight;
|
|
return QByteArray();
|
|
}
|
|
|
|
return CryptoHash::hash(transformed, CryptoHash::Sha256);
|
|
}
|
|
|
|
QByteArray CompositeKey::transformKeyRaw(const QByteArray& key, const QByteArray& seed,
|
|
quint64 rounds, bool* ok, QString* errorString)
|
|
{
|
|
QByteArray iv(16, 0);
|
|
SymmetricCipher cipher(SymmetricCipher::Aes256, SymmetricCipher::Ecb,
|
|
SymmetricCipher::Encrypt);
|
|
if (!cipher.init(seed, iv)) {
|
|
*ok = false;
|
|
*errorString = cipher.errorString();
|
|
return QByteArray();
|
|
}
|
|
|
|
QByteArray result = key;
|
|
|
|
if (!cipher.processInPlace(result, rounds)) {
|
|
*ok = false;
|
|
*errorString = cipher.errorString();
|
|
return QByteArray();
|
|
}
|
|
|
|
*ok = true;
|
|
return result;
|
|
}
|
|
|
|
bool CompositeKey::challenge(const QByteArray& seed, QByteArray& result) const
|
|
{
|
|
// if no challenge response was requested, return nothing to
|
|
// maintain backwards compatibility with regular databases.
|
|
if (m_challengeResponseKeys.length() == 0) {
|
|
result.clear();
|
|
return true;
|
|
}
|
|
|
|
CryptoHash cryptoHash(CryptoHash::Sha256);
|
|
|
|
for (const auto key : m_challengeResponseKeys) {
|
|
// if the device isn't present or fails, return an error
|
|
if (!key->challenge(seed)) {
|
|
return false;
|
|
}
|
|
cryptoHash.addData(key->rawKey());
|
|
}
|
|
|
|
result = cryptoHash.result();
|
|
return true;
|
|
}
|
|
|
|
void CompositeKey::addKey(const Key& key)
|
|
{
|
|
m_keys.append(key.clone());
|
|
}
|
|
|
|
void CompositeKey::addChallengeResponseKey(QSharedPointer<ChallengeResponseKey> key)
|
|
{
|
|
m_challengeResponseKeys.append(key);
|
|
}
|
|
|
|
|
|
int CompositeKey::transformKeyBenchmark(int msec)
|
|
{
|
|
TransformKeyBenchmarkThread thread1(msec);
|
|
TransformKeyBenchmarkThread thread2(msec);
|
|
|
|
thread1.start();
|
|
thread2.start();
|
|
|
|
thread1.wait();
|
|
thread2.wait();
|
|
|
|
return qMin(thread1.rounds(), thread2.rounds());
|
|
}
|
|
|
|
|
|
TransformKeyBenchmarkThread::TransformKeyBenchmarkThread(int msec)
|
|
: m_msec(msec)
|
|
, m_rounds(0)
|
|
{
|
|
Q_ASSERT(msec > 0);
|
|
}
|
|
|
|
int TransformKeyBenchmarkThread::rounds()
|
|
{
|
|
return m_rounds;
|
|
}
|
|
|
|
void TransformKeyBenchmarkThread::run()
|
|
{
|
|
QByteArray key = QByteArray(16, '\x7E');
|
|
QByteArray seed = QByteArray(32, '\x4B');
|
|
QByteArray iv(16, 0);
|
|
|
|
SymmetricCipher cipher(SymmetricCipher::Aes256, SymmetricCipher::Ecb,
|
|
SymmetricCipher::Encrypt);
|
|
cipher.init(seed, iv);
|
|
|
|
QElapsedTimer t;
|
|
t.start();
|
|
|
|
do {
|
|
if (!cipher.processInPlace(key, 10000)) {
|
|
m_rounds = -1;
|
|
return;
|
|
}
|
|
m_rounds += 10000;
|
|
} while (!t.hasExpired(m_msec));
|
|
}
|