use std::convert::{TryFrom, TryInto};
use byteorder::{ByteOrder, LittleEndian};
use thiserror::Error;
use crate::{
config::{CompressionConfig, DatabaseConfig, InnerCipherConfig, KdfConfig, OuterCipherConfig},
crypt::{self, ciphers::Cipher},
db::{Attachment, Database, DatabaseFormatError, DatabaseOpenError, Value},
format::{
hmac_block_stream,
kdbx4::{
KDBX4OuterHeader, HEADER_COMMENT, HEADER_COMPRESSION_ID, HEADER_ENCRYPTION_IV, HEADER_END,
HEADER_KDF_PARAMS, HEADER_MASTER_SEED, HEADER_OUTER_ENCRYPTION_ID, HEADER_PUBLIC_CUSTOM_DATA,
INNER_HEADER_BINARY_ATTACHMENTS, INNER_HEADER_END, INNER_HEADER_RANDOM_STREAM_ID,
INNER_HEADER_RANDOM_STREAM_KEY,
},
variant_dictionary::VariantDictionary,
DatabaseVersion,
},
key::{DatabaseKey, DatabaseKeyError},
};
use super::KDBX4InnerHeader;
impl From<&[u8]> for Attachment {
fn from(data: &[u8]) -> Self {
let flags = data[0];
let data = data[1..].to_vec();
let protected = flags & 0x01 != 0;
if protected {
Attachment {
data: Value::protected(data),
}
} else {
Attachment {
data: Value::unprotected(data),
}
}
}
}
pub(crate) fn parse_kdbx4(data: &[u8], db_key: &DatabaseKey) -> Result<Database, DatabaseOpenError> {
let (config, header_attachments, mut inner_decryptor, xml) = decrypt_kdbx4(data, db_key)?;
let mut db = crate::format::xml_db::parse_xml(&xml, &header_attachments, &mut *inner_decryptor)
.map_err(|e| DatabaseOpenError::Format(DatabaseFormatError::Kdbx4(Kdbx4OpenError::Xml(e))))?;
db.config = config;
Ok(db)
}
#[allow(clippy::type_complexity)]
pub(crate) fn decrypt_kdbx4(
data: &[u8],
db_key: &DatabaseKey,
) -> Result<(DatabaseConfig, Vec<Attachment>, Box<dyn Cipher>, Vec<u8>), DatabaseOpenError> {
let version = DatabaseVersion::parse(data)?;
let (outer_header, inner_header_start) = parse_outer_header(data)
.map_err(|e| DatabaseOpenError::Format(DatabaseFormatError::Kdbx4(Kdbx4OpenError::OuterHeader(e))))?;
let header_data = &data[0..inner_header_start];
let header_sha256 = data
.get(inner_header_start..(inner_header_start + 32))
.ok_or(DatabaseOpenError::UnexpectedEof)?;
let header_hmac = data
.get((inner_header_start + 32)..(inner_header_start + 64))
.ok_or(DatabaseOpenError::UnexpectedEof)?;
let hmac_block_stream = data
.get((inner_header_start + 64)..)
.ok_or(DatabaseOpenError::UnexpectedEof)?;
if header_sha256 != crypt::calculate_sha256(&[header_data]).as_slice() {
return Err(DatabaseOpenError::Format(DatabaseFormatError::Kdbx4(
Kdbx4OpenError::HeaderHashMismatch,
)));
}
#[cfg(feature = "challenge_response")]
let db_key = db_key.clone().perform_challenge(&outer_header.kdf_seed)?;
let key_elements = db_key.get_key_elements()?;
let key_elements: Vec<&[u8]> = key_elements.iter().map(|v| &v[..]).collect();
let composite_key = crypt::calculate_sha256(&key_elements);
let transformed_key = outer_header
.kdf_config
.get_kdf_seeded(&outer_header.kdf_seed)
.transform_key(&composite_key)?;
let master_key = crypt::calculate_sha256(&[outer_header.master_seed.as_ref(), &transformed_key]);
let hmac_key = crypt::calculate_sha512(&[
&outer_header.master_seed,
&transformed_key,
&hmac_block_stream::HMAC_KEY_END,
]);
let header_hmac_key = hmac_block_stream::get_hmac_block_key(u64::MAX, &hmac_key);
if header_hmac
!= crypt::calculate_hmac(&[header_data], &header_hmac_key)
.expect("HMAC block key always correctly sized")
.as_slice()
{
return Err(DatabaseKeyError::IncorrectKey.into());
}
let payload_encrypted = hmac_block_stream::read_hmac_block_stream(hmac_block_stream, &hmac_key)
.map_err(|e| DatabaseOpenError::Format(DatabaseFormatError::Kdbx4(Kdbx4OpenError::BlockStream(e))))?;
let payload_compressed = outer_header
.outer_cipher_config
.get_cipher(&master_key, &outer_header.outer_iv)?
.decrypt(&payload_encrypted)?;
let payload = outer_header
.compression_config
.get_compression()
.decompress(&payload_compressed)?;
let (header_attachments, inner_header, body_start) = parse_inner_header(&payload)
.map_err(|e| DatabaseOpenError::Format(DatabaseFormatError::Kdbx4(Kdbx4OpenError::InnerHeader(e))))?;
let xml = &payload[body_start..];
let inner_decryptor = inner_header
.inner_random_stream
.get_cipher(&inner_header.inner_random_stream_key)?;
let config = DatabaseConfig {
version,
outer_cipher_config: outer_header.outer_cipher_config,
compression_config: outer_header.compression_config,
inner_cipher_config: inner_header.inner_random_stream,
kdf_config: outer_header.kdf_config,
public_custom_data: outer_header.public_custom_data,
};
Ok((config, header_attachments, inner_decryptor, xml.to_vec()))
}
fn parse_outer_header(data: &[u8]) -> Result<(KDBX4OuterHeader, usize), Kdbx4OuterHeaderError> {
let mut pos = DatabaseVersion::get_version_header_size();
let mut outer_cipher: Option<OuterCipherConfig> = None;
let mut compression_config: Option<CompressionConfig> = None;
let mut master_seed: Option<Vec<u8>> = None;
let mut outer_iv: Option<Vec<u8>> = None;
let mut kdf_config: Option<KdfConfig> = None;
let mut kdf_seed: Option<Vec<u8>> = None;
let mut public_custom_data: Option<VariantDictionary> = None;
loop {
let entry_type = data.get(pos).ok_or(Kdbx4OuterHeaderError::UnexpectedEof)?;
let entry_length = data
.get(pos + 1..(pos + 5))
.ok_or(Kdbx4OuterHeaderError::UnexpectedEof)?;
let entry_length: usize = LittleEndian::read_u32(entry_length) as usize;
let entry_buffer = data
.get((pos + 5)..(pos + 5 + entry_length))
.ok_or(Kdbx4OuterHeaderError::UnexpectedEof)?;
pos += 5 + entry_length;
match *entry_type {
HEADER_END => {
break;
}
HEADER_COMMENT => {}
HEADER_OUTER_ENCRYPTION_ID => {
outer_cipher = Some(OuterCipherConfig::try_from(entry_buffer)?);
}
HEADER_COMPRESSION_ID => {
compression_config = Some(CompressionConfig::try_from(LittleEndian::read_u32(entry_buffer))?);
}
HEADER_MASTER_SEED => master_seed = Some(entry_buffer.to_vec()),
HEADER_ENCRYPTION_IV => outer_iv = Some(entry_buffer.to_vec()),
HEADER_KDF_PARAMS => {
let vd =
VariantDictionary::parse(entry_buffer).map_err(Kdbx4OuterHeaderError::ParseKdfConfig)?;
let (kconf, kseed) = vd.try_into()?;
kdf_config = Some(kconf);
kdf_seed = Some(kseed)
}
HEADER_PUBLIC_CUSTOM_DATA => {
let vd =
VariantDictionary::parse(entry_buffer).map_err(Kdbx4OuterHeaderError::ParseCustomData)?;
public_custom_data = Some(vd)
}
_ => return Err(Kdbx4OuterHeaderError::InvalidEntry(*entry_type)),
};
}
fn get_or_err<T>(v: Option<T>, err: &'static str) -> Result<T, Kdbx4OuterHeaderError> {
v.ok_or(Kdbx4OuterHeaderError::Incomplete(err))
}
let outer_cipher_config = get_or_err(outer_cipher, "Outer Cipher ID")?;
let compression_config = get_or_err(compression_config, "Compression ID")?;
let master_seed = get_or_err(master_seed, "Master seed")?;
let outer_iv = get_or_err(outer_iv, "Outer IV")?;
let kdf_config = get_or_err(kdf_config, "Key Derivation Function Parameters")?;
let kdf_seed = get_or_err(kdf_seed, "Key Derivation Function Seed")?;
Ok((
KDBX4OuterHeader {
outer_cipher_config,
compression_config,
master_seed,
outer_iv,
kdf_config,
kdf_seed,
public_custom_data,
},
pos,
))
}
#[derive(Debug, Error)]
pub enum Kdbx4OuterHeaderError {
#[error("Unexpected end of file while parsing outer header")]
UnexpectedEof,
#[error(transparent)]
OuterCipherConfig(#[from] crate::config::OuterCipherConfigError),
#[error(transparent)]
CompressionConfig(#[from] crate::config::CompressionConfigError),
#[error("error parsing KDF config: {0}")]
ParseKdfConfig(#[source] crate::format::variant_dictionary::VariantDictionaryError),
#[error("error parsing public custom data: {0}")]
ParseCustomData(#[source] crate::format::variant_dictionary::VariantDictionaryError),
#[error(transparent)]
KdfConfig(#[from] crate::config::KdfConfigError),
#[error("Invalid outer header entry: {0}")]
InvalidEntry(u8),
#[error("Outer header incomplete - missing {0}")]
Incomplete(&'static str),
}
fn parse_inner_header(
data: &[u8],
) -> Result<(Vec<Attachment>, KDBX4InnerHeader, usize), Kdbx4InnerHeaderError> {
let mut pos = 0;
let mut inner_random_stream = None;
let mut inner_random_stream_key = None;
let mut header_attachments = Vec::new();
loop {
let entry_type = data[pos];
let entry_length: usize = LittleEndian::read_u32(&data[pos + 1..(pos + 5)]) as usize;
let entry_buffer = &data[(pos + 5)..(pos + 5 + entry_length)];
pos += 5 + entry_length;
match entry_type {
INNER_HEADER_END => break,
INNER_HEADER_RANDOM_STREAM_ID => {
inner_random_stream = Some(InnerCipherConfig::try_from(LittleEndian::read_u32(entry_buffer))?);
}
INNER_HEADER_RANDOM_STREAM_KEY => inner_random_stream_key = Some(entry_buffer.to_vec()),
INNER_HEADER_BINARY_ATTACHMENTS => {
let header_attachment = Attachment::from(entry_buffer);
header_attachments.push(header_attachment);
}
_ => {
return Err(Kdbx4InnerHeaderError::InvalidEntry(entry_type));
}
}
}
fn get_or_err<T>(v: Option<T>, err: &'static str) -> Result<T, Kdbx4InnerHeaderError> {
v.ok_or(Kdbx4InnerHeaderError::Incomplete(err))
}
let inner_random_stream = get_or_err(inner_random_stream, "Inner random stream")?;
let inner_random_stream_key = get_or_err(inner_random_stream_key, "Inner random stream key")?;
let inner_header = KDBX4InnerHeader {
inner_random_stream,
inner_random_stream_key,
};
Ok((header_attachments, inner_header, pos))
}
#[derive(Debug, Error)]
pub enum Kdbx4InnerHeaderError {
#[error(transparent)]
InnerCipherConfig(#[from] crate::config::InnerCipherConfigError),
#[error("Invalid inner header entry: {0}")]
InvalidEntry(u8),
#[error("Inner header incomplete - missing {0}")]
Incomplete(&'static str),
}
#[derive(Debug, Error)]
pub enum Kdbx4OpenError {
#[error(transparent)]
Xml(#[from] crate::format::xml_db::ParseXmlError),
#[error(transparent)]
OuterHeader(#[from] Kdbx4OuterHeaderError),
#[error(transparent)]
InnerHeader(#[from] Kdbx4InnerHeaderError),
#[error("Header hash mismatch - the header may be corrupted")]
HeaderHashMismatch,
#[error(transparent)]
BlockStream(#[from] hmac_block_stream::BlockStreamError),
}