use std::convert::{TryFrom, TryInto};
use byteorder::{ByteOrder, LittleEndian};
use crate::{
config::{CompressionConfig, DatabaseConfig, InnerCipherConfig, KdfConfig, OuterCipherConfig},
crypt::{self, ciphers::Cipher},
db::{node::NodePtr, Database, HeaderAttachment},
error::{DatabaseIntegrityError, DatabaseKeyError, DatabaseOpenError},
format::{
kdbx4::{
KDBX4OuterHeader, HEADER_COMMENT, HEADER_COMPRESSION_ID, HEADER_ENCRYPTION_IV, HEADER_END, HEADER_KDF_PARAMS,
HEADER_MASTER_SEED, HEADER_OUTER_ENCRYPTION_ID, INNER_HEADER_BINARY_ATTACHMENTS, INNER_HEADER_END,
INNER_HEADER_RANDOM_STREAM_ID, INNER_HEADER_RANDOM_STREAM_KEY,
},
DatabaseVersion,
},
hmac_block_stream, rc_refcell_node,
variant_dictionary::VariantDictionary,
};
use super::KDBX4InnerHeader;
impl From<&[u8]> for HeaderAttachment {
fn from(data: &[u8]) -> Self {
let flags = data[0];
let content = data[1..].to_vec();
HeaderAttachment { flags, content }
}
}
pub(crate) fn parse_kdbx4(data: &[u8], key_elements: &[Vec<u8>]) -> Result<Database, DatabaseOpenError> {
let (config, header_attachments, mut inner_decryptor, xml) = decrypt_kdbx4(data, key_elements)?;
let database_content = crate::xml_db::parse::parse(&xml, &mut *inner_decryptor)?;
let db = Database {
config,
header_attachments,
root: rc_refcell_node!(database_content.root.group),
deleted_objects: database_content.root.deleted_objects,
meta: database_content.meta,
};
Ok(db)
}
#[allow(clippy::type_complexity)]
pub(crate) fn decrypt_kdbx4(
data: &[u8],
key_elements: &[Vec<u8>],
) -> Result<(DatabaseConfig, Vec<HeaderAttachment>, Box<dyn Cipher>, Vec<u8>), DatabaseOpenError> {
let (outer_header, inner_header_start) = parse_outer_header(data)?;
let header_data = &data[0..inner_header_start];
let header_sha256 = &data[inner_header_start..(inner_header_start + 32)];
let header_hmac = &data[(inner_header_start + 32)..(inner_header_start + 64)];
let hmac_block_stream = &data[(inner_header_start + 64)..];
let key_elements: Vec<&[u8]> = key_elements.iter().map(|v| &v[..]).collect();
let composite_key = crypt::calculate_sha256(&key_elements);
let transformed_key = outer_header
.kdf_config
.get_kdf_seeded(&outer_header.kdf_seed)
.transform_key(&composite_key)?;
let master_key = crypt::calculate_sha256(&[outer_header.master_seed.as_ref(), &transformed_key]);
if header_sha256 != crypt::calculate_sha256(&[&data[0..inner_header_start]]).as_slice() {
return Err(DatabaseIntegrityError::HeaderHashMismatch.into());
}
let hmac_key = crypt::calculate_sha512(&[&outer_header.master_seed, &transformed_key, &hmac_block_stream::HMAC_KEY_END]);
let header_hmac_key = hmac_block_stream::get_hmac_block_key(u64::max_value(), &hmac_key);
if header_hmac != crypt::calculate_hmac(&[header_data], &header_hmac_key)?.as_slice() {
return Err(DatabaseKeyError::IncorrectKey.into());
}
let payload_encrypted = hmac_block_stream::read_hmac_block_stream(hmac_block_stream, &hmac_key)?;
let payload_compressed = outer_header
.outer_cipher_config
.get_cipher(&master_key, &outer_header.outer_iv)?
.decrypt(&payload_encrypted)?;
let payload = outer_header.compression_config.get_compression().decompress(&payload_compressed)?;
let (header_attachments, inner_header, body_start) = parse_inner_header(&payload)?;
let xml = &payload[body_start..];
let inner_decryptor = inner_header.inner_random_stream.get_cipher(&inner_header.inner_random_stream_key);
let config = DatabaseConfig {
version: outer_header.version,
outer_cipher_config: outer_header.outer_cipher_config,
compression_config: outer_header.compression_config,
inner_cipher_config: inner_header.inner_random_stream,
kdf_config: outer_header.kdf_config,
};
Ok((config, header_attachments, inner_decryptor, xml.to_vec()))
}
fn parse_outer_header(data: &[u8]) -> Result<(KDBX4OuterHeader, usize), DatabaseOpenError> {
let version = DatabaseVersion::parse(data)?;
let mut pos = DatabaseVersion::get_version_header_size();
let mut outer_cipher: Option<OuterCipherConfig> = None;
let mut compression_config: Option<CompressionConfig> = None;
let mut master_seed: Option<Vec<u8>> = None;
let mut outer_iv: Option<Vec<u8>> = None;
let mut kdf_config: Option<KdfConfig> = None;
let mut kdf_seed: Option<Vec<u8>> = None;
loop {
let entry_type = data[pos];
let entry_length: usize = LittleEndian::read_u32(&data[pos + 1..(pos + 5)]) as usize;
let entry_buffer = &data[(pos + 5)..(pos + 5 + entry_length)];
pos += 5 + entry_length;
match entry_type {
HEADER_END => {
break;
}
HEADER_COMMENT => {}
HEADER_OUTER_ENCRYPTION_ID => {
outer_cipher = Some(OuterCipherConfig::try_from(entry_buffer)?);
}
HEADER_COMPRESSION_ID => {
compression_config = Some(CompressionConfig::try_from(LittleEndian::read_u32(entry_buffer))?);
}
HEADER_MASTER_SEED => master_seed = Some(entry_buffer.to_vec()),
HEADER_ENCRYPTION_IV => outer_iv = Some(entry_buffer.to_vec()),
HEADER_KDF_PARAMS => {
let vd = VariantDictionary::parse(entry_buffer)?;
let (kconf, kseed) = vd.try_into()?;
kdf_config = Some(kconf);
kdf_seed = Some(kseed);
}
_ => {
return Err(DatabaseIntegrityError::InvalidOuterHeaderEntry { entry_type }.into());
}
};
}
fn get_or_err<T>(v: Option<T>, err: &str) -> Result<T, DatabaseIntegrityError> {
v.ok_or_else(|| DatabaseIntegrityError::IncompleteOuterHeader { missing_field: err.into() })
}
let outer_cipher_config = get_or_err(outer_cipher, "Outer Cipher ID")?;
let compression_config = get_or_err(compression_config, "Compression ID")?;
let master_seed = get_or_err(master_seed, "Master seed")?;
let outer_iv = get_or_err(outer_iv, "Outer IV")?;
let kdf_config = get_or_err(kdf_config, "Key Derivation Function Parameters")?;
let kdf_seed = get_or_err(kdf_seed, "Key Derivation Function Seed")?;
Ok((
KDBX4OuterHeader {
version,
outer_cipher_config,
compression_config,
master_seed,
outer_iv,
kdf_config,
kdf_seed,
},
pos,
))
}
fn parse_inner_header(data: &[u8]) -> Result<(Vec<HeaderAttachment>, KDBX4InnerHeader, usize), DatabaseOpenError> {
let mut pos = 0;
let mut inner_random_stream = None;
let mut inner_random_stream_key = None;
let mut header_attachments = Vec::new();
loop {
let entry_type = data[pos];
let entry_length: usize = LittleEndian::read_u32(&data[pos + 1..(pos + 5)]) as usize;
let entry_buffer = &data[(pos + 5)..(pos + 5 + entry_length)];
pos += 5 + entry_length;
match entry_type {
INNER_HEADER_END => break,
INNER_HEADER_RANDOM_STREAM_ID => {
inner_random_stream = Some(InnerCipherConfig::try_from(LittleEndian::read_u32(entry_buffer))?);
}
INNER_HEADER_RANDOM_STREAM_KEY => inner_random_stream_key = Some(entry_buffer.to_vec()),
INNER_HEADER_BINARY_ATTACHMENTS => {
let header_attachment = HeaderAttachment::from(entry_buffer);
header_attachments.push(header_attachment);
}
_ => {
return Err(DatabaseIntegrityError::InvalidInnerHeaderEntry { entry_type }.into());
}
}
}
fn get_or_err<T>(v: Option<T>, err: &str) -> Result<T, DatabaseIntegrityError> {
v.ok_or_else(|| DatabaseIntegrityError::IncompleteInnerHeader { missing_field: err.into() })
}
let inner_random_stream = get_or_err(inner_random_stream, "Inner random stream")?;
let inner_random_stream_key = get_or_err(inner_random_stream_key, "Inner random stream key")?;
let inner_header = KDBX4InnerHeader {
inner_random_stream,
inner_random_stream_key,
};
Ok((header_attachments, inner_header, pos))
}