diff --git a/AppImage-Recipe.sh b/AppImage-Recipe.sh
index f8d7e105f..2187fde1f 100755
--- a/AppImage-Recipe.sh
+++ b/AppImage-Recipe.sh
@@ -72,6 +72,8 @@ get_desktop
get_icon
cat << EOF > ./usr/bin/keepassxc_env
#!/usr/bin/env bash
+export LD_LIBRARY_PATH="/opt/libgcrypt20-18/lib/x86_64-linux-gnu:\${LD_LIBRARY_PATH}"
+export LD_LIBRARY_PATH="/opt/gpg-error-127/lib/x86_64-linux-gnu:\${LD_LIBRARY_PATH}"
export LD_LIBRARY_PATH="..$(dirname ${QT_PLUGIN_PATH})/lib:\${LD_LIBRARY_PATH}"
export QT_PLUGIN_PATH="..${QT_PLUGIN_PATH}:\${KPXC_QT_PLUGIN_PATH}"
diff --git a/CMakeLists.txt b/CMakeLists.txt
index 1d5c198ee..e6d4270ca 100644
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -261,8 +261,8 @@ endif()
set_property(DIRECTORY APPEND PROPERTY COMPILE_DEFINITIONS_NONE QT_NO_DEBUG)
find_package(LibGPGError REQUIRED)
-
-find_package(Gcrypt 1.6.0 REQUIRED)
+find_package(Gcrypt 1.7.0 REQUIRED)
+find_package(Argon2 REQUIRED)
find_package(ZLIB REQUIRED)
diff --git a/Dockerfile b/Dockerfile
index 20d7ff352..69db2ac1f 100644
--- a/Dockerfile
+++ b/Dockerfile
@@ -16,6 +16,8 @@
FROM ubuntu:14.04
+ENV REBUILD_COUNTER=2
+
ENV QT5_VERSION=59
ENV QT5_PPA_VERSION=${QT5_VERSION}2
@@ -25,8 +27,7 @@ RUN set -x \
RUN set -x \
&& add-apt-repository ppa:beineri/opt-qt${QT5_PPA_VERSION}-trusty \
- && add-apt-repository ppa:phoerious/keepassxc \
- && LC_ALL=C.UTF-8 add-apt-repository ppa:ondrej/php
+ && add-apt-repository ppa:phoerious/keepassxc
RUN set -x \
&& apt-get update -y \
@@ -37,7 +38,9 @@ RUN set -x \
&& apt-get install -y \
cmake3 \
g++ \
- libgcrypt20-dev \
+ libgcrypt20-18-dev \
+ libargon2-0-dev \
+ libsodium-dev \
qt${QT5_VERSION}base \
qt${QT5_VERSION}tools \
qt${QT5_VERSION}x11extras \
@@ -47,13 +50,16 @@ RUN set -x \
libxtst-dev \
mesa-common-dev \
libyubikey-dev \
- libykpers-1-dev \
- libsodium-dev
+ libykpers-1-dev
-ENV CMAKE_PREFIX_PATH=/opt/qt${QT5_VERSION}/lib/cmake
-ENV LD_LIBRARY_PATH=/opt/qt${QT5_VERSION}/lib
+ENV CMAKE_PREFIX_PATH="/opt/qt${QT5_VERSION}/lib/cmake"
+ENV CMAKE_INCLUDE_PATH="/opt/libgcrypt20-18/include:/opt/gpg-error-127/include"
+ENV CMAKE_LIBRARY_PATH="/opt/libgcrypt20-18/lib/x86_64-linux-gnu:/opt/gpg-error-127/lib/x86_64-linux-gnu"
+ENV LD_LIBRARY_PATH="/opt/qt${QT5_VERSION}/lib:/opt/libgcrypt20-18/lib/x86_64-linux-gnu:/opt/gpg-error-127/lib/x86_64-linux-gnu"
RUN set -x \
- && echo /opt/qt${QT_VERSION}/lib > /etc/ld.so.conf.d/qt${QT5_VERSION}.conf
+ && echo "/opt/qt${QT_VERSION}/lib" > /etc/ld.so.conf.d/qt${QT5_VERSION}.conf \
+ && echo "/opt/libgcrypt20-18/lib/x86_64-linux-gnu" > /etc/ld.so.conf.d/libgcrypt20-18.conf \
+ && echo "/opt/gpg-error-127/lib/x86_64-linux-gnu" > /etc/ld.so.conf.d/libgpg-error-127.conf
# AppImage dependencies
RUN set -x \
diff --git a/INSTALL.md b/INSTALL.md
index 0bfa86b2c..2690e6091 100644
--- a/INSTALL.md
+++ b/INSTALL.md
@@ -26,6 +26,7 @@ The following libraries are required:
* libmicrohttpd
* libxi, libxtst, qtx11extras (optional for auto-type on X11)
* libsodium (>= 1.0.12, optional for keepassxc-browser support)
+* libargon2
Prepare the Building Environment
diff --git a/ci/trusty/Dockerfile b/ci/trusty/Dockerfile
index bd6bec1d2..cdaba3a07 100644
--- a/ci/trusty/Dockerfile
+++ b/ci/trusty/Dockerfile
@@ -18,6 +18,8 @@
FROM ubuntu:14.04
+ENV REBUILD_COUNTER=2
+
ENV QT5_VERSION=53
ENV QT5_PPA_VERSION=${QT5_VERSION}2
@@ -27,27 +29,39 @@ RUN set -x \
RUN set -x \
&& add-apt-repository ppa:beineri/opt-qt${QT5_PPA_VERSION}-trusty \
- && LC_ALL=C.UTF-8 add-apt-repository ppa:ondrej/php
+ && add-apt-repository ppa:phoerious/keepassxc
RUN set -x \
&& apt-get -y update \
&& apt-get -y --no-install-recommends install \
- git build-essential clang-3.6 libclang-common-3.6-dev clang-format-3.6 cmake3 make \
- curl ca-certificates gnupg2 \
- libgcrypt20-dev zlib1g-dev libyubikey-dev libykpers-1-dev \
+ build-essential \
+ clang-3.6 \
+ libclang-common-3.6-dev \
+ clang-format-3.6 \
+ cmake3 \
+ make \
+ libgcrypt20-18-dev \
+ libargon2-0-dev \
+ libsodium-dev \
qt${QT5_VERSION}base \
qt${QT5_VERSION}tools \
qt${QT5_VERSION}x11extras \
qt${QT5_VERSION}translations \
+ zlib1g-dev \
+ libyubikey-dev \
+ libykpers-1-dev \
libxi-dev \
libxtst-dev \
- xvfb \
- libsodium-dev
+ xvfb
-ENV CMAKE_PREFIX_PATH=/opt/qt${QT5_VERSION}/lib/cmake
-ENV LD_LIBRARY_PATH=/opt/qt${QT5_VERSION}/lib
+ENV CMAKE_PREFIX_PATH="/opt/qt${QT5_VERSION}/lib/cmake"
+ENV CMAKE_INCLUDE_PATH="/opt/libgcrypt20-18/include:/opt/gpg-error-127/include"
+ENV CMAKE_LIBRARY_PATH="/opt/libgcrypt20-18/lib/x86_64-linux-gnu:/opt/gpg-error-127/lib/x86_64-linux-gnu"
+ENV LD_LIBRARY_PATH="/opt/qt${QT5_VERSION}/lib:/opt/libgcrypt20-18/lib/x86_64-linux-gnu:/opt/gpg-error-127/lib/x86_64-linux-gnu"
RUN set -x \
- && echo /opt/qt${QT_VERSION}/lib > /etc/ld.so.conf.d/qt${QT5_VERSION}.conf
+ && echo "/opt/qt${QT_VERSION}/lib" > /etc/ld.so.conf.d/qt${QT5_VERSION}.conf \
+ && echo "/opt/libgcrypt20-18/lib/x86_64-linux-gnu" > /etc/ld.so.conf.d/libgcrypt20-18.conf \
+ && echo "/opt/gpg-error-127/lib/x86_64-linux-gnu" > /etc/ld.so.conf.d/libgpg-error-127.conf
RUN set -x \
&& apt-get autoremove --purge \
diff --git a/cmake/FindArgon2.cmake b/cmake/FindArgon2.cmake
new file mode 100644
index 000000000..8378ebd54
--- /dev/null
+++ b/cmake/FindArgon2.cmake
@@ -0,0 +1,21 @@
+# Copyright (C) 2017 KeePassXC Team
+#
+# This program is free software: you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 2 or (at your option)
+# version 3 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program. If not, see .
+
+find_path(ARGON2_INCLUDE_DIR argon2.h)
+find_library(ARGON2_LIBRARIES argon2)
+mark_as_advanced(ARGON2_LIBRARIES ARGON2_INCLUDE_DIR)
+
+include(FindPackageHandleStandardArgs)
+find_package_handle_standard_args(Argon2 DEFAULT_MSG ARGON2_LIBRARIES ARGON2_INCLUDE_DIR)
\ No newline at end of file
diff --git a/cmake/FindLibGPGError.cmake b/cmake/FindLibGPGError.cmake
index c1e1b8686..9a18371ba 100644
--- a/cmake/FindLibGPGError.cmake
+++ b/cmake/FindLibGPGError.cmake
@@ -14,10 +14,10 @@
# along with this program. If not, see .
find_path(GPGERROR_INCLUDE_DIR gpg-error.h)
-
find_library(GPGERROR_LIBRARIES gpg-error)
mark_as_advanced(GPGERROR_LIBRARIES GPGERROR_INCLUDE_DIR)
include(FindPackageHandleStandardArgs)
+include_directories(${GPGERROR_INCLUDE_DIR})
find_package_handle_standard_args(LibGPGError DEFAULT_MSG GPGERROR_LIBRARIES GPGERROR_INCLUDE_DIR)
diff --git a/share/icons/application/32x32/actions/document-encrypt.png b/share/icons/application/32x32/actions/document-encrypt.png
new file mode 100644
index 000000000..353a22ca2
Binary files /dev/null and b/share/icons/application/32x32/actions/document-encrypt.png differ
diff --git a/src/CMakeLists.txt b/src/CMakeLists.txt
index 2dca9e606..b007f0f93 100644
--- a/src/CMakeLists.txt
+++ b/src/CMakeLists.txt
@@ -38,11 +38,11 @@ configure_file(version.h.cmake ${CMAKE_CURRENT_BINARY_DIR}/version.h @ONLY)
set(keepassx_SOURCES
core/AutoTypeAssociations.cpp
+ core/AsyncTask.h
core/Config.cpp
core/CsvParser.cpp
core/Database.cpp
core/DatabaseIcons.cpp
- core/Endian.cpp
core/Entry.cpp
core/EntryAttachments.cpp
core/EntryAttributes.cpp
@@ -62,7 +62,6 @@ set(keepassx_SOURCES
core/ScreenLockListenerPrivate.cpp
core/TimeDelta.cpp
core/TimeInfo.cpp
- core/ToDbExporter.cpp
core/Tools.cpp
core/Translator.cpp
core/Uuid.cpp
@@ -76,16 +75,26 @@ set(keepassx_SOURCES
crypto/SymmetricCipher.cpp
crypto/SymmetricCipherBackend.h
crypto/SymmetricCipherGcrypt.cpp
+ crypto/kdf/Kdf.cpp
+ crypto/kdf/Kdf_p.h
+ crypto/kdf/AesKdf.cpp
+ crypto/kdf/Argon2Kdf.cpp
format/CsvExporter.cpp
format/KeePass1.h
format/KeePass1Reader.cpp
- format/KeePass2.h
+ format/KeePass2.cpp
format/KeePass2RandomStream.cpp
- format/KeePass2Reader.cpp
format/KeePass2Repair.cpp
+ format/KdbxReader.cpp
+ format/KdbxWriter.cpp
+ format/KdbxXmlReader.cpp
+ format/KeePass2Reader.cpp
format/KeePass2Writer.cpp
- format/KeePass2XmlReader.cpp
- format/KeePass2XmlWriter.cpp
+ format/Kdbx3Reader.cpp
+ format/Kdbx3Writer.cpp
+ format/Kdbx4Reader.cpp
+ format/Kdbx4Writer.cpp
+ format/KdbxXmlWriter.cpp
gui/AboutDialog.cpp
gui/Application.cpp
gui/CategoryListWidget.cpp
@@ -139,13 +148,13 @@ set(keepassx_SOURCES
gui/group/GroupModel.cpp
gui/group/GroupView.cpp
keys/CompositeKey.cpp
- keys/CompositeKey_p.h
keys/drivers/YubiKey.h
keys/FileKey.cpp
keys/Key.h
keys/PasswordKey.cpp
keys/YkChallengeResponseKey.cpp
streams/HashedBlockStream.cpp
+ streams/HmacBlockStream.cpp
streams/LayeredStream.cpp
streams/qtiocompressor.cpp
streams/StoreDataStream.cpp
@@ -248,6 +257,7 @@ target_link_libraries(keepassx_core
Qt5::Network
Qt5::Concurrent
Qt5::Widgets
+ ${ARGON2_LIBRARIES}
${GCRYPT_LIBRARIES}
${GPGERROR_LIBRARIES}
${ZLIB_LIBRARIES})
diff --git a/src/cli/CMakeLists.txt b/src/cli/CMakeLists.txt
index 4c8620d55..225ce47dc 100644
--- a/src/cli/CMakeLists.txt
+++ b/src/cli/CMakeLists.txt
@@ -46,6 +46,7 @@ target_link_libraries(keepassxc-cli
keepassx_core
Qt5::Core
${GCRYPT_LIBRARIES}
+ ${ARGON2_LIBRARIES}
${GPGERROR_LIBRARIES}
${ZLIB_LIBRARIES}
${ZXCVBN_LIBRARIES})
diff --git a/src/cli/Extract.cpp b/src/cli/Extract.cpp
index 73879f67d..54c8a45ee 100644
--- a/src/cli/Extract.cpp
+++ b/src/cli/Extract.cpp
@@ -101,7 +101,7 @@ int Extract::execute(QStringList arguments)
Database* db = reader.readDatabase(&dbFile, compositeKey);
delete db;
- QByteArray xmlData = reader.xmlData();
+ QByteArray xmlData = reader.reader()->xmlData();
if (reader.hasError()) {
if (xmlData.isEmpty()) {
diff --git a/src/core/AsyncTask.h b/src/core/AsyncTask.h
new file mode 100644
index 000000000..67cab1609
--- /dev/null
+++ b/src/core/AsyncTask.h
@@ -0,0 +1,63 @@
+/*
+ * Copyright (C) 2017 KeePassXC Team
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 2 or (at your option)
+ * version 3 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see .
+*/
+
+#ifndef KEEPASSXC_ASYNCTASK_HPP
+#define KEEPASSXC_ASYNCTASK_HPP
+
+#include
+#include
+#include
+
+
+/**
+ * Asynchronously run computations outside the GUI thread.
+ */
+namespace AsyncTask
+{
+
+/**
+ * Wait for the given future without blocking the event loop.
+ *
+ * @param future future to wait for
+ * @return async task result
+ */
+template
+typename std::result_of::type waitForFuture(QFuture::type> future)
+{
+ QEventLoop loop;
+ QFutureWatcher::type> watcher;
+ QObject::connect(&watcher, SIGNAL(finished()), &loop, SLOT(quit()));
+ watcher.setFuture(future);
+ loop.exec();
+ return future.result();
+}
+
+/**
+ * Run a given task and wait for it to finish without blocking the event loop.
+ *
+ * @param task std::function object to run
+ * @return async task result
+ */
+template
+typename std::result_of::type runAndWaitForFuture(FunctionObject task)
+{
+ return waitForFuture(QtConcurrent::run(task));
+}
+
+}; // namespace AsyncTask
+
+#endif //KEEPASSXC_ASYNCTASK_HPP
diff --git a/src/core/Database.cpp b/src/core/Database.cpp
index cb28ee211..75b91a5c5 100644
--- a/src/core/Database.cpp
+++ b/src/core/Database.cpp
@@ -27,13 +27,12 @@
#include "cli/Utils.h"
#include "core/Group.h"
#include "core/Metadata.h"
-#include "crypto/Random.h"
+#include "crypto/kdf/AesKdf.h"
#include "format/KeePass2.h"
#include "format/KeePass2Reader.h"
#include "format/KeePass2Writer.h"
#include "keys/PasswordKey.h"
#include "keys/FileKey.h"
-#include "keys/CompositeKey.h"
QHash Database::m_uuidMap;
@@ -45,7 +44,11 @@ Database::Database()
{
m_data.cipher = KeePass2::CIPHER_AES;
m_data.compressionAlgo = CompressionGZip;
- m_data.transformRounds = 100000;
+
+ // instantiate default AES-KDF with legacy KDBX3 flag set
+ // KDBX4+ will re-initialize the KDF using parameters read from the KDBX file
+ m_data.kdf = QSharedPointer::create(true);
+ m_data.kdf->randomizeSeed();
m_data.hasKey = false;
setRootGroup(new Group());
@@ -225,16 +228,6 @@ Database::CompressionAlgorithm Database::compressionAlgo() const
return m_data.compressionAlgo;
}
-QByteArray Database::transformSeed() const
-{
- return m_data.transformSeed;
-}
-
-quint64 Database::transformRounds() const
-{
- return m_data.transformRounds;
-}
-
QByteArray Database::transformedMasterKey() const
{
return m_data.transformedMasterKey;
@@ -265,75 +258,46 @@ void Database::setCompressionAlgo(Database::CompressionAlgorithm algo)
m_data.compressionAlgo = algo;
}
-bool Database::setTransformRounds(quint64 rounds)
+/**
+ * Set and transform a new encryption key.
+ *
+ * @param key key to set and transform
+ * @param updateChangedTime true to update database change time
+ * @param updateTransformSalt true to update the transform salt
+ * @return true on success
+ */
+bool Database::setKey(const CompositeKey& key, bool updateChangedTime, bool updateTransformSalt)
{
- if (m_data.transformRounds != rounds) {
- quint64 oldRounds = m_data.transformRounds;
-
- m_data.transformRounds = rounds;
-
- if (m_data.hasKey) {
- if (!setKey(m_data.key)) {
- m_data.transformRounds = oldRounds;
- return false;
- }
- }
+ if (updateTransformSalt) {
+ m_data.kdf->randomizeSeed();
+ Q_ASSERT(!m_data.kdf->seed().isEmpty());
}
- return true;
-}
-
-bool Database::setKey(const CompositeKey& key, const QByteArray& transformSeed, bool updateChangedTime)
-{
- bool ok;
- QString errorString;
-
- QByteArray transformedMasterKey = key.transform(transformSeed, transformRounds(), &ok, &errorString);
- if (!ok) {
+ QByteArray oldTransformedMasterKey = m_data.transformedMasterKey;
+ QByteArray transformedMasterKey;
+ if (!key.transform(*m_data.kdf, transformedMasterKey)) {
return false;
}
m_data.key = key;
- m_data.transformSeed = transformSeed;
m_data.transformedMasterKey = transformedMasterKey;
m_data.hasKey = true;
if (updateChangedTime) {
m_metadata->setMasterKeyChanged(QDateTime::currentDateTimeUtc());
}
- emit modifiedImmediate();
+
+ if (oldTransformedMasterKey != m_data.transformedMasterKey) {
+ emit modifiedImmediate();
+ }
return true;
}
-bool Database::setKey(const CompositeKey& key)
-{
- return setKey(key, randomGen()->randomArray(32));
-}
-
bool Database::hasKey() const
{
return m_data.hasKey;
}
-bool Database::transformKeyWithSeed(const QByteArray& transformSeed)
-{
- Q_ASSERT(hasKey());
-
- bool ok;
- QString errorString;
-
- QByteArray transformedMasterKey =
- m_data.key.transform(transformSeed, transformRounds(), &ok, &errorString);
- if (!ok) {
- return false;
- }
-
- m_data.transformSeed = transformSeed;
- m_data.transformedMasterKey = transformedMasterKey;
-
- return true;
-}
-
bool Database::verifyKey(const CompositeKey& key) const
{
Q_ASSERT(hasKey());
@@ -426,11 +390,6 @@ void Database::setEmitModified(bool value)
m_emitModified = value;
}
-void Database::copyAttributesFrom(const Database* other)
-{
- m_data = other->m_data;
- m_metadata->copyAttributesFrom(other->m_metadata);
-}
Uuid Database::uuid()
{
@@ -518,7 +477,9 @@ QString Database::saveToFile(QString filePath)
if (saveFile.open(QIODevice::WriteOnly)) {
// write the database to the file
+ setEmitModified(false);
writer.writeDatabase(&saveFile, this);
+ setEmitModified(true);
if (writer.hasError()) {
return writer.errorString();
@@ -534,3 +495,36 @@ QString Database::saveToFile(QString filePath)
return saveFile.errorString();
}
}
+
+QSharedPointer Database::kdf() const
+{
+ return m_data.kdf;
+}
+
+void Database::setKdf(QSharedPointer kdf)
+{
+ m_data.kdf = std::move(kdf);
+}
+
+void Database::setPublicCustomData(QByteArray data) {
+ m_data.publicCustomData = data;
+}
+
+QByteArray Database::publicCustomData() const {
+ return m_data.publicCustomData;
+}
+
+bool Database::changeKdf(QSharedPointer kdf)
+{
+ kdf->randomizeSeed();
+ QByteArray transformedMasterKey;
+ if (!m_data.key.transform(*kdf, transformedMasterKey)) {
+ return false;
+ }
+
+ setKdf(kdf);
+ m_data.transformedMasterKey = transformedMasterKey;
+ emit modifiedImmediate();
+
+ return true;
+}
diff --git a/src/core/Database.h b/src/core/Database.h
index b20f897fe..3bf43f62d 100644
--- a/src/core/Database.h
+++ b/src/core/Database.h
@@ -23,6 +23,7 @@
#include
#include
+#include "crypto/kdf/Kdf.h"
#include "core/Uuid.h"
#include "keys/CompositeKey.h"
@@ -56,9 +57,9 @@ public:
{
Uuid cipher;
CompressionAlgorithm compressionAlgo;
- QByteArray transformSeed;
- quint64 transformRounds;
QByteArray transformedMasterKey;
+ QByteArray publicCustomData;
+ QSharedPointer kdf;
CompositeKey key;
bool hasKey;
QByteArray masterSeed;
@@ -66,7 +67,7 @@ public:
};
Database();
- ~Database();
+ ~Database() override;
Group* rootGroup();
const Group* rootGroup() const;
@@ -90,8 +91,8 @@ public:
Uuid cipher() const;
Database::CompressionAlgorithm compressionAlgo() const;
- QByteArray transformSeed() const;
- quint64 transformRounds() const;
+ QSharedPointer kdf() const;
+ QByteArray publicCustomData() const;
QByteArray transformedMasterKey() const;
const CompositeKey& key() const;
QByteArray challengeResponseKey() const;
@@ -99,22 +100,16 @@ public:
void setCipher(const Uuid& cipher);
void setCompressionAlgo(Database::CompressionAlgorithm algo);
- bool setTransformRounds(quint64 rounds);
- bool setKey(const CompositeKey& key, const QByteArray& transformSeed,
- bool updateChangedTime = true);
-
- /**
- * Sets the database key and generates a random transform seed.
- */
- bool setKey(const CompositeKey& key);
+ void setKdf(QSharedPointer kdf);
+ void setPublicCustomData(QByteArray data);
+ bool setKey(const CompositeKey& key, bool updateChangedTime = true,
+ bool updateTransformSalt = false);
bool hasKey() const;
- bool transformKeyWithSeed(const QByteArray& transformSeed);
bool verifyKey(const CompositeKey& key) const;
void recycleEntry(Entry* entry);
void recycleGroup(Group* group);
void emptyRecycleBin();
void setEmitModified(bool value);
- void copyAttributesFrom(const Database* other);
void merge(const Database* other);
QString saveToFile(QString filePath);
@@ -122,6 +117,7 @@ public:
* Returns a unique id that is only valid as long as the Database exists.
*/
Uuid uuid();
+ bool changeKdf(QSharedPointer kdf);
static Database* databaseByUuid(const Uuid& uuid);
static Database* openDatabaseFile(QString fileName, CompositeKey key);
diff --git a/src/core/Endian.cpp b/src/core/Endian.cpp
deleted file mode 100644
index bf838abcb..000000000
--- a/src/core/Endian.cpp
+++ /dev/null
@@ -1,199 +0,0 @@
-/*
- * Copyright (C) 2010 Felix Geyer
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 2 or (at your option)
- * version 3 of the License.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see .
- */
-
-#include "Endian.h"
-
-#include
-#include
-
-namespace Endian {
-
-qint16 bytesToInt16(const QByteArray& ba, QSysInfo::Endian byteOrder)
-{
- Q_ASSERT(ba.size() == 2);
-
- if (byteOrder == QSysInfo::LittleEndian) {
- return qFromLittleEndian(reinterpret_cast(ba.constData()));
- }
- else {
- return qFromBigEndian(reinterpret_cast(ba.constData()));
- }
-}
-
-qint32 bytesToInt32(const QByteArray& ba, QSysInfo::Endian byteOrder)
-{
- Q_ASSERT(ba.size() == 4);
-
- if (byteOrder == QSysInfo::LittleEndian) {
- return qFromLittleEndian(reinterpret_cast(ba.constData()));
- }
- else {
- return qFromBigEndian(reinterpret_cast(ba.constData()));
- }
-}
-
-qint64 bytesToInt64(const QByteArray& ba, QSysInfo::Endian byteOrder)
-{
- Q_ASSERT(ba.size() == 8);
-
- if (byteOrder == QSysInfo::LittleEndian) {
- return qFromLittleEndian(reinterpret_cast(ba.constData()));
- }
- else {
- return qFromBigEndian(reinterpret_cast(ba.constData()));
- }
-}
-
-quint16 bytesToUInt16(const QByteArray& ba, QSysInfo::Endian byteOrder)
-{
- return static_cast(bytesToInt16(ba, byteOrder));
-}
-
-quint32 bytesToUInt32(const QByteArray& ba, QSysInfo::Endian byteOrder)
-{
- return static_cast(bytesToInt32(ba, byteOrder));
-}
-
-quint64 bytesToUInt64(const QByteArray& ba, QSysInfo::Endian byteOrder)
-{
- return static_cast(bytesToInt64(ba, byteOrder));
-}
-
-qint16 readInt16(QIODevice* device, QSysInfo::Endian byteOrder, bool* ok)
-{
- QByteArray ba = device->read(2);
-
- if (ba.size() != 2) {
- *ok = false;
- return 0;
- }
- else {
- *ok = true;
- return bytesToInt16(ba, byteOrder);
- }
-}
-
-qint32 readInt32(QIODevice* device, QSysInfo::Endian byteOrder, bool* ok)
-{
- QByteArray ba = device->read(4);
-
- if (ba.size() != 4) {
- *ok = false;
- return 0;
- }
- else {
- *ok = true;
- return bytesToInt32(ba, byteOrder);
- }
-}
-
-qint64 readInt64(QIODevice* device, QSysInfo::Endian byteOrder, bool* ok)
-{
- QByteArray ba = device->read(8);
-
- if (ba.size() != 8) {
- *ok = false;
- return 0;
- }
- else {
- *ok = true;
- return bytesToInt64(ba, byteOrder);
- }
-}
-
-quint16 readUInt16(QIODevice* device, QSysInfo::Endian byteOrder, bool* ok)
-{
- return static_cast(readInt16(device, byteOrder, ok));
-}
-
-quint32 readUInt32(QIODevice* device, QSysInfo::Endian byteOrder, bool* ok)
-{
- return static_cast(readInt32(device, byteOrder, ok));
-}
-
-quint64 readUInt64(QIODevice* device, QSysInfo::Endian byteOrder, bool* ok)
-{
- return static_cast(readInt64(device, byteOrder, ok));
-}
-
-QByteArray int16ToBytes(qint16 num, QSysInfo::Endian byteOrder)
-{
- QByteArray ba;
- ba.resize(2);
-
- if (byteOrder == QSysInfo::LittleEndian) {
- qToLittleEndian(num, reinterpret_cast(ba.data()));
- }
- else {
- qToBigEndian(num, reinterpret_cast(ba.data()));
- }
-
- return ba;
-}
-
-QByteArray int32ToBytes(qint32 num, QSysInfo::Endian byteOrder)
-{
- QByteArray ba;
- ba.resize(4);
-
- if (byteOrder == QSysInfo::LittleEndian) {
- qToLittleEndian(num, reinterpret_cast(ba.data()));
- }
- else {
- qToBigEndian(num, reinterpret_cast(ba.data()));
- }
-
- return ba;
-}
-
-QByteArray int64ToBytes(qint64 num, QSysInfo::Endian byteOrder)
-{
- QByteArray ba;
- ba.resize(8);
-
- if (byteOrder == QSysInfo::LittleEndian) {
- qToLittleEndian(num, reinterpret_cast(ba.data()));
- }
- else {
- qToBigEndian(num, reinterpret_cast(ba.data()));
- }
-
- return ba;
-}
-
-bool writeInt16(qint16 num, QIODevice* device, QSysInfo::Endian byteOrder)
-{
- QByteArray ba = int16ToBytes(num, byteOrder);
- int bytesWritten = device->write(ba);
- return (bytesWritten == ba.size());
-}
-
-bool writeInt32(qint32 num, QIODevice* device, QSysInfo::Endian byteOrder)
-{
- QByteArray ba = int32ToBytes(num, byteOrder);
- int bytesWritten = device->write(ba);
- return (bytesWritten == ba.size());
-}
-
-bool writeInt64(qint64 num, QIODevice* device, QSysInfo::Endian byteOrder)
-{
- QByteArray ba = int64ToBytes(num, byteOrder);
- int bytesWritten = device->write(ba);
- return (bytesWritten == ba.size());
-}
-
-} // namespace Endian
diff --git a/src/core/Endian.h b/src/core/Endian.h
index 0cea617c6..cd01eb483 100644
--- a/src/core/Endian.h
+++ b/src/core/Endian.h
@@ -1,4 +1,5 @@
/*
+ * Copyright (C) 2017 KeePassXC Team
* Copyright (C) 2010 Felix Geyer
*
* This program is free software: you can redistribute it and/or modify
@@ -20,32 +21,58 @@
#include
#include
+#include
+#include
-class QIODevice;
+namespace Endian
+{
-namespace Endian {
+template
+SizedQInt bytesToSizedInt(const QByteArray& ba, QSysInfo::Endian byteOrder)
+{
+ Q_ASSERT(ba.size() == sizeof(SizedQInt));
- qint16 bytesToInt16(const QByteArray& ba, QSysInfo::Endian byteOrder);
- quint16 bytesToUInt16(const QByteArray& ba, QSysInfo::Endian byteOrder);
- qint32 bytesToInt32(const QByteArray& ba, QSysInfo::Endian byteOrder);
- quint32 bytesToUInt32(const QByteArray& ba, QSysInfo::Endian byteOrder);
- qint64 bytesToInt64(const QByteArray& ba, QSysInfo::Endian byteOrder);
- quint64 bytesToUInt64(const QByteArray& ba, QSysInfo::Endian byteOrder);
+ if (byteOrder == QSysInfo::LittleEndian) {
+ return qFromLittleEndian(reinterpret_cast(ba.constData()));
+ }
+ return qFromBigEndian(reinterpret_cast(ba.constData()));
+}
- qint16 readInt16(QIODevice* device, QSysInfo::Endian byteOrder, bool* ok);
- quint16 readUInt16(QIODevice* device, QSysInfo::Endian byteOrder, bool* ok);
- qint32 readInt32(QIODevice* device, QSysInfo::Endian byteOrder, bool* ok);
- quint32 readUInt32(QIODevice* device, QSysInfo::Endian byteOrder, bool* ok);
- qint64 readInt64(QIODevice* device, QSysInfo::Endian byteOrder, bool* ok);
- quint64 readUInt64(QIODevice* device, QSysInfo::Endian byteOrder, bool* ok);
+template
+SizedQInt readSizedInt(QIODevice* device, QSysInfo::Endian byteOrder, bool* ok)
+{
+ QByteArray ba = device->read(sizeof(SizedQInt));
- QByteArray int16ToBytes(qint16 num, QSysInfo::Endian byteOrder);
- QByteArray int32ToBytes(qint32 num, QSysInfo::Endian byteOrder);
- QByteArray int64ToBytes(qint64 num, QSysInfo::Endian byteOrder);
+ if (ba.size() != sizeof(SizedQInt)) {
+ *ok = false;
+ return 0;
+ }
+ *ok = true;
+ return bytesToSizedInt(ba, byteOrder);
+}
- bool writeInt16(qint16 num, QIODevice* device, QSysInfo::Endian byteOrder);
- bool writeInt32(qint32 num, QIODevice* device, QSysInfo::Endian byteOrder);
- bool writeInt64(qint64 num, QIODevice* device, QSysInfo::Endian byteOrder);
+template
+QByteArray sizedIntToBytes(SizedQInt num, QSysInfo::Endian byteOrder)
+{
+ QByteArray ba;
+ ba.resize(sizeof(SizedQInt));
+
+ if (byteOrder == QSysInfo::LittleEndian) {
+ qToLittleEndian(num, reinterpret_cast(ba.data()));
+ } else {
+ qToBigEndian(num, reinterpret_cast(ba.data()));
+ }
+
+ return ba;
+}
+
+template
+bool writeSizedInt(SizedQInt num, QIODevice* device, QSysInfo::Endian byteOrder)
+{
+ QByteArray ba = sizedIntToBytes(num, byteOrder);
+ qint64 bytesWritten = device->write(ba);
+ return (bytesWritten == ba.size());
+}
} // namespace Endian
diff --git a/src/core/Metadata.cpp b/src/core/Metadata.cpp
index 46b0a0b5e..ab56dab7f 100644
--- a/src/core/Metadata.cpp
+++ b/src/core/Metadata.cpp
@@ -49,6 +49,7 @@ Metadata::Metadata(QObject* parent)
m_recycleBinChanged = now;
m_entryTemplatesGroupChanged = now;
m_masterKeyChanged = now;
+ m_settingsChanged = now;
}
template bool Metadata::set(P& property, const V& value)
@@ -525,3 +526,12 @@ void Metadata::removeCustomField(const QString& key)
m_customFields.remove(key);
emit modified();
}
+
+QDateTime Metadata::settingsChanged() const {
+ return m_settingsChanged;
+}
+
+void Metadata::setSettingsChanged(const QDateTime& value) {
+ Q_ASSERT(value.timeSpec() == Qt::UTC);
+ m_settingsChanged = value;
+}
diff --git a/src/core/Metadata.h b/src/core/Metadata.h
index 1e972fd5a..7791b0387 100644
--- a/src/core/Metadata.h
+++ b/src/core/Metadata.h
@@ -69,6 +69,7 @@ public:
QDateTime descriptionChanged() const;
QString defaultUserName() const;
QDateTime defaultUserNameChanged() const;
+ QDateTime settingsChanged() const;
int maintenanceHistoryDays() const;
QColor color() const;
bool protectTitle() const;
@@ -108,6 +109,7 @@ public:
void setDescriptionChanged(const QDateTime& value);
void setDefaultUserName(const QString& value);
void setDefaultUserNameChanged(const QDateTime& value);
+ void setSettingsChanged(const QDateTime& value);
void setMaintenanceHistoryDays(int value);
void setColor(const QColor& value);
void setProtectTitle(bool value);
@@ -141,6 +143,7 @@ public:
* - Master key changed date
* - Custom icons
* - Custom fields
+ * - Settings changed date
*/
void copyAttributesFrom(const Metadata* other);
@@ -170,6 +173,7 @@ private:
QPointer m_lastTopVisibleGroup;
QDateTime m_masterKeyChanged;
+ QDateTime m_settingsChanged;
QHash m_customFields;
diff --git a/src/core/ToDbExporter.cpp b/src/core/ToDbExporter.cpp
deleted file mode 100644
index 1f76fb744..000000000
--- a/src/core/ToDbExporter.cpp
+++ /dev/null
@@ -1,39 +0,0 @@
-/*
- * Copyright (C) 2014 Felix Geyer
- * Copyright (C) 2014 Florian Geyer
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 2 or (at your option)
- * version 3 of the License.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see .
- */
-
-#include "ToDbExporter.h"
-#include "core/Database.h"
-#include "core/Group.h"
-#include "core/Metadata.h"
-
-Database* ToDbExporter::exportGroup(Group* group)
-{
- Database* oldDb = group->database();
- Q_ASSERT(oldDb);
-
- Database* db = new Database();
- Group* clonedGroup = group->clone(Entry::CloneNewUuid | Entry::CloneIncludeHistory);
- clonedGroup->setParent(db->rootGroup());
-
- QSet customIcons = group->customIconsRecursive();
- db->metadata()->copyCustomIcons(customIcons, oldDb->metadata());
-
- db->copyAttributesFrom(oldDb);
-
- return db;
-}
diff --git a/src/crypto/Crypto.cpp b/src/crypto/Crypto.cpp
index d00be720b..7ba78a6b3 100644
--- a/src/crypto/Crypto.cpp
+++ b/src/crypto/Crypto.cpp
@@ -95,18 +95,28 @@ bool Crypto::checkAlgorithms()
qWarning("Crypto::checkAlgorithms: %s", qPrintable(m_errorStr));
return false;
}
+ if (gcry_cipher_algo_info(GCRY_CIPHER_CHACHA20, GCRYCTL_TEST_ALGO, nullptr, nullptr) != 0) {
+ m_errorStr = "GCRY_CIPHER_CHACHA20 not found.";
+ qWarning("Crypto::checkAlgorithms: %s", qPrintable(m_errorStr));
+ return false;
+ }
if (gcry_md_test_algo(GCRY_MD_SHA256) != 0) {
m_errorStr = "GCRY_MD_SHA256 not found.";
qWarning("Crypto::checkAlgorithms: %s", qPrintable(m_errorStr));
return false;
}
+ if (gcry_md_test_algo(GCRY_MD_SHA512) != 0) {
+ m_errorStr = "GCRY_MD_SHA512 not found.";
+ qWarning("Crypto::checkAlgorithms: %s", qPrintable(m_errorStr));
+ return false;
+ }
return true;
}
bool Crypto::selfTest()
{
- return testSha256() && testAes256Cbc() && testAes256Ecb() && testTwofish() && testSalsa20();
+ return testSha256() && testSha512() && testAes256Cbc() && testAes256Ecb() && testTwofish() && testSalsa20() && testChaCha20();
}
void Crypto::raiseError(const QString& str)
@@ -128,6 +138,19 @@ bool Crypto::testSha256()
return true;
}
+bool Crypto::testSha512()
+{
+ QByteArray sha512Test = CryptoHash::hash("abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq",
+ CryptoHash::Sha512);
+
+ if (sha512Test != QByteArray::fromHex("204a8fc6dda82f0a0ced7beb8e08a41657c16ef468b228a8279be331a703c33596fd15c13b1b07f9aa1d3bea57789ca031ad85c7a71dd70354ec631238ca3445")) {
+ raiseError("SHA-512 mismatch.");
+ return false;
+ }
+
+ return true;
+}
+
bool Crypto::testAes256Cbc()
{
QByteArray key = QByteArray::fromHex("603deb1015ca71be2b73aef0857d77811f352c073b6108d72d9810a30914dff4");
@@ -285,3 +308,30 @@ bool Crypto::testSalsa20()
return true;
}
+
+bool Crypto::testChaCha20() {
+ QByteArray chacha20Key = QByteArray::fromHex("0000000000000000000000000000000000000000000000000000000000000000");
+ QByteArray chacha20iv = QByteArray::fromHex("0000000000000000");
+ QByteArray chacha20Plain = QByteArray::fromHex("00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000");
+ QByteArray chacha20Cipher = QByteArray::fromHex("76b8e0ada0f13d90405d6ae55386bd28bdd219b8a08ded1aa836efcc8b770dc7da41597c5157488d7724e03fb8d84a376a43b8f41518a11cc387b669b2ee6586");
+ bool ok;
+
+ SymmetricCipher chacha20Stream(SymmetricCipher::ChaCha20, SymmetricCipher::Stream,
+ SymmetricCipher::Encrypt);
+ if (!chacha20Stream.init(chacha20Key, chacha20iv)) {
+ raiseError(chacha20Stream.errorString());
+ return false;
+ }
+
+ QByteArray chacha20Processed = chacha20Stream.process(chacha20Plain, &ok);
+ if (!ok) {
+ raiseError(chacha20Stream.errorString());
+ return false;
+ }
+ if (chacha20Processed != chacha20Cipher) {
+ raiseError("ChaCha20 stream cipher mismatch.");
+ return false;
+ }
+
+ return true;
+}
\ No newline at end of file
diff --git a/src/crypto/Crypto.h b/src/crypto/Crypto.h
index 0ce2903c6..379068eb4 100644
--- a/src/crypto/Crypto.h
+++ b/src/crypto/Crypto.h
@@ -35,10 +35,12 @@ private:
static bool selfTest();
static void raiseError(const QString& str);
static bool testSha256();
+ static bool testSha512();
static bool testAes256Cbc();
static bool testAes256Ecb();
static bool testTwofish();
static bool testSalsa20();
+ static bool testChaCha20();
static bool m_initalized;
static QString m_errorStr;
diff --git a/src/crypto/CryptoHash.cpp b/src/crypto/CryptoHash.cpp
index d116451fc..12c6bf791 100644
--- a/src/crypto/CryptoHash.cpp
+++ b/src/crypto/CryptoHash.cpp
@@ -28,28 +28,40 @@ public:
int hashLen;
};
-CryptoHash::CryptoHash(CryptoHash::Algorithm algo)
+CryptoHash::CryptoHash(Algorithm algo, bool hmac)
: d_ptr(new CryptoHashPrivate())
{
Q_D(CryptoHash);
Q_ASSERT(Crypto::initalized());
- int algoGcrypt;
+ int algoGcrypt = -1;
+ unsigned int flagsGcrypt = GCRY_MD_FLAG_SECURE;
switch (algo) {
case CryptoHash::Sha256:
algoGcrypt = GCRY_MD_SHA256;
break;
+ case CryptoHash::Sha512:
+ algoGcrypt = GCRY_MD_SHA512;
+ break;
+
default:
Q_ASSERT(false);
break;
}
- gcry_error_t error = gcry_md_open(&d->ctx, algoGcrypt, 0);
+ if (hmac) {
+ flagsGcrypt |= GCRY_MD_FLAG_HMAC;
+ }
+
+ gcry_error_t error = gcry_md_open(&d->ctx, algoGcrypt, flagsGcrypt);
+ if (error != GPG_ERR_NO_ERROR) {
+ qWarning("Gcrypt error (ctor): %s", gcry_strerror(error));
+ qWarning("Gcrypt error (ctor): %s", gcry_strsource(error));
+ }
Q_ASSERT(error == 0); // TODO: error handling
- Q_UNUSED(error);
d->hashLen = gcry_md_get_algo_dlen(algoGcrypt);
}
@@ -71,7 +83,19 @@ void CryptoHash::addData(const QByteArray& data)
return;
}
- gcry_md_write(d->ctx, data.constData(), data.size());
+ gcry_md_write(d->ctx, data.constData(), static_cast(data.size()));
+}
+
+void CryptoHash::setKey(const QByteArray& data)
+{
+ Q_D(CryptoHash);
+
+ gcry_error_t error = gcry_md_setkey(d->ctx, data.constData(), static_cast(data.size()));
+ if (error) {
+ qWarning("Gcrypt error (setKey): %s", gcry_strerror(error));
+ qWarning("Gcrypt error (setKey): %s", gcry_strsource(error));
+ }
+ Q_ASSERT(error == 0);
}
void CryptoHash::reset()
@@ -85,14 +109,23 @@ QByteArray CryptoHash::result() const
{
Q_D(const CryptoHash);
- const char* result = reinterpret_cast(gcry_md_read(d->ctx, 0));
+ const auto result = reinterpret_cast(gcry_md_read(d->ctx, 0));
return QByteArray(result, d->hashLen);
}
-QByteArray CryptoHash::hash(const QByteArray& data, CryptoHash::Algorithm algo)
+QByteArray CryptoHash::hash(const QByteArray& data, Algorithm algo)
{
// replace with gcry_md_hash_buffer()?
CryptoHash cryptoHash(algo);
cryptoHash.addData(data);
return cryptoHash.result();
}
+
+QByteArray CryptoHash::hmac(const QByteArray& data, const QByteArray& key, Algorithm algo)
+{
+ // replace with gcry_md_hash_buffer()?
+ CryptoHash cryptoHash(algo, true);
+ cryptoHash.setKey(key);
+ cryptoHash.addData(data);
+ return cryptoHash.result();
+}
diff --git a/src/crypto/CryptoHash.h b/src/crypto/CryptoHash.h
index 80df056f1..bd312121a 100644
--- a/src/crypto/CryptoHash.h
+++ b/src/crypto/CryptoHash.h
@@ -27,16 +27,19 @@ class CryptoHash
public:
enum Algorithm
{
- Sha256
+ Sha256,
+ Sha512
};
- explicit CryptoHash(CryptoHash::Algorithm algo);
+ explicit CryptoHash(Algorithm algo, bool hmac = false);
~CryptoHash();
void addData(const QByteArray& data);
void reset();
QByteArray result() const;
+ void setKey(const QByteArray& data);
- static QByteArray hash(const QByteArray& data, CryptoHash::Algorithm algo);
+ static QByteArray hash(const QByteArray& data, Algorithm algo);
+ static QByteArray hmac(const QByteArray& data, const QByteArray& key, Algorithm algo);
private:
CryptoHashPrivate* const d_ptr;
diff --git a/src/crypto/SymmetricCipher.cpp b/src/crypto/SymmetricCipher.cpp
index 016103b27..1ec8a2cf6 100644
--- a/src/crypto/SymmetricCipher.cpp
+++ b/src/crypto/SymmetricCipher.cpp
@@ -20,10 +20,10 @@
#include "config-keepassx.h"
#include "crypto/SymmetricCipherGcrypt.h"
-SymmetricCipher::SymmetricCipher(SymmetricCipher::Algorithm algo, SymmetricCipher::Mode mode,
- SymmetricCipher::Direction direction)
+SymmetricCipher::SymmetricCipher(Algorithm algo, Mode mode, Direction direction)
: m_backend(createBackend(algo, mode, direction))
, m_initialized(false)
+ , m_algo(algo)
{
}
@@ -54,13 +54,13 @@ bool SymmetricCipher::isInitalized() const
return m_initialized;
}
-SymmetricCipherBackend* SymmetricCipher::createBackend(SymmetricCipher::Algorithm algo, SymmetricCipher::Mode mode,
- SymmetricCipher::Direction direction)
+SymmetricCipherBackend* SymmetricCipher::createBackend(Algorithm algo, Mode mode, Direction direction)
{
switch (algo) {
- case SymmetricCipher::Aes256:
- case SymmetricCipher::Twofish:
- case SymmetricCipher::Salsa20:
+ case Aes256:
+ case Twofish:
+ case Salsa20:
+ case ChaCha20:
return new SymmetricCipherGcrypt(algo, mode, direction);
default:
@@ -92,19 +92,62 @@ QString SymmetricCipher::errorString() const
SymmetricCipher::Algorithm SymmetricCipher::cipherToAlgorithm(Uuid cipher)
{
if (cipher == KeePass2::CIPHER_AES) {
- return SymmetricCipher::Aes256;
+ return Aes256;
+ } else if (cipher == KeePass2::CIPHER_CHACHA20) {
+ return ChaCha20;
+ } else if (cipher == KeePass2::CIPHER_TWOFISH) {
+ return Twofish;
}
- else {
- return SymmetricCipher::Twofish;
+
+ qWarning("SymmetricCipher::cipherToAlgorithm: invalid Uuid %s", cipher.toByteArray().toHex().data());
+ return InvalidAlgorithm;
+}
+
+Uuid SymmetricCipher::algorithmToCipher(Algorithm algo)
+{
+ switch (algo) {
+ case Aes256:
+ return KeePass2::CIPHER_AES;
+ case ChaCha20:
+ return KeePass2::CIPHER_CHACHA20;
+ case Twofish:
+ return KeePass2::CIPHER_TWOFISH;
+ default:
+ qWarning("SymmetricCipher::algorithmToCipher: invalid algorithm %d", algo);
+ return Uuid();
}
}
-Uuid SymmetricCipher::algorithmToCipher(SymmetricCipher::Algorithm algo)
+int SymmetricCipher::algorithmIvSize(Algorithm algo)
{
switch (algo) {
- case SymmetricCipher::Aes256:
- return KeePass2::CIPHER_AES;
+ case ChaCha20:
+ return 12;
+ case Aes256:
+ return 16;
+ case Twofish:
+ return 16;
default:
- return KeePass2::CIPHER_TWOFISH;
+ qWarning("SymmetricCipher::algorithmIvSize: invalid algorithm %d", algo);
+ return -1;
}
}
+
+SymmetricCipher::Mode SymmetricCipher::algorithmMode(Algorithm algo)
+{
+ switch (algo) {
+ case ChaCha20:
+ return Stream;
+ case Aes256:
+ case Twofish:
+ return Cbc;
+ default:
+ qWarning("SymmetricCipher::algorithmMode: invalid algorithm %d", algo);
+ return InvalidMode;
+ }
+}
+
+SymmetricCipher::Algorithm SymmetricCipher::algorithm() const
+{
+ return m_algo;
+}
diff --git a/src/crypto/SymmetricCipher.h b/src/crypto/SymmetricCipher.h
index 81e13f385..eab834956 100644
--- a/src/crypto/SymmetricCipher.h
+++ b/src/crypto/SymmetricCipher.h
@@ -24,6 +24,7 @@
#include "crypto/SymmetricCipherBackend.h"
#include "format/KeePass2.h"
+#include "core/Uuid.h"
class SymmetricCipher
{
@@ -32,7 +33,9 @@ public:
{
Aes256,
Twofish,
- Salsa20
+ Salsa20,
+ ChaCha20,
+ InvalidAlgorithm = -1
};
enum Mode
@@ -40,7 +43,8 @@ public:
Cbc,
Ctr,
Ecb,
- Stream
+ Stream,
+ InvalidMode = -1
};
enum Direction
@@ -49,22 +53,25 @@ public:
Encrypt
};
- SymmetricCipher(SymmetricCipher::Algorithm algo, SymmetricCipher::Mode mode,
- SymmetricCipher::Direction direction);
+ SymmetricCipher(Algorithm algo, Mode mode, Direction direction);
~SymmetricCipher();
+ Q_DISABLE_COPY(SymmetricCipher)
bool init(const QByteArray& key, const QByteArray& iv);
bool isInitalized() const;
- inline QByteArray process(const QByteArray& data, bool* ok) {
+ inline QByteArray process(const QByteArray& data, bool* ok)
+ {
return m_backend->process(data, ok);
}
- Q_REQUIRED_RESULT inline bool processInPlace(QByteArray& data) {
+ Q_REQUIRED_RESULT inline bool processInPlace(QByteArray& data)
+ {
return m_backend->processInPlace(data);
}
- Q_REQUIRED_RESULT inline bool processInPlace(QByteArray& data, quint64 rounds) {
+ Q_REQUIRED_RESULT inline bool processInPlace(QByteArray& data, quint64 rounds)
+ {
Q_ASSERT(rounds > 0);
return m_backend->processInPlace(data, rounds);
}
@@ -73,18 +80,19 @@ public:
int keySize() const;
int blockSize() const;
QString errorString() const;
+ Algorithm algorithm() const;
- static SymmetricCipher::Algorithm cipherToAlgorithm(Uuid cipher);
- static Uuid algorithmToCipher(SymmetricCipher::Algorithm algo);
+ static Algorithm cipherToAlgorithm(Uuid cipher);
+ static Uuid algorithmToCipher(Algorithm algo);
+ static int algorithmIvSize(Algorithm algo);
+ static Mode algorithmMode(Algorithm algo);
private:
- static SymmetricCipherBackend* createBackend(SymmetricCipher::Algorithm algo, SymmetricCipher::Mode mode,
- SymmetricCipher::Direction direction);
+ static SymmetricCipherBackend* createBackend(Algorithm algo, Mode mode, Direction direction);
const QScopedPointer m_backend;
bool m_initialized;
-
- Q_DISABLE_COPY(SymmetricCipher)
+ Algorithm m_algo;
};
#endif // KEEPASSX_SYMMETRICCIPHER_H
diff --git a/src/crypto/SymmetricCipherGcrypt.cpp b/src/crypto/SymmetricCipherGcrypt.cpp
index 0b291e693..b1abd5250 100644
--- a/src/crypto/SymmetricCipherGcrypt.cpp
+++ b/src/crypto/SymmetricCipherGcrypt.cpp
@@ -46,6 +46,9 @@ int SymmetricCipherGcrypt::gcryptAlgo(SymmetricCipher::Algorithm algo)
case SymmetricCipher::Salsa20:
return GCRY_CIPHER_SALSA20;
+ case SymmetricCipher::ChaCha20:
+ return GCRY_CIPHER_CHACHA20;
+
default:
Q_ASSERT(false);
return -1;
@@ -142,8 +145,7 @@ QByteArray SymmetricCipherGcrypt::process(const QByteArray& data, bool* ok)
if (m_direction == SymmetricCipher::Decrypt) {
error = gcry_cipher_decrypt(m_ctx, result.data(), data.size(), data.constData(), data.size());
- }
- else {
+ } else {
error = gcry_cipher_encrypt(m_ctx, result.data(), data.size(), data.constData(), data.size());
}
@@ -151,7 +153,7 @@ QByteArray SymmetricCipherGcrypt::process(const QByteArray& data, bool* ok)
setErrorString(error);
*ok = false;
} else {
- *ok = true;
+ *ok = true;
}
return result;
@@ -165,8 +167,7 @@ bool SymmetricCipherGcrypt::processInPlace(QByteArray& data)
if (m_direction == SymmetricCipher::Decrypt) {
error = gcry_cipher_decrypt(m_ctx, data.data(), data.size(), nullptr, 0);
- }
- else {
+ } else {
error = gcry_cipher_encrypt(m_ctx, data.data(), data.size(), nullptr, 0);
}
@@ -196,8 +197,7 @@ bool SymmetricCipherGcrypt::processInPlace(QByteArray& data, quint64 rounds)
return false;
}
}
- }
- else {
+ } else {
for (quint64 i = 0; i != rounds; ++i) {
error = gcry_cipher_encrypt(m_ctx, rawData, size, nullptr, 0);
diff --git a/src/crypto/SymmetricCipherGcrypt.h b/src/crypto/SymmetricCipherGcrypt.h
index 108bc14e4..2436c3be1 100644
--- a/src/crypto/SymmetricCipherGcrypt.h
+++ b/src/crypto/SymmetricCipherGcrypt.h
@@ -23,7 +23,7 @@
#include "crypto/SymmetricCipher.h"
#include "crypto/SymmetricCipherBackend.h"
-class SymmetricCipherGcrypt : public SymmetricCipherBackend
+class SymmetricCipherGcrypt: public SymmetricCipherBackend
{
public:
SymmetricCipherGcrypt(SymmetricCipher::Algorithm algo, SymmetricCipher::Mode mode,
diff --git a/src/crypto/SymmetricCipherSalsa20.cpp b/src/crypto/SymmetricCipherSalsa20.cpp
deleted file mode 100644
index 7e477656a..000000000
--- a/src/crypto/SymmetricCipherSalsa20.cpp
+++ /dev/null
@@ -1,112 +0,0 @@
-/*
-* Copyright (C) 2010 Felix Geyer
-*
-* This program is free software: you can redistribute it and/or modify
-* it under the terms of the GNU General Public License as published by
-* the Free Software Foundation, either version 2 or (at your option)
-* version 3 of the License.
-*
-* This program is distributed in the hope that it will be useful,
-* but WITHOUT ANY WARRANTY; without even the implied warranty of
-* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-* GNU General Public License for more details.
-*
-* You should have received a copy of the GNU General Public License
-* along with this program. If not, see .
-*/
-
-#include "SymmetricCipherSalsa20.h"
-
-SymmetricCipherSalsa20::SymmetricCipherSalsa20(SymmetricCipher::Algorithm algo, SymmetricCipher::Mode mode,
- SymmetricCipher::Direction direction)
-{
- Q_ASSERT(algo == SymmetricCipher::Salsa20);
- Q_UNUSED(algo);
-
- Q_ASSERT(mode == SymmetricCipher::Stream);
- Q_UNUSED(mode);
-
- Q_UNUSED(direction);
-}
-
-SymmetricCipherSalsa20::~SymmetricCipherSalsa20()
-{
-}
-
-bool SymmetricCipherSalsa20::init()
-{
- return true;
-}
-
-bool SymmetricCipherSalsa20::setKey(const QByteArray& key)
-{
- Q_ASSERT((key.size() == 16) || (key.size() == 32));
-
- m_key = key;
- ECRYPT_keysetup(&m_ctx, reinterpret_cast(m_key.constData()), m_key.size()*8, 64);
-
- return true;
-}
-
-bool SymmetricCipherSalsa20::setIv(const QByteArray& iv)
-{
- Q_ASSERT(iv.size() == 8);
-
- m_iv = iv;
- ECRYPT_ivsetup(&m_ctx, reinterpret_cast(m_iv.constData()));
-
- return true;
-}
-
-QByteArray SymmetricCipherSalsa20::process(const QByteArray& data, bool* ok)
-{
- Q_ASSERT((data.size() < blockSize()) || ((data.size() % blockSize()) == 0));
-
- QByteArray result;
- result.resize(data.size());
-
- ECRYPT_encrypt_bytes(&m_ctx, reinterpret_cast(data.constData()),
- reinterpret_cast(result.data()), data.size());
-
- *ok = true;
- return result;
-}
-
-bool SymmetricCipherSalsa20::processInPlace(QByteArray& data)
-{
- Q_ASSERT((data.size() < blockSize()) || ((data.size() % blockSize()) == 0));
-
- ECRYPT_encrypt_bytes(&m_ctx, reinterpret_cast(data.constData()),
- reinterpret_cast(data.data()), data.size());
-
- return true;
-}
-
-bool SymmetricCipherSalsa20::processInPlace(QByteArray& data, quint64 rounds)
-{
- Q_ASSERT((data.size() < blockSize()) || ((data.size() % blockSize()) == 0));
-
- for (quint64 i = 0; i != rounds; ++i) {
- ECRYPT_encrypt_bytes(&m_ctx, reinterpret_cast(data.constData()),
- reinterpret_cast(data.data()), data.size());
- }
-
- return true;
-}
-
-bool SymmetricCipherSalsa20::reset()
-{
- ECRYPT_ivsetup(&m_ctx, reinterpret_cast(m_iv.constData()));
-
- return true;
-}
-
-int SymmetricCipherSalsa20::blockSize() const
-{
- return 64;
-}
-
-QString SymmetricCipherSalsa20::errorString() const
-{
- return QString();
-}
diff --git a/src/crypto/SymmetricCipherSalsa20.h b/src/crypto/SymmetricCipherSalsa20.h
deleted file mode 100644
index 443d4ec8b..000000000
--- a/src/crypto/SymmetricCipherSalsa20.h
+++ /dev/null
@@ -1,53 +0,0 @@
-/*
-* Copyright (C) 2010 Felix Geyer
-*
-* This program is free software: you can redistribute it and/or modify
-* it under the terms of the GNU General Public License as published by
-* the Free Software Foundation, either version 2 or (at your option)
-* version 3 of the License.
-*
-* This program is distributed in the hope that it will be useful,
-* but WITHOUT ANY WARRANTY; without even the implied warranty of
-* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-* GNU General Public License for more details.
-*
-* You should have received a copy of the GNU General Public License
-* along with this program. If not, see .
-*/
-
-#ifndef KEEPASSX_SYMMETRICCIPHERSALSA20_H
-#define KEEPASSX_SYMMETRICCIPHERSALSA20_H
-
-#include "crypto/SymmetricCipher.h"
-#include "crypto/SymmetricCipherBackend.h"
-#include "crypto/salsa20/ecrypt-sync.h"
-
-class SymmetricCipherSalsa20 : public SymmetricCipherBackend
-{
-public:
- SymmetricCipherSalsa20(SymmetricCipher::Algorithm algo, SymmetricCipher::Mode mode,
- SymmetricCipher::Direction direction);
- ~SymmetricCipherSalsa20();
- bool init();
- void setAlgorithm(SymmetricCipher::Algorithm algo);
- void setMode(SymmetricCipher::Mode mode);
- void setDirection(SymmetricCipher::Direction direction);
- bool setKey(const QByteArray& key);
- bool setIv(const QByteArray& iv);
-
- QByteArray process(const QByteArray& data, bool* ok);
- bool processInPlace(QByteArray& data);
- bool processInPlace(QByteArray& data, quint64 rounds);
-
- bool reset();
- int blockSize() const;
-
- QString errorString() const;
-
-private:
- ECRYPT_ctx m_ctx;
- QByteArray m_key;
- QByteArray m_iv;
-};
-
-#endif // KEEPASSX_SYMMETRICCIPHERSALSA20_H
diff --git a/src/crypto/kdf/AesKdf.cpp b/src/crypto/kdf/AesKdf.cpp
new file mode 100644
index 000000000..593b01c24
--- /dev/null
+++ b/src/crypto/kdf/AesKdf.cpp
@@ -0,0 +1,128 @@
+/*
+ * Copyright (C) 2017 KeePassXC Team
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 2 or (at your option)
+ * version 3 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see .
+ */
+
+#include "AesKdf.h"
+
+#include
+
+#include "format/KeePass2.h"
+#include "crypto/CryptoHash.h"
+
+AesKdf::AesKdf()
+ : Kdf::Kdf(KeePass2::KDF_AES_KDBX4)
+{
+}
+
+/**
+ * @param legacyKdbx3 initialize as legacy KDBX3 KDF
+ */
+AesKdf::AesKdf(bool legacyKdbx3)
+ : Kdf::Kdf(legacyKdbx3 ? KeePass2::KDF_AES_KDBX3 : KeePass2::KDF_AES_KDBX4)
+{
+}
+
+bool AesKdf::processParameters(const QVariantMap &p)
+{
+ bool ok;
+ int rounds = p.value(KeePass2::KDFPARAM_AES_ROUNDS).toInt(&ok);
+ if (!ok || !setRounds(rounds)) {
+ return false;
+ }
+
+ QByteArray seed = p.value(KeePass2::KDFPARAM_AES_SEED).toByteArray();
+ return setSeed(seed);
+}
+
+QVariantMap AesKdf::writeParameters()
+{
+ QVariantMap p;
+
+ // always write old KDBX3 AES-KDF UUID for compatibility with other applications
+ p.insert(KeePass2::KDFPARAM_UUID, KeePass2::KDF_AES_KDBX3.toByteArray());
+
+ p.insert(KeePass2::KDFPARAM_AES_ROUNDS, static_cast(rounds()));
+ p.insert(KeePass2::KDFPARAM_AES_SEED, seed());
+ return p;
+}
+
+bool AesKdf::transform(const QByteArray& raw, QByteArray& result) const
+{
+ QByteArray resultLeft;
+ QByteArray resultRight;
+
+ QFuture future = QtConcurrent::run(transformKeyRaw, raw.left(16), m_seed, m_rounds, &resultLeft);
+
+ bool rightResult = transformKeyRaw(raw.right(16), m_seed, m_rounds, &resultRight);
+ bool leftResult = future.result();
+
+ if (!rightResult || !leftResult) {
+ return false;
+ }
+
+ QByteArray transformed;
+ transformed.append(resultLeft);
+ transformed.append(resultRight);
+
+ result = CryptoHash::hash(transformed, CryptoHash::Sha256);
+ return true;
+}
+
+bool AesKdf::transformKeyRaw(const QByteArray& key, const QByteArray& seed, int rounds, QByteArray* result)
+{
+ QByteArray iv(16, 0);
+ SymmetricCipher cipher(SymmetricCipher::Aes256, SymmetricCipher::Ecb,
+ SymmetricCipher::Encrypt);
+ if (!cipher.init(seed, iv)) {
+ qWarning("AesKdf::transformKeyRaw: error in SymmetricCipher::init: %s", cipher.errorString().toUtf8().data());
+ return false;
+ }
+
+ *result = key;
+
+ if (!cipher.processInPlace(*result, rounds)) {
+ qWarning("AesKdf::transformKeyRaw: error in SymmetricCipher::processInPlace: %s",
+ cipher.errorString().toUtf8().data());
+ return false;
+ }
+
+ return true;
+}
+
+QSharedPointer AesKdf::clone() const
+{
+ return QSharedPointer::create(*this);
+}
+
+int AesKdf::benchmarkImpl(int msec) const
+{
+ QByteArray key = QByteArray(16, '\x7E');
+ QByteArray seed = QByteArray(32, '\x4B');
+ QByteArray iv(16, 0);
+
+ SymmetricCipher cipher(SymmetricCipher::Aes256, SymmetricCipher::Ecb, SymmetricCipher::Encrypt);
+ cipher.init(seed, iv);
+
+ quint64 rounds = 1000000;
+ QElapsedTimer timer;
+ timer.start();
+
+ if (!cipher.processInPlace(key, rounds)) {
+ return -1;
+ }
+
+ return static_cast(rounds * (static_cast(msec) / timer.elapsed()));
+}
diff --git a/src/crypto/kdf/AesKdf.h b/src/crypto/kdf/AesKdf.h
new file mode 100644
index 000000000..31ee1fa70
--- /dev/null
+++ b/src/crypto/kdf/AesKdf.h
@@ -0,0 +1,44 @@
+/*
+ * Copyright (C) 2017 KeePassXC Team
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 2 or (at your option)
+ * version 3 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see .
+ */
+
+#ifndef KEEPASSX_AESKDF_H
+#define KEEPASSX_AESKDF_H
+
+#include "Kdf.h"
+
+class AesKdf: public Kdf
+{
+public:
+ AesKdf();
+ explicit AesKdf(bool legacyKdbx3);
+
+ bool processParameters(const QVariantMap& p) override;
+ QVariantMap writeParameters() override;
+ bool transform(const QByteArray& raw, QByteArray& result) const override;
+ QSharedPointer clone() const override;
+
+protected:
+ int benchmarkImpl(int msec) const override;
+
+private:
+ static bool transformKeyRaw(const QByteArray& key,
+ const QByteArray& seed,
+ int rounds,
+ QByteArray* result) Q_REQUIRED_RESULT;
+};
+
+#endif // KEEPASSX_AESKDF_H
diff --git a/src/crypto/kdf/Argon2Kdf.cpp b/src/crypto/kdf/Argon2Kdf.cpp
new file mode 100644
index 000000000..cd8474056
--- /dev/null
+++ b/src/crypto/kdf/Argon2Kdf.cpp
@@ -0,0 +1,198 @@
+/*
+ * Copyright (C) 2017 KeePassXC Team
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 2 or (at your option)
+ * version 3 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see .
+ */
+
+#include "Argon2Kdf.h"
+
+#include
+#include
+
+#include "format/KeePass2.h"
+
+/**
+ * KeePass' Argon2 implementation supports all parameters that are defined in the official specification,
+ * but only the number of iterations, the memory size and the degree of parallelism can be configured by
+ * the user in the database settings dialog. For the other parameters, KeePass chooses reasonable defaults:
+ * a 256-bit salt is generated each time the database is saved, the tag length is 256 bits, no secret key
+ * or associated data. KeePass uses the latest version of Argon2, v1.3.
+ */
+Argon2Kdf::Argon2Kdf()
+ : Kdf::Kdf(KeePass2::KDF_ARGON2)
+ , m_version(0x13)
+ , m_memory(1 << 16)
+ , m_parallelism(static_cast(QThread::idealThreadCount()))
+{
+ m_rounds = 1;
+}
+
+quint32 Argon2Kdf::version() const
+{
+ return m_version;
+}
+
+bool Argon2Kdf::setVersion(quint32 version)
+{
+ // MIN=0x10; MAX=0x13)
+ if (version >= 0x10 && version <= 0x13) {
+ m_version = version;
+ return true;
+ }
+ m_version = 0x13;
+ return false;
+}
+
+quint64 Argon2Kdf::memory() const
+{
+ return m_memory;
+}
+
+bool Argon2Kdf::setMemory(quint64 kibibytes)
+{
+ // MIN=8KB; MAX=2,147,483,648KB
+ if (kibibytes >= 8 && kibibytes < (1ULL << 32)) {
+ m_memory = kibibytes;
+ return true;
+ }
+ m_memory = 16;
+ return false;
+}
+
+quint32 Argon2Kdf::parallelism() const
+{
+ return m_parallelism;
+}
+
+bool Argon2Kdf::setParallelism(quint32 threads)
+{
+ // MIN=1; MAX=16,777,215
+ if (threads >= 1 && threads < (1 << 24)) {
+ m_parallelism = threads;
+ return true;
+ }
+ m_parallelism = 1;
+ return false;
+}
+
+bool Argon2Kdf::processParameters(const QVariantMap &p)
+{
+ QByteArray salt = p.value(KeePass2::KDFPARAM_ARGON2_SALT).toByteArray();
+ if (!setSeed(salt)) {
+ return false;
+ }
+
+ bool ok;
+ quint32 version = p.value(KeePass2::KDFPARAM_ARGON2_VERSION).toUInt(&ok);
+ if (!ok || !setVersion(version)) {
+ return false;
+ }
+
+ quint32 lanes = p.value(KeePass2::KDFPARAM_ARGON2_PARALLELISM).toUInt(&ok);
+ if (!ok || !setParallelism(lanes)) {
+ return false;
+ }
+
+ quint64 memory = p.value(KeePass2::KDFPARAM_ARGON2_MEMORY).toULongLong(&ok) / 1024ULL;
+ if (!ok || !setMemory(memory)) {
+ return false;
+ }
+
+ quint64 iterations = p.value(KeePass2::KDFPARAM_ARGON2_ITERATIONS).toULongLong(&ok);
+ if (!ok || !setRounds(iterations)) {
+ return false;
+ }
+
+ /* KeePass2 does not currently implement these parameters
+ *
+ QByteArray secret = p.value(KeePass2::KDFPARAM_ARGON2_SECRET).toByteArray();
+ if (!argon2Kdf->setSecret(secret)) {
+ return nullptr;
+ }
+
+ QByteArray ad = p.value(KeePass2::KDFPARAM_ARGON2_ASSOCDATA).toByteArray();
+ if (!argon2Kdf->setAssocData(ad)) {
+ return nullptr;
+ }
+ */
+
+ return true;
+}
+
+QVariantMap Argon2Kdf::writeParameters()
+{
+ QVariantMap p;
+ p.insert(KeePass2::KDFPARAM_UUID, KeePass2::KDF_ARGON2.toByteArray());
+ p.insert(KeePass2::KDFPARAM_ARGON2_VERSION, version());
+ p.insert(KeePass2::KDFPARAM_ARGON2_PARALLELISM, parallelism());
+ p.insert(KeePass2::KDFPARAM_ARGON2_MEMORY, memory() * 1024);
+ p.insert(KeePass2::KDFPARAM_ARGON2_ITERATIONS, static_cast(rounds()));
+ p.insert(KeePass2::KDFPARAM_ARGON2_SALT, seed());
+
+ /* KeePass2 does not currently implement these
+ *
+ if (!assocData().isEmpty()) {
+ p.insert(KeePass2::KDFPARAM_ARGON2_ASSOCDATA, argon2Kdf.assocData());
+ }
+
+ if (!secret().isEmpty()) {
+ p.insert(KeePass2::KDFPARAM_ARGON2_SECRET, argon2Kdf.secret());
+ }
+ */
+
+ return p;
+}
+
+bool Argon2Kdf::transform(const QByteArray& raw, QByteArray& result) const
+{
+ result.clear();
+ result.resize(32);
+ return transformKeyRaw(raw, seed(), version(), rounds(), memory(), parallelism(), result);
+}
+
+bool Argon2Kdf::transformKeyRaw(const QByteArray& key, const QByteArray& seed, quint32 version,
+ quint32 rounds, quint64 memory, quint32 parallelism, QByteArray& result)
+{
+ // Time Cost, Mem Cost, Threads/Lanes, Password, length, Salt, length, out, length
+ int rc = argon2_hash(rounds, memory, parallelism, key.data(), key.size(),
+ seed.data(), seed.size(), result.data(), result.size(),
+ nullptr, 0, Argon2_d, version);
+ if (rc != ARGON2_OK) {
+ qWarning("Argon2 error: %s", argon2_error_message(rc));
+ return false;
+ }
+
+ return true;
+}
+
+QSharedPointer Argon2Kdf::clone() const
+{
+ return QSharedPointer::create(*this);
+}
+
+int Argon2Kdf::benchmarkImpl(int msec) const
+{
+ QByteArray key = QByteArray(16, '\x7E');
+ QByteArray seed = QByteArray(32, '\x4B');
+
+ QElapsedTimer timer;
+ timer.start();
+
+ int rounds = 4;
+ if (transformKeyRaw(key, seed, version(), rounds, memory(), parallelism(), key)) {
+ return static_cast(rounds * (static_cast(msec) / timer.elapsed()));
+ }
+
+ return 1;
+}
diff --git a/src/crypto/kdf/Argon2Kdf.h b/src/crypto/kdf/Argon2Kdf.h
new file mode 100644
index 000000000..fe62b2953
--- /dev/null
+++ b/src/crypto/kdf/Argon2Kdf.h
@@ -0,0 +1,56 @@
+/*
+ * Copyright (C) 2017 KeePassXC Team
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 2 or (at your option)
+ * version 3 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see .
+ */
+
+#ifndef KEEPASSX_ARGON2KDF_H
+#define KEEPASSX_ARGON2KDF_H
+
+#include "Kdf.h"
+
+class Argon2Kdf : public Kdf {
+public:
+ Argon2Kdf();
+
+ bool processParameters(const QVariantMap& p) override;
+ QVariantMap writeParameters() override;
+ bool transform(const QByteArray& raw, QByteArray& result) const override;
+ QSharedPointer clone() const override;
+
+ quint32 version() const;
+ bool setVersion(quint32 version);
+ quint64 memory() const;
+ bool setMemory(quint64 kibibytes);
+ quint32 parallelism() const;
+ bool setParallelism(quint32 threads);
+
+protected:
+ int benchmarkImpl(int msec) const override;
+
+ quint32 m_version;
+ quint64 m_memory;
+ quint32 m_parallelism;
+
+private:
+ static bool transformKeyRaw(const QByteArray& key,
+ const QByteArray& seed,
+ quint32 version,
+ quint32 rounds,
+ quint64 memory,
+ quint32 parallelism,
+ QByteArray& result) Q_REQUIRED_RESULT;
+};
+
+#endif // KEEPASSX_ARGON2KDF_H
diff --git a/src/crypto/kdf/Kdf.cpp b/src/crypto/kdf/Kdf.cpp
new file mode 100644
index 000000000..e500dbe6f
--- /dev/null
+++ b/src/crypto/kdf/Kdf.cpp
@@ -0,0 +1,100 @@
+/*
+ * Copyright (C) 2017 KeePassXC Team
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 2 or (at your option)
+ * version 3 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see .
+ */
+
+#include "Kdf.h"
+#include "Kdf_p.h"
+
+#include
+
+#include "crypto/Random.h"
+
+Kdf::Kdf(Uuid uuid)
+ : m_rounds(KDF_DEFAULT_ROUNDS)
+ , m_seed(QByteArray(KDF_DEFAULT_SEED_SIZE, 0))
+ , m_uuid(uuid)
+{
+}
+
+Uuid Kdf::uuid() const
+{
+ return m_uuid;
+}
+
+int Kdf::rounds() const
+{
+ return m_rounds;
+}
+
+QByteArray Kdf::seed() const
+{
+ return m_seed;
+}
+
+bool Kdf::setRounds(int rounds)
+{
+ if (rounds >= 1 && rounds < INT_MAX) {
+ m_rounds = rounds;
+ return true;
+ }
+ m_rounds = 1;
+ return false;
+}
+
+bool Kdf::setSeed(const QByteArray& seed)
+{
+ if (seed.size() != m_seed.size()) {
+ return false;
+ }
+
+ m_seed = seed;
+ return true;
+}
+
+void Kdf::randomizeSeed()
+{
+ setSeed(randomGen()->randomArray(m_seed.size()));
+}
+
+int Kdf::benchmark(int msec) const
+{
+ BenchmarkThread thread1(msec, this);
+ BenchmarkThread thread2(msec, this);
+
+ thread1.start();
+ thread2.start();
+
+ thread1.wait();
+ thread2.wait();
+
+ return qMax(1, qMin(thread1.rounds(), thread2.rounds()));
+}
+
+Kdf::BenchmarkThread::BenchmarkThread(int msec, const Kdf* kdf)
+ : m_msec(msec)
+ , m_kdf(kdf)
+{
+}
+
+int Kdf::BenchmarkThread::rounds()
+{
+ return m_rounds;
+}
+
+void Kdf::BenchmarkThread::run()
+{
+ m_rounds = m_kdf->benchmarkImpl(m_msec);
+}
diff --git a/src/crypto/kdf/Kdf.h b/src/crypto/kdf/Kdf.h
new file mode 100644
index 000000000..216224a6f
--- /dev/null
+++ b/src/crypto/kdf/Kdf.h
@@ -0,0 +1,61 @@
+/*
+ * Copyright (C) 2017 KeePassXC Team
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 2 or (at your option)
+ * version 3 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see .
+ */
+
+#ifndef KEEPASSX_KDF_H
+#define KEEPASSX_KDF_H
+
+#include
+
+#include "core/Uuid.h"
+
+#define KDF_DEFAULT_SEED_SIZE 32
+#define KDF_DEFAULT_ROUNDS 1000000ull
+
+class Kdf
+{
+public:
+ explicit Kdf(Uuid uuid);
+ virtual ~Kdf() = default;
+
+ Uuid uuid() const;
+
+ int rounds() const;
+ virtual bool setRounds(int rounds);
+ QByteArray seed() const;
+ virtual bool setSeed(const QByteArray& seed);
+ virtual void randomizeSeed();
+
+ virtual bool processParameters(const QVariantMap& p) = 0;
+ virtual QVariantMap writeParameters() = 0;
+ virtual bool transform(const QByteArray& raw, QByteArray& result) const = 0;
+ virtual QSharedPointer clone() const = 0;
+
+ int benchmark(int msec) const;
+
+protected:
+ virtual int benchmarkImpl(int msec) const = 0;
+
+ int m_rounds;
+ QByteArray m_seed;
+
+private:
+ class BenchmarkThread;
+ const Uuid m_uuid;
+
+};
+
+#endif // KEEPASSX_KDF_H
diff --git a/src/crypto/kdf/Kdf_p.h b/src/crypto/kdf/Kdf_p.h
new file mode 100644
index 000000000..5606c0bf5
--- /dev/null
+++ b/src/crypto/kdf/Kdf_p.h
@@ -0,0 +1,43 @@
+/*
+ * Copyright (C) 2017 KeePassXC Team
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 2 or (at your option)
+ * version 3 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see .
+ */
+
+#include "Kdf.h"
+
+#include
+
+#ifndef KEEPASSXC_KDF_P_H
+#define KEEPASSXC_KDF_P_H
+
+class Kdf::BenchmarkThread: public QThread
+{
+Q_OBJECT
+
+public:
+ explicit BenchmarkThread(int msec, const Kdf* kdf);
+
+ int rounds();
+
+protected:
+ void run();
+
+private:
+ int m_rounds;
+ int m_msec;
+ const Kdf* m_kdf;
+};
+
+#endif // KEEPASSXC_KDF_P_H
diff --git a/src/format/Kdbx3Reader.cpp b/src/format/Kdbx3Reader.cpp
new file mode 100644
index 000000000..638f84063
--- /dev/null
+++ b/src/format/Kdbx3Reader.cpp
@@ -0,0 +1,218 @@
+/*
+ * Copyright (C) 2017 KeePassXC Team
+ * Copyright (C) 2010 Felix Geyer
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 2 or (at your option)
+ * version 3 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see .
+ */
+
+#include "Kdbx3Reader.h"
+
+#include "core/Group.h"
+#include "core/Endian.h"
+#include "crypto/CryptoHash.h"
+#include "format/KeePass2RandomStream.h"
+#include "format/KdbxXmlReader.h"
+#include "streams/HashedBlockStream.h"
+#include "streams/QtIOCompressor"
+#include "streams/SymmetricCipherStream.h"
+
+#include
+
+Database* Kdbx3Reader::readDatabaseImpl(QIODevice* device, const QByteArray& headerData,
+ const CompositeKey& key, bool keepDatabase)
+{
+ Q_ASSERT(m_kdbxVersion <= KeePass2::FILE_VERSION_3);
+
+ if (hasError()) {
+ return nullptr;
+ }
+
+ // check if all required headers were present
+ if (m_masterSeed.isEmpty() || m_encryptionIV.isEmpty()
+ || m_streamStartBytes.isEmpty() || m_protectedStreamKey.isEmpty()
+ || m_db->cipher().isNull()) {
+ raiseError("missing database headers");
+ return nullptr;
+ }
+
+ if (!m_db->setKey(key, false)) {
+ raiseError(tr("Unable to calculate master key"));
+ return nullptr;
+ }
+
+ if (!m_db->challengeMasterSeed(m_masterSeed)) {
+ raiseError(tr("Unable to issue challenge-response."));
+ return nullptr;
+ }
+
+ CryptoHash hash(CryptoHash::Sha256);
+ hash.addData(m_masterSeed);
+ hash.addData(m_db->challengeResponseKey());
+ hash.addData(m_db->transformedMasterKey());
+ QByteArray finalKey = hash.result();
+
+ SymmetricCipher::Algorithm cipher = SymmetricCipher::cipherToAlgorithm(m_db->cipher());
+ SymmetricCipherStream cipherStream(device, cipher,
+ SymmetricCipher::algorithmMode(cipher), SymmetricCipher::Decrypt);
+ if (!cipherStream.init(finalKey, m_encryptionIV)) {
+ raiseError(cipherStream.errorString());
+ return nullptr;
+ }
+ if (!cipherStream.open(QIODevice::ReadOnly)) {
+ raiseError(cipherStream.errorString());
+ return nullptr;
+ }
+
+ QByteArray realStart = cipherStream.read(32);
+
+ if (realStart != m_streamStartBytes) {
+ raiseError(tr("Wrong key or database file is corrupt."));
+ return nullptr;
+ }
+
+ HashedBlockStream hashedStream(&cipherStream);
+ if (!hashedStream.open(QIODevice::ReadOnly)) {
+ raiseError(hashedStream.errorString());
+ return nullptr;
+ }
+
+ QIODevice* xmlDevice = nullptr;
+ QScopedPointer ioCompressor;
+
+ if (m_db->compressionAlgo() == Database::CompressionNone) {
+ xmlDevice = &hashedStream;
+ } else {
+ ioCompressor.reset(new QtIOCompressor(&hashedStream));
+ ioCompressor->setStreamFormat(QtIOCompressor::GzipFormat);
+ if (!ioCompressor->open(QIODevice::ReadOnly)) {
+ raiseError(ioCompressor->errorString());
+ return nullptr;
+ }
+ xmlDevice = ioCompressor.data();
+ }
+
+ KeePass2RandomStream randomStream(KeePass2::ProtectedStreamAlgo::Salsa20);
+ if (!randomStream.init(m_protectedStreamKey)) {
+ raiseError(randomStream.errorString());
+ return nullptr;
+ }
+
+ QBuffer buffer;
+ if (saveXml()) {
+ m_xmlData = xmlDevice->readAll();
+ buffer.setBuffer(&m_xmlData);
+ buffer.open(QIODevice::ReadOnly);
+ xmlDevice = &buffer;
+ }
+
+ Q_ASSERT(xmlDevice);
+
+ KdbxXmlReader xmlReader(KeePass2::FILE_VERSION_3);
+ xmlReader.readDatabase(xmlDevice, m_db.data(), &randomStream);
+
+ if (xmlReader.hasError()) {
+ raiseError(xmlReader.errorString());
+ if (keepDatabase) {
+ return m_db.take();
+ }
+ return nullptr;
+ }
+
+ Q_ASSERT(!xmlReader.headerHash().isEmpty() || m_kdbxVersion < KeePass2::FILE_VERSION_3);
+
+ if (!xmlReader.headerHash().isEmpty()) {
+ QByteArray headerHash = CryptoHash::hash(headerData, CryptoHash::Sha256);
+ if (headerHash != xmlReader.headerHash()) {
+ raiseError("Header doesn't match hash");
+ return nullptr;
+ }
+ }
+
+ return m_db.take();
+}
+
+bool Kdbx3Reader::readHeaderField(StoreDataStream& headerStream)
+{
+ QByteArray fieldIDArray = headerStream.read(1);
+ if (fieldIDArray.size() != 1) {
+ raiseError("Invalid header id size");
+ return false;
+ }
+ char fieldID = fieldIDArray.at(0);
+
+ bool ok;
+ auto fieldLen = Endian::readSizedInt(&headerStream, KeePass2::BYTEORDER, &ok);
+ if (!ok) {
+ raiseError("Invalid header field length");
+ return false;
+ }
+
+ QByteArray fieldData;
+ if (fieldLen != 0) {
+ fieldData = headerStream.read(fieldLen);
+ if (fieldData.size() != fieldLen) {
+ raiseError("Invalid header data length");
+ return false;
+ }
+ }
+
+ bool headerEnd = false;
+ switch (static_cast(fieldID)) {
+ case KeePass2::HeaderFieldID::EndOfHeader:
+ headerEnd = true;
+ break;
+
+ case KeePass2::HeaderFieldID::CipherID:
+ setCipher(fieldData);
+ break;
+
+ case KeePass2::HeaderFieldID::CompressionFlags:
+ setCompressionFlags(fieldData);
+ break;
+
+ case KeePass2::HeaderFieldID::MasterSeed:
+ setMasterSeed(fieldData);
+ break;
+
+ case KeePass2::HeaderFieldID::TransformSeed:
+ setTransformSeed(fieldData);
+ break;
+
+ case KeePass2::HeaderFieldID::TransformRounds:
+ setTransformRounds(fieldData);
+ break;
+
+ case KeePass2::HeaderFieldID::EncryptionIV:
+ setEncryptionIV(fieldData);
+ break;
+
+ case KeePass2::HeaderFieldID::ProtectedStreamKey:
+ setProtectedStreamKey(fieldData);
+ break;
+
+ case KeePass2::HeaderFieldID::StreamStartBytes:
+ setStreamStartBytes(fieldData);
+ break;
+
+ case KeePass2::HeaderFieldID::InnerRandomStreamID:
+ setInnerRandomStreamID(fieldData);
+ break;
+
+ default:
+ qWarning("Unknown header field read: id=%d", fieldID);
+ break;
+ }
+
+ return !headerEnd;
+}
diff --git a/src/format/Kdbx3Reader.h b/src/format/Kdbx3Reader.h
new file mode 100644
index 000000000..bd6a794d1
--- /dev/null
+++ b/src/format/Kdbx3Reader.h
@@ -0,0 +1,37 @@
+/*
+ * Copyright (C) 2017 KeePassXC Team
+ * Copyright (C) 2010 Felix Geyer
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 2 or (at your option)
+ * version 3 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see .
+ */
+
+#ifndef KEEPASSX_KDBX3READER_H
+#define KEEPASSX_KDBX3READER_H
+
+#include "format/KdbxReader.h"
+
+/**
+ * KDBX 2/3 reader implementation.
+ */
+class Kdbx3Reader: public KdbxReader
+{
+public:
+ Database* readDatabaseImpl(QIODevice* device, const QByteArray& headerData,
+ const CompositeKey& key, bool keepDatabase) override;
+
+protected:
+ bool readHeaderField(StoreDataStream& headerStream) override;
+};
+
+#endif // KEEPASSX_KDBX3READER_H
diff --git a/src/format/Kdbx3Writer.cpp b/src/format/Kdbx3Writer.cpp
new file mode 100644
index 000000000..b0b44c6b2
--- /dev/null
+++ b/src/format/Kdbx3Writer.cpp
@@ -0,0 +1,157 @@
+/*
+ * Copyright (C) 2017 KeePassXC Team
+ * Copyright (C) 2010 Felix Geyer
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 2 or (at your option)
+ * version 3 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see .
+ */
+
+#include "Kdbx3Writer.h"
+
+#include
+
+#include "core/Database.h"
+#include "crypto/CryptoHash.h"
+#include "crypto/Random.h"
+#include "format/KeePass2.h"
+#include "format/KeePass2RandomStream.h"
+#include "format/KdbxXmlWriter.h"
+#include "streams/HashedBlockStream.h"
+#include "streams/QtIOCompressor"
+#include "streams/SymmetricCipherStream.h"
+
+bool Kdbx3Writer::writeDatabase(QIODevice* device, Database* db)
+{
+ m_error = false;
+ m_errorStr.clear();
+
+ QByteArray masterSeed = randomGen()->randomArray(32);
+ QByteArray encryptionIV = randomGen()->randomArray(16);
+ QByteArray protectedStreamKey = randomGen()->randomArray(32);
+ QByteArray startBytes = randomGen()->randomArray(32);
+ QByteArray endOfHeader = "\r\n\r\n";
+
+ if (!db->challengeMasterSeed(masterSeed)) {
+ raiseError(tr("Unable to issue challenge-response."));
+ return false;
+ }
+
+ if (!db->setKey(db->key(), false, true)) {
+ raiseError(tr("Unable to calculate master key"));
+ return false;
+ }
+
+ // generate transformed master key
+ CryptoHash hash(CryptoHash::Sha256);
+ hash.addData(masterSeed);
+ hash.addData(db->challengeResponseKey());
+ Q_ASSERT(!db->transformedMasterKey().isEmpty());
+ hash.addData(db->transformedMasterKey());
+ QByteArray finalKey = hash.result();
+
+ // write header
+ QBuffer header;
+ header.open(QIODevice::WriteOnly);
+
+ writeMagicNumbers(&header, KeePass2::SIGNATURE_1, KeePass2::SIGNATURE_2, KeePass2::FILE_VERSION_3);
+
+ CHECK_RETURN_FALSE(writeHeaderField(&header, KeePass2::HeaderFieldID::CipherID, db->cipher().toByteArray()));
+ CHECK_RETURN_FALSE(writeHeaderField(&header, KeePass2::HeaderFieldID::CompressionFlags,
+ Endian::sizedIntToBytes(db->compressionAlgo(),
+ KeePass2::BYTEORDER)));
+ auto kdf = db->kdf();
+ CHECK_RETURN_FALSE(writeHeaderField(&header, KeePass2::HeaderFieldID::MasterSeed, masterSeed));
+ CHECK_RETURN_FALSE(writeHeaderField(&header, KeePass2::HeaderFieldID::TransformSeed, kdf->seed()));
+ CHECK_RETURN_FALSE(writeHeaderField(&header, KeePass2::HeaderFieldID::TransformRounds,
+ Endian::sizedIntToBytes(kdf->rounds(),
+ KeePass2::BYTEORDER)));
+ CHECK_RETURN_FALSE(writeHeaderField(&header, KeePass2::HeaderFieldID::EncryptionIV, encryptionIV));
+ CHECK_RETURN_FALSE(writeHeaderField(&header, KeePass2::HeaderFieldID::ProtectedStreamKey, protectedStreamKey));
+ CHECK_RETURN_FALSE(writeHeaderField(&header, KeePass2::HeaderFieldID::StreamStartBytes, startBytes));
+ CHECK_RETURN_FALSE(writeHeaderField(&header, KeePass2::HeaderFieldID::InnerRandomStreamID,
+ Endian::sizedIntToBytes(static_cast(
+ KeePass2::ProtectedStreamAlgo::Salsa20),
+ KeePass2::BYTEORDER)));
+ CHECK_RETURN_FALSE(writeHeaderField(&header, KeePass2::HeaderFieldID::EndOfHeader, endOfHeader));
+ header.close();
+
+ // write header data
+ CHECK_RETURN_FALSE(writeData(device, header.data()));
+
+ // hash header
+ const QByteArray headerHash = CryptoHash::hash(header.data(), CryptoHash::Sha256);
+
+ // write cipher stream
+ SymmetricCipher::Algorithm algo = SymmetricCipher::cipherToAlgorithm(db->cipher());
+ SymmetricCipherStream cipherStream(device, algo,
+ SymmetricCipher::algorithmMode(algo), SymmetricCipher::Encrypt);
+ cipherStream.init(finalKey, encryptionIV);
+ if (!cipherStream.open(QIODevice::WriteOnly)) {
+ raiseError(cipherStream.errorString());
+ return false;
+ }
+ CHECK_RETURN_FALSE(writeData(&cipherStream, startBytes));
+
+ HashedBlockStream hashedStream(&cipherStream);
+ if (!hashedStream.open(QIODevice::WriteOnly)) {
+ raiseError(hashedStream.errorString());
+ return false;
+ }
+
+ QIODevice* outputDevice = nullptr;
+ QScopedPointer ioCompressor;
+
+ if (db->compressionAlgo() == Database::CompressionNone) {
+ outputDevice = &hashedStream;
+ } else {
+ ioCompressor.reset(new QtIOCompressor(&hashedStream));
+ ioCompressor->setStreamFormat(QtIOCompressor::GzipFormat);
+ if (!ioCompressor->open(QIODevice::WriteOnly)) {
+ raiseError(ioCompressor->errorString());
+ return false;
+ }
+ outputDevice = ioCompressor.data();
+ }
+
+ Q_ASSERT(outputDevice);
+
+ KeePass2RandomStream randomStream(KeePass2::ProtectedStreamAlgo::Salsa20);
+ if (!randomStream.init(protectedStreamKey)) {
+ raiseError(randomStream.errorString());
+ return false;
+ }
+
+ KdbxXmlWriter xmlWriter(KeePass2::FILE_VERSION_3);
+ xmlWriter.writeDatabase(outputDevice, db, &randomStream, headerHash);
+
+ // Explicitly close/reset streams so they are flushed and we can detect
+ // errors. QIODevice::close() resets errorString() etc.
+ if (ioCompressor) {
+ ioCompressor->close();
+ }
+ if (!hashedStream.reset()) {
+ raiseError(hashedStream.errorString());
+ return false;
+ }
+ if (!cipherStream.reset()) {
+ raiseError(cipherStream.errorString());
+ return false;
+ }
+
+ if (xmlWriter.hasError()) {
+ raiseError(xmlWriter.errorString());
+ return false;
+ }
+
+ return true;
+}
diff --git a/src/core/ToDbExporter.h b/src/format/Kdbx3Writer.h
similarity index 66%
rename from src/core/ToDbExporter.h
rename to src/format/Kdbx3Writer.h
index 58c5efeb3..88c4d16a4 100644
--- a/src/core/ToDbExporter.h
+++ b/src/format/Kdbx3Writer.h
@@ -1,6 +1,5 @@
/*
- * Copyright (C) 2014 Felix Geyer
- * Copyright (C) 2014 Florian Geyer
+ * Copyright (C) 2018 KeePassXC Team
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
@@ -16,18 +15,18 @@
* along with this program. If not, see .
*/
-#ifndef KEEPASSX_TODBEXPORTER_H
-#define KEEPASSX_TODBEXPORTER_H
+#ifndef KEEPASSX_KDBX3WRITER_H
+#define KEEPASSX_KDBX3WRITER_H
-#include "core/Exporter.h"
+#include "KdbxWriter.h"
-class Database;
-class Group;
-
-class ToDbExporter : Exporter
+/**
+ * KDBX2/3 writer implementation.
+ */
+class Kdbx3Writer: public KdbxWriter
{
public:
- Database* exportGroup(Group* group);
+ bool writeDatabase(QIODevice* device, Database* db) override;
};
-#endif // KEEPASSX_TODBEXPORTER_H
+#endif // KEEPASSX_KDBX3WRITER_H
diff --git a/src/format/KeePass2XmlWriter.h b/src/format/Kdbx3XmlWriter.h
similarity index 93%
rename from src/format/KeePass2XmlWriter.h
rename to src/format/Kdbx3XmlWriter.h
index 23e148dbb..6eaf32f35 100644
--- a/src/format/KeePass2XmlWriter.h
+++ b/src/format/Kdbx3XmlWriter.h
@@ -1,4 +1,5 @@
/*
+ * Copyright (C) 2017 KeePassXC Team
* Copyright (C) 2010 Felix Geyer
*
* This program is free software: you can redistribute it and/or modify
@@ -15,8 +16,8 @@
* along with this program. If not, see .
*/
-#ifndef KEEPASSX_KEEPASS2XMLWRITER_H
-#define KEEPASSX_KEEPASS2XMLWRITER_H
+#ifndef KEEPASSX_KDBX3XMLWRITER_H
+#define KEEPASSX_KDBX3XMLWRITER_H
#include
#include
@@ -32,10 +33,10 @@
class KeePass2RandomStream;
class Metadata;
-class KeePass2XmlWriter
+class Kdbx3XmlWriter
{
public:
- KeePass2XmlWriter();
+ Kdbx3XmlWriter();
void writeDatabase(QIODevice* device, Database* db, KeePass2RandomStream* randomStream = nullptr,
const QByteArray& headerHash = QByteArray());
void writeDatabase(const QString& filename, Database* db);
@@ -87,4 +88,4 @@ private:
QString m_errorStr;
};
-#endif // KEEPASSX_KEEPASS2XMLWRITER_H
+#endif // KEEPASSX_KDBX3XMLWRITER_H
diff --git a/src/format/Kdbx4Reader.cpp b/src/format/Kdbx4Reader.cpp
new file mode 100644
index 000000000..38063acf1
--- /dev/null
+++ b/src/format/Kdbx4Reader.cpp
@@ -0,0 +1,411 @@
+/*
+ * Copyright (C) 2017 KeePassXC Team
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 2 or (at your option)
+ * version 3 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see .
+ */
+
+#include "Kdbx4Reader.h"
+
+#include
+
+#include "core/Group.h"
+#include "core/Endian.h"
+#include "crypto/CryptoHash.h"
+#include "crypto/kdf/AesKdf.h"
+#include "format/KeePass2RandomStream.h"
+#include "format/KdbxXmlReader.h"
+#include "streams/HmacBlockStream.h"
+#include "streams/QtIOCompressor"
+#include "streams/SymmetricCipherStream.h"
+
+Database* Kdbx4Reader::readDatabaseImpl(QIODevice* device, const QByteArray& headerData,
+ const CompositeKey& key, bool keepDatabase)
+{
+ Q_ASSERT(m_kdbxVersion == KeePass2::FILE_VERSION_4);
+
+ m_binaryPool.clear();
+
+ if (hasError()) {
+ return nullptr;
+ }
+
+ // check if all required headers were present
+ if (m_masterSeed.isEmpty()
+ || m_encryptionIV.isEmpty()
+ || m_db->cipher().isNull()) {
+ raiseError(tr("missing database headers"));
+ return nullptr;
+ }
+
+ if (!m_db->setKey(key, false, false)) {
+ raiseError(tr("Unable to calculate master key"));
+ return nullptr;
+ }
+
+ CryptoHash hash(CryptoHash::Sha256);
+ hash.addData(m_masterSeed);
+ hash.addData(m_db->transformedMasterKey());
+ QByteArray finalKey = hash.result();
+
+ QByteArray headerSha256 = device->read(32);
+ QByteArray headerHmac = device->read(32);
+ if (headerSha256.size() != 32 || headerHmac.size() != 32) {
+ raiseError(tr("Invalid header checksum size"));
+ return nullptr;
+ }
+ if (headerSha256 != CryptoHash::hash(headerData, CryptoHash::Sha256)) {
+ raiseError(tr("Header SHA256 mismatch"));
+ return nullptr;
+ }
+
+ QByteArray hmacKey = KeePass2::hmacKey(m_masterSeed, m_db->transformedMasterKey());
+ if (headerHmac != CryptoHash::hmac(headerData,
+ HmacBlockStream::getHmacKey(UINT64_MAX, hmacKey), CryptoHash::Sha256)) {
+ raiseError(tr("Wrong key or database file is corrupt. (HMAC mismatch)"));
+ return nullptr;
+ }
+ HmacBlockStream hmacStream(device, hmacKey);
+ if (!hmacStream.open(QIODevice::ReadOnly)) {
+ raiseError(hmacStream.errorString());
+ return nullptr;
+ }
+
+ SymmetricCipher::Algorithm cipher = SymmetricCipher::cipherToAlgorithm(m_db->cipher());
+ if (cipher == SymmetricCipher::InvalidAlgorithm) {
+ raiseError(tr("Unknown cipher"));
+ return nullptr;
+ }
+ SymmetricCipherStream cipherStream(&hmacStream, cipher,
+ SymmetricCipher::algorithmMode(cipher), SymmetricCipher::Decrypt);
+ if (!cipherStream.init(finalKey, m_encryptionIV)) {
+ raiseError(cipherStream.errorString());
+ return nullptr;
+ }
+ if (!cipherStream.open(QIODevice::ReadOnly)) {
+ raiseError(cipherStream.errorString());
+ return nullptr;
+ }
+
+ QIODevice* xmlDevice = nullptr;
+ QScopedPointer ioCompressor;
+
+ if (m_db->compressionAlgo() == Database::CompressionNone) {
+ xmlDevice = &cipherStream;
+ } else {
+ ioCompressor.reset(new QtIOCompressor(&cipherStream));
+ ioCompressor->setStreamFormat(QtIOCompressor::GzipFormat);
+ if (!ioCompressor->open(QIODevice::ReadOnly)) {
+ raiseError(ioCompressor->errorString());
+ return nullptr;
+ }
+ xmlDevice = ioCompressor.data();
+ }
+
+ while (readInnerHeaderField(xmlDevice) && !hasError()) {
+ }
+
+ if (hasError()) {
+ return nullptr;
+ }
+
+ KeePass2RandomStream randomStream(m_irsAlgo);
+ if (!randomStream.init(m_protectedStreamKey)) {
+ raiseError(randomStream.errorString());
+ return nullptr;
+ }
+
+ QBuffer buffer;
+ if (saveXml()) {
+ m_xmlData = xmlDevice->readAll();
+ buffer.setBuffer(&m_xmlData);
+ buffer.open(QIODevice::ReadOnly);
+ xmlDevice = &buffer;
+ }
+
+ Q_ASSERT(xmlDevice);
+
+ KdbxXmlReader xmlReader(KeePass2::FILE_VERSION_4, m_binaryPool);
+ xmlReader.readDatabase(xmlDevice, m_db.data(), &randomStream);
+
+ if (xmlReader.hasError()) {
+ raiseError(xmlReader.errorString());
+ if (keepDatabase) {
+ return m_db.take();
+ }
+ return nullptr;
+ }
+
+ return m_db.take();
+}
+
+bool Kdbx4Reader::readHeaderField(StoreDataStream& device)
+{
+ QByteArray fieldIDArray = device.read(1);
+ if (fieldIDArray.size() != 1) {
+ raiseError(tr("Invalid header id size"));
+ return false;
+ }
+ char fieldID = fieldIDArray.at(0);
+
+ bool ok;
+ auto fieldLen = Endian::readSizedInt(&device, KeePass2::BYTEORDER, &ok);
+ if (!ok) {
+ raiseError(tr("Invalid header field length"));
+ return false;
+ }
+
+ QByteArray fieldData;
+ if (fieldLen != 0) {
+ fieldData = device.read(fieldLen);
+ if (static_cast(fieldData.size()) != fieldLen) {
+ raiseError(tr("Invalid header data length"));
+ return false;
+ }
+ }
+
+ switch (static_cast(fieldID)) {
+ case KeePass2::HeaderFieldID::EndOfHeader:
+ return false;
+
+ case KeePass2::HeaderFieldID::CipherID:
+ setCipher(fieldData);
+ break;
+
+ case KeePass2::HeaderFieldID::CompressionFlags:
+ setCompressionFlags(fieldData);
+ break;
+
+ case KeePass2::HeaderFieldID::MasterSeed:
+ setMasterSeed(fieldData);
+ break;
+
+ case KeePass2::HeaderFieldID::EncryptionIV:
+ setEncryptionIV(fieldData);
+ break;
+
+ case KeePass2::HeaderFieldID::KdfParameters: {
+ QBuffer bufIoDevice(&fieldData);
+ if (!bufIoDevice.open(QIODevice::ReadOnly)) {
+ raiseError(tr("Failed to open buffer for KDF parameters in header"));
+ return false;
+ }
+ QVariantMap kdfParams = readVariantMap(&bufIoDevice);
+ QSharedPointer kdf = KeePass2::kdfFromParameters(kdfParams);
+ if (!kdf) {
+ raiseError(tr("Unsupported key derivation function (KDF) or invalid parameters"));
+ return false;
+ }
+ m_db->setKdf(kdf);
+ break;
+ }
+
+ case KeePass2::HeaderFieldID::PublicCustomData:
+ m_db->setPublicCustomData(fieldData);
+ break;
+
+ case KeePass2::HeaderFieldID::ProtectedStreamKey:
+ case KeePass2::HeaderFieldID::TransformRounds:
+ case KeePass2::HeaderFieldID::TransformSeed:
+ case KeePass2::HeaderFieldID::StreamStartBytes:
+ case KeePass2::HeaderFieldID::InnerRandomStreamID:
+ raiseError(tr("Legacy header fields found in KDBX4 file."));
+ return false;
+
+ default:
+ qWarning("Unknown header field read: id=%d", fieldID);
+ break;
+ }
+
+ return true;
+}
+
+/**
+ * Helper method for reading KDBX4 inner header fields.
+ *
+ * @param device input device
+ * @return true if there are more inner header fields
+ */
+bool Kdbx4Reader::readInnerHeaderField(QIODevice* device)
+{
+ QByteArray fieldIDArray = device->read(1);
+ if (fieldIDArray.size() != 1) {
+ raiseError(tr("Invalid inner header id size"));
+ return false;
+ }
+ auto fieldID = static_cast(fieldIDArray.at(0));
+
+ bool ok;
+ auto fieldLen = Endian::readSizedInt(device, KeePass2::BYTEORDER, &ok);
+ if (!ok) {
+ raiseError(tr("Invalid inner header field length"));
+ return false;
+ }
+
+ QByteArray fieldData;
+ if (fieldLen != 0) {
+ fieldData = device->read(fieldLen);
+ if (static_cast(fieldData.size()) != fieldLen) {
+ raiseError(tr("Invalid header data length"));
+ return false;
+ }
+ }
+
+ switch (fieldID) {
+ case KeePass2::InnerHeaderFieldID::End:
+ return false;
+
+ case KeePass2::InnerHeaderFieldID::InnerRandomStreamID:
+ setInnerRandomStreamID(fieldData);
+ break;
+
+ case KeePass2::InnerHeaderFieldID::InnerRandomStreamKey:
+ setProtectedStreamKey(fieldData);
+ break;
+
+ case KeePass2::InnerHeaderFieldID::Binary:
+ if (fieldLen < 1) {
+ raiseError(tr("Invalid inner header binary size"));
+ return false;
+ }
+ m_binaryPool.insert(QString::number(m_binaryPool.size()), fieldData.mid(1));
+ break;
+ }
+
+ return true;
+}
+
+/**
+ * Helper method for reading KDF parameters into variant map.
+ *
+ * @param device input device
+ * @return filled variant map
+ */
+QVariantMap Kdbx4Reader::readVariantMap(QIODevice* device)
+{
+ bool ok;
+ quint16 version = Endian::readSizedInt(device, KeePass2::BYTEORDER, &ok)
+ & KeePass2::VARIANTMAP_CRITICAL_MASK;
+ quint16 maxVersion = KeePass2::VARIANTMAP_VERSION & KeePass2::VARIANTMAP_CRITICAL_MASK;
+ if (!ok || (version > maxVersion)) {
+ raiseError(tr("Unsupported KeePass variant map version."));
+ return {};
+ }
+
+ QVariantMap vm;
+ QByteArray fieldTypeArray;
+ KeePass2::VariantMapFieldType fieldType = KeePass2::VariantMapFieldType::End;
+ while (((fieldTypeArray = device->read(1)).size() == 1)
+ && ((fieldType = static_cast(fieldTypeArray.at(0)))
+ != KeePass2::VariantMapFieldType::End)) {
+ auto nameLen = Endian::readSizedInt(device, KeePass2::BYTEORDER, &ok);
+ if (!ok) {
+ raiseError(tr("Invalid variant map entry name length"));
+ return {};
+ }
+ QByteArray nameBytes;
+ if (nameLen != 0) {
+ nameBytes = device->read(nameLen);
+ if (static_cast(nameBytes.size()) != nameLen) {
+ raiseError(tr("Invalid variant map entry name data"));
+ return {};
+ }
+ }
+ QString name = QString::fromUtf8(nameBytes);
+
+ auto valueLen = Endian::readSizedInt(device, KeePass2::BYTEORDER, &ok);
+ if (!ok) {
+ raiseError(tr("Invalid variant map entry value length"));
+ return {};
+ }
+ QByteArray valueBytes;
+ if (valueLen != 0) {
+ valueBytes = device->read(valueLen);
+ if (static_cast(valueBytes.size()) != valueLen) {
+ raiseError(tr("Invalid variant map entry value data"));
+ return {};
+ }
+ }
+
+ switch (fieldType) {
+ case KeePass2::VariantMapFieldType::Bool:
+ if (valueLen == 1) {
+ vm.insert(name, QVariant(valueBytes.at(0) != 0));
+ } else {
+ raiseError(tr("Invalid variant map Bool entry value length"));
+ return {};
+ }
+ break;
+
+ case KeePass2::VariantMapFieldType::Int32:
+ if (valueLen == 4) {
+ vm.insert(name, QVariant(Endian::bytesToSizedInt(valueBytes, KeePass2::BYTEORDER)));
+ } else {
+ raiseError(tr("Invalid variant map Int32 entry value length"));
+ return {};
+ }
+ break;
+
+ case KeePass2::VariantMapFieldType::UInt32:
+ if (valueLen == 4) {
+ vm.insert(name, QVariant(Endian::bytesToSizedInt(valueBytes, KeePass2::BYTEORDER)));
+ } else {
+ raiseError(tr("Invalid variant map UInt32 entry value length"));
+ return {};
+ }
+ break;
+
+ case KeePass2::VariantMapFieldType::Int64:
+ if (valueLen == 8) {
+ vm.insert(name, QVariant(Endian::bytesToSizedInt(valueBytes, KeePass2::BYTEORDER)));
+ } else {
+ raiseError(tr("Invalid variant map Int64 entry value length"));
+ return {};
+ }
+ break;
+
+ case KeePass2::VariantMapFieldType::UInt64:
+ if (valueLen == 8) {
+ vm.insert(name, QVariant(Endian::bytesToSizedInt(valueBytes, KeePass2::BYTEORDER)));
+ } else {
+ raiseError(tr("Invalid variant map UInt64 entry value length"));
+ return {};
+ }
+ break;
+
+ case KeePass2::VariantMapFieldType::String:
+ vm.insert(name, QVariant(QString::fromUtf8(valueBytes)));
+ break;
+
+ case KeePass2::VariantMapFieldType::ByteArray:
+ vm.insert(name, QVariant(valueBytes));
+ break;
+
+ default:
+ raiseError(tr("Invalid variant map entry type"));
+ return {};
+ }
+ }
+
+ if (fieldTypeArray.size() != 1) {
+ raiseError(tr("Invalid variant map field type size"));
+ return {};
+ }
+
+ return vm;
+}
+
+QHash Kdbx4Reader::binaryPool() const
+{
+ return m_binaryPool;
+}
diff --git a/src/format/Kdbx4Reader.h b/src/format/Kdbx4Reader.h
new file mode 100644
index 000000000..175af9419
--- /dev/null
+++ b/src/format/Kdbx4Reader.h
@@ -0,0 +1,45 @@
+/*
+ * Copyright (C) 2017 KeePassXC Team
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 2 or (at your option)
+ * version 3 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see .
+ */
+
+#ifndef KEEPASSX_KDBX4READER_H
+#define KEEPASSX_KDBX4READER_H
+
+#include "format/KdbxReader.h"
+
+#include
+
+/**
+ * KDBX4 reader implementation.
+ */
+class Kdbx4Reader : public KdbxReader
+{
+public:
+ Database* readDatabaseImpl(QIODevice* device, const QByteArray& headerData,
+ const CompositeKey& key, bool keepDatabase) override;
+ QHash binaryPool() const;
+
+protected:
+ bool readHeaderField(StoreDataStream& headerStream) override;
+
+private:
+ bool readInnerHeaderField(QIODevice* device);
+ QVariantMap readVariantMap(QIODevice* device);
+
+ QHash m_binaryPool;
+};
+
+#endif // KEEPASSX_KDBX4READER_H
diff --git a/src/format/Kdbx4Writer.cpp b/src/format/Kdbx4Writer.cpp
new file mode 100644
index 000000000..70bfa2d5b
--- /dev/null
+++ b/src/format/Kdbx4Writer.cpp
@@ -0,0 +1,300 @@
+/*
+ * Copyright (C) 2017 KeePassXC Team
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 2 or (at your option)
+ * version 3 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see .
+ */
+
+#include "Kdbx4Writer.h"
+
+#include
+#include
+
+#include "streams/HmacBlockStream.h"
+#include "core/Database.h"
+#include "crypto/CryptoHash.h"
+#include "crypto/Random.h"
+#include "format/KeePass2RandomStream.h"
+#include "format/KdbxXmlWriter.h"
+#include "streams/QtIOCompressor"
+#include "streams/SymmetricCipherStream.h"
+
+bool Kdbx4Writer::writeDatabase(QIODevice* device, Database* db)
+{
+ m_error = false;
+ m_errorStr.clear();
+
+ SymmetricCipher::Algorithm algo = SymmetricCipher::cipherToAlgorithm(db->cipher());
+ if (algo == SymmetricCipher::InvalidAlgorithm) {
+ raiseError(tr("Invalid symmetric cipher algorithm."));
+ return false;
+ }
+ int ivSize = SymmetricCipher::algorithmIvSize(algo);
+ if (ivSize < 0) {
+ raiseError(tr("Invalid symmetric cipher IV size."));
+ return false;
+ }
+
+ QByteArray masterSeed = randomGen()->randomArray(32);
+ QByteArray encryptionIV = randomGen()->randomArray(ivSize);
+ QByteArray protectedStreamKey = randomGen()->randomArray(64);
+ QByteArray startBytes;
+ QByteArray endOfHeader = "\r\n\r\n";
+
+ if (!db->setKey(db->key(), false, true)) {
+ raiseError(tr("Unable to calculate master key"));
+ return false;
+ }
+
+ // generate transformed master key
+ CryptoHash hash(CryptoHash::Sha256);
+ hash.addData(masterSeed);
+ Q_ASSERT(!db->transformedMasterKey().isEmpty());
+ hash.addData(db->transformedMasterKey());
+ QByteArray finalKey = hash.result();
+
+ // write header
+ QByteArray headerData;
+ {
+ QBuffer header;
+ header.open(QIODevice::WriteOnly);
+
+ writeMagicNumbers(&header, KeePass2::SIGNATURE_1, KeePass2::SIGNATURE_2, KeePass2::FILE_VERSION_4);
+
+ CHECK_RETURN_FALSE(writeHeaderField(&header, KeePass2::HeaderFieldID::CipherID, db->cipher().toByteArray()));
+ CHECK_RETURN_FALSE(writeHeaderField(&header, KeePass2::HeaderFieldID::CompressionFlags,
+ Endian::sizedIntToBytes(static_cast(db->compressionAlgo()),
+ KeePass2::BYTEORDER)));
+ CHECK_RETURN_FALSE(writeHeaderField(&header, KeePass2::HeaderFieldID::MasterSeed, masterSeed));
+ CHECK_RETURN_FALSE(writeHeaderField(&header, KeePass2::HeaderFieldID::EncryptionIV, encryptionIV));
+
+ // convert current Kdf to basic parameters
+ QVariantMap kdfParams = KeePass2::kdfToParameters(db->kdf());
+ QByteArray kdfParamBytes;
+ if (!serializeVariantMap(kdfParams, kdfParamBytes)) {
+ raiseError(tr("Failed to serialize KDF parameters variant map"));
+ return false;
+ }
+ QByteArray publicCustomData = db->publicCustomData();
+ CHECK_RETURN_FALSE(writeHeaderField(&header, KeePass2::HeaderFieldID::KdfParameters, kdfParamBytes));
+ if (!publicCustomData.isEmpty()) {
+ CHECK_RETURN_FALSE(writeHeaderField(&header, KeePass2::HeaderFieldID::PublicCustomData, publicCustomData));
+ }
+
+ CHECK_RETURN_FALSE(writeHeaderField(&header, KeePass2::HeaderFieldID::EndOfHeader, endOfHeader));
+ header.close();
+ headerData = header.data();
+ }
+ CHECK_RETURN_FALSE(writeData(device, headerData));
+
+ // hash header
+ QByteArray headerHash = CryptoHash::hash(headerData, CryptoHash::Sha256);
+
+ // write HMAC-authenticated cipher stream
+ QByteArray hmacKey = KeePass2::hmacKey(masterSeed, db->transformedMasterKey());
+ QByteArray headerHmac = CryptoHash::hmac(headerData, HmacBlockStream::getHmacKey(UINT64_MAX, hmacKey),
+ CryptoHash::Sha256);
+ CHECK_RETURN_FALSE(writeData(device, headerHash));
+ CHECK_RETURN_FALSE(writeData(device, headerHmac));
+
+ QScopedPointer hmacBlockStream;
+ QScopedPointer cipherStream;
+
+ hmacBlockStream.reset(new HmacBlockStream(device, hmacKey));
+ if (!hmacBlockStream->open(QIODevice::WriteOnly)) {
+ raiseError(hmacBlockStream->errorString());
+ return false;
+ }
+
+ cipherStream.reset(new SymmetricCipherStream(hmacBlockStream.data(), algo,
+ SymmetricCipher::algorithmMode(algo),
+ SymmetricCipher::Encrypt));
+
+ if (!cipherStream->init(finalKey, encryptionIV)) {
+ raiseError(cipherStream->errorString());
+ return false;
+ }
+ if (!cipherStream->open(QIODevice::WriteOnly)) {
+ raiseError(cipherStream->errorString());
+ return false;
+ }
+
+ QIODevice* outputDevice = nullptr;
+ QScopedPointer ioCompressor;
+
+ if (db->compressionAlgo() == Database::CompressionNone) {
+ outputDevice = cipherStream.data();
+ } else {
+ ioCompressor.reset(new QtIOCompressor(cipherStream.data()));
+ ioCompressor->setStreamFormat(QtIOCompressor::GzipFormat);
+ if (!ioCompressor->open(QIODevice::WriteOnly)) {
+ raiseError(ioCompressor->errorString());
+ return false;
+ }
+ outputDevice = ioCompressor.data();
+ }
+
+ Q_ASSERT(outputDevice);
+
+ CHECK_RETURN_FALSE(writeInnerHeaderField(outputDevice, KeePass2::InnerHeaderFieldID::InnerRandomStreamID,
+ Endian::sizedIntToBytes(static_cast(KeePass2::ProtectedStreamAlgo::ChaCha20),
+ KeePass2::BYTEORDER)));
+ CHECK_RETURN_FALSE(writeInnerHeaderField(outputDevice, KeePass2::InnerHeaderFieldID::InnerRandomStreamKey,
+ protectedStreamKey));
+
+ CHECK_RETURN_FALSE(writeInnerHeaderField(outputDevice, KeePass2::InnerHeaderFieldID::End, QByteArray()));
+
+ KeePass2RandomStream randomStream(KeePass2::ProtectedStreamAlgo::ChaCha20);
+ if (!randomStream.init(protectedStreamKey)) {
+ raiseError(randomStream.errorString());
+ return false;
+ }
+
+ KdbxXmlWriter xmlWriter(KeePass2::FILE_VERSION_4);
+ xmlWriter.writeDatabase(outputDevice, db, &randomStream, headerHash);
+
+ // Explicitly close/reset streams so they are flushed and we can detect
+ // errors. QIODevice::close() resets errorString() etc.
+ if (ioCompressor) {
+ ioCompressor->close();
+ }
+ if (!cipherStream->reset()) {
+ raiseError(cipherStream->errorString());
+ return false;
+ }
+ if (!hmacBlockStream->reset()) {
+ raiseError(hmacBlockStream->errorString());
+ return false;
+ }
+
+ if (xmlWriter.hasError()) {
+ raiseError(xmlWriter.errorString());
+ return false;
+ }
+
+ return true;
+}
+
+/**
+ * Write KDBX4 inner header field.
+ *
+ * @param device output device
+ * @param fieldId field identifier
+ * @param data header payload
+ * @return true on success
+ */
+bool Kdbx4Writer::writeInnerHeaderField(QIODevice* device, KeePass2::InnerHeaderFieldID fieldId, const QByteArray& data)
+{
+ QByteArray fieldIdArr;
+ fieldIdArr[0] = static_cast(fieldId);
+ CHECK_RETURN_FALSE(writeData(device, fieldIdArr));
+ CHECK_RETURN_FALSE(writeData(device, Endian::sizedIntToBytes(static_cast(data.size()), KeePass2::BYTEORDER)));
+ CHECK_RETURN_FALSE(writeData(device, data));
+
+ return true;
+}
+
+/**
+ * Write binary header field..
+ *
+ * @param device output device
+ * @param fieldId field identifier
+ * @param data header payload
+ * @return true on success
+ */
+bool Kdbx4Writer::writeBinary(QIODevice* device, const QByteArray& data)
+{
+ QByteArray fieldIdArr;
+ fieldIdArr[0] = static_cast(KeePass2::InnerHeaderFieldID::Binary);
+ CHECK_RETURN_FALSE(writeData(device, fieldIdArr));
+ CHECK_RETURN_FALSE(writeData(device, Endian::sizedIntToBytes(static_cast(data.size() + 1), KeePass2::BYTEORDER)));
+ CHECK_RETURN_FALSE(writeData(device, QByteArray(1, '\1')));
+ CHECK_RETURN_FALSE(writeData(device, data));
+
+ return true;
+}
+
+/**
+ * Serialize KDF parameter variant map to byte array.
+ *
+ * @param map input variant map
+ * @param outputBytes output byte array
+ * @return true on success
+ */
+bool Kdbx4Writer::serializeVariantMap(const QVariantMap& map, QByteArray& outputBytes)
+{
+ QBuffer buf(&outputBytes);
+ buf.open(QIODevice::WriteOnly);
+ CHECK_RETURN_FALSE(buf.write(Endian::sizedIntToBytes(KeePass2::VARIANTMAP_VERSION, KeePass2::BYTEORDER)) == 2);
+
+ bool ok;
+ QList keys = map.keys();
+ for (const auto& k : keys) {
+ KeePass2::VariantMapFieldType fieldType;
+ QByteArray data;
+ QVariant v = map.value(k);
+ switch (static_cast(v.type())) {
+ case QMetaType::Type::Int:
+ fieldType = KeePass2::VariantMapFieldType::Int32;
+ data = Endian::sizedIntToBytes(v.toInt(&ok), KeePass2::BYTEORDER);
+ CHECK_RETURN_FALSE(ok);
+ break;
+ case QMetaType::Type::UInt:
+ fieldType = KeePass2::VariantMapFieldType::UInt32;
+ data = Endian::sizedIntToBytes(v.toUInt(&ok), KeePass2::BYTEORDER);
+ CHECK_RETURN_FALSE(ok);
+ break;
+ case QMetaType::Type::LongLong:
+ fieldType = KeePass2::VariantMapFieldType::Int64;
+ data = Endian::sizedIntToBytes(v.toLongLong(&ok), KeePass2::BYTEORDER);
+ CHECK_RETURN_FALSE(ok);
+ break;
+ case QMetaType::Type::ULongLong:
+ fieldType = KeePass2::VariantMapFieldType::UInt64;
+ data = Endian::sizedIntToBytes(v.toULongLong(&ok), KeePass2::BYTEORDER);
+ CHECK_RETURN_FALSE(ok);
+ break;
+ case QMetaType::Type::QString:
+ fieldType = KeePass2::VariantMapFieldType::String;
+ data = v.toString().toUtf8();
+ break;
+ case QMetaType::Type::Bool:
+ fieldType = KeePass2::VariantMapFieldType::Bool;
+ data = QByteArray(1, static_cast(v.toBool() ? '\1' : '\0'));
+ break;
+ case QMetaType::Type::QByteArray:
+ fieldType = KeePass2::VariantMapFieldType::ByteArray;
+ data = v.toByteArray();
+ break;
+ default:
+ qWarning("Unknown object type %d in QVariantMap", v.type());
+ return false;
+ }
+ QByteArray typeBytes;
+ typeBytes[0] = static_cast(fieldType);
+ QByteArray nameBytes = k.toUtf8();
+ QByteArray nameLenBytes = Endian::sizedIntToBytes(nameBytes.size(), KeePass2::BYTEORDER);
+ QByteArray dataLenBytes = Endian::sizedIntToBytes(data.size(), KeePass2::BYTEORDER);
+
+ CHECK_RETURN_FALSE(buf.write(typeBytes) == 1);
+ CHECK_RETURN_FALSE(buf.write(nameLenBytes) == 4);
+ CHECK_RETURN_FALSE(buf.write(nameBytes) == nameBytes.size());
+ CHECK_RETURN_FALSE(buf.write(dataLenBytes) == 4);
+ CHECK_RETURN_FALSE(buf.write(data) == data.size());
+ }
+
+ QByteArray endBytes;
+ endBytes[0] = static_cast(KeePass2::VariantMapFieldType::End);
+ CHECK_RETURN_FALSE(buf.write(endBytes) == 1);
+ return true;
+}
diff --git a/src/format/Kdbx4Writer.h b/src/format/Kdbx4Writer.h
new file mode 100644
index 000000000..097a7864a
--- /dev/null
+++ b/src/format/Kdbx4Writer.h
@@ -0,0 +1,37 @@
+/*
+ * Copyright (C) 2017 KeePassXC Team
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 2 or (at your option)
+ * version 3 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see .
+ */
+
+#ifndef KEEPASSX_KDBX4WRITER_H
+#define KEEPASSX_KDBX4WRITER_H
+
+#include "KdbxWriter.h"
+
+/**
+ * KDBX4 writer implementation.
+ */
+class Kdbx4Writer : public KdbxWriter
+{
+public:
+ bool writeDatabase(QIODevice* device, Database* db) override;
+
+private:
+ bool writeInnerHeaderField(QIODevice* device, KeePass2::InnerHeaderFieldID fieldId, const QByteArray& data);
+ bool writeBinary(QIODevice* device, const QByteArray& data);
+ static bool serializeVariantMap(const QVariantMap& map, QByteArray& outputBytes);
+};
+
+#endif // KEEPASSX_KDBX4WRITER_H
diff --git a/src/format/KdbxReader.cpp b/src/format/KdbxReader.cpp
new file mode 100644
index 000000000..36ff6d197
--- /dev/null
+++ b/src/format/KdbxReader.cpp
@@ -0,0 +1,267 @@
+/*
+ * Copyright (C) 2018 KeePassXC Team
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 2 or (at your option)
+ * version 3 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see .
+ */
+
+#include "KdbxReader.h"
+#include "core/Database.h"
+#include "core/Endian.h"
+
+/**
+ * Read KDBX magic header numbers from a device.
+ *
+ * @param device input device
+ * @param sig1 KDBX signature 1
+ * @param sig2 KDBX signature 2
+ * @param version KDBX version
+ * @return true if magic numbers were read successfully
+ */
+bool KdbxReader::readMagicNumbers(QIODevice* device, quint32& sig1, quint32& sig2, quint32& version)
+{
+ bool ok;
+ sig1 = Endian::readSizedInt(device, KeePass2::BYTEORDER, &ok);
+ if (!ok) {
+ return false;
+ }
+
+ sig2 = Endian::readSizedInt(device, KeePass2::BYTEORDER, &ok);
+ if (!ok) {
+ return false;
+ }
+
+ version = Endian::readSizedInt(device, KeePass2::BYTEORDER, &ok);
+
+ return ok;
+}
+
+/**
+ * Read KDBX stream from device.
+ * The device will automatically be reset to 0 before reading.
+ *
+ * @param device input device
+ * @param key database encryption composite key
+ * @param keepDatabase keep database in case of read failure
+ * @return pointer to the read database, nullptr on failure
+ */
+Database* KdbxReader::readDatabase(QIODevice* device, const CompositeKey& key, bool keepDatabase)
+{
+ device->seek(0);
+
+ m_db.reset(new Database());
+ m_xmlData.clear();
+ m_masterSeed.clear();
+ m_encryptionIV.clear();
+ m_streamStartBytes.clear();
+ m_protectedStreamKey.clear();
+
+ StoreDataStream headerStream(device);
+ headerStream.open(QIODevice::ReadOnly);
+
+ // read KDBX magic numbers
+ quint32 sig1, sig2;
+ readMagicNumbers(&headerStream, sig1, sig2, m_kdbxVersion);
+ m_kdbxSignature = qMakePair(sig1, sig2);
+
+ // mask out minor version
+ m_kdbxVersion &= KeePass2::FILE_VERSION_CRITICAL_MASK;
+
+ // read header fields
+ while (readHeaderField(headerStream) && !hasError()) {
+ }
+
+ headerStream.close();
+
+ if (hasError()) {
+ return nullptr;
+ }
+
+ // read payload
+ return readDatabaseImpl(device, headerStream.storedData(), key, keepDatabase);
+}
+
+bool KdbxReader::hasError() const
+{
+ return m_error;
+}
+
+QString KdbxReader::errorString() const
+{
+ return m_errorStr;
+}
+
+bool KdbxReader::saveXml() const
+{
+ return m_saveXml;
+}
+
+void KdbxReader::setSaveXml(bool save)
+{
+ m_saveXml = save;
+}
+
+QByteArray KdbxReader::xmlData() const
+{
+ return m_xmlData;
+}
+
+QByteArray KdbxReader::streamKey() const
+{
+ return m_protectedStreamKey;
+}
+
+KeePass2::ProtectedStreamAlgo KdbxReader::protectedStreamAlgo() const
+{
+ return m_irsAlgo;
+}
+
+/**
+ * @param data stream cipher UUID as bytes
+ */
+void KdbxReader::setCipher(const QByteArray& data)
+{
+ if (data.size() != Uuid::Length) {
+ raiseError(tr("Invalid cipher uuid length"));
+ return;
+ }
+
+ Uuid uuid(data);
+
+ if (SymmetricCipher::cipherToAlgorithm(uuid) == SymmetricCipher::InvalidAlgorithm) {
+ raiseError(tr("Unsupported cipher"));
+ return;
+ }
+ m_db->setCipher(uuid);
+}
+
+/**
+ * @param data compression flags as bytes
+ */
+void KdbxReader::setCompressionFlags(const QByteArray& data)
+{
+ if (data.size() != 4) {
+ raiseError(tr("Invalid compression flags length"));
+ return;
+ }
+ auto id = Endian::bytesToSizedInt(data, KeePass2::BYTEORDER);
+
+ if (id > Database::CompressionAlgorithmMax) {
+ raiseError(tr("Unsupported compression algorithm"));
+ return;
+ }
+ m_db->setCompressionAlgo(static_cast(id));
+}
+
+/**
+ * @param data master seed as bytes
+ */
+void KdbxReader::setMasterSeed(const QByteArray& data)
+{
+ if (data.size() != 32) {
+ raiseError(tr("Invalid master seed size"));
+ return;
+ }
+ m_masterSeed = data;
+}
+
+/**
+ * @param data KDF seed as bytes
+ */
+void KdbxReader::setTransformSeed(const QByteArray& data)
+{
+ if (data.size() != 32) {
+ raiseError(tr("Invalid transform seed size"));
+ return;
+ }
+
+ auto kdf = m_db->kdf();
+ if (!kdf.isNull()) {
+ kdf->setSeed(data);
+ }
+}
+
+/**
+ * @param data KDF transform rounds as bytes
+ */
+void KdbxReader::setTransformRounds(const QByteArray& data)
+{
+ if (data.size() != 8) {
+ raiseError(tr("Invalid transform rounds size"));
+ return;
+ }
+
+ auto rounds = Endian::bytesToSizedInt(data, KeePass2::BYTEORDER);
+ auto kdf = m_db->kdf();
+ if (!kdf.isNull()) {
+ kdf->setRounds(static_cast(rounds));
+ }
+}
+
+/**
+ * @param data cipher stream IV as bytes
+ */
+void KdbxReader::setEncryptionIV(const QByteArray& data)
+{
+ m_encryptionIV = data;
+}
+
+/**
+ * @param data key for random (inner) stream as bytes
+ */
+void KdbxReader::setProtectedStreamKey(const QByteArray& data)
+{
+ m_protectedStreamKey = data;
+}
+
+/**
+ * @param data start bytes for cipher stream
+ */
+void KdbxReader::setStreamStartBytes(const QByteArray& data)
+{
+ if (data.size() != 32) {
+ raiseError(tr("Invalid start bytes size"));
+ return;
+ }
+ m_streamStartBytes = data;
+}
+
+/**
+ * @param data id of inner cipher stream algorithm
+ */
+void KdbxReader::setInnerRandomStreamID(const QByteArray& data)
+{
+ if (data.size() != 4) {
+ raiseError(tr("Invalid random stream id size"));
+ return;
+ }
+ auto id = Endian::bytesToSizedInt(data, KeePass2::BYTEORDER);
+ KeePass2::ProtectedStreamAlgo irsAlgo = KeePass2::idToProtectedStreamAlgo(id);
+ if (irsAlgo == KeePass2::ProtectedStreamAlgo::InvalidProtectedStreamAlgo ||
+ irsAlgo == KeePass2::ProtectedStreamAlgo::ArcFourVariant) {
+ raiseError(tr("Invalid inner random stream cipher"));
+ return;
+ }
+ m_irsAlgo = irsAlgo;
+}
+
+/**
+ * Raise an error. Use in case of an unexpected read error.
+ *
+ * @param errorMessage error message
+ */
+void KdbxReader::raiseError(const QString& errorMessage)
+{
+ m_error = true;
+ m_errorStr = errorMessage;
+}
diff --git a/src/format/KdbxReader.h b/src/format/KdbxReader.h
new file mode 100644
index 000000000..994cfb7ef
--- /dev/null
+++ b/src/format/KdbxReader.h
@@ -0,0 +1,107 @@
+/*
+ * Copyright (C) 2018 KeePassXC Team
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 2 or (at your option)
+ * version 3 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see .
+ */
+
+#ifndef KEEPASSXC_KDBXREADER_H
+#define KEEPASSXC_KDBXREADER_H
+
+#include "KeePass2.h"
+#include "keys/CompositeKey.h"
+#include "streams/StoreDataStream.h"
+
+#include
+#include
+
+class Database;
+class QIODevice;
+
+/**
+ * Abstract KDBX reader base class.
+ */
+class KdbxReader
+{
+Q_DECLARE_TR_FUNCTIONS(KdbxReader)
+
+public:
+ KdbxReader() = default;
+ virtual ~KdbxReader() = default;
+
+ static bool readMagicNumbers(QIODevice* device, quint32& sig1, quint32& sig2, quint32& version);
+ Database* readDatabase(QIODevice* device, const CompositeKey& key, bool keepDatabase = false);
+
+ bool hasError() const;
+ QString errorString() const;
+
+ bool saveXml() const;
+ void setSaveXml(bool save);
+ QByteArray xmlData() const;
+ QByteArray streamKey() const;
+ KeePass2::ProtectedStreamAlgo protectedStreamAlgo() const;
+
+protected:
+ /**
+ * Concrete reader implementation for reading database from device.
+ *
+ * @param device input device at the payload starting position
+ * @param KDBX header data as bytes
+ * @param key database encryption composite key
+ * @param keepDatabase keep database in case of read failure
+ * @return pointer to the read database, nullptr on failure
+ */
+ virtual Database* readDatabaseImpl(QIODevice* device, const QByteArray& headerData,
+ const CompositeKey& key, bool keepDatabase) = 0;
+
+ /**
+ * Read next header field from stream.
+ *
+ * @param headerStream input header stream
+ * @return true if there are more header fields
+ */
+ virtual bool readHeaderField(StoreDataStream& headerStream) = 0;
+
+ virtual void setCipher(const QByteArray& data);
+ virtual void setCompressionFlags(const QByteArray& data);
+ virtual void setMasterSeed(const QByteArray& data);
+ virtual void setTransformSeed(const QByteArray& data);
+ virtual void setTransformRounds(const QByteArray& data);
+ virtual void setEncryptionIV(const QByteArray& data);
+ virtual void setProtectedStreamKey(const QByteArray& data);
+ virtual void setStreamStartBytes(const QByteArray& data);
+ virtual void setInnerRandomStreamID(const QByteArray& data);
+
+ void raiseError(const QString& errorMessage);
+
+ QScopedPointer m_db;
+
+ QPair m_kdbxSignature;
+ quint32 m_kdbxVersion = 0;
+
+ QByteArray m_masterSeed;
+ QByteArray m_encryptionIV;
+ QByteArray m_streamStartBytes;
+ QByteArray m_protectedStreamKey;
+ KeePass2::ProtectedStreamAlgo m_irsAlgo = KeePass2::ProtectedStreamAlgo::InvalidProtectedStreamAlgo;
+
+ QByteArray m_xmlData;
+
+private:
+ bool m_saveXml = false;
+ bool m_error = false;
+ QString m_errorStr = "";
+};
+
+
+#endif //KEEPASSXC_KDBXREADER_H
diff --git a/src/format/KdbxWriter.cpp b/src/format/KdbxWriter.cpp
new file mode 100644
index 000000000..6016cf3a6
--- /dev/null
+++ b/src/format/KdbxWriter.cpp
@@ -0,0 +1,74 @@
+/*
+ * Copyright (C) 2018 KeePassXC Team
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 2 or (at your option)
+ * version 3 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see .
+ */
+
+#include "KdbxWriter.h"
+
+bool KdbxWriter::hasError() const
+{
+ return m_error;
+}
+
+QString KdbxWriter::errorString() const
+{
+ return m_errorStr;
+}
+
+/**
+ * Write KDBX magic header numbers to a device.
+ *
+ * @param device output device
+ * @param sig1 KDBX signature 1
+ * @param sig2 KDBX signature 2
+ * @param version KDBX version
+ * @return true if magic numbers were written successfully
+ */
+bool KdbxWriter::writeMagicNumbers(QIODevice* device, quint32 sig1, quint32 sig2, quint32 version)
+{
+ CHECK_RETURN_FALSE(writeData(device, Endian::sizedIntToBytes(sig1, KeePass2::BYTEORDER)));
+ CHECK_RETURN_FALSE(writeData(device, Endian::sizedIntToBytes(sig2, KeePass2::BYTEORDER)));
+ CHECK_RETURN_FALSE(writeData(device, Endian::sizedIntToBytes(version, KeePass2::BYTEORDER)));
+
+ return true;
+}
+
+/**
+ * Helper method for writing bytes to the device and raising an error
+ * in case of write failure.
+ *
+ * @param device output device
+ * @param data byte contents
+ * @return true on success
+ */
+bool KdbxWriter::writeData(QIODevice* device, const QByteArray& data)
+{
+ if (device->write(data) != data.size()) {
+ raiseError(device->errorString());
+ return false;
+ }
+ return true;
+}
+
+/**
+ * Raise an error. Use in case of an unexpected write error.
+ *
+ * @param errorMessage error message
+ */
+void KdbxWriter::raiseError(const QString& errorMessage)
+{
+ m_error = true;
+ m_errorStr = errorMessage;
+}
diff --git a/src/format/KdbxWriter.h b/src/format/KdbxWriter.h
new file mode 100644
index 000000000..5aa41766e
--- /dev/null
+++ b/src/format/KdbxWriter.h
@@ -0,0 +1,90 @@
+/*
+ * Copyright (C) 2018 KeePassXC Team
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 2 or (at your option)
+ * version 3 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see .
+ */
+
+#ifndef KEEPASSXC_KDBXWRITER_H
+#define KEEPASSXC_KDBXWRITER_H
+
+#include "KeePass2.h"
+#include "core/Endian.h"
+
+#include
+
+#define CHECK_RETURN_FALSE(x) if (!(x)) return false;
+
+class QIODevice;
+class Database;
+
+/**
+ * Abstract KDBX writer base class.
+ */
+class KdbxWriter
+{
+Q_DECLARE_TR_FUNCTIONS(KdbxWriter)
+
+public:
+ KdbxWriter() = default;
+ virtual ~KdbxWriter() = default;
+
+ bool writeMagicNumbers(QIODevice* device, quint32 sig1, quint32 sig2, quint32 version);
+
+ /**
+ * Write a database to a device in KDBX format.
+ *
+ * @param device output device
+ * @param db source database
+ * @return true on success
+ */
+ virtual bool writeDatabase(QIODevice* device, Database* db) = 0;
+
+ bool hasError() const;
+ QString errorString() const;
+
+protected:
+
+ /**
+ * Helper method for writing a KDBX header field to a device.
+ *
+ * @tparam SizedQInt field width
+ * @param device output device
+ * @param fieldId field identifier
+ * @param data field contents
+ * @return true on success
+ */
+ template
+ bool writeHeaderField(QIODevice* device, KeePass2::HeaderFieldID fieldId, const QByteArray& data)
+ {
+ Q_ASSERT(static_cast(data.size()) < (1ull << (sizeof(SizedQInt) * 8)));
+
+ QByteArray fieldIdArr;
+ fieldIdArr[0] = static_cast(fieldId);
+ CHECK_RETURN_FALSE(writeData(device, fieldIdArr));
+ CHECK_RETURN_FALSE(writeData(device, Endian::sizedIntToBytes(static_cast(data.size()),
+ KeePass2::BYTEORDER)));
+ CHECK_RETURN_FALSE(writeData(device, data));
+
+ return true;
+ }
+
+ bool writeData(QIODevice* device, const QByteArray& data);
+ void raiseError(const QString& errorMessage);
+
+ bool m_error = false;
+ QString m_errorStr = "";
+};
+
+
+#endif //KEEPASSXC_KDBXWRITER_H
diff --git a/src/format/KeePass2XmlReader.cpp b/src/format/KdbxXmlReader.cpp
similarity index 54%
rename from src/format/KeePass2XmlReader.cpp
rename to src/format/KdbxXmlReader.cpp
index de7ca6d79..774bb00c7 100644
--- a/src/format/KeePass2XmlReader.cpp
+++ b/src/format/KdbxXmlReader.cpp
@@ -1,51 +1,86 @@
/*
- * Copyright (C) 2010 Felix Geyer
+ * Copyright (C) 2018 KeePassXC Team
*
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 2 or (at your option)
- * version 3 of the License.
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 2 or (at your option)
+ * version 3 of the License.
*
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
*
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see .
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see .
*/
-#include "KeePass2XmlReader.h"
-
-#include
-#include
-
-#include "core/Database.h"
-#include "core/DatabaseIcons.h"
-#include "core/Group.h"
-#include "core/Metadata.h"
+#include "KdbxXmlReader.h"
+#include "KeePass2RandomStream.h"
+#include "core/Global.h"
#include "core/Tools.h"
-#include "format/KeePass2RandomStream.h"
+#include "core/Entry.h"
+#include "core/Group.h"
+#include "core/DatabaseIcons.h"
+#include "core/Endian.h"
#include "streams/QtIOCompressor"
-typedef QPair StringPair;
+#include
+#include
-KeePass2XmlReader::KeePass2XmlReader()
- : m_randomStream(nullptr)
- , m_db(nullptr)
- , m_meta(nullptr)
- , m_tmpParent(nullptr)
- , m_error(false)
- , m_strictMode(false)
+/**
+ * @param version KDBX version
+ */
+KdbxXmlReader::KdbxXmlReader(quint32 version)
+ : m_kdbxVersion(version)
{
}
-void KeePass2XmlReader::setStrictMode(bool strictMode)
+/**
+ * @param version KDBX version
+ * @param binaryPool binary pool
+ */
+KdbxXmlReader::KdbxXmlReader(quint32 version, QHash& binaryPool)
+ : m_kdbxVersion(version)
+ , m_binaryPool(binaryPool)
{
- m_strictMode = strictMode;
}
-void KeePass2XmlReader::readDatabase(QIODevice* device, Database* db, KeePass2RandomStream* randomStream)
+/**
+ * Read XML contents from a file into a new database.
+ *
+ * @param device input file
+ * @return pointer to the new database
+ */
+Database* KdbxXmlReader::readDatabase(const QString& filename)
+{
+ QFile file(filename);
+ file.open(QIODevice::ReadOnly);
+ return readDatabase(&file);
+}
+
+/**
+ * Read XML stream from a device into a new database.
+ *
+ * @param device input device
+ * @return pointer to the new database
+ */
+Database* KdbxXmlReader::readDatabase(QIODevice* device)
+{
+ auto db = new Database();
+ readDatabase(device, db);
+ return db;
+}
+
+/**
+ * Read XML contents from a device into a given database using a \link KeePass2RandomStream.
+ *
+ * @param device input device
+ * @param db database to read into
+ * @param randomStream random stream to use for decryption
+ */
+#include "QDebug"
+void KdbxXmlReader::readDatabase(QIODevice* device, Database* db, KeePass2RandomStream* randomStream)
{
m_error = false;
m_errorStr.clear();
@@ -60,30 +95,32 @@ void KeePass2XmlReader::readDatabase(QIODevice* device, Database* db, KeePass2Ra
m_randomStream = randomStream;
m_headerHash.clear();
- m_tmpParent = new Group();
+ m_tmpParent.reset(new Group());
bool rootGroupParsed = false;
- if (!m_xml.error() && m_xml.readNextStartElement()) {
- if (m_xml.name() == "KeePassFile") {
- rootGroupParsed = parseKeePassFile();
- }
+ if (m_xml.hasError()) {
+ raiseError(tr("XML parsing failure: %1").arg(m_xml.error()));
+ return;
}
- if (!m_xml.error() && !rootGroupParsed) {
- raiseError("No root group");
+ if (m_xml.readNextStartElement() && m_xml.name() == "KeePassFile") {
+ rootGroupParsed = parseKeePassFile();
}
- if (!m_xml.error()) {
- if (!m_tmpParent->children().isEmpty()) {
- qWarning("KeePass2XmlReader::readDatabase: found %d invalid group reference(s)",
- m_tmpParent->children().size());
- }
+ if (!rootGroupParsed) {
+ raiseError(tr("No root group"));
+ return;
+ }
- if (!m_tmpParent->entries().isEmpty()) {
- qWarning("KeePass2XmlReader::readDatabase: found %d invalid entry reference(s)",
- m_tmpParent->children().size());
- }
+ if (!m_tmpParent->children().isEmpty()) {
+ qWarning("KdbxXmlReader::readDatabase: found %d invalid group reference(s)",
+ m_tmpParent->children().size());
+ }
+
+ if (!m_tmpParent->entries().isEmpty()) {
+ qWarning("KdbxXmlReader::readDatabase: found %d invalid entry reference(s)",
+ m_tmpParent->children().size());
}
const QSet poolKeys = m_binaryPool.keys().toSet();
@@ -92,13 +129,11 @@ void KeePass2XmlReader::readDatabase(QIODevice* device, Database* db, KeePass2Ra
const QSet unusedKeys = poolKeys - entryKeys;
if (!unmappedKeys.isEmpty()) {
- raiseError("Unmapped keys left.");
+ qWarning("Unmapped keys left.");
}
- if (!m_xml.error()) {
- for (const QString& key : unusedKeys) {
- qWarning("KeePass2XmlReader::readDatabase: found unused key \"%s\"", qPrintable(key));
- }
+ for (const QString& key : unusedKeys) {
+ qWarning("KdbxXmlReader::readDatabase: found unused key \"%s\"", qPrintable(key));
}
QHash >::const_iterator i;
@@ -123,227 +158,187 @@ void KeePass2XmlReader::readDatabase(QIODevice* device, Database* db, KeePass2Ra
histEntry->setUpdateTimeinfo(true);
}
}
-
- delete m_tmpParent;
}
-Database* KeePass2XmlReader::readDatabase(QIODevice* device)
+bool KdbxXmlReader::strictMode() const
{
- Database* db = new Database();
- readDatabase(device, db);
- return db;
+ return m_strictMode;
}
-Database* KeePass2XmlReader::readDatabase(const QString& filename)
+void KdbxXmlReader::setStrictMode(bool strictMode)
{
- QFile file(filename);
- file.open(QIODevice::ReadOnly);
- return readDatabase(&file);
+ m_strictMode = strictMode;
}
-bool KeePass2XmlReader::hasError()
+bool KdbxXmlReader::hasError() const
{
return m_error || m_xml.hasError();
}
-QString KeePass2XmlReader::errorString()
+QString KdbxXmlReader::errorString() const
{
if (m_error) {
return m_errorStr;
- }
- else if (m_xml.hasError()) {
+ }if (m_xml.hasError()) {
return QString("XML error:\n%1\nLine %2, column %3")
- .arg(m_xml.errorString())
- .arg(m_xml.lineNumber())
- .arg(m_xml.columnNumber());
- }
- else {
- return QString();
+ .arg(m_xml.errorString())
+ .arg(m_xml.lineNumber())
+ .arg(m_xml.columnNumber());
}
+ return QString();
}
-void KeePass2XmlReader::raiseError(const QString& errorMessage)
+void KdbxXmlReader::raiseError(const QString& errorMessage)
{
m_error = true;
m_errorStr = errorMessage;
}
-QByteArray KeePass2XmlReader::headerHash()
+QByteArray KdbxXmlReader::headerHash() const
{
return m_headerHash;
}
-bool KeePass2XmlReader::parseKeePassFile()
+bool KdbxXmlReader::parseKeePassFile()
{
Q_ASSERT(m_xml.isStartElement() && m_xml.name() == "KeePassFile");
bool rootElementFound = false;
bool rootParsedSuccessfully = false;
- while (!m_xml.error() && m_xml.readNextStartElement()) {
+ while (!m_xml.hasError() && m_xml.readNextStartElement()) {
if (m_xml.name() == "Meta") {
parseMeta();
+ continue;
}
- else if (m_xml.name() == "Root") {
+
+ if (m_xml.name() == "Root") {
if (rootElementFound) {
rootParsedSuccessfully = false;
- raiseError("Multiple root elements");
- }
- else {
+ qWarning("Multiple root elements");
+ } else {
rootParsedSuccessfully = parseRoot();
rootElementFound = true;
}
+ continue;
}
- else {
- skipCurrentElement();
- }
+
+ skipCurrentElement();
}
return rootParsedSuccessfully;
}
-void KeePass2XmlReader::parseMeta()
+void KdbxXmlReader::parseMeta()
{
Q_ASSERT(m_xml.isStartElement() && m_xml.name() == "Meta");
- while (!m_xml.error() && m_xml.readNextStartElement()) {
+ while (!m_xml.hasError() && m_xml.readNextStartElement()) {
if (m_xml.name() == "Generator") {
m_meta->setGenerator(readString());
- }
- else if (m_xml.name() == "HeaderHash") {
+ } else if (m_xml.name() == "HeaderHash") {
m_headerHash = readBinary();
- }
- else if (m_xml.name() == "DatabaseName") {
+ } else if (m_xml.name() == "DatabaseName") {
m_meta->setName(readString());
- }
- else if (m_xml.name() == "DatabaseNameChanged") {
+ } else if (m_xml.name() == "DatabaseNameChanged") {
m_meta->setNameChanged(readDateTime());
- }
- else if (m_xml.name() == "DatabaseDescription") {
+ } else if (m_xml.name() == "DatabaseDescription") {
m_meta->setDescription(readString());
- }
- else if (m_xml.name() == "DatabaseDescriptionChanged") {
+ } else if (m_xml.name() == "DatabaseDescriptionChanged") {
m_meta->setDescriptionChanged(readDateTime());
- }
- else if (m_xml.name() == "DefaultUserName") {
+ } else if (m_xml.name() == "DefaultUserName") {
m_meta->setDefaultUserName(readString());
- }
- else if (m_xml.name() == "DefaultUserNameChanged") {
+ } else if (m_xml.name() == "DefaultUserNameChanged") {
m_meta->setDefaultUserNameChanged(readDateTime());
- }
- else if (m_xml.name() == "MaintenanceHistoryDays") {
+ } else if (m_xml.name() == "MaintenanceHistoryDays") {
m_meta->setMaintenanceHistoryDays(readNumber());
- }
- else if (m_xml.name() == "Color") {
+ } else if (m_xml.name() == "Color") {
m_meta->setColor(readColor());
- }
- else if (m_xml.name() == "MasterKeyChanged") {
+ } else if (m_xml.name() == "MasterKeyChanged") {
m_meta->setMasterKeyChanged(readDateTime());
- }
- else if (m_xml.name() == "MasterKeyChangeRec") {
+ } else if (m_xml.name() == "MasterKeyChangeRec") {
m_meta->setMasterKeyChangeRec(readNumber());
- }
- else if (m_xml.name() == "MasterKeyChangeForce") {
+ } else if (m_xml.name() == "MasterKeyChangeForce") {
m_meta->setMasterKeyChangeForce(readNumber());
- }
- else if (m_xml.name() == "MemoryProtection") {
+ } else if (m_xml.name() == "MemoryProtection") {
parseMemoryProtection();
- }
- else if (m_xml.name() == "CustomIcons") {
+ } else if (m_xml.name() == "CustomIcons") {
parseCustomIcons();
- }
- else if (m_xml.name() == "RecycleBinEnabled") {
+ } else if (m_xml.name() == "RecycleBinEnabled") {
m_meta->setRecycleBinEnabled(readBool());
- }
- else if (m_xml.name() == "RecycleBinUUID") {
+ } else if (m_xml.name() == "RecycleBinUUID") {
m_meta->setRecycleBin(getGroup(readUuid()));
- }
- else if (m_xml.name() == "RecycleBinChanged") {
+ } else if (m_xml.name() == "RecycleBinChanged") {
m_meta->setRecycleBinChanged(readDateTime());
- }
- else if (m_xml.name() == "EntryTemplatesGroup") {
+ } else if (m_xml.name() == "EntryTemplatesGroup") {
m_meta->setEntryTemplatesGroup(getGroup(readUuid()));
- }
- else if (m_xml.name() == "EntryTemplatesGroupChanged") {
+ } else if (m_xml.name() == "EntryTemplatesGroupChanged") {
m_meta->setEntryTemplatesGroupChanged(readDateTime());
- }
- else if (m_xml.name() == "LastSelectedGroup") {
+ } else if (m_xml.name() == "LastSelectedGroup") {
m_meta->setLastSelectedGroup(getGroup(readUuid()));
- }
- else if (m_xml.name() == "LastTopVisibleGroup") {
+ } else if (m_xml.name() == "LastTopVisibleGroup") {
m_meta->setLastTopVisibleGroup(getGroup(readUuid()));
- }
- else if (m_xml.name() == "HistoryMaxItems") {
+ } else if (m_xml.name() == "HistoryMaxItems") {
int value = readNumber();
if (value >= -1) {
m_meta->setHistoryMaxItems(value);
+ } else {
+ qWarning("HistoryMaxItems invalid number");
}
- else {
- raiseError("HistoryMaxItems invalid number");
- }
- }
- else if (m_xml.name() == "HistoryMaxSize") {
+ } else if (m_xml.name() == "HistoryMaxSize") {
int value = readNumber();
if (value >= -1) {
m_meta->setHistoryMaxSize(value);
+ } else {
+ qWarning("HistoryMaxSize invalid number");
}
- else {
- raiseError("HistoryMaxSize invalid number");
- }
- }
- else if (m_xml.name() == "Binaries") {
+ } else if (m_xml.name() == "Binaries") {
parseBinaries();
- }
- else if (m_xml.name() == "CustomData") {
+ } else if (m_xml.name() == "CustomData") {
parseCustomData();
- }
- else {
+ } else if (m_xml.name() == "SettingsChanged") {
+ m_meta->setSettingsChanged(readDateTime());
+ } else {
skipCurrentElement();
}
}
}
-void KeePass2XmlReader::parseMemoryProtection()
+void KdbxXmlReader::parseMemoryProtection()
{
Q_ASSERT(m_xml.isStartElement() && m_xml.name() == "MemoryProtection");
- while (!m_xml.error() && m_xml.readNextStartElement()) {
+ while (!m_xml.hasError() && m_xml.readNextStartElement()) {
if (m_xml.name() == "ProtectTitle") {
m_meta->setProtectTitle(readBool());
- }
- else if (m_xml.name() == "ProtectUserName") {
+ } else if (m_xml.name() == "ProtectUserName") {
m_meta->setProtectUsername(readBool());
- }
- else if (m_xml.name() == "ProtectPassword") {
+ } else if (m_xml.name() == "ProtectPassword") {
m_meta->setProtectPassword(readBool());
- }
- else if (m_xml.name() == "ProtectURL") {
+ } else if (m_xml.name() == "ProtectURL") {
m_meta->setProtectUrl(readBool());
- }
- else if (m_xml.name() == "ProtectNotes") {
+ } else if (m_xml.name() == "ProtectNotes") {
m_meta->setProtectNotes(readBool());
- }
- else {
+ } else {
skipCurrentElement();
}
}
}
-void KeePass2XmlReader::parseCustomIcons()
+void KdbxXmlReader::parseCustomIcons()
{
Q_ASSERT(m_xml.isStartElement() && m_xml.name() == "CustomIcons");
- while (!m_xml.error() && m_xml.readNextStartElement()) {
+ while (!m_xml.hasError() && m_xml.readNextStartElement()) {
if (m_xml.name() == "Icon") {
parseIcon();
- }
- else {
+ } else {
skipCurrentElement();
}
}
}
-void KeePass2XmlReader::parseIcon()
+void KdbxXmlReader::parseIcon()
{
Q_ASSERT(m_xml.isStartElement() && m_xml.name() == "Icon");
@@ -352,74 +347,70 @@ void KeePass2XmlReader::parseIcon()
bool uuidSet = false;
bool iconSet = false;
- while (!m_xml.error() && m_xml.readNextStartElement()) {
+ while (!m_xml.hasError() && m_xml.readNextStartElement()) {
if (m_xml.name() == "UUID") {
uuid = readUuid();
uuidSet = !uuid.isNull();
- }
- else if (m_xml.name() == "Data") {
+ } else if (m_xml.name() == "Data") {
icon.loadFromData(readBinary());
iconSet = true;
- }
- else {
+ } else {
skipCurrentElement();
}
}
if (uuidSet && iconSet) {
m_meta->addCustomIcon(uuid, icon);
+ return;
}
- else {
- raiseError("Missing icon uuid or data");
- }
+
+ raiseError(tr("Missing icon uuid or data"));
}
-void KeePass2XmlReader::parseBinaries()
+void KdbxXmlReader::parseBinaries()
{
Q_ASSERT(m_xml.isStartElement() && m_xml.name() == "Binaries");
- while (!m_xml.error() && m_xml.readNextStartElement()) {
- if (m_xml.name() == "Binary") {
- QXmlStreamAttributes attr = m_xml.attributes();
-
- QString id = attr.value("ID").toString();
-
- QByteArray data;
- if (attr.value("Compressed").compare(QLatin1String("True"), Qt::CaseInsensitive) == 0) {
- data = readCompressedBinary();
- }
- else {
- data = readBinary();
- }
-
- if (m_binaryPool.contains(id)) {
- qWarning("KeePass2XmlReader::parseBinaries: overwriting binary item \"%s\"",
- qPrintable(id));
- }
-
- m_binaryPool.insert(id, data);
- }
- else {
+ while (!m_xml.hasError() && m_xml.readNextStartElement()) {
+ if (m_xml.name() != "Binary") {
skipCurrentElement();
+ continue;
}
+
+ QXmlStreamAttributes attr = m_xml.attributes();
+
+ QString id = attr.value("ID").toString();
+
+ QByteArray data;
+ if (attr.value("Compressed").compare(QLatin1String("True"), Qt::CaseInsensitive) == 0) {
+ data = readCompressedBinary();
+ } else {
+ data = readBinary();
+ }
+
+ if (m_binaryPool.contains(id)) {
+ qWarning("KdbxXmlReader::parseBinaries: overwriting binary item \"%s\"",
+ qPrintable(id));
+ }
+
+ m_binaryPool.insert(id, data);
}
}
-void KeePass2XmlReader::parseCustomData()
+void KdbxXmlReader::parseCustomData()
{
Q_ASSERT(m_xml.isStartElement() && m_xml.name() == "CustomData");
- while (!m_xml.error() && m_xml.readNextStartElement()) {
+ while (!m_xml.hasError() && m_xml.readNextStartElement()) {
if (m_xml.name() == "Item") {
parseCustomDataItem();
+ continue;
}
- else {
- skipCurrentElement();
- }
+ skipCurrentElement();
}
}
-void KeePass2XmlReader::parseCustomDataItem()
+void KdbxXmlReader::parseCustomDataItem()
{
Q_ASSERT(m_xml.isStartElement() && m_xml.name() == "Item");
@@ -428,40 +419,38 @@ void KeePass2XmlReader::parseCustomDataItem()
bool keySet = false;
bool valueSet = false;
- while (!m_xml.error() && m_xml.readNextStartElement()) {
+ while (!m_xml.hasError() && m_xml.readNextStartElement()) {
if (m_xml.name() == "Key") {
key = readString();
keySet = true;
- }
- else if (m_xml.name() == "Value") {
+ } else if (m_xml.name() == "Value") {
value = readString();
valueSet = true;
- }
- else {
+ } else {
skipCurrentElement();
}
}
if (keySet && valueSet) {
m_meta->addCustomField(key, value);
+ return;
}
- else {
- raiseError("Missing custom data key or value");
- }
+
+ raiseError(tr("Missing custom data key or value"));
}
-bool KeePass2XmlReader::parseRoot()
+bool KdbxXmlReader::parseRoot()
{
Q_ASSERT(m_xml.isStartElement() && m_xml.name() == "Root");
bool groupElementFound = false;
bool groupParsedSuccessfully = false;
- while (!m_xml.error() && m_xml.readNextStartElement()) {
+ while (!m_xml.hasError() && m_xml.readNextStartElement()) {
if (m_xml.name() == "Group") {
if (groupElementFound) {
groupParsedSuccessfully = false;
- raiseError("Multiple group elements");
+ raiseError(tr("Multiple group elements"));
continue;
}
@@ -474,11 +463,9 @@ bool KeePass2XmlReader::parseRoot()
}
groupElementFound = true;
- }
- else if (m_xml.name() == "DeletedObjects") {
+ } else if (m_xml.name() == "DeletedObjects") {
parseDeletedObjects();
- }
- else {
+ } else {
skipCurrentElement();
}
}
@@ -486,115 +473,118 @@ bool KeePass2XmlReader::parseRoot()
return groupParsedSuccessfully;
}
-Group* KeePass2XmlReader::parseGroup()
+Group* KdbxXmlReader::parseGroup()
{
Q_ASSERT(m_xml.isStartElement() && m_xml.name() == "Group");
- Group* group = new Group();
+ auto group = new Group();
group->setUpdateTimeinfo(false);
QList children;
QList entries;
- while (!m_xml.error() && m_xml.readNextStartElement()) {
+ while (!m_xml.hasError() && m_xml.readNextStartElement()) {
if (m_xml.name() == "UUID") {
Uuid uuid = readUuid();
if (uuid.isNull()) {
if (m_strictMode) {
- raiseError("Null group uuid");
- }
- else {
+ raiseError(tr("Null group uuid"));
+ } else {
group->setUuid(Uuid::random());
}
- }
- else {
+ } else {
group->setUuid(uuid);
}
+ continue;
}
- else if (m_xml.name() == "Name") {
+ if (m_xml.name() == "Name") {
group->setName(readString());
+ continue;
}
- else if (m_xml.name() == "Notes") {
+ if (m_xml.name() == "Notes") {
group->setNotes(readString());
+ continue;
}
- else if (m_xml.name() == "IconID") {
+ if (m_xml.name() == "IconID") {
int iconId = readNumber();
if (iconId < 0) {
if (m_strictMode) {
- raiseError("Invalid group icon number");
+ raiseError(tr("Invalid group icon number"));
}
iconId = 0;
+ } else if (iconId >= DatabaseIcons::IconCount) {
+ qWarning("KdbxXmlReader::parseGroup: icon id \"%d\" not supported", iconId);
+ iconId = DatabaseIcons::IconCount - 1;
}
- else {
- if (iconId >= DatabaseIcons::IconCount) {
- qWarning("KeePass2XmlReader::parseGroup: icon id \"%d\" not supported", iconId);
- }
- group->setIcon(iconId);
- }
+
+ group->setIcon(iconId);
+ continue;
}
- else if (m_xml.name() == "CustomIconUUID") {
+ if (m_xml.name() == "CustomIconUUID") {
Uuid uuid = readUuid();
if (!uuid.isNull()) {
group->setIcon(uuid);
}
+ continue;
}
- else if (m_xml.name() == "Times") {
+ if (m_xml.name() == "Times") {
group->setTimeInfo(parseTimes());
+ continue;
}
- else if (m_xml.name() == "IsExpanded") {
+ if (m_xml.name() == "IsExpanded") {
group->setExpanded(readBool());
+ continue;
}
- else if (m_xml.name() == "DefaultAutoTypeSequence") {
+ if (m_xml.name() == "DefaultAutoTypeSequence") {
group->setDefaultAutoTypeSequence(readString());
+ continue;
}
- else if (m_xml.name() == "EnableAutoType") {
+ if (m_xml.name() == "EnableAutoType") {
QString str = readString();
if (str.compare("null", Qt::CaseInsensitive) == 0) {
group->setAutoTypeEnabled(Group::Inherit);
- }
- else if (str.compare("true", Qt::CaseInsensitive) == 0) {
+ } else if (str.compare("true", Qt::CaseInsensitive) == 0) {
group->setAutoTypeEnabled(Group::Enable);
- }
- else if (str.compare("false", Qt::CaseInsensitive) == 0) {
+ } else if (str.compare("false", Qt::CaseInsensitive) == 0) {
group->setAutoTypeEnabled(Group::Disable);
+ } else {
+ raiseError(tr("Invalid EnableAutoType value"));
}
- else {
- raiseError("Invalid EnableAutoType value");
- }
+ continue;
}
- else if (m_xml.name() == "EnableSearching") {
+ if (m_xml.name() == "EnableSearching") {
QString str = readString();
if (str.compare("null", Qt::CaseInsensitive) == 0) {
group->setSearchingEnabled(Group::Inherit);
- }
- else if (str.compare("true", Qt::CaseInsensitive) == 0) {
+ } else if (str.compare("true", Qt::CaseInsensitive) == 0) {
group->setSearchingEnabled(Group::Enable);
- }
- else if (str.compare("false", Qt::CaseInsensitive) == 0) {
+ } else if (str.compare("false", Qt::CaseInsensitive) == 0) {
group->setSearchingEnabled(Group::Disable);
+ } else {
+ raiseError(tr("Invalid EnableSearching value"));
}
- else {
- raiseError("Invalid EnableSearching value");
- }
+ continue;
}
- else if (m_xml.name() == "LastTopVisibleEntry") {
+ if (m_xml.name() == "LastTopVisibleEntry") {
group->setLastTopVisibleEntry(getEntry(readUuid()));
+ continue;
}
- else if (m_xml.name() == "Group") {
+ if (m_xml.name() == "Group") {
Group* newGroup = parseGroup();
if (newGroup) {
children.append(newGroup);
}
+ continue;
}
- else if (m_xml.name() == "Entry") {
+ if (m_xml.name() == "Entry") {
Entry* newEntry = parseEntry(false);
if (newEntry) {
entries.append(newEntry);
}
+ continue;
}
- else {
- skipCurrentElement();
- }
+
+ skipCurrentElement();
}
if (group->uuid().isNull() && !m_strictMode) {
@@ -607,9 +597,8 @@ Group* KeePass2XmlReader::parseGroup()
group->copyDataFrom(tmpGroup);
group->setUpdateTimeinfo(false);
delete tmpGroup;
- }
- else if (!hasError()) {
- raiseError("No group uuid found");
+ } else if (!hasError()) {
+ raiseError(tr("No group uuid found"));
}
for (Group* child : asConst(children)) {
@@ -623,134 +612,139 @@ Group* KeePass2XmlReader::parseGroup()
return group;
}
-void KeePass2XmlReader::parseDeletedObjects()
+void KdbxXmlReader::parseDeletedObjects()
{
Q_ASSERT(m_xml.isStartElement() && m_xml.name() == "DeletedObjects");
- while (!m_xml.error() && m_xml.readNextStartElement()) {
+ while (!m_xml.hasError() && m_xml.readNextStartElement()) {
if (m_xml.name() == "DeletedObject") {
parseDeletedObject();
- }
- else {
+ } else {
skipCurrentElement();
}
}
}
-void KeePass2XmlReader::parseDeletedObject()
+void KdbxXmlReader::parseDeletedObject()
{
Q_ASSERT(m_xml.isStartElement() && m_xml.name() == "DeletedObject");
- DeletedObject delObj;
+ DeletedObject delObj{{}, {}};
- while (!m_xml.error() && m_xml.readNextStartElement()) {
+ while (!m_xml.hasError() && m_xml.readNextStartElement()) {
if (m_xml.name() == "UUID") {
Uuid uuid = readUuid();
if (uuid.isNull()) {
if (m_strictMode) {
- raiseError("Null DeleteObject uuid");
+ raiseError(tr("Null DeleteObject uuid"));
}
+ continue;
}
- else {
- delObj.uuid = uuid;
- }
+ delObj.uuid = uuid;
+ continue;
}
- else if (m_xml.name() == "DeletionTime") {
+ if (m_xml.name() == "DeletionTime") {
delObj.deletionTime = readDateTime();
+ continue;
}
- else {
- skipCurrentElement();
- }
+ skipCurrentElement();
}
if (!delObj.uuid.isNull() && !delObj.deletionTime.isNull()) {
m_db->addDeletedObject(delObj);
+ return;
}
- else if (m_strictMode) {
- raiseError("Missing DeletedObject uuid or time");
+
+ if (m_strictMode) {
+ raiseError(tr("Missing DeletedObject uuid or time"));
}
}
-Entry* KeePass2XmlReader::parseEntry(bool history)
+Entry* KdbxXmlReader::parseEntry(bool history)
{
Q_ASSERT(m_xml.isStartElement() && m_xml.name() == "Entry");
- Entry* entry = new Entry();
+ auto entry = new Entry();
entry->setUpdateTimeinfo(false);
QList historyItems;
QList binaryRefs;
- while (!m_xml.error() && m_xml.readNextStartElement()) {
+ while (!m_xml.hasError() && m_xml.readNextStartElement()) {
if (m_xml.name() == "UUID") {
Uuid uuid = readUuid();
if (uuid.isNull()) {
if (m_strictMode) {
- raiseError("Null entry uuid");
- }
- else {
+ raiseError(tr("Null entry uuid"));
+ } else {
entry->setUuid(Uuid::random());
}
- }
- else {
+ } else {
entry->setUuid(uuid);
}
+ continue;
}
- else if (m_xml.name() == "IconID") {
+ if (m_xml.name() == "IconID") {
int iconId = readNumber();
if (iconId < 0) {
if (m_strictMode) {
- raiseError("Invalid entry icon number");
+ raiseError(tr("Invalid entry icon number"));
}
iconId = 0;
}
- else {
- entry->setIcon(iconId);
- }
+ entry->setIcon(iconId);
+ continue;
}
- else if (m_xml.name() == "CustomIconUUID") {
+ if (m_xml.name() == "CustomIconUUID") {
Uuid uuid = readUuid();
if (!uuid.isNull()) {
entry->setIcon(uuid);
}
- }
- else if (m_xml.name() == "ForegroundColor") {
+ continue;
+ }if (m_xml.name() == "ForegroundColor") {
entry->setForegroundColor(readColor());
+ continue;
}
- else if (m_xml.name() == "BackgroundColor") {
+ if (m_xml.name() == "BackgroundColor") {
entry->setBackgroundColor(readColor());
+ continue;
}
- else if (m_xml.name() == "OverrideURL") {
+ if (m_xml.name() == "OverrideURL") {
entry->setOverrideUrl(readString());
+ continue;
}
- else if (m_xml.name() == "Tags") {
+ if (m_xml.name() == "Tags") {
entry->setTags(readString());
+ continue;
}
- else if (m_xml.name() == "Times") {
+ if (m_xml.name() == "Times") {
entry->setTimeInfo(parseTimes());
+ continue;
}
- else if (m_xml.name() == "String") {
+ if (m_xml.name() == "String") {
parseEntryString(entry);
+ continue;
}
- else if (m_xml.name() == "Binary") {
+ if (m_xml.name() == "Binary") {
QPair ref = parseEntryBinary(entry);
if (!ref.first.isNull() && !ref.second.isNull()) {
binaryRefs.append(ref);
}
+ continue;
}
- else if (m_xml.name() == "AutoType") {
+ if (m_xml.name() == "AutoType") {
parseAutoType(entry);
+ continue;
}
- else if (m_xml.name() == "History") {
+ if (m_xml.name() == "History") {
if (history) {
- raiseError("History element in history entry");
- }
- else {
+ raiseError(tr("History element in history entry"));
+ } else {
historyItems = parseEntryHistory();
}
+ continue;
}
- else {
- skipCurrentElement();
- }
+
+ skipCurrentElement();
}
if (entry->uuid().isNull() && !m_strictMode) {
@@ -760,8 +754,7 @@ Entry* KeePass2XmlReader::parseEntry(bool history)
if (!entry->uuid().isNull()) {
if (history) {
entry->setUpdateTimeinfo(false);
- }
- else {
+ } else {
Entry* tmpEntry = entry;
entry = getEntry(tmpEntry->uuid());
@@ -770,15 +763,14 @@ Entry* KeePass2XmlReader::parseEntry(bool history)
delete tmpEntry;
}
- }
- else if (!hasError()) {
- raiseError("No entry uuid found");
+ } else if (!hasError()) {
+ raiseError(tr("No entry uuid found"));
}
for (Entry* historyItem : asConst(historyItems)) {
if (historyItem->uuid() != entry->uuid()) {
if (m_strictMode) {
- raiseError("History element with different uuid");
+ raiseError(tr("History element with different uuid"));
} else {
historyItem->setUuid(entry->uuid());
}
@@ -793,7 +785,7 @@ Entry* KeePass2XmlReader::parseEntry(bool history)
return entry;
}
-void KeePass2XmlReader::parseEntryString(Entry* entry)
+void KdbxXmlReader::parseEntryString(Entry* entry)
{
Q_ASSERT(m_xml.isStartElement() && m_xml.name() == "String");
@@ -803,12 +795,14 @@ void KeePass2XmlReader::parseEntryString(Entry* entry)
bool keySet = false;
bool valueSet = false;
- while (!m_xml.error() && m_xml.readNextStartElement()) {
+ while (!m_xml.hasError() && m_xml.readNextStartElement()) {
if (m_xml.name() == "Key") {
key = readString();
keySet = true;
+ continue;
}
- else if (m_xml.name() == "Value") {
+
+ if (m_xml.name() == "Value") {
QXmlStreamAttributes attr = m_xml.attributes();
value = readString();
@@ -823,39 +817,37 @@ void KeePass2XmlReader::parseEntryString(Entry* entry)
if (!ok) {
value.clear();
raiseError(m_randomStream->errorString());
- }
- else {
+ } else {
value = QString::fromUtf8(plaintext);
}
- }
- else {
- raiseError("Unable to decrypt entry string");
+ } else {
+ raiseError(tr("Unable to decrypt entry string"));
+ continue;
}
}
protect = isProtected || protectInMemory;
valueSet = true;
+ continue;
}
- else {
- skipCurrentElement();
- }
+
+ skipCurrentElement();
}
if (keySet && valueSet) {
// the default attributes are always there so additionally check if it's empty
if (entry->attributes()->hasKey(key) && !entry->attributes()->value(key).isEmpty()) {
- raiseError("Duplicate custom attribute found");
- }
- else {
- entry->attributes()->set(key, value, protect);
+ raiseError(tr("Duplicate custom attribute found"));
+ return;
}
+ entry->attributes()->set(key, value, protect);
+ return;
}
- else {
- raiseError("Entry string key or value missing");
- }
+
+ raiseError(tr("Entry string key or value missing"));
}
-QPair KeePass2XmlReader::parseEntryBinary(Entry* entry)
+QPair KdbxXmlReader::parseEntryBinary(Entry* entry)
{
Q_ASSERT(m_xml.isStartElement() && m_xml.name() == "Binary");
@@ -866,23 +858,23 @@ QPair KeePass2XmlReader::parseEntryBinary(Entry* entry)
bool keySet = false;
bool valueSet = false;
- while (!m_xml.error() && m_xml.readNextStartElement()) {
+ while (!m_xml.hasError() && m_xml.readNextStartElement()) {
if (m_xml.name() == "Key") {
key = readString();
keySet = true;
+ continue;
}
- else if (m_xml.name() == "Value") {
+ if (m_xml.name() == "Value") {
QXmlStreamAttributes attr = m_xml.attributes();
if (attr.hasAttribute("Ref")) {
poolRef = qMakePair(attr.value("Ref").toString(), key);
m_xml.skipCurrentElement();
- }
- else {
+ } else {
// format compatibility
value = readBinary();
bool isProtected = attr.hasAttribute("Protected")
- && (attr.value("Protected") == "True");
+ && (attr.value("Protected") == "True");
if (isProtected && !value.isEmpty()) {
if (!m_randomStream->processInPlace(value)) {
@@ -892,51 +884,44 @@ QPair KeePass2XmlReader::parseEntryBinary(Entry* entry)
}
valueSet = true;
+ continue;
}
- else {
- skipCurrentElement();
- }
+ skipCurrentElement();
}
if (keySet && valueSet) {
if (entry->attachments()->hasKey(key)) {
- raiseError("Duplicate attachment found");
- }
- else {
+ raiseError(tr("Duplicate attachment found"));
+ } else {
entry->attachments()->set(key, value);
}
- }
- else {
- raiseError("Entry binary key or value missing");
+ } else {
+ raiseError(tr("Entry binary key or value missing"));
}
return poolRef;
}
-void KeePass2XmlReader::parseAutoType(Entry* entry)
+void KdbxXmlReader::parseAutoType(Entry* entry)
{
Q_ASSERT(m_xml.isStartElement() && m_xml.name() == "AutoType");
- while (!m_xml.error() && m_xml.readNextStartElement()) {
+ while (!m_xml.hasError() && m_xml.readNextStartElement()) {
if (m_xml.name() == "Enabled") {
entry->setAutoTypeEnabled(readBool());
- }
- else if (m_xml.name() == "DataTransferObfuscation") {
+ } else if (m_xml.name() == "DataTransferObfuscation") {
entry->setAutoTypeObfuscation(readNumber());
- }
- else if (m_xml.name() == "DefaultSequence") {
+ } else if (m_xml.name() == "DefaultSequence") {
entry->setDefaultAutoTypeSequence(readString());
- }
- else if (m_xml.name() == "Association") {
+ } else if (m_xml.name() == "Association") {
parseAutoTypeAssoc(entry);
- }
- else {
+ } else {
skipCurrentElement();
}
}
}
-void KeePass2XmlReader::parseAutoTypeAssoc(Entry* entry)
+void KdbxXmlReader::parseAutoTypeAssoc(Entry* entry)
{
Q_ASSERT(m_xml.isStartElement() && m_xml.name() == "Association");
@@ -944,39 +929,35 @@ void KeePass2XmlReader::parseAutoTypeAssoc(Entry* entry)
bool windowSet = false;
bool sequenceSet = false;
- while (!m_xml.error() && m_xml.readNextStartElement()) {
+ while (!m_xml.hasError() && m_xml.readNextStartElement()) {
if (m_xml.name() == "Window") {
assoc.window = readString();
windowSet = true;
- }
- else if (m_xml.name() == "KeystrokeSequence") {
+ } else if (m_xml.name() == "KeystrokeSequence") {
assoc.sequence = readString();
sequenceSet = true;
- }
- else {
+ } else {
skipCurrentElement();
}
}
if (windowSet && sequenceSet) {
entry->autoTypeAssociations()->add(assoc);
+ return;
}
- else {
- raiseError("Auto-type association window or sequence missing");
- }
+ raiseError(tr("Auto-type association window or sequence missing"));
}
-QList KeePass2XmlReader::parseEntryHistory()
+QList