mirror of
https://github.com/keepassxreboot/keepassxc.git
synced 2025-04-05 13:37:43 +03:00
Start implementing support for reading KeePass 1 databases.
For now only decrypting the database works. Still missing: - Actually parsing the database. - Key files. Refs #1
This commit is contained in:
parent
38e421d9c1
commit
ebce183925
8 changed files with 510 additions and 0 deletions
321
src/format/KeePass1Reader.cpp
Normal file
321
src/format/KeePass1Reader.cpp
Normal file
|
@ -0,0 +1,321 @@
|
|||
/*
|
||||
* Copyright (C) 2012 Felix Geyer <debfx@fobos.de>
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation, either version 2 or (at your option)
|
||||
* version 3 of the License.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
*/
|
||||
|
||||
#include "KeePass1Reader.h"
|
||||
|
||||
#include <QtCore/QFile>
|
||||
#include <QtCore/QTextCodec>
|
||||
|
||||
#include "core/Database.h"
|
||||
#include "core/Endian.h"
|
||||
#include "crypto/CryptoHash.h"
|
||||
#include "format/KeePass1.h"
|
||||
#include "keys/CompositeKey.h"
|
||||
#include "streams/SymmetricCipherStream.h"
|
||||
|
||||
class KeePass1Key : public CompositeKey
|
||||
{
|
||||
public:
|
||||
virtual QByteArray rawKey() const;
|
||||
virtual void clear();
|
||||
void setPassword(const QByteArray& password);
|
||||
void setKeyfileData(const QByteArray& keyfileData);
|
||||
|
||||
private:
|
||||
QByteArray m_password;
|
||||
QByteArray m_keyfileData;
|
||||
};
|
||||
|
||||
|
||||
KeePass1Reader::KeePass1Reader()
|
||||
: m_error(false)
|
||||
{
|
||||
}
|
||||
|
||||
Database* KeePass1Reader::readDatabase(QIODevice* device, const QString& password,
|
||||
const QByteArray& keyfileData)
|
||||
{
|
||||
QScopedPointer<Database> db(new Database());
|
||||
m_db = db.data();
|
||||
m_device = device;
|
||||
m_error = false;
|
||||
m_errorStr = QString();
|
||||
|
||||
bool ok;
|
||||
|
||||
quint32 signature1 = Endian::readUInt32(m_device, KeePass1::BYTEORDER, &ok);
|
||||
if (!ok || signature1 != 0x9AA2D903) {
|
||||
raiseError(tr("Not a KeePass database."));
|
||||
return 0;
|
||||
}
|
||||
|
||||
quint32 signature2 = Endian::readUInt32(m_device, KeePass1::BYTEORDER, &ok);
|
||||
if (!ok || signature2 != 0xB54BFB65) {
|
||||
raiseError(tr("Not a KeePass database."));
|
||||
return 0;
|
||||
}
|
||||
|
||||
m_encryptionFlags = Endian::readUInt32(m_device, KeePass1::BYTEORDER, &ok);
|
||||
if (!ok || !(m_encryptionFlags & KeePass1::Rijndael || m_encryptionFlags & KeePass1::Twofish)) {
|
||||
raiseError(tr("Unsupported encryption algorithm."));
|
||||
return 0;
|
||||
}
|
||||
|
||||
quint32 version = Endian::readUInt32(m_device, KeePass1::BYTEORDER, &ok);
|
||||
if (!ok || (version & KeePass1::FILE_VERSION_CRITICAL_MASK)
|
||||
!= (KeePass1::FILE_VERSION & KeePass1::FILE_VERSION_CRITICAL_MASK)) {
|
||||
raiseError(tr("Unsupported KeePass database version."));
|
||||
return 0;
|
||||
}
|
||||
|
||||
m_masterSeed = m_device->read(16);
|
||||
if (m_masterSeed.size() != 16) {
|
||||
// TODO error
|
||||
Q_ASSERT(false);
|
||||
return 0;
|
||||
}
|
||||
|
||||
m_encryptionIV = m_device->read(16);
|
||||
if (m_encryptionIV.size() != 16) {
|
||||
// TODO error
|
||||
Q_ASSERT(false);
|
||||
return 0;
|
||||
}
|
||||
|
||||
quint32 numGroups = Endian::readUInt32(m_device, KeePass1::BYTEORDER, &ok);
|
||||
if (!ok) {
|
||||
// TODO error
|
||||
Q_ASSERT(false);
|
||||
return 0;
|
||||
}
|
||||
|
||||
quint32 numEntries = Endian::readUInt32(m_device, KeePass1::BYTEORDER, &ok);
|
||||
if (!ok) {
|
||||
// TODO error
|
||||
Q_ASSERT(false);
|
||||
return 0;
|
||||
}
|
||||
|
||||
m_contentHashHeader = m_device->read(32);
|
||||
if (m_contentHashHeader.size() != 32) {
|
||||
// TODO error
|
||||
Q_ASSERT(false);
|
||||
return 0;
|
||||
}
|
||||
|
||||
m_transformSeed = m_device->read(32);
|
||||
if (m_transformSeed.size() != 32) {
|
||||
// TODO error
|
||||
Q_ASSERT(false);
|
||||
return 0;
|
||||
}
|
||||
|
||||
m_transformRounds = Endian::readUInt32(m_device, KeePass1::BYTEORDER, &ok);
|
||||
if (!ok) {
|
||||
// TODO error
|
||||
Q_ASSERT(false);
|
||||
return 0;
|
||||
}
|
||||
m_db->setTransformRounds(m_transformRounds);
|
||||
|
||||
qint64 contentPos = m_device->pos();
|
||||
|
||||
QScopedPointer<SymmetricCipherStream> cipherStream(testKeys(password, keyfileData, contentPos));
|
||||
|
||||
if (!cipherStream) {
|
||||
// TODO error
|
||||
Q_ASSERT(false);
|
||||
return 0;
|
||||
}
|
||||
|
||||
return db.take();
|
||||
}
|
||||
|
||||
Database* KeePass1Reader::readDatabase(const QString& filename, const QString& password,
|
||||
const QByteArray& keyfileData)
|
||||
{
|
||||
QFile file(filename);
|
||||
if (!file.open(QFile::ReadOnly)) {
|
||||
raiseError(file.errorString());
|
||||
return 0;
|
||||
}
|
||||
|
||||
QScopedPointer<Database> db(readDatabase(&file, password, keyfileData));
|
||||
|
||||
if (file.error() != QFile::NoError) {
|
||||
raiseError(file.errorString());
|
||||
return 0;
|
||||
}
|
||||
|
||||
return db.take();
|
||||
}
|
||||
|
||||
bool KeePass1Reader::hasError()
|
||||
{
|
||||
return m_error;
|
||||
}
|
||||
|
||||
QString KeePass1Reader::errorString()
|
||||
{
|
||||
return m_errorStr;
|
||||
}
|
||||
|
||||
SymmetricCipherStream* KeePass1Reader::testKeys(const QString& password, const QByteArray& keyfileData,
|
||||
qint64 contentPos)
|
||||
{
|
||||
QList<PasswordEncoding> encodings;
|
||||
encodings << Windows1252 << Latin1 << UTF8;
|
||||
|
||||
QScopedPointer<SymmetricCipherStream> cipherStream;
|
||||
QByteArray passwordData;
|
||||
QTextCodec* codec = QTextCodec::codecForName("Windows-1252");
|
||||
QByteArray passwordDataCorrect = codec->fromUnicode(password);
|
||||
|
||||
Q_FOREACH (PasswordEncoding encoding, encodings) {
|
||||
if (encoding == Windows1252) {
|
||||
passwordData = passwordDataCorrect;
|
||||
}
|
||||
else if (encoding == Latin1) {
|
||||
// KeePassX used Latin-1 encoding for passwords until version 0.3.1
|
||||
// but KeePass/Win32 uses Windows Codepage 1252.
|
||||
passwordData = password.toLatin1();
|
||||
|
||||
if (passwordData == passwordDataCorrect) {
|
||||
continue;
|
||||
}
|
||||
else {
|
||||
qWarning("Testing password encoded as Latin-1.");
|
||||
}
|
||||
}
|
||||
else if (encoding == UTF8) {
|
||||
// KeePassX used UTF-8 encoding for passwords until version 0.2.2
|
||||
// but KeePass/Win32 uses Windows Codepage 1252.
|
||||
passwordData = password.toUtf8();
|
||||
|
||||
if (passwordData == passwordDataCorrect) {
|
||||
continue;
|
||||
}
|
||||
else {
|
||||
qWarning("Testing password encoded as UTF-8.");
|
||||
}
|
||||
}
|
||||
|
||||
QByteArray finalKey = key(passwordData, keyfileData);
|
||||
if (m_encryptionFlags & KeePass1::Rijndael) {
|
||||
cipherStream.reset(new SymmetricCipherStream(m_device, SymmetricCipher::Aes256,
|
||||
SymmetricCipher::Cbc, SymmetricCipher::Decrypt, finalKey, m_encryptionIV));
|
||||
}
|
||||
else {
|
||||
// TODO twofish
|
||||
}
|
||||
|
||||
cipherStream->open(QIODevice::ReadOnly);
|
||||
|
||||
bool success = verifyKey(cipherStream.data());
|
||||
|
||||
cipherStream->reset();
|
||||
cipherStream->close();
|
||||
if (!m_device->seek(contentPos)) {
|
||||
// TODO error
|
||||
Q_ASSERT(false);
|
||||
return 0;
|
||||
}
|
||||
cipherStream->open(QIODevice::ReadOnly);
|
||||
|
||||
if (success) {
|
||||
break;
|
||||
}
|
||||
else {
|
||||
cipherStream.reset();
|
||||
}
|
||||
}
|
||||
|
||||
return cipherStream.take();
|
||||
}
|
||||
|
||||
QByteArray KeePass1Reader::key(const QByteArray& password, const QByteArray& keyfileData)
|
||||
{
|
||||
KeePass1Key key;
|
||||
key.setPassword(password);
|
||||
key.setKeyfileData(keyfileData);
|
||||
|
||||
CryptoHash hash(CryptoHash::Sha256);
|
||||
hash.addData(m_masterSeed);
|
||||
hash.addData(key.transform(m_transformSeed, m_transformRounds));
|
||||
return hash.result();
|
||||
}
|
||||
|
||||
bool KeePass1Reader::verifyKey(SymmetricCipherStream* cipherStream)
|
||||
{
|
||||
CryptoHash contentHash(CryptoHash::Sha256);
|
||||
QByteArray buffer;
|
||||
buffer.resize(16384);
|
||||
qint64 readResult;
|
||||
do {
|
||||
readResult = cipherStream->read(buffer.data(), buffer.size());
|
||||
if (readResult > 0) {
|
||||
if (readResult != buffer.size()) {
|
||||
buffer.resize(readResult);
|
||||
}
|
||||
qDebug("read %d", buffer.size());
|
||||
contentHash.addData(buffer);
|
||||
}
|
||||
} while (readResult == buffer.size());
|
||||
|
||||
return contentHash.result() == m_contentHashHeader;
|
||||
}
|
||||
|
||||
void KeePass1Reader::raiseError(const QString& str)
|
||||
{
|
||||
m_error = true;
|
||||
m_errorStr = str;
|
||||
}
|
||||
|
||||
|
||||
QByteArray KeePass1Key::rawKey() const
|
||||
{
|
||||
if (m_keyfileData.isEmpty()) {
|
||||
return CryptoHash::hash(m_password, CryptoHash::Sha256);
|
||||
}
|
||||
else if (m_password.isEmpty()) {
|
||||
return m_keyfileData;
|
||||
}
|
||||
else {
|
||||
CryptoHash keyHash(CryptoHash::Sha256);
|
||||
keyHash.addData(m_password);
|
||||
keyHash.addData(m_keyfileData);
|
||||
return keyHash.result();
|
||||
}
|
||||
}
|
||||
|
||||
void KeePass1Key::clear()
|
||||
{
|
||||
CompositeKey::clear();
|
||||
|
||||
m_password.clear();
|
||||
m_keyfileData.clear();
|
||||
}
|
||||
|
||||
void KeePass1Key::setPassword(const QByteArray& password)
|
||||
{
|
||||
m_password = password;
|
||||
}
|
||||
|
||||
void KeePass1Key::setKeyfileData(const QByteArray& keyfileData)
|
||||
{
|
||||
m_keyfileData = keyfileData;
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue