You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1338 lines
37 KiB
1338 lines
37 KiB
/***************************************************************************
|
|
* Copyright (C) 2005 by Tarek Saidi *
|
|
* tarek@linux *
|
|
* *
|
|
* This program is free software; you can redistribute it and/or modify *
|
|
* it under the terms of the GNU General Public License as published by *
|
|
* the Free Software Foundation; either version 2 of the License, or *
|
|
* (at your option) any later version. *
|
|
* *
|
|
* This program is distributed in the hope that it will be useful, *
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of *
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
|
|
* GNU General Public License for more details. *
|
|
* *
|
|
* You should have received a copy of the GNU General Public License *
|
|
* along with this program; if not, write to the *
|
|
* Free Software Foundation, Inc., *
|
|
* 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. *
|
|
***************************************************************************/
|
|
|
|
#include "global.h"
|
|
#include <iostream>
|
|
#include <time.h>
|
|
#include <qfile.h>
|
|
#include <qstringlist.h>
|
|
#include <qobject.h>
|
|
#include <qdatetime.h>
|
|
#include <QSysInfo>
|
|
#include "crypto/sha256.h"
|
|
#include "crypto/rijndael.h"
|
|
#include "crypto/twoclass.h"
|
|
#include "lib/random.h"
|
|
using namespace std;
|
|
#include "PwManager.h"
|
|
|
|
QString PwDatabase::getError(){
|
|
if(Errors.size()){
|
|
QString r=Errors.front();
|
|
Errors.pop_front();
|
|
return r;
|
|
}
|
|
else return QString(trUtf8("unbekannter Fehler"));
|
|
}
|
|
|
|
QString PwDatabase::getErrors(){
|
|
QString r;
|
|
for(int i=0; i<Errors.size(); i++){
|
|
r+=Errors[i];
|
|
r+='\n';
|
|
}
|
|
Errors.clear();
|
|
return r;
|
|
}
|
|
|
|
QList<int> PwDatabase::getChildIds(CGroup* group){
|
|
if(!group)return QList<int>();
|
|
int GroupIndex=Groups.indexOf(*group);
|
|
int i;
|
|
QList<int> ids;
|
|
for(i=GroupIndex+1; i<Groups.size(); i++){
|
|
ids << Groups[i].ID;
|
|
if(Groups[i].Level <= group->Level) break;
|
|
}
|
|
return ids;
|
|
}
|
|
|
|
bool PwDatabase::loadDatabase(QString _filename, QString& err){
|
|
unsigned long total_size,crypto_size;
|
|
Q_UINT32 Signature1,Signature2,Version,NumGroups,NumEntries,Flags;
|
|
Q_UINT8 TrafoRandomSeed[32];
|
|
Q_UINT8 FinalRandomSeed[16];
|
|
Q_UINT8 ContentsHash[32];
|
|
Q_UINT8 EncryptionIV[16];
|
|
|
|
filename=_filename;
|
|
QFile file(filename);
|
|
file.open(QIODevice::ReadOnly);
|
|
total_size=file.size();
|
|
char* buffer = new char[total_size];
|
|
file.readBlock(buffer,total_size);
|
|
file.close();
|
|
|
|
if(total_size < DB_HEADER_SIZE){
|
|
err=trUtf8("Unerwartete Dateigröße (Dateigröße < DB_HEADER_SIZE)");
|
|
return false; }
|
|
|
|
memcpyFromLEnd32(&Signature1,buffer);
|
|
memcpyFromLEnd32(&Signature2,buffer+4);
|
|
memcpyFromLEnd32(&Flags,buffer+8);
|
|
memcpyFromLEnd32(&Version,buffer+12);
|
|
memcpy(FinalRandomSeed,buffer+16,16);
|
|
memcpy(EncryptionIV,buffer+32,16);
|
|
memcpyFromLEnd32(&NumGroups,buffer+48);
|
|
memcpyFromLEnd32(&NumEntries,buffer+52);
|
|
memcpy(ContentsHash,buffer+56,32);
|
|
memcpy(TrafoRandomSeed,buffer+88,32);
|
|
memcpyFromLEnd32(&KeyEncRounds,buffer+120);
|
|
|
|
if((Signature1!=PWM_DBSIG_1) || (Signature2!=PWM_DBSIG_2)){
|
|
err=trUtf8("Falsche Signatur");
|
|
return false;}
|
|
|
|
|
|
if((Version & 0xFFFFFF00) != (PWM_DBVER_DW & 0xFFFFFF00)){
|
|
err=trUtf8("Nicht unterstüzte Dateiversion");
|
|
return false;}
|
|
|
|
if(Flags & PWM_FLAG_RIJNDAEL) CryptoAlgorithmus = ALGO_AES;
|
|
else if(Flags & PWM_FLAG_TWOFISH) CryptoAlgorithmus = ALGO_TWOFISH;
|
|
else {
|
|
err=trUtf8("Unbekannter Verschlüsselungsalgorithmus");
|
|
return false;
|
|
}
|
|
|
|
transformKey(MasterKey,TransformedMasterKey,TrafoRandomSeed,KeyEncRounds);
|
|
Q_UINT8 FinalKey[32];
|
|
sha256_context sha32;
|
|
sha256_starts(&sha32);
|
|
sha256_update(&sha32,FinalRandomSeed, 16);
|
|
sha256_update(&sha32,TransformedMasterKey, 32);
|
|
sha256_finish(&sha32,FinalKey);
|
|
|
|
if(CryptoAlgorithmus == ALGO_AES)
|
|
{
|
|
Rijndael aes;
|
|
// Initialize Rijndael algorithm
|
|
if(aes.init(Rijndael::CBC, Rijndael::Decrypt, FinalKey,
|
|
Rijndael::Key32Bytes, EncryptionIV) != RIJNDAEL_SUCCESS)
|
|
{err=trUtf8("AES-Initialisierung fehlgeschlagen");
|
|
return false;}
|
|
// Decrypt! The first bytes aren't encrypted (that's the header)
|
|
crypto_size = (unsigned long)aes.padDecrypt((Q_UINT8 *)buffer + DB_HEADER_SIZE,
|
|
total_size - DB_HEADER_SIZE, (Q_UINT8 *)buffer + DB_HEADER_SIZE);
|
|
}
|
|
else if(CryptoAlgorithmus == ALGO_TWOFISH)
|
|
{
|
|
CTwofish twofish;
|
|
if(twofish.init(FinalKey, 32, EncryptionIV) != true){return false;}
|
|
crypto_size = (unsigned long)twofish.padDecrypt((Q_UINT8 *)buffer + DB_HEADER_SIZE,
|
|
total_size - DB_HEADER_SIZE, (Q_UINT8 *)buffer + DB_HEADER_SIZE);
|
|
}
|
|
|
|
if((crypto_size > 2147483446) || (crypto_size == 0)){err=trUtf8("Entschlüsselung nicht möglich - der Schlüssel ist falsch oder die Datei beschädigt."); return false;}
|
|
|
|
sha256_starts(&sha32);
|
|
sha256_update(&sha32,(unsigned char *)buffer + DB_HEADER_SIZE,crypto_size);
|
|
sha256_finish(&sha32,(unsigned char *)FinalKey);
|
|
|
|
if(memcmp(ContentsHash, FinalKey, 32) != 0)
|
|
{
|
|
err=trUtf8("Hash-Test fehlgeschlage: der Schlüssl ist falsch oder die Datei ist beschädigt.");
|
|
return false;}
|
|
|
|
|
|
unsigned long tmp_id=0;
|
|
unsigned long pos = DB_HEADER_SIZE;
|
|
Q_UINT16 FieldType;
|
|
Q_UINT32 FieldSize;
|
|
char* pField;
|
|
bool bRet;
|
|
CGroup group;
|
|
|
|
for(unsigned long CurGroup = 0; CurGroup < NumGroups; )
|
|
{
|
|
pField = buffer+pos;
|
|
|
|
memcpyFromLEnd16(&FieldType, pField);
|
|
pField += 2; pos += 2;
|
|
if(pos >= total_size) {
|
|
return false; }
|
|
|
|
memcpyFromLEnd32(&FieldSize, pField);
|
|
pField += 4; pos += 4;
|
|
if(pos >= (total_size + FieldSize)) {
|
|
return false;}
|
|
|
|
bRet = group.ReadGroupField(FieldType, FieldSize, (Q_UINT8 *)pField);
|
|
if((FieldType == 0xFFFF) && (bRet == true)){
|
|
Groups << group;
|
|
CurGroup++;} // Now and ONLY now the counter gets increased
|
|
|
|
pField += FieldSize;
|
|
pos += FieldSize;
|
|
if(pos >= total_size) { return false;}
|
|
}
|
|
|
|
CEntry entry;
|
|
|
|
for(unsigned long CurEntry = 0; CurEntry < NumEntries;)
|
|
{
|
|
pField = buffer+pos;
|
|
|
|
memcpyFromLEnd16(&FieldType, pField);
|
|
pField += 2; pos += 2;
|
|
if(pos >= total_size){
|
|
return false;}
|
|
|
|
memcpyFromLEnd32(&FieldSize, pField);
|
|
pField += 4; pos += 4;
|
|
if(pos >= (total_size + FieldSize)) {
|
|
return false; }
|
|
|
|
bRet = entry.ReadEntryField(FieldType,FieldSize,(Q_UINT8*)pField);
|
|
|
|
if((FieldType == 0xFFFF) && (bRet == true)){
|
|
entry.sID=tmp_id++;
|
|
Entries << entry;
|
|
CurEntry++;} // Now and ONLY now the counter gets increased
|
|
|
|
pField += FieldSize;
|
|
pos += FieldSize;
|
|
if(pos >= total_size) {
|
|
return false; }
|
|
}
|
|
|
|
unsigned long CurGID, g, e, z, num;
|
|
delete [] buffer;
|
|
|
|
for(int i=0;i<Entries.size();i++){
|
|
if(IsMetaStream(Entries[i])==true){
|
|
if(!parseMetaStream(Entries[i]))
|
|
UnkownMetaStreams << Entries[i];
|
|
deleteEntry(&Entries[i]);
|
|
i--;
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
bool PwDatabase::parseMetaStream(const CEntry& entry){
|
|
//return true for known MetaStreams
|
|
return false;
|
|
}
|
|
|
|
void PwDatabase::transformKey(Q_UINT8* src,Q_UINT8* dst,Q_UINT8* KeySeed,int rounds){
|
|
Q_UINT8* tmp=new Q_UINT8[32];
|
|
Rijndael rijndael;
|
|
sha256_context sha2;
|
|
if(rijndael.init(Rijndael::ECB, Rijndael::Encrypt, (const Q_UINT8 *)KeySeed,
|
|
Rijndael::Key32Bytes, 0) != RIJNDAEL_SUCCESS){
|
|
cout << QString("unexpected error in %1, line %2").arg(__FILE__).arg(__LINE__).ascii() << endl;
|
|
exit(1);}
|
|
|
|
memcpy(tmp,src,32);
|
|
for(int i=0;i<rounds;i++){
|
|
rijndael.blockEncrypt((const Q_UINT8 *)tmp, 256, (Q_UINT8 *)tmp);
|
|
}
|
|
|
|
sha256_starts(&sha2);
|
|
sha256_update(&sha2,tmp,32);
|
|
sha256_finish(&sha2,tmp);
|
|
|
|
memcpy(dst,tmp,32);
|
|
delete [] tmp;
|
|
}
|
|
|
|
bool PwDatabase::CalcMasterKeyByPassword(QString& Password){
|
|
|
|
unsigned long KeyLen, FileSize, Read;
|
|
sha256_context sha32;
|
|
char *paKey = NULL;
|
|
|
|
if(Password == QString::null) return false;
|
|
|
|
paKey = new char[Password.length() + 1];
|
|
if(paKey == NULL) return false;
|
|
strcpy(paKey, Password);
|
|
|
|
|
|
|
|
if(paKey == NULL) return false;
|
|
|
|
KeyLen = strlen(paKey);
|
|
|
|
if(KeyLen == 0) {
|
|
SecString::overwrite((unsigned char*)paKey,Password.length() + 1);
|
|
delete [] paKey;
|
|
return false; }
|
|
|
|
sha256_starts(&sha32);
|
|
sha256_update(&sha32,(unsigned char*) paKey, KeyLen);
|
|
sha256_finish(&sha32,MasterKey);
|
|
SecString::overwrite((unsigned char*)paKey,Password.length() + 1);
|
|
delete [] paKey;
|
|
return true;
|
|
}
|
|
|
|
|
|
bool PwDatabase::CalcMasterKeyByFile(QString filename){
|
|
|
|
QFile file(filename);
|
|
if(file.open(QIODevice::ReadOnly) == false) return false;
|
|
unsigned long FileSize=file.size();
|
|
|
|
if(FileSize == 32){
|
|
if(file.readBlock((char*)MasterKey,32) != 32){
|
|
file.close();
|
|
return false;}
|
|
}
|
|
else if(FileSize == 64){
|
|
char hex[64];
|
|
if(file.readBlock(hex,64) != 64){
|
|
file.close();
|
|
return false;}
|
|
file.close();
|
|
if(!convHexToBinaryKey(hex,(char*)MasterKey)) return false;
|
|
|
|
}
|
|
else
|
|
{
|
|
sha256_context sha32;
|
|
sha256_starts(&sha32);
|
|
unsigned char* buffer = new unsigned char[2048];
|
|
while(1)
|
|
{
|
|
unsigned long read=file.readBlock((char*)buffer,2048);
|
|
if(read == 0) break;
|
|
sha256_update(&sha32,buffer,read);
|
|
if(read != 2048) break;
|
|
}
|
|
sha256_finish(&sha32,MasterKey);
|
|
delete [] buffer;
|
|
}
|
|
|
|
file.close();
|
|
return true;
|
|
}
|
|
|
|
|
|
void PwDatabase::addEntry(CEntry* NewEntry){
|
|
CEntry *entry=addEntry();
|
|
*entry=*NewEntry;
|
|
}
|
|
|
|
|
|
CEntry* PwDatabase::addEntry(){
|
|
CEntry NewEntry;
|
|
if(Entries.size()==0){
|
|
NewEntry.sID=0;
|
|
getRandomBytes(&NewEntry.ID,16,1,false);
|
|
}
|
|
else {
|
|
NewEntry.sID=Entries.back().sID+1;
|
|
while(1){
|
|
bool used=false;
|
|
getRandomBytes(&NewEntry.ID,16,1,false);
|
|
for(int j=0;j<Entries.size();j++){
|
|
int k;
|
|
for(k=0;k<16;k++){if(Entries[j].ID[k]!=NewEntry.ID[k])k=0;break;}
|
|
if(k==15)used=true;}
|
|
if(used==false)break;
|
|
}}
|
|
Entries.push_back(NewEntry);
|
|
return &Entries.back();
|
|
}
|
|
|
|
|
|
bool PwDatabase::CalcMasterKeyByFileAndPw(QString filename, QString& Password){
|
|
Q_UINT8* FileKey;
|
|
Q_UINT8* PasswordKey;
|
|
PasswordKey=new Q_UINT8[32];
|
|
FileKey=new Q_UINT8[32];
|
|
sha256_context sha32;
|
|
/////////////////////////
|
|
QFile file(filename);
|
|
if(file.open(QIODevice::ReadOnly) == false) return false;
|
|
unsigned long FileSize=file.size();
|
|
if(FileSize == 32){
|
|
if(file.readBlock((char*)FileKey,32) != 32){
|
|
file.close();
|
|
return false;}
|
|
}
|
|
else if(FileSize == 64){
|
|
char hex[64];
|
|
if(file.readBlock(hex,64) != 64){
|
|
file.close();
|
|
return false;}
|
|
file.close();
|
|
if(!convHexToBinaryKey(hex,(char*)FileKey)) return false;
|
|
|
|
}
|
|
else{
|
|
sha256_starts(&sha32);
|
|
unsigned char* buffer = new unsigned char[2048];
|
|
while(1)
|
|
{
|
|
unsigned long read=file.readBlock((char*)buffer,2048);
|
|
if(read == 0) break;
|
|
sha256_update(&sha32,buffer,read);
|
|
if(read != 2048) break;
|
|
}
|
|
sha256_finish(&sha32,FileKey);
|
|
delete [] buffer;
|
|
}
|
|
file.close();
|
|
|
|
//////////////////////
|
|
|
|
unsigned long KeyLen;
|
|
char *paKey = NULL;
|
|
if(Password == QString::null) return false;
|
|
paKey = new char[Password.length() + 1];
|
|
if(paKey == NULL) return false;
|
|
strcpy(paKey, Password);
|
|
if(paKey == NULL) return false;
|
|
KeyLen = strlen(paKey);
|
|
if(KeyLen == 0) {
|
|
delete [] paKey;
|
|
return false; }
|
|
sha256_starts(&sha32);
|
|
sha256_update(&sha32,(unsigned char*) paKey, KeyLen);
|
|
sha256_finish(&sha32,PasswordKey);
|
|
delete [] paKey;
|
|
////////////////////
|
|
sha256_starts(&sha32);
|
|
sha256_update(&sha32,(unsigned char*)PasswordKey,32);
|
|
sha256_update(&sha32,(unsigned char*)FileKey,32);
|
|
sha256_finish(&sha32,MasterKey);
|
|
delete[] PasswordKey;
|
|
delete[] FileKey;
|
|
}
|
|
|
|
void PwDatabase::deleteEntry(CEntry* entry){
|
|
Entries.removeAt(Entries.indexOf(*entry));
|
|
}
|
|
|
|
bool PwDatabase::IsMetaStream(CEntry& p){
|
|
|
|
if(p.BinaryData.isNull()) return false;
|
|
if(p.Additional == "") return false;
|
|
if(p.BinaryDesc == "") return false;
|
|
if(p.BinaryDesc != "bin-stream") return false;
|
|
if(p.Title == "") return false;
|
|
if(p.Title != "Meta-Info") return false;
|
|
if(p.UserName == "") return false;
|
|
if(p.UserName != "SYSTEM") return false;
|
|
if(p.URL == "") return false;
|
|
if(p.URL != "$") return false;
|
|
if(p.ImageID != 0) return false;
|
|
return true;
|
|
}
|
|
|
|
|
|
|
|
void PwDatabase::moveEntry(CEntry* entry,CGroup* dst){
|
|
entry->GroupID=dst->ID;
|
|
}
|
|
|
|
|
|
CEntry* PwDatabase::cloneEntry(CEntry* entry){
|
|
CEntry *Dolly=addEntry();
|
|
Q_UINT8 ID[16];
|
|
Q_UINT32 sid=Dolly->sID;
|
|
memcpy(ID,Dolly->ID,16);
|
|
*Dolly=*entry;
|
|
Dolly->sID=sid;
|
|
memcpy(Dolly->ID,ID,16);
|
|
return Dolly;
|
|
}
|
|
|
|
|
|
bool CGroup::ReadGroupField(Q_UINT16 FieldType, Q_UINT32 FieldSize, Q_UINT8 *pData)
|
|
{
|
|
|
|
switch(FieldType)
|
|
{
|
|
case 0x0000:
|
|
// Ignore field
|
|
break;
|
|
case 0x0001:
|
|
memcpyFromLEnd32(&ID, (char*)pData);
|
|
break;
|
|
case 0x0002:
|
|
//Name.fromUtf8((char*)pData);
|
|
Name=QString::fromUtf8((char*)pData);
|
|
break;
|
|
case 0x0003:
|
|
Creation=dateFromPackedStruct5(pData);
|
|
break;
|
|
case 0x0004:
|
|
LastMod=dateFromPackedStruct5(pData);
|
|
break;
|
|
case 0x0005:
|
|
LastAccess=dateFromPackedStruct5(pData);
|
|
break;
|
|
case 0x0006:
|
|
Expire=dateFromPackedStruct5(pData);
|
|
break;
|
|
case 0x0007:
|
|
memcpyFromLEnd32(&ImageID, (char*)pData);
|
|
break;
|
|
case 0x0008:
|
|
memcpyFromLEnd16(&Level, (char*)pData);
|
|
break;
|
|
case 0x0009:
|
|
memcpyFromLEnd32(&Flags, (char*)pData);
|
|
break;
|
|
case 0xFFFF:
|
|
break;
|
|
default:
|
|
return false; // Field unsupported
|
|
}
|
|
|
|
return true; // Field supported
|
|
}
|
|
|
|
PwDatabase::PwDatabase(){
|
|
SearchGroupID=-1;
|
|
}
|
|
|
|
PwDatabase::~PwDatabase(){
|
|
|
|
}
|
|
|
|
|
|
bool CEntry::ReadEntryField(Q_UINT16 FieldType, Q_UINT32 FieldSize, Q_UINT8 *pData){
|
|
|
|
|
|
switch(FieldType)
|
|
{
|
|
case 0x0000:
|
|
// Ignore field
|
|
break;
|
|
case 0x0001:
|
|
memcpy(ID, pData, 16);
|
|
break;
|
|
case 0x0002:
|
|
memcpyFromLEnd32(&GroupID, (char*)pData);
|
|
break;
|
|
case 0x0003:
|
|
memcpyFromLEnd32(&ImageID, (char*)pData);
|
|
break;
|
|
case 0x0004:
|
|
Title=QString::fromUtf8((char*)pData);
|
|
break;
|
|
case 0x0005:
|
|
URL=QString::fromUtf8((char*)pData);
|
|
break;
|
|
case 0x0006:
|
|
UserName=QString::fromUtf8((char*)pData);
|
|
break;
|
|
case 0x0007:{
|
|
QString s=QString::fromUtf8((char*)pData);
|
|
Password.setString(s,true);
|
|
break;}
|
|
case 0x0008:
|
|
Additional=QString::fromUtf8((char*)pData);
|
|
break;
|
|
case 0x0009:
|
|
Creation=dateFromPackedStruct5(pData);
|
|
break;
|
|
case 0x000A:
|
|
LastMod=dateFromPackedStruct5(pData);
|
|
break;
|
|
case 0x000B:
|
|
LastAccess=dateFromPackedStruct5(pData);
|
|
break;
|
|
case 0x000C:
|
|
Expire=dateFromPackedStruct5(pData);
|
|
break;
|
|
case 0x000D:
|
|
BinaryDesc=(char*)pData;
|
|
break;
|
|
case 0x000E:
|
|
if(FieldSize != 0)
|
|
BinaryData=QByteArray((char*)pData,FieldSize);
|
|
else
|
|
BinaryData=QByteArray(); //=NULL
|
|
break;
|
|
case 0xFFFF:
|
|
break;
|
|
default:
|
|
return false; // Field unsupported
|
|
}
|
|
|
|
return true; // Field processed
|
|
}
|
|
|
|
bool PwDatabase::closeDatabase(){
|
|
Groups.clear();
|
|
Entries.clear();
|
|
return true;
|
|
}
|
|
|
|
bool PwDatabase::saveDatabase(){
|
|
CGroup SearchGroup;
|
|
Q_UINT32 NumGroups,NumEntries,Signature1,Signature2,Flags,Version;
|
|
Q_UINT8 TrafoRandomSeed[32];
|
|
Q_UINT8 FinalRandomSeed[16];
|
|
Q_UINT8 ContentsHash[32];
|
|
Q_UINT8 EncryptionIV[16];
|
|
|
|
if(filename==QString::null)return false;
|
|
QFile file(filename);
|
|
unsigned int FileSize;
|
|
|
|
Entries+=UnkownMetaStreams; ///@FIXME ID conflicts???
|
|
|
|
FileSize=DB_HEADER_SIZE;
|
|
// Get the size of all groups (94 Byte + length of the name string)
|
|
for(int i = 0; i < Groups.size(); i++){
|
|
FileSize += 94 + Groups[i].Name.utf8().length()+1;
|
|
}
|
|
// Get the size of all entries
|
|
for(int i = 0; i < Entries.size(); i++){
|
|
FileSize += 134
|
|
+Entries[i].Title.utf8().length()+1
|
|
+Entries[i].UserName.utf8().length()+1
|
|
+Entries[i].URL.utf8().length()+1
|
|
+Entries[i].Password.length()+1
|
|
+Entries[i].Additional.utf8().length()+1
|
|
+Entries[i].BinaryDesc.utf8().length()+1
|
|
+Entries[i].BinaryData.length();}
|
|
// Round up filesize to 16-byte boundary for Rijndael/Twofish
|
|
FileSize = (FileSize + 16) - (FileSize % 16);
|
|
char* buffer=new char[FileSize+16];
|
|
|
|
|
|
Signature1 = PWM_DBSIG_1;
|
|
Signature2 = PWM_DBSIG_2;
|
|
Flags = PWM_FLAG_SHA2;
|
|
if(CryptoAlgorithmus == ALGO_AES) Flags |= PWM_FLAG_RIJNDAEL;
|
|
else if(CryptoAlgorithmus == ALGO_TWOFISH) Flags |= PWM_FLAG_TWOFISH;
|
|
Version = PWM_DBVER_DW;
|
|
NumGroups = Groups.size(); //-> (+MetaStreams)
|
|
NumEntries = Entries.size();
|
|
|
|
getRandomBytes(FinalRandomSeed,1,16,false);
|
|
getRandomBytes(TrafoRandomSeed,1,32,false);
|
|
getRandomBytes(EncryptionIV,1,16,false);
|
|
|
|
Q_UINT16 FieldType;
|
|
Q_UINT32 FieldSize;
|
|
int pos=DB_HEADER_SIZE; // Skip the header, it will be written later
|
|
|
|
for(int i=0; i < Groups.size(); i++){
|
|
FieldType = 0x0001; FieldSize = 4;
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
memcpyToLEnd32(buffer+pos, &Groups[i].ID); pos += 4;
|
|
|
|
FieldType = 0x0002; FieldSize = Groups[i].Name.utf8().length() + 1;
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
memcpy(buffer+pos, Groups[i].Name.utf8(),FieldSize); pos += FieldSize;
|
|
|
|
FieldType = 0x0003; FieldSize = 5;
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
dateToPackedStruct5(Groups[i].Creation,(unsigned char*)buffer+pos); pos += 5;
|
|
|
|
FieldType = 0x0004; FieldSize = 5;
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
dateToPackedStruct5(Groups[i].LastMod,(unsigned char*)buffer+pos);pos += 5;
|
|
|
|
FieldType = 0x0005; FieldSize = 5;
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
dateToPackedStruct5(Groups[i].LastAccess,(unsigned char*)buffer+pos);pos += 5;
|
|
|
|
FieldType = 0x0006; FieldSize = 5;
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
dateToPackedStruct5(Groups[i].Expire,(unsigned char*)buffer+pos);pos += 5;
|
|
|
|
FieldType = 0x0007; FieldSize = 4;
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
memcpyToLEnd32(buffer+pos, &Groups[i].ImageID); pos += 4;
|
|
|
|
FieldType = 0x0008; FieldSize = 2;
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
memcpyToLEnd16(buffer+pos, &Groups[i].Level); pos += 2;
|
|
|
|
FieldType = 0x0009; FieldSize = 4;
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
memcpyToLEnd32(buffer+pos, &Groups[i].Flags); pos += 4;
|
|
|
|
FieldType = 0xFFFF; FieldSize = 0;
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
}
|
|
|
|
for(int i = 0; i < Entries.size(); i++){
|
|
FieldType = 0x0001; FieldSize = 16;
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
memcpy(buffer+pos, &Entries[i].ID, 16); pos += 16;
|
|
|
|
FieldType = 0x0002; FieldSize = 4;
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
memcpyToLEnd32(buffer+pos, &Entries[i].GroupID); pos += 4;
|
|
|
|
FieldType = 0x0003; FieldSize = 4;
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
memcpyToLEnd32(buffer+pos, &Entries[i].ImageID); pos += 4;
|
|
|
|
|
|
FieldType = 0x0004;
|
|
FieldSize = Entries[i].Title.utf8().length() + 1; // Add terminating NULL character space
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
memcpy(buffer+pos, Entries[i].Title.utf8(),FieldSize); pos += FieldSize;
|
|
|
|
FieldType = 0x0005;
|
|
FieldSize = Entries[i].URL.utf8().length() + 1; // Add terminating NULL character space
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
memcpy(buffer+pos, Entries[i].URL.utf8(),FieldSize); pos += FieldSize;
|
|
|
|
FieldType = 0x0006;
|
|
FieldSize = Entries[i].UserName.utf8().length() + 1; // Add terminating NULL character space
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
memcpy(buffer+pos, Entries[i].UserName.utf8(),FieldSize); pos += FieldSize;
|
|
|
|
FieldType = 0x0007;
|
|
FieldSize = Entries[i].Password.length() + 1; // Add terminating NULL character space
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
Entries[i].Password.unlock();
|
|
memcpy(buffer+pos, Entries[i].Password.string(),FieldSize); pos += FieldSize;
|
|
Entries[i].Password.lock();
|
|
|
|
FieldType = 0x0008;
|
|
FieldSize = Entries[i].Additional.utf8().length() + 1; // Add terminating NULL character space
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
memcpy(buffer+pos, Entries[i].Additional.utf8(),FieldSize); pos += FieldSize;
|
|
|
|
FieldType = 0x0009; FieldSize = 5;
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
dateToPackedStruct5(Entries[i].Creation,(unsigned char*)buffer+pos); pos+=5;
|
|
|
|
|
|
FieldType = 0x000A; FieldSize = 5;
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
dateToPackedStruct5(Entries[i].LastMod,(unsigned char*)buffer+pos); pos+=5;
|
|
|
|
FieldType = 0x000B; FieldSize = 5;
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
dateToPackedStruct5(Entries[i].LastAccess,(unsigned char*)buffer+pos); pos+=5;
|
|
|
|
FieldType = 0x000C; FieldSize = 5;
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
dateToPackedStruct5(Entries[i].Expire,(unsigned char*)buffer+pos); pos+=5;
|
|
|
|
FieldType = 0x000D;
|
|
FieldSize = Entries[i].BinaryDesc.utf8().length() + 1; // Add terminating NULL character space
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
memcpy(buffer+pos, Entries[i].BinaryDesc.utf8(),FieldSize); pos += FieldSize;
|
|
|
|
FieldType = 0x000E; FieldSize = Entries[i].BinaryData.length();
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
if((!Entries[i].BinaryData.isNull()) && (FieldSize != 0))
|
|
memcpy(buffer+pos, Entries[i].BinaryData.data(), FieldSize);
|
|
pos += FieldSize;
|
|
|
|
FieldType = 0xFFFF; FieldSize = 0;
|
|
memcpyToLEnd16(buffer+pos, &FieldType); pos += 2;
|
|
memcpyToLEnd32(buffer+pos, &FieldSize); pos += 4;
|
|
}
|
|
sha256_context context;
|
|
sha256_starts(&context);
|
|
sha256_update(&context,(unsigned char*)buffer+DB_HEADER_SIZE, pos - DB_HEADER_SIZE);
|
|
sha256_finish(&context,(unsigned char*)ContentsHash);
|
|
memcpyToLEnd32(buffer,&Signature1);
|
|
memcpyToLEnd32(buffer+4,&Signature2);
|
|
memcpyToLEnd32(buffer+8,&Flags);
|
|
memcpyToLEnd32(buffer+12,&Version);
|
|
memcpy(buffer+16,FinalRandomSeed,16);
|
|
memcpy(buffer+32,EncryptionIV,16);
|
|
memcpyToLEnd32(buffer+48,&NumGroups);
|
|
memcpyToLEnd32(buffer+52,&NumEntries);
|
|
memcpy(buffer+56,ContentsHash,32);
|
|
memcpy(buffer+88,TrafoRandomSeed,32);
|
|
memcpyToLEnd32(buffer+120,&KeyEncRounds);
|
|
transformKey(MasterKey,TransformedMasterKey,TrafoRandomSeed,KeyEncRounds);
|
|
Q_UINT8 FinalKey[32];
|
|
sha256_starts(&context);
|
|
sha256_update(&context,FinalRandomSeed, 16);
|
|
sha256_update(&context,TransformedMasterKey, 32);
|
|
sha256_finish(&context,FinalKey);
|
|
|
|
unsigned long EncryptedPartSize;
|
|
|
|
if(CryptoAlgorithmus == ALGO_AES){
|
|
Rijndael aes;
|
|
// Initialize Rijndael/AES
|
|
if(aes.init(Rijndael::CBC, Rijndael::Encrypt, FinalKey,Rijndael::Key32Bytes, EncryptionIV) != RIJNDAEL_SUCCESS){
|
|
//TODO:ERR_MSG
|
|
delete [] buffer;
|
|
return false;}
|
|
EncryptedPartSize = (unsigned long)aes.padEncrypt((Q_UINT8*)buffer+DB_HEADER_SIZE,
|
|
pos - DB_HEADER_SIZE,
|
|
(Q_UINT8*)buffer+DB_HEADER_SIZE);
|
|
}else if(CryptoAlgorithmus == ALGO_TWOFISH){
|
|
CTwofish twofish;
|
|
if(twofish.init(FinalKey, 32, EncryptionIV) == false){
|
|
//TODO:ERR_MSG
|
|
delete [] buffer;
|
|
return false;}
|
|
EncryptedPartSize = (unsigned long)twofish.padEncrypt((Q_UINT8*)buffer+DB_HEADER_SIZE,
|
|
pos - DB_HEADER_SIZE,
|
|
(Q_UINT8*)buffer+DB_HEADER_SIZE);
|
|
}
|
|
if((EncryptedPartSize > 2147483446) || (EncryptedPartSize == 0)){
|
|
//TODO:ERR_MSG
|
|
delete [] buffer;
|
|
return false;
|
|
}
|
|
|
|
if(file.open(QIODevice::ReadWrite | QIODevice::Truncate)==false){
|
|
//TODO:ERR_MSG
|
|
delete [] buffer;
|
|
return false;
|
|
}
|
|
|
|
if(file.writeBlock(buffer,EncryptedPartSize+DB_HEADER_SIZE)!=EncryptedPartSize+DB_HEADER_SIZE){
|
|
//TODO:ERR_MSG
|
|
file.close();
|
|
delete [] buffer;
|
|
return false;
|
|
}
|
|
|
|
file.close();
|
|
delete [] buffer;
|
|
if(SearchGroupID!=-1)Groups.push_back(SearchGroup);
|
|
return true;
|
|
}
|
|
|
|
|
|
CGroup* PwDatabase::addGroup(CGroup* parent){
|
|
CGroup group;
|
|
if(parent)group.Level=parent->Level+1;
|
|
group.ImageID=0;
|
|
group.ID=getNewGroupId();
|
|
|
|
if(!Groups.size() || !parent){
|
|
Groups << group;
|
|
return &Groups.back();
|
|
}
|
|
else { int i=Groups.indexOf(*parent)+1;
|
|
for(i;i<Groups.size();i++)
|
|
if(Groups[i].Level<=parent->Level)break;
|
|
Groups.insert(i,group);
|
|
return &Groups[i];}
|
|
}
|
|
|
|
|
|
void PwDatabase::deleteGroup(unsigned long id){
|
|
for(int i=0;i<Groups.size();i++){
|
|
if(Groups[i].ID==id) return deleteGroup(&Groups[i]);
|
|
}
|
|
}
|
|
|
|
void PwDatabase::deleteGroup(CGroup* group){
|
|
int GroupIndex=Groups.indexOf(*group);
|
|
int NumChilds;
|
|
|
|
int i;
|
|
for(i=GroupIndex+1; i<Groups.size(); i++){
|
|
if(Groups[i].Level<=group->Level)break;
|
|
}
|
|
NumChilds=i-GroupIndex-1;
|
|
//delete entries
|
|
for(i=GroupIndex; i<=GroupIndex+NumChilds; i++){
|
|
for(int j=0; j<Entries.size();){
|
|
if(Entries[j].GroupID==Groups[i].ID)
|
|
deleteEntry(&Entries[j]);
|
|
else
|
|
j++;
|
|
}
|
|
}
|
|
|
|
for(i=NumChilds; i>=0; i--){
|
|
Groups.removeAt(GroupIndex+i);
|
|
}
|
|
|
|
}
|
|
|
|
|
|
int PwDatabase::getGroupIndex(CGroup* g){
|
|
return getGroupIndex(g->ID);
|
|
}
|
|
|
|
|
|
int PwDatabase::getGroupIndex(unsigned long ID){
|
|
int i=0;
|
|
for(i;i<Groups.size();i++){
|
|
if(Groups[i].ID==ID)break;
|
|
}
|
|
return i;
|
|
}
|
|
|
|
|
|
void PwDatabase::merge(PwDatabase* db){
|
|
for(int i=0;i<db->Groups.size();i++){
|
|
int NewGroupID;
|
|
if(isGroupIdInUse(db->Groups[i].ID)==true) NewGroupID=getNewGroupId();
|
|
else NewGroupID=db->Groups[i].ID;
|
|
for(int j=0;j<db->Entries.size();j++){
|
|
if(db->Entries[j].GroupID==db->Groups[i].ID){
|
|
Entries.push_back(db->Entries[j]);
|
|
Entries.back().GroupID=NewGroupID;
|
|
Entries.back().sID=getNewEntrySid();}
|
|
}
|
|
Groups.push_back(db->Groups[i]);
|
|
Groups.back().ID=NewGroupID;
|
|
}
|
|
}
|
|
|
|
bool PwDatabase::isGroupIdInUse(Q_UINT32 id){
|
|
for(int i=0;i<Groups.size();i++)
|
|
if(Groups[i].ID==id)return true;
|
|
|
|
return false;
|
|
}
|
|
|
|
bool PwDatabase::isEntrySidInUse(Q_UINT32 sid){
|
|
for(int i=0;i<Entries.size();i++)
|
|
if(Entries[i].sID==sid)return true;
|
|
|
|
return false;
|
|
}
|
|
|
|
bool PwDatabase::isParentGroup(CGroup* child, CGroup* parent){
|
|
if(child==parent)return true; //maybe a bad idea
|
|
int ChildIndex=getGroupIndex(child->ID);
|
|
int ParentIndex=getGroupIndex(parent->ID);
|
|
if(ParentIndex > ChildIndex) return false;
|
|
|
|
for(int i=ChildIndex; i>ParentIndex;i--){
|
|
if(Groups[i].Level<=parent->Level)return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
Q_UINT32 PwDatabase::getNewGroupId(){
|
|
Q_UINT32 id;
|
|
bool used;
|
|
while(1){
|
|
used=false;
|
|
getRandomBytes(&id,4,1,false);
|
|
if(!id)continue; //darf nicht 0 sein (KDB-Format v3)
|
|
for(int j=0;j<Groups.size();j++){
|
|
if(Groups[j].ID==id)used=true;}
|
|
if(used==false)break;}
|
|
return id;
|
|
}
|
|
|
|
Q_UINT32 PwDatabase::getNewEntrySid(){
|
|
Q_UINT32 sid;
|
|
while(1){
|
|
getRandomBytes(&sid,4,1,false);
|
|
if(!sid)continue;
|
|
if(!isEntrySidInUse(sid))break;
|
|
}
|
|
return sid;
|
|
}
|
|
|
|
bool PwDatabase::convHexToBinaryKey(char* HexKey, char* dst){
|
|
QString hex=QString::fromAscii(HexKey,64);
|
|
for(int i=0; i<64; i+=2){
|
|
bool err;
|
|
Q_UINT8 bin;
|
|
bin=hex.mid(i,2).toUInt(&err,16);
|
|
if(!err){
|
|
qWarning("Invalid Hex Key\n");
|
|
return false;}
|
|
memcpy(dst+(i/2),&bin,1);
|
|
}
|
|
}
|
|
|
|
void PwDatabase::moveGroup(CGroup* group, CGroup* DstGroup, int pos){
|
|
int NumSubGroups=0;
|
|
int GroupIndex=Groups.indexOf(*group);
|
|
int DstIndex;
|
|
int i;
|
|
for(i=GroupIndex+1; i<Groups.size(); i++){
|
|
if(Groups[i].Level <= group->Level) break;
|
|
}
|
|
NumSubGroups=i-GroupIndex-1;
|
|
|
|
int LevelDiff;
|
|
QList<CGroup> tmp;
|
|
|
|
if(DstGroup)
|
|
LevelDiff=DstGroup->Level - group->Level +1;
|
|
else
|
|
LevelDiff=-group->Level;
|
|
|
|
for(i=GroupIndex; i<=GroupIndex+NumSubGroups; i++){
|
|
tmp << Groups[i];
|
|
tmp.back().Level+=LevelDiff;
|
|
}
|
|
for(i=0; i<=NumSubGroups; i++)
|
|
Groups.removeAt(GroupIndex);
|
|
|
|
int NumParentSubGroups;
|
|
if(DstGroup){
|
|
DstIndex=Groups.indexOf(*DstGroup);
|
|
NumParentSubGroups=getNumberOfChilds(DstGroup);}
|
|
else{
|
|
DstIndex=0;
|
|
NumParentSubGroups=Groups.size();}
|
|
|
|
if(pos==-1)DstIndex+=(NumParentSubGroups+1);
|
|
else{ int n=0; //Counter for direct (first-level) childs
|
|
for(i=0; i<NumParentSubGroups;i++){
|
|
if(n==pos)break;
|
|
if(Groups[DstIndex+1+i].Level==DstGroup->Level+1)n++;
|
|
}
|
|
DstIndex+=(n+1);
|
|
}
|
|
|
|
for(i=NumSubGroups; i>=0; i--)
|
|
Groups.insert(DstIndex,tmp[i]);
|
|
}
|
|
|
|
void PwDatabase::moveGroupDirectly(CGroup* group, CGroup* DstGroup){
|
|
int NumSubGroups=getNumberOfChilds(group);
|
|
int GroupIndex=Groups.indexOf(*group);
|
|
int DstIndex, LevelDiff, i;
|
|
QList<CGroup> tmp;
|
|
|
|
if(DstGroup)
|
|
LevelDiff=DstGroup->Level - group->Level;
|
|
else
|
|
LevelDiff=-group->Level;
|
|
|
|
for(i=GroupIndex; i<=GroupIndex+NumSubGroups; i++){
|
|
tmp << Groups[i];
|
|
tmp.back().Level+=LevelDiff;
|
|
}
|
|
for(i=0; i<=NumSubGroups; i++)
|
|
Groups.removeAt(GroupIndex);
|
|
|
|
if(DstGroup)
|
|
DstIndex=Groups.indexOf(*DstGroup)+1;
|
|
else
|
|
DstIndex=0;
|
|
|
|
for(i=NumSubGroups; i>=0; i--)
|
|
Groups.insert(DstIndex,tmp[i]);
|
|
}
|
|
|
|
|
|
int PwDatabase::getNumberOfChilds(CGroup* group){
|
|
if(!group)return Groups.size();
|
|
int GroupIndex=Groups.indexOf(*group);
|
|
int i;
|
|
for(i=GroupIndex+1; i<Groups.size(); i++){
|
|
if(Groups[i].Level <= group->Level) break;
|
|
}
|
|
return (i-GroupIndex-1);
|
|
}
|
|
|
|
|
|
void memcpyFromLEnd32(Q_UINT32* dst,char* src){
|
|
|
|
if(QSysInfo::ByteOrder==QSysInfo::BigEndian){
|
|
memcpy(((char*)dst)+3,src+0,1);
|
|
memcpy(((char*)dst)+2,src+1,1);
|
|
memcpy(((char*)dst)+1,src+2,1);
|
|
memcpy(((char*)dst)+0,src+3,1);
|
|
}
|
|
else
|
|
memcpy(dst,src,4);
|
|
}
|
|
|
|
void memcpyFromLEnd16(Q_UINT16* dst,char* src){
|
|
|
|
if(QSysInfo::ByteOrder==QSysInfo::BigEndian){
|
|
memcpy(((char*)dst)+1,src+0,1);
|
|
memcpy(((char*)dst)+0,src+1,1);
|
|
}
|
|
else
|
|
memcpy(dst,src,2);
|
|
}
|
|
|
|
void memcpyToLEnd32(char* dst,Q_UINT32* src){
|
|
|
|
if(QSysInfo::ByteOrder==QSysInfo::BigEndian){
|
|
memcpy(dst+0,((char*)src)+3,1);
|
|
memcpy(dst+1,((char*)src)+2,1);
|
|
memcpy(dst+2,((char*)src)+1,1);
|
|
memcpy(dst+3,((char*)src)+0,1);
|
|
}
|
|
else
|
|
memcpy(dst,src,4);
|
|
}
|
|
|
|
void memcpyToLEnd16(char* dst,Q_UINT16* src){
|
|
|
|
if(QSysInfo::ByteOrder==QSysInfo::BigEndian){
|
|
memcpy(dst+0,((char*)src)+1,1);
|
|
memcpy(dst+1,((char*)src)+0,1);
|
|
}
|
|
else
|
|
memcpy(dst,src,2);
|
|
}
|
|
|
|
const QDateTime Date_Never(QDate(2999,12,28),QTime(23,59,59));
|
|
|
|
QDateTime dateFromPackedStruct5(const unsigned char* pBytes){
|
|
Q_UINT32 dw1, dw2, dw3, dw4, dw5;
|
|
dw1 = (Q_UINT32)pBytes[0]; dw2 = (Q_UINT32)pBytes[1]; dw3 = (Q_UINT32)pBytes[2];
|
|
dw4 = (Q_UINT32)pBytes[3]; dw5 = (Q_UINT32)pBytes[4];
|
|
int y = (dw1 << 6) | (dw2 >> 2);
|
|
int mon = ((dw2 & 0x00000003) << 2) | (dw3 >> 6);
|
|
int d = (dw3 >> 1) & 0x0000001F;
|
|
int h = ((dw3 & 0x00000001) << 4) | (dw4 >> 4);
|
|
int min = ((dw4 & 0x0000000F) << 2) | (dw5 >> 6);
|
|
int s = dw5 & 0x0000003F;
|
|
return QDateTime(QDate(y,mon,d),QTime(h,min,s));
|
|
}
|
|
|
|
|
|
void dateToPackedStruct5(const QDateTime& d,unsigned char* pBytes){
|
|
pBytes[0] = (Q_UINT8)(((Q_UINT32)d.date().year() >> 6) & 0x0000003F);
|
|
pBytes[1] = (Q_UINT8)((((Q_UINT32)d.date().year() & 0x0000003F) << 2) | (((Q_UINT32)d.date().month() >> 2) & 0x00000003));
|
|
pBytes[2] = (Q_UINT8)((((Q_UINT32)d.date().month() & 0x00000003) << 6) | (((Q_UINT32)d.date().day() & 0x0000001F) << 1) | (((Q_UINT32)d.time().hour() >> 4) & 0x00000001));
|
|
pBytes[3] = (Q_UINT8)((((Q_UINT32)d.time().hour() & 0x0000000F) << 4) | (((Q_UINT32)d.time().minute() >> 2) & 0x0000000F));
|
|
pBytes[4] = (Q_UINT8)((((Q_UINT32)d.time().minute() & 0x00000003) << 6) | ((Q_UINT32)d.time().second() & 0x0000003F));
|
|
}
|
|
|
|
|
|
class KPTestResults{
|
|
public:
|
|
KPTestResults(){passed=failed=0;}
|
|
int passed, failed;
|
|
};
|
|
|
|
/* assumes context of failed/passed variables */
|
|
#define kp_assert(results, x) \
|
|
do {\
|
|
if (x){\
|
|
(results).passed++;\
|
|
}else{\
|
|
(results).failed++;\
|
|
cout << __FILE__ << ":" << __LINE__ << ": assert failed: " << #x << endl; \
|
|
}\
|
|
} while(0)
|
|
|
|
void testDateConv(KPTestResults& results, const QDateTime& d){
|
|
unsigned char binDate[5];
|
|
dateToPackedStruct5(d, binDate);
|
|
kp_assert(results, d.toTime_t() == dateFromPackedStruct5(binDate).toTime_t());
|
|
}
|
|
|
|
void assertGroupsEq(KPTestResults& results, CGroup* left, CGroup* right){
|
|
unsigned long size = 0;
|
|
|
|
kp_assert(results, left->ID == right->ID);
|
|
size += sizeof(left->ID);
|
|
|
|
kp_assert(results, left->ImageID == right->ImageID);
|
|
size += sizeof(left->ImageID);
|
|
|
|
kp_assert(results, left->Name == right->Name);
|
|
size += sizeof(left->Name);
|
|
|
|
kp_assert(results, left->Creation.toTime_t() == right->Creation.toTime_t());
|
|
size += sizeof(left->Creation);
|
|
|
|
kp_assert(results, left->LastMod.toTime_t() == right->LastMod.toTime_t());
|
|
size += sizeof(left->LastMod);
|
|
|
|
kp_assert(results, left->LastAccess.toTime_t() == right->LastAccess.toTime_t());
|
|
size += sizeof(left->LastAccess);
|
|
|
|
kp_assert(results, left->Expire.toTime_t() == right->Expire.toTime_t());
|
|
size += sizeof(left->Expire);
|
|
|
|
kp_assert(results, left->Level == right->Level);
|
|
size += sizeof(left->Level);
|
|
|
|
kp_assert(results, left->Flags == right->Flags);
|
|
size += sizeof(left->Flags);
|
|
|
|
/* ignore expansion */
|
|
size += sizeof(left->UI_ItemIsExpanded);
|
|
|
|
/* make sure that all members were checked */
|
|
|
|
/* CGroup is padded with two additional bytes */
|
|
kp_assert(results, size + 2 == sizeof(CGroup));
|
|
kp_assert(results, 40 == sizeof(CGroup));
|
|
}
|
|
|
|
void assertEntriesEq(KPTestResults& results, CEntry* left, CEntry* right){
|
|
unsigned long size = 0;
|
|
|
|
kp_assert(results, memcmp(left->ID, right->ID, sizeof(left->ID)) == 0);
|
|
size += sizeof(left->ID);
|
|
|
|
kp_assert(results, left->sID == right->sID);
|
|
size += sizeof(left->sID);
|
|
|
|
kp_assert(results, left->GroupID == right->GroupID);
|
|
size += sizeof(left->GroupID);
|
|
|
|
kp_assert(results, left->ImageID == right->ImageID);
|
|
size += sizeof(left->ImageID);
|
|
|
|
kp_assert(results, left->Title == right->Title);
|
|
size += sizeof(left->Title);
|
|
|
|
kp_assert(results, left->URL == right->URL);
|
|
size += sizeof(left->URL);
|
|
|
|
kp_assert(results, left->UserName == right->UserName);
|
|
size += sizeof(left->UserName);
|
|
|
|
left->Password.unlock();
|
|
right->Password.unlock();
|
|
kp_assert(results, left->Password.string() == right->Password.string());
|
|
size += sizeof(left->Password);
|
|
left->Password.lock();
|
|
right->Password.lock();
|
|
|
|
kp_assert(results, left->Additional == right->Additional);
|
|
size += sizeof(left->Additional);
|
|
|
|
kp_assert(results, left->BinaryDesc == right->BinaryDesc);
|
|
size += sizeof(left->BinaryDesc);
|
|
|
|
kp_assert(results, left->Creation.toTime_t() == right->Creation.toTime_t());
|
|
size += sizeof(left->Creation);
|
|
|
|
kp_assert(results, left->LastMod.toTime_t() == right->LastMod.toTime_t());
|
|
size += sizeof(left->LastMod);
|
|
|
|
kp_assert(results, left->LastAccess.toTime_t() == right->LastAccess.toTime_t());
|
|
size += sizeof(left->LastAccess);
|
|
|
|
kp_assert(results, left->Expire.toTime_t() == right->Expire.toTime_t());
|
|
size += sizeof(left->Expire);
|
|
|
|
kp_assert(results, left->BinaryData.length() == right->BinaryData.length());
|
|
kp_assert(results, (left->BinaryData.isNull() && right->BinaryData.isNull()) ||
|
|
memcmp(left->BinaryData.data(), right->BinaryData.data(), left->BinaryData.length()) == 0);
|
|
size += left->BinaryData.length();
|
|
size += sizeof(left->BinaryData.length());
|
|
|
|
kp_assert(results, size == sizeof(CEntry));
|
|
}
|
|
|
|
void assertDatabasesEq(KPTestResults& results, PwDatabase* left, PwDatabase* right){
|
|
/* check groups */
|
|
kp_assert(results, left->Groups.size() == right->Groups.size());
|
|
int numGroups = min(left->Groups.size(), right->Groups.size());
|
|
for(int i=0;i<numGroups;i++)
|
|
assertGroupsEq(results, &left->Groups[i], &right->Groups[i]);
|
|
|
|
/* check entries */
|
|
kp_assert(results, left->Entries.size() == right->Entries.size());
|
|
int numEntries = min(left->Entries.size(), right->Entries.size());
|
|
for(int j=0;j<numEntries;j++)
|
|
assertEntriesEq(results, &left->Entries[j], &right->Entries[j]);
|
|
}
|
|
|
|
bool testDatabase(){
|
|
KPTestResults results;
|
|
|
|
/* test the date/time serialization */
|
|
QDateTime now = QDateTime::currentDateTime();
|
|
testDateConv(results, now);
|
|
testDateConv(results, Date_Never);
|
|
|
|
QString dbPassword("keepass-db-test");
|
|
const QString dbPath("/tmp/keepass-db-test");
|
|
|
|
/* create a test database */
|
|
PwDatabase database;
|
|
kp_assert(results, database.CalcMasterKeyByPassword(dbPassword));
|
|
database.filename = dbPath;
|
|
database.CryptoAlgorithmus = ALGO_TWOFISH;
|
|
|
|
CGroup* main = database.addGroup(NULL);
|
|
CGroup* child = database.addGroup(main);
|
|
child->Name = "<Subgroup>";
|
|
|
|
QString entry1pw("password");
|
|
CEntry* entry1 = database.addEntry();
|
|
database.moveEntry(entry1, main);
|
|
entry1->Title = "title";
|
|
entry1->URL = "http://keepass.berlios.de/";
|
|
entry1->UserName = "username";
|
|
entry1->Password.setString(entry1pw);
|
|
entry1->Additional = "additional";
|
|
entry1->BinaryDesc = "binarydesc";
|
|
|
|
QString entry2pw("password");
|
|
CEntry* entry2 = database.addEntry();
|
|
database.moveEntry(entry2, child);
|
|
entry2->Title = "TITLE";
|
|
entry2->URL = "http://keepass.berlios.de/";
|
|
entry2->UserName = "USERNAME";
|
|
entry2->Password.setString(entry2pw);
|
|
entry2->Additional = "ADDITIONAL";
|
|
entry2->BinaryDesc = "BINARYDESC";
|
|
|
|
/* save the database */
|
|
kp_assert(results, database.saveDatabase());
|
|
|
|
/* reload the database */
|
|
PwDatabase cloneDatabase;
|
|
kp_assert(results, cloneDatabase.CalcMasterKeyByPassword(dbPassword));
|
|
QString err;
|
|
bool loadedDB = cloneDatabase.loadDatabase(dbPath, err);
|
|
if (!loadedDB){
|
|
kp_assert(results, loadedDB);
|
|
cout << err.ascii() << endl;
|
|
}
|
|
|
|
assertDatabasesEq(results, &database, &cloneDatabase);
|
|
|
|
/* compare the databases */
|
|
cout << results.passed << "/" << (results.passed+results.failed) << " ok" << endl;
|
|
return results.failed == 0;
|
|
}
|
|
|
|
|
|
|