import 'dart:convert'; import 'dart:typed_data'; import 'package:crypto/crypto.dart' as crypto; import 'package:kdbx/src/crypto/key_encrypter_kdf.dart'; import 'package:kdbx/src/internal/byte_utils.dart'; import 'package:kdbx/src/internal/consts.dart'; import 'package:kdbx/src/kdbx_var_dictionary.dart'; import 'package:logging/logging.dart'; import 'package:meta/meta.dart'; import 'package:kdbx/src/utils/scope_functions.dart'; final _logger = Logger('kdbx.header'); class Consts { static const FileMagic = 0x9AA2D903; static const Sig2Kdbx = 0xB54BFB67; static const DefaultKdfSaltLength = 32; static const DefaultKdfParallelism = 1; static const DefaultKdfIterations = 2; static const DefaultKdfMemory = 1024 * 1024; static const DefaultKdfVersion = 0x13; } enum Compression { /// id: 0 none, /// id: 1 gzip, } /// how protected values are encrypted in the xml. enum ProtectedValueEncryption { plainText, arc4variant, salsa20, chaCha20 } enum HeaderFields { EndOfHeader, Comment, CipherID, CompressionFlags, MasterSeed, TransformSeed, TransformRounds, EncryptionIV, ProtectedStreamKey, StreamStartBytes, InnerRandomStreamID, // crsAlgorithm KdfParameters, PublicCustomData, } enum InnerHeaderFields { EndOfHeader, InnerRandomStreamID, InnerRandomStreamKey, Binary, } abstract class HeaderFieldBase { T get field; } class HeaderField implements HeaderFieldBase { HeaderField(this.field, this.bytes); @override final HeaderFields field; final Uint8List bytes; String get name => field.toString(); } class InnerHeaderField implements HeaderFieldBase { InnerHeaderField(this.field, this.bytes); @override final InnerHeaderFields field; final Uint8List bytes; String get name => field.toString(); } class KdbxHeader { KdbxHeader({ @required this.sig1, @required this.sig2, @required this.versionMinor, @required this.versionMajor, @required this.fields, @required this.endPos, Map innerFields, }) : innerFields = innerFields ?? {}; KdbxHeader.create() : this( sig1: Consts.FileMagic, sig2: Consts.Sig2Kdbx, versionMinor: 1, versionMajor: 3, fields: _defaultFieldValues(), endPos: null, ); KdbxHeader.createV4() : this( sig1: Consts.FileMagic, sig2: Consts.Sig2Kdbx, versionMinor: 1, versionMajor: 4, fields: _defaultFieldValuesV4(), innerFields: _defaultInnerFieldValuesV4(), endPos: null, ); static List _requiredFields(int majorVersion) { if (majorVersion < 3) { throw KdbxUnsupportedException('Unsupported version: $majorVersion'); } final baseHeaders = [ HeaderFields.CipherID, HeaderFields.CompressionFlags, HeaderFields.MasterSeed, HeaderFields.EncryptionIV, ]; if (majorVersion < 4) { return baseHeaders + [ HeaderFields.TransformSeed, HeaderFields.TransformRounds, HeaderFields.ProtectedStreamKey, HeaderFields.StreamStartBytes, // HeaderFields.InnerRandomStreamID ]; } else { return baseHeaders + [HeaderFields.KdfParameters]; } } static VarDictionary _createKdfDefaultParameters() { return VarDictionary([ KdfField.uuid .item(KeyEncrypterKdf.kdfUuidForType(KdfType.Argon2).toBytes()), KdfField.salt.item(ByteUtils.randomBytes(Consts.DefaultKdfSaltLength)), KdfField.parallelism.item(Consts.DefaultKdfParallelism), KdfField.iterations.item(Consts.DefaultKdfIterations), KdfField.memory.item(Consts.DefaultKdfMemory), KdfField.version.item(Consts.DefaultKdfVersion), ]); } void _validate() { for (HeaderFields required in _requiredFields(versionMajor)) { if (fields[required] == null) { throw KdbxCorruptedFileException('Missing header $required'); } } } void _validateInner() { final requiredFields = [ InnerHeaderFields.InnerRandomStreamID, InnerHeaderFields.InnerRandomStreamKey ]; for (final field in requiredFields) { if (innerFields[field] == null) { throw KdbxCorruptedFileException('Missing inner header $field'); } } } void _setHeaderField(HeaderFields field, Uint8List bytes) { fields[field] = HeaderField(field, bytes); } void _setInnerHeaderField(InnerHeaderFields field, Uint8List bytes) { innerFields[field] = InnerHeaderField(field, bytes); } void generateSalts() { // TODO make sure default algorithm is "secure" engouh. Or whether we should // use like [SecureRandom] from PointyCastle? _setHeaderField(HeaderFields.MasterSeed, ByteUtils.randomBytes(32)); if (versionMajor < 4) { _setHeaderField(HeaderFields.TransformSeed, ByteUtils.randomBytes(32)); _setHeaderField(HeaderFields.StreamStartBytes, ByteUtils.randomBytes(32)); _setHeaderField( HeaderFields.ProtectedStreamKey, ByteUtils.randomBytes(32)); _setHeaderField(HeaderFields.EncryptionIV, ByteUtils.randomBytes(16)); } else if (versionMajor < 5) { _setInnerHeaderField( InnerHeaderFields.InnerRandomStreamKey, ByteUtils.randomBytes(64)); final kdfParameters = readKdfParameters; KdfField.salt.write( kdfParameters, ByteUtils.randomBytes(Consts.DefaultKdfSaltLength)); // var ivLength = this.dataCipherUuid.toString() === Consts.CipherId.ChaCha20 ? 12 : 16; // this.encryptionIV = Random.getBytes(ivLength); final cipherId = base64.encode(fields[HeaderFields.CipherID].bytes); final ivLength = cipherId == CryptoConsts.CIPHER_IDS[Cipher.chaCha20].uuid ? 12 : 16; _setHeaderField( HeaderFields.EncryptionIV, ByteUtils.randomBytes(ivLength)); } else { throw KdbxUnsupportedException( 'We do not support Kdbx 3.x and 4.x right now. ($versionMajor.$versionMinor)'); } } void write(WriterHelper writer) { _validate(); // write signature writer.writeUint32(Consts.FileMagic); writer.writeUint32(Consts.Sig2Kdbx); // write version writer.writeUint16(versionMinor); writer.writeUint16(versionMajor); for (final field in HeaderFields.values.where((f) => f != HeaderFields.EndOfHeader)) { _writeField(writer, field); } fields[HeaderFields.EndOfHeader] = HeaderField(HeaderFields.EndOfHeader, Uint8List(0)); _writeField(writer, HeaderFields.EndOfHeader); } void writeInnerHeader(WriterHelper writer) { _validateInner(); for (final field in InnerHeaderFields.values .where((f) => f != InnerHeaderFields.EndOfHeader)) { _writeInnerField(writer, field); } _writeInnerField(writer, InnerHeaderFields.EndOfHeader); } void _writeInnerField(WriterHelper writer, InnerHeaderFields field) { final value = innerFields[field]; if (value == null) { return; } _logger.finer('Writing header $field (${value.bytes.lengthInBytes})'); writer.writeUint8(field.index); _writeFieldSize(writer, value.bytes.lengthInBytes); writer.writeBytes(value.bytes); } void _writeField(WriterHelper writer, HeaderFields field) { final value = fields[field]; if (value == null) { return; } _logger.finer('Writing header $field (${value.bytes.lengthInBytes})'); writer.writeUint8(field.index); _writeFieldSize(writer, value.bytes.lengthInBytes); writer.writeBytes(value.bytes); } void _writeFieldSize(WriterHelper writer, int size) { if (versionMajor >= 4) { writer.writeUint32(size); } else { writer.writeUint16(size); } } static Map _defaultFieldValues() => Map.fromEntries([ HeaderField(HeaderFields.CipherID, CryptoConsts.CIPHER_IDS[Cipher.aes].toBytes()), HeaderField( HeaderFields.CompressionFlags, WriterHelper.singleUint32Bytes(1)), HeaderField( HeaderFields.TransformRounds, WriterHelper.singleUint64Bytes(6000)), HeaderField( HeaderFields.InnerRandomStreamID, WriterHelper.singleUint32Bytes(ProtectedValueEncryption.values .indexOf(ProtectedValueEncryption.salsa20))), ].map((f) => MapEntry(f.field, f))); static Map _defaultFieldValuesV4() => _defaultFieldValues() ..remove(HeaderFields.TransformRounds) ..remove(HeaderFields.InnerRandomStreamID) ..remove(HeaderFields.ProtectedStreamKey) ..also((fields) { fields[HeaderFields.KdfParameters] = HeaderField( HeaderFields.KdfParameters, _createKdfDefaultParameters().write()); }); static Map _defaultInnerFieldValuesV4() => Map.fromEntries([ InnerHeaderField( InnerHeaderFields.InnerRandomStreamID, WriterHelper.singleUint32Bytes(ProtectedValueEncryption.values .indexOf(ProtectedValueEncryption.chaCha20))) ].map((f) => MapEntry(f.field, f))); static KdbxHeader read(ReaderHelper reader) { // reading signature final sig1 = reader.readUint32(); final sig2 = reader.readUint32(); if (!(sig1 == Consts.FileMagic && sig2 == Consts.Sig2Kdbx)) { throw UnsupportedError( 'Unsupported file structure. ${ByteUtils.toHex(sig1)}, ' '${ByteUtils.toHex(sig2)}'); } // reading version final versionMinor = reader.readUint16(); final versionMajor = reader.readUint16(); _logger.finer('Reading version: $versionMajor.$versionMinor'); final headerFields = readAllFields( reader, versionMajor, HeaderFields.values, (HeaderFields field, value) => HeaderField(field, value)); return KdbxHeader( sig1: sig1, sig2: sig2, versionMinor: versionMinor, versionMajor: versionMajor, fields: headerFields, endPos: reader.pos, ); } static Map readHeaderFields( ReaderHelper reader, int versionMajor) => readAllFields(reader, versionMajor, HeaderFields.values, (HeaderFields field, value) => HeaderField(field, value)); static Map readInnerHeaderFields( ReaderHelper reader, int versionMajor) => readAllFields(reader, versionMajor, InnerHeaderFields.values, (InnerHeaderFields field, value) => InnerHeaderField(field, value)); static Map readAllFields, TE>( ReaderHelper reader, int versionMajor, List fields, T createField(TE field, Uint8List bytes)) => Map.fromEntries( readField(reader, versionMajor, fields, createField) .map((field) => MapEntry(field.field, field))); static Iterable readField(ReaderHelper reader, int versionMajor, List fields, T createField(TE field, Uint8List bytes)) sync* { while (true) { final headerId = reader.readUint8(); final int bodySize = versionMajor >= 4 ? reader.readUint32() : reader.readUint16(); final bodyBytes = bodySize > 0 ? reader.readBytes(bodySize) : null; // _logger.finer( // 'Read header ${fields[headerId]}: ${ByteUtils.toHexList(bodyBytes)}'); if (headerId > 0) { final TE field = fields[headerId]; yield createField(field, bodyBytes); /* else { if (field == InnerHeaderFields.InnerRandomStreamID) { yield HeaderField(HeaderFields.InnerRandomStreamID, bodyBytes); } else if (field == InnerHeaderFields.InnerRandomStreamKey) { yield HeaderField(HeaderFields.ProtectedStreamKey, bodyBytes); } }*/ } else { break; } } } final int sig1; final int sig2; final int versionMinor; final int versionMajor; final Map fields; final Map innerFields; /// end position of the header, if we have been reading from a stream. final int endPos; Compression get compression { switch (ReaderHelper.singleUint32( fields[HeaderFields.CompressionFlags].bytes)) { case 0: return Compression.none; case 1: return Compression.gzip; default: throw KdbxUnsupportedException('compression'); } } ProtectedValueEncryption get innerRandomStreamEncryption => ProtectedValueEncryption .values[ReaderHelper.singleUint32(_innerRandomStreamEncryptionBytes)]; Uint8List get _innerRandomStreamEncryptionBytes => versionMajor >= 4 ? innerFields[InnerHeaderFields.InnerRandomStreamID].bytes : fields[HeaderFields.InnerRandomStreamID].bytes; Uint8List get protectedStreamKey => versionMajor >= 4 ? innerFields[InnerHeaderFields.InnerRandomStreamKey].bytes : fields[HeaderFields.ProtectedStreamKey].bytes; VarDictionary get readKdfParameters => VarDictionary.read( ReaderHelper(fields[HeaderFields.KdfParameters].bytes)); void writeKdfParameters(VarDictionary kdfParameters) => _setHeaderField(HeaderFields.KdfParameters, kdfParameters.write()); @override String toString() { return 'KdbxHeader{sig1: $sig1, sig2: $sig2, versionMajor: $versionMajor, versionMinor: $versionMinor}'; } } class KdbxException implements Exception {} class KdbxInvalidKeyException implements KdbxException {} class KdbxCorruptedFileException implements KdbxException { KdbxCorruptedFileException([this.message]); final String message; } class KdbxUnsupportedException implements KdbxException { KdbxUnsupportedException(this.hint); final String hint; @override String toString() { return 'KdbxUnsupportedException{hint: $hint}'; } } class HashedBlockReader { static const BLOCK_SIZE = 1024 * 1024; static const HASH_SIZE = 32; static Uint8List readBlocks(ReaderHelper reader) => Uint8List.fromList(readNextBlock(reader).expand((x) => x).toList()); static Iterable readNextBlock(ReaderHelper reader) sync* { int expectedBlockIndex = 0; while (true) { // ignore: unused_local_variable final blockIndex = reader.readUint32(); assert(blockIndex == expectedBlockIndex++); final blockHash = reader.readBytes(HASH_SIZE); final blockSize = reader.readUint32(); if (blockSize > 0) { final blockData = reader.readBytes(blockSize); if (!ByteUtils.eq( crypto.sha256.convert(blockData).bytes as Uint8List, blockHash)) { throw KdbxCorruptedFileException(); } yield blockData; } else { break; } } } // static Uint8List writeBlocks(WriterHelper writer) => static void writeBlocks(ReaderHelper reader, WriterHelper writer) { for (int blockIndex = 0;; blockIndex++) { final block = reader.readBytesUpTo(BLOCK_SIZE); if (block.lengthInBytes == 0) { // written all data, write a last empty block. writer.writeUint32(blockIndex); writer.writeBytes(Uint8List.fromList( List.generate(HASH_SIZE, (i) => 0))); // hash 32 ** 0x0 writer.writeUint32(0); // block size = 0 return; } final blockSize = block.lengthInBytes; final blockHash = crypto.sha256.convert(block); assert(blockHash.bytes.length == HASH_SIZE); writer.writeUint32(blockIndex); writer.writeBytes(blockHash.bytes as Uint8List); writer.writeUint32(blockSize); writer.writeBytes(block); } } }