bitwarden_core/platform/
generate_fingerprint.rs1use base64::{engine::general_purpose::STANDARD, Engine};
6use bitwarden_crypto::fingerprint;
7use serde::{Deserialize, Serialize};
8use thiserror::Error;
9
10use crate::{key_management::AsymmetricKeyId, MissingPrivateKeyError, VaultLockedError};
11
12#[derive(Serialize, Deserialize, Debug)]
14#[serde(rename_all = "camelCase", deny_unknown_fields)]
15#[cfg_attr(feature = "uniffi", derive(uniffi::Record))]
16pub struct FingerprintRequest {
17 pub fingerprint_material: String,
19 pub public_key: String,
21}
22
23#[derive(Serialize, Deserialize, Debug)]
27#[serde(rename_all = "camelCase", deny_unknown_fields)]
28pub struct FingerprintResponse {
29 pub fingerprint: String,
31}
32
33#[allow(missing_docs)]
35#[derive(Debug, Error)]
36pub enum FingerprintError {
37 #[error(transparent)]
38 CryptoError(#[from] bitwarden_crypto::CryptoError),
39 #[error(transparent)]
40 InvalidBase64(#[from] base64::DecodeError),
41}
42
43pub(crate) fn generate_fingerprint(input: &FingerprintRequest) -> Result<String, FingerprintError> {
44 let key = STANDARD.decode(&input.public_key)?;
45
46 Ok(fingerprint(&input.fingerprint_material, &key)?)
47}
48
49#[allow(missing_docs)]
51#[derive(Debug, Error)]
52pub enum UserFingerprintError {
53 #[error(transparent)]
54 Crypto(#[from] bitwarden_crypto::CryptoError),
55 #[error(transparent)]
56 VaultLocked(#[from] VaultLockedError),
57 #[error(transparent)]
58 MissingPrivateKey(#[from] MissingPrivateKeyError),
59}
60
61pub(crate) fn generate_user_fingerprint(
62 client: &crate::Client,
63 fingerprint_material: String,
64) -> Result<String, UserFingerprintError> {
65 let key_store = client.internal.get_key_store();
66 let ctx = key_store.context();
67 #[allow(deprecated)]
70 let private_key = ctx.dangerous_get_asymmetric_key(AsymmetricKeyId::UserPrivateKey)?;
71
72 let public_key = private_key.to_public_der()?;
73 let fingerprint = fingerprint(&fingerprint_material, &public_key)?;
74
75 Ok(fingerprint)
76}
77
78#[cfg(test)]
79mod tests {
80 use std::num::NonZeroU32;
81
82 use bitwarden_crypto::{Kdf, MasterKey};
83
84 use super::*;
85 use crate::Client;
86
87 #[test]
88 fn test_generate_user_fingerprint() {
89 let user_key = "2.oZg5RYpU2HjUAKI1DUQCkg==|PyRzI9kZpt66P2OedH8CHOeU0/lgKLkhIJiKDijdyFqIemBSIBoslhfQh/P1TK9xgZp0smgD6+5+yNbZfOpBaCVrsT3WWAO78xOWizduRe4=|xfDLDZSJ+yZAdh388flVg7SMDBJuMs0+CHTjutKs4uQ=";
90 let private_key = "2.tY6WsWKUbBwNU8wROuipiQ==|DNFL1d19xVojUKTTy2gxT+9J1VXbMQLcbMnx1HSeA6U3yZhsLR6DPaGibb3Bp8doIHtrsxzL/JeLb4gLDZ8RnDhFfE4iLRaPakX14kbBXrKH9/uW/zc7TqIVciWhI1PaeFlu8wnVuGt3e5Ysx6Y7Uw7RS8pRT5aE3sX3aDPGZTAdTutLn1VUfkShS5OK5HJl9CdiwV2wOcrf4w/WqtaNUUqGdsJ8C4ELlpBzHxqs+lEm+8pGPYmuGQIjVc0eOR9Tza9GTk3ih1XGc1znOCoKUZbtA29RfbwfmJy/yGi/3RLWZFQGCCij4cLC5OpldiX4JWL5Dhox44p/5IVF3rfxTVz3GCyDOoHevRG/06sUBq6nhbdCQf3lJvxwcQJhoQg4rsapM3rgol+u+TbXRiwWPbfswuLkRlvGFKtKUWMa4S57gj0CFYgSBPdTyhZTB44D7JQ2bd901Ur1dYWcDe4Kn3ZawpxL0cX2ZPlE3v8FXFJf2s8DJytL8yu73GasDzVmaGHxueWWVz7EHjh+pmB4oaAHARcY8d3LActAyl/+bcFRPYQJ68ae6DJhYYJGHIBWMImf2BifGgUX8vUFfUAYjne3D82lRyZQHs3xbl+ZxEPgWiPYRWUtxGXLLP4f9mbl+LeJdehtHNjC8kOduBL0CsP4gmugzNNUXI+Izc/9svno6kFr6SU0LA3MGrOU8ao7UCQbf/Pj/RKnG1gRmBDQqf7IMm6jOyTwdde9NpfQb32iH11PkuAKBvEtUuq9BeAKWjoZku+ycsN2jZH0hzd/QrU2c+E4+yHwX3wSxxorNOXt5EZkJbEDBlpRyE1zWoyy0wIYfcChYLvFN8QFHchlw5wmHxL+OOgdgndAtV/2DCx+NB6caY31qLictME+1GPPlQ7QvicMLgmpSWq83rs4ex/My6p3hCRSrJJiLvjEDZLYWKHHLd5tsPRAjX8ADNWB1VeIeiJrj1wpOCc1PbWpbljbbTsBmVPo6iKm/UDGAHBdQ//0j3FQg8f5w/j+McsoaMpDNHNTiLvjWERR+RBmsEA0lEL00wZz/DHlzOAYHLYYqFMT7GBCQD+Wk/l1TL+X2agUy7Irlk7QbZ4ivfdNIpSW8Ct9MGE6o4wV+nIpXURojgBBTcP85RTBLXXGrIprnK1G/VE8ONag3+nkqIyChjYyk5QMsxqOqSHsbiOxhCdXypbCbY4g9yKJtBJ/ADjxmELj0X7pqsTFqC0eRT7rk9qTBcYBBu6rwlAfq8AKjDB7WjNjzLaMi6lBoe4petBn1xcLkXD5hHra0TULxcYrq8MIb+Vk4CBZZdwwyVm/28SwSjHBIBpRysPAonDDsp3KlahwXEFvRDQR/oFww172GI7cx8SoPn93Qh0JfpTAAowsO3meR8bzUSyd7v3rmtaBPsWHE9zUXye/6nloMU5joEcD6uJaxd0kdaWWIoKLH++zHW1R776wJrS6u+TIWZgHqiIJoCd9fV25BnQcbZRKd6mnfNQkchJ6c6ozXKrFaa8DLdERdfh84+isw5mzW2zMJwHEwtKt6LUTyieC2exzPAwPxJT1+IMjuzuwiLnvGKOq+kwE/LWBSB0ZfGuCP/3jMM8OCfe7Hbpt1TfXcUxUzj6sSjkjQB6qBt+TINRdOFA=|fppguME86utsAOKrBYn6XU95q7daVbZ+3dD9OVkQlAw=";
91 let fingerprint_material = "a09726a0-9590-49d1-a5f5-afe300b6a515";
92
93 let client = Client::new(None);
94
95 let master_key = MasterKey::derive(
96 "asdfasdfasdf",
97 "[email protected]",
98 &Kdf::PBKDF2 {
99 iterations: NonZeroU32::new(600_000).unwrap(),
100 },
101 )
102 .unwrap();
103
104 client
105 .internal
106 .initialize_user_crypto_master_key(
107 master_key,
108 user_key.parse().unwrap(),
109 private_key.parse().unwrap(),
110 )
111 .unwrap();
112
113 let fingerprint =
114 generate_user_fingerprint(&client, fingerprint_material.to_string()).unwrap();
115
116 assert_eq!(fingerprint, "turban-deftly-anime-chatroom-unselfish");
117 }
118}