Closed Mic92 closed 1 year ago
The key itself should be also correct since it can decrypt the profile itself: https://github.com/mvdan/bitw/blob/056480d6f3ec7bb51126d4f788f70b31a3c4eb63/main.go#L340
I changed it to:
diff --git a/main.go b/main.go
index 14bafc8..de575fd 100644
--- a/main.go
+++ b/main.go
@@ -285,9 +285,11 @@ func run(args ...string) (err error) {
} {
s, err := decrypt(cipherStr)
if err != nil {
- return err
+ fmt.Printf("failed to decrypt: %s\n", cipher.ID)
+ //return err
+ } else {
+ fmt.Fprintf(w, "%s\t", s)
}
- fmt.Fprintf(w, "%s\t", s)
}
fmt.Fprintln(w)
}
Now I see that only some entries cannot be decrypted.
Ok. I found out that those passwords came from an organisation. I assume the password must be computed differently in this case?
I have never tried organisations with this tool, so it's not a big surprise that they don't work. Patches are of course welcome.
I am using
bitwarden_rs
. The password login succeeds so the email/password should be correct however it fails to decrypt my password:How can I debug this further?