/
1pass.lua
367 lines (302 loc) · 11.3 KB
1
JSON = (loadfile "JSON.lua")()
2
3
dofile("dumptable.lua")
4
5
6
7
8
local basedir = "1Password/1Password.agilekeychain/data/default" -- !!! FIXME
local password = argv[2]
local items = nil
local keyhookRunning = false
9
10
11
12
13
14
15
16
local passwordTypeNameMap = {
["webforms.WebForm"] = "Logins",
["wallet.financial.CreditCard"] = "Credit cards",
["passwords.Password"] = "Passwords",
["wallet.financial.BankAccountUS"] = "Bank accounts",
["wallet.membership.Membership"] = "Memberships",
["wallet.government.DriversLicense"] = "Drivers licenses",
["system.Tombstone"] = "Dead items",
17
["securenotes.SecureNote"] = "Secure notes",
18
19
20
21
22
23
24
25
26
27
-- !!! FIXME: more!
}
local passwordTypeOrdering = {
"webforms.WebForm",
"wallet.financial.CreditCard",
"passwords.Password",
"wallet.financial.BankAccountUS",
"wallet.membership.Membership",
"wallet.government.DriversLicense",
28
"securenotes.SecureNote",
29
30
31
-- never show "system.Tombstone",
-- !!! FIXME: more!
}
32
33
34
35
36
37
local function load_json_str(str, desc)
local retval = JSON:decode(str)
return retval
end
38
39
40
41
42
43
44
45
46
local function load_json(fname)
local f = io.open(fname, "rb")
if (f == nil) then
return nil
end
local str = f:read("*all")
f:close()
47
return load_json_str(str, fname)
48
49
50
end
51
local keys = {}
52
local function loadKey(level, password)
53
54
55
56
if keys[level] ~= nil then
return keys[level]
end
57
local keysjson = load_json(basedir .. "/encryptionKeys.js")
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
if (keysjson == nil) or (keysjson[level] == nil) then
return nil
end
local identifier = keysjson[level]
for i,v in ipairs(keysjson.list) do
if v.identifier == identifier then
local iterations = v.iterations
if (iterations == nil) or (iterations < 1000) then
iterations = 1000
end
local decrypted = decryptUsingPBKDF2(v.data, password, iterations)
if decrypted == nil then
return nil
end
local validate = decryptBase64UsingKey(v.validation, decrypted)
if validate ~= decrypted then
return nil
end
80
keys[level] = decrypted
81
82
83
84
85
86
87
return decrypted
end
end
return nil
end
88
local function getHint()
89
90
91
92
93
local f = io.open(basedir .. "/.password.hint", "r")
if (f == nil) then
return
end
94
local str = "(hint is '" .. f:read("*all") .. "')."
95
f:close()
96
97
--print(str)
return str
98
99
end
100
101
local function loadContents()
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
return load_json(basedir .. "/contents.js")
end
local function build_secret_menuitem(menu, type, str, hidden)
if str == nil then
return nil
end
local valuestr = str
if hidden == true then
valuestr = "*****"
end
local text = type .. " " .. valuestr
local callback = function()
copyToClipboard(str)
--print("Copied data [" .. str .. "] to clipboard.")
119
keyhookRunning = false
120
121
end
return appendGuiMenuItem(menu, text, callback)
122
123
end
124
125
126
127
128
129
130
131
local secret_menuitem_builders = {}
local function build_secret_menuitem_webform(menu, info, secure)
local addthis = false
local username = nil
local password = nil
local email = nil
132
133
134
135
136
137
if secure.fields == nil then
print("no secure fields, don't know how to handle this item")
return
end
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
for i,v in ipairs(secure.fields) do
--print(info.name .. ": " .. v.type .. ", " .. v.value)
local ignored = false
if (v.type == "P") and (password == nil) and (v.value ~= "") then
password = v.value
elseif (v.type == "T") and (usenname == nil) and (v.value ~= "") then
username = v.value
elseif (v.type == "E") and (email == nil) and (v.value ~= "") then
email = v.value
else
ignored = true
end
if not ignored then
addthis = true
end
end
if addthis then
if (username ~= nil) and (email ~= nil) and (email == username) then
email = nil
end
build_secret_menuitem(menu, "username", username)
build_secret_menuitem(menu, "email", email)
build_secret_menuitem(menu, "password", password, true)
164
end
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
end
secret_menuitem_builders["webforms.WebForm"] = build_secret_menuitem_webform
local function build_secret_menuitem_password(menu, info, secure)
build_secret_menuitem(menu, "password", secure.password, true)
end
secret_menuitem_builders["passwords.Password"] = build_secret_menuitem_password
local function build_secret_menuitem_bankacctus(menu, info, secure)
-- !!! FIXME: there's more data than this in a generic dictionary.
build_secret_menuitem(menu, "Account type", secure.accountType)
build_secret_menuitem(menu, "Routing number", secure.routingNo)
build_secret_menuitem(menu, "Account number", secure.accountNo)
build_secret_menuitem(menu, "Bank name", secure.bankName)
build_secret_menuitem(menu, "Owner", secure.owner)
end
secret_menuitem_builders["wallet.financial.BankAccountUS"] = build_secret_menuitem_bankacctus
local function build_secret_menuitem_driverslic(menu, info, secure)
-- !!! FIXME: there's more data than this in a generic dictionary.
local birthdate = secure.birthdate_yy .. "/" .. string.sub("00" .. secure.birthdate_mm, -2) .. "/" .. string.sub("00" .. secure.birthdate_dd, -2)
local expiredate = secure.expiry_date_yy .. "/" .. string.sub("00" .. secure.expiry_date_mm, -2)
build_secret_menuitem(menu, "License number", secure.number)
build_secret_menuitem(menu, "Class", secure.class)
build_secret_menuitem(menu, "Expires", expiredate)
build_secret_menuitem(menu, "State", secure.state)
build_secret_menuitem(menu, "Country", secure.country)
build_secret_menuitem(menu, "Conditions", secure.conditions)
build_secret_menuitem(menu, "Full name", secure.fullname)
build_secret_menuitem(menu, "Address", secure.address)
build_secret_menuitem(menu, "Gender", secure.sex)
build_secret_menuitem(menu, "Birthdate", birthdate)
build_secret_menuitem(menu, "Height", secure.height)
end
secret_menuitem_builders["wallet.government.DriversLicense"] = build_secret_menuitem_driverslic
local function build_secret_menuitem_membership(menu, info, secure)
-- !!! FIXME: there's more data than this in a generic dictionary.
build_secret_menuitem(menu, "Membership number", secure.membership_no)
end
secret_menuitem_builders["wallet.membership.Membership"] = build_secret_menuitem_membership
local function build_secret_menuitem_creditcard(menu, info, secure)
-- !!! FIXME: there's more data than this in a generic dictionary.
local expiredate = secure.expiry_yy .. "/" .. string.sub("00" .. secure.expiry_mm, -2)
build_secret_menuitem(menu, "Type", secure.type)
build_secret_menuitem(menu, "CC number", secure.ccnum, true)
build_secret_menuitem(menu, "CVV", secure.cvv, true)
build_secret_menuitem(menu, "Expires", secure.expirydate)
build_secret_menuitem(menu, "Card holder", secure.cardholder)
build_secret_menuitem(menu, "Bank", secure.bank)
end
secret_menuitem_builders["wallet.financial.CreditCard"] = build_secret_menuitem_creditcard
224
225
226
227
local function build_secret_menuitem_securenote(menu, info, secure)
build_secret_menuitem(menu, "Notes", secure.notesPlain, true)
end
secret_menuitem_builders["securenotes.SecureNote"] = build_secret_menuitem_securenote
228
229
local function build_secret_menuitems(info, menu)
230
231
232
233
234
local metadata = load_json(basedir .. "/" .. info.uuid .. ".1password")
if metadata == nil then
return
end
235
236
237
238
239
240
241
242
243
244
245
local securityLevel = metadata.securityLevel
if securityLevel == nil then
securityLevel = metadata.openContents.securityLevel
end
print("title: " .. metadata.title)
if securityLevel == nil then
--print("can't find security level, assuming SL5" .. metadata.title)
securityLevel = "SL5"
end
local plaintext = decryptBase64UsingKey(metadata.encrypted, loadKey(securityLevel, password))
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
if plaintext == nil then
return
end
local secure = load_json_str(plaintext, info.uuid)
if secure == nil then
return
end
--dumptable("secure " .. info.name, secure)
local menuitem = appendGuiMenuItem(menu, info.name)
if secret_menuitem_builders[info.type] == nil then
print("WARNING: don't know how to handle items of type " .. info.type)
dumptable("secure " .. info.type .. " (" .. info.name .. ")", secure)
return
end
local submenu = makeGuiMenu()
secret_menuitem_builders[info.type](submenu, info, secure)
setGuiMenuItemSubmenu(menuitem, submenu)
267
268
end
269
270
271
272
273
274
275
local function prepItems()
items = {}
local contents = loadContents()
for i,v in ipairs(contents) do
local t = v[2]
if items[t] == nil then
items[t] = {}
276
end
277
278
local bucket = items[t]
bucket[#bucket+1] = { uuid=v[1], type=t, name=v[3], url=v[4] } -- !!! FIXME: there are more fields, don't know what they mean yet.
279
280
end
end
281
282
283
local passwordUnlockTime = nil
284
function keyhookPressed() -- not local! Called from C!
285
--print("keyhookPressed: running==" .. tostring(keyhookRunning))
286
287
288
-- if keyhookRunning then
-- return
-- end
289
290
291
keyhookRunning = true
292
293
294
295
296
297
298
299
300
301
if passwordUnlockTime ~= nil then
local now = os.time()
local maxTime = (15 * 60) -- !!! FIXME: don't hardcode.
if os.difftime(now, passwordUnlockTime) > maxTime then
-- lose the existing password and key, prompt user again.
password = argv[2] -- might be nil, don't reset if on command line.
keys["SL5"] = nil
end
end
302
303
304
305
306
307
308
309
310
311
312
313
314
while password == nil do
password = runGuiPasswordPrompt(getHint())
if password == nil then
keyhookRunning = false
return
end
if loadKey("SL5", password) == nil then
password = nil -- wrong password
local start = os.time() -- cook the CPU for three seconds.
local now = start
while os.difftime(now, start) < 3 do
now = os.time()
end
315
316
else
passwordUnlockTime = os.time()
317
end
318
end
319
320
321
322
prepItems()
local topmenu = makeGuiMenu()
323
324
325
326
327
328
329
330
331
local lock_callback = function()
password = argv[2] -- might be nil, don't reset if on command line.
keys["SL5"] = nil
passwordUnlockTime = nil
keyhookRunning = false
end
appendGuiMenuItem(topmenu, "Lock keychain", lock_callback)
332
333
for orderi,type in ipairs(passwordTypeOrdering) do
local bucket = items[type]
334
335
336
337
338
339
340
341
342
343
344
345
346
347
if bucket ~= nil then
local realname = passwordTypeNameMap[type]
if realname == nil then
realname = type
end
local menuitem = appendGuiMenuItem(topmenu, realname)
local submenu = makeGuiMenu()
table.sort(bucket, function(a, b) return a.name < b.name end)
for i,v in pairs(bucket) do
build_secret_menuitems(v, submenu)
end
setGuiMenuItemSubmenu(menuitem, submenu)
else
print("no bucket found")
348
end
349
end
350
351
popupGuiMenu(topmenu)
352
353
end
354
355
356
357
358
359
360
361
362
363
-- Mainline!
--for i,v in ipairs(argv) do
-- print("argv[" .. i .. "] = " .. v)
--end
-- !!! FIXME: message box, exit if basedir is wack.
-- !!! FIXME: this can probably happen in C now (the Lua mainline is basically gone now).
--print("Now waiting for keyhook.")
364
365
giveControlToGui()
366
-- end of 1pass.lua ...