/
1pass.lua
360 lines (296 loc) · 11 KB
1
JSON = (loadfile "JSON.lua")()
2
3
dofile("dumptable.lua")
4
5
6
7
8
local basedir = "1Password/1Password.agilekeychain/data/default" -- !!! FIXME
local password = argv[2]
local items = nil
local keyhookRunning = false
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
local passwordTypeNameMap = {
["webforms.WebForm"] = "Logins",
["wallet.financial.CreditCard"] = "Credit cards",
["passwords.Password"] = "Passwords",
["wallet.financial.BankAccountUS"] = "Bank accounts",
["wallet.membership.Membership"] = "Memberships",
["wallet.government.DriversLicense"] = "Drivers licenses",
["system.Tombstone"] = "Dead items",
-- !!! FIXME: more!
}
local passwordTypeOrdering = {
"webforms.WebForm",
"wallet.financial.CreditCard",
"passwords.Password",
"wallet.financial.BankAccountUS",
"wallet.membership.Membership",
"wallet.government.DriversLicense",
-- never show "system.Tombstone",
-- !!! FIXME: more!
}
30
31
32
33
34
35
local function load_json_str(str, desc)
local retval = JSON:decode(str)
return retval
end
36
37
38
39
40
41
42
43
44
local function load_json(fname)
local f = io.open(fname, "rb")
if (f == nil) then
return nil
end
local str = f:read("*all")
f:close()
45
return load_json_str(str, fname)
46
47
48
end
49
local keys = {}
50
local function loadKey(level, password)
51
52
53
54
if keys[level] ~= nil then
return keys[level]
end
55
local keysjson = load_json(basedir .. "/encryptionKeys.js")
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
if (keysjson == nil) or (keysjson[level] == nil) then
return nil
end
local identifier = keysjson[level]
for i,v in ipairs(keysjson.list) do
if v.identifier == identifier then
local iterations = v.iterations
if (iterations == nil) or (iterations < 1000) then
iterations = 1000
end
local decrypted = decryptUsingPBKDF2(v.data, password, iterations)
if decrypted == nil then
return nil
end
local validate = decryptBase64UsingKey(v.validation, decrypted)
if validate ~= decrypted then
return nil
end
78
keys[level] = decrypted
79
80
81
82
83
84
85
return decrypted
end
end
return nil
end
86
local function getHint()
87
88
89
90
91
local f = io.open(basedir .. "/.password.hint", "r")
if (f == nil) then
return
end
92
local str = "(hint is '" .. f:read("*all") .. "')."
93
f:close()
94
95
--print(str)
return str
96
97
end
98
99
local function loadContents()
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
return load_json(basedir .. "/contents.js")
end
local function build_secret_menuitem(menu, type, str, hidden)
if str == nil then
return nil
end
local valuestr = str
if hidden == true then
valuestr = "*****"
end
local text = type .. " " .. valuestr
local callback = function()
copyToClipboard(str)
--print("Copied data [" .. str .. "] to clipboard.")
117
keyhookRunning = false
118
119
end
return appendGuiMenuItem(menu, text, callback)
120
121
end
122
123
124
125
126
127
128
129
local secret_menuitem_builders = {}
local function build_secret_menuitem_webform(menu, info, secure)
local addthis = false
local username = nil
local password = nil
local email = nil
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
for i,v in ipairs(secure.fields) do
--print(info.name .. ": " .. v.type .. ", " .. v.value)
local ignored = false
if (v.type == "P") and (password == nil) and (v.value ~= "") then
password = v.value
elseif (v.type == "T") and (usenname == nil) and (v.value ~= "") then
username = v.value
elseif (v.type == "E") and (email == nil) and (v.value ~= "") then
email = v.value
else
ignored = true
end
if not ignored then
addthis = true
end
end
if addthis then
if (username ~= nil) and (email ~= nil) and (email == username) then
email = nil
end
build_secret_menuitem(menu, "username", username)
build_secret_menuitem(menu, "email", email)
build_secret_menuitem(menu, "password", password, true)
157
end
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
end
secret_menuitem_builders["webforms.WebForm"] = build_secret_menuitem_webform
local function build_secret_menuitem_password(menu, info, secure)
build_secret_menuitem(menu, "password", secure.password, true)
end
secret_menuitem_builders["passwords.Password"] = build_secret_menuitem_password
local function build_secret_menuitem_bankacctus(menu, info, secure)
-- !!! FIXME: there's more data than this in a generic dictionary.
build_secret_menuitem(menu, "Account type", secure.accountType)
build_secret_menuitem(menu, "Routing number", secure.routingNo)
build_secret_menuitem(menu, "Account number", secure.accountNo)
build_secret_menuitem(menu, "Bank name", secure.bankName)
build_secret_menuitem(menu, "Owner", secure.owner)
end
secret_menuitem_builders["wallet.financial.BankAccountUS"] = build_secret_menuitem_bankacctus
local function build_secret_menuitem_driverslic(menu, info, secure)
-- !!! FIXME: there's more data than this in a generic dictionary.
local birthdate = secure.birthdate_yy .. "/" .. string.sub("00" .. secure.birthdate_mm, -2) .. "/" .. string.sub("00" .. secure.birthdate_dd, -2)
local expiredate = secure.expiry_date_yy .. "/" .. string.sub("00" .. secure.expiry_date_mm, -2)
build_secret_menuitem(menu, "License number", secure.number)
build_secret_menuitem(menu, "Class", secure.class)
build_secret_menuitem(menu, "Expires", expiredate)
build_secret_menuitem(menu, "State", secure.state)
build_secret_menuitem(menu, "Country", secure.country)
build_secret_menuitem(menu, "Conditions", secure.conditions)
build_secret_menuitem(menu, "Full name", secure.fullname)
build_secret_menuitem(menu, "Address", secure.address)
build_secret_menuitem(menu, "Gender", secure.sex)
build_secret_menuitem(menu, "Birthdate", birthdate)
build_secret_menuitem(menu, "Height", secure.height)
end
secret_menuitem_builders["wallet.government.DriversLicense"] = build_secret_menuitem_driverslic
local function build_secret_menuitem_membership(menu, info, secure)
-- !!! FIXME: there's more data than this in a generic dictionary.
build_secret_menuitem(menu, "Membership number", secure.membership_no)
end
secret_menuitem_builders["wallet.membership.Membership"] = build_secret_menuitem_membership
local function build_secret_menuitem_creditcard(menu, info, secure)
-- !!! FIXME: there's more data than this in a generic dictionary.
local expiredate = secure.expiry_yy .. "/" .. string.sub("00" .. secure.expiry_mm, -2)
build_secret_menuitem(menu, "Type", secure.type)
build_secret_menuitem(menu, "CC number", secure.ccnum, true)
build_secret_menuitem(menu, "CVV", secure.cvv, true)
build_secret_menuitem(menu, "Expires", secure.expirydate)
build_secret_menuitem(menu, "Card holder", secure.cardholder)
build_secret_menuitem(menu, "Bank", secure.bank)
end
secret_menuitem_builders["wallet.financial.CreditCard"] = build_secret_menuitem_creditcard
218
local function build_secret_menuitems(info, menu)
219
220
221
222
223
local metadata = load_json(basedir .. "/" .. info.uuid .. ".1password")
if metadata == nil then
return
end
224
225
226
227
228
229
230
231
232
233
234
local securityLevel = metadata.securityLevel
if securityLevel == nil then
securityLevel = metadata.openContents.securityLevel
end
print("title: " .. metadata.title)
if securityLevel == nil then
--print("can't find security level, assuming SL5" .. metadata.title)
securityLevel = "SL5"
end
local plaintext = decryptBase64UsingKey(metadata.encrypted, loadKey(securityLevel, password))
235
236
237
238
239
240
241
242
243
if plaintext == nil then
return
end
local secure = load_json_str(plaintext, info.uuid)
if secure == nil then
return
end
--dumptable("secure " .. info.name, secure)
244
245
246
247
if secure.fields == nil then
print("no secure fields, don't know how to handle this item")
return
end
248
249
250
251
252
253
254
255
256
257
258
259
local menuitem = appendGuiMenuItem(menu, info.name)
if secret_menuitem_builders[info.type] == nil then
print("WARNING: don't know how to handle items of type " .. info.type)
dumptable("secure " .. info.type .. " (" .. info.name .. ")", secure)
return
end
local submenu = makeGuiMenu()
secret_menuitem_builders[info.type](submenu, info, secure)
setGuiMenuItemSubmenu(menuitem, submenu)
260
261
end
262
263
264
265
266
267
268
local function prepItems()
items = {}
local contents = loadContents()
for i,v in ipairs(contents) do
local t = v[2]
if items[t] == nil then
items[t] = {}
269
end
270
271
local bucket = items[t]
bucket[#bucket+1] = { uuid=v[1], type=t, name=v[3], url=v[4] } -- !!! FIXME: there are more fields, don't know what they mean yet.
272
273
end
end
274
275
276
local passwordUnlockTime = nil
277
function keyhookPressed() -- not local! Called from C!
278
279
280
281
print("keyhookPressed: running==" .. tostring(keyhookRunning))
-- if keyhookRunning then
-- return
-- end
282
283
284
keyhookRunning = true
285
286
287
288
289
290
291
292
293
294
if passwordUnlockTime ~= nil then
local now = os.time()
local maxTime = (15 * 60) -- !!! FIXME: don't hardcode.
if os.difftime(now, passwordUnlockTime) > maxTime then
-- lose the existing password and key, prompt user again.
password = argv[2] -- might be nil, don't reset if on command line.
keys["SL5"] = nil
end
end
295
296
297
298
299
300
301
302
303
304
305
306
307
while password == nil do
password = runGuiPasswordPrompt(getHint())
if password == nil then
keyhookRunning = false
return
end
if loadKey("SL5", password) == nil then
password = nil -- wrong password
local start = os.time() -- cook the CPU for three seconds.
local now = start
while os.difftime(now, start) < 3 do
now = os.time()
end
308
309
else
passwordUnlockTime = os.time()
310
end
311
end
312
313
314
315
prepItems()
local topmenu = makeGuiMenu()
316
317
318
319
320
321
322
323
324
local lock_callback = function()
password = argv[2] -- might be nil, don't reset if on command line.
keys["SL5"] = nil
passwordUnlockTime = nil
keyhookRunning = false
end
appendGuiMenuItem(topmenu, "Lock keychain", lock_callback)
325
326
for orderi,type in ipairs(passwordTypeOrdering) do
local bucket = items[type]
327
328
329
330
331
332
333
334
335
336
337
338
339
340
if bucket ~= nil then
local realname = passwordTypeNameMap[type]
if realname == nil then
realname = type
end
local menuitem = appendGuiMenuItem(topmenu, realname)
local submenu = makeGuiMenu()
table.sort(bucket, function(a, b) return a.name < b.name end)
for i,v in pairs(bucket) do
build_secret_menuitems(v, submenu)
end
setGuiMenuItemSubmenu(menuitem, submenu)
else
print("no bucket found")
341
end
342
end
343
344
popupGuiMenu(topmenu)
345
346
end
347
348
349
350
351
352
353
354
355
356
-- Mainline!
--for i,v in ipairs(argv) do
-- print("argv[" .. i .. "] = " .. v)
--end
-- !!! FIXME: message box, exit if basedir is wack.
-- !!! FIXME: this can probably happen in C now (the Lua mainline is basically gone now).
--print("Now waiting for keyhook.")
357
358
giveControlToGui()
359
-- end of 1pass.lua ...