Skip to content

Latest commit

 

History

History
195 lines (159 loc) · 5.18 KB

1pass.lua

File metadata and controls

195 lines (159 loc) · 5.18 KB
 
Dec 18, 2013
Dec 18, 2013
1
2
JSON = (loadfile "JSON.lua")()
Dec 18, 2013
Dec 18, 2013
3
4
5
6
7
local function load_json_str(str, desc)
local retval = JSON:decode(str)
return retval
end
Dec 18, 2013
Dec 18, 2013
8
9
10
11
12
13
14
15
16
local function load_json(fname)
local f = io.open(fname, "rb")
if (f == nil) then
return nil
end
local str = f:read("*all")
f:close()
Dec 18, 2013
Dec 18, 2013
17
return load_json_str(str, fname)
Dec 18, 2013
Dec 18, 2013
18
19
20
end
Dec 18, 2013
Dec 18, 2013
21
local keys = {}
Dec 18, 2013
Dec 18, 2013
22
function loadKey(basedir, level, password)
Dec 18, 2013
Dec 18, 2013
23
24
25
26
if keys[level] ~= nil then
return keys[level]
end
Dec 18, 2013
Dec 18, 2013
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
local keysjson = load_json(basedir .. "/encryptionKeys.js");
if (keysjson == nil) or (keysjson[level] == nil) then
return nil
end
local identifier = keysjson[level]
for i,v in ipairs(keysjson.list) do
if v.identifier == identifier then
local iterations = v.iterations
if (iterations == nil) or (iterations < 1000) then
iterations = 1000
end
local decrypted = decryptUsingPBKDF2(v.data, password, iterations)
if decrypted == nil then
return nil
end
local validate = decryptBase64UsingKey(v.validation, decrypted)
if validate ~= decrypted then
return nil
end
Dec 18, 2013
Dec 18, 2013
50
keys[level] = decrypted
Dec 18, 2013
Dec 18, 2013
51
52
53
54
55
56
57
return decrypted
end
end
return nil
end
Dec 18, 2013
Dec 18, 2013
58
local function showHint(basedir)
Dec 18, 2013
Dec 18, 2013
59
60
61
62
63
64
65
66
67
68
69
local f = io.open(basedir .. "/.password.hint", "r")
if (f == nil) then
return
end
local str = f:read("*all")
f:close()
print("(hint is '" .. str .. "').")
end
Dec 18, 2013
Dec 18, 2013
70
Dec 18, 2013
Dec 18, 2013
71
72
73
74
function loadContents(basedir)
return load_json(basedir .. "/contents.js");
end
Dec 19, 2013
Dec 19, 2013
75
76
77
78
79
80
81
82
83
84
85
86
87
local function shouldFilterOut(filter, type, name, url)
if filter == nil then
return false -- no filter? Don't filter.
elseif type == "system.Tombstone" then
return true -- I guess those are dead items?
elseif string.find(string.lower(name), filter) ~= nil then
return false -- matched keep-filter on name
elseif string.find(string.lower(url), filter) ~= nil then
return false -- matched keep-filter on URL
end
return true -- didn't match our keep-filter. Chuck it.
end
Dec 18, 2013
Dec 18, 2013
88
Dec 18, 2013
Dec 18, 2013
89
90
-- Mainline!
Dec 19, 2013
Dec 19, 2013
91
92
93
94
--for i,v in ipairs(argv) do
-- print("argv[" .. i .. "] = " .. v)
--end
Dec 18, 2013
Dec 18, 2013
95
96
local basedir = "1Password/1Password.agilekeychain/data/default" -- !!! FIXME
Dec 22, 2013
Dec 22, 2013
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
local passwordTypeNameMap = {
["wallet.financial.BankAccountUS"] = "Bank accounts",
["wallet.financial.CreditCard"] = "Credit cards",
["webforms.WebForm"] = "Logins",
["system.Tombstone"] = "Dead items",
["wallet.membership.Membership"] = "Memberships",
["wallet.government.DriversLicense"] = "Drivers licenses",
["passwords.Password"] = "Passwords",
-- !!! FIXME: more!
}
local contents = loadContents(basedir)
local items = {}
for i,v in ipairs(contents) do
local t = v[2]
if t ~= "system.Tombstone" then
if items[t] == nil then
items[t] = {}
end
local bucket = items[t]
bucket[#bucket+1] = { uuid=v[1], type=t, name=v[3], url=v[4] } -- !!! FIXME: there are more fields, don't know what they mean yet.
end
end
contents = nil
local topmenu = makeGuiMenu()
for type,bucket in pairs(items) do
print(type)
local realname = passwordTypeNameMap[type]
if realname == nil then
realname = type
end
local menuitem = appendGuiMenuItem(topmenu, realname)
local submenu = makeGuiMenu()
for i,v in pairs(bucket) do
local submenuitem = appendGuiMenuItem(submenu, v.name, function() print("Clicked on " .. v.name .. ", uuid is '" .. v.uuid .. "'") end)
end
setGuiMenuItemSubmenu(menuitem, submenu)
end
popupGuiMenu(topmenu)
giveControlToGui()
os.exit(1)
Dec 19, 2013
Dec 19, 2013
143
144
145
146
147
148
local password = argv[3]
if password == nil then
showHint(basedir)
io.write("password: ")
password = io.read("*l")
end
Dec 18, 2013
Dec 18, 2013
149
Dec 18, 2013
Dec 18, 2013
150
if loadKey(basedir, "SL5", password) == nil then
Dec 18, 2013
Dec 18, 2013
151
152
153
154
print("wrong password?\n")
os.exit(1)
end
Dec 19, 2013
Dec 19, 2013
155
156
157
158
159
local filter = argv[2]
if filter ~= nil then
filter = string.lower(filter)
end
Dec 18, 2013
Dec 18, 2013
160
161
items = loadContents(basedir)
for i,v in ipairs(items) do
Dec 19, 2013
Dec 19, 2013
162
163
164
165
local type = v[2]
local name = v[3]
local url = v[4]
if not shouldFilterOut(filter, type, name, url) then
Dec 18, 2013
Dec 18, 2013
166
167
168
local metadata = load_json(basedir .. "/" .. v[1] .. ".1password")
if metadata ~= nil then
local plaintext = decryptBase64UsingKey(metadata.encrypted, loadKey(basedir, metadata.securityLevel, password))
Dec 19, 2013
Dec 19, 2013
169
170
local username = nil
local password = nil
Dec 18, 2013
Dec 18, 2013
171
172
if plaintext ~= nil then
local secure = load_json_str(plaintext, v[1])
Dec 19, 2013
Dec 19, 2013
173
174
175
176
177
178
179
180
181
182
183
if type == "webforms.WebForm" then
for ii,vv in ipairs(secure.fields) do
if vv.type == "P" then
password = vv.value
elseif vv.type == "E" then
username = vv.value
end
end
elseif type == "passwords.Password" then
password = secure.password
end
Dec 18, 2013
Dec 18, 2013
184
end
Dec 19, 2013
Dec 19, 2013
185
186
187
188
189
print("item: " .. metadata.title)
if username ~= nil then print("username: " .. username) end
if password ~= nil then print("password: " .. password) end
Dec 18, 2013
Dec 18, 2013
190
191
192
end
end
end
Dec 18, 2013
Dec 18, 2013
193
Dec 18, 2013
Dec 18, 2013
194
-- end of 1pass.lua ...