Skip to content

Latest commit

 

History

History
192 lines (157 loc) · 4.9 KB

1pass.lua

File metadata and controls

192 lines (157 loc) · 4.9 KB
 
Dec 18, 2013
Dec 18, 2013
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
JSON = (loadfile "JSON.lua")()
local function dumptable(tabname, tab, depth)
if depth == nil then -- first call, before any recursion?
depth = 1
end
if tabname ~= nil then
if tab == nil then
print(tabname .. " = nil")
return
else
print(tabname .. " = {")
end
end
local depthstr = ""
for i=1,(depth*4) do
depthstr = depthstr .. " "
end
if tab.DUMPTABLE_ITERATED then
print(depthstr .. "(...circular reference...)")
else
tab.DUMPTABLE_ITERATED = true
for k,v in pairs(tab) do
if type(v) == "table" then
print(depthstr .. tostring(k) .. " = {")
dumptable(nil, v, depth + 1)
print(depthstr .. "}")
else
if k ~= "DUMPTABLE_ITERATED" then
print(depthstr .. tostring(k) .. " = " .. tostring(v))
end
end
end
tab.DUMPTABLE_ITERATED = nil
end
if tabname ~= nil then
print("}")
end
end
Dec 18, 2013
Dec 18, 2013
45
46
local function load_json_str(str, desc)
local retval = JSON:decode(str)
Dec 19, 2013
Dec 19, 2013
47
--dumptable("JSON " .. desc, retval)
Dec 18, 2013
Dec 18, 2013
48
49
50
return retval
end
Dec 18, 2013
Dec 18, 2013
51
52
53
54
55
56
57
58
59
local function load_json(fname)
local f = io.open(fname, "rb")
if (f == nil) then
return nil
end
local str = f:read("*all")
f:close()
Dec 18, 2013
Dec 18, 2013
60
return load_json_str(str, fname)
Dec 18, 2013
Dec 18, 2013
61
62
63
end
Dec 18, 2013
Dec 18, 2013
64
local keys = {}
Dec 18, 2013
Dec 18, 2013
65
function loadKey(basedir, level, password)
Dec 18, 2013
Dec 18, 2013
66
67
68
69
if keys[level] ~= nil then
return keys[level]
end
Dec 18, 2013
Dec 18, 2013
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
local keysjson = load_json(basedir .. "/encryptionKeys.js");
if (keysjson == nil) or (keysjson[level] == nil) then
return nil
end
local identifier = keysjson[level]
for i,v in ipairs(keysjson.list) do
if v.identifier == identifier then
local iterations = v.iterations
if (iterations == nil) or (iterations < 1000) then
iterations = 1000
end
local decrypted = decryptUsingPBKDF2(v.data, password, iterations)
if decrypted == nil then
return nil
end
local validate = decryptBase64UsingKey(v.validation, decrypted)
if validate ~= decrypted then
return nil
end
Dec 18, 2013
Dec 18, 2013
93
keys[level] = decrypted
Dec 18, 2013
Dec 18, 2013
94
95
96
97
98
99
100
return decrypted
end
end
return nil
end
Dec 18, 2013
Dec 18, 2013
101
local function showHint(basedir)
Dec 18, 2013
Dec 18, 2013
102
103
104
105
106
107
108
109
110
111
112
local f = io.open(basedir .. "/.password.hint", "r")
if (f == nil) then
return
end
local str = f:read("*all")
f:close()
print("(hint is '" .. str .. "').")
end
Dec 18, 2013
Dec 18, 2013
113
Dec 18, 2013
Dec 18, 2013
114
115
116
117
function loadContents(basedir)
return load_json(basedir .. "/contents.js");
end
Dec 19, 2013
Dec 19, 2013
118
119
120
121
122
123
124
125
126
127
128
129
130
local function shouldFilterOut(filter, type, name, url)
if filter == nil then
return false -- no filter? Don't filter.
elseif type == "system.Tombstone" then
return true -- I guess those are dead items?
elseif string.find(string.lower(name), filter) ~= nil then
return false -- matched keep-filter on name
elseif string.find(string.lower(url), filter) ~= nil then
return false -- matched keep-filter on URL
end
return true -- didn't match our keep-filter. Chuck it.
end
Dec 18, 2013
Dec 18, 2013
131
Dec 18, 2013
Dec 18, 2013
132
133
-- Mainline!
Dec 19, 2013
Dec 19, 2013
134
135
136
137
--for i,v in ipairs(argv) do
-- print("argv[" .. i .. "] = " .. v)
--end
Dec 18, 2013
Dec 18, 2013
138
139
local basedir = "1Password/1Password.agilekeychain/data/default" -- !!! FIXME
Dec 19, 2013
Dec 19, 2013
140
141
142
143
144
145
local password = argv[3]
if password == nil then
showHint(basedir)
io.write("password: ")
password = io.read("*l")
end
Dec 18, 2013
Dec 18, 2013
146
Dec 18, 2013
Dec 18, 2013
147
if loadKey(basedir, "SL5", password) == nil then
Dec 18, 2013
Dec 18, 2013
148
149
150
151
print("wrong password?\n")
os.exit(1)
end
Dec 19, 2013
Dec 19, 2013
152
153
154
155
156
local filter = argv[2]
if filter ~= nil then
filter = string.lower(filter)
end
Dec 18, 2013
Dec 18, 2013
157
158
items = loadContents(basedir)
for i,v in ipairs(items) do
Dec 19, 2013
Dec 19, 2013
159
160
161
162
local type = v[2]
local name = v[3]
local url = v[4]
if not shouldFilterOut(filter, type, name, url) then
Dec 18, 2013
Dec 18, 2013
163
164
165
local metadata = load_json(basedir .. "/" .. v[1] .. ".1password")
if metadata ~= nil then
local plaintext = decryptBase64UsingKey(metadata.encrypted, loadKey(basedir, metadata.securityLevel, password))
Dec 19, 2013
Dec 19, 2013
166
167
local username = nil
local password = nil
Dec 18, 2013
Dec 18, 2013
168
169
if plaintext ~= nil then
local secure = load_json_str(plaintext, v[1])
Dec 19, 2013
Dec 19, 2013
170
171
172
173
174
175
176
177
178
179
180
if type == "webforms.WebForm" then
for ii,vv in ipairs(secure.fields) do
if vv.type == "P" then
password = vv.value
elseif vv.type == "E" then
username = vv.value
end
end
elseif type == "passwords.Password" then
password = secure.password
end
Dec 18, 2013
Dec 18, 2013
181
end
Dec 19, 2013
Dec 19, 2013
182
183
184
185
186
print("item: " .. metadata.title)
if username ~= nil then print("username: " .. username) end
if password ~= nil then print("password: " .. password) end
Dec 18, 2013
Dec 18, 2013
187
188
189
end
end
end
Dec 18, 2013
Dec 18, 2013
190
Dec 18, 2013
Dec 18, 2013
191
-- end of 1pass.lua ...