-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathsr_keychain.c
188 lines (166 loc) · 5.55 KB
/
sr_keychain.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
#include "sr_keychain.h"
#ifndef SR_KEYCHAIN_MALLOC
# define SR_KEYCHAIN_MALLOC(S) (malloc(S))
#endif
#ifndef SR_KEYCHAIN_FREE
# define SR_KEYCHAIN_FREE(S) (free(S))
#endif
#ifndef SR_KEYCHAIN_MEMCPY
# define SR_KEYCHAIN_MEMCPY(D, S, T) (memcpy(D, S, T))
#endif
#ifndef SR_KEYCHAIN_LINUX_SCHEME_NAME
# define SR_KEYCHAIN_LINUX_SCHEME_NAME "com.sr.sr_keychain"
#endif
#ifdef _WIN32
# include <windows.h>
#else
# include <termios.h>
#endif
#ifdef __APPLE__
# include <Security/Security.h>
#endif
#ifdef _WIN32
# include <wincred.h>
# include <stdio.h>
wchar_t* _sr_keychain_get_complete_url(const char* domain, const char* user) {
const size_t length = strlen(user) + 1 + strlen(domain);
char* domainAndUser = (char*)SR_KEYCHAIN_MALLOC(sizeof(char) * (length + 1));
if(domainAndUser == NULL) {
return NULL;
}
snprintf(domainAndUser, length, "%s@%s", user, domain);
const int sizeWide = MultiByteToWideChar(CP_UTF8, 0, domainAndUser, -1, NULL, 0);
wchar_t* targetName = (wchar_t*)SR_KEYCHAIN_MALLOC(sizeWide * sizeof(wchar_t));
MultiByteToWideChar(CP_UTF8, 0, domainAndUser, -1, targetName, sizeWide);
SR_KEYCHAIN_FREE(domainAndUser);
return targetName;
}
#endif
#ifdef __linux__
# include <libsecret/secret.h>
// Declare secret scheme.
const SecretSchema* _sr_keychain_get_schema() {
static SecretSchema schema;
schema.name = SR_KEYCHAIN_LINUX_SCHEME_NAME;
schema.flags = SECRET_SCHEMA_NONE;
schema.attributes[0].name = "domain";
schema.attributes[0].type = SECRET_SCHEMA_ATTRIBUTE_STRING;
schema.attributes[1].name = "user";
schema.attributes[1].type = SECRET_SCHEMA_ATTRIBUTE_STRING;
schema.attributes[2].name = "NULL";
schema.attributes[2].type = (SecretSchemaAttributeType)0;
return &schema;
}
#endif
int sr_keychain_get_password(const char* domain, const char* user, char** password) {
#if defined(__APPLE__)
UInt32 passLength;
char* passBuffer;
OSStatus stat = SecKeychainFindInternetPassword(NULL, strlen(domain), domain, 0, NULL, strlen(user), user, 0, NULL, 0, kSecProtocolTypeAny, kSecAuthenticationTypeDefault, &passLength, (void**)&passBuffer, NULL);
if(stat == 0) {
*password = (char*)SR_KEYCHAIN_MALLOC(sizeof(char) * (passLength + 1));
SR_KEYCHAIN_MEMCPY(*password, passBuffer, sizeof(char) * passLength);
(*password)[passLength] = '\0';
return 0;
}
#elif defined(_WIN32)
wchar_t* targetName = _sr_keychain_get_complete_url(domain, user);
if(targetName == NULL) {
return 1;
}
PCREDENTIALW credential;
BOOL stat = CredReadW(targetName, CRED_TYPE_GENERIC, 0, &credential);
SR_KEYCHAIN_FREE(targetName);
if(stat) {
const int passLength = credential->CredentialBlobSize;
*password = (char*)SR_KEYCHAIN_MALLOC(sizeof(char) * (passLength + 1));
SR_KEYCHAIN_MEMCPY(*password, (const char*)credential->CredentialBlob, sizeof(char) * passLength);
(*password)[passLength] = '\0';
CredFree(credential);
return 0;
}
#elif defined(__linux__)
GError* stat = NULL;
gchar* passBuffer = secret_password_lookup_sync(_sr_keychain_get_schema(), NULL, &stat,
"domain", domain, "user", user, NULL);
if(stat != NULL) {
g_error_free(stat);
return 1;
}
if(passBuffer == NULL) {
return 1;
}
const int passLength = strlen(passBuffer);
*password = (char*)SR_KEYCHAIN_MALLOC(sizeof(char) * (passLength + 1));
SR_KEYCHAIN_MEMCPY(*password, passBuffer, sizeof(char) * passLength);
(*password)[passLength] = '\0';
secret_password_free(passBuffer);
return 0;
#else
# pragma message("Unsupported platform for sr_keychain.")
#endif
return 1;
}
int sr_keychain_set_password(const char* domain, char* user, const char* password) {
#if defined(__APPLE__)
SecKeychainItemRef item;
OSStatus stat = SecKeychainFindInternetPassword(NULL, strlen(domain), domain, 0, NULL, strlen(user), user, 0, NULL, 0, kSecProtocolTypeAny, kSecAuthenticationTypeDefault, 0, NULL, &item);
if(stat == 0) {
// If the item already exists, modify it.
stat = SecKeychainItemModifyAttributesAndData(item, NULL, strlen(password), password);
} else {
// Else create it.
stat = SecKeychainAddInternetPassword(NULL, strlen(domain), domain, 0, NULL, strlen(user), user, 0, NULL, 0, kSecProtocolTypeAny, kSecAuthenticationTypeDefault, strlen(password), password, NULL);
}
return stat == 0 ? 0 : 1;
#elif defined(_WIN32)
wchar_t* targetName = _sr_keychain_get_complete_url(domain, user);
if(targetName == NULL) {
return 1;
}
CREDENTIALW credsToAdd = {0};
credsToAdd.Flags = 0;
credsToAdd.Type = CRED_TYPE_GENERIC;
credsToAdd.TargetName = (LPWSTR)targetName;
credsToAdd.CredentialBlob = (LPBYTE)password;
credsToAdd.CredentialBlobSize = (int)strlen(password);
credsToAdd.Persist = CRED_PERSIST_LOCAL_MACHINE;
// This will overwrite the credential if it already exists.
BOOL stat = CredWrite(&credsToAdd, 0);
SR_KEYCHAIN_FREE(targetName);
return stat ? 0 : 1;
#elif defined(__linux__)
GError* stat = NULL;
secret_password_store_sync(_sr_keychain_get_schema(), SECRET_COLLECTION_DEFAULT, "", password, NULL, &stat, "domain", domain, "user", user, NULL);
if(stat != NULL) {
g_error_free(stat);
return 1;
}
return 0;
#else
# pragma message("Unsupported platform for sr_keychain.")
#endif
return 1;
}
void sr_keychain_set_stdin_printback(int enable) {
#ifdef _WIN32
HANDLE hstdin = GetStdHandle(STD_INPUT_HANDLE);
DWORD mode;
GetConsoleMode(hstdin, &mode);
if(enable != 0) {
mode |= ENABLE_ECHO_INPUT;
} else {
mode &= ~ENABLE_ECHO_INPUT;
}
SetConsoleMode(hstdin, mode);
#else
struct termios tty;
tcgetattr(STDIN_FILENO, &tty);
if(enable != 0) {
tty.c_lflag |= ECHO;
} else {
tty.c_lflag &= ~ECHO;
}
tcsetattr(STDIN_FILENO, TCSANOW, &tty);
#endif
}