=================================================================== RCS file: /cvs/palm/Palm-Keyring/lib/Palm/Keyring.pm,v retrieving revision 1.10 retrieving revision 1.11 diff -u -r1.10 -r1.11 --- palm/Palm-Keyring/lib/Palm/Keyring.pm 2006/12/06 18:45:42 1.10 +++ palm/Palm-Keyring/lib/Palm/Keyring.pm 2007/01/27 23:59:29 1.11 @@ -8,8 +8,8 @@ # # This started as Memo.pm, I just made it work for Keyring. # -# $Id: Keyring.pm,v 1.10 2006/12/06 18:45:42 andrew Exp $ -# $RedRiver: Keyring.pm,v 1.9 2006/11/10 17:49:51 andrew Exp $ +# $Id: Keyring.pm,v 1.11 2007/01/27 23:59:29 andrew Exp $ +# $RedRiver: Keyring.pm,v 1.10 2006/12/06 18:45:42 andrew Exp $ use strict; package Palm::Keyring; @@ -27,7 +27,7 @@ # One liner, to allow MakeMaker to work. -$VERSION = do { my @r = (q$Revision: 1.10 $ =~ /\d+/g); sprintf "%d."."%02d" x $#r, @r }; +$VERSION = do { my @r = (q$Revision: 1.11 $ =~ /\d+/g); sprintf "%d."."%02d" x $#r, @r }; @ISA = qw( Palm::StdAppInfo Palm::Raw ); @@ -37,21 +37,24 @@ =head1 SYNOPSIS - use Palm::Keyring; - $pdb->Decrypt('mypassword'); + use Palm::Keyring; + $pdb->Load($file); + $pdb->Decrypt($assword); =head1 DESCRIPTION The Keyring PDB handler is a helper class for the Palm::PDB package. It -parses Keyring databases. See +parses Keyring for Palm OS databases. See L. -It is just the standard Palm::Raw with 2 additional public methods. Decrypt and Encrypt. +It has the standard Palm::Raw with 2 additional public methods. +Decrypt and Encrypt. =cut + =head2 new - $pdb = new Palm::Keyring ('password'); + $pdb = new Palm::Keyring($password); Create a new PDB, initialized with the various Palm::Keyring fields and an empty record list. @@ -59,7 +62,7 @@ Use this method if you're creating a Keyring PDB from scratch. =cut -#' + sub new { my $classname = shift; @@ -88,7 +91,7 @@ # Give the PDB the first record that will hold the encrypted password $self->{records} = [ $self->new_Record ]; - if ($pass) { + if (defined $pass) { $self->Encrypt($pass); } @@ -102,12 +105,34 @@ ); } +=pod + +=head2 Load + + $pdb->Load($filename[, $password]); + +Overrides the standard Palm::Raw Load() to add +$record->{'plaintext'}->{'name'} and +$record->{'encrypted'} fields. +$record->{'plaintext'}->{'name'} holds the name of the record, +$record->{'encrypted'} is the encrypted information in the PDB. + +It also takes an additional optional parameter, which is the password to use to +decrypt the database. + +See Decrypt() for the additional fields that are available after decryption. + +=cut + sub Load { - my $self = shift; + my $self = shift; + my $filename = shift; + my $password = shift; + $self->{'appinfo'} = {}; $self->{'records'} = []; - $self->SUPER::Load(@_); + $self->SUPER::Load($filename); foreach my $record (@{ $self->{records} }) { next unless exists $record->{data}; @@ -116,24 +141,56 @@ $record->{plaintext}->{name} = $name; $record->{encrypted} = $encrypted; } + + return $self->Decrypt($password) if defined $password; + 1; } +=pod + +=head2 Write + + $pdb->Write($filename[, $password]); + +Just like the Palm::Raw::Write() but encrypts everything before saving. + +Also takes an optional password to encrypt with a new password, not needed +unless you are changing the password. + +=cut + sub Write { my $self = shift; - $self->Encrypt() || return undef; - return $self->SUPER::Write(@_); + my $filename = shift; + my $password = shift; + + $self->Encrypt($password) || return undef; + return $self->SUPER::Write($filename); } +=pod + +=head2 Encrypt + + $pdb->Encrypt([$password]); + +Encrypts the PDB, either with the password used to decrypt or create it, or +optionally with a password that is passed. + +See Decrypt() for an what plaintext fields are available to be encrypted. + +=cut + sub Encrypt { my $self = shift; my $pass = shift; - if ($pass) { - unless ($self->_keyring_verify($pass) ) { + unless (exists $self->{'records'}->[0]->{'data'} && + $self->_keyring_verify($pass) ) { # This would encrypt with a new password. # First decrypting everything with the old password of course. $self->_keyring_update($pass) || return undef; @@ -163,9 +220,27 @@ $record->{data} = join("\000", $name, $encrypted); } - return 1; + 1; } +=head2 Decrypt + + $pdb->Decrypt([$password]); + +Decrypts the PDB and fills out the rest of the fields available in +$record->{'plaintext'}. + +The plaintext should now be this, before encryption or after decryption: + + $record->{'plaintext'} = { + name => $name, + account => $account, + password => $account_password, + description => $description, + }; + +=cut + sub Decrypt { my $self = shift; @@ -214,7 +289,7 @@ } - return 1; + 1; } sub _calc_keys @@ -245,7 +320,6 @@ my $pass = shift; die "No password specified!" unless $pass; - $self->{password} = $pass; # AFAIK the thing we use to test the password is # always in the first entry @@ -265,8 +339,9 @@ if ($data eq $salt . $digest) { # May as well generate the keys we need now, since we know the password is right - $self->{digest} = _calc_keys($self->{password}); + $self->{digest} = _calc_keys($pass); if ($self->{digest}) { + $self->{password} = $pass; return 1; } else { return undef; @@ -316,8 +391,6 @@ return 1; } - -# XXX It looks like they are using des_ecb2_encrypt so I dunno if that is different sub _crypt3des { my ( $plaintext, $passphrase, $flag ) = @_; my $NULL = chr(0); @@ -333,18 +406,6 @@ $C[$_] = new Crypt::DES( pack( "H*", substr($passphrase, 16*$_, 16 ))); } - -# XXX From Crypt::TripleDES -# http://search.cpan.org/src/VIPUL/Crypt-TripleDES-0.24/lib/Crypt/TripleDES.pm -# -# for ( 0 .. (($size)/8) -1 ) { -# my $pt = substr( $plaintext, $_*8, 8 ); -# $pt = Crypt::PPDES::des_ecb_encrypt( $flag ? $keyvecs{0} : $keyvecs{2}, $flag, $pt ); -# $pt = Crypt::PPDES::des_ecb_encrypt( $keyvecs{1}, (not $flag), $pt ); -# $pt = Crypt::PPDES::des_ecb_encrypt( $flag ? $keyvecs{2} : $keyvecs{0}, $flag, $pt ); -# $cyphertext .= $pt; -# } - for ( 0 .. (($size)/8)) { my $pt = substr( $plaintext, $_*8, 8 ); #print "PT: '$pt' - Length: " . length($pt) . "\n"; @@ -389,5 +450,8 @@ Palm::PDB(3) Palm::StdAppInfo(3) + +The Keyring for Palm OS website: +L =cut