diff --git a/Cargo.lock b/Cargo.lock index 387a244..5e6db6f 100644 --- a/Cargo.lock +++ b/Cargo.lock @@ -178,7 +178,7 @@ checksum = "e0b121a9fe0df916e362fb3271088d071159cdf11db0e4182d02152850756eff" dependencies = [ "proc-macro2", "quote", - "syn 2.0.42", + "syn 2.0.43", ] [[package]] @@ -260,9 +260,9 @@ dependencies = [ [[package]] name = "clap" -version = "4.4.11" +version = "4.4.12" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "bfaff671f6b22ca62406885ece523383b9b64022e341e53e009a62ebc47a45f2" +checksum = "dcfab8ba68f3668e89f6ff60f5b205cea56aa7b769451a59f34b8682f51c056d" dependencies = [ "clap_builder", "clap_derive", @@ -270,9 +270,9 @@ dependencies = [ [[package]] name = "clap_builder" -version = "4.4.11" +version = "4.4.12" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "a216b506622bb1d316cd51328dce24e07bdff4a6128a47c7e7fad11878d5adbb" +checksum = "fb7fb5e4e979aec3be7791562fcba452f94ad85e954da024396433e0e25a79e9" dependencies = [ "anstream", "anstyle", @@ -289,7 +289,7 @@ dependencies = [ "heck", "proc-macro2", "quote", - "syn 2.0.42", + "syn 2.0.43", ] [[package]] @@ -409,7 +409,7 @@ checksum = "f46882e17999c6cc590af592290432be3bce0428cb0d5f8b6715e4dc7b383eb3" dependencies = [ "proc-macro2", "quote", - "syn 2.0.42", + "syn 2.0.43", ] [[package]] @@ -453,7 +453,7 @@ checksum = "5fe87ce4529967e0ba1dcf8450bab64d97dfd5010a6256187ffe2e43e6f0e049" dependencies = [ "proc-macro2", "quote", - "syn 2.0.42", + "syn 2.0.43", ] [[package]] @@ -515,7 +515,7 @@ checksum = "487585f4d0c6655fe74905e2504d8ad6908e4db67f744eb140876906c2f3175d" dependencies = [ "proc-macro2", "quote", - "syn 2.0.42", + "syn 2.0.43", ] [[package]] @@ -860,9 +860,9 @@ checksum = "b5e6163cb8c49088c2c36f57875e58ccd8c87c7427f7fbd50ea6710b2f3f2e8f" [[package]] name = "memchr" -version = "2.6.4" +version = "2.7.1" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "f665ee40bc4a3c5590afb1e9677db74a508659dfd71e126420da8274909a0167" +checksum = "523dc4f511e55ab87b694dc30d0f820d60906ef06413f93d4d7a1385599cc149" [[package]] name = "minimal-lexical" @@ -1104,9 +1104,9 @@ checksum = "69d3587f8a9e599cc7ec2c00e331f71c4e69a5f9a4b8a6efd5b07466b9736f9a" [[package]] name = "platforms" -version = "3.2.0" +version = "3.3.0" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "14e6ab3f592e6fb464fc9712d8d6e6912de6473954635fd76a589d832cffcbb0" +checksum = "626dec3cac7cc0e1577a2ec3fc496277ec2baa084bebad95bb6fdbfae235f84c" [[package]] name = "polyval" @@ -1513,7 +1513,7 @@ checksum = "43576ca501357b9b071ac53cdc7da8ef0cbd9493d8df094cd821777ea6e894d3" dependencies = [ "proc-macro2", "quote", - "syn 2.0.42", + "syn 2.0.43", ] [[package]] @@ -1625,9 +1625,9 @@ dependencies = [ [[package]] name = "syn" -version = "2.0.42" +version = "2.0.43" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "5b7d0a2c048d661a1a59fcd7355baa232f7ed34e0ee4df2eef3c1c1c0d3852d8" +checksum = "ee659fb5f3d355364e1f3e5bc10fb82068efbf824a1e9d1c9504244a6469ad53" dependencies = [ "proc-macro2", "quote", @@ -1693,22 +1693,22 @@ dependencies = [ [[package]] name = "thiserror" -version = "1.0.51" +version = "1.0.52" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "f11c217e1416d6f036b870f14e0413d480dbf28edbee1f877abaf0206af43bb7" +checksum = "83a48fd946b02c0a526b2e9481c8e2a17755e47039164a86c4070446e3a4614d" dependencies = [ "thiserror-impl", ] [[package]] name = "thiserror-impl" -version = "1.0.51" +version = "1.0.52" source = "registry+https://github.com/rust-lang/crates.io-index" -checksum = "01742297787513b79cf8e29d1056ede1313e2420b7b3b15d0a768b4921f549df" +checksum = "e7fbe9b594d6568a6a1443250a7e67d80b74e1e96f6d1715e1e21cc1888291d3" dependencies = [ "proc-macro2", "quote", - "syn 2.0.42", + "syn 2.0.43", ] [[package]] @@ -1753,7 +1753,7 @@ dependencies = [ [[package]] name = "tiny-encrypt" -version = "1.7.1" +version = "1.7.2" dependencies = [ "aes-gcm-stream", "base64", @@ -1806,7 +1806,7 @@ checksum = "d8e00e3e7a54e0f1c8834ce72ed49c8487fbd3f801d8cfe1a0ad0640382f8e15" dependencies = [ "proc-macro2", "quote", - "syn 2.0.42", + "syn 2.0.43", ] [[package]] @@ -1903,7 +1903,7 @@ dependencies = [ "once_cell", "proc-macro2", "quote", - "syn 2.0.42", + "syn 2.0.43", "wasm-bindgen-shared", ] @@ -1925,7 +1925,7 @@ checksum = "f0eb82fcb7930ae6219a7ecfd55b217f5f0893484b7a13022ebb2b2bf20b5283" dependencies = [ "proc-macro2", "quote", - "syn 2.0.42", + "syn 2.0.43", "wasm-bindgen-backend", "wasm-bindgen-shared", ] @@ -2258,5 +2258,5 @@ checksum = "ce36e65b0d2999d2aafac989fb249189a141aee1f53c612c1f37d72631959f69" dependencies = [ "proc-macro2", "quote", - "syn 2.0.42", + "syn 2.0.43", ] diff --git a/Cargo.toml b/Cargo.toml index 889fdf5..49a174f 100644 --- a/Cargo.toml +++ b/Cargo.toml @@ -1,6 +1,6 @@ [package] name = "tiny-encrypt" -version = "1.7.1" +version = "1.7.2" edition = "2021" license = "MIT" description = "A simple and tiny file encrypt tool" diff --git a/src/cmd_initkeychain.rs b/src/cmd_initkeychain.rs index a65a321..a607920 100644 --- a/src/cmd_initkeychain.rs +++ b/src/cmd_initkeychain.rs @@ -55,7 +55,7 @@ pub fn keychain_key_se(cmd_init_keychain: CmdInitKeychain) -> XResult<()> { return simple_error!("Secure enclave is not supported."); } - let keychain_name = cmd_init_keychain.keychain_name.as_ref().map(String::as_str).unwrap_or(""); + let keychain_name = cmd_init_keychain.keychain_name.as_deref().unwrap_or(""); let service_name = cmd_init_keychain.server_name.as_deref().unwrap_or(DEFAULT_SERVICE_NAME); let key_name = &cmd_init_keychain.key_name; @@ -85,7 +85,7 @@ pub fn keychain_key_se(cmd_init_keychain: CmdInitKeychain) -> XResult<()> { } pub fn keychain_key_static(cmd_init_keychain: CmdInitKeychain) -> XResult<()> { - let keychain_name = cmd_init_keychain.keychain_name.as_ref().map(String::as_str).unwrap_or(""); + let keychain_name = cmd_init_keychain.keychain_name.as_deref().unwrap_or(""); let service_name = cmd_init_keychain.server_name.as_deref().unwrap_or(DEFAULT_SERVICE_NAME); let key_name = &cmd_init_keychain.key_name; let keychain_key = KeychainKey::from(keychain_name, service_name, key_name); diff --git a/src/util_keychainstatic.rs b/src/util_keychainstatic.rs index e28e0c7..f3a56fa 100644 --- a/src/util_keychainstatic.rs +++ b/src/util_keychainstatic.rs @@ -1,8 +1,10 @@ +use std::path::PathBuf; + use pqcrypto_kyber::kyber1024; use pqcrypto_kyber::kyber1024::Ciphertext as Kyber1024Ciphertext; use pqcrypto_kyber::kyber1024::PublicKey as Kyber1024PublicKey; use pqcrypto_kyber::kyber1024::SecretKey as Kyber1024SecretKey; -use rust_util::{debugging, opt_result, opt_value_result, simple_error, XResult}; +use rust_util::{debugging, opt_result, opt_value_result, simple_error, util_file, XResult}; use security_framework::os::macos::keychain::{CreateOptions, SecKeychain}; use x25519_dalek::{PublicKey, StaticSecret}; use zeroize::Zeroize; @@ -202,15 +204,18 @@ impl KeychainKey { fn get_keychain(&self) -> XResult { if !self.keychain_name.is_empty() { - // TODO --keychain-name test failed - debugging!("Open or create keychain: {}", &self.keychain_name); - let keychain_path = format!("{}.keychain", &self.keychain_name); - debugging!("Keychain path: {}", &keychain_path); - match SecKeychain::open(&keychain_path) { - Ok(sec_keychain) => Ok(sec_keychain), - Err(e) => match CreateOptions::new().prompt_user(true).create(&keychain_path) { + let keychain_file_name = format!("{}.keychain", &self.keychain_name); + debugging!("Open or create keychain: {}", &keychain_file_name); + let keychain_exists = check_keychain_exists(&keychain_file_name); + if keychain_exists { + Ok(opt_result!(SecKeychain::open(&keychain_file_name), "Open keychain: {}, failed: {}", &keychain_file_name)) + } else { + match CreateOptions::new().prompt_user(true).create(&keychain_file_name) { Ok(sec_keychain) => Ok(sec_keychain), - Err(ce) => simple_error!("Open keychain: {}, failed: {}, create also failed: {}", &self.keychain_name, e, ce) + Err(ce) => match SecKeychain::open(&keychain_file_name) { + Ok(sec_keychain) => Ok(sec_keychain), + Err(oe) => simple_error!("Create keychain: {}, failed: {}, open also failed: {}", &self.keychain_name, ce, oe) + } } } } else { @@ -261,4 +266,29 @@ pub fn generate_static_kyber1024_secret() -> (String, Kyber1024PublicKey) { let kyber1024_static_secret = KeychainStaticSecret::from_kyber1024_bytes(static_secret_bytes, static_public_bytes); (kyber1024_static_secret.to_str(), public_key) +} + +fn check_keychain_exists(keychain_file_name: &str) -> bool { + let keychain_path = PathBuf::from(util_file::resolve_file_path("~/Library/Keychains/")); + match keychain_path.read_dir() { + Ok(read_dir) => { + for dir in read_dir { + match dir { + Ok(dir) => if let Some(file_name) = dir.file_name().to_str() { + if file_name.starts_with(keychain_file_name) { + debugging!("Found key chain file: {:?}", dir); + return true; + } + } + Err(e) => { + debugging!("Read path sub dir: {:?} failed: {}", keychain_path, e); + } + } + } + } + Err(e) => { + debugging!("Read path: {:?} failed: {}", keychain_path, e); + } + } + false } \ No newline at end of file