You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Some apps use kSecClassKey to store IDs, passwords and credentials, even though these items are not really private keys. These credentials are currently invisible to keychaineditor.
It would be nice if they could be dumped and edited like passwords. Sogeti's keychain_dump (iphone-dataprotection.keychainviewer/Keychain/keychain_dump.c) supports dumping them.
The text was updated successfully, but these errors were encountered:
It assumes that kSecClassKey items contain strings as their data. It won't work for dumping RSA private keys or similar yet.
Adding --find xxx will only print key items where the Access Group field contains xxx.
kSecClassKey items do not have "Account" and "Service" like genp, instead they are identified by kSecAttrAccessGroup and kSecAttrApplicationTag. Some refactoring would be required to integrate this neatly into the existing keychaineditor commands because the existing code assumes every item has a "Service" and "Account" attribute.
Some apps use kSecClassKey to store IDs, passwords and credentials, even though these items are not really private keys. These credentials are currently invisible to keychaineditor.
It would be nice if they could be dumped and edited like passwords. Sogeti's keychain_dump (iphone-dataprotection.keychainviewer/Keychain/keychain_dump.c) supports dumping them.
The text was updated successfully, but these errors were encountered: