Chilkat HOME Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi DLL Go Java Node.js Objective-C PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Tcl) Windows Credentials Manager / Apple Keychain - List All SecretsSee more Secrets ExamplesOn Windows, lists all secrets in the Windows Credentials Manager. On MacOS or iOS, lists all secrets in the Apple Keychain. Note: This example requires Chilkat v10.1.0 or later. For more information, see https://cknotes.com/chilkat-secrets-class-added-in-version-10-1-0/
load ./chilkat.dll # This example requires the Chilkat API to have been previously unlocked. # See Global Unlock Sample for sample code. set secrets [new_CkSecrets] # On Windows, this is the Windows Credentials Manager # On MacOS/iOS, it is the Apple Keychain CkSecrets_put_Location $secrets "local_manager" # Pass an empty JSON object to list all secrets. set json [new_CkJsonObject] set results [new_CkJsonObject] CkJsonObject_put_EmitCompact $results 0 set success [CkSecrets_ListSecrets $secrets $json $results] if {$success == 0} then { puts [CkSecrets_lastErrorText $secrets] delete_CkSecrets $secrets delete_CkJsonObject $json delete_CkJsonObject $results exit } puts [CkJsonObject_emit $results] # Sample output on Windows (listing all secrets contained in the Windows Credentials Manager) # The "targetName" is purely informational and indicates the raw TargetName of the secret (i.e. Credential) stored in the Credentials Manager. # Code for parsing (iterating) the JSON results is shown below.. # { # "secrets": [ # { # "appName": "Test", # "service": "MyService", # "domain": "Xyz", # "username": "MySecret", # "targetName": "Test/MyService/Xyz/MySecret" # }, # { # "appName": "Chilkat", # "service": "TestSplit", # "domain": "local", # "username": "Matt", # "targetName": "Chilkat/TestSplit/local/Matt" # }, # { # "appName": "Test2", # "service": "Custom", # "domain": "Ocean", # "username": "Starfish20", # "targetName": "Test2/Custom/Ocean/Starfish20" # }, # { # "service": "VS Code Azure", # "domain": "", # "username": "Azure", # "targetName": "VS Code Azure/Azure" # }, # { # "appName": "Test2", # "service": "Custom", # "domain": "Ocean", # "username": "Starfish", # "targetName": "Test2/Custom/Ocean/Starfish" # }, # { # "appName": "AA_MyApp", # "service": "OAuth2", # "domain": "onedrive", # "username": "matt", # "targetName": "AA_MyApp/OAuth2/onedrive/matt" # } # ] # } # --------------------------------------------------------------------------------------- # Here's sample output for listing secrets on MacOS # Some are secrets created using Chilkat's API, others are pre-existing secrets. # The "keyChainService" and "keyChainAccount" members are purely informational and show the raw Apple Keychain Service and Account information for the secret. # { # "secrets": [ # { # "service": "com.apple.scopedbookmarksagent.xpc", # "username": "com.apple.scopedbookmarksagent.xpc", # "keyChainService": "com.apple.scopedbookmarksagent.xpc", # "keyChainAccount": "com.apple.scopedbookmarksagent.xpc" # }, # { # "service": "StandaloneBeacon", # "username": "searchparty", # "keyChainService": "StandaloneBeacon", # "keyChainAccount": "searchparty" # }, # { # "service": "BeaconStore", # "username": "BeaconStoreKey", # "keyChainService": "BeaconStore", # "keyChainAccount": "BeaconStoreKey" # }, # { # "service": "LocalStorage", # "username": "findmylocate", # "keyChainService": "LocalStorage", # "keyChainAccount": "findmylocate" # }, # { # "service": "ProtectedCloudStorage", # "username": "default", # "keyChainService": "ProtectedCloudStorage", # "keyChainAccount": "default" # }, # { # "service": "CloudStorage", # "username": "findmylocate", # "keyChainService": "CloudStorage", # "keyChainAccount": "findmylocate" # }, # { # "service": "CloudKitCache", # "username": "FindMyCloudKit", # "keyChainService": "CloudKitCache", # "keyChainAccount": "FindMyCloudKit" # }, # { # "service": "com.apple.continuity.encryption", # "username": "handoff-own-encryption-key", # "keyChainService": "com.apple.continuity.encryption", # "keyChainAccount": "handoff-own-encryption-key" # }, # { # "service": "com.apple.NetworkServiceProxy.ProxyToken", # "username": "CloudFlare", # "keyChainService": "com.apple.NetworkServiceProxy.ProxyToken", # "keyChainAccount": "CloudFlare" # }, # { # "appName": "Chilkat", # "service": "çözツ新", # "domain": "local", # "username": "Matt", # "keyChainService": "Chilkat/çözツ新", # "keyChainAccount": "local/Matt" # }, # { # "service": "AirPort", # "username": "FP Public WiFi", # "keyChainService": "AirPort", # "keyChainAccount": "FP Public WiFi" # } # ] # } # --------------------------------------------------------------------------------------- # Here's sample code for parsing the JSON list of secrets. set i 0 set count_i [CkJsonObject_SizeOfArray $results "secrets"] while {$i < $count_i} { CkJsonObject_put_I $results $i set appName [CkJsonObject_stringOf $results "secrets[i].appName"] set service [CkJsonObject_stringOf $results "secrets[i].service"] set domain [CkJsonObject_stringOf $results "secrets[i].domain"] set username [CkJsonObject_stringOf $results "secrets[i].username"] set targetName [CkJsonObject_stringOf $results "secrets[i].targetName"] set keyChainService [CkJsonObject_stringOf $results "secrets[i].keyChainService"] set keyChainAccount [CkJsonObject_stringOf $results "secrets[i].keyChainAccount"] set i [expr $i + 1] } delete_CkSecrets $secrets delete_CkJsonObject $json delete_CkJsonObject $results |
© 2000-2025 Chilkat Software, Inc. All Rights Reserved.