MYKey.m
author Jens Alfke <jens@mooseyard.com>
Sat Jun 06 15:36:35 2009 -0700 (2009-06-06)
changeset 22 058394513f33
parent 14 3af1d1c0ceb5
child 23 39fec79de6e8
permissions -rw-r--r--
Added a few comments. That is all.
snej@0
     1
//
snej@0
     2
//  MYKey.m
snej@0
     3
//  MYCrypto
snej@0
     4
//
snej@0
     5
//  Created by Jens Alfke on 3/21/09.
snej@0
     6
//  Copyright 2009 Jens Alfke. All rights reserved.
snej@0
     7
//
snej@0
     8
snej@0
     9
#import "MYKey.h"
snej@0
    10
#import "MYCrypto_Private.h"
snej@0
    11
#import "MYDigest.h"
snej@0
    12
#import "MYErrorUtils.h"
snej@0
    13
snej@2
    14
#if !MYCRYPTO_USE_IPHONE_API
snej@0
    15
snej@0
    16
snej@0
    17
#pragma mark -
snej@0
    18
@implementation MYKey
snej@0
    19
snej@0
    20
snej@0
    21
- (id) initWithKeyRef: (SecKeyRef)key {
snej@1
    22
    return [super initWithKeychainItemRef: (SecKeychainItemRef)key];
snej@0
    23
}
snej@0
    24
jens@21
    25
- (id) _initWithKeyData: (NSData*)keyData
snej@0
    26
            forKeychain: (SecKeychainRef)keychain {
jens@21
    27
    Assert(keyData!=nil);
snej@0
    28
    SecKeyImportExportParameters params = {};
jens@21
    29
    SecKeyRef key = importKey(keyData, self.keyType, keychain, &params);
snej@0
    30
    if (!key) {
snej@0
    31
        [self release];
snej@0
    32
        return nil;
snej@0
    33
    }
snej@1
    34
    self = [self initWithKeyRef: key];
snej@0
    35
    CFRelease(key);
snej@0
    36
    return self;
snej@0
    37
}
snej@0
    38
snej@0
    39
- (id) initWithKeyData: (NSData*)data {
snej@0
    40
    return [self _initWithKeyData: data forKeychain: nil];
snej@0
    41
}
snej@0
    42
snej@0
    43
snej@8
    44
- (NSString*) description {
snej@8
    45
    return $sprintf(@"%@[%@ /%p]", [self class], (self.name ?:@""), self.keychainItemRef);
snej@8
    46
}
snej@8
    47
snej@0
    48
- (SecExternalItemType) keyType {
snej@0
    49
    AssertAbstractMethod();
snej@0
    50
}
snej@0
    51
snej@0
    52
snej@1
    53
- (SecKeyRef) keyRef {
snej@1
    54
    return (SecKeyRef) self.keychainItemRef;
snej@0
    55
}
snej@0
    56
snej@0
    57
- (const CSSM_KEY*) cssmKey {
snej@0
    58
    const CSSM_KEY *cssmKey = NULL;
snej@2
    59
    Assert(check(SecKeyGetCSSMKey(self.keyRef, &cssmKey), @"SecKeyGetCSSMKey"), 
snej@2
    60
           @"Failed to get CSSM_KEY");
snej@0
    61
    return cssmKey;
snej@0
    62
}
snej@0
    63
snej@2
    64
- (const CSSM_CSP_HANDLE) cssmCSPHandle {
snej@2
    65
    CSSM_CSP_HANDLE cspHandle = 0;
snej@2
    66
    Assert(check(SecKeyGetCSPHandle(self.keyRef, &cspHandle), @"SecKeyGetCSPHandle"),
snej@2
    67
           @"Failed to get CSSM_CSP_HANDLE");
snej@2
    68
    return cspHandle;
snej@2
    69
}
snej@2
    70
snej@13
    71
- (CSSM_ALGORITHMS) cssmAlgorithm {
snej@13
    72
    return self.cssmKey->KeyHeader.AlgorithmId;
snej@13
    73
}
snej@13
    74
snej@2
    75
- (const CSSM_ACCESS_CREDENTIALS*) cssmCredentialsForOperation: (CSSM_ACL_AUTHORIZATION_TAG)operation
snej@2
    76
                                                          type: (SecCredentialType)type
snej@2
    77
                                                         error: (NSError**)outError
snej@2
    78
{
snej@2
    79
    const CSSM_ACCESS_CREDENTIALS *credentials = NULL;
snej@2
    80
    OSStatus err = SecKeyGetCredentials(self.keyRef,
snej@2
    81
                                        operation,
snej@2
    82
                                        type,
snej@2
    83
                                        &credentials);
snej@2
    84
    if (!MYReturnError(outError, err,NSOSStatusErrorDomain, @"Couldn't get credentials for key"))
snej@2
    85
        return NULL;
snej@2
    86
    return credentials;
snej@2
    87
}
snej@2
    88
snej@13
    89
- (SecExternalFormat) _externalFormat {
snej@13
    90
    return kSecFormatRawKey;
snej@13
    91
}
snej@13
    92
snej@13
    93
- (NSData*) keyData {
snej@0
    94
    CFDataRef data = NULL;
snej@13
    95
    if (check(SecKeychainItemExport(self.keyRef, self._externalFormat, 0, NULL, &data),
snej@0
    96
              @"SecKeychainItemExport"))
snej@0
    97
        return [(id)CFMakeCollectable(data) autorelease];
snej@0
    98
    else
snej@0
    99
        return nil;
snej@0
   100
}
snej@0
   101
snej@0
   102
- (NSString*) name {
snej@0
   103
    return [self stringValueOfAttribute: kSecKeyPrintName];
snej@0
   104
}
snej@0
   105
snej@0
   106
- (void) setName: (NSString*)name {
snej@0
   107
    [self setValue: name ofAttribute: kSecKeyPrintName];
snej@0
   108
}
snej@0
   109
snej@0
   110
- (NSString*) comment {
snej@0
   111
    return [self stringValueOfAttribute: kSecKeyApplicationTag];
snej@0
   112
}
snej@0
   113
snej@0
   114
- (void) setComment: (NSString*)comment {
snej@0
   115
    [self setValue: comment ofAttribute: kSecKeyApplicationTag];
snej@0
   116
}
snej@0
   117
snej@0
   118
- (NSString*) alias {
snej@0
   119
    return [self stringValueOfAttribute: kSecKeyAlias];
snej@0
   120
}
snej@0
   121
snej@0
   122
- (void) setAlias: (NSString*)alias {
snej@0
   123
    [self setValue: alias ofAttribute: kSecKeyAlias];
snej@0
   124
}
snej@0
   125
snej@0
   126
snej@0
   127
#pragma mark -
snej@0
   128
#pragma mark UTILITY FUNCTIONS:
snej@0
   129
snej@0
   130
snej@0
   131
SecKeyRef importKey(NSData *data, 
snej@0
   132
                    SecExternalItemType type,
snej@0
   133
                    SecKeychainRef keychain,
snej@0
   134
                    SecKeyImportExportParameters *params) {
snej@14
   135
    SecExternalFormat inputFormat = (type==kSecItemTypeSessionKey) ?kSecFormatRawKey :kSecFormatUnknown;
snej@0
   136
    CFArrayRef items = NULL;
snej@0
   137
    
snej@0
   138
    params->version = SEC_KEY_IMPORT_EXPORT_PARAMS_VERSION;
snej@0
   139
    params->flags |= kSecKeyImportOnlyOne;
snej@2
   140
    params->keyAttributes |= CSSM_KEYATTR_EXTRACTABLE;
snej@0
   141
    if (keychain) {
snej@2
   142
        params->keyAttributes |= CSSM_KEYATTR_PERMANENT;
snej@0
   143
        if (type==kSecItemTypeSessionKey)
snej@0
   144
            params->keyUsage = CSSM_KEYUSE_ENCRYPT | CSSM_KEYUSE_DECRYPT;
snej@0
   145
        else if (type==kSecItemTypePublicKey)
snej@14
   146
            params->keyUsage = CSSM_KEYUSE_ENCRYPT | CSSM_KEYUSE_VERIFY | CSSM_KEYUSE_WRAP;
snej@0
   147
        else if (type==kSecItemTypePrivateKey)
snej@0
   148
            params->keyUsage = CSSM_KEYUSE_DECRYPT | CSSM_KEYUSE_SIGN;
snej@0
   149
    }
snej@0
   150
    if (!check(SecKeychainItemImport((CFDataRef)data, NULL, &inputFormat, &type,
snej@0
   151
                                     0, params, keychain, &items),
snej@0
   152
               @"SecKeychainItemImport"))
snej@0
   153
        return nil;
snej@0
   154
    if (!items || CFArrayGetCount(items) != 1)
snej@0
   155
        return nil;
snej@0
   156
    SecKeyRef key = (SecKeyRef)CFRetain(CFArrayGetValueAtIndex(items,0));
snej@0
   157
    CFRelease(items);
snej@0
   158
    return key; // caller must CFRelease
snej@3
   159
}
snej@0
   160
snej@0
   161
snej@3
   162
- (MYSHA1Digest*) _keyDigest {
snej@3
   163
    MYSHA1Digest *digest = nil;
snej@3
   164
    CSSM_DATA *keyDigest = NULL;
snej@3
   165
    CSSM_CC_HANDLE context = [self _createPassThroughContext];
snej@3
   166
    if (context) {
snej@3
   167
        if (checkcssm(CSSM_CSP_PassThrough(context, CSSM_APPLECSP_KEYDIGEST, NULL, (void**)&keyDigest),
snej@3
   168
                      @"CSSM_CSP_PassThrough")) {
snej@3
   169
            if (keyDigest && keyDigest->Data) {
snej@3
   170
                digest = [[[MYSHA1Digest alloc] initWithRawDigest: keyDigest->Data
snej@3
   171
                                                           length: keyDigest->Length] autorelease];
snej@3
   172
            }
snej@3
   173
        } else {
snej@3
   174
            SecKeyRef keyRef = self.keyRef;
snej@3
   175
            // Note - CSSM_CSP_PassThrough fails on a couple of private keys I've seen; it seems to
snej@3
   176
            // be ones that are either expired or don't have a matching public key at all (?)
snej@3
   177
            Warn(@"Failed to get digest of SecKeyRef %p (name='%@' appTag='%@')", 
snej@3
   178
                 keyRef,
snej@3
   179
                 self.name,
snej@3
   180
                 self.comment);
snej@3
   181
            NSData *digestData = [[self class] _getAttribute: kSecKeyLabel 
snej@3
   182
                                                      ofItem: (SecKeychainItemRef)keyRef];
snej@3
   183
            if (digestData) {
snej@3
   184
                digest = (MYSHA1Digest*) [MYSHA1Digest digestFromDigestData: digestData];
snej@3
   185
                if (!digest)
snej@3
   186
                    Warn(@"Digest property of key %p was invalid SHA-1: %@", keyRef,digestData);
snej@3
   187
            }
snej@3
   188
        }
snej@3
   189
        CSSM_DeleteContext(context);
snej@3
   190
    }
snej@3
   191
    return digest;
snej@3
   192
}
snej@3
   193
snej@3
   194
snej@3
   195
/** Asymmetric encryption/decryption; used by MYPublicKey and MYPrivateKey. */
snej@3
   196
- (NSData*) _crypt: (NSData*)data operation: (BOOL)operation {
snej@3
   197
    CAssert(data);
snej@3
   198
    const CSSM_ACCESS_CREDENTIALS *credentials;
snej@3
   199
    credentials = [self cssmCredentialsForOperation: (operation ?CSSM_ACL_AUTHORIZATION_ENCRYPT 
snej@3
   200
                                                                :CSSM_ACL_AUTHORIZATION_DECRYPT) 
snej@3
   201
                                               type: kSecCredentialTypeDefault
snej@3
   202
                                              error: nil];
snej@3
   203
    if (!credentials)
snej@3
   204
        return nil;
snej@3
   205
    
snej@3
   206
    CSSM_CC_HANDLE ccHandle;
snej@3
   207
    if (!checkcssm(CSSM_CSP_CreateAsymmetricContext(self.cssmCSPHandle,
snej@3
   208
                                                    CSSM_ALGID_RSA,
snej@3
   209
                                                    credentials,
snej@3
   210
                                                    self.cssmKey,
snej@3
   211
                                                    CSSM_PADDING_PKCS1,
snej@3
   212
                                                    &ccHandle),
snej@3
   213
                   @"CSSM_CSP_CreateAsymmetricContext"))
snej@3
   214
        return nil;
snej@3
   215
    
snej@3
   216
    CSSM_DATA original = {data.length, (void*)data.bytes};
snej@3
   217
    CSSM_DATA result = {};
snej@3
   218
    size_t outputLength;
snej@3
   219
    BOOL ok;
snej@3
   220
    if (operation)
snej@3
   221
        ok = checkcssm(CSSM_EncryptData(ccHandle, &original, 1, &result, 1, &outputLength, &result),
snej@3
   222
                       @"CSSM_EncryptData");
snej@3
   223
    else
snej@3
   224
        ok = checkcssm(CSSM_DecryptData(ccHandle, &original, 1, &result, 1, &outputLength, &result),
snej@3
   225
                       @"CSSM_DecryptData");
snej@3
   226
    CSSM_DeleteContext(ccHandle);
snej@3
   227
    return ok ?[NSData dataWithBytesNoCopy: result.Data length: outputLength freeWhenDone: YES] :nil;
snej@3
   228
}
snej@3
   229
snej@3
   230
snej@3
   231
- (CSSM_CC_HANDLE) _createSignatureContext: (CSSM_ALGORITHMS)algorithm {
snej@3
   232
    const CSSM_ACCESS_CREDENTIALS *credentials;
snej@3
   233
    credentials = [self cssmCredentialsForOperation: CSSM_ACL_AUTHORIZATION_SIGN 
snej@3
   234
                                               type: kSecCredentialTypeDefault
snej@3
   235
                                              error: nil];
snej@3
   236
    if (credentials) {
snej@3
   237
        CSSM_CC_HANDLE ccHandle = 0;
snej@3
   238
        if (checkcssm(CSSM_CSP_CreateSignatureContext(self.cssmCSPHandle, 
snej@3
   239
                                                      algorithm, 
snej@3
   240
                                                      credentials,
snej@3
   241
                                                      self.cssmKey,
snej@3
   242
                                                      &ccHandle),
snej@3
   243
                             @"CSSM_CSP_CreateSignatureContext") )
snej@3
   244
            return ccHandle;
snej@3
   245
    }
snej@3
   246
    return 0;
snej@3
   247
}
snej@3
   248
snej@3
   249
- (CSSM_CC_HANDLE) _createPassThroughContext
snej@3
   250
{
snej@3
   251
    CSSM_CC_HANDLE ccHandle = 0;
snej@3
   252
    if (checkcssm(CSSM_CSP_CreatePassThroughContext(self.cssmCSPHandle, self.cssmKey, &ccHandle), 
snej@3
   253
                          @"CSSM_CSP_CreatePassThroughContext") )
snej@3
   254
        return ccHandle;
snej@3
   255
    else
snej@3
   256
        return 0;
snej@3
   257
}
snej@3
   258
snej@3
   259
snej@3
   260
@end
snej@3
   261
snej@2
   262
#endif MYCRYPTO_USE_IPHONE_API
snej@0
   263
snej@0
   264
snej@0
   265
snej@0
   266
/*
snej@0
   267
 Copyright (c) 2009, Jens Alfke <jens@mooseyard.com>. All rights reserved.
snej@0
   268
 
snej@0
   269
 Redistribution and use in source and binary forms, with or without modification, are permitted
snej@0
   270
 provided that the following conditions are met:
snej@0
   271
 
snej@0
   272
 * Redistributions of source code must retain the above copyright notice, this list of conditions
snej@0
   273
 and the following disclaimer.
snej@0
   274
 * Redistributions in binary form must reproduce the above copyright notice, this list of conditions
snej@0
   275
 and the following disclaimer in the documentation and/or other materials provided with the
snej@0
   276
 distribution.
snej@0
   277
 
snej@0
   278
 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR
snej@0
   279
 IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND 
snej@0
   280
 FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRI-
snej@0
   281
 BUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
snej@0
   282
 (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 
snej@0
   283
  PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 
snej@0
   284
 CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 
snej@0
   285
 THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
snej@0
   286
 */