snej@0
|
1 |
//
|
snej@0
|
2 |
// KeyPair.m
|
snej@0
|
3 |
// MYCrypto
|
snej@0
|
4 |
//
|
snej@0
|
5 |
// Created by Jens Alfke on 3/21/09.
|
snej@0
|
6 |
// Copyright 2009 Jens Alfke. All rights reserved.
|
snej@0
|
7 |
//
|
snej@0
|
8 |
|
snej@0
|
9 |
#import "MYKeyPair.h"
|
snej@0
|
10 |
#import "MYCrypto_Private.h"
|
snej@0
|
11 |
#import <CommonCrypto/CommonDigest.h>
|
snej@0
|
12 |
|
snej@0
|
13 |
#if !USE_IPHONE_API
|
snej@0
|
14 |
|
snej@0
|
15 |
|
snej@0
|
16 |
#pragma mark -
|
snej@0
|
17 |
|
snej@0
|
18 |
@implementation MYKeyPair
|
snej@0
|
19 |
|
snej@0
|
20 |
|
snej@0
|
21 |
+ (MYKeyPair*) _generateRSAKeyPairOfSize: (unsigned)keySize
|
snej@0
|
22 |
inKeychain: (SecKeychainRef)keychain {
|
snej@0
|
23 |
Assert( keySize == 512 || keySize == 1024 || keySize == 2048, @"Unsupported key size %u", keySize );
|
snej@0
|
24 |
SecKeyRef pubKey=NULL, privKey=NULL;
|
snej@0
|
25 |
OSStatus err;
|
snej@0
|
26 |
err = SecKeyCreatePair(keychain, CSSM_ALGID_RSA, keySize, 0LL,
|
snej@0
|
27 |
CSSM_KEYUSE_ENCRYPT | CSSM_KEYUSE_VERIFY, // public key
|
snej@0
|
28 |
CSSM_KEYATTR_EXTRACTABLE | CSSM_KEYATTR_PERMANENT,
|
snej@0
|
29 |
CSSM_KEYUSE_DECRYPT | CSSM_KEYUSE_SIGN, // private key
|
snej@0
|
30 |
CSSM_KEYATTR_EXTRACTABLE | CSSM_KEYATTR_SENSITIVE | CSSM_KEYATTR_PERMANENT,
|
snej@0
|
31 |
NULL, // SecAccessRef
|
snej@0
|
32 |
&pubKey, &privKey);
|
snej@0
|
33 |
if (!check(err, @"SecKeyCreatePair")) {
|
snej@0
|
34 |
return nil;
|
snej@0
|
35 |
} else
|
snej@0
|
36 |
return [[[self alloc] initWithPublicKeyRef: pubKey privateKeyRef: privKey] autorelease];
|
snej@0
|
37 |
}
|
snej@0
|
38 |
|
snej@0
|
39 |
|
snej@0
|
40 |
- (id) initWithPublicKeyRef: (SecKeyRef)publicKey privateKeyRef: (SecKeyRef)privateKey {
|
snej@0
|
41 |
self = [super initWithKeyRef: publicKey];
|
snej@0
|
42 |
if (self) {
|
snej@0
|
43 |
NSParameterAssert(privateKey);
|
snej@0
|
44 |
_privateKey = (SecKeyRef) CFRetain(privateKey);
|
snej@0
|
45 |
}
|
snej@0
|
46 |
return self;
|
snej@0
|
47 |
}
|
snej@0
|
48 |
|
snej@0
|
49 |
- (id) _initWithPublicKeyData: (NSData*)pubKeyData
|
snej@0
|
50 |
privateKey: (SecKeyRef)privateKey
|
snej@0
|
51 |
forKeychain: (SecKeychainRef)keychain {
|
snej@0
|
52 |
if (!privateKey) {
|
snej@0
|
53 |
[self release];
|
snej@0
|
54 |
return nil;
|
snej@0
|
55 |
}
|
snej@0
|
56 |
self = [self _initWithKeyData: pubKeyData forKeychain: keychain];
|
snej@0
|
57 |
if (self) {
|
snej@0
|
58 |
_privateKey = privateKey;
|
snej@0
|
59 |
} else {
|
snej@0
|
60 |
SecKeychainItemDelete((SecKeychainItemRef)privateKey);
|
snej@0
|
61 |
CFRelease(privateKey);
|
snej@0
|
62 |
}
|
snej@0
|
63 |
return self;
|
snej@0
|
64 |
}
|
snej@0
|
65 |
|
snej@0
|
66 |
|
snej@0
|
67 |
// The public API for this is in MYKeychain.
|
snej@0
|
68 |
- (id) _initWithPublicKeyData: (NSData*)pubKeyData
|
snej@0
|
69 |
privateKeyData: (NSData*)privKeyData
|
snej@0
|
70 |
forKeychain: (SecKeychainRef)keychain
|
snej@0
|
71 |
alertTitle: (NSString*)title
|
snej@0
|
72 |
alertPrompt: (NSString*)prompt
|
snej@0
|
73 |
{
|
snej@0
|
74 |
// Try to import the private key first, since the user might cancel the passphrase alert.
|
snej@0
|
75 |
SecKeyImportExportParameters params = {
|
snej@0
|
76 |
.flags = kSecKeySecurePassphrase,
|
snej@0
|
77 |
.alertTitle = (CFStringRef) title,
|
snej@0
|
78 |
.alertPrompt = (CFStringRef) prompt
|
snej@0
|
79 |
};
|
snej@0
|
80 |
SecKeyRef privateKey = importKey(privKeyData,kSecItemTypePrivateKey,keychain,¶ms);
|
snej@0
|
81 |
return [self _initWithPublicKeyData: pubKeyData privateKey: privateKey forKeychain: keychain];
|
snej@0
|
82 |
}
|
snej@0
|
83 |
|
snej@0
|
84 |
// This method is for testing, so unit-tests don't require user intervention.
|
snej@0
|
85 |
// It's deliberately not made public, to discourage clients from trying to manage the passphrases
|
snej@0
|
86 |
// themselves (this is less secure than letting the Security agent do it.)
|
snej@0
|
87 |
- (id) _initWithPublicKeyData: (NSData*)pubKeyData
|
snej@0
|
88 |
privateKeyData: (NSData*)privKeyData
|
snej@0
|
89 |
forKeychain: (SecKeychainRef)keychain
|
snej@0
|
90 |
passphrase: (NSString*)passphrase
|
snej@0
|
91 |
{
|
snej@0
|
92 |
SecKeyImportExportParameters params = {
|
snej@0
|
93 |
.passphrase = (CFStringRef) passphrase,
|
snej@0
|
94 |
};
|
snej@0
|
95 |
SecKeyRef privateKey = importKey(privKeyData,kSecItemTypePrivateKey,keychain,¶ms);
|
snej@0
|
96 |
return [self _initWithPublicKeyData: pubKeyData privateKey: privateKey forKeychain: keychain];
|
snej@0
|
97 |
}
|
snej@0
|
98 |
|
snej@0
|
99 |
|
snej@0
|
100 |
- (void) dealloc
|
snej@0
|
101 |
{
|
snej@0
|
102 |
if (_privateKey) CFRelease(_privateKey);
|
snej@0
|
103 |
[super dealloc];
|
snej@0
|
104 |
}
|
snej@0
|
105 |
|
snej@0
|
106 |
|
snej@0
|
107 |
- (NSUInteger)hash {
|
snej@0
|
108 |
// Ensure that a KeyPair doesn't hash the same as its corresponding PublicKey:
|
snej@0
|
109 |
return super.hash ^ 0xFFFFFFFF;
|
snej@0
|
110 |
}
|
snej@0
|
111 |
|
snej@0
|
112 |
|
snej@0
|
113 |
- (MYPublicKey*) asPublicKey {
|
snej@0
|
114 |
return [[[MYPublicKey alloc] initWithKeyRef: self.keyRef] autorelease];
|
snej@0
|
115 |
}
|
snej@0
|
116 |
|
snej@0
|
117 |
|
snej@0
|
118 |
- (NSData*) exportPrivateKeyInFormat: (SecExternalFormat)format
|
snej@0
|
119 |
withPEM: (BOOL)withPEM
|
snej@0
|
120 |
alertTitle: (NSString*)title
|
snej@0
|
121 |
alertPrompt: (NSString*)prompt
|
snej@0
|
122 |
{
|
snej@0
|
123 |
SecKeyImportExportParameters params = {
|
snej@0
|
124 |
.version = SEC_KEY_IMPORT_EXPORT_PARAMS_VERSION,
|
snej@0
|
125 |
.flags = kSecKeySecurePassphrase,
|
snej@0
|
126 |
.alertTitle = (CFStringRef)title,
|
snej@0
|
127 |
.alertPrompt = (CFStringRef)prompt
|
snej@0
|
128 |
};
|
snej@0
|
129 |
CFDataRef data = NULL;
|
snej@0
|
130 |
if (check(SecKeychainItemExport(_privateKey, //$array((id)_publicKey,(id)_privateKey),
|
snej@0
|
131 |
format, (withPEM ?kSecItemPemArmour :0),
|
snej@0
|
132 |
¶ms, &data),
|
snej@0
|
133 |
@"SecKeychainItemExport"))
|
snej@0
|
134 |
return [(id)CFMakeCollectable(data) autorelease];
|
snej@0
|
135 |
else
|
snej@0
|
136 |
return nil;
|
snej@0
|
137 |
}
|
snej@0
|
138 |
|
snej@0
|
139 |
- (NSData*) exportPrivateKey {
|
snej@0
|
140 |
return [self exportPrivateKeyInFormat: kSecFormatWrappedOpenSSL withPEM: YES
|
snej@0
|
141 |
alertTitle: @"Export Private Key"
|
snej@0
|
142 |
alertPrompt: @"Enter a passphrase to protect the private-key file.\n"
|
snej@0
|
143 |
"You will need to re-enter the passphrase later when importing the key from this file, "
|
snej@0
|
144 |
"so keep it in a safe place."];
|
snej@0
|
145 |
//FIX: Should make these messages localizable.
|
snej@0
|
146 |
}
|
snej@0
|
147 |
|
snej@0
|
148 |
|
snej@0
|
149 |
- (NSData*) _exportPrivateKeyInFormat: (SecExternalFormat)format
|
snej@0
|
150 |
withPEM: (BOOL)withPEM
|
snej@0
|
151 |
passphrase: (NSString*)passphrase
|
snej@0
|
152 |
{
|
snej@0
|
153 |
SecKeyImportExportParameters params = {
|
snej@0
|
154 |
.version = SEC_KEY_IMPORT_EXPORT_PARAMS_VERSION,
|
snej@0
|
155 |
.passphrase = (CFStringRef)passphrase
|
snej@0
|
156 |
};
|
snej@0
|
157 |
CFDataRef data = NULL;
|
snej@0
|
158 |
if (check(SecKeychainItemExport(_privateKey,
|
snej@0
|
159 |
format, (withPEM ?kSecItemPemArmour :0),
|
snej@0
|
160 |
¶ms, &data),
|
snej@0
|
161 |
@"SecKeychainItemExport"))
|
snej@0
|
162 |
return [(id)CFMakeCollectable(data) autorelease];
|
snej@0
|
163 |
else
|
snej@0
|
164 |
return nil;
|
snej@0
|
165 |
}
|
snej@0
|
166 |
|
snej@0
|
167 |
- (BOOL) removeFromKeychain {
|
snej@0
|
168 |
return check(SecKeychainItemDelete((SecKeychainItemRef)_privateKey), @"delete private key")
|
snej@0
|
169 |
&& [super removeFromKeychain];
|
snej@0
|
170 |
}
|
snej@0
|
171 |
|
snej@0
|
172 |
|
snej@1
|
173 |
- (SecKeyRef) privateKeyRef {
|
snej@1
|
174 |
return _privateKey;
|
snej@1
|
175 |
}
|
snej@0
|
176 |
|
snej@0
|
177 |
|
snej@0
|
178 |
- (NSData*) decryptData: (NSData*)data {
|
snej@0
|
179 |
return _crypt(_privateKey,data,kCCDecrypt);
|
snej@0
|
180 |
}
|
snej@0
|
181 |
|
snej@0
|
182 |
|
snej@0
|
183 |
- (NSData*) signData: (NSData*)data {
|
snej@0
|
184 |
Assert(data);
|
snej@1
|
185 |
uint8_t digest[CC_SHA256_DIGEST_LENGTH];
|
snej@1
|
186 |
CC_SHA256(data.bytes,data.length, digest);
|
snej@1
|
187 |
|
snej@0
|
188 |
NSData *signature = nil;
|
snej@0
|
189 |
CSSM_CC_HANDLE ccHandle = cssmCreateSignatureContext(_privateKey);
|
snej@0
|
190 |
if (!ccHandle) return nil;
|
snej@0
|
191 |
CSSM_DATA original = {data.length, (void*)data.bytes};
|
snej@0
|
192 |
CSSM_DATA result = {0,NULL};
|
snej@0
|
193 |
if (checkcssm(CSSM_SignData(ccHandle, &original, 1, CSSM_ALGID_NONE, &result), @"CSSM_SignData"))
|
snej@0
|
194 |
signature = [NSData dataWithBytesNoCopy: result.Data length: result.Length
|
snej@0
|
195 |
freeWhenDone: YES];
|
snej@0
|
196 |
CSSM_DeleteContext(ccHandle);
|
snej@0
|
197 |
return signature;
|
snej@0
|
198 |
}
|
snej@0
|
199 |
|
snej@0
|
200 |
|
snej@0
|
201 |
- (BOOL) setValue: (NSString*)valueStr ofAttribute: (SecKeychainAttrType)attr {
|
snej@0
|
202 |
return [super setValue: valueStr ofAttribute: attr]
|
snej@0
|
203 |
&& [[self class] _setAttribute: attr
|
snej@0
|
204 |
ofItem: (SecKeychainItemRef)_privateKey
|
snej@0
|
205 |
stringValue: valueStr];
|
snej@0
|
206 |
}
|
snej@0
|
207 |
|
snej@0
|
208 |
|
snej@0
|
209 |
@end
|
snej@0
|
210 |
|
snej@0
|
211 |
|
snej@0
|
212 |
#endif !USE_IPHONE_API
|
snej@0
|
213 |
|
snej@0
|
214 |
|
snej@0
|
215 |
|
snej@0
|
216 |
|
snej@0
|
217 |
/*
|
snej@0
|
218 |
Copyright (c) 2009, Jens Alfke <jens@mooseyard.com>. All rights reserved.
|
snej@0
|
219 |
|
snej@0
|
220 |
Redistribution and use in source and binary forms, with or without modification, are permitted
|
snej@0
|
221 |
provided that the following conditions are met:
|
snej@0
|
222 |
|
snej@0
|
223 |
* Redistributions of source code must retain the above copyright notice, this list of conditions
|
snej@0
|
224 |
and the following disclaimer.
|
snej@0
|
225 |
* Redistributions in binary form must reproduce the above copyright notice, this list of conditions
|
snej@0
|
226 |
and the following disclaimer in the documentation and/or other materials provided with the
|
snej@0
|
227 |
distribution.
|
snej@0
|
228 |
|
snej@0
|
229 |
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR
|
snej@0
|
230 |
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
|
snej@0
|
231 |
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRI-
|
snej@0
|
232 |
BUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
snej@0
|
233 |
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
|
snej@0
|
234 |
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
snej@0
|
235 |
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
snej@0
|
236 |
THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
snej@0
|
237 |
*/
|