MYKeyPair.m
author snej@snej.local
Sat Apr 04 22:56:13 2009 -0700 (2009-04-04)
changeset 1 60e4cbbb5128
parent 0 0a6527af039b
child 2 8982b8fada63
permissions -rw-r--r--
Code cleanup, more header comments.
snej@0
     1
//
snej@0
     2
//  KeyPair.m
snej@0
     3
//  MYCrypto
snej@0
     4
//
snej@0
     5
//  Created by Jens Alfke on 3/21/09.
snej@0
     6
//  Copyright 2009 Jens Alfke. All rights reserved.
snej@0
     7
//
snej@0
     8
snej@0
     9
#import "MYKeyPair.h"
snej@0
    10
#import "MYCrypto_Private.h"
snej@0
    11
#import <CommonCrypto/CommonDigest.h>
snej@0
    12
snej@0
    13
#if !USE_IPHONE_API
snej@0
    14
snej@0
    15
snej@0
    16
#pragma mark -
snej@0
    17
snej@0
    18
@implementation MYKeyPair
snej@0
    19
snej@0
    20
snej@0
    21
+ (MYKeyPair*) _generateRSAKeyPairOfSize: (unsigned)keySize
snej@0
    22
                            inKeychain: (SecKeychainRef)keychain {
snej@0
    23
    Assert( keySize == 512 || keySize == 1024 || keySize == 2048, @"Unsupported key size %u", keySize );
snej@0
    24
    SecKeyRef pubKey=NULL, privKey=NULL;
snej@0
    25
    OSStatus err;
snej@0
    26
    err = SecKeyCreatePair(keychain, CSSM_ALGID_RSA, keySize, 0LL,
snej@0
    27
                           CSSM_KEYUSE_ENCRYPT | CSSM_KEYUSE_VERIFY,        // public key
snej@0
    28
                           CSSM_KEYATTR_EXTRACTABLE | CSSM_KEYATTR_PERMANENT,
snej@0
    29
                           CSSM_KEYUSE_DECRYPT | CSSM_KEYUSE_SIGN,          // private key
snej@0
    30
                           CSSM_KEYATTR_EXTRACTABLE | CSSM_KEYATTR_SENSITIVE | CSSM_KEYATTR_PERMANENT,
snej@0
    31
                           NULL, // SecAccessRef
snej@0
    32
                           &pubKey, &privKey);
snej@0
    33
    if (!check(err, @"SecKeyCreatePair")) {
snej@0
    34
        return nil;
snej@0
    35
    } else
snej@0
    36
        return [[[self alloc] initWithPublicKeyRef: pubKey privateKeyRef: privKey] autorelease];
snej@0
    37
}
snej@0
    38
snej@0
    39
snej@0
    40
- (id) initWithPublicKeyRef: (SecKeyRef)publicKey privateKeyRef: (SecKeyRef)privateKey {
snej@0
    41
    self = [super initWithKeyRef: publicKey];
snej@0
    42
    if (self) {
snej@0
    43
        NSParameterAssert(privateKey);
snej@0
    44
        _privateKey = (SecKeyRef) CFRetain(privateKey);
snej@0
    45
    }
snej@0
    46
    return self;
snej@0
    47
}
snej@0
    48
snej@0
    49
- (id) _initWithPublicKeyData: (NSData*)pubKeyData
snej@0
    50
                   privateKey: (SecKeyRef)privateKey 
snej@0
    51
                  forKeychain: (SecKeychainRef)keychain {
snej@0
    52
    if (!privateKey) {
snej@0
    53
        [self release];
snej@0
    54
        return nil;
snej@0
    55
    }
snej@0
    56
    self = [self _initWithKeyData: pubKeyData forKeychain: keychain];
snej@0
    57
    if (self) {
snej@0
    58
        _privateKey = privateKey;
snej@0
    59
    } else {
snej@0
    60
        SecKeychainItemDelete((SecKeychainItemRef)privateKey);
snej@0
    61
        CFRelease(privateKey);
snej@0
    62
    }
snej@0
    63
    return self;
snej@0
    64
}
snej@0
    65
snej@0
    66
snej@0
    67
// The public API for this is in MYKeychain.
snej@0
    68
- (id) _initWithPublicKeyData: (NSData*)pubKeyData 
snej@0
    69
               privateKeyData: (NSData*)privKeyData
snej@0
    70
                  forKeychain: (SecKeychainRef)keychain 
snej@0
    71
                   alertTitle: (NSString*)title
snej@0
    72
                  alertPrompt: (NSString*)prompt
snej@0
    73
{
snej@0
    74
    // Try to import the private key first, since the user might cancel the passphrase alert.
snej@0
    75
    SecKeyImportExportParameters params = {
snej@0
    76
        .flags = kSecKeySecurePassphrase,
snej@0
    77
        .alertTitle = (CFStringRef) title,
snej@0
    78
        .alertPrompt = (CFStringRef) prompt
snej@0
    79
    };
snej@0
    80
    SecKeyRef privateKey = importKey(privKeyData,kSecItemTypePrivateKey,keychain,&params);
snej@0
    81
    return [self _initWithPublicKeyData: pubKeyData privateKey: privateKey forKeychain: keychain];
snej@0
    82
}
snej@0
    83
snej@0
    84
// This method is for testing, so unit-tests don't require user intervention.
snej@0
    85
// It's deliberately not made public, to discourage clients from trying to manage the passphrases
snej@0
    86
// themselves (this is less secure than letting the Security agent do it.)
snej@0
    87
- (id) _initWithPublicKeyData: (NSData*)pubKeyData 
snej@0
    88
               privateKeyData: (NSData*)privKeyData
snej@0
    89
                  forKeychain: (SecKeychainRef)keychain 
snej@0
    90
                   passphrase: (NSString*)passphrase
snej@0
    91
{
snej@0
    92
    SecKeyImportExportParameters params = {
snej@0
    93
        .passphrase = (CFStringRef) passphrase,
snej@0
    94
    };
snej@0
    95
    SecKeyRef privateKey = importKey(privKeyData,kSecItemTypePrivateKey,keychain,&params);
snej@0
    96
    return [self _initWithPublicKeyData: pubKeyData privateKey: privateKey forKeychain: keychain];
snej@0
    97
}
snej@0
    98
snej@0
    99
snej@0
   100
- (void) dealloc
snej@0
   101
{
snej@0
   102
    if (_privateKey) CFRelease(_privateKey);
snej@0
   103
    [super dealloc];
snej@0
   104
}
snej@0
   105
snej@0
   106
snej@0
   107
- (NSUInteger)hash {
snej@0
   108
    // Ensure that a KeyPair doesn't hash the same as its corresponding PublicKey:
snej@0
   109
    return super.hash ^ 0xFFFFFFFF;
snej@0
   110
}
snej@0
   111
snej@0
   112
snej@0
   113
- (MYPublicKey*) asPublicKey {
snej@0
   114
    return [[[MYPublicKey alloc] initWithKeyRef: self.keyRef] autorelease];
snej@0
   115
}
snej@0
   116
snej@0
   117
snej@0
   118
- (NSData*) exportPrivateKeyInFormat: (SecExternalFormat)format
snej@0
   119
                             withPEM: (BOOL)withPEM
snej@0
   120
                          alertTitle: (NSString*)title
snej@0
   121
                         alertPrompt: (NSString*)prompt
snej@0
   122
{
snej@0
   123
    SecKeyImportExportParameters params = {
snej@0
   124
        .version = SEC_KEY_IMPORT_EXPORT_PARAMS_VERSION,
snej@0
   125
        .flags = kSecKeySecurePassphrase,
snej@0
   126
        .alertTitle = (CFStringRef)title,
snej@0
   127
        .alertPrompt = (CFStringRef)prompt
snej@0
   128
    };
snej@0
   129
    CFDataRef data = NULL;
snej@0
   130
    if (check(SecKeychainItemExport(_privateKey, //$array((id)_publicKey,(id)_privateKey),
snej@0
   131
                                    format, (withPEM ?kSecItemPemArmour :0), 
snej@0
   132
                                    &params, &data),
snej@0
   133
              @"SecKeychainItemExport"))
snej@0
   134
        return [(id)CFMakeCollectable(data) autorelease];
snej@0
   135
    else
snej@0
   136
        return nil;
snej@0
   137
}
snej@0
   138
snej@0
   139
- (NSData*) exportPrivateKey {
snej@0
   140
    return [self exportPrivateKeyInFormat: kSecFormatWrappedOpenSSL withPEM: YES
snej@0
   141
                               alertTitle: @"Export Private Key"
snej@0
   142
                              alertPrompt: @"Enter a passphrase to protect the private-key file.\n"
snej@0
   143
            "You will need to re-enter the passphrase later when importing the key from this file, "
snej@0
   144
            "so keep it in a safe place."];
snej@0
   145
    //FIX: Should make these messages localizable.
snej@0
   146
}
snej@0
   147
snej@0
   148
snej@0
   149
- (NSData*) _exportPrivateKeyInFormat: (SecExternalFormat)format
snej@0
   150
                              withPEM: (BOOL)withPEM
snej@0
   151
                           passphrase: (NSString*)passphrase
snej@0
   152
{
snej@0
   153
    SecKeyImportExportParameters params = {
snej@0
   154
        .version = SEC_KEY_IMPORT_EXPORT_PARAMS_VERSION,
snej@0
   155
        .passphrase = (CFStringRef)passphrase
snej@0
   156
    };
snej@0
   157
    CFDataRef data = NULL;
snej@0
   158
    if (check(SecKeychainItemExport(_privateKey,
snej@0
   159
                                    format, (withPEM ?kSecItemPemArmour :0), 
snej@0
   160
                                    &params, &data),
snej@0
   161
              @"SecKeychainItemExport"))
snej@0
   162
        return [(id)CFMakeCollectable(data) autorelease];
snej@0
   163
    else
snej@0
   164
        return nil;
snej@0
   165
}
snej@0
   166
snej@0
   167
- (BOOL) removeFromKeychain {
snej@0
   168
    return check(SecKeychainItemDelete((SecKeychainItemRef)_privateKey), @"delete private key")
snej@0
   169
        && [super removeFromKeychain];
snej@0
   170
}
snej@0
   171
snej@0
   172
snej@1
   173
- (SecKeyRef) privateKeyRef {
snej@1
   174
    return _privateKey;
snej@1
   175
}
snej@0
   176
snej@0
   177
snej@0
   178
- (NSData*) decryptData: (NSData*)data {
snej@0
   179
    return _crypt(_privateKey,data,kCCDecrypt);
snej@0
   180
}
snej@0
   181
    
snej@0
   182
snej@0
   183
- (NSData*) signData: (NSData*)data {
snej@0
   184
    Assert(data);
snej@1
   185
    uint8_t digest[CC_SHA256_DIGEST_LENGTH];
snej@1
   186
    CC_SHA256(data.bytes,data.length, digest);
snej@1
   187
    
snej@0
   188
    NSData *signature = nil;
snej@0
   189
    CSSM_CC_HANDLE ccHandle = cssmCreateSignatureContext(_privateKey);
snej@0
   190
    if (!ccHandle) return nil;
snej@0
   191
    CSSM_DATA original = {data.length, (void*)data.bytes};
snej@0
   192
    CSSM_DATA result = {0,NULL};
snej@0
   193
    if (checkcssm(CSSM_SignData(ccHandle, &original, 1, CSSM_ALGID_NONE, &result), @"CSSM_SignData"))
snej@0
   194
        signature = [NSData dataWithBytesNoCopy: result.Data length: result.Length
snej@0
   195
                                   freeWhenDone: YES];
snej@0
   196
    CSSM_DeleteContext(ccHandle);
snej@0
   197
    return signature;
snej@0
   198
}
snej@0
   199
snej@0
   200
snej@0
   201
- (BOOL) setValue: (NSString*)valueStr ofAttribute: (SecKeychainAttrType)attr {
snej@0
   202
    return [super setValue: valueStr ofAttribute: attr]
snej@0
   203
        && [[self class] _setAttribute: attr 
snej@0
   204
                                ofItem: (SecKeychainItemRef)_privateKey
snej@0
   205
                           stringValue: valueStr];
snej@0
   206
}
snej@0
   207
snej@0
   208
snej@0
   209
@end
snej@0
   210
snej@0
   211
snej@0
   212
#endif !USE_IPHONE_API
snej@0
   213
snej@0
   214
snej@0
   215
snej@0
   216
snej@0
   217
/*
snej@0
   218
 Copyright (c) 2009, Jens Alfke <jens@mooseyard.com>. All rights reserved.
snej@0
   219
 
snej@0
   220
 Redistribution and use in source and binary forms, with or without modification, are permitted
snej@0
   221
 provided that the following conditions are met:
snej@0
   222
 
snej@0
   223
 * Redistributions of source code must retain the above copyright notice, this list of conditions
snej@0
   224
 and the following disclaimer.
snej@0
   225
 * Redistributions in binary form must reproduce the above copyright notice, this list of conditions
snej@0
   226
 and the following disclaimer in the documentation and/or other materials provided with the
snej@0
   227
 distribution.
snej@0
   228
 
snej@0
   229
 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR
snej@0
   230
 IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND 
snej@0
   231
 FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRI-
snej@0
   232
 BUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
snej@0
   233
 (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 
snej@0
   234
  PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 
snej@0
   235
 CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 
snej@0
   236
 THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
snej@0
   237
 */