MYKeyPair.m
author snej@snej.local
Sat Apr 04 20:42:03 2009 -0700 (2009-04-04)
changeset 0 0a6527af039b
child 1 60e4cbbb5128
permissions -rw-r--r--
Initial checkin. Passes tests on Mac and in iPhone simulator.
     1 //
     2 //  KeyPair.m
     3 //  MYCrypto
     4 //
     5 //  Created by Jens Alfke on 3/21/09.
     6 //  Copyright 2009 Jens Alfke. All rights reserved.
     7 //
     8 
     9 #import "MYKeyPair.h"
    10 #import "MYCrypto_Private.h"
    11 #import <CommonCrypto/CommonDigest.h>
    12 
    13 #if !USE_IPHONE_API
    14 
    15 
    16 #pragma mark -
    17 
    18 @implementation MYKeyPair
    19 
    20 
    21 + (MYKeyPair*) _generateRSAKeyPairOfSize: (unsigned)keySize
    22                             inKeychain: (SecKeychainRef)keychain {
    23     Assert( keySize == 512 || keySize == 1024 || keySize == 2048, @"Unsupported key size %u", keySize );
    24     SecKeyRef pubKey=NULL, privKey=NULL;
    25     OSStatus err;
    26     err = SecKeyCreatePair(keychain, CSSM_ALGID_RSA, keySize, 0LL,
    27                            CSSM_KEYUSE_ENCRYPT | CSSM_KEYUSE_VERIFY,        // public key
    28                            CSSM_KEYATTR_EXTRACTABLE | CSSM_KEYATTR_PERMANENT,
    29                            CSSM_KEYUSE_DECRYPT | CSSM_KEYUSE_SIGN,          // private key
    30                            CSSM_KEYATTR_EXTRACTABLE | CSSM_KEYATTR_SENSITIVE | CSSM_KEYATTR_PERMANENT,
    31                            NULL, // SecAccessRef
    32                            &pubKey, &privKey);
    33     if (!check(err, @"SecKeyCreatePair")) {
    34         return nil;
    35     } else
    36         return [[[self alloc] initWithPublicKeyRef: pubKey privateKeyRef: privKey] autorelease];
    37 }
    38 
    39 
    40 - (id) initWithPublicKeyRef: (SecKeyRef)publicKey privateKeyRef: (SecKeyRef)privateKey {
    41     self = [super initWithKeyRef: publicKey];
    42     if (self) {
    43         NSParameterAssert(privateKey);
    44         _privateKey = (SecKeyRef) CFRetain(privateKey);
    45     }
    46     return self;
    47 }
    48 
    49 - (id) _initWithPublicKeyData: (NSData*)pubKeyData
    50                    privateKey: (SecKeyRef)privateKey 
    51                   forKeychain: (SecKeychainRef)keychain {
    52     if (!privateKey) {
    53         [self release];
    54         return nil;
    55     }
    56     self = [self _initWithKeyData: pubKeyData forKeychain: keychain];
    57     if (self) {
    58         _privateKey = privateKey;
    59     } else {
    60         SecKeychainItemDelete((SecKeychainItemRef)privateKey);
    61         CFRelease(privateKey);
    62     }
    63     return self;
    64 }
    65 
    66 
    67 // The public API for this is in MYKeychain.
    68 - (id) _initWithPublicKeyData: (NSData*)pubKeyData 
    69                privateKeyData: (NSData*)privKeyData
    70                   forKeychain: (SecKeychainRef)keychain 
    71                    alertTitle: (NSString*)title
    72                   alertPrompt: (NSString*)prompt
    73 {
    74     // Try to import the private key first, since the user might cancel the passphrase alert.
    75     SecKeyImportExportParameters params = {
    76         .flags = kSecKeySecurePassphrase,
    77         .alertTitle = (CFStringRef) title,
    78         .alertPrompt = (CFStringRef) prompt
    79     };
    80     SecKeyRef privateKey = importKey(privKeyData,kSecItemTypePrivateKey,keychain,&params);
    81     return [self _initWithPublicKeyData: pubKeyData privateKey: privateKey forKeychain: keychain];
    82 }
    83 
    84 // This method is for testing, so unit-tests don't require user intervention.
    85 // It's deliberately not made public, to discourage clients from trying to manage the passphrases
    86 // themselves (this is less secure than letting the Security agent do it.)
    87 - (id) _initWithPublicKeyData: (NSData*)pubKeyData 
    88                privateKeyData: (NSData*)privKeyData
    89                   forKeychain: (SecKeychainRef)keychain 
    90                    passphrase: (NSString*)passphrase
    91 {
    92     SecKeyImportExportParameters params = {
    93         .passphrase = (CFStringRef) passphrase,
    94     };
    95     SecKeyRef privateKey = importKey(privKeyData,kSecItemTypePrivateKey,keychain,&params);
    96     return [self _initWithPublicKeyData: pubKeyData privateKey: privateKey forKeychain: keychain];
    97 }
    98 
    99 
   100 - (void) dealloc
   101 {
   102     if (_privateKey) CFRelease(_privateKey);
   103     [super dealloc];
   104 }
   105 
   106 
   107 - (NSUInteger)hash {
   108     // Ensure that a KeyPair doesn't hash the same as its corresponding PublicKey:
   109     return super.hash ^ 0xFFFFFFFF;
   110 }
   111 
   112 
   113 - (MYPublicKey*) asPublicKey {
   114     return [[[MYPublicKey alloc] initWithKeyRef: self.keyRef] autorelease];
   115 }
   116 
   117 
   118 - (NSData*) exportPrivateKeyInFormat: (SecExternalFormat)format
   119                              withPEM: (BOOL)withPEM
   120                           alertTitle: (NSString*)title
   121                          alertPrompt: (NSString*)prompt
   122 {
   123     SecKeyImportExportParameters params = {
   124         .version = SEC_KEY_IMPORT_EXPORT_PARAMS_VERSION,
   125         .flags = kSecKeySecurePassphrase,
   126         .alertTitle = (CFStringRef)title,
   127         .alertPrompt = (CFStringRef)prompt
   128     };
   129     CFDataRef data = NULL;
   130     if (check(SecKeychainItemExport(_privateKey, //$array((id)_publicKey,(id)_privateKey),
   131                                     format, (withPEM ?kSecItemPemArmour :0), 
   132                                     &params, &data),
   133               @"SecKeychainItemExport"))
   134         return [(id)CFMakeCollectable(data) autorelease];
   135     else
   136         return nil;
   137 }
   138 
   139 - (NSData*) exportPrivateKey {
   140     return [self exportPrivateKeyInFormat: kSecFormatWrappedOpenSSL withPEM: YES
   141                                alertTitle: @"Export Private Key"
   142                               alertPrompt: @"Enter a passphrase to protect the private-key file.\n"
   143             "You will need to re-enter the passphrase later when importing the key from this file, "
   144             "so keep it in a safe place."];
   145     //FIX: Should make these messages localizable.
   146 }
   147 
   148 
   149 - (NSData*) _exportPrivateKeyInFormat: (SecExternalFormat)format
   150                               withPEM: (BOOL)withPEM
   151                            passphrase: (NSString*)passphrase
   152 {
   153     SecKeyImportExportParameters params = {
   154         .version = SEC_KEY_IMPORT_EXPORT_PARAMS_VERSION,
   155         .passphrase = (CFStringRef)passphrase
   156     };
   157     CFDataRef data = NULL;
   158     if (check(SecKeychainItemExport(_privateKey,
   159                                     format, (withPEM ?kSecItemPemArmour :0), 
   160                                     &params, &data),
   161               @"SecKeychainItemExport"))
   162         return [(id)CFMakeCollectable(data) autorelease];
   163     else
   164         return nil;
   165 }
   166 
   167 - (BOOL) removeFromKeychain {
   168     return check(SecKeychainItemDelete((SecKeychainItemRef)_privateKey), @"delete private key")
   169         && [super removeFromKeychain];
   170 }
   171 
   172 
   173 @synthesize privateKeyRef=_privateKey;
   174 
   175 
   176 - (NSData*) decryptData: (NSData*)data {
   177     return _crypt(_privateKey,data,kCCDecrypt);
   178 }
   179     
   180 
   181 - (NSData*) signData: (NSData*)data {
   182     Assert(data);
   183     uint8_t digest[CC_SHA1_DIGEST_LENGTH];
   184     CC_SHA1(data.bytes,data.length, digest);
   185     NSData *signature = nil;
   186     CSSM_CC_HANDLE ccHandle = cssmCreateSignatureContext(_privateKey);
   187     if (!ccHandle) return nil;
   188     CSSM_DATA original = {data.length, (void*)data.bytes};
   189     CSSM_DATA result = {0,NULL};
   190     if (checkcssm(CSSM_SignData(ccHandle, &original, 1, CSSM_ALGID_NONE, &result), @"CSSM_SignData"))
   191         signature = [NSData dataWithBytesNoCopy: result.Data length: result.Length
   192                                    freeWhenDone: YES];
   193     CSSM_DeleteContext(ccHandle);
   194     return signature;
   195 }
   196 
   197 
   198 - (BOOL) setValue: (NSString*)valueStr ofAttribute: (SecKeychainAttrType)attr {
   199     return [super setValue: valueStr ofAttribute: attr]
   200         && [[self class] _setAttribute: attr 
   201                                 ofItem: (SecKeychainItemRef)_privateKey
   202                            stringValue: valueStr];
   203 }
   204 
   205 
   206 @end
   207 
   208 
   209 #endif !USE_IPHONE_API
   210 
   211 
   212 
   213 
   214 /*
   215  Copyright (c) 2009, Jens Alfke <jens@mooseyard.com>. All rights reserved.
   216  
   217  Redistribution and use in source and binary forms, with or without modification, are permitted
   218  provided that the following conditions are met:
   219  
   220  * Redistributions of source code must retain the above copyright notice, this list of conditions
   221  and the following disclaimer.
   222  * Redistributions in binary form must reproduce the above copyright notice, this list of conditions
   223  and the following disclaimer in the documentation and/or other materials provided with the
   224  distribution.
   225  
   226  THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR
   227  IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND 
   228  FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRI-
   229  BUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
   230  (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 
   231   PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 
   232  CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 
   233  THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
   234  */