MYKeychain.m
author snej@snej.local
Sat Apr 04 22:56:13 2009 -0700 (2009-04-04)
changeset 1 60e4cbbb5128
child 2 8982b8fada63
permissions -rw-r--r--
Code cleanup, more header comments.
     1 //
     2 //  MYKeychain.m
     3 //  MYCrypto
     4 //
     5 //  Created by Jens Alfke on 3/23/09.
     6 //  Copyright 2009 Jens Alfke. All rights reserved.
     7 //
     8 
     9 #import "MYKeychain.h"
    10 #import "MYCrypto_Private.h"
    11 #import "MYDigest.h"
    12 
    13 #if !USE_IPHONE_API
    14 
    15 
    16 @interface MYKeyEnumerator : NSEnumerator
    17 {
    18     MYKeychain *_keychain;
    19     SecKeychainSearchRef _search;
    20     SecItemClass _itemClass;
    21 }
    22 
    23 - (id) initWithKeychain: (MYKeychain*)keychain
    24               itemClass: (SecItemClass)itemClass
    25              attributes: (SecKeychainAttribute[])attributes 
    26                   count: (unsigned)count;
    27 @end
    28 
    29 
    30 
    31 @implementation MYKeychain
    32 
    33 
    34 - (id) initWithKeychainRef: (SecKeychainRef)keychainRef
    35 {
    36     self = [super init];
    37     if (self != nil) {
    38         if (keychainRef) {
    39             CFRetain(keychainRef);
    40             _keychain = keychainRef;
    41         }
    42     }
    43     return self;
    44 }
    45 
    46 + (MYKeychain*) _readableKeychainWithRef: (SecKeychainRef)keychainRef fromPath: (NSString*)path {
    47     if (!keychainRef)
    48         return nil;
    49     SecKeychainStatus status;
    50     BOOL ok = check(SecKeychainGetStatus(keychainRef, &status), @"SecKeychainGetStatus");
    51     if (ok && !(status & kSecReadPermStatus)) {
    52         Warn(@"Can't open keychain at %@ : not readable (status=%i)", path,status);
    53         ok = NO;
    54     }
    55     MYKeychain *keychain = nil;
    56     if (ok)
    57         keychain = [[[self alloc] initWithKeychainRef: keychainRef] autorelease];
    58     CFRelease(keychainRef);
    59     return keychain;
    60 }
    61 
    62 + (MYKeychain*) openKeychainAtPath: (NSString*)path
    63 {
    64     Assert(path);
    65     SecKeychainRef keychainRef = NULL;
    66     if (!check(SecKeychainOpen(path.fileSystemRepresentation, &keychainRef), @"SecKeychainOpen"))
    67         return nil;
    68     return [self _readableKeychainWithRef: keychainRef fromPath: path];
    69 }
    70 
    71 + (MYKeychain*) createKeychainAtPath: (NSString*)path
    72                         withPassword: (NSString*)password
    73 {
    74     Assert(path);
    75     const char *passwordStr = [password UTF8String];
    76     SecKeychainRef keychainRef = NULL;
    77     if (!check(SecKeychainCreate(path.fileSystemRepresentation,
    78                                  passwordStr ?strlen(passwordStr) :0,
    79                                  passwordStr, 
    80                                  (password==nil), 
    81                                  NULL, 
    82                                  &keychainRef),
    83                @"SecKeychainCreate"))
    84         return nil;
    85     return [self _readableKeychainWithRef: keychainRef fromPath: path];
    86 }
    87 
    88 - (BOOL) deleteKeychainFile {
    89     Assert(_keychain);
    90     return check(SecKeychainDelete(_keychain), @"SecKeychainDelete");
    91 }
    92 
    93 
    94 - (void) dealloc
    95 {
    96     if (_keychain) CFRelease(_keychain);
    97     [super dealloc];
    98 }
    99 
   100 
   101 + (MYKeychain*) allKeychains
   102 {
   103     static MYKeychain *sAllKeychains;
   104     @synchronized(self) {
   105         if (!sAllKeychains)
   106             sAllKeychains = [[self alloc] initWithKeychainRef: nil];
   107     }
   108     return sAllKeychains;
   109 }
   110 
   111 
   112 + (MYKeychain*) defaultKeychain
   113 {
   114     static MYKeychain *sDefaultKeychain;
   115     @synchronized(self) {
   116         if (!sDefaultKeychain) {
   117             SecKeychainRef kc = NULL;
   118             OSStatus err = SecKeychainCopyDomainDefault(kSecPreferencesDomainUser,&kc);
   119 #if TARGET_OS_IPHONE
   120             // In the simulator, an app is run in a sandbox that has no keychain by default.
   121             // As a convenience, create one if necessary:
   122             if (err == errSecNoDefaultKeychain) {
   123                 Log(@"No default keychain in simulator; creating one...");
   124                 NSString *path = [NSSearchPathForDirectoriesInDomains(NSLibraryDirectory,
   125                                                                       NSUserDomainMask, YES) objectAtIndex: 0];
   126                 path = [path stringByAppendingPathComponent: @"MYCrypto.keychain"];
   127                 sDefaultKeychain = [[self createKeychainAtPath: path withPassword: nil] retain];
   128                 Assert(sDefaultKeychain, @"Couldn't create default keychain");
   129                 SecKeychainSetDomainDefault(kSecPreferencesDomainUser, sDefaultKeychain.keychainRef);
   130                 Log(@"...created %@", sDefaultKeychain);
   131                 return sDefaultKeychain;
   132             }
   133 #endif
   134             if (!check(err, @"SecKeychainCopyDefault"))
   135                 kc = NULL;
   136 
   137             Assert(kc, @"No default keychain");
   138             sDefaultKeychain = [[self alloc] initWithKeychainRef: kc];
   139             CFRelease(kc);
   140         }
   141     }
   142     return sDefaultKeychain;
   143 }
   144 
   145 
   146 - (id) copyWithZone: (NSZone*)zone {
   147     // It's not necessary to make copies of Keychain objects. This makes it more efficient
   148     // to use instances as NSDictionary keys or store them in NSSets.
   149     return [self retain];
   150 }
   151 
   152 - (BOOL) isEqual: (id)obj {
   153     return (obj == self) || 
   154             ([obj isKindOfClass: [MYKeychain class]] && CFEqual(_keychain, [obj keychainRef]));
   155 }
   156 
   157 
   158 - (SecKeychainRef) keychainRef {
   159     return _keychain;
   160 }
   161 
   162 
   163 - (SecKeychainRef) keychainRefOrDefault {
   164     if (_keychain)
   165         return _keychain;
   166     else
   167         return [[[self class] defaultKeychain] keychainRef];
   168 }
   169     
   170     
   171 - (NSString*) path {
   172     if (!_keychain)
   173         return nil;
   174     char pathBuf[PATH_MAX];
   175     UInt32 pathLen = sizeof(pathBuf);
   176     if (!check(SecKeychainGetPath(_keychain, &pathLen, pathBuf), @"SecKeychainGetPath"))
   177         return nil;
   178     return [[NSFileManager defaultManager] stringWithFileSystemRepresentation: pathBuf length: pathLen];
   179 }
   180 
   181 - (NSString*) description {
   182     if (_keychain)
   183         return $sprintf(@"%@[%p, %@]", [self class], _keychain, self.path);
   184     else
   185         return $sprintf(@"%@[all]", [self class]);
   186 }
   187 
   188 
   189 #pragma mark -
   190 #pragma mark SEARCHING:
   191 
   192 
   193 - (MYKeychainItem*) itemOfClass: (SecItemClass)itemClass 
   194                      withDigest: (MYSHA1Digest*)pubKeyDigest 
   195 {
   196     SecKeychainAttribute attr = {.tag= (itemClass==kSecCertificateItemClass ?kSecPublicKeyHashItemAttr :kSecKeyLabel), 
   197                                  .length= pubKeyDigest.length, 
   198                                  .data= (void*) pubKeyDigest.bytes};
   199     MYKeyEnumerator *e = [[MYKeyEnumerator alloc] initWithKeychain: self
   200                                                          itemClass: itemClass
   201                                                         attributes: &attr count: 1];
   202     MYKeychainItem *item = e.nextObject;
   203     [e release];
   204     return item;
   205 }
   206 
   207 - (MYPublicKey*) publicKeyWithDigest: (MYSHA1Digest*)pubKeyDigest {
   208     return (MYPublicKey*) [self itemOfClass: kSecPublicKeyItemClass withDigest: pubKeyDigest];
   209 }   
   210 
   211 - (NSEnumerator*) enumeratePublicKeys {
   212     return [[[MYKeyEnumerator alloc] initWithKeychain: self
   213                                             itemClass: kSecPublicKeyItemClass
   214                                            attributes: NULL count: 0] autorelease];
   215 }
   216 
   217 - (NSEnumerator*) publicKeysWithAlias: (NSString*)alias {
   218     NSData *utf8 = [alias dataUsingEncoding: NSUTF8StringEncoding];
   219     SecKeychainAttribute attr = {.tag=kSecKeyAlias, .length=utf8.length, .data=(void*)utf8.bytes};
   220     return [[[MYKeyEnumerator alloc] initWithKeychain: self
   221                                             itemClass: kSecPublicKeyItemClass
   222                                            attributes: &attr count: 1] autorelease];
   223 }
   224 
   225 
   226 - (MYKeyPair*) keyPairWithDigest: (MYSHA1Digest*)pubKeyDigest {
   227     return (MYKeyPair*) [self itemOfClass: kSecPrivateKeyItemClass withDigest: pubKeyDigest];
   228 }
   229 
   230 - (NSEnumerator*) enumerateKeyPairs {
   231     return [[[MYKeyEnumerator alloc] initWithKeychain: self
   232                                             itemClass: kSecPrivateKeyItemClass
   233                                            attributes: NULL count: 0] autorelease];
   234 }
   235 
   236 - (MYCertificate*) certificateWithDigest: (MYSHA1Digest*)pubKeyDigest {
   237     return (MYCertificate*) [self itemOfClass: kSecCertificateItemClass withDigest: pubKeyDigest];
   238 }
   239 
   240 - (NSEnumerator*) enumerateCertificates {
   241     return [[[MYKeyEnumerator alloc] initWithKeychain: self
   242                                             itemClass: kSecCertificateItemClass
   243                                            attributes: NULL count: 0] autorelease];
   244 }
   245 
   246 - (NSEnumerator*) enumerateSymmetricKeys {
   247     return [[[MYKeyEnumerator alloc] initWithKeychain: self
   248                                             itemClass: kSecSymmetricKeyItemClass
   249                                            attributes: NULL count: 0] autorelease];
   250 }
   251 
   252 - (NSEnumerator*) symmetricKeysWithAlias: (NSString*)alias {
   253     NSData *utf8 = [alias dataUsingEncoding: NSUTF8StringEncoding];
   254     SecKeychainAttribute attr = {.tag=kSecKeyAlias, .length=utf8.length, .data=(void*)utf8.bytes};
   255     return [[[MYKeyEnumerator alloc] initWithKeychain: self
   256                                             itemClass: kSecSymmetricKeyItemClass
   257                                            attributes: &attr count: 1] autorelease];
   258 }
   259 
   260 
   261 
   262 #pragma mark -
   263 #pragma mark IMPORT:
   264 
   265 
   266 - (MYPublicKey*) importPublicKey: (NSData*)keyData {
   267     return [[[MYPublicKey alloc] _initWithKeyData: keyData 
   268                                       forKeychain: self.keychainRefOrDefault]
   269             autorelease];
   270 }
   271 
   272 - (MYKeyPair*) importPublicKey: (NSData*)pubKeyData 
   273                     privateKey: (NSData*)privKeyData 
   274                     alertTitle: (NSString*)title
   275                    alertPrompt: (NSString*)prompt {
   276     return [[[MYKeyPair alloc] _initWithPublicKeyData: pubKeyData
   277                                        privateKeyData: privKeyData
   278                                           forKeychain: self.keychainRefOrDefault
   279                                            alertTitle: (NSString*)title
   280                                           alertPrompt: (NSString*)prompt]
   281             autorelease];
   282 }
   283 
   284 - (MYKeyPair*) importPublicKey: (NSData*)pubKeyData 
   285                     privateKey: (NSData*)privKeyData 
   286 {
   287     return [self importPublicKey: pubKeyData privateKey: privKeyData
   288                       alertTitle: @"Import Private Key"
   289                      alertPrompt: @"To import your saved private key, please re-enter the "
   290                                    "passphrase you used when you exported it."];
   291 }
   292 
   293 - (MYCertificate*) importCertificate: (NSData*)data
   294                                 type: (CSSM_CERT_TYPE) type
   295                             encoding: (CSSM_CERT_ENCODING) encoding;
   296 {
   297     MYCertificate *cert = [[[MYCertificate alloc] initWithCertificateData: data 
   298                                                                     type: type
   299                                                                 encoding: encoding]
   300                            autorelease];
   301     if (cert) {
   302         if (!check(SecCertificateAddToKeychain(cert.certificateRef, self.keychainRefOrDefault),
   303                    @"SecCertificateAddToKeychain"))
   304             cert = nil;
   305     }
   306     return cert;
   307 }
   308 
   309 - (MYCertificate*) importCertificate: (NSData*)data {
   310     return [self importCertificate: data 
   311                               type: CSSM_CERT_X_509v3 
   312                           encoding: CSSM_CERT_ENCODING_BER];
   313 }
   314 
   315 
   316 - (MYSymmetricKey*) generateSymmetricKeyOfSize: (unsigned)keySizeInBits
   317                                      algorithm: (CCAlgorithm)algorithm
   318 {
   319     return [MYSymmetricKey _generateSymmetricKeyOfSize: keySizeInBits
   320                                              algorithm: algorithm inKeychain: self];
   321 }
   322 
   323 - (MYKeyPair*) generateRSAKeyPairOfSize: (unsigned)keySize {
   324     return [MYKeyPair _generateRSAKeyPairOfSize: keySize inKeychain: self.keychainRefOrDefault];
   325 }
   326 
   327 
   328 - (CSSM_CSP_HANDLE) CSPHandle {
   329     CSSM_CSP_HANDLE cspHandle = 0;
   330     Assert(check(SecKeychainGetCSPHandle(self.keychainRefOrDefault, &cspHandle), @"SecKeychainGetCSPHandle"));
   331     return cspHandle;
   332 }
   333 
   334 
   335 @end
   336 
   337 
   338 
   339 #pragma mark -
   340 @implementation MYKeyEnumerator
   341 
   342 - (id) initWithKeychain: (MYKeychain*)keychain
   343               itemClass: (SecItemClass)itemClass
   344              attributes: (SecKeychainAttribute[])attributes 
   345                   count: (unsigned)count {
   346     self = [super init];
   347     if (self) {
   348         _keychain = [keychain retain];
   349         _itemClass = itemClass;
   350         SecKeychainAttributeList list = {.count=count, .attr=attributes};
   351         if (!check(SecKeychainSearchCreateFromAttributes(keychain.keychainRef,
   352                                                          itemClass,
   353                                                          &list,
   354                                                          &_search),
   355                    @"SecKeychainSearchCreateFromAttributes")) {
   356             [self release];
   357             return nil;
   358         }
   359     }
   360     return self;
   361 }
   362 
   363 - (void) dealloc
   364 {
   365     [_keychain release];
   366     if (_search) CFRelease(_search);
   367     [super dealloc];
   368 }
   369 
   370 
   371 - (id) nextObject {
   372     if (!_search)
   373         return nil;
   374     MYPublicKey *key = nil;
   375     do{
   376         SecKeychainItemRef found = NULL;
   377         OSStatus err = SecKeychainSearchCopyNext(_search, &found);
   378         if (err || !found) {
   379             if (err != errSecItemNotFound)
   380                 check(err,@"SecKeychainSearchCopyNext");
   381             CFRelease(_search);
   382             _search = NULL;
   383             return nil;
   384         }
   385         
   386         switch (_itemClass) {
   387             case kSecPrivateKeyItemClass: {
   388                 MYSHA1Digest *digest = [MYPublicKey _digestOfKey: (SecKeyRef)found];
   389                 if (digest) {
   390                     MYPublicKey *publicKey = [_keychain publicKeyWithDigest: digest];
   391                     if (publicKey)
   392                         key = [[[MYKeyPair alloc] initWithPublicKeyRef: publicKey.keyRef
   393                                                          privateKeyRef: (SecKeyRef)found]
   394                                autorelease];
   395                     else {
   396                         // The matching public key won't turn up if it's embedded in a certificate;
   397                         // I'd have to search for certs if I wanted to look that up. Skip it for now.
   398                         //Warn(@"Couldn't find matching public key for private key! digest=%@",digest);
   399                     }
   400                 }
   401                 break;
   402             }
   403             case kSecCertificateItemClass:
   404                 key = [[[MYCertificate alloc] initWithCertificateRef: (SecCertificateRef)found] autorelease];
   405                 break;
   406             case kSecPublicKeyItemClass:
   407                 key = [[[MYPublicKey alloc] initWithKeyRef: (SecKeyRef)found] autorelease];
   408                 break;
   409         }
   410         CFRelease(found);
   411     } while (key==nil);
   412     return key;
   413 }
   414 
   415 
   416 @end
   417 
   418 
   419 #endif !USE_IPHONE_API
   420 
   421 
   422 
   423 /*
   424  Copyright (c) 2009, Jens Alfke <jens@mooseyard.com>. All rights reserved.
   425  
   426  Redistribution and use in source and binary forms, with or without modification, are permitted
   427  provided that the following conditions are met:
   428  
   429  * Redistributions of source code must retain the above copyright notice, this list of conditions
   430  and the following disclaimer.
   431  * Redistributions in binary form must reproduce the above copyright notice, this list of conditions
   432  and the following disclaimer in the documentation and/or other materials provided with the
   433  distribution.
   434  
   435  THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR
   436  IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND 
   437  FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRI-
   438  BUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
   439  (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 
   440   PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 
   441  CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 
   442  THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
   443  */