123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314 |
- /*
- File: KeychainItemWrapper.m
- Abstract:
- Objective-C wrapper for accessing a single keychain item.
-
- Version: 1.2
-
- Disclaimer: IMPORTANT: This Apple software is supplied to you by Apple
- Inc. ("Apple") in consideration of your agreement to the following
- terms, and your use, installation, modification or redistribution of
- this Apple software constitutes acceptance of these terms. If you do
- not agree with these terms, please do not use, install, modify or
- redistribute this Apple software.
-
- In consideration of your agreement to abide by the following terms, and
- subject to these terms, Apple grants you a personal, non-exclusive
- license, under Apple's copyrights in this original Apple software (the
- "Apple Software"), to use, reproduce, modify and redistribute the Apple
- Software, with or without modifications, in source and/or binary forms;
- provided that if you redistribute the Apple Software in its entirety and
- without modifications, you must retain this notice and the following
- text and disclaimers in all such redistributions of the Apple Software.
- Neither the name, trademarks, service marks or logos of Apple Inc. may
- be used to endorse or promote products derived from the Apple Software
- without specific prior written permission from Apple. Except as
- expressly stated in this notice, no other rights or licenses, express or
- implied, are granted by Apple herein, including but not limited to any
- patent rights that may be infringed by your derivative works or by other
- works in which the Apple Software may be incorporated.
-
- The Apple Software is provided by Apple on an "AS IS" basis. APPLE
- MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION
- THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS
- FOR A PARTICULAR PURPOSE, REGARDING THE APPLE SOFTWARE OR ITS USE AND
- OPERATION ALONE OR IN COMBINATION WITH YOUR PRODUCTS.
-
- IN NO EVENT SHALL APPLE BE LIABLE FOR ANY SPECIAL, INDIRECT, INCIDENTAL
- OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
- SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
- INTERRUPTION) ARISING IN ANY WAY OUT OF THE USE, REPRODUCTION,
- MODIFICATION AND/OR DISTRIBUTION OF THE APPLE SOFTWARE, HOWEVER CAUSED
- AND WHETHER UNDER THEORY OF CONTRACT, TORT (INCLUDING NEGLIGENCE),
- STRICT LIABILITY OR OTHERWISE, EVEN IF APPLE HAS BEEN ADVISED OF THE
- POSSIBILITY OF SUCH DAMAGE.
-
- Copyright (C) 2010 Apple Inc. All Rights Reserved.
-
- */
- #import "KeychainItemWrapper.h"
- #import <Security/Security.h>
- /*
- These are the default constants and their respective types,
- available for the kSecClassGenericPassword Keychain Item class:
- kSecAttrAccessGroup - CFStringRef
- kSecAttrCreationDate - CFDateRef
- kSecAttrModificationDate - CFDateRef
- kSecAttrDescription - CFStringRef
- kSecAttrComment - CFStringRef
- kSecAttrCreator - CFNumberRef
- kSecAttrType - CFNumberRef
- kSecAttrLabel - CFStringRef
- kSecAttrIsInvisible - CFBooleanRef
- kSecAttrIsNegative - CFBooleanRef
- kSecAttrAccount - CFStringRef
- kSecAttrService - CFStringRef
- kSecAttrGeneric - CFDataRef
-
- See the header file Security/SecItem.h for more details.
- */
- @interface KeychainItemWrapper (PrivateMethods)
- /*
- The decision behind the following two methods (secItemFormatToDictionary and dictionaryToSecItemFormat) was
- to encapsulate the transition between what the detail view controller was expecting (NSString *) and what the
- Keychain API expects as a validly constructed container class.
- */
- - (NSMutableDictionary *)secItemFormatToDictionary:(NSDictionary *)dictionaryToConvert;
- - (NSMutableDictionary *)dictionaryToSecItemFormat:(NSDictionary *)dictionaryToConvert;
- // Updates the item in the keychain, or adds it if it doesn't exist.
- - (void)writeToKeychain;
- @end
- @implementation KeychainItemWrapper
- @synthesize keychainItemData, genericPasswordQuery;
- - (id)initWithIdentifier: (NSString *)identifier accessGroup:(NSString *) accessGroup;
- {
- if (self = [super init])
- {
- // Begin Keychain search setup. The genericPasswordQuery leverages the special user
- // defined attribute kSecAttrGeneric to distinguish itself between other generic Keychain
- // items which may be included by the same application.
- genericPasswordQuery = [[NSMutableDictionary alloc] init];
-
- [genericPasswordQuery setObject:(id)kSecClassGenericPassword forKey:(id)kSecClass];
- [genericPasswordQuery setObject:identifier forKey:(id)kSecAttrGeneric];
-
- // The keychain access group attribute determines if this item can be shared
- // amongst multiple apps whose code signing entitlements contain the same keychain access group.
- if (accessGroup != nil)
- {
- #if TARGET_IPHONE_SIMULATOR
- // Ignore the access group if running on the iPhone simulator.
- //
- // Apps that are built for the simulator aren't signed, so there's no keychain access group
- // for the simulator to check. This means that all apps can see all keychain items when run
- // on the simulator.
- //
- // If a SecItem contains an access group attribute, SecItemAdd and SecItemUpdate on the
- // simulator will return -25243 (errSecNoAccessForItem).
- #else
- [genericPasswordQuery setObject:accessGroup forKey:(id)kSecAttrAccessGroup];
- #endif
- }
-
- // Use the proper search constants, return only the attributes of the first match.
- [genericPasswordQuery setObject:(id)kSecMatchLimitOne forKey:(id)kSecMatchLimit];
- [genericPasswordQuery setObject:(id)kCFBooleanTrue forKey:(id)kSecReturnAttributes];
-
- NSDictionary *tempQuery = [NSDictionary dictionaryWithDictionary:genericPasswordQuery];
-
- NSMutableDictionary *outDictionary = nil;
-
- if (! SecItemCopyMatching((CFDictionaryRef)tempQuery, (CFTypeRef *)&outDictionary) == noErr)
- {
- // Stick these default values into keychain item if nothing found.
- [self resetKeychainItem];
-
- // Add the generic attribute and the keychain access group.
- [keychainItemData setObject:identifier forKey:(id)kSecAttrGeneric];
- if (accessGroup != nil)
- {
- #if TARGET_IPHONE_SIMULATOR
- // Ignore the access group if running on the iPhone simulator.
- //
- // Apps that are built for the simulator aren't signed, so there's no keychain access group
- // for the simulator to check. This means that all apps can see all keychain items when run
- // on the simulator.
- //
- // If a SecItem contains an access group attribute, SecItemAdd and SecItemUpdate on the
- // simulator will return -25243 (errSecNoAccessForItem).
- #else
- [keychainItemData setObject:accessGroup forKey:(id)kSecAttrAccessGroup];
- #endif
- }
- }
- else
- {
- // load the saved data from Keychain.
- self.keychainItemData = [self secItemFormatToDictionary:outDictionary];
- }
-
- [outDictionary release];
- }
-
- return self;
- }
- - (void)dealloc
- {
- [keychainItemData release];
- [genericPasswordQuery release];
-
- [super dealloc];
- }
- - (void)setObject:(id)inObject forKey:(id)key
- {
- if (inObject == nil) return;
- id currentObject = [keychainItemData objectForKey:key];
- if (![currentObject isEqual:inObject])
- {
- [keychainItemData setObject:inObject forKey:key];
- [self writeToKeychain];
- }
- }
- - (id)objectForKey:(id)key
- {
- return [keychainItemData objectForKey:key];
- }
- - (void)resetKeychainItem
- {
- OSStatus junk = noErr;
- if (!keychainItemData)
- {
- self.keychainItemData = [[NSMutableDictionary alloc] init];
- }
- else if (keychainItemData)
- {
- NSMutableDictionary *tempDictionary = [self dictionaryToSecItemFormat:keychainItemData];
- junk = SecItemDelete((CFDictionaryRef)tempDictionary);
- NSAssert( junk == noErr || junk == errSecItemNotFound, @"Problem deleting current dictionary." );
- }
-
- // Default attributes for keychain item.
- [keychainItemData setObject:@"" forKey:(id)kSecAttrAccount];
- [keychainItemData setObject:@"" forKey:(id)kSecAttrLabel];
- [keychainItemData setObject:@"" forKey:(id)kSecAttrDescription];
-
- // Default data for keychain item.
- [keychainItemData setObject:@"" forKey:(id)kSecValueData];
- }
- - (NSMutableDictionary *)dictionaryToSecItemFormat:(NSDictionary *)dictionaryToConvert
- {
- // The assumption is that this method will be called with a properly populated dictionary
- // containing all the right key/value pairs for a SecItem.
-
- // Create a dictionary to return populated with the attributes and data.
- NSMutableDictionary *returnDictionary = [NSMutableDictionary dictionaryWithDictionary:dictionaryToConvert];
-
- // Add the Generic Password keychain item class attribute.
- [returnDictionary setObject:(id)kSecClassGenericPassword forKey:(id)kSecClass];
-
- // Convert the NSString to NSData to meet the requirements for the value type kSecValueData.
- // This is where to store sensitive data that should be encrypted.
- NSString *passwordString = [dictionaryToConvert objectForKey:(id)kSecValueData];
- [returnDictionary setObject:[passwordString dataUsingEncoding:NSUTF8StringEncoding] forKey:(id)kSecValueData];
-
- return returnDictionary;
- }
- - (NSMutableDictionary *)secItemFormatToDictionary:(NSDictionary *)dictionaryToConvert
- {
- // The assumption is that this method will be called with a properly populated dictionary
- // containing all the right key/value pairs for the UI element.
-
- // Create a dictionary to return populated with the attributes and data.
- NSMutableDictionary *returnDictionary = [NSMutableDictionary dictionaryWithDictionary:dictionaryToConvert];
-
- // Add the proper search key and class attribute.
- [returnDictionary setObject:(id)kCFBooleanTrue forKey:(id)kSecReturnData];
- [returnDictionary setObject:(id)kSecClassGenericPassword forKey:(id)kSecClass];
-
- // Acquire the password data from the attributes.
- NSData *passwordData = NULL;
- if (SecItemCopyMatching((CFDictionaryRef)returnDictionary, (CFTypeRef *)&passwordData) == noErr)
- {
- // Remove the search, class, and identifier key/value, we don't need them anymore.
- [returnDictionary removeObjectForKey:(id)kSecReturnData];
-
- // Add the password to the dictionary, converting from NSData to NSString.
- NSString *password = [[[NSString alloc] initWithBytes:[passwordData bytes] length:[passwordData length]
- encoding:NSUTF8StringEncoding] autorelease];
- [returnDictionary setObject:password forKey:(id)kSecValueData];
- }
- else
- {
- // Don't do anything if nothing is found.
- NSAssert(NO, @"Serious error, no matching item found in the keychain.\n");
- }
-
- [passwordData release];
-
- return returnDictionary;
- }
- - (void)writeToKeychain
- {
- NSDictionary *attributes = NULL;
- NSMutableDictionary *updateItem = NULL;
- OSStatus result;
-
- if (SecItemCopyMatching((CFDictionaryRef)genericPasswordQuery, (CFTypeRef *)&attributes) == noErr)
- {
- // First we need the attributes from the Keychain.
- updateItem = [NSMutableDictionary dictionaryWithDictionary:attributes];
- // Second we need to add the appropriate search key/values.
- [updateItem setObject:[genericPasswordQuery objectForKey:(id)kSecClass] forKey:(id)kSecClass];
-
- // Lastly, we need to set up the updated attribute list being careful to remove the class.
- NSMutableDictionary *tempCheck = [self dictionaryToSecItemFormat:keychainItemData];
- [tempCheck removeObjectForKey:(id)kSecClass];
-
- #if TARGET_IPHONE_SIMULATOR
- // Remove the access group if running on the iPhone simulator.
- //
- // Apps that are built for the simulator aren't signed, so there's no keychain access group
- // for the simulator to check. This means that all apps can see all keychain items when run
- // on the simulator.
- //
- // If a SecItem contains an access group attribute, SecItemAdd and SecItemUpdate on the
- // simulator will return -25243 (errSecNoAccessForItem).
- //
- // The access group attribute will be included in items returned by SecItemCopyMatching,
- // which is why we need to remove it before updating the item.
- [tempCheck removeObjectForKey:(id)kSecAttrAccessGroup];
- #endif
-
- // An implicit assumption is that you can only update a single item at a time.
-
- result = SecItemUpdate((CFDictionaryRef)updateItem, (CFDictionaryRef)tempCheck);
- NSAssert( result == noErr, @"Couldn't update the Keychain Item." );
- }
- else
- {
- // No previous item found; add the new one.
- result = SecItemAdd((CFDictionaryRef)[self dictionaryToSecItemFormat:keychainItemData], NULL);
- NSAssert( result == noErr, @"Couldn't add the Keychain Item." );
- }
- }
- @end
|