Retired Document
Important: This document may not represent best practices for current development. Links to downloads and other resources may no longer be valid.
Classes/CryptoClient.m
/* |
File: CryptoClient.m |
Abstract: Contains the client networking and cryptographic operations. It |
gets invoked by the ServiceController class when the connect button is |
pressed. |
Version: 1.2 |
Disclaimer: IMPORTANT: This Apple software is supplied to you by Apple Inc. |
("Apple") in consideration of your agreement to the following terms, and your |
use, installation, modification or redistribution of this Apple software |
constitutes acceptance of these terms. If you do not agree with these terms, |
please do not use, install, modify or redistribute this Apple software. |
In consideration of your agreement to abide by the following terms, and subject |
to these terms, Apple grants you a personal, non-exclusive license, under |
Apple's copyrights in this original Apple software (the "Apple Software"), to |
use, reproduce, modify and redistribute the Apple Software, with or without |
modifications, in source and/or binary forms; provided that if you redistribute |
the Apple Software in its entirety and without modifications, you must retain |
this notice and the following text and disclaimers in all such redistributions |
of the Apple Software. |
Neither the name, trademarks, service marks or logos of Apple Inc. may be used |
to endorse or promote products derived from the Apple Software without specific |
prior written permission from Apple. Except as expressly stated in this notice, |
no other rights or licenses, express or implied, are granted by Apple herein, |
including but not limited to any patent rights that may be infringed by your |
derivative works or by other works in which the Apple Software may be |
incorporated. |
The Apple Software is provided by Apple on an "AS IS" basis. APPLE MAKES NO |
WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION THE IMPLIED |
WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
PURPOSE, REGARDING THE APPLE SOFTWARE OR ITS USE AND OPERATION ALONE OR IN |
COMBINATION WITH YOUR PRODUCTS. |
IN NO EVENT SHALL APPLE BE LIABLE FOR ANY SPECIAL, INDIRECT, INCIDENTAL OR |
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE |
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
ARISING IN ANY WAY OUT OF THE USE, REPRODUCTION, MODIFICATION AND/OR |
DISTRIBUTION OF THE APPLE SOFTWARE, HOWEVER CAUSED AND WHETHER UNDER THEORY OF |
CONTRACT, TORT (INCLUDING NEGLIGENCE), STRICT LIABILITY OR OTHERWISE, EVEN IF |
APPLE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
Copyright (C) 2008-2009 Apple Inc. All Rights Reserved. |
*/ |
#import "CryptoClient.h" |
#import "SecKeyWrapper.h" |
#import "AppDelegate.h" |
#import "CryptoCommon.h" |
// imports required for socket initialization |
#import <sys/socket.h> |
#import <netinet/in.h> |
#import <unistd.h> |
#import <arpa/inet.h> |
@implementation CryptoClient |
@synthesize service, istr, ostr, delegate, isConnected; |
- (id)initWithService:(NSNetService *)serviceInstance delegate:(NSObject <CryptoClientDelegate, NSObject> *)anObject { |
if (self = [super init]) { |
self.service = serviceInstance; |
self.delegate = anObject; |
self.isConnected = NO; |
[self.service getInputStream:&istr outputStream:&ostr]; |
} |
return self; |
} |
- (void)stream:(NSStream *)stream handleEvent:(NSStreamEvent)eventCode |
{ |
switch(eventCode) { |
case NSStreamEventOpenCompleted: |
{ |
if ([self.ostr streamStatus] == NSStreamStatusOpen && [self.istr streamStatus] == NSStreamStatusOpen && !self.isConnected) { |
[delegate performSelectorOnMainThread:@selector(cryptoClientDidCompleteConnection:) withObject:self waitUntilDone:NO]; |
self.isConnected = YES; |
} |
} |
case NSStreamEventHasSpaceAvailable: |
{ |
if (stream == self.ostr) { |
if ([(NSOutputStream *) stream hasSpaceAvailable]) { |
size_t retLen = 0; |
NSData * publicKey = [[SecKeyWrapper sharedWrapper] getPublicKeyBits]; |
retLen = [self sendData:publicKey]; |
LOGGING_FACILITY1( retLen == [publicKey length], @"Attempt to send public key failed, only sent %d bytes.", retLen ); |
[self.ostr close]; |
} |
} |
break; |
} |
case NSStreamEventHasBytesAvailable: |
{ |
if (stream == self.istr) { |
[delegate performSelectorOnMainThread:@selector(cryptoClientWillBeginReceivingData:) withObject:self waitUntilDone:NO]; |
NSData * theBlob = [self receiveData]; |
[self.istr close]; |
[delegate performSelectorOnMainThread:@selector(cryptoClientDidFinishReceivingData:) withObject:self waitUntilDone:NO]; |
if (theBlob) { |
[delegate performSelectorOnMainThread:@selector(cryptoClientWillBeginVerifyingData:) withObject:self waitUntilDone:NO]; |
BOOL verify = [self verifyBlob:theBlob]; |
[self performSelectorOnMainThread:@selector(forwardVerificationToDelegate:) withObject:[NSNumber numberWithBool:verify] waitUntilDone:NO]; |
} else { |
LOGGING_FACILITY( 0, @"Connected Server sent too large of a blob." ); |
[delegate cryptoClientDidReceiveError:self]; |
} |
} |
break; |
} |
case NSStreamEventErrorOccurred: |
{ |
// No debugging facility because we don't want to exit even in DEBUG. |
// It's annoying. |
NSLog(@"stream: %@", stream); |
[delegate cryptoClientDidReceiveError:self]; |
break; |
} |
default: |
break; |
} |
} |
- (void)runConnection { |
LOGGING_FACILITY( self.istr != nil && self.ostr != nil, @"Streams not set up properly." ); |
if (self.istr && self.ostr) { |
self.istr.delegate = self; |
[self.istr scheduleInRunLoop:[NSRunLoop currentRunLoop] forMode:NSRunLoopCommonModes]; |
[self.istr open]; |
self.ostr.delegate = self; |
[self.ostr scheduleInRunLoop:[NSRunLoop currentRunLoop] forMode:NSRunLoopCommonModes]; |
[self.ostr open]; |
} |
} |
- (void)forwardVerificationToDelegate:(NSNumber *)verified { |
[delegate cryptoClientDidFinishVerifyingData:self verified:[verified boolValue]]; |
} |
- (NSData *)receiveData { |
int len = 0; |
size_t lengthByte = 0; |
NSMutableData * retBlob = nil; |
len = [self.istr read:(uint8_t *)&lengthByte maxLength:sizeof(size_t)]; |
LOGGING_FACILITY1( len == sizeof(size_t), @"Read failure errno: [%d]", errno ); |
if (lengthByte <= kMaxMessageLength && len == sizeof(size_t)) { |
retBlob = [NSMutableData dataWithLength:lengthByte]; |
len = [self.istr read:(uint8_t *)[retBlob mutableBytes] maxLength:lengthByte]; |
LOGGING_FACILITY1( len == lengthByte, @"Read failure, after buffer errno: [%d]", errno ); |
if (len != lengthByte) { |
retBlob = nil; |
} |
} |
return retBlob; |
} |
- (NSUInteger)sendData:(NSData *)outData { |
size_t len = 0; |
if (outData) { |
len = [outData length]; |
if (len > 0) { |
size_t longSize = sizeof(size_t); |
NSMutableData * message = [[NSMutableData alloc] initWithCapacity:(len + longSize)]; |
[message appendBytes:(const void *)&len length:longSize]; |
[message appendData:outData]; |
[self.ostr write:[message bytes] maxLength:[message length]]; |
[message release]; |
} |
} |
return len; |
} |
- (BOOL)verifyBlob:(NSData *)blob { |
NSMutableDictionary * message = nil; |
NSString * error = nil; |
NSString * peerName = nil; |
BOOL verified = NO; |
CCOptions pad = 0; |
SecKeyRef publicKeyRef = NULL; |
peerName = [self.service name]; |
message = [NSPropertyListSerialization propertyListFromData:blob mutabilityOption:NSPropertyListMutableContainers format:nil errorDescription:&error]; |
if (!error) { |
// Get the unwrapped symmetric key. |
NSData * symmetricKey = [[SecKeyWrapper sharedWrapper] unwrapSymmetricKey:(NSData *)[message objectForKey:[NSString stringWithUTF8String:(const char *)kSymTag]]]; |
// Get the padding PKCS#7 flag. |
pad = [(NSNumber *)[message objectForKey:[NSString stringWithUTF8String:(const char *)kPadTag]] unsignedIntValue]; |
// Get the encrypted message and decrypt. |
NSData * plainText = [[SecKeyWrapper sharedWrapper] doCipher:(NSData *)[message objectForKey:[NSString stringWithUTF8String:(const char *)kMesTag]] |
key:symmetricKey |
context:kCCDecrypt |
padding:&pad]; |
// Add peer public key. |
publicKeyRef = [[SecKeyWrapper sharedWrapper] addPeerPublicKey:peerName |
keyBits:(NSData *)[message objectForKey:[NSString stringWithUTF8String:(const char *)kPubTag]]]; |
// Verify the signature. |
verified = [[SecKeyWrapper sharedWrapper] verifySignature:plainText |
secKeyRef:publicKeyRef |
signature:(NSData *)[message objectForKey:[NSString stringWithUTF8String:(const char *)kSigTag]]]; |
// Clean up by removing the peer public key. |
[[SecKeyWrapper sharedWrapper] removePeerPublicKey:peerName]; |
} else { |
LOGGING_FACILITY( 0, error ); |
[error release]; |
} |
return verified; |
} |
-(void) dealloc { |
[istr removeFromRunLoop:[NSRunLoop currentRunLoop] forMode:NSRunLoopCommonModes]; |
[istr release]; |
[ostr removeFromRunLoop:[NSRunLoop currentRunLoop] forMode:NSRunLoopCommonModes]; |
[ostr release]; |
[service release]; |
[super dealloc]; |
} |
@end |
Copyright © 2018 Apple Inc. All Rights Reserved. Terms of Use | Privacy Policy | Updated: 2018-06-04