forked from eway2012/SampleCode
-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathCryptoClient.m
More file actions
249 lines (201 loc) · 8.7 KB
/
CryptoClient.m
File metadata and controls
249 lines (201 loc) · 8.7 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
/*
File: CryptoClient.m
Abstract: Contains the client networking and cryptographic operations. It
gets invoked by the ServiceController class when the connect button is
pressed.
Version: 1.2
Disclaimer: IMPORTANT: This Apple software is supplied to you by Apple Inc.
("Apple") in consideration of your agreement to the following terms, and your
use, installation, modification or redistribution of this Apple software
constitutes acceptance of these terms. If you do not agree with these terms,
please do not use, install, modify or redistribute this Apple software.
In consideration of your agreement to abide by the following terms, and subject
to these terms, Apple grants you a personal, non-exclusive license, under
Apple's copyrights in this original Apple software (the "Apple Software"), to
use, reproduce, modify and redistribute the Apple Software, with or without
modifications, in source and/or binary forms; provided that if you redistribute
the Apple Software in its entirety and without modifications, you must retain
this notice and the following text and disclaimers in all such redistributions
of the Apple Software.
Neither the name, trademarks, service marks or logos of Apple Inc. may be used
to endorse or promote products derived from the Apple Software without specific
prior written permission from Apple. Except as expressly stated in this notice,
no other rights or licenses, express or implied, are granted by Apple herein,
including but not limited to any patent rights that may be infringed by your
derivative works or by other works in which the Apple Software may be
incorporated.
The Apple Software is provided by Apple on an "AS IS" basis. APPLE MAKES NO
WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION THE IMPLIED
WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE, REGARDING THE APPLE SOFTWARE OR ITS USE AND OPERATION ALONE OR IN
COMBINATION WITH YOUR PRODUCTS.
IN NO EVENT SHALL APPLE BE LIABLE FOR ANY SPECIAL, INDIRECT, INCIDENTAL OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
ARISING IN ANY WAY OUT OF THE USE, REPRODUCTION, MODIFICATION AND/OR
DISTRIBUTION OF THE APPLE SOFTWARE, HOWEVER CAUSED AND WHETHER UNDER THEORY OF
CONTRACT, TORT (INCLUDING NEGLIGENCE), STRICT LIABILITY OR OTHERWISE, EVEN IF
APPLE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (C) 2008-2009 Apple Inc. All Rights Reserved.
*/
#import "CryptoClient.h"
#import "SecKeyWrapper.h"
#import "AppDelegate.h"
#import "CryptoCommon.h"
// imports required for socket initialization
#import <sys/socket.h>
#import <netinet/in.h>
#import <unistd.h>
#import <arpa/inet.h>
@implementation CryptoClient
@synthesize service, istr, ostr, delegate, isConnected;
- (id)initWithService:(NSNetService *)serviceInstance delegate:(NSObject <CryptoClientDelegate, NSObject> *)anObject {
if (self = [super init]) {
self.service = serviceInstance;
self.delegate = anObject;
self.isConnected = NO;
[self.service getInputStream:&istr outputStream:&ostr];
}
return self;
}
- (void)stream:(NSStream *)stream handleEvent:(NSStreamEvent)eventCode
{
switch(eventCode) {
case NSStreamEventOpenCompleted:
{
if ([self.ostr streamStatus] == NSStreamStatusOpen && [self.istr streamStatus] == NSStreamStatusOpen && !self.isConnected) {
[delegate performSelectorOnMainThread:@selector(cryptoClientDidCompleteConnection:) withObject:self waitUntilDone:NO];
self.isConnected = YES;
}
}
case NSStreamEventHasSpaceAvailable:
{
if (stream == self.ostr) {
if ([(NSOutputStream *) stream hasSpaceAvailable]) {
size_t retLen = 0;
NSData * publicKey = [[SecKeyWrapper sharedWrapper] getPublicKeyBits];
retLen = [self sendData:publicKey];
LOGGING_FACILITY1( retLen == [publicKey length], @"Attempt to send public key failed, only sent %d bytes.", retLen );
[self.ostr close];
}
}
break;
}
case NSStreamEventHasBytesAvailable:
{
if (stream == self.istr) {
[delegate performSelectorOnMainThread:@selector(cryptoClientWillBeginReceivingData:) withObject:self waitUntilDone:NO];
NSData * theBlob = [self receiveData];
[self.istr close];
[delegate performSelectorOnMainThread:@selector(cryptoClientDidFinishReceivingData:) withObject:self waitUntilDone:NO];
if (theBlob) {
[delegate performSelectorOnMainThread:@selector(cryptoClientWillBeginVerifyingData:) withObject:self waitUntilDone:NO];
BOOL verify = [self verifyBlob:theBlob];
[self performSelectorOnMainThread:@selector(forwardVerificationToDelegate:) withObject:[NSNumber numberWithBool:verify] waitUntilDone:NO];
} else {
LOGGING_FACILITY( 0, @"Connected Server sent too large of a blob." );
[delegate cryptoClientDidReceiveError:self];
}
}
break;
}
case NSStreamEventErrorOccurred:
{
// No debugging facility because we don't want to exit even in DEBUG.
// It's annoying.
NSLog(@"stream: %@", stream);
[delegate cryptoClientDidReceiveError:self];
break;
}
default:
break;
}
}
- (void)runConnection {
LOGGING_FACILITY( self.istr != nil && self.ostr != nil, @"Streams not set up properly." );
if (self.istr && self.ostr) {
self.istr.delegate = self;
[self.istr scheduleInRunLoop:[NSRunLoop currentRunLoop] forMode:NSRunLoopCommonModes];
[self.istr open];
self.ostr.delegate = self;
[self.ostr scheduleInRunLoop:[NSRunLoop currentRunLoop] forMode:NSRunLoopCommonModes];
[self.ostr open];
}
}
- (void)forwardVerificationToDelegate:(NSNumber *)verified {
[delegate cryptoClientDidFinishVerifyingData:self verified:[verified boolValue]];
}
- (NSData *)receiveData {
int len = 0;
size_t lengthByte = 0;
NSMutableData * retBlob = nil;
len = [self.istr read:(uint8_t *)&lengthByte maxLength:sizeof(size_t)];
LOGGING_FACILITY1( len == sizeof(size_t), @"Read failure errno: [%d]", errno );
if (lengthByte <= kMaxMessageLength && len == sizeof(size_t)) {
retBlob = [NSMutableData dataWithLength:lengthByte];
len = [self.istr read:(uint8_t *)[retBlob mutableBytes] maxLength:lengthByte];
LOGGING_FACILITY1( len == lengthByte, @"Read failure, after buffer errno: [%d]", errno );
if (len != lengthByte) {
retBlob = nil;
}
}
return retBlob;
}
- (NSUInteger)sendData:(NSData *)outData {
size_t len = 0;
if (outData) {
len = [outData length];
if (len > 0) {
size_t longSize = sizeof(size_t);
NSMutableData * message = [[NSMutableData alloc] initWithCapacity:(len + longSize)];
[message appendBytes:(const void *)&len length:longSize];
[message appendData:outData];
[self.ostr write:[message bytes] maxLength:[message length]];
[message release];
}
}
return len;
}
- (BOOL)verifyBlob:(NSData *)blob {
NSMutableDictionary * message = nil;
NSString * error = nil;
NSString * peerName = nil;
BOOL verified = NO;
CCOptions pad = 0;
SecKeyRef publicKeyRef = NULL;
peerName = [self.service name];
message = [NSPropertyListSerialization propertyListFromData:blob mutabilityOption:NSPropertyListMutableContainers format:nil errorDescription:&error];
if (!error) {
// Get the unwrapped symmetric key.
NSData * symmetricKey = [[SecKeyWrapper sharedWrapper] unwrapSymmetricKey:(NSData *)[message objectForKey:[NSString stringWithUTF8String:(const char *)kSymTag]]];
// Get the padding PKCS#7 flag.
pad = [(NSNumber *)[message objectForKey:[NSString stringWithUTF8String:(const char *)kPadTag]] unsignedIntValue];
// Get the encrypted message and decrypt.
NSData * plainText = [[SecKeyWrapper sharedWrapper] doCipher:(NSData *)[message objectForKey:[NSString stringWithUTF8String:(const char *)kMesTag]]
key:symmetricKey
context:kCCDecrypt
padding:&pad];
// Add peer public key.
publicKeyRef = [[SecKeyWrapper sharedWrapper] addPeerPublicKey:peerName
keyBits:(NSData *)[message objectForKey:[NSString stringWithUTF8String:(const char *)kPubTag]]];
// Verify the signature.
verified = [[SecKeyWrapper sharedWrapper] verifySignature:plainText
secKeyRef:publicKeyRef
signature:(NSData *)[message objectForKey:[NSString stringWithUTF8String:(const char *)kSigTag]]];
// Clean up by removing the peer public key.
[[SecKeyWrapper sharedWrapper] removePeerPublicKey:peerName];
} else {
LOGGING_FACILITY( 0, error );
[error release];
}
return verified;
}
-(void) dealloc {
[istr removeFromRunLoop:[NSRunLoop currentRunLoop] forMode:NSRunLoopCommonModes];
[istr release];
[ostr removeFromRunLoop:[NSRunLoop currentRunLoop] forMode:NSRunLoopCommonModes];
[ostr release];
[service release];
[super dealloc];
}
@end