gpt4 book ai didi

ios - 使用 iOS Security.framework 生成自签名证书?

转载 作者:可可西里 更新时间:2023-11-01 04:42:15 25 4
gpt4 key购买 nike

这可能吗,如果可能的话如何?我正在使用需要客户端证书的协议(protocol),因此我想生成一次并将其存储在钥匙串(keychain)中以备将来使用。

我目前正在使用安全框架通过 SecKeyGeneratePair 生成 key 对,但是有什么方法可以将生成的公钥打包到 X.509 证书中并将其与私钥一起添加以创建新的 SecIdentity?我认为应该有一种方法,因为安全框架在 iOS 和 Mac 上应该是相同的,并且 Mac 上的钥匙串(keychain)访问可以生成自签名证书。

OpenSSL 是一个选项,但如果可能的话,我更愿意使用内置的安全框架。谢谢。

最佳答案

是的 - 它是(而且非常痛苦)。下面是我正在使用的代码。它使用在 SecKeyGeneratePair() 中生成的 key 进行签名(因此在钥匙串(keychain)/外部范围内)。

我破解这个的关键是发现 SecKeyRawSign只喜欢 SHA1。

如果您想从我手中拿走一些现有的正在运行的代码,请随时与我联系,清理它,添加文档,然后使用一个很好的 Apache 许可证将它放在 github 上供所有人使用。

(NSData *)signCSR:(NSData *)derCSR forDays:(double)days NIDstToKeep:(NSSet *)nidsToAllow 
{
const unsigned char * ptr;
NSUInteger len;

// Gather the details for the CA cert (my cert) from
// OSX.
//
X509 * x509_mycert = NULL;
SecIdentityRef identityRef = [self secIdentityRef];
if (!identityRef)
return nil;

SecCertificateRef certificateRef = [self secCertificateRef];
if (!certificateRef)
return nil;

CFDataRef certAsDer = SecCertificateCopyData(certificateRef);
if (!certAsDer)
return nil;

// Jump over the fence to OpenSSL - and create
// an X509 version.
//
ptr = CFDataGetBytePtr(certAsDer);
len = CFDataGetLength(certAsDer);

if (!(d2i_X509(&x509_mycert, &ptr, len)))
return nil;

// And likewise for the CSR.
//
ptr = (const unsigned char *)[derCSR bytes];
len = [derCSR length];

X509_REQ *req = NULL;
if (!(d2i_X509_REQ(&req, &ptr, len)))
return nil;

// Copy the CSR into a an actual x509 tenative
// structure; i.e. the cert we'll issue signed.
//
X509 * x509_to_sign = X509_new();

assert(X509_set_subject_name(x509_to_sign,req->req_info->subject));
assert(X509_set_issuer_name(x509_to_sign, X509_get_subject_name(x509_mycert)));

EVP_PKEY * pubkey_csr = X509_REQ_get_pubkey(req);
X509_set_pubkey(x509_to_sign,pubkey_csr);
EVP_PKEY_free(pubkey_csr);

X509_gmtime_adj(X509_get_notBefore(x509_to_sign),0L);
X509_gmtime_adj(X509_get_notAfter(x509_to_sign),(long)floor(60*60*24*days));

if (nidsToAllow && [nidsToAllow count]) {
// Faily blindly copy all known extensions.
//
for(int i = X509_get_ext_count(x509_to_sign); i > 0; i--) {
X509_EXTENSION * ext = X509_get_ext(x509_to_sign,i-i);
int nid = OBJ_obj2nid(ext->object);
if ([nidsToAllow containsObject:[NSNumber numberWithInt:nid]]) {
// NSLog(@"Keeping %s at %d", OBJ_nid2sn(nid),i-i);
continue;
}
// NSLog(@"Killing %s at %d", OBJ_nid2sn(nid),i-1);
X509_delete_ext(x509_to_sign, i-i);
}
} else {
// wipe them all.
//
while (X509_get_ext_count(x509_to_sign) > 0) {
X509_delete_ext(x509_to_sign, 0);
}
};

// Set a random serial.
//
ASN1_INTEGER *bs = ASN1_INTEGER_new();
long rnd = 0;
if (!(RAND_bytes((unsigned char *)&rnd, sizeof(rnd))))
return nil;

rnd = labs(rnd);
ASN1_INTEGER_set(bs, rnd);

if (!((X509_set_serialNumber(x509_to_sign,bs))))
return nil;

ASN1_INTEGER_free(bs);

// Force v3
//
X509V3_CTX ctx2;
X509_set_version(x509_to_sign,2); /* version 3 certificate */
X509V3_set_ctx(&ctx2, x509_mycert, x509_to_sign, NULL, NULL, 0);

// Pull in additional x509v3 sections.
//
if (DBA) {
assert(X509V3_set_nconf(&ctx2, conf));
assert(X509V3_EXT_add_nconf(conf, &ctx2, section, x509_to_sign));
}
// Specify signature type.
//
x509_to_sign->cert_info->signature->algorithm = OBJ_nid2obj(NID_sha1WithRSAEncryption);

// Construct the ASN.1 blob which contains all the information
// we are going to sign.
//
const ASN1_ITEM * it = ASN1_ITEM_rptr(X509_CINF);
unsigned char *buf_in=NULL;
ASN1_VALUE * asn = (ASN1_VALUE *)(x509_to_sign->cert_info);
int inl = ASN1_item_i2d(asn,&buf_in, it);

// Small area to hold the signature on the SHA1 hash.
//
size_t sigLen = SecKeyGetBlockSize(privateKey);
uint8_t * sig = (uint8_t *)malloc(sigLen * sizeof(uint8_t));
memset((void*)sig, 0, sigLen);

#if TARGET_OS_IPHONE
// IPhone Way of doing it - where we need to construct the
// SHA1 of the 'to sign' area ourselves. As SecKeyRawSign
// does not seem to handly anything beyond a SHA1.
//
NSData * buffToSign = [NSData dataWithBytes:buf_in length:inl];
NSData * buffSha1ToSign = [buffToSign sha1];

size_t sigLenUsed = sigLen;

OSStatus status = SecKeyRawSign(privateKey, kSecPaddingPKCS1SHA1, [buffSha1ToSign bytes], [buffSha1ToSign length], sig, &sigLenUsed);
assert(status == noErr);
assert(sigLenUsed == sigLen);

#else
// MacOSX offical way of doing this - which seems to do the SHA1 fun,
// padding and games deeper down; and where we simply pass the blob.
//
CFErrorRef error = NULL;
SecTransformRef signer = SecSignTransformCreate(privateKey, &error);
if (error) { CFShow(error); assert(0); };

NSData * blockToSign = [NSData dataWithBytes:buf_in length:inl];
SecTransformSetAttribute(signer, kSecTransformInputAttributeName,
(__bridge CFTypeRef) blockToSign, &error);
if (error) { CFShow(error); assert(0); };

CFDataRef signature = SecTransformExecute(signer, &error);
if (error) { CFShow(error); assert(0); };

assert(sigLen == CFDataGetLength(signature));
bcopy(CFDataGetBytePtr(signature), sig, sigLen);
#endif

// Wrap up the rest of the block with the bits and bobs needed to
// create a valid ASN1 block to share as a PEM or DER. Which most
// crucially is about copying the just created signature into it.
//
x509_to_sign->sig_alg->algorithm = OBJ_nid2obj(NID_sha1WithRSAEncryption);
x509_to_sign->signature->data = sig;
x509_to_sign->signature->length = sigLen;
x509_to_sign->signature->flags&= ~(ASN1_STRING_FLAG_BITS_LEFT|0x07);
x509_to_sign->signature->flags|=ASN1_STRING_FLAG_BITS_LEFT;

unsigned char * derbuff = NULL;
int derlen = i2d_X509(x509_to_sign, &derbuff);

NSData * signedDer = [NSData dataWithBytes:derbuff length:derlen];

free(sig);
OPENSSL_free(x509_to_sign);
OPENSSL_free(x509_mycert);

return signedDer;
}

请注意,我删除了一些专有/非公开位 - 因此上面可能会遗漏一些 CFReleases() 和杂项。

关于ios - 使用 iOS Security.framework 生成自签名证书?,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/14072051/

25 4 0
Copyright 2021 - 2024 cfsdn All Rights Reserved 蜀ICP备2022000587号
广告合作:1813099741@qq.com 6ren.com