【问题标题】:Extracting a public key from key pair in key chain从密钥链中的密钥对中提取公钥
【发布时间】:2012-06-08 08:49:40
【问题描述】:

问题:检索公钥

对于 iPhone 应用,我需要创建一个 rsa 密钥对,将其存储在密钥链中并检索公钥。

幸运的是,Apple 发布了一个 Crypto Exercise 示例,可以找到我需要的所有内容(类 SecKeyWrapper、函数 generateKeyPairgetPublicKeyBits)。

但是在尝试使用这些功能之后,我的公钥对于不同的密钥对总是得到相同的输出(而不是不同的密钥对的不同公钥位)。

我的 generateKeyPair 和 getPublicKeyBits 函数的实现:

我首先通过调用 generateKeyPairWithKeySizeInBits 创建一个密钥对(这似乎工作正常),然后我使用 getPublicKeyBits 和 NSLog 提取公钥位...

- (void) generateKeyPairWithKeySizeInBits:(int)bits withPublicIdentifier:(NSString     *)publicIdentifier andPrivateIdentifier:(NSString *)privateIdentifier
{

    NSLog(@"begin generating key...");
    OSStatus status = noErr;

    NSMutableDictionary* privateKeyAttr = [[NSMutableDictionary alloc] init];
    NSMutableDictionary* publicKeyAttr = [[NSMutableDictionary alloc] init];
    NSMutableDictionary* keyPairAttr = [[NSMutableDictionary alloc] init];

    NSData* publicTag = [publicIdentifier dataUsingEncoding:NSUTF8StringEncoding];
    NSData* privateTag = [privateIdentifier dataUsingEncoding:NSUTF8StringEncoding];

    SecKeyRef publicKey = NULL;
    SecKeyRef privateKey = NULL;

    [keyPairAttr setObject:(__bridge id) kSecAttrKeyTypeRSA forKey:(__bridge id) kSecAttrKeyType];
    [keyPairAttr setObject:[NSNumber numberWithInt:bits] forKey:(__bridge id) kSecAttrKeySizeInBits];

    [privateKeyAttr setObject:[NSNumber numberWithBool:YES] forKey:(__bridge id) kSecAttrIsPermanent];
    [privateKeyAttr setObject:privateTag forKey:(__bridge id) kSecAttrApplicationTag];

    [publicKeyAttr setObject:[NSNumber numberWithBool:YES] forKey:(__bridge id)kSecAttrIsPermanent];
    [publicKeyAttr setObject:publicTag forKey:(__bridge id)kSecAttrApplicationTag];

    [keyPairAttr setObject:privateKeyAttr forKey:(__bridge id)kSecPrivateKeyAttrs];
    [keyPairAttr setObject:publicKeyAttr forKey:(__bridge id)kSecPublicKeyAttrs];

    SecItemDelete((__bridge CFDictionaryRef)keyPairAttr);

    status = SecKeyGeneratePair((__bridge CFDictionaryRef) keyPairAttr, &publicKey, &privateKey);

    if(status != noErr){
        NSLog(@"status = %@",status);
    }
    if(publicKey){
        NSLog(@"public key %@",publicKey);
    }

    if(privateKey){
        NSLog(@"private key %@",privateKey);
    }

    [self getPublicKeyBits:publicIdentifier];
}


- (NSData *)getPublicKeyBits: (NSString*) publicKeyIdentifier {

    OSStatus sanityCheck = noErr;
    NSData * publicKeyBits = nil;
    CFTypeRef pk;
    NSMutableDictionary * queryPublicKey = [[NSMutableDictionary alloc] init];

    NSData* publicTag = [publicKeyIdentifier dataUsingEncoding:NSUTF8StringEncoding];

    // Set the public key query dictionary.
    [queryPublicKey setObject:(__bridge_transfer id)kSecClassKey forKey:(__bridge_transfer id)kSecClass];

    [queryPublicKey setObject:publicTag forKey:(__bridge_transfer id)kSecAttrApplicationTag];
    [queryPublicKey setObject:(__bridge_transfer id)kSecAttrKeyTypeRSA forKey:(__bridge_transfer id)kSecAttrKeyType];
    [queryPublicKey setObject:[NSNumber numberWithBool:YES] forKey:(__bridge_transfer id)kSecReturnData];

    // Get the key bits.
    sanityCheck = SecItemCopyMatching((__bridge_retained CFDictionaryRef)queryPublicKey, &pk);
    if (sanityCheck != noErr)
    {
        publicKeyBits = nil;
    }
    publicKeyBits = (__bridge_transfer NSData*)pk;
    NSLog(@"public bits %@",publicKeyBits);

    return publicKeyBits;
}

输出(“公共位”部分(最后一行)始终相同):

2012-07-13 10:39:28.391 [12279:707] begin generating key...
2012-07-13 10:39:39.376 [12279:707] public key <SecKeyRef: 0xeb56e00>
2012-07-13 10:39:39.381 [12279:707] private key <SecKeyRef: 0xeb57800>
2012-07-13 10:39:39.397 [12279:707] public bits <3082010a 02820101 00ea41ec 12780dff 20a55d67 62ec9890 028ed031 eccd1163 5b4bd039 01adffb5 766f37b8 31be8d03 4a41240b 4e127b75 bc4dd8fb 5b404d4d ad18d711 5cf64a04 61c49970 1fef5434 215f80e4 efee8894 1f282f77 8ea5f7e3 35673260 80ee5f80 818d19d3 b7b15e5c f013ad7d 5ff5dd33 b3e57544 de50dc02 f28aa2ae d4b9590a 1e71bd05 79e81fb7 2a9cd592 cf412fe1 db7a89d4 05bd1731 f95f7aae 56ec4171 e9f352ec c26c3c15 05a0e84b 16c5e89d cec8b1a3 24365d4e dcea88a2 92d8c2e6 8f0e9aee e83703bc e66418af aa9dceea 1129f669 cf069b87 edde4cf7 5e313212 80f44e04 d5b5e2db 9e7f26ae 9b8ef8ee 2e177702 18673b1a f125d3c8 d9ddf978 fb020301 0001>

【问题讨论】:

    标签: iphone objective-c ios rsa ios5


    【解决方案1】:

    因此,您的 SecItemDelete 代码无法按预期工作。如果您想删除钥匙串中的所有项目(显然是出于测试目的),您应该查看 AdvancedURLConnections 示例代码中-[Credentials resetCredentials] 方法中的代码。

    https://developer.apple.com/library/ios/#samplecode/AdvancedURLConnections/

    在调试过程中,您可能还会发现 -dumpCredentials 方法很方便。

    所以 SecItemDelete 的问题意味着每次运行应用程序时 SecKeyGeneratePair 都会生成一组新的密钥。这些密钥中的每一个都具有相同的应用程序标记,因此无法确定您在 -getPublicKeyBits: 中的 SecItemCopyMatching 调用返回哪个密钥。事实证明,在当前的系统软件上,您总是取回第一个密钥,因此您总是得到相同的公钥位。

    【讨论】:

      【解决方案2】:

      公钥将有两个分量指数和模数。你可以试试这个

      获取PublickeyBits方法后

      - (NSData *)getPublicKeyExp
      {
      NSData* pk = [self getPublicKeyBits];
      if (pk == NULL) return NULL;
      
      int iterator = 0;
      
      iterator++; // TYPE - bit stream - mod + exp
      [self derEncodingGetSizeFrom:pk at:&iterator]; // Total size
      
      iterator++; // TYPE - bit stream mod
      int mod_size = [self derEncodingGetSizeFrom:pk at:&iterator];
      iterator += mod_size;
      
      iterator++; // TYPE - bit stream exp
      int exp_size = [self derEncodingGetSizeFrom:pk at:&iterator];
      
      return [pk subdataWithRange:NSMakeRange(iterator, exp_size)];
      return pk;
      }
      - (NSData *)getPublicKeyMod
      {
      NSData* pk = [self getPublicKeyBits];
      if (pk == NULL) return NULL;
      
      int iterator = 0;
      
      iterator++; // TYPE - bit stream - mod + exp
      [self derEncodingGetSizeFrom:pk at:&iterator]; // Total size
      
      iterator++; // TYPE - bit stream mod
      int mod_size = [self derEncodingGetSizeFrom:pk at:&iterator];
      
      return [pk subdataWithRange:NSMakeRange(iterator, mod_size)];
      return pk;
      NSLog(@"public size: %d",pk.length);
      }
      
      - (int)derEncodingGetSizeFrom:(NSData*)buf at:(int*)iterator
      {
      const uint8_t* data = [buf bytes];
      int itr = *iterator;
      int num_bytes = 1;
      int ret = 0;
      
      if (data[itr] > 0x80) {
          num_bytes = data[itr] - 0x80;
          itr++;
      }
      
      for (int i = 0 ; i < num_bytes; i++) 
          ret = (ret * 0x100) + data[itr + i];
      
      *iterator = itr + num_bytes;
      return ret;
      }
      

      【讨论】:

      • 生成公钥可以使用这个链接Public
      • 感谢您的努力,但这并不能解决问题:公钥位保持不变,因此对于您的函数,指数和模数也将保持不变。
      • 我没明白你是否尝试使用该链接