| /* |
| * Copyright (C) 2014-2018 Apple Inc. All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * |
| * THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS'' |
| * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, |
| * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
| * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS |
| * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
| * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
| * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
| * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
| * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
| * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF |
| * THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| #include "config.h" |
| #include "SerializedCryptoKeyWrap.h" |
| |
| #if ENABLE(WEB_CRYPTO) |
| |
| #include "CommonCryptoUtilities.h" |
| #include "LocalizedStrings.h" |
| #include <CommonCrypto/CommonSymmetricKeywrap.h> |
| #include <crt_externs.h> |
| #include <wtf/spi/cocoa/SecuritySPI.h> |
| #include <wtf/text/Base64.h> |
| #include <wtf/text/CString.h> |
| #include <wtf/CryptographicUtilities.h> |
| #include <wtf/ProcessPrivilege.h> |
| #include <wtf/RetainPtr.h> |
| |
| #if PLATFORM(IOS_FAMILY) |
| #define USE_KEYCHAIN_ACCESS_CONTROL_LISTS 0 |
| #else |
| #define USE_KEYCHAIN_ACCESS_CONTROL_LISTS 1 |
| #endif |
| |
| #if USE(KEYCHAIN_ACCESS_CONTROL_LISTS) |
| #include <wtf/cf/TypeCastsCF.h> |
| WTF_DECLARE_CF_TYPE_TRAIT(SecACL); |
| #endif |
| |
| namespace WebCore { |
| |
| const NSUInteger currentSerializationVersion = 1; |
| |
| const NSString* versionKey = @"version"; |
| const NSString* wrappedKEKKey = @"wrappedKEK"; |
| const NSString* encryptedKeyKey = @"encryptedKey"; |
| const NSString* tagKey = @"tag"; |
| |
| const size_t masterKeySizeInBytes = 16; |
| |
| inline Vector<uint8_t> vectorFromNSData(NSData* data) |
| { |
| Vector<uint8_t> result; |
| result.append((const uint8_t*)[data bytes], [data length]); |
| return result; |
| } |
| |
| static NSString* masterKeyAccountNameForCurrentApplication() |
| { |
| #if PLATFORM(IOS_FAMILY) |
| NSString *bundleIdentifier = [[NSBundle mainBundle] bundleIdentifier]; |
| #else |
| NSString *bundleIdentifier = [[NSRunningApplication currentApplication] bundleIdentifier]; |
| #endif |
| if (!bundleIdentifier) |
| bundleIdentifier = [NSString stringWithCString:*_NSGetProgname() encoding:NSASCIIStringEncoding]; |
| return [NSString stringWithFormat:@"com.apple.WebKit.WebCrypto.master+%@", bundleIdentifier]; |
| } |
| |
| static bool createAndStoreMasterKey(Vector<uint8_t>& masterKeyData) |
| { |
| RELEASE_ASSERT(hasProcessPrivilege(ProcessPrivilege::CanAccessCredentials)); |
| |
| masterKeyData.resize(masterKeySizeInBytes); |
| auto rc = CCRandomGenerateBytes(masterKeyData.data(), masterKeyData.size()); |
| RELEASE_ASSERT(rc == kCCSuccess); |
| |
| #if PLATFORM(IOS_FAMILY) |
| NSBundle *mainBundle = [NSBundle mainBundle]; |
| NSString *applicationName = [mainBundle objectForInfoDictionaryKey:@"CFBundleDisplayName"]; |
| if (!applicationName) |
| applicationName = [mainBundle objectForInfoDictionaryKey:(NSString *)kCFBundleNameKey]; |
| if (!applicationName) |
| applicationName = [mainBundle bundleIdentifier]; |
| NSString *localizedItemName = webCryptoMasterKeyKeychainLabel(applicationName); |
| #else |
| NSString *localizedItemName = webCryptoMasterKeyKeychainLabel([[NSRunningApplication currentApplication] localizedName]); |
| #endif |
| |
| OSStatus status; |
| |
| #if USE(KEYCHAIN_ACCESS_CONTROL_LISTS) |
| SecAccessRef accessRef; |
| status = SecAccessCreate((__bridge CFStringRef)localizedItemName, nullptr, &accessRef); |
| if (status) { |
| WTFLogAlways("Cannot create a security access object for storing WebCrypto master key, error %d", (int)status); |
| return false; |
| } |
| RetainPtr<SecAccessRef> access = adoptCF(accessRef); |
| |
| RetainPtr<CFArrayRef> acls = adoptCF(SecAccessCopyMatchingACLList(accessRef, kSecACLAuthorizationExportClear)); |
| SecACLRef acl = checked_cf_cast<SecACLRef>(CFArrayGetValueAtIndex(acls.get(), 0)); |
| |
| SecTrustedApplicationRef trustedAppRef; |
| ALLOW_DEPRECATED_DECLARATIONS_BEGIN |
| status = SecTrustedApplicationCreateFromPath(0, &trustedAppRef); |
| ALLOW_DEPRECATED_DECLARATIONS_END |
| if (status) { |
| WTFLogAlways("Cannot create a trusted application object for storing WebCrypto master key, error %d", (int)status); |
| return false; |
| } |
| RetainPtr<SecTrustedApplicationRef> trustedApp = adoptCF(trustedAppRef); |
| |
| status = SecACLSetContents(acl, (__bridge CFArrayRef)@[ (__bridge id)trustedApp.get() ], (__bridge CFStringRef)localizedItemName, kSecKeychainPromptRequirePassphase); |
| if (status) { |
| WTFLogAlways("Cannot set ACL for WebCrypto master key, error %d", (int)status); |
| return false; |
| } |
| #endif |
| |
| Vector<char> base64EncodedMasterKeyData; |
| base64Encode(masterKeyData, base64EncodedMasterKeyData); |
| |
| // Cannot use kSecClassKey because of <rdar://problem/16068207>. |
| NSDictionary *attributes = @{ |
| (id)kSecClass : (id)kSecClassGenericPassword, |
| (id)kSecAttrSynchronizable : @NO, |
| #if USE(KEYCHAIN_ACCESS_CONTROL_LISTS) |
| (id)kSecAttrAccess : (__bridge id)access.get(), |
| #endif |
| (id)kSecAttrComment : webCryptoMasterKeyKeychainComment(), |
| (id)kSecAttrLabel : localizedItemName, |
| (id)kSecAttrAccount : masterKeyAccountNameForCurrentApplication(), |
| (id)kSecValueData : [NSData dataWithBytes:base64EncodedMasterKeyData.data() length:base64EncodedMasterKeyData.size()], |
| }; |
| |
| status = SecItemAdd((CFDictionaryRef)attributes, nullptr); |
| if (status) { |
| WTFLogAlways("Cannot store WebCrypto master key, error %d", (int)status); |
| return false; |
| } |
| return true; |
| } |
| |
| static bool findMasterKey(Vector<uint8_t>& masterKeyData) |
| { |
| RELEASE_ASSERT(hasProcessPrivilege(ProcessPrivilege::CanAccessCredentials)); |
| |
| NSDictionary *query = @{ |
| (id)kSecClass : (id)kSecClassGenericPassword, |
| (id)kSecAttrAccount : masterKeyAccountNameForCurrentApplication(), |
| (id)kSecReturnData : @YES, |
| }; |
| |
| CFDataRef keyDataRef; |
| OSStatus status = SecItemCopyMatching((CFDictionaryRef)query, (CFTypeRef*)&keyDataRef); |
| if (status) { |
| if (status != errSecItemNotFound && status != errSecUserCanceled) |
| WTFLogAlways("Could not find WebCrypto master key in Keychain, error %d", (int)status); |
| return false; |
| } |
| RetainPtr<CFDataRef> keyData = adoptCF(keyDataRef); |
| |
| Vector<uint8_t> base64EncodedMasterKeyData = vectorFromNSData((__bridge NSData *)keyData.get()); |
| return base64Decode((const char*)base64EncodedMasterKeyData.data(), base64EncodedMasterKeyData.size(), masterKeyData); |
| } |
| |
| bool getDefaultWebCryptoMasterKey(Vector<uint8_t>& masterKey) |
| { |
| if (!findMasterKey(masterKey) && !createAndStoreMasterKey(masterKey)) |
| return false; |
| RELEASE_ASSERT(masterKey.size() == masterKeySizeInBytes); |
| return true; |
| } |
| |
| bool deleteDefaultWebCryptoMasterKey() |
| { |
| RELEASE_ASSERT(hasProcessPrivilege(ProcessPrivilege::CanAccessCredentials)); |
| |
| NSDictionary *query = @{ |
| (id)kSecClass : (id)kSecClassGenericPassword, |
| (id)kSecAttrAccount : masterKeyAccountNameForCurrentApplication(), |
| }; |
| |
| OSStatus status = SecItemDelete((CFDictionaryRef)query); |
| if (status) { |
| if (status != errSecItemNotFound && status != errSecUserCanceled) |
| WTFLogAlways("Could not delete WebCrypto master key in Keychain, error %d", (int)status); |
| return false; |
| } |
| return true; |
| } |
| |
| bool wrapSerializedCryptoKey(const Vector<uint8_t>& masterKey, const Vector<uint8_t>& key, Vector<uint8_t>& result) |
| { |
| Vector<uint8_t> kek(16); |
| auto rc = CCRandomGenerateBytes(kek.data(), kek.size()); |
| RELEASE_ASSERT(rc == kCCSuccess); |
| |
| Vector<uint8_t> wrappedKEK(CCSymmetricWrappedSize(kCCWRAPAES, kek.size())); |
| |
| size_t wrappedKEKSize = wrappedKEK.size(); |
| CCCryptorStatus status = CCSymmetricKeyWrap(kCCWRAPAES, CCrfc3394_iv, CCrfc3394_ivLen, masterKey.data(), masterKey.size(), kek.data(), kek.size(), wrappedKEK.data(), &wrappedKEKSize); |
| if (status != kCCSuccess) |
| return false; |
| |
| wrappedKEK.shrink(wrappedKEKSize); |
| |
| Vector<uint8_t> encryptedKey(key.size()); |
| size_t tagLength = 16; |
| uint8_t tag[tagLength]; |
| |
| ALLOW_DEPRECATED_DECLARATIONS_BEGIN |
| status = CCCryptorGCM(kCCEncrypt, kCCAlgorithmAES128, kek.data(), kek.size(), |
| nullptr, 0, // iv |
| nullptr, 0, // auth data |
| key.data(), key.size(), |
| encryptedKey.data(), |
| tag, &tagLength); |
| ALLOW_DEPRECATED_DECLARATIONS_END |
| |
| if (status != kCCSuccess) |
| return false; |
| RELEASE_ASSERT(tagLength == 16); |
| |
| auto dictionary = @{ |
| versionKey: [NSNumber numberWithUnsignedInteger:currentSerializationVersion], |
| wrappedKEKKey: [NSData dataWithBytes:wrappedKEK.data() length:wrappedKEK.size()], |
| encryptedKeyKey: [NSData dataWithBytes:encryptedKey.data() length:encryptedKey.size()], |
| tagKey: [NSData dataWithBytes:tag length:tagLength] |
| }; |
| |
| NSData* serialization = [NSPropertyListSerialization dataWithPropertyList:dictionary format:NSPropertyListBinaryFormat_v1_0 options:0 error:nullptr]; |
| if (!serialization) |
| return false; |
| |
| result = vectorFromNSData(serialization); |
| return true; |
| } |
| |
| bool unwrapSerializedCryptoKey(const Vector<uint8_t>& masterKey, const Vector<uint8_t>& wrappedKey, Vector<uint8_t>& key) |
| { |
| NSDictionary* dictionary = [NSPropertyListSerialization propertyListWithData:[NSData dataWithBytesNoCopy:(void*)wrappedKey.data() length:wrappedKey.size() freeWhenDone:NO] options:0 format:nullptr error:nullptr]; |
| if (!dictionary) |
| return false; |
| |
| id versionObject = [dictionary objectForKey:versionKey]; |
| if (![versionObject isKindOfClass:[NSNumber class]]) |
| return false; |
| if ([versionObject unsignedIntegerValue] > currentSerializationVersion) |
| return false; |
| |
| id wrappedKEKObject = [dictionary objectForKey:wrappedKEKKey]; |
| if (![wrappedKEKObject isKindOfClass:[NSData class]]) |
| return false; |
| Vector<uint8_t> wrappedKEK = vectorFromNSData(wrappedKEKObject); |
| |
| id encryptedKeyObject = [dictionary objectForKey:encryptedKeyKey]; |
| if (![encryptedKeyObject isKindOfClass:[NSData class]]) |
| return false; |
| Vector<uint8_t> encryptedKey = vectorFromNSData(encryptedKeyObject); |
| |
| id tagObject = [dictionary objectForKey:tagKey]; |
| if (![tagObject isKindOfClass:[NSData class]]) |
| return false; |
| Vector<uint8_t> tag = vectorFromNSData(tagObject); |
| if (tag.size() != 16) |
| return false; |
| |
| Vector<uint8_t> kek(CCSymmetricUnwrappedSize(kCCWRAPAES, wrappedKEK.size())); |
| size_t kekSize = kek.size(); |
| CCCryptorStatus status = CCSymmetricKeyUnwrap(kCCWRAPAES, CCrfc3394_iv, CCrfc3394_ivLen, masterKey.data(), masterKey.size(), wrappedKEK.data(), wrappedKEK.size(), kek.data(), &kekSize); |
| if (status != kCCSuccess) |
| return false; |
| kek.shrink(kekSize); |
| |
| size_t tagLength = 16; |
| uint8_t actualTag[tagLength]; |
| |
| key.resize(encryptedKey.size()); |
| ALLOW_DEPRECATED_DECLARATIONS_BEGIN |
| status = CCCryptorGCM(kCCDecrypt, kCCAlgorithmAES128, kek.data(), kek.size(), |
| nullptr, 0, // iv |
| nullptr, 0, // auth data |
| encryptedKey.data(), encryptedKey.size(), |
| key.data(), |
| actualTag, &tagLength); |
| ALLOW_DEPRECATED_DECLARATIONS_END |
| |
| if (status != kCCSuccess) |
| return false; |
| RELEASE_ASSERT(tagLength == 16); |
| |
| if (constantTimeMemcmp(tag.data(), actualTag, tagLength)) |
| return false; |
| |
| return true; |
| } |
| |
| } |
| |
| #endif // ENABLE(WEB_CRYPTO) |