博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
iOS之钥匙串加密解密
阅读量:4710 次
发布时间:2019-06-10

本文共 15346 字,大约阅读时间需要 51 分钟。

哈哈哈哈? ------------- 大哥原创

请多多指教 .....................................................


 

注意:不需要看这里面的代码实现

KeychainItemWrapper.h

#import 
/* The KeychainItemWrapper class is an abstraction layer for the iPhone Keychain communication. It is merely a simple wrapper to provide a distinct barrier between all the idiosyncracies involved with the Keychain CF/NS container objects.*/@interface KeychainItemWrapper : NSObject{ NSMutableDictionary *keychainItemData; // The actual keychain item data backing store. NSMutableDictionary *genericPasswordQuery; // A placeholder for the generic keychain item query used to locate the item.}@property (nonatomic, retain) NSMutableDictionary *keychainItemData;@property (nonatomic, retain) NSMutableDictionary *genericPasswordQuery;// Designated initializer.- (id)initWithIdentifier: (NSString *)identifier accessGroup:(NSString *) accessGroup;- (void)setObject:(id)inObject forKey:(id)key;- (id)objectForKey:(id)key;// Initializes and resets the default generic keychain item data.- (void)resetKeychainItem;@end

KeychainItemWrapper.m

/*     File: KeychainItemWrapper.m  Abstract:  Objective-C wrapper for accessing a single keychain item.    Version: 1.2    Disclaimer: IMPORTANT:  This Apple software is supplied to you by Apple  Inc. ("Apple") in consideration of your agreement to the following  terms, and your use, installation, modification or redistribution of  this Apple software constitutes acceptance of these terms.  If you do  not agree with these terms, please do not use, install, modify or  redistribute this Apple software.    In consideration of your agreement to abide by the following terms, and  subject to these terms, Apple grants you a personal, non-exclusive  license, under Apple's copyrights in this original Apple software (the  "Apple Software"), to use, reproduce, modify and redistribute the Apple  Software, with or without modifications, in source and/or binary forms;  provided that if you redistribute the Apple Software in its entirety and  without modifications, you must retain this notice and the following  text and disclaimers in all such redistributions of the Apple Software.  Neither the name, trademarks, service marks or logos of Apple Inc. may  be used to endorse or promote products derived from the Apple Software  without specific prior written permission from Apple.  Except as  expressly stated in this notice, no other rights or licenses, express or  implied, are granted by Apple herein, including but not limited to any  patent rights that may be infringed by your derivative works or by other  works in which the Apple Software may be incorporated.    The Apple Software is provided by Apple on an "AS IS" basis.  APPLE  MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION  THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS  FOR A PARTICULAR PURPOSE, REGARDING THE APPLE SOFTWARE OR ITS USE AND  OPERATION ALONE OR IN COMBINATION WITH YOUR PRODUCTS.    IN NO EVENT SHALL APPLE BE LIABLE FOR ANY SPECIAL, INDIRECT, INCIDENTAL  OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS  INTERRUPTION) ARISING IN ANY WAY OUT OF THE USE, REPRODUCTION,  MODIFICATION AND/OR DISTRIBUTION OF THE APPLE SOFTWARE, HOWEVER CAUSED  AND WHETHER UNDER THEORY OF CONTRACT, TORT (INCLUDING NEGLIGENCE),  STRICT LIABILITY OR OTHERWISE, EVEN IF APPLE HAS BEEN ADVISED OF THE  POSSIBILITY OF SUCH DAMAGE.    Copyright (C) 2010 Apple Inc. All Rights Reserved.   */ #import "KeychainItemWrapper.h"#import 
/*These are the default constants and their respective types,available for the kSecClassGenericPassword Keychain Item class:kSecAttrAccessGroup - CFStringRefkSecAttrCreationDate - CFDateRefkSecAttrModificationDate - CFDateRefkSecAttrDescription - CFStringRefkSecAttrComment - CFStringRefkSecAttrCreator - CFNumberRefkSecAttrType - CFNumberRefkSecAttrLabel - CFStringRefkSecAttrIsInvisible - CFBooleanRefkSecAttrIsNegative - CFBooleanRefkSecAttrAccount - CFStringRefkSecAttrService - CFStringRefkSecAttrGeneric - CFDataRef See the header file Security/SecItem.h for more details.*/@interface KeychainItemWrapper (PrivateMethods)/*The decision behind the following two methods (secItemFormatToDictionary and dictionaryToSecItemFormat) wasto encapsulate the transition between what the detail view controller was expecting (NSString *) and what theKeychain API expects as a validly constructed container class.*/- (NSMutableDictionary *)secItemFormatToDictionary:(NSDictionary *)dictionaryToConvert;- (NSMutableDictionary *)dictionaryToSecItemFormat:(NSDictionary *)dictionaryToConvert;// Updates the item in the keychain, or adds it if it doesn't exist.- (void)writeToKeychain;@end@implementation KeychainItemWrapper@synthesize keychainItemData, genericPasswordQuery;- (id)initWithIdentifier: (NSString *)identifier accessGroup:(NSString *) accessGroup;{ if (self = [super init]) { // Begin Keychain search setup. The genericPasswordQuery leverages the special user // defined attribute kSecAttrGeneric to distinguish itself between other generic Keychain // items which may be included by the same application. genericPasswordQuery = [[NSMutableDictionary alloc] init]; [genericPasswordQuery setObject:(id)kSecClassGenericPassword forKey:(id)kSecClass]; [genericPasswordQuery setObject:identifier forKey:(id)kSecAttrGeneric]; // The keychain access group attribute determines if this item can be shared // amongst multiple apps whose code signing entitlements contain the same keychain access group. if (accessGroup != nil) {#if TARGET_IPHONE_SIMULATOR // Ignore the access group if running on the iPhone simulator. // // Apps that are built for the simulator aren't signed, so there's no keychain access group // for the simulator to check. This means that all apps can see all keychain items when run // on the simulator. // // If a SecItem contains an access group attribute, SecItemAdd and SecItemUpdate on the // simulator will return -25243 (errSecNoAccessForItem).#else [genericPasswordQuery setObject:accessGroup forKey:(id)kSecAttrAccessGroup];#endif } // Use the proper search constants, return only the attributes of the first match. [genericPasswordQuery setObject:(id)kSecMatchLimitOne forKey:(id)kSecMatchLimit]; [genericPasswordQuery setObject:(id)kCFBooleanTrue forKey:(id)kSecReturnAttributes]; NSDictionary *tempQuery = [NSDictionary dictionaryWithDictionary:genericPasswordQuery]; NSMutableDictionary *outDictionary = nil; if (! SecItemCopyMatching((CFDictionaryRef)tempQuery, (CFTypeRef *)&outDictionary) == noErr) { // Stick these default values into keychain item if nothing found. [self resetKeychainItem]; // Add the generic attribute and the keychain access group. [keychainItemData setObject:identifier forKey:(id)kSecAttrGeneric]; if (accessGroup != nil) {#if TARGET_IPHONE_SIMULATOR // Ignore the access group if running on the iPhone simulator. // // Apps that are built for the simulator aren't signed, so there's no keychain access group // for the simulator to check. This means that all apps can see all keychain items when run // on the simulator. // // If a SecItem contains an access group attribute, SecItemAdd and SecItemUpdate on the // simulator will return -25243 (errSecNoAccessForItem).#else [keychainItemData setObject:accessGroup forKey:(id)kSecAttrAccessGroup];#endif } } else { // load the saved data from Keychain. self.keychainItemData = [self secItemFormatToDictionary:outDictionary]; } [outDictionary release]; } return self;}- (void)dealloc{ [keychainItemData release]; [genericPasswordQuery release]; [super dealloc];}- (void)setObject:(id)inObject forKey:(id)key { if (inObject == nil) return; id currentObject = [keychainItemData objectForKey:key]; if (![currentObject isEqual:inObject]) { [keychainItemData setObject:inObject forKey:key]; [self writeToKeychain]; }}- (id)objectForKey:(id)key{ return [keychainItemData objectForKey:key];}- (void)resetKeychainItem{ OSStatus junk = noErr; if (!keychainItemData) { self.keychainItemData = [[NSMutableDictionary alloc] init]; } else if (keychainItemData) { NSMutableDictionary *tempDictionary = [self dictionaryToSecItemFormat:keychainItemData]; junk = SecItemDelete((CFDictionaryRef)tempDictionary); NSAssert( junk == noErr || junk == errSecItemNotFound, @"Problem deleting current dictionary." ); } // Default attributes for keychain item. [keychainItemData setObject:@"" forKey:(id)kSecAttrAccount]; [keychainItemData setObject:@"" forKey:(id)kSecAttrLabel]; [keychainItemData setObject:@"" forKey:(id)kSecAttrDescription]; // Default data for keychain item. [keychainItemData setObject:@"" forKey:(id)kSecValueData];}- (NSMutableDictionary *)dictionaryToSecItemFormat:(NSDictionary *)dictionaryToConvert{ // The assumption is that this method will be called with a properly populated dictionary // containing all the right key/value pairs for a SecItem. // Create a dictionary to return populated with the attributes and data. NSMutableDictionary *returnDictionary = [NSMutableDictionary dictionaryWithDictionary:dictionaryToConvert]; // Add the Generic Password keychain item class attribute. [returnDictionary setObject:(id)kSecClassGenericPassword forKey:(id)kSecClass]; // Convert the NSString to NSData to meet the requirements for the value type kSecValueData. // This is where to store sensitive data that should be encrypted. NSString *passwordString = [dictionaryToConvert objectForKey:(id)kSecValueData]; [returnDictionary setObject:[passwordString dataUsingEncoding:NSUTF8StringEncoding] forKey:(id)kSecValueData]; return returnDictionary;}- (NSMutableDictionary *)secItemFormatToDictionary:(NSDictionary *)dictionaryToConvert{ // The assumption is that this method will be called with a properly populated dictionary // containing all the right key/value pairs for the UI element. // Create a dictionary to return populated with the attributes and data. NSMutableDictionary *returnDictionary = [NSMutableDictionary dictionaryWithDictionary:dictionaryToConvert]; // Add the proper search key and class attribute. [returnDictionary setObject:(id)kCFBooleanTrue forKey:(id)kSecReturnData]; [returnDictionary setObject:(id)kSecClassGenericPassword forKey:(id)kSecClass]; // Acquire the password data from the attributes. NSData *passwordData = NULL; if (SecItemCopyMatching((CFDictionaryRef)returnDictionary, (CFTypeRef *)&passwordData) == noErr) { // Remove the search, class, and identifier key/value, we don't need them anymore. [returnDictionary removeObjectForKey:(id)kSecReturnData]; // Add the password to the dictionary, converting from NSData to NSString. NSString *password = [[[NSString alloc] initWithBytes:[passwordData bytes] length:[passwordData length] encoding:NSUTF8StringEncoding] autorelease]; [returnDictionary setObject:password forKey:(id)kSecValueData]; } else { // Don't do anything if nothing is found. NSAssert(NO, @"Serious error, no matching item found in the keychain.\n"); } [passwordData release]; return returnDictionary;}- (void)writeToKeychain{ NSDictionary *attributes = NULL; NSMutableDictionary *updateItem = NULL; OSStatus result; if (SecItemCopyMatching((CFDictionaryRef)genericPasswordQuery, (CFTypeRef *)&attributes) == noErr) { // First we need the attributes from the Keychain. updateItem = [NSMutableDictionary dictionaryWithDictionary:attributes]; // Second we need to add the appropriate search key/values. [updateItem setObject:[genericPasswordQuery objectForKey:(id)kSecClass] forKey:(id)kSecClass]; // Lastly, we need to set up the updated attribute list being careful to remove the class. NSMutableDictionary *tempCheck = [self dictionaryToSecItemFormat:keychainItemData]; [tempCheck removeObjectForKey:(id)kSecClass]; #if TARGET_IPHONE_SIMULATOR // Remove the access group if running on the iPhone simulator. // // Apps that are built for the simulator aren't signed, so there's no keychain access group // for the simulator to check. This means that all apps can see all keychain items when run // on the simulator. // // If a SecItem contains an access group attribute, SecItemAdd and SecItemUpdate on the // simulator will return -25243 (errSecNoAccessForItem). // // The access group attribute will be included in items returned by SecItemCopyMatching, // which is why we need to remove it before updating the item. [tempCheck removeObjectForKey:(id)kSecAttrAccessGroup];#endif // An implicit assumption is that you can only update a single item at a time. result = SecItemUpdate((CFDictionaryRef)updateItem, (CFDictionaryRef)tempCheck); NSAssert( result == noErr, @"Couldn't update the Keychain Item." ); } else { // No previous item found; add the new one. result = SecItemAdd((CFDictionaryRef)[self dictionaryToSecItemFormat:keychainItemData], NULL); NSAssert( result == noErr, @"Couldn't add the Keychain Item." ); }}@en

ViewController.m
////  ViewController.m//  钥匙串加密解密////  Created by dllo on 16/1/12.//  Copyright © 2016年 HaiTeng. All rights reserved.//#import "ViewController.h"#import "KeychainItemWrapper.h"@interface ViewController ()@end@implementation ViewController- (void)viewDidLoad {    [super viewDidLoad];    self.view.backgroundColor = [UIColor orangeColor];        //钥匙串加密解密: (通常就是本地,不是和服务器进行交流的)        //本地的,不是很常用,它不和服务器交流**/    KeychainItemWrapper *wrapper = [[KeychainItemWrapper alloc] initWithIdentifier:@"shain" accessGroup:nil];        //钥匙串加密用户名    [wrapper setObject:@"w583267034" forKey:(id)kSecAttrAccount];    //加密密码    [wrapper setObject:@"wanghiateng504" forKey:(id)kSecValueData];        //解密过程    NSString *userName = [wrapper objectForKey:(id)kSecAttrAccount];    NSLog(@"%@",userName);        NSString *userPass = [wrapper objectForKey:(id)kSecValueData];    NSLog(@"%@",userPass);}@end

 

转载于:https://www.cnblogs.com/HaiTeng/p/5324107.html

你可能感兴趣的文章
使用闭包构建模块
查看>>
[转]OpenGL学习入门之VS2010环境配置
查看>>
UWP开发:自动生成迷宫&自动寻路算法(2)
查看>>
熊二周刊--20160925
查看>>
Activiti源码分析
查看>>
c程序设计语言_习题8-6_利用malloc()函数,重新实现c语言的库函数calloc()
查看>>
Docker相关概念
查看>>
wordclock中文模式快一个小时怎么调整
查看>>
缓冲区溢出实战教程系列(二):dev c++编译汇编代码
查看>>
娓娓道来c指针 (3)指针和数组
查看>>
关于js基础easy忘记的那些事儿
查看>>
(String)、toString、String.valueOf用法区别(转)
查看>>
rpm命令安装软件
查看>>
oracle相关操作,存储、临时表空间、用户操作、启动过程
查看>>
Python 2.基础
查看>>
使用命令行连接本地mySql数据库的若干方法
查看>>
PHP 微信分享
查看>>
给所有的Control加两个属性,实现回车键自动跳转到下一个控件
查看>>
使用正则表达式,取得点击次数,函数抽离
查看>>
数据库设计——评论回复功能
查看>>