2 * Copyright (c) 2016 Apple Inc. All Rights Reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
21 * @APPLE_LICENSE_HEADER_END@
26 #include <AssertMacros.h>
28 #import <Foundation/Foundation.h>
32 #include <utilities/SecDb.h>
33 #include <securityd/SecDbItem.h>
34 #include <securityd/SecItemSchema.h>
36 #import <CloudKit/CloudKit.h>
37 #import <CloudKit/CloudKit_Private.h>
39 @implementation CKKSItem
41 - (instancetype) initWithCKRecord: (CKRecord*) record {
42 if(self = [super initWithCKRecord: record]) {
47 - (instancetype) initCopyingCKKSItem: (CKKSItem*) item {
48 if(self = [super initWithCKRecordType: item.ckRecordType encodedCKRecord:item.encodedCKRecord zoneID:item.zoneID]) {
50 _parentKeyUUID = item.parentKeyUUID;
51 _generationCount = item.generationCount;
52 _encitem = item.encitem;
53 _wrappedkey = item.wrappedkey;
54 _encver = item.encver;
56 _plaintextPCSServiceIdentifier = item.plaintextPCSServiceIdentifier;
57 _plaintextPCSPublicKey = item.plaintextPCSPublicKey;
58 _plaintextPCSPublicIdentity = item.plaintextPCSPublicIdentity;
63 - (instancetype) initWithUUID: (NSString*) uuid
64 parentKeyUUID: (NSString*) parentKeyUUID
65 zoneID: (CKRecordZoneID*) zoneID
67 return [self initWithUUID:uuid
68 parentKeyUUID:parentKeyUUID
74 encver:CKKSItemEncryptionVersionNone];
77 - (instancetype) initWithUUID: (NSString*) uuid
78 parentKeyUUID: (NSString*) parentKeyUUID
79 zoneID: (CKRecordZoneID*) zoneID
80 encItem: (NSData*) encitem
81 wrappedkey: (CKKSWrappedAESSIVKey*) wrappedkey
82 generationCount: (NSUInteger) genCount
83 encver: (NSUInteger) encver
85 return [self initWithUUID:uuid
86 parentKeyUUID:parentKeyUUID
91 generationCount:genCount
95 - (instancetype) initWithUUID: (NSString*) uuid
96 parentKeyUUID: (NSString*) parentKeyUUID
97 zoneID: (CKRecordZoneID*)zoneID
98 encodedCKRecord: (NSData*) encodedrecord
99 encItem: (NSData*) encitem
100 wrappedkey: (CKKSWrappedAESSIVKey*) wrappedkey
101 generationCount: (NSUInteger) genCount
102 encver: (NSUInteger) encver
104 return [self initWithUUID:uuid
105 parentKeyUUID:parentKeyUUID
107 encodedCKRecord:encodedrecord
109 wrappedkey:wrappedkey
110 generationCount:genCount
112 plaintextPCSServiceIdentifier:nil
113 plaintextPCSPublicKey:nil
114 plaintextPCSPublicIdentity:nil];
117 - (instancetype) initWithUUID: (NSString*) uuid
118 parentKeyUUID: (NSString*) parentKeyUUID
119 zoneID: (CKRecordZoneID*)zoneID
120 encodedCKRecord: (NSData*) encodedrecord
121 encItem: (NSData*) encitem
122 wrappedkey: (CKKSWrappedAESSIVKey*) wrappedkey
123 generationCount: (NSUInteger) genCount
124 encver: (NSUInteger) encver
125 plaintextPCSServiceIdentifier: (NSNumber*) pcsServiceIdentifier
126 plaintextPCSPublicKey: (NSData*) pcsPublicKey
127 plaintextPCSPublicIdentity: (NSData*) pcsPublicIdentity
129 if(self = [super initWithCKRecordType: SecCKRecordItemType encodedCKRecord:encodedrecord zoneID:zoneID]) {
131 _parentKeyUUID = parentKeyUUID;
132 _generationCount = genCount;
133 self.encitem = encitem;
134 _wrappedkey = wrappedkey;
137 _plaintextPCSServiceIdentifier = pcsServiceIdentifier;
138 _plaintextPCSPublicKey = pcsPublicKey;
139 _plaintextPCSPublicIdentity = pcsPublicIdentity;
145 - (BOOL)isEqual: (id) object {
146 if(![object isKindOfClass:[CKKSItem class]]) {
150 CKKSItem* obj = (CKKSItem*) object;
152 return ([self.uuid isEqual: obj.uuid] &&
153 [self.parentKeyUUID isEqual: obj.parentKeyUUID] &&
154 [self.zoneID isEqual: obj.zoneID] &&
155 ((self.encitem == nil && obj.encitem == nil) || ([self.encitem isEqual: obj.encitem])) &&
156 [self.wrappedkey isEqual: obj.wrappedkey] &&
157 self.generationCount == obj.generationCount &&
158 self.encver == obj.encver &&
162 #pragma mark - CKRecord handling
164 - (NSString*) CKRecordName {
168 - (void) setFromCKRecord: (CKRecord*) record {
169 if(![record.recordType isEqual: SecCKRecordItemType]) {
171 exceptionWithName:@"WrongCKRecordTypeException"
172 reason:[NSString stringWithFormat: @"CKRecordType (%@) was not %@", record.recordType, SecCKRecordItemType]
176 [self setStoredCKRecord:record];
178 _uuid = [[record recordID] recordName];
179 self.parentKeyUUID = [record[SecCKRecordParentKeyRefKey] recordID].recordName;
180 self.encitem = record[SecCKRecordDataKey];
181 self.wrappedkey = [[CKKSWrappedAESSIVKey alloc] initWithBase64: record[SecCKRecordWrappedKeyKey]];
182 self.generationCount = [record[SecCKRecordGenerationCountKey] unsignedIntegerValue];
183 self.encver = [record[SecCKRecordEncryptionVersionKey] unsignedIntegerValue];
185 self.plaintextPCSServiceIdentifier = record[SecCKRecordPCSServiceIdentifier];
186 self.plaintextPCSPublicKey = record[SecCKRecordPCSPublicKey];
187 self.plaintextPCSPublicIdentity = record[SecCKRecordPCSPublicIdentity];
190 + (void)setOSVersionInRecord: (CKRecord*) record {
191 record[SecCKRecordHostOSVersionKey] = SecCKKSHostOSVersion();
194 - (CKRecord*) updateCKRecord: (CKRecord*) record zoneID: (CKRecordZoneID*) zoneID {
195 if(![record.recordType isEqual: SecCKRecordItemType]) {
197 exceptionWithName:@"WrongCKRecordTypeException"
198 reason:[NSString stringWithFormat: @"CKRecordType (%@) was not %@", record.recordType, SecCKRecordItemType]
202 // Items must have a wrapping key.
203 record[SecCKRecordParentKeyRefKey] = [[CKReference alloc] initWithRecordID: [[CKRecordID alloc] initWithRecordName: self.parentKeyUUID zoneID: zoneID] action: CKReferenceActionValidate];
205 [CKKSItem setOSVersionInRecord: record];
207 record[SecCKRecordDataKey] = self.encitem;
208 record[SecCKRecordWrappedKeyKey] = [self.wrappedkey base64WrappedKey];
209 record[SecCKRecordGenerationCountKey] = [NSNumber numberWithInteger:self.generationCount];
210 // TODO: if the record's generation count is already higher than ours, that's a problem.
211 record[SecCKRecordEncryptionVersionKey] = [NSNumber numberWithInteger:self.encver];
213 // Add unencrypted fields
214 record[SecCKRecordPCSServiceIdentifier] = self.plaintextPCSServiceIdentifier;
215 record[SecCKRecordPCSPublicKey] = self.plaintextPCSPublicKey;
216 record[SecCKRecordPCSPublicIdentity] = self.plaintextPCSPublicIdentity;
222 - (bool) matchesCKRecord: (CKRecord*) record {
223 if(![record.recordType isEqual: SecCKRecordItemType]) {
227 // We only really care about the data, the wrapped key, the generation count, and the parent key.
228 // Note that since all of those things are included as authenticated data into the AES-SIV ciphertext, we could just
229 // compare that. However, check 'em all.
230 if(![record.recordID.recordName isEqualToString: self.uuid]) {
231 secinfo("ckksitem", "UUID does not match");
235 if(![[record[SecCKRecordParentKeyRefKey] recordID].recordName isEqualToString: self.parentKeyUUID]) {
236 secinfo("ckksitem", "wrapping key reference does not match");
240 if(![record[SecCKRecordGenerationCountKey] isEqual: [NSNumber numberWithInteger:self.generationCount]]) {
241 secinfo("ckksitem", "SecCKRecordGenerationCountKey does not match");
245 if(![record[SecCKRecordWrappedKeyKey] isEqual: [self.wrappedkey base64WrappedKey]]) {
246 secinfo("ckksitem", "SecCKRecordWrappedKeyKey does not match");
250 if(![record[SecCKRecordDataKey] isEqual: self.encitem]) {
251 secinfo("ckksitem", "SecCKRecordDataKey does not match");
255 // Compare plaintext records, too
256 // Why is obj-c nullable equality so difficult?
257 if(!((record[SecCKRecordPCSServiceIdentifier] == nil && self.plaintextPCSServiceIdentifier == nil) ||
258 [record[SecCKRecordPCSServiceIdentifier] isEqual: self.plaintextPCSServiceIdentifier])) {
259 secinfo("ckksitem", "SecCKRecordPCSServiceIdentifier does not match");
263 if(!((record[SecCKRecordPCSPublicKey] == nil && self.plaintextPCSPublicKey == nil) ||
264 [record[SecCKRecordPCSPublicKey] isEqual: self.plaintextPCSPublicKey])) {
265 secinfo("ckksitem", "SecCKRecordPCSPublicKey does not match");
269 if(!((record[SecCKRecordPCSPublicIdentity] == nil && self.plaintextPCSPublicIdentity == nil) ||
270 [record[SecCKRecordPCSPublicIdentity] isEqual: self.plaintextPCSPublicIdentity])) {
271 secinfo("ckksitem", "SecCKRecordPCSPublicIdentity does not match");
278 // Generates the list of 'authenticated data' to go along with this item, and optionally adds in unknown, future fields received from CloudKit
279 - (NSDictionary<NSString*, NSData*>*)makeAuthenticatedDataDictionaryUpdatingCKKSItem:(CKKSItem*) olditem encryptionVersion:(SecCKKSItemEncryptionVersion)encversion {
281 case CKKSItemEncryptionVersion1:
282 return [self makeAuthenticatedDataDictionaryUpdatingCKKSItemEncVer1];
283 case CKKSItemEncryptionVersion2:
284 return [self makeAuthenticatedDataDictionaryUpdatingCKKSItemEncVer2:olditem];
287 exceptionWithName:@"WrongEncryptionVersionException"
288 reason:[NSString stringWithFormat: @"%d is not a known encryption version", (int)encversion]
293 - (NSDictionary<NSString*, NSData*>*)makeAuthenticatedDataDictionaryUpdatingCKKSItemEncVer1 {
294 NSMutableDictionary<NSString*, NSData*>* authenticatedData = [[NSMutableDictionary alloc] init];
296 authenticatedData[@"UUID"] = [self.uuid dataUsingEncoding: NSUTF8StringEncoding];
297 authenticatedData[SecCKRecordWrappedKeyKey] = [self.parentKeyUUID dataUsingEncoding: NSUTF8StringEncoding];
299 uint64_t genCount64 = OSSwapHostToLittleConstInt64(self.generationCount);
300 authenticatedData[SecCKRecordGenerationCountKey] = [NSData dataWithBytes:&genCount64 length:sizeof(genCount64)];
302 uint64_t encver = OSSwapHostToLittleConstInt64((uint64_t)self.encver);
303 authenticatedData[SecCKRecordEncryptionVersionKey] = [NSData dataWithBytes:&encver length:sizeof(encver)];
305 // In v1, don't authenticate the plaintext PCS fields
306 authenticatedData[SecCKRecordPCSServiceIdentifier] = nil;
307 authenticatedData[SecCKRecordPCSPublicKey] = nil;
308 authenticatedData[SecCKRecordPCSPublicIdentity] = nil;
310 return authenticatedData;
313 - (NSDictionary<NSString*, NSData*>*)makeAuthenticatedDataDictionaryUpdatingCKKSItemEncVer2:(CKKSItem*) olditem {
314 NSMutableDictionary<NSString*, NSData*>* authenticatedData = [[NSMutableDictionary alloc] init];
316 authenticatedData[@"UUID"] = [self.uuid dataUsingEncoding: NSUTF8StringEncoding];
317 authenticatedData[SecCKRecordWrappedKeyKey] = [self.parentKeyUUID dataUsingEncoding: NSUTF8StringEncoding];
319 uint64_t genCount64 = OSSwapHostToLittleConstInt64(self.generationCount);
320 authenticatedData[SecCKRecordGenerationCountKey] = [NSData dataWithBytes:&genCount64 length:sizeof(genCount64)];
322 uint64_t encver = OSSwapHostToLittleConstInt64((uint64_t)self.encver);
323 authenticatedData[SecCKRecordEncryptionVersionKey] = [NSData dataWithBytes:&encver length:sizeof(encver)];
325 // v2 authenticates the PCS fields too
326 if(self.plaintextPCSServiceIdentifier) {
327 uint64_t pcsServiceIdentifier = OSSwapHostToLittleConstInt64([self.plaintextPCSServiceIdentifier unsignedLongValue]);
328 authenticatedData[SecCKRecordPCSServiceIdentifier] = [NSData dataWithBytes:&pcsServiceIdentifier length:sizeof(pcsServiceIdentifier)];
330 authenticatedData[SecCKRecordPCSPublicKey] = self.plaintextPCSPublicKey;
331 authenticatedData[SecCKRecordPCSPublicIdentity] = self.plaintextPCSPublicIdentity;
333 // Iterate through the fields in the old CKKSItem. If we don't recognize any of them, add them to the authenticated data.
335 CKRecord* record = olditem.storedCKRecord;
337 for(NSString* key in record.allKeys) {
338 if([key isEqualToString:@"UUID"] ||
339 [key isEqualToString:SecCKRecordHostOSVersionKey] ||
340 [key isEqualToString:SecCKRecordDataKey] ||
341 [key isEqualToString:SecCKRecordWrappedKeyKey] ||
342 [key isEqualToString:SecCKRecordGenerationCountKey] ||
343 [key isEqualToString:SecCKRecordEncryptionVersionKey] ||
344 [key isEqualToString:SecCKRecordPCSServiceIdentifier] ||
345 [key isEqualToString:SecCKRecordPCSPublicKey] ||
346 [key isEqualToString:SecCKRecordPCSPublicIdentity]) {
347 // This version of CKKS knows about this data field. Ignore them with prejudice.
351 if([key hasPrefix:@"server_"]) {
352 // Ignore all fields prefixed by "server_"
356 id obj = record[key];
358 // Skip CKReferences, NSArray, CLLocation, and CKAsset.
359 if([obj isKindOfClass: [NSString class]]) {
361 authenticatedData[key] = [obj dataUsingEncoding: NSUTF8StringEncoding];
362 } else if([obj isKindOfClass: [NSData class]]) {
364 authenticatedData[key] = [obj copy];
365 } else if([obj isKindOfClass:[NSDate class]]) {
367 NSISO8601DateFormatter *formatter = [[NSISO8601DateFormatter alloc] init];
368 NSString* str = [formatter stringForObjectValue: obj];
370 authenticatedData[key] = [str dataUsingEncoding: NSUTF8StringEncoding];
371 } else if([obj isKindOfClass: [NSNumber class]]) {
373 uint64_t n64 = OSSwapHostToLittleConstInt64([obj unsignedLongLongValue]);
374 authenticatedData[key] = [NSData dataWithBytes:&n64 length:sizeof(n64)];
381 // TODO: add unauth'ed field name here
383 return authenticatedData;
386 #pragma mark - Utility
388 - (NSString*)description {
389 return [NSString stringWithFormat: @"<%@: %@>", NSStringFromClass([self class]), self.uuid];
392 - (NSString*)debugDescription {
393 return [NSString stringWithFormat: @"<%@: %@ %p>", NSStringFromClass([self class]), self.uuid, self];
396 - (instancetype)copyWithZone:(NSZone *)zone {
397 CKKSItem *itemCopy = [super copyWithZone:zone];
398 itemCopy->_uuid = _uuid;
399 itemCopy->_parentKeyUUID = _parentKeyUUID;
400 itemCopy->_encitem = _encitem;
401 itemCopy->_wrappedkey = _wrappedkey;
402 itemCopy->_generationCount = _generationCount;
403 itemCopy->_encver = _encver;
407 #pragma mark - Getters/Setters
409 - (NSString*) base64Item {
410 return [self.encitem base64EncodedStringWithOptions:0];
413 - (void) setBase64Item: (NSString*) base64Item {
414 _encitem = [[NSData alloc] initWithBase64EncodedString: base64Item options:0];
417 #pragma mark - CKKSSQLDatabaseObject helpers
419 // Note that CKKSItems are not intended to be saved directly, and so CKKSItem does not implement sqlTable.
420 // You must subclass CKKSItem to have this work correctly, although you can call back up into this class to use these if you like.
422 + (NSArray<NSString*>*)sqlColumns {
423 return @[@"UUID", @"parentKeyUUID", @"ckzone", @"encitem", @"wrappedkey", @"gencount", @"encver", @"ckrecord",
424 @"pcss", @"pcsk", @"pcsi"];
427 - (NSDictionary<NSString*,NSString*>*)whereClauseToFindSelf {
428 return @{@"UUID": self.uuid, @"ckzone":self.zoneID.zoneName};
431 - (NSDictionary<NSString*,id>*)sqlValues {
432 return @{@"UUID": self.uuid,
433 @"parentKeyUUID": self.parentKeyUUID,
434 @"ckzone": CKKSNilToNSNull(self.zoneID.zoneName),
435 @"encitem": self.base64encitem,
436 @"wrappedkey": [self.wrappedkey base64WrappedKey],
437 @"gencount": [NSNumber numberWithInteger:self.generationCount],
438 @"encver": [NSNumber numberWithInteger:self.encver],
439 @"ckrecord": CKKSNilToNSNull([self.encodedCKRecord base64EncodedStringWithOptions:0]),
440 @"pcss": CKKSNilToNSNull(self.plaintextPCSServiceIdentifier),
441 @"pcsk": CKKSNilToNSNull([self.plaintextPCSPublicKey base64EncodedStringWithOptions:0]),
442 @"pcsi": CKKSNilToNSNull([self.plaintextPCSPublicIdentity base64EncodedStringWithOptions:0])};
445 + (instancetype)fromDatabaseRow: (NSDictionary*) row {
446 return [[CKKSItem alloc] initWithUUID:row[@"UUID"]
447 parentKeyUUID:row[@"parentKeyUUID"]
448 zoneID:[[CKRecordZoneID alloc] initWithZoneName: row[@"ckzone"] ownerName:CKCurrentUserDefaultName]
449 encodedCKRecord:CKKSUnbase64NullableString(row[@"ckrecord"])
450 encItem:CKKSUnbase64NullableString(row[@"encitem"])
451 wrappedkey:CKKSIsNull(row[@"wrappedkey"]) ? nil : [[CKKSWrappedAESSIVKey alloc] initWithBase64: row[@"wrappedkey"]]
452 generationCount:[row[@"gencount"] integerValue]
453 encver:[row[@"encver"] integerValue]
454 plaintextPCSServiceIdentifier:CKKSIsNull(row[@"pcss"]) ? nil : [NSNumber numberWithInteger: [row[@"pcss"] integerValue]]
455 plaintextPCSPublicKey:CKKSUnbase64NullableString(row[@"pcsk"])
456 plaintextPCSPublicIdentity:CKKSUnbase64NullableString(row[@"pcsi"])
462 #pragma mark - CK-Aware Database Helpers
464 @implementation CKKSSQLDatabaseObject (CKKSZoneExtras)
466 + (NSArray<NSString*>*)allUUIDs:(CKRecordZoneID*)zoneID error:(NSError * __autoreleasing *)error {
467 __block NSMutableArray* uuids = [[NSMutableArray alloc] init];
469 [CKKSSQLDatabaseObject queryDatabaseTable: [self sqlTable]
470 where:@{@"ckzone": CKKSNilToNSNull(zoneID.zoneName)}
475 processRow: ^(NSDictionary* row) {
476 [uuids addObject: row[@"UUID"]];
482 + (NSArray*) all:(CKRecordZoneID*) zoneID error: (NSError * __autoreleasing *) error {
483 return [self allWhere: @{@"ckzone": CKKSNilToNSNull(zoneID.zoneName)} error:error];
486 + (bool) deleteAll:(CKRecordZoneID*) zoneID error: (NSError * __autoreleasing *) error {
487 bool ok = [CKKSSQLDatabaseObject deleteFromTable:[self sqlTable] where: @{@"ckzone":CKKSNilToNSNull(zoneID.zoneName)} connection:nil error: error];
490 secdebug("ckksitem", "Deleted all %@", self);
492 secdebug("ckksitem", "Couldn't delete all %@: %@", self, error ? *error : @"unknown");