]> git.saurik.com Git - apple/security.git/blob - keychain/ot/OTPrepareOperation.m
Security-59306.41.2.tar.gz
[apple/security.git] / keychain / ot / OTPrepareOperation.m
1 /*
2 * Copyright (c) 2018 Apple Inc. All Rights Reserved.
3 *
4 * @APPLE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
11 * file.
12 *
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
20 *
21 * @APPLE_LICENSE_HEADER_END@
22 */
23
24 #if OCTAGON
25
26 #import "utilities/debugging.h"
27 #import <Security/SecKey.h>
28 #import <Security/SecKeyPriv.h>
29
30 #import "keychain/ot/OTCuttlefishContext.h"
31 #import "keychain/ot/OTFetchViewsOperation.h"
32 #import "keychain/ot/OTOperationDependencies.h"
33 #import "keychain/ot/OTPrepareOperation.h"
34
35 #import "keychain/TrustedPeersHelper/TrustedPeersHelperProtocol.h"
36 #import "keychain/ot/ObjCImprovements.h"
37
38 @interface OTPrepareOperation ()
39 @property OTOperationDependencies* deps;
40 @property NSOperation* finishedOp;
41 @end
42
43 @implementation OTPrepareOperation
44 @synthesize intendedState = _intendedState;
45 @synthesize nextState = _nextState;
46
47 - (instancetype)initWithDependencies:(OTOperationDependencies*)dependencies
48 intendedState:(OctagonState*)intendedState
49 errorState:(OctagonState*)errorState
50 deviceInfo:(OTDeviceInformation*)deviceInfo
51 epoch:(uint64_t)epoch
52 {
53 if((self = [super init])) {
54 _deps = dependencies;
55
56 _deviceInfo = deviceInfo;
57 _epoch = epoch;
58
59 _intendedState = intendedState;
60 _nextState = errorState;
61 }
62 return self;
63 }
64
65 - (void)groupStart
66 {
67 secnotice("octagon", "preparing an identity");
68
69 self.finishedOp = [[NSOperation alloc] init];
70 [self dependOnBeforeGroupFinished:self.finishedOp];
71
72 NSString* bottleSalt = nil;
73
74 if(self.deps.authKitAdapter.primaryiCloudAccountAltDSID){
75 bottleSalt = self.deps.authKitAdapter.primaryiCloudAccountAltDSID;
76 }
77 else {
78 NSError* accountError = nil;
79 OTAccountMetadataClassC* account = [self.deps.stateHolder loadOrCreateAccountMetadata:&accountError];
80
81 if(account && !accountError) {
82 secnotice("octagon", "retrieved account, altdsid is: %@", account.altDSID);
83 bottleSalt = account.altDSID;
84 }
85 if(accountError || !account){
86 secerror("failed to rerieve account object: %@", accountError);
87 }
88 }
89 WEAKIFY(self);
90
91 // But, if this device is SOS-enabled and SOS is present, use the SOS octagon keys (if present)
92 NSData* signingKeyPersistRef = nil;
93 NSData* encryptionKeyPersistRef = nil;
94 if(self.deps.sosAdapter.sosEnabled) {
95 secnotice("octagon-sos", "Investigating use of Octagon keys from SOS identity");
96
97 NSError* error = nil;
98 id<CKKSSelfPeer> sosSelf = [self.deps.sosAdapter currentSOSSelf:&error];
99
100 if(!sosSelf || error) {
101 secnotice("octagon-sos", "Failed to get the current SOS self: %@", error);
102 } else {
103 // Fetch the persistent references for our signing and encryption keys
104 OSStatus status = errSecSuccess;
105 CFDataRef cfSigningKeyPersistRef = NULL;
106 status = SecKeyCopyPersistentRef(sosSelf.signingKey.secKey, &cfSigningKeyPersistRef);
107 if(status != errSecSuccess || !cfSigningKeyPersistRef) {
108 secnotice("octagon-sos", "Failed to get the persistent ref for our SOS signing key: %d", (int)status);
109 } else {
110 CFDataRef cfEncryptionKeyPersistRef = NULL;
111 status = SecKeyCopyPersistentRef(sosSelf.encryptionKey.secKey, &cfEncryptionKeyPersistRef);
112 if(status != errSecSuccess || !cfEncryptionKeyPersistRef) {
113 secnotice("octagon-sos", "Failed to get the persistent ref for our SOS encryption key: %d", (int)status);
114 CFReleaseNull(cfSigningKeyPersistRef);
115 CFReleaseNull(cfEncryptionKeyPersistRef);
116 } else {
117 // We only want to use these keys if we successfully have both
118 signingKeyPersistRef = CFBridgingRelease(cfSigningKeyPersistRef);
119 encryptionKeyPersistRef = CFBridgingRelease(cfEncryptionKeyPersistRef);
120 }
121 }
122 }
123 }
124
125 NSError* persistError = nil;
126 BOOL persisted = [self.deps.stateHolder persistOctagonJoinAttempt:OTAccountMetadataClassC_AttemptedAJoinState_ATTEMPTED error:&persistError];
127 if(!persisted || persistError) {
128 secerror("octagon: failed to save 'attempted join' state: %@", persistError);
129 }
130
131 [self.deps.cuttlefishXPCWrapper prepareWithContainer:self.deps.containerName
132 context:self.deps.contextID
133 epoch:self.epoch
134 machineID:self.deviceInfo.machineID
135 bottleSalt:bottleSalt
136 bottleID:[NSUUID UUID].UUIDString
137 modelID:self.deviceInfo.modelID
138 deviceName:self.deviceInfo.deviceName
139 serialNumber:self.deviceInfo.serialNumber
140 osVersion:self.deviceInfo.osVersion
141 policyVersion:nil
142 policySecrets:nil
143 signingPrivKeyPersistentRef:signingKeyPersistRef
144 encPrivKeyPersistentRef:encryptionKeyPersistRef
145 reply:^(NSString * _Nullable peerID, NSData * _Nullable permanentInfo, NSData * _Nullable permanentInfoSig, NSData * _Nullable stableInfo, NSData * _Nullable stableInfoSig, NSError * _Nullable error) {
146 STRONGIFY(self);
147 [[CKKSAnalytics logger] logResultForEvent:OctagonEventPrepareIdentity hardFailure:true result:error];
148 if(error) {
149 secerror("octagon: Error preparing identity: %@", error);
150 self.error = error;
151 [self runBeforeGroupFinished:self.finishedOp];
152 } else {
153 secnotice("octagon", "Prepared: %@ %@ %@", peerID, permanentInfo, permanentInfoSig);
154 self.peerID = peerID;
155 self.permanentInfo = permanentInfo;
156 self.permanentInfoSig = permanentInfoSig;
157 self.stableInfo = stableInfo;
158 self.stableInfoSig = stableInfoSig;
159
160 NSError* localError = nil;
161 BOOL persisted = [self.deps.stateHolder persistNewEgoPeerID:peerID error:&localError];
162 if(!persisted || localError) {
163 secnotice("octagon", "Couldn't persist peer ID: %@", localError);
164 self.error = localError;
165 [self runBeforeGroupFinished:self.finishedOp];
166 } else {
167 WEAKIFY(self);
168
169 CKKSResultOperation *doneOp = [CKKSResultOperation named:@"ot-prepare"
170 withBlock:^{
171 STRONGIFY(self);
172 self.nextState = self.intendedState;
173 }];
174
175 OTFetchViewsOperation *fetchViewsOp = [[OTFetchViewsOperation alloc] initWithDependencies:self.deps];
176 [self runBeforeGroupFinished:fetchViewsOp];
177 [doneOp addDependency:fetchViewsOp];
178 [self runBeforeGroupFinished:doneOp];
179 [self.finishedOp addDependency:doneOp];
180 [self runBeforeGroupFinished:self.finishedOp];
181 }
182 }
183 }];
184 }
185
186 @end
187
188 #endif // OCTAGON