Hi all
I am trying to implement the Keychain API for both iOS and OSX and I'm scratching my head around some issues :
- SecItemDelete + kSecMatchLimitAll : iOS give OSStatus error -50 if this parameter is set, but OSX requires the parameter to be set (if you want to delete more than one item of course)
- SecItemCopyMatching + kSecClassIdentity : OSX only returns the {certificate, privatekey} pairs, while iOS returns both the {certificate, privatekey} and {certificate, publickey} pairs
- SecItemAdd + kSecClassCertificate + kSecAttrLabel : OSX ignores the kSecAttrLabel, while iOS records it
- SecKeyGeneratePair + kSecAttrIsPermanent : Both iOS and OSX ignore kSecAttrIsPermanent if set to false. Items are added to the keychain whatever happens. OSX crashes if SecKeyRefs arguments are provided as NULLs while iOS accept it.
- SecItemCopyMatching + kSecAttrKeyClassPublic + kSecReturnData true : iOS returns the content of the public key in ASN.1 encoded format, OSX returns an internal byte array that cannot be decoded
- SecItemCopyMatching + kSecAttrLabel : OSX performs a strict evaluation of the label parameter (returns only the matching labels) while iOS performs a lazy evaluation (returns all items that contain the words in the parameter)
Am I right to assume the above, or is there something which I am doing awfully wrong ?
You’re not doing anything wrong. Our platforms support two different implementations of the SecItem API:
iOS style (A)
macOS compatibility shim (B)
Implementation A is used on all iOS-based platforms. It also kicks in on macOS when you use iCloud Keychain. Implementation B is a macOS compatibility shim that supports roughly the same API on top of macOS’s older keychain infrastructure. That shim has many places where its behaviour is different from implementation A.
I encourage you to file bug reports about any such differences you encounter. Please post any bug numbers, just for the record.
Most of the problems you listed have fairly obvious workarounds. However, there is one I specifically want to call out:
SecItemCopyMatching + kSecAttrKeyClassPublic + kSecReturnData true : iOS returns the content of the public key in ASN.1 encoded format, OSX returns an internal byte array that cannot be decoded
The fact that iOS returns the public key bits in this situation is more an accident of the implementation than a specific design goạl. On current systems you can use the shiny new
SecKeyCopyExternalRepresentation
to export a key. On older systems you should do the following:
for implementation A, continue using
SecItemCopyMatching
for implementation B, use the APIs in
<Security/SecImportExport.h>
Share and Enjoy
—
Quinn “The Eskimo!”
Apple Developer Relations, Developer Technical Support, Core OS/Hardware
let myEmail = "eskimo" + "1" + "@apple.com"