Swift 3数据到NSMutableData

时间:2017-08-01 12:15:37

标签: encryption swift3 nsdata nsmutabledata

我正在写一个解密我的NSMutableData的扩展,

extension NSMutableData { 
    func decrypt() -> NSData {
        let decryptMethod = (User.sharedInstance.data?.encrypt_method)!
        let key = User.sharedInstance.defaultKey()
        return decrypt(methodNumber:decryptMethod , key:key )
    }

    func decrypt(  methodNumber: Decrypter.DecryptType,  key: String) -> NSData {
        ....
    }

}

解密方法工作正常,当我解密NSMutableData,但无法解密数据,即使我把它投射到NSMutableData

func xxx() -> Data {
    Var encryptedData:Data = getEncData()
    let dataToDecrypt = encryptedData as! NSMutableData
    let data = dataToDecrypt.decrypt()
    return data as Data
}

代码崩溃

let data = dataToDecrypt.decrypt()

告诉我“无法识别的选择器”,这是崩溃日志

[OS_dispatch_data decrypt]: unrecognized selector sent to instance 0x157fbf0b0

似乎我的NSMutableData已被强制转换为OS_dispatch_data,因此导致“无法识别的选择器”,我该如何正确地将我的数据转换为NSMutableData?

1 个答案:

答案 0 :(得分:0)

关键是:encryptedData.withUnsafeBytes {encryptedBytes in ... }

来自日落文档部分的示例:

CBC模式下的AES加密,随机IV(Swift 3 +)

iv以加密数据为前缀

aesCBC128Encrypt将创建一个随机IV,并以加密代码为前缀 aesCBC128Decrypt将在解密期间使用带前缀的IV。

输入是数据,键是数据对象。如果需要的编码形式(如Base64)在调用方法中转换为和/或来自

密钥长度应为128位(16字节),192位(24字节)或256位(32字节)。如果使用其他密钥大小,则会抛出错误。

PKCS#7 padding默认设置。

此示例需要Common Crypto
项目必须有一个桥接标题:
    #import <CommonCrypto/CommonCrypto.h>
    将Security.framework添加到项目中。

这是示例,而非生产代码。

enum AESError: Error {
    case KeyError((String, Int))
    case IVError((String, Int))
    case CryptorError((String, Int))
}

// The iv is prefixed to the encrypted data
func aesCBCEncrypt(data:Data, keyData:Data) throws -> Data {
    let keyLength = keyData.count
    let validKeyLengths = [kCCKeySizeAES128, kCCKeySizeAES192, kCCKeySizeAES256]
    if (validKeyLengths.contains(keyLength) == false) {
        throw AESError.KeyError(("Invalid key length", keyLength))
    }

    let ivSize = kCCBlockSizeAES128;
    let cryptLength = size_t(ivSize + data.count + kCCBlockSizeAES128)
    var cryptData = Data(count:cryptLength)

    let status = cryptData.withUnsafeMutableBytes {ivBytes in
        SecRandomCopyBytes(kSecRandomDefault, kCCBlockSizeAES128, ivBytes)
    }
    if (status != 0) {
        throw AESError.IVError(("IV generation failed", Int(status)))
    }

    var numBytesEncrypted :size_t = 0
    let options   = CCOptions(kCCOptionPKCS7Padding)

    let cryptStatus = cryptData.withUnsafeMutableBytes {cryptBytes in
        data.withUnsafeBytes {dataBytes in
            keyData.withUnsafeBytes {keyBytes in
                CCCrypt(CCOperation(kCCEncrypt),
                        CCAlgorithm(kCCAlgorithmAES),
                        options,
                        keyBytes, keyLength,
                        cryptBytes,
                        dataBytes, data.count,
                        cryptBytes+kCCBlockSizeAES128, cryptLength,
                        &numBytesEncrypted)
            }
        }
    }

    if UInt32(cryptStatus) == UInt32(kCCSuccess) {
        cryptData.count = numBytesEncrypted + ivSize
    }
    else {
        throw AESError.CryptorError(("Encryption failed", Int(cryptStatus)))
    }

    return cryptData;
}

// The iv is prefixed to the encrypted data
func aesCBCDecrypt(data:Data, keyData:Data) throws -> Data? {
    let keyLength = keyData.count
    let validKeyLengths = [kCCKeySizeAES128, kCCKeySizeAES192, kCCKeySizeAES256]
    if (validKeyLengths.contains(keyLength) == false) {
        throw AESError.KeyError(("Invalid key length", keyLength))
    }

    let ivSize = kCCBlockSizeAES128;
    let clearLength = size_t(data.count - ivSize)
    var clearData = Data(count:clearLength)

    var numBytesDecrypted :size_t = 0
    let options   = CCOptions(kCCOptionPKCS7Padding)

    let cryptStatus = clearData.withUnsafeMutableBytes {cryptBytes in
        data.withUnsafeBytes {dataBytes in
            keyData.withUnsafeBytes {keyBytes in
                CCCrypt(CCOperation(kCCDecrypt),
                        CCAlgorithm(kCCAlgorithmAES128),
                        options,
                        keyBytes, keyLength,
                        dataBytes,
                        dataBytes+kCCBlockSizeAES128, clearLength,
                        cryptBytes, clearLength,
                        &numBytesDecrypted)
            }
        }
    }

    if UInt32(cryptStatus) == UInt32(kCCSuccess) {
        clearData.count = numBytesDecrypted
    }
    else {
        throw AESError.CryptorError(("Decryption failed", Int(cryptStatus)))
    }

    return clearData;
}

使用示例:

let clearData = "clearData0123456".data(using:String.Encoding.utf8)!
let keyData   = "keyData890123456".data(using:String.Encoding.utf8)!
print("clearData:   \(clearData as NSData)")
print("keyData:     \(keyData as NSData)")

var cryptData :Data?
do {
    cryptData = try aesCBCEncrypt(data:clearData, keyData:keyData)
    print("cryptData:   \(cryptData! as NSData)")
}
catch (let status) {
    print("Error aesCBCEncrypt: \(status)")
}

let decryptData :Data?
do {
    let decryptData = try aesCBCDecrypt(data:cryptData!, keyData:keyData)
    print("decryptData: \(decryptData! as NSData)")
}
catch (let status) {
    print("Error aesCBCDecrypt: \(status)")
}

示例输出:

clearData:   <636c6561 72446174 61303132 33343536>
keyData:     <6b657944 61746138 39303132 33343536>
cryptData:   <92c57393 f454d959 5a4d158f 6e1cd3e7 77986ee9 b2970f49 2bafcf1a 8ee9d51a bde49c31 d7780256 71837a61 60fa4be0>
decryptData: <636c6561 72446174 61303132 33343536>

注意:
CBC模式示例代码的一个典型问题是它将随机IV的创建和共享留给用户。此示例包括生成IV,加密数据前缀并在解密期间使用前缀IV。这使临时用户免于CBC mode所需的详细信息。

为了安全起见,加密数据也应该具有身份验证,这个示例代码不会提供这样的代码,因为它很小并且可以为其他平台提供更好的互操作性。

同样缺少密钥的密钥派生密钥,建议使用PBKDF2文本密码作为密钥材料使用。

对于强大的生产就绪的多平台加密代码,请参阅RNCryptor

Apple文档:withUnsafeBytes

  

<强>声明
  func withUnsafeBytes<T, Result>(of arg: inout T, _ body: (UnsafeRawBufferPointer) throws -> Result) rethrows -> Result

     

参数

     

ARG
  通过原始缓冲区指针临时访问的实例。

     


  一个闭包,它将原始缓冲区指针作为arg的字节作为唯一参数。如果闭包有一个返回值,那么该值也用作withUnsafeBytes(of:_ :)函数的返回值。缓冲区指针参数仅在闭包执行期间有效。

     

<强>讨论
  body闭包的缓冲区指针参数提供了arg原始字节的集合接口。缓冲区是作为arg传递的实例的大小,不包括任何远程存储。