iOS--AFNetworking2.6/3.0--HTTPS客

作者: H的幻想世界 | 来源:发表于2016-05-19 18:37 被阅读1356次

    HTTPS的作用及原理就不多说了,百度有很详细的资料

    直接上实现方法:

    一、在AFNetworking2.6的环境下:

    1.首先你要有一个p12证书(客户端),一个cer证书(服务端),并将两个证书导入Xcode,在Build Phases里添加证书,如下图:

    Snip20160519_26.png

    2.在你的网络工具类中加入以下验证服务端证书代码:

    + (AFSecurityPolicy*)customSecurityPolicy
    
    {
    
    // /先导入证书
    
    NSString *cerPath = [[NSBundle mainBundle] pathForResource:@"tomcat.cer" ofType:nil];//证书的路径
    
    NSData *certData = [NSData dataWithContentsOfFile:cerPath];
    
    // AFSSLPinningModeCertificate 使用证书验证模式
    
    AFSecurityPolicy *securityPolicy = [AFSecurityPolicy policyWithPinningMode:AFSSLPinningModeCertificate];
    
    // allowInvalidCertificates 是否允许无效证书(也就是自建的证书),默认为NO
    
    // 如果是需要验证自建证书,需要设置为YES
    
    securityPolicy.allowInvalidCertificates = YES;
    
    //validatesDomainName 是否需要验证域名,默认为YES;
    
    //假如证书的域名与你请求的域名不一致,需把该项设置为NO;如设成NO的话,即服务器使用其他可信任机构颁发的证书,也可以建立连接,这个非常危险,建议打开。
    
    //置为NO,主要用于这种情况:客户端请求的是子域名,而证书上的是另外一个域名。因为SSL证书上的域名是独立的,假如证书上注册的域名是www.google.com,那么mail.google.com是无法验证通过的;当然,有钱可以注册通配符的域名*.google.com,但这个还是比较贵的。
    
    //如置为NO,建议自己添加对应域名的校验逻辑。
    
    securityPolicy.validatesDomainName = YES;
    
    securityPolicy.pinnedCertificates = @[certData];
    
    NSLog(@"data:%@",certData);
    
    return securityPolicy;
    
    }
    

    然后在发起网络请求的地方设置:

    //tools是AFHTTPRequestOperationManager对象
    [tools setSecurityPolicy:[self customSecurityPolicy]];
    
    

    3.现在应该已经可以进行服务端证书验证,接下来在AFN的AFURLConnectionOperation.m文件中写入如下代码:

    #pragma mark - 客户端证书
    
    - (OSStatus)extractIdentity:(CFDataRef)inP12Data :(SecIdentityRef*)identity {
    
    OSStatus securityError = errSecSuccess;
    
    CFStringRef password = CFSTR("你的客户端证书密码");
    
    const void *keys[] = { kSecImportExportPassphrase };
    
    const void *values[] = { password };
    
    CFDictionaryRef options = CFDictionaryCreate(NULL, keys, values, 1, NULL, NULL);
    
    CFArrayRef items = CFArrayCreate(NULL, 0, 0, NULL);
    
    securityError = SecPKCS12Import(inP12Data, options, &items);
    
    if (securityError == 0)
    
    {
    
    CFDictionaryRef ident = CFArrayGetValueAtIndex(items,0);
    
    const void *tempIdentity = NULL;
    
    tempIdentity = CFDictionaryGetValue(ident, kSecImportItemIdentity);
    
    *identity = (SecIdentityRef)tempIdentity;
    
    }
    
    if (options)
    
    {
    
    CFRelease(options);
    
    }
    
    return securityError;
    
    }
    

    4.并将以下代码覆盖- (void)connection:(NSURLConnection *)connection
    willSendRequestForAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge方法里的代码:

    - (void)connection:(NSURLConnection *)connection
    
    willSendRequestForAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge
    
    {
    
    NSString *thePath = [[NSBundle mainBundle] pathForResource:@"clientkey" ofType:@"p12"];
    
    NSData *PKCS12Data = [[NSData alloc] initWithContentsOfFile:thePath];
    
    CFDataRef inPKCS12Data = (__bridge CFDataRef)PKCS12Data;
    
    SecIdentityRef identity = NULL;
    
    // extract the ideneity from the certificate
    
    [self extractIdentity :inPKCS12Data :&identity];
    
    SecCertificateRef certificate = NULL;
    
    SecIdentityCopyCertificate (identity, &certificate);
    
    //    const void *certs[] = {certificate};
    
    //                        CFArrayRef certArray = CFArrayCreate(kCFAllocatorDefault, certs, 1, NULL);
    
    // create a credential from the certificate and ideneity, then reply to the challenge with the credential
    
    //NSLog(@"identity=========%@",identity);
    
    NSURLCredential *credential = [NSURLCredential credentialWithIdentity:identity certificates:nil persistence:NSURLCredentialPersistencePermanent];
    
    //          credential = [NSURLCredential credentialWithIdentity:identity certificates:(__bridge NSArray*)certArray persistence:NSURLCredentialPersistencePermanent];
    
    [challenge.sender useCredential:credential forAuthenticationChallenge:challenge];
    
    }
    

    二、在AFNetworking3.0的环境下:

    1、2步骤与2.6相同

    3.客户端证书验证,直接在你的网络工具类中添加以下代码(此时工具类中发起请求的应该是AFHTTPSessionManager):

    +(BOOL)extractIdentity:(SecIdentityRef*)outIdentity andTrust:(SecTrustRef *)outTrust fromPKCS12Data:(NSData *)inPKCS12Data {
        OSStatus securityError = errSecSuccess;
        //client certificate password
        NSDictionary*optionsDictionary = [NSDictionary dictionaryWithObject:@"你的客户端证书密码"
                                                                     forKey:(__bridge id)kSecImportExportPassphrase];
        
        CFArrayRef items = CFArrayCreate(NULL, 0, 0, NULL);
        securityError = SecPKCS12Import((__bridge CFDataRef)inPKCS12Data,(__bridge CFDictionaryRef)optionsDictionary,&items);
        
        if(securityError == 0) {
            CFDictionaryRef myIdentityAndTrust =CFArrayGetValueAtIndex(items,0);
            const void*tempIdentity =NULL;
            tempIdentity= CFDictionaryGetValue (myIdentityAndTrust,kSecImportItemIdentity);
            *outIdentity = (SecIdentityRef)tempIdentity;
            const void*tempTrust =NULL;
            tempTrust = CFDictionaryGetValue(myIdentityAndTrust,kSecImportItemTrust);
            *outTrust = (SecTrustRef)tempTrust;
        } else {
            NSLog(@"Failedwith error code %d",(int)securityError);
            return NO;
        }
        return YES;
    }
    

    4.在网络工具类中创建AFHTTPSessionManager对象后加入如下代码(tools为AFHTTPSessionManager对象):

    __weak typeof(self)weakSelf = self;
            [tools setSessionDidReceiveAuthenticationChallengeBlock:^NSURLSessionAuthChallengeDisposition(NSURLSession*session, NSURLAuthenticationChallenge *challenge, NSURLCredential *__autoreleasing*_credential) {
                NSURLSessionAuthChallengeDisposition disposition = NSURLSessionAuthChallengePerformDefaultHandling;
                __autoreleasing NSURLCredential *credential =nil;
                if([challenge.protectionSpace.authenticationMethod isEqualToString:NSURLAuthenticationMethodServerTrust]) {
                    if([tools.securityPolicy evaluateServerTrust:challenge.protectionSpace.serverTrust forDomain:challenge.protectionSpace.host]) {
                        credential = [NSURLCredential credentialForTrust:challenge.protectionSpace.serverTrust];
                        if(credential) {
                            disposition = NSURLSessionAuthChallengeUseCredential;
                        } else {
                            disposition =NSURLSessionAuthChallengePerformDefaultHandling;
                        }
                    } else {
                        disposition = NSURLSessionAuthChallengeCancelAuthenticationChallenge;
                    }
                } else {
                    // client authentication
                    SecIdentityRef identity = NULL;
                    SecTrustRef trust = NULL;
                    NSString *p12 = [[NSBundle mainBundle] pathForResource:@"clientkey"ofType:@"p12"];
                    NSFileManager *fileManager =[NSFileManager defaultManager];
                    
                    if(![fileManager fileExistsAtPath:p12])
                    {
                        NSLog(@"client.p12:not exist");
                    }
                    else
                    {
                        NSData *PKCS12Data = [NSData dataWithContentsOfFile:p12];
                        
                        if ([[weakSelf class] extractIdentity:&identity andTrust:&trust fromPKCS12Data:PKCS12Data])
                        {
                            SecCertificateRef certificate = NULL;
                            SecIdentityCopyCertificate(identity, &certificate);
                            const void*certs[] = {certificate};
                            CFArrayRef certArray =CFArrayCreate(kCFAllocatorDefault, certs,1,NULL);
                            credential =[NSURLCredential credentialWithIdentity:identity certificates:(__bridge  NSArray*)certArray persistence:NSURLCredentialPersistencePermanent];
                            disposition =NSURLSessionAuthChallengeUseCredential;
                        }
                    }
                }
                *_credential = credential;
                return disposition;
            }];
    
    

    需要注意以上的代码中出现证书名字与密码需要修改成你自己对应的证书密码

    以上。

    相关文章

      网友评论

        本文标题:iOS--AFNetworking2.6/3.0--HTTPS客

        本文链接:https://www.haomeiwen.com/subject/rgegrttx.html