Swift - 使用Alamofire通過HTTPS進行網(wǎng)絡請求,及證書的使用

轉自:http://www.hangge.com/blog/cache/detail_1052.html

(本文代碼已升級至Swift3)?

我原來寫過一篇文章介紹如何使用證書通過SSL/TLS方式進行網(wǎng)絡請求(Swift - 使用URLSession通過HTTPS進行網(wǎng)絡請求,及證書的使用),當時用的是?URLSession。

本文介紹如何使用?Alamofire?來實現(xiàn)HTTPS網(wǎng)絡請求,由于Alamofire就是對URLSession的封裝,所以實現(xiàn)起來區(qū)別不大。

(如果Alamofire的配置使用不了解的,可以先去看看我原來寫的文章:Swift - HTTP網(wǎng)絡操作庫Alamofire使用詳解

一,證書的生成,以及服務器配置

參考我前面寫的這篇文章:Tomcat服務器配置https雙向認證(使用keytool生成證書)

文章詳細介紹了HTTPS,SSL/TLS。還有使用key tool生成自簽名證書,Tomcat下https服務的配置。

二,Alamofire使用HTTPS進行網(wǎng)絡請求

1,證書導入

前面文章介紹了通過客戶端瀏覽器訪問HTTPS服務需,需要安裝“mykey.p12”,“tomcat.cer”這兩個證書。同樣,我們開發(fā)的應用中也需要把這兩個證書添加進來。

記的同時在 “工程” -> “Build Phases” -> “Copy Bundle Resources” 中添加這兩個證書文件。

2,配置Info.plist

由于我們使用的是自簽名的證書,而蘋果ATS(App Transport Security)只信任知名CA頒發(fā)的證書,所以在iOS9下即使是HTTPS請求還是會被ATS攔截。

所以在Info.plist下添加如下配置(iOS8不需要):



3,使用兩個證書進行雙向驗證,以及網(wǎng)絡請求

import?UIKit

import?Alamofire


class?ViewController:?UIViewController?{


????override?func?viewDidLoad() {

????????super.viewDidLoad()


????????//認證相關設置

????????let?manager =?SessionManager.default

????????manager.delegate.sessionDidReceiveChallenge = { session, challenge?in

????????????//認證服務器證書

????????????if?challenge.protectionSpace.authenticationMethod

????????????????==?NSURLAuthenticationMethodServerTrust?{

????????????????print("服務端證書認證!")

????????????????let?serverTrust:SecTrust?= challenge.protectionSpace.serverTrust!

????????????????let?certificate =?SecTrustGetCertificateAtIndex(serverTrust, 0)!

????????????????let?remoteCertificateData

????????????????????=?CFBridgingRetain(SecCertificateCopyData(certificate))!

????????????????let?cerPath =?Bundle.main.path(forResource:?"tomcat", ofType:?"cer")!

????????????????let?cerUrl =?URL(fileURLWithPath:cerPath)

????????????????let?localCertificateData = try!?Data(contentsOf: cerUrl)


????????????????if?(remoteCertificateData.isEqual(localCertificateData) ==?true) {


????????????????????let?credential =?URLCredential(trust: serverTrust)

????????????????????challenge.sender?.use(credential,?for: challenge)

????????????????????return?(URLSession.AuthChallengeDisposition.useCredential,

????????????????????????????URLCredential(trust: challenge.protectionSpace.serverTrust!))


????????????????}?else?{

????????????????????return?(.cancelAuthenticationChallenge,?nil)

????????????????}

????????????}

????????????//認證客戶端證書

????????????else?if?challenge.protectionSpace.authenticationMethod

????????????????==?NSURLAuthenticationMethodClientCertificate?{

????????????????print("客戶端證書認證!")

????????????????//獲取客戶端證書相關信息

????????????????let?identityAndTrust:IdentityAndTrust?=?self.extractIdentity();


????????????????let?urlCredential:URLCredential?=?URLCredential(

????????????????????identity: identityAndTrust.identityRef,

????????????????????certificates: identityAndTrust.certArray?as? [AnyObject],

????????????????????persistence:?URLCredential.Persistence.forSession);


????????????????return?(.useCredential, urlCredential);

????????????}

????????????// 其它情況(不接受認證)

????????????else?{

????????????????print("其它情況(不接受認證)")

????????????????return?(.cancelAuthenticationChallenge,?nil)

????????????}

????????}


????????//數(shù)據(jù)請求

????????Alamofire.request("https://192.168.1.112:8443")

????????????.responseString { response?in

????????????????print(response)

????????}

????}


????//獲取客戶端證書相關信息

????func?extractIdentity() ->?IdentityAndTrust?{

????????var?identityAndTrust:IdentityAndTrust!

????????var?securityError:OSStatus?= errSecSuccess


????????let?path:?String?=?Bundle.main.path(forResource:?"mykey", ofType:?"p12")!

????????let?PKCS12Data?=?NSData(contentsOfFile:path)!

????????let?key :?NSString?= kSecImportExportPassphrase?as?NSString

????????let?options :?NSDictionary?= [key :?"123456"]?//客戶端證書密碼

????????//create variable for holding security information

????????//var privateKeyRef: SecKeyRef? = nil


????????var?items :?CFArray?


????????securityError =?SecPKCS12Import(PKCS12Data, options, &items)


????????if?securityError == errSecSuccess {

????????????let?certItems:CFArray?= items?as?CFArray!;

????????????let?certItemsArray:Array?= certItems?as?Array

????????????let?dict:AnyObject? = certItemsArray.first;

????????????if?let?certEntry:Dictionary?= dict?as??Dictionary {

????????????????// grab the identity

????????????????let?identityPointer:AnyObject? = certEntry["identity"];

????????????????let?secIdentityRef:SecIdentity?= identityPointer?as!?SecIdentity!

????????????????print("\(identityPointer)? :::: \(secIdentityRef)")

????????????????// grab the trust

????????????????let?trustPointer:AnyObject? = certEntry["trust"]

????????????????let?trustRef:SecTrust?= trustPointer?as!?SecTrust

????????????????print("\(trustPointer)? :::: \(trustRef)")

????????????????// grab the cert

????????????????let?chainPointer:AnyObject? = certEntry["chain"]

????????????????identityAndTrust =?IdentityAndTrust(identityRef: secIdentityRef,

????????????????????????????????????????trust: trustRef, certArray:? chainPointer!)

????????????}

????????}

????????return?identityAndTrust;

????}


????override?func?didReceiveMemoryWarning() {

????????super.didReceiveMemoryWarning()

????}

}


//定義一個結構體,存儲認證相關信息

struct?IdentityAndTrust?{

????var?identityRef:SecIdentity

????var?trust:SecTrust

????var?certArray:AnyObject

}

控制臺打印輸出如下:

4,只使用一個客戶端證書

由于我們使用的是自簽名的證書,那么對服務器的認證全由客戶端這邊判斷。也就是說其實使用一個客戶端證書“mykey.p12”也是可以的(項目中也只需導入一個證書)。

當對服務器進行驗證的時候,判斷服務主機地址是否正確,是的話信任即可(代碼高亮部分)

import?UIKit

import?Alamofire


class?ViewController:?UIViewController?{


????//自簽名網(wǎng)站地址

????let?selfSignedHosts = ["192.168.1.112",?"www.hangge.com"]


????override?func?viewDidLoad() {

????????super.viewDidLoad()


????????//認證相關設置

????????let?manager =?SessionManager.default

????????manager.delegate.sessionDidReceiveChallenge = { session, challenge?in

????????????//認證服務器(這里不使用服務器證書認證,只需地址是我們定義的幾個地址即可信任)

????????????if?challenge.protectionSpace.authenticationMethod

????????????????==?NSURLAuthenticationMethodServerTrust

????????????????&&?self.selfSignedHosts.contains(challenge.protectionSpace.host) {

????????????????print("服務器認證!")

????????????????let?credential =?URLCredential(trust: challenge.protectionSpace.serverTrust!)

????????????????return?(.useCredential, credential)

????????????}

????????????//認證客戶端證書

????????????else?if?challenge.protectionSpace.authenticationMethod

????????????????==?NSURLAuthenticationMethodClientCertificate?{

????????????????print("客戶端證書認證!")

????????????????//獲取客戶端證書相關信息

????????????????let?identityAndTrust:IdentityAndTrust?=?self.extractIdentity();


????????????????let?urlCredential:URLCredential?=?URLCredential(

????????????????????identity: identityAndTrust.identityRef,

????????????????????certificates: identityAndTrust.certArray?as? [AnyObject],

????????????????????persistence:?URLCredential.Persistence.forSession);


????????????????return?(.useCredential, urlCredential);

????????????}

????????????// 其它情況(不接受認證)

????????????else?{

????????????????print("其它情況(不接受認證)")

????????????????return?(.cancelAuthenticationChallenge,?nil)

????????????}

????????}


????????//數(shù)據(jù)請求

????????Alamofire.request("https://192.168.1.112:8443")

????????????.responseString { response?in

????????????????print(response)

????????}

????}


????//獲取客戶端證書相關信息

????func?extractIdentity() ->?IdentityAndTrust?{

????????var?identityAndTrust:IdentityAndTrust!

????????var?securityError:OSStatus?= errSecSuccess


????????let?path:?String?=?Bundle.main.path(forResource:?"mykey", ofType:?"p12")!

????????let?PKCS12Data?=?NSData(contentsOfFile:path)!

????????let?key :?NSString?= kSecImportExportPassphrase?as?NSString

????????let?options :?NSDictionary?= [key :?"123456"]?//客戶端證書密碼

????????//create variable for holding security information

????????//var privateKeyRef: SecKeyRef? = nil


????????var?items :?CFArray?


????????securityError =?SecPKCS12Import(PKCS12Data, options, &items)


????????if?securityError == errSecSuccess {

????????????let?certItems:CFArray?= items?as?CFArray!;

????????????let?certItemsArray:Array?= certItems?as?Array

????????????let?dict:AnyObject? = certItemsArray.first;

????????????if?let?certEntry:Dictionary?= dict?as??Dictionary {

????????????????// grab the identity

????????????????let?identityPointer:AnyObject? = certEntry["identity"];

????????????????let?secIdentityRef:SecIdentity?= identityPointer?as!?SecIdentity!

????????????????print("\(identityPointer)? :::: \(secIdentityRef)")

????????????????// grab the trust

????????????????let?trustPointer:AnyObject? = certEntry["trust"]

????????????????let?trustRef:SecTrust?= trustPointer?as!?SecTrust

????????????????print("\(trustPointer)? :::: \(trustRef)")

????????????????// grab the cert

????????????????let?chainPointer:AnyObject? = certEntry["chain"]

????????????????identityAndTrust =?IdentityAndTrust(identityRef: secIdentityRef,

????????????????????????????????????????trust: trustRef, certArray:? chainPointer!)

????????????}

????????}

????????return?identityAndTrust;

????}


????override?func?didReceiveMemoryWarning() {

????????super.didReceiveMemoryWarning()

????}

}


//定義一個結構體,存儲認證相關信息

struct?IdentityAndTrust?{

????var?identityRef:SecIdentity

????var?trust:SecTrust

????var?certArray:AnyObject

}

?著作權歸作者所有,轉載或內容合作請聯(lián)系作者
平臺聲明:文章內容(如有圖片或視頻亦包括在內)由作者上傳并發(fā)布,文章內容僅代表作者本人觀點,簡書系信息發(fā)布平臺,僅提供信息存儲服務。
  • 序言:七十年代末,一起剝皮案震驚了整個濱河市,隨后出現(xiàn)的幾起案子,更是在濱河造成了極大的恐慌,老刑警劉巖,帶你破解...
    沈念sama閱讀 230,321評論 6 543
  • 序言:濱河連續(xù)發(fā)生了三起死亡事件,死亡現(xiàn)場離奇詭異,居然都是意外死亡,警方通過查閱死者的電腦和手機,發(fā)現(xiàn)死者居然都...
    沈念sama閱讀 99,559評論 3 429
  • 文/潘曉璐 我一進店門,熙熙樓的掌柜王于貴愁眉苦臉地迎上來,“玉大人,你說我怎么就攤上這事。” “怎么了?”我有些...
    開封第一講書人閱讀 178,442評論 0 383
  • 文/不壞的土叔 我叫張陵,是天一觀的道長。 經(jīng)常有香客問我,道長,這世上最難降的妖魔是什么? 我笑而不...
    開封第一講書人閱讀 63,835評論 1 317
  • 正文 為了忘掉前任,我火速辦了婚禮,結果婚禮上,老公的妹妹穿的比我還像新娘。我一直安慰自己,他們只是感情好,可當我...
    茶點故事閱讀 72,581評論 6 412
  • 文/花漫 我一把揭開白布。 她就那樣靜靜地躺著,像睡著了一般。 火紅的嫁衣襯著肌膚如雪。 梳的紋絲不亂的頭發(fā)上,一...
    開封第一講書人閱讀 55,922評論 1 328
  • 那天,我揣著相機與錄音,去河邊找鬼。 笑死,一個胖子當著我的面吹牛,可吹牛的內容都是我干的。 我是一名探鬼主播,決...
    沈念sama閱讀 43,931評論 3 447
  • 文/蒼蘭香墨 我猛地睜開眼,長吁一口氣:“原來是場噩夢啊……” “哼!你這毒婦竟也來了?” 一聲冷哼從身側響起,我...
    開封第一講書人閱讀 43,096評論 0 290
  • 序言:老撾萬榮一對情侶失蹤,失蹤者是張志新(化名)和其女友劉穎,沒想到半個月后,有當?shù)厝嗽跇淞掷锇l(fā)現(xiàn)了一具尸體,經(jīng)...
    沈念sama閱讀 49,639評論 1 336
  • 正文 獨居荒郊野嶺守林人離奇死亡,尸身上長有42處帶血的膿包…… 初始之章·張勛 以下內容為張勛視角 年9月15日...
    茶點故事閱讀 41,374評論 3 358
  • 正文 我和宋清朗相戀三年,在試婚紗的時候發(fā)現(xiàn)自己被綠了。 大學時的朋友給我發(fā)了我未婚夫和他白月光在一起吃飯的照片。...
    茶點故事閱讀 43,591評論 1 374
  • 序言:一個原本活蹦亂跳的男人離奇死亡,死狀恐怖,靈堂內的尸體忽然破棺而出,到底是詐尸還是另有隱情,我是刑警寧澤,帶...
    沈念sama閱讀 39,104評論 5 364
  • 正文 年R本政府宣布,位于F島的核電站,受9級特大地震影響,放射性物質發(fā)生泄漏。R本人自食惡果不足惜,卻給世界環(huán)境...
    茶點故事閱讀 44,789評論 3 349
  • 文/蒙蒙 一、第九天 我趴在偏房一處隱蔽的房頂上張望。 院中可真熱鬧,春花似錦、人聲如沸。這莊子的主人今日做“春日...
    開封第一講書人閱讀 35,196評論 0 28
  • 文/蒼蘭香墨 我抬頭看了看天上的太陽。三九已至,卻和暖如春,著一層夾襖步出監(jiān)牢的瞬間,已是汗流浹背。 一陣腳步聲響...
    開封第一講書人閱讀 36,524評論 1 295
  • 我被黑心中介騙來泰國打工, 沒想到剛下飛機就差點兒被人妖公主榨干…… 1. 我叫王不留,地道東北人。 一個月前我還...
    沈念sama閱讀 52,322評論 3 400
  • 正文 我出身青樓,卻偏偏與公主長得像,于是被迫代替她去往敵國和親。 傳聞我的和親對象是個殘疾皇子,可洞房花燭夜當晚...
    茶點故事閱讀 48,554評論 2 379

推薦閱讀更多精彩內容