Repository: amitaymolko/react-native-rsa-native Branch: master Commit: 60c412eb3ad9 Files: 82 Total size: 265.4 KB Directory structure: gitextract__f8eomwg/ ├── .gitignore ├── .npmignore ├── LICENSE ├── README.md ├── android/ │ ├── .project │ ├── .settings/ │ │ └── org.eclipse.buildship.core.prefs │ ├── build.gradle │ ├── gradle/ │ │ └── wrapper/ │ │ ├── gradle-wrapper.jar │ │ └── gradle-wrapper.properties │ ├── gradlew │ ├── gradlew.bat │ └── src/ │ └── main/ │ ├── AndroidManifest.xml │ └── java/ │ └── com/ │ └── RNRSA/ │ ├── CsrHelper.java │ ├── RNRSAKeychainModule.java │ ├── RNRSAModule.java │ ├── RNRSAPackage.java │ └── RSA.java ├── example/ │ ├── .buckconfig │ ├── .eslintrc.js │ ├── .flowconfig │ ├── .gitattributes │ ├── .gitignore │ ├── .prettierrc.js │ ├── .watchmanconfig │ ├── App.js │ ├── __tests__/ │ │ └── App-test.js │ ├── android/ │ │ ├── app/ │ │ │ ├── BUCK │ │ │ ├── build.gradle │ │ │ ├── build_defs.bzl │ │ │ ├── debug.keystore │ │ │ ├── proguard-rules.pro │ │ │ └── src/ │ │ │ ├── debug/ │ │ │ │ ├── AndroidManifest.xml │ │ │ │ └── java/ │ │ │ │ └── com/ │ │ │ │ └── example/ │ │ │ │ └── ReactNativeFlipper.java │ │ │ └── main/ │ │ │ ├── AndroidManifest.xml │ │ │ ├── java/ │ │ │ │ └── com/ │ │ │ │ └── example/ │ │ │ │ ├── MainActivity.java │ │ │ │ └── MainApplication.java │ │ │ └── res/ │ │ │ └── values/ │ │ │ ├── strings.xml │ │ │ └── styles.xml │ │ ├── build.gradle │ │ ├── gradle/ │ │ │ └── wrapper/ │ │ │ ├── gradle-wrapper.jar │ │ │ └── gradle-wrapper.properties │ │ ├── gradle.properties │ │ ├── gradlew │ │ ├── gradlew.bat │ │ └── settings.gradle │ ├── app.json │ ├── babel.config.js │ ├── index.js │ ├── ios/ │ │ ├── Podfile │ │ ├── example/ │ │ │ ├── AppDelegate.h │ │ │ ├── AppDelegate.m │ │ │ ├── Base.lproj/ │ │ │ │ └── LaunchScreen.xib │ │ │ ├── Images.xcassets/ │ │ │ │ ├── AppIcon.appiconset/ │ │ │ │ │ └── Contents.json │ │ │ │ └── Contents.json │ │ │ ├── Info.plist │ │ │ └── main.m │ │ ├── example-tvOS/ │ │ │ └── Info.plist │ │ ├── example-tvOSTests/ │ │ │ └── Info.plist │ │ ├── example.xcodeproj/ │ │ │ ├── project.pbxproj │ │ │ └── xcshareddata/ │ │ │ └── xcschemes/ │ │ │ ├── example-tvOS.xcscheme │ │ │ └── example.xcscheme │ │ ├── example.xcworkspace/ │ │ │ ├── contents.xcworkspacedata │ │ │ └── xcshareddata/ │ │ │ └── IDEWorkspaceChecks.plist │ │ └── exampleTests/ │ │ ├── Info.plist │ │ └── exampleTests.m │ ├── metro.config.js │ └── package.json ├── index.d.ts ├── index.js ├── ios/ │ ├── CSRSwift.swift │ ├── CSRSwiftConstants.swift │ ├── RNRSA-Bridging-Header.h │ ├── RNRSA.m │ ├── RNRSA.swift │ ├── RNRSA.xcodeproj/ │ │ └── project.pbxproj │ ├── RNRSAKeychain.m │ ├── RNRSAKeychain.swift │ ├── RSAECFormatter.swift │ ├── RSAECNative.swift │ └── RSAKeyEncoding.swift ├── package.json └── react-native-rsa-native.podspec ================================================ FILE CONTENTS ================================================ ================================================ FILE: .gitignore ================================================ # OSX # .DS_Store # node.js # node_modules/ npm-debug.log yarn-error.log # Xcode # ios/build *.pbxuser !default.pbxuser *.mode1v3 !default.mode1v3 *.mode2v3 !default.mode2v3 *.perspectivev3 !default.perspectivev3 xcuserdata *.xccheckout *.moved-aside DerivedData *.hmap *.ipa *.xcuserstate project.xcworkspace # Android/IntelliJ # android/build .idea .gradle local.properties *.iml bin android/bin ================================================ FILE: .npmignore ================================================ ### gitignore ### # OSX # .DS_Store # node.js # node_modules/ npm-debug.log yarn-error.log # Xcode # ios/build *.pbxuser !default.pbxuser *.mode1v3 !default.mode1v3 *.mode2v3 !default.mode2v3 *.perspectivev3 !default.perspectivev3 xcuserdata *.xccheckout *.moved-aside DerivedData *.hmap *.ipa *.xcuserstate project.xcworkspace # Android/IntelliJ # android/build .idea .gradle local.properties *.iml ### npmignore ### example/ ================================================ FILE: LICENSE ================================================ The MIT License (MIT) Copyright (c) 2016 Sam Saffron Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. ================================================ FILE: README.md ================================================ # Looking for maintainers This project needs new maintainers, PRs also welcome # react-native-rsa-native A native implementation of RSA key generation and encryption/decryption, sign/verify. Keychain implementation Implementation is in PKCS1 ## Support iOS 10+ android 4.1+ (API 16) ## Status Features: Generation, Encryption, Decryption, Sign, Verify, Keychain support ## Getting started `$ yarn add react-native-rsa-native` or: `$ npm install react-native-rsa-native --save` ## Older React-Native versions If you are using an older version of React Native and are having issues try using v1.1.14 ## Example Usage These basic examples show a typical use case using both promise chains and async/await. See [the full API documentation below](#documentation) for more detail on the methods available. ### Encrypt a message Encrypt a message and subsequently decrypt it, using the RSA class in a promise chain structure. ```js import { RSA } from 'react-native-rsa-native'; let message = "my secret message"; RSA.generateKeys(4096) // set key size .then(keys => { console.log('4096 private:', keys.private); // the private key console.log('4096 public:', keys.public); // the public key RSA.encrypt(message, keys.public) .then(encodedMessage => { console.log(`the encoded message is ${encodedMessage}`); RSA.decrypt(encodedMessage, keys.private) .then(decryptedMessage => { console.log(`The original message was ${decryptedMessage}`); }); }); }); ``` ### Sign a message Sign a message and subsequently verify it, using the RSAKeychain class in an async/await structure. ```typescript import { RSAKeychain } from 'react-native-rsa-native'; async main() { let keyTag = 'com.domain.mykey'; let message = "message to be verified"; let publicKey = await generateKeyPair(keyTag); // Share the generated public key with third parties as desired. let messageSignature = await RSAKeychain.sign(message, keyTag); if (await RSAKeychain.verify(messageSignature, message, keyTag)) { // The signature matches: trust this message. } else { // The signature does not match. } await RSAKeychain.deletePrivateKey(keyTag); } async generateKeyPair(keyTag : string) { let keys = await RSAKeychain.generate(keyTag); return keys.public; } ``` Check out example App.js for a full example ## Documentation ### RSA Class A class that performs RSA cryptographic primitives in a simple and straightforward manner. If you would prefer to use the underlying operating system's built-in security keychain, use [the RSAKeychain Class](#rsakeychain-class) instead. #### generateKeys `static generateKeys(keySize : number) : Promise` Generate a public/private key pair of the given key size. #### generate `static generate() : Promise` Equivalent to `generateKeys(2048)` #### encrypt `static encrypt(message : string, publicKey : string) : Promise` Encrypt a given message with the provided public key, so it is decryptable with the matching private key. #### decrypt `static decrypt(encodedMessage : string, privateKey : string) : Promise` Decrypt a given encrypted message using the private key. #### sign `static sign(message: string, privateKey : string) : Promise` Sign a given message with the private key, so that any user with the message, the returned signature, and the matching public key can verify it was signed under this key. #### verify `static verify(signature : string, message : string, publicKey : string) : Promise` Verify whether or not a provided signature was produced by signing the given message with the private key paired to the provided public key. ### RSAKeychain Class Support: android 4.3+ (API 18) Like [the RSA Class](#rsa-class), but when its methods are called, instead of directly accessing the private key, the private key is stored in the underlying operating system's keychain (see documentation [for iOS](https://developer.apple.com/documentation/security/keychain_services) and [for Android](https://developer.android.com/reference/android/security/KeyChain)) using a tag which the app can use to access it. Methods then take this tag instead of the private key. #### generateKeys `static generateKeys(keyTag : string, keySize : number) : Promise` Generate a public/private key pair of the given key size, and store the private key in the operating system keychain. #### generate `static generate(keyTag : string) : Promise` Equivalent to `generateKeys(keyTag, 2048)` #### encrypt `static encrypt(message : string, keyTag : string) : Promise` Retrieve the public key associated with the key tag, and encrypt a given message with that key, so it is decryptable with the matching private key. #### decrypt `static decrypt(encodedMessage : string, keyTag : string) : Promise` Decrypt a given encrypted message using the private key associated with the given key tag. #### sign `static sign(message: string, keyTag : string) : Promise` Sign a given message with the private key associated with the given key tag, so that any user with the message, the returned signature, and the matching public key can verify it was signed under this key. #### signWithAlgorithm `static sign(message: string, keyTag : string, algorithm?: 'SHA256withRSA' | 'SHA512withRSA') : Promise` Sign a given message with the private key associated with the given key tag, so that any user with the message, the returned signature, and the matching public key can verify it was signed under this key. The user can use __SHA256withRSA__ or __SHA512withRSA__ algorithm for signing. __SHA256withRSA__ algorithm is not backward compatible on android and the user needs to generate new keypair for this to work. (available from ^1.1.0). The default is __SHA512withRSA__ and if one wishes to use __SHA512withRSA__ for signing without new keypair, then use the above sign method. #### verify `static verify(signature : string, message : string, keyTag : string) : Promise` Verify whether or not a provided signature was produced by signing the given message with private key associated with the given key tag. #### verifyWithAlgorithm `static verify(signature : string, message : string, keyTag : string, algorithm?: 'SHA256withRSA' | 'SHA512withRSA') : Promise` Verify whether or not a provided signature was produced by signing the given message with private key associated with the given key tag. #### deletePrivateKey `static deletePrivateKey(keyTag : string) : Promise` Delete the private key from the operating system's keychain. Returns true if the key was removed successfully. ### KeyPair Type Note: The `KeyPair` type does not strictly exist. Documentation provided here for convenience of understanding the return types of other methods. Property | Description --|-- `private : string` | The RSA private key. `public : string` | The RSA public key. ### PublicKey Type Note: The `PublicKey` type does not strictly exist. Documentation provided here for convenience of understanding the return types of other methods. Property | Description --|-- `public : string` | The RSA public key. ## Credit * Originally based on https://github.com/SamSaffron/react-native-key-pair * iOS implementation [reference](https://developer.apple.com/library/content/documentation/Security/Conceptual/CertKeyTrustProgGuide/KeyRead.html#//apple_ref/doc/uid/TP40001358-CH222-SW1) ## Donate ETH: 0xDc2F8D78098749EB3ECdF79Fe32Efda86fEEFc3c ================================================ FILE: android/.project ================================================ android Project android created by Buildship. org.eclipse.jdt.core.javabuilder org.eclipse.buildship.core.gradleprojectbuilder org.eclipse.jdt.core.javanature org.eclipse.buildship.core.gradleprojectnature ================================================ FILE: android/.settings/org.eclipse.buildship.core.prefs ================================================ connection.project.dir= eclipse.preferences.version=1 ================================================ FILE: android/build.gradle ================================================ def safeExtGet(prop, fallback) { rootProject.ext.has(prop) ? rootProject.ext.get(prop) : fallback } buildscript { // The Android Gradle plugin is only required when opening the android folder stand-alone. // This avoids unnecessary downloads and potential conflicts when the library is included as a // module dependency in an application project. if (project == rootProject) { repositories { google() jcenter() maven { url "https://maven.fabric.io/public" } mavenCentral() } dependencies { classpath("com.android.tools.build:gradle:3.5.3") } } } apply plugin: 'com.android.library' android { compileSdkVersion safeExtGet('compileSdkVersion', 28) buildToolsVersion safeExtGet('buildToolsVersion', '28.0.3') defaultConfig { minSdkVersion safeExtGet('minSdkVersion', 16) targetSdkVersion safeExtGet('targetSdkVersion', 28) versionCode 1 versionName "1.0" ndk { abiFilters "armeabi-v7a", "x86" } } lintOptions { warning 'InvalidPackage' } } allprojects { repositories { mavenLocal() google() jcenter() maven { // All of React Native (JS, Obj-C sources, Android binaries) is installed from npm url "$rootDir/../node_modules/react-native/android" } } } dependencies { implementation 'com.facebook.react:react-native:+' implementation 'com.madgag.spongycastle:core:1.56.0.0' implementation 'com.madgag.spongycastle:prov:1.56.0.0' implementation 'com.madgag.spongycastle:bcpkix-jdk15on:1.56.0.0' } ================================================ FILE: android/gradle/wrapper/gradle-wrapper.properties ================================================ #Sun May 10 20:25:59 IDT 2020 distributionBase=GRADLE_USER_HOME distributionPath=wrapper/dists zipStoreBase=GRADLE_USER_HOME zipStorePath=wrapper/dists distributionUrl=https\://services.gradle.org/distributions/gradle-5.4.1-all.zip ================================================ FILE: android/gradlew ================================================ #!/usr/bin/env bash ############################################################################## ## ## Gradle start up script for UN*X ## ############################################################################## # Add default JVM options here. You can also use JAVA_OPTS and GRADLE_OPTS to pass JVM options to this script. DEFAULT_JVM_OPTS="" APP_NAME="Gradle" APP_BASE_NAME=`basename "$0"` # Use the maximum available, or set MAX_FD != -1 to use that value. MAX_FD="maximum" warn ( ) { echo "$*" } die ( ) { echo echo "$*" echo exit 1 } # OS specific support (must be 'true' or 'false'). cygwin=false msys=false darwin=false case "`uname`" in CYGWIN* ) cygwin=true ;; Darwin* ) darwin=true ;; MINGW* ) msys=true ;; esac # Attempt to set APP_HOME # Resolve links: $0 may be a link PRG="$0" # Need this for relative symlinks. while [ -h "$PRG" ] ; do ls=`ls -ld "$PRG"` link=`expr "$ls" : '.*-> \(.*\)$'` if expr "$link" : '/.*' > /dev/null; then PRG="$link" else PRG=`dirname "$PRG"`"/$link" fi done SAVED="`pwd`" cd "`dirname \"$PRG\"`/" >/dev/null APP_HOME="`pwd -P`" cd "$SAVED" >/dev/null CLASSPATH=$APP_HOME/gradle/wrapper/gradle-wrapper.jar # Determine the Java command to use to start the JVM. if [ -n "$JAVA_HOME" ] ; then if [ -x "$JAVA_HOME/jre/sh/java" ] ; then # IBM's JDK on AIX uses strange locations for the executables JAVACMD="$JAVA_HOME/jre/sh/java" else JAVACMD="$JAVA_HOME/bin/java" fi if [ ! -x "$JAVACMD" ] ; then die "ERROR: JAVA_HOME is set to an invalid directory: $JAVA_HOME Please set the JAVA_HOME variable in your environment to match the location of your Java installation." fi else JAVACMD="java" which java >/dev/null 2>&1 || die "ERROR: JAVA_HOME is not set and no 'java' command could be found in your PATH. Please set the JAVA_HOME variable in your environment to match the location of your Java installation." fi # Increase the maximum file descriptors if we can. if [ "$cygwin" = "false" -a "$darwin" = "false" ] ; then MAX_FD_LIMIT=`ulimit -H -n` if [ $? -eq 0 ] ; then if [ "$MAX_FD" = "maximum" -o "$MAX_FD" = "max" ] ; then MAX_FD="$MAX_FD_LIMIT" fi ulimit -n $MAX_FD if [ $? -ne 0 ] ; then warn "Could not set maximum file descriptor limit: $MAX_FD" fi else warn "Could not query maximum file descriptor limit: $MAX_FD_LIMIT" fi fi # For Darwin, add options to specify how the application appears in the dock if $darwin; then GRADLE_OPTS="$GRADLE_OPTS \"-Xdock:name=$APP_NAME\" \"-Xdock:icon=$APP_HOME/media/gradle.icns\"" fi # For Cygwin, switch paths to Windows format before running java if $cygwin ; then APP_HOME=`cygpath --path --mixed "$APP_HOME"` CLASSPATH=`cygpath --path --mixed "$CLASSPATH"` JAVACMD=`cygpath --unix "$JAVACMD"` # We build the pattern for arguments to be converted via cygpath ROOTDIRSRAW=`find -L / -maxdepth 1 -mindepth 1 -type d 2>/dev/null` SEP="" for dir in $ROOTDIRSRAW ; do ROOTDIRS="$ROOTDIRS$SEP$dir" SEP="|" done OURCYGPATTERN="(^($ROOTDIRS))" # Add a user-defined pattern to the cygpath arguments if [ "$GRADLE_CYGPATTERN" != "" ] ; then OURCYGPATTERN="$OURCYGPATTERN|($GRADLE_CYGPATTERN)" fi # Now convert the arguments - kludge to limit ourselves to /bin/sh i=0 for arg in "$@" ; do CHECK=`echo "$arg"|egrep -c "$OURCYGPATTERN" -` CHECK2=`echo "$arg"|egrep -c "^-"` ### Determine if an option if [ $CHECK -ne 0 ] && [ $CHECK2 -eq 0 ] ; then ### Added a condition eval `echo args$i`=`cygpath --path --ignore --mixed "$arg"` else eval `echo args$i`="\"$arg\"" fi i=$((i+1)) done case $i in (0) set -- ;; (1) set -- "$args0" ;; (2) set -- "$args0" "$args1" ;; (3) set -- "$args0" "$args1" "$args2" ;; (4) set -- "$args0" "$args1" "$args2" "$args3" ;; (5) set -- "$args0" "$args1" "$args2" "$args3" "$args4" ;; (6) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" ;; (7) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" ;; (8) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" "$args7" ;; (9) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" "$args7" "$args8" ;; esac fi # Split up the JVM_OPTS And GRADLE_OPTS values into an array, following the shell quoting and substitution rules function splitJvmOpts() { JVM_OPTS=("$@") } eval splitJvmOpts $DEFAULT_JVM_OPTS $JAVA_OPTS $GRADLE_OPTS JVM_OPTS[${#JVM_OPTS[*]}]="-Dorg.gradle.appname=$APP_BASE_NAME" exec "$JAVACMD" "${JVM_OPTS[@]}" -classpath "$CLASSPATH" org.gradle.wrapper.GradleWrapperMain "$@" ================================================ FILE: android/gradlew.bat ================================================ @if "%DEBUG%" == "" @echo off @rem ########################################################################## @rem @rem Gradle startup script for Windows @rem @rem ########################################################################## @rem Set local scope for the variables with windows NT shell if "%OS%"=="Windows_NT" setlocal @rem Add default JVM options here. You can also use JAVA_OPTS and GRADLE_OPTS to pass JVM options to this script. set DEFAULT_JVM_OPTS= set DIRNAME=%~dp0 if "%DIRNAME%" == "" set DIRNAME=. set APP_BASE_NAME=%~n0 set APP_HOME=%DIRNAME% @rem Find java.exe if defined JAVA_HOME goto findJavaFromJavaHome set JAVA_EXE=java.exe %JAVA_EXE% -version >NUL 2>&1 if "%ERRORLEVEL%" == "0" goto init echo. echo ERROR: JAVA_HOME is not set and no 'java' command could be found in your PATH. echo. echo Please set the JAVA_HOME variable in your environment to match the echo location of your Java installation. goto fail :findJavaFromJavaHome set JAVA_HOME=%JAVA_HOME:"=% set JAVA_EXE=%JAVA_HOME%/bin/java.exe if exist "%JAVA_EXE%" goto init echo. echo ERROR: JAVA_HOME is set to an invalid directory: %JAVA_HOME% echo. echo Please set the JAVA_HOME variable in your environment to match the echo location of your Java installation. goto fail :init @rem Get command-line arguments, handling Windowz variants if not "%OS%" == "Windows_NT" goto win9xME_args if "%@eval[2+2]" == "4" goto 4NT_args :win9xME_args @rem Slurp the command line arguments. set CMD_LINE_ARGS= set _SKIP=2 :win9xME_args_slurp if "x%~1" == "x" goto execute set CMD_LINE_ARGS=%* goto execute :4NT_args @rem Get arguments from the 4NT Shell from JP Software set CMD_LINE_ARGS=%$ :execute @rem Setup the command line set CLASSPATH=%APP_HOME%\gradle\wrapper\gradle-wrapper.jar @rem Execute Gradle "%JAVA_EXE%" %DEFAULT_JVM_OPTS% %JAVA_OPTS% %GRADLE_OPTS% "-Dorg.gradle.appname=%APP_BASE_NAME%" -classpath "%CLASSPATH%" org.gradle.wrapper.GradleWrapperMain %CMD_LINE_ARGS% :end @rem End local scope for the variables with windows NT shell if "%ERRORLEVEL%"=="0" goto mainEnd :fail rem Set variable GRADLE_EXIT_CONSOLE if you need the _script_ return code instead of rem the _cmd.exe /c_ return code! if not "" == "%GRADLE_EXIT_CONSOLE%" exit 1 exit /b 1 :mainEnd if "%OS%"=="Windows_NT" endlocal :omega ================================================ FILE: android/src/main/AndroidManifest.xml ================================================ ================================================ FILE: android/src/main/java/com/RNRSA/CsrHelper.java ================================================ package com.RNRSA; import android.util.Log; import org.spongycastle.asn1.ASN1ObjectIdentifier; import org.spongycastle.asn1.pkcs.PKCSObjectIdentifiers; import org.spongycastle.asn1.x500.X500Name; import org.spongycastle.asn1.x509.AlgorithmIdentifier; import org.spongycastle.asn1.x509.ExtensionsGenerator; import org.spongycastle.operator.ContentSigner; import org.spongycastle.operator.OperatorCreationException; import org.spongycastle.pkcs.PKCS10CertificationRequest; import org.spongycastle.pkcs.PKCS10CertificationRequestBuilder; import org.spongycastle.pkcs.jcajce.JcaPKCS10CertificationRequestBuilder; import java.io.ByteArrayOutputStream; import java.io.IOException; import java.io.OutputStream; import java.security.GeneralSecurityException; import java.security.KeyStore; import java.security.PrivateKey; import java.security.PublicKey; import java.security.Signature; import java.util.HashMap; import java.util.Map; public class CsrHelper { private final static String DEFAULT_SIGNATURE_ALGORITHM = "SHA256withECDSA"; private final static String CN_PATTERN = "CN=%s"; private static class JCESigner implements ContentSigner { private static Map ALGOS = new HashMap(); static { ALGOS.put("SHA256withECDSA".toLowerCase(), new AlgorithmIdentifier( new ASN1ObjectIdentifier("1.2.840.10045.4.3.2"))); ALGOS.put("SHA256withRSA".toLowerCase(), new AlgorithmIdentifier( new ASN1ObjectIdentifier("1.2.840.113549.1.1.11"))); ALGOS.put("SHA1withRSA".toLowerCase(), new AlgorithmIdentifier( new ASN1ObjectIdentifier("1.2.840.113549.1.1.5"))); } private String mAlgo; private Signature signature; private ByteArrayOutputStream outputStream; public JCESigner( String sigAlgo, String keyTag) { mAlgo = sigAlgo.toLowerCase(); try { KeyStore.Entry entry = getEntry(keyTag); this.outputStream = new ByteArrayOutputStream(); this.signature = Signature.getInstance(sigAlgo); PrivateKey key = ((KeyStore.PrivateKeyEntry) entry).getPrivateKey(); this.signature.initSign(key); } catch (GeneralSecurityException gse) { Log.e("generateCSR", "generateCSR: " + gse.getMessage()); throw new IllegalArgumentException(gse.getMessage()); } catch (IOException gse) { Log.e("generateCSR", "IOException: " + gse.getMessage()); throw new IllegalArgumentException(gse.getMessage()); } } public KeyStore.Entry getEntry (String keyTag) throws GeneralSecurityException, IOException { KeyStore ks = KeyStore.getInstance("AndroidKeyStore"); ks.load(null); return ks.getEntry(keyTag, null); } @Override public AlgorithmIdentifier getAlgorithmIdentifier() { AlgorithmIdentifier id = ALGOS.get(mAlgo); if (id == null) { throw new IllegalArgumentException("Does not support algo: " + mAlgo); } return id; } @Override public OutputStream getOutputStream() { return outputStream; } @Override public byte[] getSignature() { try { signature.update(outputStream.toByteArray()); return signature.sign(); } catch (GeneralSecurityException gse) { gse.printStackTrace(); return null; } } } //Create the certificate signing request (CSR) from private and public keys public static PKCS10CertificationRequest generateCSR(PublicKey publicKey, String cn, String keyTag, String withAlgorithm) throws IOException, OperatorCreationException { String principal = String.format(CN_PATTERN, cn); ContentSigner signer = new JCESigner(withAlgorithm, keyTag); PKCS10CertificationRequestBuilder csrBuilder = new JcaPKCS10CertificationRequestBuilder( new X500Name(principal), publicKey); ExtensionsGenerator extensionsGenerator = new ExtensionsGenerator(); // extensionsGenerator.addExtension(Extension.basicConstraints, true, new BasicConstraints( // true)); csrBuilder.addAttribute(PKCSObjectIdentifiers.pkcs_9_at_extensionRequest, extensionsGenerator.generate()); PKCS10CertificationRequest csr = csrBuilder.build(signer); return csr; } public static PKCS10CertificationRequest generateCSRWithEC(PublicKey publicKey, String commonName, String keyTag) throws IOException, OperatorCreationException { return generateCSR(publicKey, commonName, keyTag, DEFAULT_SIGNATURE_ALGORITHM); } } ================================================ FILE: android/src/main/java/com/RNRSA/RNRSAKeychainModule.java ================================================ package com.RNRSA; import android.os.AsyncTask; import android.util.Log; import com.facebook.react.bridge.Promise; import com.facebook.react.bridge.ReactApplicationContext; import com.facebook.react.bridge.ReactContextBaseJavaModule; import com.facebook.react.bridge.ReactMethod; import com.facebook.react.bridge.WritableNativeMap; import java.io.IOException; import java.security.NoSuchAlgorithmException; import java.util.HashMap; import java.util.Map; public class RNRSAKeychainModule extends ReactContextBaseJavaModule { private static final String SHA256withRSA = "SHA256withRSA"; private static final String SHA512withRSA = "SHA512withRSA"; private static final String SHA1withRSA = "SHA1withRSA"; private final ReactApplicationContext reactContext; public RNRSAKeychainModule(ReactApplicationContext reactContext) { super(reactContext); this.reactContext = reactContext; } @Override public String getName() { return "RNRSAKeychain"; } @Override public Map getConstants() { final Map constants = new HashMap<>(); constants.put(SHA256withRSA, SHA256withRSA); constants.put(SHA512withRSA, SHA512withRSA); constants.put(SHA1withRSA, SHA1withRSA); return constants; } @ReactMethod public void generate(final String keyTag, final Promise promise) { this.generateKeys(keyTag, 2048, promise); } @ReactMethod public void generateKeys(final String keyTag, final int keySize, final Promise promise) { final ReactApplicationContext reactContext = this.reactContext; AsyncTask.execute(new Runnable() { @Override public void run() { WritableNativeMap keys = new WritableNativeMap(); try { RSA rsa = new RSA(); rsa.generate(keyTag, keySize, reactContext); keys.putString("public", rsa.getPublicKey()); promise.resolve(keys); } catch (NoSuchAlgorithmException e) { promise.reject("Error", e.getMessage()); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void generateCSR(final String keyTag, final String commonName, final String withAlgorithm, final Promise promise) { final ReactApplicationContext reactContext = this.reactContext; AsyncTask.execute(new Runnable() { @Override public void run() { WritableNativeMap keys = new WritableNativeMap(); try { RSA rsa = new RSA(keyTag); rsa.generateCSR(commonName, withAlgorithm, reactContext); keys.putString("csr", rsa.getCSR()); promise.resolve(keys); } catch (NoSuchAlgorithmException e) { promise.reject("Error", e.getMessage()); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void generateCSRWithEC(final String cn,final String keyTag, final int keySize, final Promise promise) { final ReactApplicationContext reactContext = this.reactContext; AsyncTask.execute(new Runnable() { @Override public void run() { WritableNativeMap keys = new WritableNativeMap(); try { RSA rsa = new RSA(); rsa.generateCSRWithEC(cn,keyTag, keySize, reactContext); keys.putString("csr", rsa.getCSR()); promise.resolve(keys); } catch (NoSuchAlgorithmException e) { promise.reject("Error", e.getMessage()); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void deletePrivateKey(final String keyTag, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(keyTag); rsa.deletePrivateKey(); promise.resolve(1); } catch (NoSuchAlgorithmException e) { promise.reject("Error", e.getMessage()); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void encrypt(final String message, final String keyTag, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(keyTag); String encodedMessage = rsa.encrypt(message); promise.resolve(encodedMessage); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void encrypt64(final String message, final String keyTag, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(keyTag); String encodedMessage = rsa.encrypt64(message); promise.resolve(encodedMessage); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void decrypt(final String encodedMessage, final String keyTag, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(keyTag); String message = rsa.decrypt(encodedMessage); promise.resolve(message); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void decrypt64(final String encodedMessage, final String keyTag, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(keyTag); String message = rsa.decrypt64(encodedMessage); promise.resolve(message); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void sign(final String message, final String keyTag, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(keyTag); String signature = rsa.sign(message, SHA512withRSA); promise.resolve(signature); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void signWithAlgorithm(final String message, final String keyTag, final String algorithm, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(keyTag); String signature = rsa.sign(message, algorithm); promise.resolve(signature); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void sign64(final String message, final String keyTag, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(keyTag); String signature = rsa.sign64(message, SHA512withRSA); promise.resolve(signature); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void sign64WithAlgorithm(final String message, final String keyTag, final String algorithm, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(keyTag); String signature = rsa.sign64(message, algorithm); promise.resolve(signature); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void verify(final String signature, final String message, final String keyTag, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(keyTag); boolean verified = rsa.verify(signature, message, SHA512withRSA); promise.resolve(verified); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void verifyWithAlgorithm(final String signature, final String message, final String keyTag, final String algorithm, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(keyTag); boolean verified = rsa.verify(signature, message, algorithm); promise.resolve(verified); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void verify64(final String signature, final String message, final String keyTag, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(keyTag); boolean verified = rsa.verify64(signature, message, SHA512withRSA); promise.resolve(verified); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void verify64WithAlgorithm(final String signature, final String message, final String keyTag, final String algorithm, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(keyTag); boolean verified = rsa.verify64(signature, message, algorithm); promise.resolve(verified); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void getPublicKey(final String keyTag, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { WritableNativeMap keys = new WritableNativeMap(); try { RSA rsa = new RSA(keyTag); String publicKey = rsa.getPublicKey(); if (publicKey != null) { promise.resolve(publicKey); } else { promise.reject("Error", "Missing public key for that keyTag"); } } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } } ================================================ FILE: android/src/main/java/com/RNRSA/RNRSAModule.java ================================================ package com.RNRSA; import android.os.AsyncTask; import com.facebook.react.bridge.NoSuchKeyException; import com.facebook.react.bridge.ReactApplicationContext; import com.facebook.react.bridge.ReactContextBaseJavaModule; import com.facebook.react.bridge.ReactMethod; import com.facebook.react.bridge.Callback; import com.facebook.react.bridge.WritableNativeMap; import com.facebook.react.bridge.Promise; import java.io.IOException; import java.security.NoSuchAlgorithmException; import java.util.HashMap; import java.util.Map; public class RNRSAModule extends ReactContextBaseJavaModule { private static final String SHA256withRSA = "SHA256withRSA"; private static final String SHA512withRSA = "SHA512withRSA"; private final ReactApplicationContext reactContext; public RNRSAModule(ReactApplicationContext reactContext) { super(reactContext); this.reactContext = reactContext; } @Override public String getName() { return "RNRSA"; } @Override public Map getConstants() { final Map constants = new HashMap<>(); constants.put(SHA256withRSA, SHA256withRSA); constants.put(SHA512withRSA, SHA512withRSA); return constants; } @ReactMethod public void generate(final Promise promise) { this.generateKeys(2048, promise); } @ReactMethod public void generateKeys(final int keySize, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { WritableNativeMap keys = new WritableNativeMap(); try { RSA rsa = new RSA(); rsa.generate(keySize); keys.putString("public", rsa.getPublicKey()); keys.putString("private", rsa.getPrivateKey()); promise.resolve(keys); } catch (NoSuchAlgorithmException e) { promise.reject("Error", e.getMessage()); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void encrypt(final String message, final String publicKeyString, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(); rsa.setPublicKey(publicKeyString); String encodedMessage = rsa.encrypt(message); promise.resolve(encodedMessage); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void encrypt64(final String message, final String publicKeyString, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(); rsa.setPublicKey(publicKeyString); String encodedMessage = rsa.encrypt64(message); promise.resolve(encodedMessage); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void decrypt(final String encodedMessage, final String privateKeyString, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(); rsa.setPrivateKey(privateKeyString); String message = rsa.decrypt(encodedMessage); promise.resolve(message); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void decrypt64(final String encodedMessage, final String privateKeyString, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(); rsa.setPrivateKey(privateKeyString); String message = rsa.decrypt64(encodedMessage); promise.resolve(message); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void sign(final String message, final String privateKeyString, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(); rsa.setPrivateKey(privateKeyString); String signature = rsa.sign(message, SHA512withRSA); promise.resolve(signature); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void signWithAlgorithm(final String message, final String privateKeyString, final String algorithm, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(); rsa.setPrivateKey(privateKeyString); String signature = rsa.sign(message, algorithm); promise.resolve(signature); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void sign64(final String message, final String privateKeyString, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(); rsa.setPrivateKey(privateKeyString); String signature = rsa.sign64(message, SHA512withRSA); promise.resolve(signature); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void sign64WithAlgorithm(final String message, final String privateKeyString, final String algorithm, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(); rsa.setPrivateKey(privateKeyString); String signature = rsa.sign64(message, algorithm); promise.resolve(signature); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void verify(final String signature, final String message, final String publicKeyString, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(); rsa.setPublicKey(publicKeyString); boolean verified = rsa.verify(signature, message, SHA512withRSA); promise.resolve(verified); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void verifyWithAlgorithm(final String signature, final String message, final String publicKeyString, final String algorithm, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(); rsa.setPublicKey(publicKeyString); boolean verified = rsa.verify(signature, message, algorithm); promise.resolve(verified); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void verify64(final String signature, final String message, final String publicKeyString, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(); rsa.setPublicKey(publicKeyString); boolean verified = rsa.verify64(signature, message, SHA512withRSA); promise.resolve(verified); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } @ReactMethod public void verify64WithAlgorithm(final String signature, final String message, final String publicKeyString, final String algorithm, final Promise promise) { AsyncTask.execute(new Runnable() { @Override public void run() { try { RSA rsa = new RSA(); rsa.setPublicKey(publicKeyString); boolean verified = rsa.verify64(signature, message, algorithm); promise.resolve(verified); } catch (Exception e) { promise.reject("Error", e.getMessage()); } } }); } } ================================================ FILE: android/src/main/java/com/RNRSA/RNRSAPackage.java ================================================ package com.RNRSA; import java.util.Arrays; import java.util.Collections; import java.util.List; import com.facebook.react.ReactPackage; import com.facebook.react.bridge.NativeModule; import com.facebook.react.bridge.ReactApplicationContext; import com.facebook.react.uimanager.ViewManager; import com.facebook.react.bridge.JavaScriptModule; public class RNRSAPackage implements ReactPackage { public List createNativeModules(ReactApplicationContext reactContext) { return Arrays.asList(new RNRSAModule(reactContext), new RNRSAKeychainModule((reactContext))); } public List> createJSModules() { return Collections.emptyList(); } public List createViewManagers(ReactApplicationContext reactContext) { return Collections.emptyList(); } } ================================================ FILE: android/src/main/java/com/RNRSA/RSA.java ================================================ package com.RNRSA; import android.annotation.TargetApi; import android.security.keystore.KeyGenParameterSpec; import android.security.keystore.KeyProperties; import android.security.KeyPairGeneratorSpec; import android.util.Base64; import android.content.Context; import java.security.MessageDigest; import java.security.SecureRandom; import java.security.spec.ECGenParameterSpec; import java.util.Calendar; import java.math.BigInteger; import java.io.Reader; import java.io.StringReader; import java.io.StringWriter; import java.security.InvalidAlgorithmParameterException; import java.security.KeyPair; import java.security.KeyStore; import java.security.KeyStoreException; import java.security.NoSuchProviderException; import java.security.PublicKey; import java.security.PrivateKey; import java.security.KeyFactory; import java.security.KeyPairGenerator; import java.security.NoSuchAlgorithmException; import java.security.InvalidKeyException; import java.security.Signature; import java.security.SignatureException; import java.security.UnrecoverableEntryException; import java.security.cert.CertificateException; import java.security.spec.X509EncodedKeySpec; import java.security.spec.RSAPrivateKeySpec; import java.security.spec.InvalidKeySpecException; import javax.crypto.Cipher; import javax.crypto.IllegalBlockSizeException; import javax.crypto.NoSuchPaddingException; import javax.crypto.BadPaddingException; import javax.security.auth.x500.X500Principal; import java.io.IOException; import org.spongycastle.asn1.ASN1InputStream; import org.spongycastle.asn1.ASN1Encodable; import org.spongycastle.asn1.ASN1ObjectIdentifier; import org.spongycastle.asn1.ASN1Primitive; import org.spongycastle.asn1.pkcs.PKCSObjectIdentifiers; import org.spongycastle.asn1.pkcs.PrivateKeyInfo; import org.spongycastle.asn1.pkcs.RSAPublicKey; import org.spongycastle.asn1.pkcs.RSAPrivateKey; import org.spongycastle.asn1.x509.SubjectPublicKeyInfo; import org.spongycastle.operator.OperatorCreationException; import org.spongycastle.pkcs.PKCS10CertificationRequest; import org.spongycastle.util.io.pem.PemObject; import org.spongycastle.util.io.pem.PemWriter; import org.spongycastle.util.io.pem.PemReader; import org.spongycastle.asn1.pkcs.RSAPublicKey; import org.spongycastle.openssl.PEMParser; import org.spongycastle.util.io.pem.PemObject; import static android.security.keystore.KeyProperties.*; import static java.nio.charset.StandardCharsets.UTF_8; import java.nio.charset.Charset; public class RSA { public static Charset CharsetUTF_8; public static final String ALGORITHM = KeyProperties.KEY_ALGORITHM_RSA; private static final String PUBLIC_HEADER = "RSA PUBLIC KEY"; private static final String PRIVATE_HEADER = "RSA PRIVATE KEY"; private static final String CSR_HEADER = "CERTIFICATE REQUEST"; private String keyTag; private PublicKey publicKey; private PrivateKey privateKey; private PKCS10CertificationRequest csr; public RSA() { this.setupCharset(); } public RSA(String keyTag) throws KeyStoreException, UnrecoverableEntryException, NoSuchAlgorithmException, IOException, CertificateException { this.setupCharset(); this.keyTag = keyTag; this.loadFromKeystore(); } private void setupCharset() { if (android.os.Build.VERSION.SDK_INT >= 19) { CharsetUTF_8 = UTF_8; } else { CharsetUTF_8 = Charset.forName("UTF-8"); } } public String getPublicKey() throws IOException { byte[] pkcs1PublicKey = publicKeyToPkcs1(this.publicKey); return dataToPem(PUBLIC_HEADER, pkcs1PublicKey); // return Base64.encodeToString(this.publicKey.getEncoded(), Base64.DEFAULT); } public String getPrivateKey() throws IOException { byte[] pkcs1PrivateKey = privateKeyToPkcs1(this.privateKey); return dataToPem(PRIVATE_HEADER, pkcs1PrivateKey); } public void setPublicKey(String publicKey) throws IOException, NoSuchAlgorithmException, InvalidKeySpecException { this.publicKey = pkcs1ToPublicKey(publicKey); } public void setPrivateKey(String privateKey) throws IOException, NoSuchAlgorithmException, InvalidKeySpecException { byte[] pkcs1PrivateKey = pemToData(privateKey); this.privateKey = pkcs1ToPrivateKey(pkcs1PrivateKey); } // This function will be called by encrypt and encrypt64 private byte[] encrypt(byte[] data) throws NoSuchAlgorithmException, InvalidKeySpecException, IllegalBlockSizeException, BadPaddingException, NoSuchPaddingException, InvalidKeyException { String encodedMessage = null; final Cipher cipher = Cipher.getInstance("RSA/NONE/PKCS1Padding"); cipher.init(Cipher.ENCRYPT_MODE, this.publicKey); byte[] cipherBytes = cipher.doFinal(data); return cipherBytes; } // Base64 input public String encrypt64(String b64Message) throws NoSuchAlgorithmException, InvalidKeySpecException, IllegalBlockSizeException, BadPaddingException, NoSuchPaddingException, InvalidKeyException { byte[] data = Base64.decode(b64Message, Base64.DEFAULT); byte[] cipherBytes = encrypt(data); return Base64.encodeToString(cipherBytes, Base64.DEFAULT); } // UTF-8 input public String encrypt(String message) throws NoSuchAlgorithmException, InvalidKeySpecException, IllegalBlockSizeException, BadPaddingException, NoSuchPaddingException, InvalidKeyException { byte[] data = message.getBytes(CharsetUTF_8); byte[] cipherBytes = encrypt(data); return Base64.encodeToString(cipherBytes, Base64.DEFAULT); } private byte[] decrypt(byte[] cipherBytes) throws NoSuchAlgorithmException, InvalidKeySpecException, IllegalBlockSizeException, BadPaddingException, NoSuchPaddingException, InvalidKeyException { String message = null; final Cipher cipher = Cipher.getInstance("RSA/NONE/PKCS1Padding"); cipher.init(Cipher.DECRYPT_MODE, this.privateKey); byte[] data = cipher.doFinal(cipherBytes); return data; } // UTF-8 input public String decrypt(String message) throws NoSuchAlgorithmException, InvalidKeySpecException, IllegalBlockSizeException, BadPaddingException, NoSuchPaddingException, InvalidKeyException { byte[] cipherBytes = Base64.decode(message, Base64.DEFAULT); byte[] data = decrypt(cipherBytes); return new String(data, CharsetUTF_8); } // Base64 input public String decrypt64(String b64message) throws NoSuchAlgorithmException, InvalidKeySpecException, IllegalBlockSizeException, BadPaddingException, NoSuchPaddingException, InvalidKeyException { byte[] cipherBytes = Base64.decode(b64message, Base64.DEFAULT); byte[] data = decrypt(cipherBytes); return Base64.encodeToString(data, Base64.DEFAULT); } private String sign(byte[] messageBytes, String algorithm) throws NoSuchAlgorithmException, InvalidKeySpecException, IllegalBlockSizeException, BadPaddingException, NoSuchPaddingException, InvalidKeyException, SignatureException { Signature privateSignature = Signature.getInstance(algorithm); privateSignature.initSign(this.privateKey); privateSignature.update(messageBytes); byte[] signature = privateSignature.sign(); return Base64.encodeToString(signature, Base64.DEFAULT); } // b64 message public String sign64(String b64message, String algorithm) throws NoSuchAlgorithmException, InvalidKeySpecException, IllegalBlockSizeException, BadPaddingException, NoSuchPaddingException, InvalidKeyException, SignatureException { byte[] messageBytes = Base64.decode(b64message, Base64.DEFAULT); return sign(messageBytes, algorithm); } //utf-8 message public String sign(String message, String signature) throws NoSuchAlgorithmException, InvalidKeySpecException, IllegalBlockSizeException, BadPaddingException, NoSuchPaddingException, InvalidKeyException, SignatureException { byte[] messageBytes = message.getBytes(CharsetUTF_8); return sign(messageBytes, signature); } private boolean verify(byte[] signatureBytes, byte[] messageBytes, String algorithm) throws NoSuchAlgorithmException, InvalidKeySpecException, IllegalBlockSizeException, BadPaddingException, NoSuchPaddingException, InvalidKeyException, SignatureException { Signature publicSignature = Signature.getInstance(algorithm); publicSignature.initVerify(this.publicKey); publicSignature.update(messageBytes); return publicSignature.verify(signatureBytes); } // b64 message public boolean verify64(String signature, String message, String algorithm) throws NoSuchAlgorithmException, InvalidKeySpecException, IllegalBlockSizeException, BadPaddingException, NoSuchPaddingException, InvalidKeyException, SignatureException { Signature publicSignature = Signature.getInstance(algorithm); publicSignature.initVerify(this.publicKey); byte[] messageBytes = Base64.decode(message, Base64.DEFAULT); byte[] signatureBytes = Base64.decode(signature, Base64.DEFAULT); return verify(signatureBytes, messageBytes, algorithm); } // utf-8 message public boolean verify(String signature, String message, String algorithm) throws NoSuchAlgorithmException, InvalidKeySpecException, IllegalBlockSizeException, BadPaddingException, NoSuchPaddingException, InvalidKeyException, SignatureException { Signature publicSignature = Signature.getInstance(algorithm); publicSignature.initVerify(this.publicKey); byte[] messageBytes = message.getBytes(CharsetUTF_8); byte[] signatureBytes = Base64.decode(signature, Base64.DEFAULT); return verify(signatureBytes, messageBytes, algorithm); } private String dataToPem(String header, byte[] keyData) throws IOException { PemObject pemObject = new PemObject(header, keyData); StringWriter stringWriter = new StringWriter(); PemWriter pemWriter = new PemWriter(stringWriter); pemWriter.writeObject(pemObject); pemWriter.close(); return stringWriter.toString(); } private byte[] pemToData(String pemKey) throws IOException { Reader keyReader = new StringReader(pemKey); PemReader pemReader = new PemReader(keyReader); PemObject pemObject = pemReader.readPemObject(); return pemObject.getContent(); } private PublicKey pkcs1ToPublicKey(String publicKey) throws IOException, NoSuchAlgorithmException, InvalidKeySpecException { Reader keyReader = null; try { keyReader = new StringReader(publicKey); PEMParser pemParser = new PEMParser(keyReader); SubjectPublicKeyInfo subjectPublicKeyInfo = (SubjectPublicKeyInfo) pemParser.readObject(); X509EncodedKeySpec spec = new X509EncodedKeySpec(subjectPublicKeyInfo.getEncoded()); return KeyFactory.getInstance("RSA").generatePublic(spec); } finally { if (keyReader != null) { keyReader.close(); } } } private PrivateKey pkcs1ToPrivateKey(byte[] pkcs1PrivateKey) throws IOException, NoSuchAlgorithmException, InvalidKeySpecException { ASN1InputStream in = new ASN1InputStream(pkcs1PrivateKey); ASN1Primitive obj = in.readObject(); RSAPrivateKey keyStruct = RSAPrivateKey.getInstance(obj); RSAPrivateKeySpec keySpec = new RSAPrivateKeySpec(keyStruct.getModulus(), keyStruct.getPrivateExponent()); KeyFactory keyFactory = KeyFactory.getInstance(ALGORITHM); return keyFactory.generatePrivate(keySpec); } private byte[] publicKeyToPkcs1(PublicKey publicKey) throws IOException { SubjectPublicKeyInfo spkInfo = SubjectPublicKeyInfo.getInstance(publicKey.getEncoded()); ASN1Primitive primitive = spkInfo.parsePublicKey(); return primitive.getEncoded(); } private byte[] privateKeyToPkcs1(PrivateKey privateKey) throws IOException { PrivateKeyInfo pkInfo = PrivateKeyInfo.getInstance(privateKey.getEncoded()); ASN1Encodable encodeable = pkInfo.parsePrivateKey(); ASN1Primitive primitive = encodeable.toASN1Primitive(); return primitive.getEncoded(); } public void loadFromKeystore() throws KeyStoreException, UnrecoverableEntryException, NoSuchAlgorithmException, IOException, CertificateException { KeyStore keyStore = KeyStore.getInstance("AndroidKeyStore"); keyStore.load(null); KeyStore.PrivateKeyEntry privateKeyEntry = (KeyStore.PrivateKeyEntry) keyStore.getEntry(this.keyTag, null); if (privateKeyEntry != null) { this.privateKey = privateKeyEntry.getPrivateKey(); this.publicKey = privateKeyEntry.getCertificate().getPublicKey(); } } public void deletePrivateKey() throws KeyStoreException, UnrecoverableEntryException, NoSuchAlgorithmException, IOException, CertificateException { KeyStore keyStore = KeyStore.getInstance("AndroidKeyStore"); keyStore.load(null); keyStore.deleteEntry(this.keyTag); this.privateKey = null; this.publicKey = null; } public void generate() throws IOException, NoSuchAlgorithmException, InvalidAlgorithmParameterException { this.generate(2048); } public void generate(int keySize) throws IOException, NoSuchAlgorithmException, InvalidAlgorithmParameterException { KeyPairGenerator kpg = KeyPairGenerator.getInstance(ALGORITHM); kpg.initialize(keySize); KeyPair keyPair = kpg.genKeyPair(); this.publicKey = keyPair.getPublic(); this.privateKey = keyPair.getPrivate(); } public void generate(String keyTag, Context context) throws IOException, NoSuchAlgorithmException, InvalidAlgorithmParameterException, NoSuchProviderException { this.generate(keyTag, 2048, context); } @TargetApi(18) public void generate(String keyTag, int keySize, Context context) throws IOException, NoSuchAlgorithmException, InvalidAlgorithmParameterException, NoSuchProviderException { KeyPairGenerator kpg = KeyPairGenerator.getInstance(ALGORITHM, "AndroidKeyStore"); if (android.os.Build.VERSION.SDK_INT >= 23) { kpg.initialize( new KeyGenParameterSpec.Builder( keyTag, PURPOSE_ENCRYPT | PURPOSE_DECRYPT | PURPOSE_SIGN | PURPOSE_VERIFY ) .setKeySize(keySize) .setDigests(DIGEST_SHA256, DIGEST_SHA512, DIGEST_SHA1) .setEncryptionPaddings(KeyProperties.ENCRYPTION_PADDING_RSA_PKCS1) .setSignaturePaddings(KeyProperties.SIGNATURE_PADDING_RSA_PKCS1) .build() ); } else { Calendar endDate = Calendar.getInstance(); endDate.add(Calendar.YEAR, 1); KeyPairGeneratorSpec.Builder keyPairGeneratorSpec = new KeyPairGeneratorSpec.Builder(context) .setAlias(keyTag) .setSubject(new X500Principal( String.format("CN=%s, OU=%s", keyTag, context.getPackageName()) )) .setSerialNumber(BigInteger.ONE) .setStartDate(Calendar.getInstance().getTime()) .setEndDate(endDate.getTime()); if (android.os.Build.VERSION.SDK_INT >= 19) { keyPairGeneratorSpec.setKeySize(keySize).setKeyType(ALGORITHM); } kpg.initialize(keyPairGeneratorSpec.build()); } KeyPair keyPair = kpg.genKeyPair(); this.publicKey = keyPair.getPublic(); } @TargetApi(18) public void generateCSR(String commonName, String withAlgorithm, Context context) throws IOException, OperatorCreationException { this.csr = CsrHelper.generateCSR(this.publicKey, commonName, keyTag, withAlgorithm); } @TargetApi(18) public void generateCSRWithEC(String cn,String keyTag, int keySize, Context context) throws IOException, NoSuchAlgorithmException, InvalidAlgorithmParameterException, NoSuchProviderException, UnrecoverableEntryException, KeyStoreException, CertificateException { this.deletePrivateKey(); KeyPairGenerator kpg = KeyPairGenerator.getInstance(KeyProperties.KEY_ALGORITHM_EC, "AndroidKeyStore"); if (android.os.Build.VERSION.SDK_INT >= 23) { kpg.initialize(new KeyGenParameterSpec.Builder( keyTag, KeyProperties.PURPOSE_SIGN | KeyProperties.PURPOSE_VERIFY) .setDigests(KeyProperties.DIGEST_SHA256, KeyProperties.DIGEST_SHA512, DIGEST_SHA384, KeyProperties.DIGEST_NONE) .setKeySize(keySize) .setAlgorithmParameterSpec(new ECGenParameterSpec("secp256r1")) .setEncryptionPaddings(KeyProperties.ENCRYPTION_PADDING_PKCS7) .build()); } else { Calendar endDate = Calendar.getInstance(); endDate.add(Calendar.YEAR, 1); KeyPairGeneratorSpec.Builder keyPairGeneratorSpec = new KeyPairGeneratorSpec.Builder(context) .setAlias(keyTag) .setSubject(new X500Principal( String.format("CN=%s", keyTag, context.getPackageName()) )) .setSerialNumber(BigInteger.ONE) .setStartDate(Calendar.getInstance().getTime()) .setEndDate(endDate.getTime()); if (android.os.Build.VERSION.SDK_INT >= 19) { keyPairGeneratorSpec.setKeySize(keySize).setKeyType(KeyProperties.KEY_ALGORITHM_EC); } kpg.initialize(keyPairGeneratorSpec.build()); } KeyPair keyPair = kpg.genKeyPair(); this.publicKey = keyPair.getPublic(); try { this.csr = CsrHelper.generateCSRWithEC(this.publicKey, cn, keyTag); } catch (OperatorCreationException e) { e.printStackTrace(); } } public String getCSR() throws IOException { byte CSRder[] = this.csr.getEncoded(); return dataToPem(CSR_HEADER, CSRder); } } ================================================ FILE: example/.buckconfig ================================================ [android] target = Google Inc.:Google APIs:23 [maven_repositories] central = https://repo1.maven.org/maven2 ================================================ FILE: example/.eslintrc.js ================================================ module.exports = { root: true, extends: '@react-native-community', }; ================================================ FILE: example/.flowconfig ================================================ [ignore] ; We fork some components by platform .*/*[.]android.js ; Ignore "BUCK" generated dirs /\.buckd/ ; Ignore polyfills node_modules/react-native/Libraries/polyfills/.* ; These should not be required directly ; require from fbjs/lib instead: require('fbjs/lib/warning') node_modules/warning/.* ; Flow doesn't support platforms .*/Libraries/Utilities/LoadingView.js [untyped] .*/node_modules/@react-native-community/cli/.*/.* [include] [libs] node_modules/react-native/interface.js node_modules/react-native/flow/ [options] emoji=true esproposal.optional_chaining=enable esproposal.nullish_coalescing=enable module.file_ext=.js module.file_ext=.json module.file_ext=.ios.js munge_underscores=true module.name_mapper='^react-native/\(.*\)$' -> '/node_modules/react-native/\1' module.name_mapper='^@?[./a-zA-Z0-9$_-]+\.\(bmp\|gif\|jpg\|jpeg\|png\|psd\|svg\|webp\|m4v\|mov\|mp4\|mpeg\|mpg\|webm\|aac\|aiff\|caf\|m4a\|mp3\|wav\|html\|pdf\)$' -> '/node_modules/react-native/Libraries/Image/RelativeImageStub' suppress_type=$FlowIssue suppress_type=$FlowFixMe suppress_type=$FlowFixMeProps suppress_type=$FlowFixMeState suppress_comment=\\(.\\|\n\\)*\\$FlowFixMe\\($\\|[^(]\\|(\\(\\)? *\\(site=[a-z,_]*react_native\\(_ios\\)?_\\(oss\\|fb\\)[a-z,_]*\\)?)\\) suppress_comment=\\(.\\|\n\\)*\\$FlowIssue\\((\\(\\)? *\\(site=[a-z,_]*react_native\\(_ios\\)?_\\(oss\\|fb\\)[a-z,_]*\\)?)\\)?:? #[0-9]+ suppress_comment=\\(.\\|\n\\)*\\$FlowExpectedError [lints] sketchy-null-number=warn sketchy-null-mixed=warn sketchy-number=warn untyped-type-import=warn nonstrict-import=warn deprecated-type=warn unsafe-getters-setters=warn inexact-spread=warn unnecessary-invariant=warn signature-verification-failure=warn deprecated-utility=error [strict] deprecated-type nonstrict-import sketchy-null unclear-type unsafe-getters-setters untyped-import untyped-type-import [version] ^0.113.0 ================================================ FILE: example/.gitattributes ================================================ *.pbxproj -text ================================================ FILE: example/.gitignore ================================================ # OSX # .DS_Store # Xcode # build/ *.pbxuser !default.pbxuser *.mode1v3 !default.mode1v3 *.mode2v3 !default.mode2v3 *.perspectivev3 !default.perspectivev3 xcuserdata *.xccheckout *.moved-aside DerivedData *.hmap *.ipa *.xcuserstate # Android/IntelliJ # build/ .idea .gradle local.properties *.iml # node.js # node_modules/ npm-debug.log yarn-error.log # BUCK buck-out/ \.buckd/ *.keystore !debug.keystore # fastlane # # It is recommended to not store the screenshots in the git repo. Instead, use fastlane to re-generate the # screenshots whenever they are needed. # For more information about the recommended setup visit: # https://docs.fastlane.tools/best-practices/source-control/ */fastlane/report.xml */fastlane/Preview.html */fastlane/screenshots # Bundle artifact *.jsbundle # CocoaPods /ios/Pods/ ================================================ FILE: example/.prettierrc.js ================================================ module.exports = { bracketSpacing: false, jsxBracketSameLine: true, singleQuote: true, trailingComma: 'all', }; ================================================ FILE: example/.watchmanconfig ================================================ {} ================================================ FILE: example/App.js ================================================ import React, { Component } from 'react' import { View, Text } from 'react-native' import { RSA, RSAKeychain } from 'react-native-rsa-native'; let secret = 'secret message'; let keyTag = 'com.domain.mykey'; const generateKeys4096Demo = async () => { console.log('generateKeys4096Demo') const keys = await RSA.generateKeys(4096) console.log('4096 private:', keys.private) // the private key console.log('4096 public:', keys.public) // the public key const encodedMessage = await RSA.encrypt('4096', keys.public) console.log('4096 encoded message:', encodedMessage) const message = await RSA.decrypt(encodedMessage, keys.private) console.log('4096 decoded message:', message); } const generateDemo = async () => { console.log('generateDemo') const keys = await RSA.generate() console.log('private:', keys.private) // the private key console.log('public:', keys.public) // the public key const encodedMessage = await RSA.encrypt('1234', keys.public) console.log('encoded message:', encodedMessage) const message = await RSA.decrypt(encodedMessage, keys.private) console.log('decoded message:', message); } const signDemo = async () => { console.log('signDemo') const keys = await RSA.generate() const signature = await RSA.sign(secret, keys.private) console.log('signature', signature); const valid = await RSA.verify(signature, secret, keys.public) console.log('verified', valid); try { await RSA.verify(signature, "wrong message", keys.public) console.log("NOTE!! Something went wrong, verify should have been failed") } catch (err) { console.log('verify fails correctly: ', err); } } const signAlgoDemo = async () => { console.log('signAlgoDemo') const keys = await RSA.generate() const signature = await RSA.signWithAlgorithm(secret, keys.private, RSA.SHA256withRSA) console.log('signature', signature); const valid = await RSA.verifyWithAlgorithm(signature, secret, keys.public, RSA.SHA256withRSA) console.log('verified', valid); try { await RSA.verifyWithAlgorithm(signature, "wrong message", keys.public, RSA.SHA256withRSA) console.log("NOTE!! Something went wrong, verify should have been failed") } catch (err) { console.log('verify fails correctly: ', err); } } const iosDemo = async () => { const iosPkcs1PrivateKey = `-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEA9nH5sqTOfSns7op8NHD2nHuXt/j1rodcbb7MXVSeK+0jx6np o2Oidc6J1fxSi5xBpIhEo6eGQD+b0SQFQMe6k33kqfRk4vzNi5n4lzFWWoyVgHKi CYrk+JdSGX2BK0t52ca8ZASBs099jIjiL8Hk4PPdpjrUk0sHaXDDFzhmHy8XRbH1 21Pz148UytAnABxSO1F5gkGKvf23WyL0mb9kgfR9yX9wuCLtei8COT8Vz9l15nsc yPFCvC/mul6HTA7ukAXbtTS1wgRmorM2XTtnwpbMEpAwM48UhH7qcMFJVVagmpTI w0uFTXfYybJt8NysO1KslM7Yqswg5Aq36gxugwIDAQABAoIBABglu88uydLGyGHp LNlgljFoBMoweTY0KjDQqKqeb28jacWXFv789L6xUZ0nf5kRYvcxqPQWJpfmA6j+ 7ArYZyYriDvE6Bu7pJJAsHR0D5+Itd9jnA/uTZg0D4XS39SzrQlTKUNtk53TtJwQ D4WZbIlEK9wtWIXkLKI+u8brLkpwvBBcXrXUqBnqngJEBFKvr+utlzvnN6Ra9Kjw cpDCRkGvQyXav1rFwEe2pkaOnQ/r+y7lJqoT/+XyOjcTdkh2PhN7w9dHpGEmI6mL iQjbqEEXnAbyI1Cf753J1joLb5/+fVJ1DQiO8nMcpK+vzCRm5HNHgOG4KKjmQMRX NEGqoGkCgYEA/EJFi94JWgJaZ3r02EfG4TuIYQE0KIR/vn3iCdw6uGIclsgTwiuE z8OB1LWNvHzpiFfohESxrykflCjyATzExpqr2BpNlxyt0vp5RidggGKaiwjmbf1P 89uTYGWwI8LxCBTbU+s9cjDInx84aKUjzTFb4i1dwwcLntaNKceORnsCgYEA+hmh rBlsF1QNCH2FsQqoI6oSsSbMJBw/FTF8fyIvvLC8Yas25Ax73nerw1Kpc2AC9bbn XlzfwmEgYdMdu+biZzJpsD5LaplbkUw1IZvTKlHwIUg/C/QjfaN11YOx+sxgo8lh 2eFTGjnNjSwU943RmBckQGD7WEsc/Z0mJRzbPZkCgYEA+yh0m/y3LOH45tzaGNjm H+ypLYQITWsW0S/+tTiLUneE5W9RlNrFgiKzCni1JPzte22jOMY4byCvq1FVGnxJ oz/uZtxRcmoAe3Yc9wdPoqQKIPH8k3hJeY+eXbUBOannV9eERDqMVDxUE3H/NNlv GubRCBGJMBu8qyoNJJLmii8CgYEAtKo7XcTnjlqLJ6z1HJUkLM84vXvXT+aPs1GS K4yYi2foTW2PM2HJQUWVcH2QJuYefT1pGYNhqFrdN414FzqMJhwGuOfnNtQdj3JL l0GnYxTZsFEuKgZsdN/VyS1fLlrhHK/m3aulinZjBC3p34I0+/cLmu3z4y4vfQ0+ duTHg1ECgYB98Z0eCi/ct+m+B3YhCEdcXUzvIZY0sEJUlqIiGyxkLuVEdIPIFUqj f1+VVZQA0d6BwruDSptq8x5aR3rdAlb5A71NYWQGOIPa2E5SIFZmzrZjyeeCfyB8 eMOrE2W6flCRaTDOH4kFuw4JqrymBLcgP/OTYO0T9MCOKeqP0wbyNg== -----END RSA PRIVATE KEY-----` const iosEncodedMessage = `xW7YdqRZPxMjUydRuY/bWO78Jvz/GM9qx+0soQEsheqfs+5nLugkBXiJC9J6if3j oCH/uBLYC41X6tlpX/L/u+ujaYQTIRcnL1f74ZFcX8Ox1vTp47Ie5XteRcLbuAmk vOzQ41q/ddUe8co67ShuiTmwI3Q4bUNukHEkwcpbD20JllKRR3wfYCoej05O29Xj 9QuO0gKjEis5le6dWrMuVQVT70rBZQkAoBAesSjEYw0LKKjyylpUHmNy7y1XNbb2 LA8kC70ZvNWYL+cIU2ZKts9HYtTbIAonL91uP6Bf+M0uUkqc2zxEL9EpFmwGx3Q0 JQUqPQPB+wHb7DlDFJdQ6A==` const message = await RSA.decrypt(iosEncodedMessage, iosPkcs1PrivateKey) console.log('ios decoded message:', message); } const androidDemo = async () => { const androidPkcs1PrivateKey = `-----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEAx+Wc5/pZQFLxisjb5TbkVKzm1y/q/JbVZ4kq9D8isFI6GimQ yF7y8gdmq4YPblCfnUIlFFbdWsbUX8dW6nLEmWQhqHheLOybHfrv/YaSUZzlmUav qNYAv5xm3/F7rAeFjZN5fVpATdLl3AlhxBckxwZe2Z0AdEuOdUGDbdBwGoWrfCLv r3wWSZfJ0we+DfK76WGDFdK/5jSm9yQePTmY1Hc/QkaULadFtZn/O5xl3uyS768i MEo+Zt6/6863ej6WJekvZ3XKUr/Sqvw+b8nzEyH7RCnFvDgXK7LMe+Tc6HdNaTeV w3nE2pQqqTx8LCNhj4HsobQi3ndgYuOJM0O0wQIDAQABAoIBAQDAPCd9y3rjaiCR eAJIV1aTu8cvMAzKpn9J11awlrrUV+86U7jBiNYYPVfWIdFbJDurbv3bpoGvF8EK 7te+FWrNnMbljgP7LfsqhLUg2baCt+DxW1H4iv0jR9SDDmcBlCYydZ2DGDT44pVc 2sTjX+JlZ9H1cpAKRtMUHlG3XJlCVo+JnaslzWIfk0Itzd55ntTm4bXEgZ9j3+79 eyoHgnY3LWTrIYDlHwS9ypYdLEbyCf89MP+VFDADjs1CTr31WzuVkKKUXvxATgfq CZhxHgZgHgvAvWRGQnqwIo6uMBBCD1DsAxj9MG7AI0+1F6wiMGyBEQ1agxZST2W4 wb6UVpsxAoGBAPUZJ1zjPGiCxCNdaOWB3oPyL/6o9azQsyR4GEoGUjDdCDU9zKys WQn63f83jN9dZvNH68Dc3sb0k5Ip1TSqqdIKJA8Ms1GAEsHSMQAM6euGn6D4PdqU JPqwqIcQkaPIY/zEkfuh7J8U9p7WpicHz/WNfqsY2kFBzdpjNO6AmWGNAoGBANDJ xItF+Rd9x8lWrD6xf/U2vTLai4EZF1piLo5Tu7BwqHg8BlXpn4dBvefMxuDSELJ+ WfNwgwyrNaCM0Rs7hlnF+V6kuFr4lJJgORp578NhvncLGfrxQrVlTt1pablh+iTD 8IT2o9NEzgiRxjq3Qxo+iVprX0tfoz1UwqLYgEEFAoGBAM3HC5xaEEqyl1gVwc8H BToEaTVGx9UK94zD46iqu/DYcl64/xFuNedCH4Z6LiUOdzQECzRGfCfQCeHqi12H d8KnzvRvtlHT1Gu0PH2NWgvrYDQ2lz/fp1huX1/eklhPE1uR8fqxTUeWwyRClQcp 8Ph5joK5/+xQAjO7nSItCBm1AoGAFblYtPET6OjSd9WH2IIZgUcvynHI4CbfMi1T EMYPml0uekwskJXdXnJtswewjcXtrNTOwTCswg2yZ8EfJMk9wmuB9eIHuJdyxgQz DNkxJFAwRCyoiF7ABSXEXe9Q69QQ9fBZP0x2YU4gbe3VBVj6J2noWrsfUDVkQ8Zk 9hK2zY0CgYBiMwbP0nafeaB+YO9v2mvwHeCAnFtBsVZkUVp75alsAujr/YEKSKEQ YiFzbWLAkY7gBrS2b8tbHKXkkYfcWWlpM85ir/uqyNy/6Rb7CPkKUkCInIwZ9Vi2 clP6STevOnNTlyYhNgesy50tSPJEWO6ysC/petudc5t1e1FEM/pBkg== -----END RSA PRIVATE KEY-----` const androidEncodedMessage = `Z3iPkJiJCrXLaT11RtwBuSJa4rGbJ7JfDSHMNn/UaLUnGIzFmMT6ZRMtaSmWJhw3pXBES1IqufJB Wk5vdZuDD7o5AP8i5GHrgVGbf6ix6DIH1+PiJzcfwBcSdEuCMEsustk+tBirK/HuxYt0HQV3B8Sw EFAFOAPh3y2CsSC7Ibn5Q5cWeDYxfs8XANezs0H3i/X+KZP8owIrKnsERErc0E6bJ/V3tGCoFb+5 m0SibGo5B446iH57hTHf3Sv6GYcThk5+BqP/08VVQ2YXy+oMPng2nVnvzGONdJzfq+9GAKWMx6CE yiSiGz7AYGDb04FmekL8KqEKy6nTlVERlbwWRg==` const message = await RSA.decrypt(androidEncodedMessage, androidPkcs1PrivateKey) console.log('android decoded message:', message); } const keychainDemo = async () => { const keys = await RSAKeychain.generate(keyTag) console.log(keys.public); console.log(secret); const encodedMessage = await RSAKeychain.encrypt(secret, keyTag) console.log(encodedMessage); const message = await RSAKeychain.decrypt(encodedMessage, keyTag) console.log(message); const signature = await RSAKeychain.sign(secret, keyTag) console.log('signature', signature); const valid = await RSAKeychain.verify(signature, secret, keyTag) console.log('verified', valid); const publicKey = await RSAKeychain.getPublicKey(keyTag) console.log('getPublicKey', publicKey) const success = await RSAKeychain.deletePrivateKey(keyTag) console.log('delete success', success) } const runDemos = async () => { await generateKeys4096Demo() await generateDemo() await signDemo() await signAlgoDemo() await iosDemo() await androidDemo() await keychainDemo() } runDemos().then() class App extends Component { render () { return ( Demo ) } } export default App ================================================ FILE: example/__tests__/App-test.js ================================================ /** * @format */ import 'react-native'; import React from 'react'; import App from '../App'; // Note: test renderer must be required after react-native. import renderer from 'react-test-renderer'; it('renders correctly', () => { renderer.create(); }); ================================================ FILE: example/android/app/BUCK ================================================ # To learn about Buck see [Docs](https://buckbuild.com/). # To run your application with Buck: # - install Buck # - `npm start` - to start the packager # - `cd android` # - `keytool -genkey -v -keystore keystores/debug.keystore -storepass android -alias androiddebugkey -keypass android -dname "CN=Android Debug,O=Android,C=US"` # - `./gradlew :app:copyDownloadableDepsToLibs` - make all Gradle compile dependencies available to Buck # - `buck install -r android/app` - compile, install and run application # load(":build_defs.bzl", "create_aar_targets", "create_jar_targets") lib_deps = [] create_aar_targets(glob(["libs/*.aar"])) create_jar_targets(glob(["libs/*.jar"])) android_library( name = "all-libs", exported_deps = lib_deps, ) android_library( name = "app-code", srcs = glob([ "src/main/java/**/*.java", ]), deps = [ ":all-libs", ":build_config", ":res", ], ) android_build_config( name = "build_config", package = "com.example", ) android_resource( name = "res", package = "com.example", res = "src/main/res", ) android_binary( name = "app", keystore = "//android/keystores:debug", manifest = "src/main/AndroidManifest.xml", package_type = "debug", deps = [ ":app-code", ], ) ================================================ FILE: example/android/app/build.gradle ================================================ apply plugin: "com.android.application" import com.android.build.OutputFile /** * The react.gradle file registers a task for each build variant (e.g. bundleDebugJsAndAssets * and bundleReleaseJsAndAssets). * These basically call `react-native bundle` with the correct arguments during the Android build * cycle. By default, bundleDebugJsAndAssets is skipped, as in debug/dev mode we prefer to load the * bundle directly from the development server. Below you can see all the possible configurations * and their defaults. If you decide to add a configuration block, make sure to add it before the * `apply from: "../../node_modules/react-native/react.gradle"` line. * * project.ext.react = [ * // the name of the generated asset file containing your JS bundle * bundleAssetName: "index.android.bundle", * * // the entry file for bundle generation. If none specified and * // "index.android.js" exists, it will be used. Otherwise "index.js" is * // default. Can be overridden with ENTRY_FILE environment variable. * entryFile: "index.android.js", * * // https://facebook.github.io/react-native/docs/performance#enable-the-ram-format * bundleCommand: "ram-bundle", * * // whether to bundle JS and assets in debug mode * bundleInDebug: false, * * // whether to bundle JS and assets in release mode * bundleInRelease: true, * * // whether to bundle JS and assets in another build variant (if configured). * // See http://tools.android.com/tech-docs/new-build-system/user-guide#TOC-Build-Variants * // The configuration property can be in the following formats * // 'bundleIn${productFlavor}${buildType}' * // 'bundleIn${buildType}' * // bundleInFreeDebug: true, * // bundleInPaidRelease: true, * // bundleInBeta: true, * * // whether to disable dev mode in custom build variants (by default only disabled in release) * // for example: to disable dev mode in the staging build type (if configured) * devDisabledInStaging: true, * // The configuration property can be in the following formats * // 'devDisabledIn${productFlavor}${buildType}' * // 'devDisabledIn${buildType}' * * // the root of your project, i.e. where "package.json" lives * root: "../../", * * // where to put the JS bundle asset in debug mode * jsBundleDirDebug: "$buildDir/intermediates/assets/debug", * * // where to put the JS bundle asset in release mode * jsBundleDirRelease: "$buildDir/intermediates/assets/release", * * // where to put drawable resources / React Native assets, e.g. the ones you use via * // require('./image.png')), in debug mode * resourcesDirDebug: "$buildDir/intermediates/res/merged/debug", * * // where to put drawable resources / React Native assets, e.g. the ones you use via * // require('./image.png')), in release mode * resourcesDirRelease: "$buildDir/intermediates/res/merged/release", * * // by default the gradle tasks are skipped if none of the JS files or assets change; this means * // that we don't look at files in android/ or ios/ to determine whether the tasks are up to * // date; if you have any other folders that you want to ignore for performance reasons (gradle * // indexes the entire tree), add them here. Alternatively, if you have JS files in android/ * // for example, you might want to remove it from here. * inputExcludes: ["android/**", "ios/**"], * * // override which node gets called and with what additional arguments * nodeExecutableAndArgs: ["node"], * * // supply additional arguments to the packager * extraPackagerArgs: [] * ] */ project.ext.react = [ enableHermes: false, // clean and rebuild if changing ] apply from: "../../node_modules/react-native/react.gradle" /** * Set this to true to create two separate APKs instead of one: * - An APK that only works on ARM devices * - An APK that only works on x86 devices * The advantage is the size of the APK is reduced by about 4MB. * Upload all the APKs to the Play Store and people will download * the correct one based on the CPU architecture of their device. */ def enableSeparateBuildPerCPUArchitecture = false /** * Run Proguard to shrink the Java bytecode in release builds. */ def enableProguardInReleaseBuilds = false /** * The preferred build flavor of JavaScriptCore. * * For example, to use the international variant, you can use: * `def jscFlavor = 'org.webkit:android-jsc-intl:+'` * * The international variant includes ICU i18n library and necessary data * allowing to use e.g. `Date.toLocaleString` and `String.localeCompare` that * give correct results when using with locales other than en-US. Note that * this variant is about 6MiB larger per architecture than default. */ def jscFlavor = 'org.webkit:android-jsc:+' /** * Whether to enable the Hermes VM. * * This should be set on project.ext.react and mirrored here. If it is not set * on project.ext.react, JavaScript will not be compiled to Hermes Bytecode * and the benefits of using Hermes will therefore be sharply reduced. */ def enableHermes = project.ext.react.get("enableHermes", false); android { compileSdkVersion rootProject.ext.compileSdkVersion compileOptions { sourceCompatibility JavaVersion.VERSION_1_8 targetCompatibility JavaVersion.VERSION_1_8 } defaultConfig { applicationId "com.example" minSdkVersion rootProject.ext.minSdkVersion targetSdkVersion rootProject.ext.targetSdkVersion versionCode 1 versionName "1.0" } splits { abi { reset() enable enableSeparateBuildPerCPUArchitecture universalApk false // If true, also generate a universal APK include "armeabi-v7a", "x86", "arm64-v8a", "x86_64" } } signingConfigs { debug { storeFile file('debug.keystore') storePassword 'android' keyAlias 'androiddebugkey' keyPassword 'android' } } buildTypes { debug { signingConfig signingConfigs.debug } release { // Caution! In production, you need to generate your own keystore file. // see https://facebook.github.io/react-native/docs/signed-apk-android. signingConfig signingConfigs.debug minifyEnabled enableProguardInReleaseBuilds proguardFiles getDefaultProguardFile("proguard-android.txt"), "proguard-rules.pro" } } packagingOptions { pickFirst "lib/armeabi-v7a/libc++_shared.so" pickFirst "lib/arm64-v8a/libc++_shared.so" pickFirst "lib/x86/libc++_shared.so" pickFirst "lib/x86_64/libc++_shared.so" } // applicationVariants are e.g. debug, release applicationVariants.all { variant -> variant.outputs.each { output -> // For each separate APK per architecture, set a unique version code as described here: // https://developer.android.com/studio/build/configure-apk-splits.html def versionCodes = ["armeabi-v7a": 1, "x86": 2, "arm64-v8a": 3, "x86_64": 4] def abi = output.getFilter(OutputFile.ABI) if (abi != null) { // null for the universal-debug, universal-release variants output.versionCodeOverride = versionCodes.get(abi) * 1048576 + defaultConfig.versionCode } } } } dependencies { implementation fileTree(dir: "libs", include: ["*.jar"]) //noinspection GradleDynamicVersion implementation "com.facebook.react:react-native:+" // From node_modules implementation "androidx.swiperefreshlayout:swiperefreshlayout:1.0.0" debugImplementation("com.facebook.flipper:flipper:${FLIPPER_VERSION}") { exclude group:'com.facebook.fbjni' } debugImplementation("com.facebook.flipper:flipper-network-plugin:${FLIPPER_VERSION}") { exclude group:'com.facebook.flipper' } debugImplementation("com.facebook.flipper:flipper-fresco-plugin:${FLIPPER_VERSION}") { exclude group:'com.facebook.flipper' } if (enableHermes) { def hermesPath = "../../node_modules/hermes-engine/android/"; debugImplementation files(hermesPath + "hermes-debug.aar") releaseImplementation files(hermesPath + "hermes-release.aar") } else { implementation jscFlavor } } // Run this once to be able to run the application with BUCK // puts all compile dependencies into folder libs for BUCK to use task copyDownloadableDepsToLibs(type: Copy) { from configurations.compile into 'libs' } apply from: file("../../node_modules/@react-native-community/cli-platform-android/native_modules.gradle"); applyNativeModulesAppBuildGradle(project) ================================================ FILE: example/android/app/build_defs.bzl ================================================ """Helper definitions to glob .aar and .jar targets""" def create_aar_targets(aarfiles): for aarfile in aarfiles: name = "aars__" + aarfile[aarfile.rindex("/") + 1:aarfile.rindex(".aar")] lib_deps.append(":" + name) android_prebuilt_aar( name = name, aar = aarfile, ) def create_jar_targets(jarfiles): for jarfile in jarfiles: name = "jars__" + jarfile[jarfile.rindex("/") + 1:jarfile.rindex(".jar")] lib_deps.append(":" + name) prebuilt_jar( name = name, binary_jar = jarfile, ) ================================================ FILE: example/android/app/proguard-rules.pro ================================================ # Add project specific ProGuard rules here. # By default, the flags in this file are appended to flags specified # in /usr/local/Cellar/android-sdk/24.3.3/tools/proguard/proguard-android.txt # You can edit the include path and order by changing the proguardFiles # directive in build.gradle. # # For more details, see # http://developer.android.com/guide/developing/tools/proguard.html # Add any project specific keep options here: ================================================ FILE: example/android/app/src/debug/AndroidManifest.xml ================================================ ================================================ FILE: example/android/app/src/debug/java/com/example/ReactNativeFlipper.java ================================================ /** * Copyright (c) Facebook, Inc. and its affiliates. * *

This source code is licensed under the MIT license found in the LICENSE file in the root * directory of this source tree. */ package com.example; import android.content.Context; import com.facebook.flipper.android.AndroidFlipperClient; import com.facebook.flipper.android.utils.FlipperUtils; import com.facebook.flipper.core.FlipperClient; import com.facebook.flipper.plugins.crashreporter.CrashReporterPlugin; import com.facebook.flipper.plugins.databases.DatabasesFlipperPlugin; import com.facebook.flipper.plugins.fresco.FrescoFlipperPlugin; import com.facebook.flipper.plugins.inspector.DescriptorMapping; import com.facebook.flipper.plugins.inspector.InspectorFlipperPlugin; import com.facebook.flipper.plugins.network.FlipperOkhttpInterceptor; import com.facebook.flipper.plugins.network.NetworkFlipperPlugin; import com.facebook.flipper.plugins.react.ReactFlipperPlugin; import com.facebook.flipper.plugins.sharedpreferences.SharedPreferencesFlipperPlugin; import com.facebook.react.ReactInstanceManager; import com.facebook.react.bridge.ReactContext; import com.facebook.react.modules.network.NetworkingModule; import okhttp3.OkHttpClient; public class ReactNativeFlipper { public static void initializeFlipper(Context context, ReactInstanceManager reactInstanceManager) { if (FlipperUtils.shouldEnableFlipper(context)) { final FlipperClient client = AndroidFlipperClient.getInstance(context); client.addPlugin(new InspectorFlipperPlugin(context, DescriptorMapping.withDefaults())); client.addPlugin(new ReactFlipperPlugin()); client.addPlugin(new DatabasesFlipperPlugin(context)); client.addPlugin(new SharedPreferencesFlipperPlugin(context)); client.addPlugin(CrashReporterPlugin.getInstance()); NetworkFlipperPlugin networkFlipperPlugin = new NetworkFlipperPlugin(); NetworkingModule.setCustomClientBuilder( new NetworkingModule.CustomClientBuilder() { @Override public void apply(OkHttpClient.Builder builder) { builder.addNetworkInterceptor(new FlipperOkhttpInterceptor(networkFlipperPlugin)); } }); client.addPlugin(networkFlipperPlugin); client.start(); // Fresco Plugin needs to ensure that ImagePipelineFactory is initialized // Hence we run if after all native modules have been initialized ReactContext reactContext = reactInstanceManager.getCurrentReactContext(); if (reactContext == null) { reactInstanceManager.addReactInstanceEventListener( new ReactInstanceManager.ReactInstanceEventListener() { @Override public void onReactContextInitialized(ReactContext reactContext) { reactInstanceManager.removeReactInstanceEventListener(this); reactContext.runOnNativeModulesQueueThread( new Runnable() { @Override public void run() { client.addPlugin(new FrescoFlipperPlugin()); } }); } }); } else { client.addPlugin(new FrescoFlipperPlugin()); } } } } ================================================ FILE: example/android/app/src/main/AndroidManifest.xml ================================================ ================================================ FILE: example/android/app/src/main/java/com/example/MainActivity.java ================================================ package com.example; import com.facebook.react.ReactActivity; public class MainActivity extends ReactActivity { /** * Returns the name of the main component registered from JavaScript. This is used to schedule * rendering of the component. */ @Override protected String getMainComponentName() { return "example"; } } ================================================ FILE: example/android/app/src/main/java/com/example/MainApplication.java ================================================ package com.example; import android.app.Application; import android.content.Context; import com.facebook.react.PackageList; import com.facebook.react.ReactApplication; import com.RNRSA.RNRSAPackage; import com.facebook.react.ReactInstanceManager; import com.facebook.react.ReactNativeHost; import com.facebook.react.ReactPackage; import com.facebook.soloader.SoLoader; import java.lang.reflect.InvocationTargetException; import java.util.List; public class MainApplication extends Application implements ReactApplication { private final ReactNativeHost mReactNativeHost = new ReactNativeHost(this) { @Override public boolean getUseDeveloperSupport() { return BuildConfig.DEBUG; } @Override protected List getPackages() { @SuppressWarnings("UnnecessaryLocalVariable") List packages = new PackageList(this).getPackages(); // Packages that cannot be autolinked yet can be added manually here, for example: // packages.add(new MyReactNativePackage()); return packages; } @Override protected String getJSMainModuleName() { return "index"; } }; @Override public ReactNativeHost getReactNativeHost() { return mReactNativeHost; } @Override public void onCreate() { super.onCreate(); SoLoader.init(this, /* native exopackage */ false); initializeFlipper(this, getReactNativeHost().getReactInstanceManager()); } /** * Loads Flipper in React Native templates. Call this in the onCreate method with something like * initializeFlipper(this, getReactNativeHost().getReactInstanceManager()); * * @param context * @param reactInstanceManager */ private static void initializeFlipper( Context context, ReactInstanceManager reactInstanceManager) { if (BuildConfig.DEBUG) { try { /* We use reflection here to pick up the class that initializes Flipper, since Flipper library is not available in release mode */ Class aClass = Class.forName("com.example.ReactNativeFlipper"); aClass .getMethod("initializeFlipper", Context.class, ReactInstanceManager.class) .invoke(null, context, reactInstanceManager); } catch (ClassNotFoundException e) { e.printStackTrace(); } catch (NoSuchMethodException e) { e.printStackTrace(); } catch (IllegalAccessException e) { e.printStackTrace(); } catch (InvocationTargetException e) { e.printStackTrace(); } } } } ================================================ FILE: example/android/app/src/main/res/values/strings.xml ================================================ example ================================================ FILE: example/android/app/src/main/res/values/styles.xml ================================================ ================================================ FILE: example/android/build.gradle ================================================ // Top-level build file where you can add configuration options common to all sub-projects/modules. buildscript { ext { buildToolsVersion = "28.0.3" minSdkVersion = 16 compileSdkVersion = 28 targetSdkVersion = 28 } repositories { google() jcenter() } dependencies { classpath("com.android.tools.build:gradle:3.5.2") // NOTE: Do not place your application dependencies here; they belong // in the individual module build.gradle files } } allprojects { repositories { mavenLocal() maven { // All of React Native (JS, Obj-C sources, Android binaries) is installed from npm url("$rootDir/../node_modules/react-native/android") } maven { // Android JSC is installed from npm url("$rootDir/../node_modules/jsc-android/dist") } google() jcenter() maven { url 'https://www.jitpack.io' } } } ================================================ FILE: example/android/gradle/wrapper/gradle-wrapper.properties ================================================ distributionBase=GRADLE_USER_HOME distributionPath=wrapper/dists distributionUrl=https\://services.gradle.org/distributions/gradle-6.0.1-all.zip zipStoreBase=GRADLE_USER_HOME zipStorePath=wrapper/dists ================================================ FILE: example/android/gradle.properties ================================================ # Project-wide Gradle settings. # IDE (e.g. Android Studio) users: # Gradle settings configured through the IDE *will override* # any settings specified in this file. # For more details on how to configure your build environment visit # http://www.gradle.org/docs/current/userguide/build_environment.html # Specifies the JVM arguments used for the daemon process. # The setting is particularly useful for tweaking memory settings. # Default value: -Xmx10248m -XX:MaxPermSize=256m # org.gradle.jvmargs=-Xmx2048m -XX:MaxPermSize=512m -XX:+HeapDumpOnOutOfMemoryError -Dfile.encoding=UTF-8 # When configured, Gradle will run in incubating parallel mode. # This option should only be used with decoupled projects. More details, visit # http://www.gradle.org/docs/current/userguide/multi_project_builds.html#sec:decoupled_projects # org.gradle.parallel=true # AndroidX package structure to make it clearer which packages are bundled with the # Android operating system, and which are packaged with your app's APK # https://developer.android.com/topic/libraries/support-library/androidx-rn android.useAndroidX=true # Automatically convert third-party libraries to use AndroidX android.enableJetifier=true # Version of flipper SDK to use with React Native FLIPPER_VERSION=0.33.1 ================================================ FILE: example/android/gradlew ================================================ #!/usr/bin/env sh # # Copyright 2015 the original author or authors. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ############################################################################## ## ## Gradle start up script for UN*X ## ############################################################################## # Attempt to set APP_HOME # Resolve links: $0 may be a link PRG="$0" # Need this for relative symlinks. while [ -h "$PRG" ] ; do ls=`ls -ld "$PRG"` link=`expr "$ls" : '.*-> \(.*\)$'` if expr "$link" : '/.*' > /dev/null; then PRG="$link" else PRG=`dirname "$PRG"`"/$link" fi done SAVED="`pwd`" cd "`dirname \"$PRG\"`/" >/dev/null APP_HOME="`pwd -P`" cd "$SAVED" >/dev/null APP_NAME="Gradle" APP_BASE_NAME=`basename "$0"` # Add default JVM options here. You can also use JAVA_OPTS and GRADLE_OPTS to pass JVM options to this script. DEFAULT_JVM_OPTS='"-Xmx64m" "-Xms64m"' # Use the maximum available, or set MAX_FD != -1 to use that value. MAX_FD="maximum" warn () { echo "$*" } die () { echo echo "$*" echo exit 1 } # OS specific support (must be 'true' or 'false'). cygwin=false msys=false darwin=false nonstop=false case "`uname`" in CYGWIN* ) cygwin=true ;; Darwin* ) darwin=true ;; MINGW* ) msys=true ;; NONSTOP* ) nonstop=true ;; esac CLASSPATH=$APP_HOME/gradle/wrapper/gradle-wrapper.jar # Determine the Java command to use to start the JVM. if [ -n "$JAVA_HOME" ] ; then if [ -x "$JAVA_HOME/jre/sh/java" ] ; then # IBM's JDK on AIX uses strange locations for the executables JAVACMD="$JAVA_HOME/jre/sh/java" else JAVACMD="$JAVA_HOME/bin/java" fi if [ ! -x "$JAVACMD" ] ; then die "ERROR: JAVA_HOME is set to an invalid directory: $JAVA_HOME Please set the JAVA_HOME variable in your environment to match the location of your Java installation." fi else JAVACMD="java" which java >/dev/null 2>&1 || die "ERROR: JAVA_HOME is not set and no 'java' command could be found in your PATH. Please set the JAVA_HOME variable in your environment to match the location of your Java installation." fi # Increase the maximum file descriptors if we can. if [ "$cygwin" = "false" -a "$darwin" = "false" -a "$nonstop" = "false" ] ; then MAX_FD_LIMIT=`ulimit -H -n` if [ $? -eq 0 ] ; then if [ "$MAX_FD" = "maximum" -o "$MAX_FD" = "max" ] ; then MAX_FD="$MAX_FD_LIMIT" fi ulimit -n $MAX_FD if [ $? -ne 0 ] ; then warn "Could not set maximum file descriptor limit: $MAX_FD" fi else warn "Could not query maximum file descriptor limit: $MAX_FD_LIMIT" fi fi # For Darwin, add options to specify how the application appears in the dock if $darwin; then GRADLE_OPTS="$GRADLE_OPTS \"-Xdock:name=$APP_NAME\" \"-Xdock:icon=$APP_HOME/media/gradle.icns\"" fi # For Cygwin or MSYS, switch paths to Windows format before running java if [ "$cygwin" = "true" -o "$msys" = "true" ] ; then APP_HOME=`cygpath --path --mixed "$APP_HOME"` CLASSPATH=`cygpath --path --mixed "$CLASSPATH"` JAVACMD=`cygpath --unix "$JAVACMD"` # We build the pattern for arguments to be converted via cygpath ROOTDIRSRAW=`find -L / -maxdepth 1 -mindepth 1 -type d 2>/dev/null` SEP="" for dir in $ROOTDIRSRAW ; do ROOTDIRS="$ROOTDIRS$SEP$dir" SEP="|" done OURCYGPATTERN="(^($ROOTDIRS))" # Add a user-defined pattern to the cygpath arguments if [ "$GRADLE_CYGPATTERN" != "" ] ; then OURCYGPATTERN="$OURCYGPATTERN|($GRADLE_CYGPATTERN)" fi # Now convert the arguments - kludge to limit ourselves to /bin/sh i=0 for arg in "$@" ; do CHECK=`echo "$arg"|egrep -c "$OURCYGPATTERN" -` CHECK2=`echo "$arg"|egrep -c "^-"` ### Determine if an option if [ $CHECK -ne 0 ] && [ $CHECK2 -eq 0 ] ; then ### Added a condition eval `echo args$i`=`cygpath --path --ignore --mixed "$arg"` else eval `echo args$i`="\"$arg\"" fi i=$((i+1)) done case $i in (0) set -- ;; (1) set -- "$args0" ;; (2) set -- "$args0" "$args1" ;; (3) set -- "$args0" "$args1" "$args2" ;; (4) set -- "$args0" "$args1" "$args2" "$args3" ;; (5) set -- "$args0" "$args1" "$args2" "$args3" "$args4" ;; (6) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" ;; (7) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" ;; (8) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" "$args7" ;; (9) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" "$args7" "$args8" ;; esac fi # Escape application args save () { for i do printf %s\\n "$i" | sed "s/'/'\\\\''/g;1s/^/'/;\$s/\$/' \\\\/" ; done echo " " } APP_ARGS=$(save "$@") # Collect all arguments for the java command, following the shell quoting and substitution rules eval set -- $DEFAULT_JVM_OPTS $JAVA_OPTS $GRADLE_OPTS "\"-Dorg.gradle.appname=$APP_BASE_NAME\"" -classpath "\"$CLASSPATH\"" org.gradle.wrapper.GradleWrapperMain "$APP_ARGS" # by default we should be in the correct project dir, but when run from Finder on Mac, the cwd is wrong if [ "$(uname)" = "Darwin" ] && [ "$HOME" = "$PWD" ]; then cd "$(dirname "$0")" fi exec "$JAVACMD" "$@" ================================================ FILE: example/android/gradlew.bat ================================================ @rem @rem Copyright 2015 the original author or authors. @rem @rem Licensed under the Apache License, Version 2.0 (the "License"); @rem you may not use this file except in compliance with the License. @rem You may obtain a copy of the License at @rem @rem https://www.apache.org/licenses/LICENSE-2.0 @rem @rem Unless required by applicable law or agreed to in writing, software @rem distributed under the License is distributed on an "AS IS" BASIS, @rem WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. @rem See the License for the specific language governing permissions and @rem limitations under the License. @rem @if "%DEBUG%" == "" @echo off @rem ########################################################################## @rem @rem Gradle startup script for Windows @rem @rem ########################################################################## @rem Set local scope for the variables with windows NT shell if "%OS%"=="Windows_NT" setlocal set DIRNAME=%~dp0 if "%DIRNAME%" == "" set DIRNAME=. set APP_BASE_NAME=%~n0 set APP_HOME=%DIRNAME% @rem Add default JVM options here. You can also use JAVA_OPTS and GRADLE_OPTS to pass JVM options to this script. set DEFAULT_JVM_OPTS="-Xmx64m" "-Xms64m" @rem Find java.exe if defined JAVA_HOME goto findJavaFromJavaHome set JAVA_EXE=java.exe %JAVA_EXE% -version >NUL 2>&1 if "%ERRORLEVEL%" == "0" goto init echo. echo ERROR: JAVA_HOME is not set and no 'java' command could be found in your PATH. echo. echo Please set the JAVA_HOME variable in your environment to match the echo location of your Java installation. goto fail :findJavaFromJavaHome set JAVA_HOME=%JAVA_HOME:"=% set JAVA_EXE=%JAVA_HOME%/bin/java.exe if exist "%JAVA_EXE%" goto init echo. echo ERROR: JAVA_HOME is set to an invalid directory: %JAVA_HOME% echo. echo Please set the JAVA_HOME variable in your environment to match the echo location of your Java installation. goto fail :init @rem Get command-line arguments, handling Windows variants if not "%OS%" == "Windows_NT" goto win9xME_args :win9xME_args @rem Slurp the command line arguments. set CMD_LINE_ARGS= set _SKIP=2 :win9xME_args_slurp if "x%~1" == "x" goto execute set CMD_LINE_ARGS=%* :execute @rem Setup the command line set CLASSPATH=%APP_HOME%\gradle\wrapper\gradle-wrapper.jar @rem Execute Gradle "%JAVA_EXE%" %DEFAULT_JVM_OPTS% %JAVA_OPTS% %GRADLE_OPTS% "-Dorg.gradle.appname=%APP_BASE_NAME%" -classpath "%CLASSPATH%" org.gradle.wrapper.GradleWrapperMain %CMD_LINE_ARGS% :end @rem End local scope for the variables with windows NT shell if "%ERRORLEVEL%"=="0" goto mainEnd :fail rem Set variable GRADLE_EXIT_CONSOLE if you need the _script_ return code instead of rem the _cmd.exe /c_ return code! if not "" == "%GRADLE_EXIT_CONSOLE%" exit 1 exit /b 1 :mainEnd if "%OS%"=="Windows_NT" endlocal :omega ================================================ FILE: example/android/settings.gradle ================================================ rootProject.name = 'example' include ':react-native-rsa-native' project(':react-native-rsa-native').projectDir = new File(rootProject.projectDir, '../node_modules/react-native-rsa-native/android') apply from: file("../node_modules/@react-native-community/cli-platform-android/native_modules.gradle"); applyNativeModulesSettingsGradle(settings) include ':app' ================================================ FILE: example/app.json ================================================ { "name": "example", "displayName": "example" } ================================================ FILE: example/babel.config.js ================================================ module.exports = { presets: ['module:metro-react-native-babel-preset'], }; ================================================ FILE: example/index.js ================================================ /** * @format */ import {AppRegistry} from 'react-native'; import App from './App'; import {name as appName} from './app.json'; AppRegistry.registerComponent(appName, () => App); ================================================ FILE: example/ios/Podfile ================================================ platform :ios, '10.0' require_relative '../node_modules/@react-native-community/cli-platform-ios/native_modules' def add_flipper_pods!(versions = {}) versions['Flipper'] ||= '~> 0.33.1' versions['DoubleConversion'] ||= '1.1.7' versions['Flipper-Folly'] ||= '~> 2.1' versions['Flipper-Glog'] ||= '0.3.6' versions['Flipper-PeerTalk'] ||= '~> 0.0.4' versions['Flipper-RSocket'] ||= '~> 1.0' pod 'FlipperKit', versions['Flipper'], :configuration => 'Debug' pod 'FlipperKit/FlipperKitLayoutPlugin', versions['Flipper'], :configuration => 'Debug' pod 'FlipperKit/SKIOSNetworkPlugin', versions['Flipper'], :configuration => 'Debug' pod 'FlipperKit/FlipperKitUserDefaultsPlugin', versions['Flipper'], :configuration => 'Debug' pod 'FlipperKit/FlipperKitReactPlugin', versions['Flipper'], :configuration => 'Debug' # List all transitive dependencies for FlipperKit pods # to avoid them being linked in Release builds pod 'Flipper', versions['Flipper'], :configuration => 'Debug' pod 'Flipper-DoubleConversion', versions['DoubleConversion'], :configuration => 'Debug' pod 'Flipper-Folly', versions['Flipper-Folly'], :configuration => 'Debug' pod 'Flipper-Glog', versions['Flipper-Glog'], :configuration => 'Debug' pod 'Flipper-PeerTalk', versions['Flipper-PeerTalk'], :configuration => 'Debug' pod 'Flipper-RSocket', versions['Flipper-RSocket'], :configuration => 'Debug' pod 'FlipperKit/Core', versions['Flipper'], :configuration => 'Debug' pod 'FlipperKit/CppBridge', versions['Flipper'], :configuration => 'Debug' pod 'FlipperKit/FBCxxFollyDynamicConvert', versions['Flipper'], :configuration => 'Debug' pod 'FlipperKit/FBDefines', versions['Flipper'], :configuration => 'Debug' pod 'FlipperKit/FKPortForwarding', versions['Flipper'], :configuration => 'Debug' pod 'FlipperKit/FlipperKitHighlightOverlay', versions['Flipper'], :configuration => 'Debug' pod 'FlipperKit/FlipperKitLayoutTextSearchable', versions['Flipper'], :configuration => 'Debug' pod 'FlipperKit/FlipperKitNetworkPlugin', versions['Flipper'], :configuration => 'Debug' end # Post Install processing for Flipper def flipper_post_install(installer) installer.pods_project.targets.each do |target| if target.name == 'YogaKit' target.build_configurations.each do |config| config.build_settings['SWIFT_VERSION'] = '4.1' end end end end target 'example' do # Pods for example pod 'FBLazyVector', :path => "../node_modules/react-native/Libraries/FBLazyVector" pod 'FBReactNativeSpec', :path => "../node_modules/react-native/Libraries/FBReactNativeSpec" pod 'RCTRequired', :path => "../node_modules/react-native/Libraries/RCTRequired" pod 'RCTTypeSafety', :path => "../node_modules/react-native/Libraries/TypeSafety" pod 'React', :path => '../node_modules/react-native/' pod 'React-Core', :path => '../node_modules/react-native/' pod 'React-CoreModules', :path => '../node_modules/react-native/React/CoreModules' pod 'React-Core/DevSupport', :path => '../node_modules/react-native/' pod 'React-RCTActionSheet', :path => '../node_modules/react-native/Libraries/ActionSheetIOS' pod 'React-RCTAnimation', :path => '../node_modules/react-native/Libraries/NativeAnimation' pod 'React-RCTBlob', :path => '../node_modules/react-native/Libraries/Blob' pod 'React-RCTImage', :path => '../node_modules/react-native/Libraries/Image' pod 'React-RCTLinking', :path => '../node_modules/react-native/Libraries/LinkingIOS' pod 'React-RCTNetwork', :path => '../node_modules/react-native/Libraries/Network' pod 'React-RCTSettings', :path => '../node_modules/react-native/Libraries/Settings' pod 'React-RCTText', :path => '../node_modules/react-native/Libraries/Text' pod 'React-RCTVibration', :path => '../node_modules/react-native/Libraries/Vibration' pod 'React-Core/RCTWebSocket', :path => '../node_modules/react-native/' pod 'React-cxxreact', :path => '../node_modules/react-native/ReactCommon/cxxreact' pod 'React-jsi', :path => '../node_modules/react-native/ReactCommon/jsi' pod 'React-jsiexecutor', :path => '../node_modules/react-native/ReactCommon/jsiexecutor' pod 'React-jsinspector', :path => '../node_modules/react-native/ReactCommon/jsinspector' pod 'ReactCommon/callinvoker', :path => "../node_modules/react-native/ReactCommon" pod 'ReactCommon/turbomodule/core', :path => "../node_modules/react-native/ReactCommon" pod 'Yoga', :path => '../node_modules/react-native/ReactCommon/yoga', :modular_headers => true pod 'DoubleConversion', :podspec => '../node_modules/react-native/third-party-podspecs/DoubleConversion.podspec' pod 'glog', :podspec => '../node_modules/react-native/third-party-podspecs/glog.podspec' pod 'Folly', :podspec => '../node_modules/react-native/third-party-podspecs/Folly.podspec' target 'exampleTests' do inherit! :complete # Pods for testing end use_native_modules! # Enables Flipper. # # Note that if you have use_frameworks! enabled, Flipper will not work and # you should disable these next few lines. add_flipper_pods! post_install do |installer| flipper_post_install(installer) end end target 'example-tvOS' do # Pods for example-tvOS target 'example-tvOSTests' do inherit! :search_paths # Pods for testing end end ================================================ FILE: example/ios/example/AppDelegate.h ================================================ #import #import @interface AppDelegate : UIResponder @property (nonatomic, strong) UIWindow *window; @end ================================================ FILE: example/ios/example/AppDelegate.m ================================================ #import "AppDelegate.h" #import #import #import #if DEBUG #import #import #import #import #import #import static void InitializeFlipper(UIApplication *application) { FlipperClient *client = [FlipperClient sharedClient]; SKDescriptorMapper *layoutDescriptorMapper = [[SKDescriptorMapper alloc] initWithDefaults]; [client addPlugin:[[FlipperKitLayoutPlugin alloc] initWithRootNode:application withDescriptorMapper:layoutDescriptorMapper]]; [client addPlugin:[[FKUserDefaultsPlugin alloc] initWithSuiteName:nil]]; [client addPlugin:[FlipperKitReactPlugin new]]; [client addPlugin:[[FlipperKitNetworkPlugin alloc] initWithNetworkAdapter:[SKIOSNetworkAdapter new]]]; [client start]; } #endif @implementation AppDelegate - (BOOL)application:(UIApplication *)application didFinishLaunchingWithOptions:(NSDictionary *)launchOptions { #if DEBUG InitializeFlipper(application); #endif RCTBridge *bridge = [[RCTBridge alloc] initWithDelegate:self launchOptions:launchOptions]; RCTRootView *rootView = [[RCTRootView alloc] initWithBridge:bridge moduleName:@"example" initialProperties:nil]; rootView.backgroundColor = [[UIColor alloc] initWithRed:1.0f green:1.0f blue:1.0f alpha:1]; self.window = [[UIWindow alloc] initWithFrame:[UIScreen mainScreen].bounds]; UIViewController *rootViewController = [UIViewController new]; rootViewController.view = rootView; self.window.rootViewController = rootViewController; [self.window makeKeyAndVisible]; return YES; } - (NSURL *)sourceURLForBridge:(RCTBridge *)bridge { #if DEBUG return [[RCTBundleURLProvider sharedSettings] jsBundleURLForBundleRoot:@"index" fallbackResource:nil]; #else return [[NSBundle mainBundle] URLForResource:@"main" withExtension:@"jsbundle"]; #endif } @end ================================================ FILE: example/ios/example/Base.lproj/LaunchScreen.xib ================================================ ================================================ FILE: example/ios/example/Images.xcassets/AppIcon.appiconset/Contents.json ================================================ { "images" : [ { "idiom" : "iphone", "size" : "29x29", "scale" : "2x" }, { "idiom" : "iphone", "size" : "29x29", "scale" : "3x" }, { "idiom" : "iphone", "size" : "40x40", "scale" : "2x" }, { "idiom" : "iphone", "size" : "40x40", "scale" : "3x" }, { "idiom" : "iphone", "size" : "60x60", "scale" : "2x" }, { "idiom" : "iphone", "size" : "60x60", "scale" : "3x" } ], "info" : { "version" : 1, "author" : "xcode" } } ================================================ FILE: example/ios/example/Images.xcassets/Contents.json ================================================ { "info" : { "version" : 1, "author" : "xcode" } } ================================================ FILE: example/ios/example/Info.plist ================================================ CFBundleDevelopmentRegion en CFBundleDisplayName example CFBundleExecutable $(EXECUTABLE_NAME) CFBundleIdentifier $(PRODUCT_BUNDLE_IDENTIFIER) CFBundleInfoDictionaryVersion 6.0 CFBundleName $(PRODUCT_NAME) CFBundlePackageType APPL CFBundleShortVersionString 1.0 CFBundleSignature ???? CFBundleVersion 1 LSRequiresIPhoneOS NSAppTransportSecurity NSAllowsArbitraryLoads NSExceptionDomains localhost NSExceptionAllowsInsecureHTTPLoads NSLocationWhenInUseUsageDescription UILaunchStoryboardName LaunchScreen UIRequiredDeviceCapabilities armv7 UISupportedInterfaceOrientations UIInterfaceOrientationPortrait UIInterfaceOrientationLandscapeLeft UIInterfaceOrientationLandscapeRight UIViewControllerBasedStatusBarAppearance ================================================ FILE: example/ios/example/main.m ================================================ #import #import "AppDelegate.h" int main(int argc, char * argv[]) { @autoreleasepool { return UIApplicationMain(argc, argv, nil, NSStringFromClass([AppDelegate class])); } } ================================================ FILE: example/ios/example-tvOS/Info.plist ================================================ CFBundleDevelopmentRegion en CFBundleExecutable $(EXECUTABLE_NAME) CFBundleIdentifier $(PRODUCT_BUNDLE_IDENTIFIER) CFBundleInfoDictionaryVersion 6.0 CFBundleName $(PRODUCT_NAME) CFBundlePackageType APPL CFBundleShortVersionString 1.0 CFBundleSignature ???? CFBundleVersion 1 LSRequiresIPhoneOS NSAppTransportSecurity NSExceptionDomains localhost NSExceptionAllowsInsecureHTTPLoads NSLocationWhenInUseUsageDescription UILaunchStoryboardName LaunchScreen UIRequiredDeviceCapabilities armv7 UISupportedInterfaceOrientations UIInterfaceOrientationPortrait UIInterfaceOrientationLandscapeLeft UIInterfaceOrientationLandscapeRight UIViewControllerBasedStatusBarAppearance ================================================ FILE: example/ios/example-tvOSTests/Info.plist ================================================ CFBundleDevelopmentRegion en CFBundleExecutable $(EXECUTABLE_NAME) CFBundleIdentifier org.reactjs.native.example.$(PRODUCT_NAME:rfc1034identifier) CFBundleInfoDictionaryVersion 6.0 CFBundleName $(PRODUCT_NAME) CFBundlePackageType BNDL CFBundleShortVersionString 1.0 CFBundleSignature ???? CFBundleVersion 1 ================================================ FILE: example/ios/example.xcodeproj/project.pbxproj ================================================ // !$*UTF8*$! { archiveVersion = 1; classes = { }; objectVersion = 46; objects = { /* Begin PBXBuildFile section */ 00E356F31AD99517003FC87E /* exampleTests.m in Sources */ = {isa = PBXBuildFile; fileRef = 00E356F21AD99517003FC87E /* exampleTests.m */; }; 13B07FBC1A68108700A75B9A /* AppDelegate.m in Sources */ = {isa = PBXBuildFile; fileRef = 13B07FB01A68108700A75B9A /* AppDelegate.m */; }; 13B07FBD1A68108700A75B9A /* LaunchScreen.xib in Resources */ = {isa = PBXBuildFile; fileRef = 13B07FB11A68108700A75B9A /* LaunchScreen.xib */; }; 13B07FBF1A68108700A75B9A /* Images.xcassets in Resources */ = {isa = PBXBuildFile; fileRef = 13B07FB51A68108700A75B9A /* Images.xcassets */; }; 13B07FC11A68108700A75B9A /* main.m in Sources */ = {isa = PBXBuildFile; fileRef = 13B07FB71A68108700A75B9A /* main.m */; }; 2D02E4BC1E0B4A80006451C7 /* AppDelegate.m in Sources */ = {isa = PBXBuildFile; fileRef = 13B07FB01A68108700A75B9A /* AppDelegate.m */; }; 2D02E4BD1E0B4A84006451C7 /* Images.xcassets in Resources */ = {isa = PBXBuildFile; fileRef = 13B07FB51A68108700A75B9A /* Images.xcassets */; }; 2D02E4BF1E0B4AB3006451C7 /* main.m in Sources */ = {isa = PBXBuildFile; fileRef = 13B07FB71A68108700A75B9A /* main.m */; }; 2DCD954D1E0B4F2C00145EB5 /* exampleTests.m in Sources */ = {isa = PBXBuildFile; fileRef = 00E356F21AD99517003FC87E /* exampleTests.m */; }; 2F0F6E03138482103A254883 /* libPods-example-tvOS.a in Frameworks */ = {isa = PBXBuildFile; fileRef = 57F83B9BF936D228AA00806C /* libPods-example-tvOS.a */; }; 63E8AEA287292D7D977E159B /* libPods-example-tvOSTests.a in Frameworks */ = {isa = PBXBuildFile; fileRef = 50B9E9D0E62FDFBCE0B61E3A /* libPods-example-tvOSTests.a */; }; 7D2E421007645E0B345F8B87 /* libPods-example.a in Frameworks */ = {isa = PBXBuildFile; fileRef = 95D390353D077DC1F3F4EF3D /* libPods-example.a */; }; A579C460844B1ECDD1FB629D /* libPods-example-exampleTests.a in Frameworks */ = {isa = PBXBuildFile; fileRef = 89D7EE4B063F20FFC4EA14B6 /* libPods-example-exampleTests.a */; }; /* End PBXBuildFile section */ /* Begin PBXContainerItemProxy section */ 00E356F41AD99517003FC87E /* PBXContainerItemProxy */ = { isa = PBXContainerItemProxy; containerPortal = 83CBB9F71A601CBA00E9B192 /* Project object */; proxyType = 1; remoteGlobalIDString = 13B07F861A680F5B00A75B9A; remoteInfo = example; }; 2D02E4911E0B4A5D006451C7 /* PBXContainerItemProxy */ = { isa = PBXContainerItemProxy; containerPortal = 83CBB9F71A601CBA00E9B192 /* Project object */; proxyType = 1; remoteGlobalIDString = 2D02E47A1E0B4A5D006451C7; remoteInfo = "example-tvOS"; }; /* End PBXContainerItemProxy section */ /* Begin PBXFileReference section */ 008F07F21AC5B25A0029DE68 /* main.jsbundle */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text; path = main.jsbundle; sourceTree = ""; }; 00C58644282E28E7280C24B0 /* Pods-example-tvOSTests.debug.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = "Pods-example-tvOSTests.debug.xcconfig"; path = "Target Support Files/Pods-example-tvOSTests/Pods-example-tvOSTests.debug.xcconfig"; sourceTree = ""; }; 00E356EE1AD99517003FC87E /* exampleTests.xctest */ = {isa = PBXFileReference; explicitFileType = wrapper.cfbundle; includeInIndex = 0; path = exampleTests.xctest; sourceTree = BUILT_PRODUCTS_DIR; }; 00E356F11AD99517003FC87E /* Info.plist */ = {isa = PBXFileReference; lastKnownFileType = text.plist.xml; path = Info.plist; sourceTree = ""; }; 00E356F21AD99517003FC87E /* exampleTests.m */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.objc; path = exampleTests.m; sourceTree = ""; }; 13B07F961A680F5B00A75B9A /* example.app */ = {isa = PBXFileReference; explicitFileType = wrapper.application; includeInIndex = 0; path = example.app; sourceTree = BUILT_PRODUCTS_DIR; }; 13B07FAF1A68108700A75B9A /* AppDelegate.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; name = AppDelegate.h; path = example/AppDelegate.h; sourceTree = ""; }; 13B07FB01A68108700A75B9A /* AppDelegate.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; name = AppDelegate.m; path = example/AppDelegate.m; sourceTree = ""; }; 13B07FB21A68108700A75B9A /* Base */ = {isa = PBXFileReference; lastKnownFileType = file.xib; name = Base; path = Base.lproj/LaunchScreen.xib; sourceTree = ""; }; 13B07FB51A68108700A75B9A /* Images.xcassets */ = {isa = PBXFileReference; lastKnownFileType = folder.assetcatalog; name = Images.xcassets; path = example/Images.xcassets; sourceTree = ""; }; 13B07FB61A68108700A75B9A /* Info.plist */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text.plist.xml; name = Info.plist; path = example/Info.plist; sourceTree = ""; }; 13B07FB71A68108700A75B9A /* main.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; name = main.m; path = example/main.m; sourceTree = ""; }; 2D02E47B1E0B4A5D006451C7 /* example-tvOS.app */ = {isa = PBXFileReference; explicitFileType = wrapper.application; includeInIndex = 0; path = "example-tvOS.app"; sourceTree = BUILT_PRODUCTS_DIR; }; 2D02E4901E0B4A5D006451C7 /* example-tvOSTests.xctest */ = {isa = PBXFileReference; explicitFileType = wrapper.cfbundle; includeInIndex = 0; path = "example-tvOSTests.xctest"; sourceTree = BUILT_PRODUCTS_DIR; }; 50B9E9D0E62FDFBCE0B61E3A /* libPods-example-tvOSTests.a */ = {isa = PBXFileReference; explicitFileType = archive.ar; includeInIndex = 0; path = "libPods-example-tvOSTests.a"; sourceTree = BUILT_PRODUCTS_DIR; }; 56889828775BB298BA3A78BB /* Pods-example-exampleTests.release.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = "Pods-example-exampleTests.release.xcconfig"; path = "Target Support Files/Pods-example-exampleTests/Pods-example-exampleTests.release.xcconfig"; sourceTree = ""; }; 57F83B9BF936D228AA00806C /* libPods-example-tvOS.a */ = {isa = PBXFileReference; explicitFileType = archive.ar; includeInIndex = 0; path = "libPods-example-tvOS.a"; sourceTree = BUILT_PRODUCTS_DIR; }; 5C8C0A280A5C8B42E71D5249 /* Pods-example-tvOS.release.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = "Pods-example-tvOS.release.xcconfig"; path = "Target Support Files/Pods-example-tvOS/Pods-example-tvOS.release.xcconfig"; sourceTree = ""; }; 89D7EE4B063F20FFC4EA14B6 /* libPods-example-exampleTests.a */ = {isa = PBXFileReference; explicitFileType = archive.ar; includeInIndex = 0; path = "libPods-example-exampleTests.a"; sourceTree = BUILT_PRODUCTS_DIR; }; 95D390353D077DC1F3F4EF3D /* libPods-example.a */ = {isa = PBXFileReference; explicitFileType = archive.ar; includeInIndex = 0; path = "libPods-example.a"; sourceTree = BUILT_PRODUCTS_DIR; }; A572B61FF848F429D6AC708A /* Pods-example-tvOS.debug.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = "Pods-example-tvOS.debug.xcconfig"; path = "Target Support Files/Pods-example-tvOS/Pods-example-tvOS.debug.xcconfig"; sourceTree = ""; }; BA4822E2C74B5BB7EC454AB6 /* Pods-example-exampleTests.debug.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = "Pods-example-exampleTests.debug.xcconfig"; path = "Target Support Files/Pods-example-exampleTests/Pods-example-exampleTests.debug.xcconfig"; sourceTree = ""; }; BD21201151FF1CE1DD8A7E73 /* Pods-example-tvOSTests.release.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = "Pods-example-tvOSTests.release.xcconfig"; path = "Target Support Files/Pods-example-tvOSTests/Pods-example-tvOSTests.release.xcconfig"; sourceTree = ""; }; CC401330AB6D2413B5862154 /* Pods-example.debug.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = "Pods-example.debug.xcconfig"; path = "Target Support Files/Pods-example/Pods-example.debug.xcconfig"; sourceTree = ""; }; ED297162215061F000B7C4FE /* JavaScriptCore.framework */ = {isa = PBXFileReference; lastKnownFileType = wrapper.framework; name = JavaScriptCore.framework; path = System/Library/Frameworks/JavaScriptCore.framework; sourceTree = SDKROOT; }; ED2971642150620600B7C4FE /* JavaScriptCore.framework */ = {isa = PBXFileReference; lastKnownFileType = wrapper.framework; name = JavaScriptCore.framework; path = Platforms/AppleTVOS.platform/Developer/SDKs/AppleTVOS12.0.sdk/System/Library/Frameworks/JavaScriptCore.framework; sourceTree = DEVELOPER_DIR; }; FB2F88357A0985EFE367A5C9 /* Pods-example.release.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = "Pods-example.release.xcconfig"; path = "Target Support Files/Pods-example/Pods-example.release.xcconfig"; sourceTree = ""; }; /* End PBXFileReference section */ /* Begin PBXFrameworksBuildPhase section */ 00E356EB1AD99517003FC87E /* Frameworks */ = { isa = PBXFrameworksBuildPhase; buildActionMask = 2147483647; files = ( A579C460844B1ECDD1FB629D /* libPods-example-exampleTests.a in Frameworks */, ); runOnlyForDeploymentPostprocessing = 0; }; 13B07F8C1A680F5B00A75B9A /* Frameworks */ = { isa = PBXFrameworksBuildPhase; buildActionMask = 2147483647; files = ( 7D2E421007645E0B345F8B87 /* libPods-example.a in Frameworks */, ); runOnlyForDeploymentPostprocessing = 0; }; 2D02E4781E0B4A5D006451C7 /* Frameworks */ = { isa = PBXFrameworksBuildPhase; buildActionMask = 2147483647; files = ( 2F0F6E03138482103A254883 /* libPods-example-tvOS.a in Frameworks */, ); runOnlyForDeploymentPostprocessing = 0; }; 2D02E48D1E0B4A5D006451C7 /* Frameworks */ = { isa = PBXFrameworksBuildPhase; buildActionMask = 2147483647; files = ( 63E8AEA287292D7D977E159B /* libPods-example-tvOSTests.a in Frameworks */, ); runOnlyForDeploymentPostprocessing = 0; }; /* End PBXFrameworksBuildPhase section */ /* Begin PBXGroup section */ 00E356EF1AD99517003FC87E /* exampleTests */ = { isa = PBXGroup; children = ( 00E356F21AD99517003FC87E /* exampleTests.m */, 00E356F01AD99517003FC87E /* Supporting Files */, ); path = exampleTests; sourceTree = ""; }; 00E356F01AD99517003FC87E /* Supporting Files */ = { isa = PBXGroup; children = ( 00E356F11AD99517003FC87E /* Info.plist */, ); name = "Supporting Files"; sourceTree = ""; }; 13B07FAE1A68108700A75B9A /* example */ = { isa = PBXGroup; children = ( 008F07F21AC5B25A0029DE68 /* main.jsbundle */, 13B07FAF1A68108700A75B9A /* AppDelegate.h */, 13B07FB01A68108700A75B9A /* AppDelegate.m */, 13B07FB51A68108700A75B9A /* Images.xcassets */, 13B07FB61A68108700A75B9A /* Info.plist */, 13B07FB11A68108700A75B9A /* LaunchScreen.xib */, 13B07FB71A68108700A75B9A /* main.m */, ); name = example; sourceTree = ""; }; 2447132405B85960347ECEC3 /* Pods */ = { isa = PBXGroup; children = ( CC401330AB6D2413B5862154 /* Pods-example.debug.xcconfig */, FB2F88357A0985EFE367A5C9 /* Pods-example.release.xcconfig */, BA4822E2C74B5BB7EC454AB6 /* Pods-example-exampleTests.debug.xcconfig */, 56889828775BB298BA3A78BB /* Pods-example-exampleTests.release.xcconfig */, A572B61FF848F429D6AC708A /* Pods-example-tvOS.debug.xcconfig */, 5C8C0A280A5C8B42E71D5249 /* Pods-example-tvOS.release.xcconfig */, 00C58644282E28E7280C24B0 /* Pods-example-tvOSTests.debug.xcconfig */, BD21201151FF1CE1DD8A7E73 /* Pods-example-tvOSTests.release.xcconfig */, ); name = Pods; path = Pods; sourceTree = ""; }; 2D16E6871FA4F8E400B85C8A /* Frameworks */ = { isa = PBXGroup; children = ( ED297162215061F000B7C4FE /* JavaScriptCore.framework */, ED2971642150620600B7C4FE /* JavaScriptCore.framework */, 95D390353D077DC1F3F4EF3D /* libPods-example.a */, 89D7EE4B063F20FFC4EA14B6 /* libPods-example-exampleTests.a */, 57F83B9BF936D228AA00806C /* libPods-example-tvOS.a */, 50B9E9D0E62FDFBCE0B61E3A /* libPods-example-tvOSTests.a */, ); name = Frameworks; sourceTree = ""; }; 832341AE1AAA6A7D00B99B32 /* Libraries */ = { isa = PBXGroup; children = ( ); name = Libraries; sourceTree = ""; }; 83CBB9F61A601CBA00E9B192 = { isa = PBXGroup; children = ( 13B07FAE1A68108700A75B9A /* example */, 832341AE1AAA6A7D00B99B32 /* Libraries */, 00E356EF1AD99517003FC87E /* exampleTests */, 83CBBA001A601CBA00E9B192 /* Products */, 2D16E6871FA4F8E400B85C8A /* Frameworks */, 2447132405B85960347ECEC3 /* Pods */, ); indentWidth = 2; sourceTree = ""; tabWidth = 2; usesTabs = 0; }; 83CBBA001A601CBA00E9B192 /* Products */ = { isa = PBXGroup; children = ( 13B07F961A680F5B00A75B9A /* example.app */, 00E356EE1AD99517003FC87E /* exampleTests.xctest */, 2D02E47B1E0B4A5D006451C7 /* example-tvOS.app */, 2D02E4901E0B4A5D006451C7 /* example-tvOSTests.xctest */, ); name = Products; sourceTree = ""; }; /* End PBXGroup section */ /* Begin PBXNativeTarget section */ 00E356ED1AD99517003FC87E /* exampleTests */ = { isa = PBXNativeTarget; buildConfigurationList = 00E357021AD99517003FC87E /* Build configuration list for PBXNativeTarget "exampleTests" */; buildPhases = ( 2C72F05B74D27CCAA7CE917F /* [CP] Check Pods Manifest.lock */, 00E356EA1AD99517003FC87E /* Sources */, 00E356EB1AD99517003FC87E /* Frameworks */, 00E356EC1AD99517003FC87E /* Resources */, ); buildRules = ( ); dependencies = ( 00E356F51AD99517003FC87E /* PBXTargetDependency */, ); name = exampleTests; productName = exampleTests; productReference = 00E356EE1AD99517003FC87E /* exampleTests.xctest */; productType = "com.apple.product-type.bundle.unit-test"; }; 13B07F861A680F5B00A75B9A /* example */ = { isa = PBXNativeTarget; buildConfigurationList = 13B07F931A680F5B00A75B9A /* Build configuration list for PBXNativeTarget "example" */; buildPhases = ( 765D67A132E239CE8FCD87A9 /* [CP] Check Pods Manifest.lock */, FD10A7F022414F080027D42C /* Start Packager */, 13B07F871A680F5B00A75B9A /* Sources */, 13B07F8C1A680F5B00A75B9A /* Frameworks */, 13B07F8E1A680F5B00A75B9A /* Resources */, 00DD1BFF1BD5951E006B06BC /* Bundle React Native code and images */, ); buildRules = ( ); dependencies = ( ); name = example; productName = example; productReference = 13B07F961A680F5B00A75B9A /* example.app */; productType = "com.apple.product-type.application"; }; 2D02E47A1E0B4A5D006451C7 /* example-tvOS */ = { isa = PBXNativeTarget; buildConfigurationList = 2D02E4BA1E0B4A5E006451C7 /* Build configuration list for PBXNativeTarget "example-tvOS" */; buildPhases = ( 6BAD5807BCC1D8A560241B6E /* [CP] Check Pods Manifest.lock */, FD10A7F122414F3F0027D42C /* Start Packager */, 2D02E4771E0B4A5D006451C7 /* Sources */, 2D02E4781E0B4A5D006451C7 /* Frameworks */, 2D02E4791E0B4A5D006451C7 /* Resources */, 2D02E4CB1E0B4B27006451C7 /* Bundle React Native Code And Images */, ); buildRules = ( ); dependencies = ( ); name = "example-tvOS"; productName = "example-tvOS"; productReference = 2D02E47B1E0B4A5D006451C7 /* example-tvOS.app */; productType = "com.apple.product-type.application"; }; 2D02E48F1E0B4A5D006451C7 /* example-tvOSTests */ = { isa = PBXNativeTarget; buildConfigurationList = 2D02E4BB1E0B4A5E006451C7 /* Build configuration list for PBXNativeTarget "example-tvOSTests" */; buildPhases = ( BF7ED1B0DA42C70A2A25C3A4 /* [CP] Check Pods Manifest.lock */, 2D02E48C1E0B4A5D006451C7 /* Sources */, 2D02E48D1E0B4A5D006451C7 /* Frameworks */, 2D02E48E1E0B4A5D006451C7 /* Resources */, ); buildRules = ( ); dependencies = ( 2D02E4921E0B4A5D006451C7 /* PBXTargetDependency */, ); name = "example-tvOSTests"; productName = "example-tvOSTests"; productReference = 2D02E4901E0B4A5D006451C7 /* example-tvOSTests.xctest */; productType = "com.apple.product-type.bundle.unit-test"; }; /* End PBXNativeTarget section */ /* Begin PBXProject section */ 83CBB9F71A601CBA00E9B192 /* Project object */ = { isa = PBXProject; attributes = { LastUpgradeCheck = 1130; TargetAttributes = { 00E356ED1AD99517003FC87E = { CreatedOnToolsVersion = 6.2; TestTargetID = 13B07F861A680F5B00A75B9A; }; 13B07F861A680F5B00A75B9A = { LastSwiftMigration = 1120; }; 2D02E47A1E0B4A5D006451C7 = { CreatedOnToolsVersion = 8.2.1; ProvisioningStyle = Automatic; }; 2D02E48F1E0B4A5D006451C7 = { CreatedOnToolsVersion = 8.2.1; ProvisioningStyle = Automatic; TestTargetID = 2D02E47A1E0B4A5D006451C7; }; }; }; buildConfigurationList = 83CBB9FA1A601CBA00E9B192 /* Build configuration list for PBXProject "example" */; compatibilityVersion = "Xcode 3.2"; developmentRegion = en; hasScannedForEncodings = 0; knownRegions = ( en, Base, ); mainGroup = 83CBB9F61A601CBA00E9B192; productRefGroup = 83CBBA001A601CBA00E9B192 /* Products */; projectDirPath = ""; projectRoot = ""; targets = ( 13B07F861A680F5B00A75B9A /* example */, 00E356ED1AD99517003FC87E /* exampleTests */, 2D02E47A1E0B4A5D006451C7 /* example-tvOS */, 2D02E48F1E0B4A5D006451C7 /* example-tvOSTests */, ); }; /* End PBXProject section */ /* Begin PBXResourcesBuildPhase section */ 00E356EC1AD99517003FC87E /* Resources */ = { isa = PBXResourcesBuildPhase; buildActionMask = 2147483647; files = ( ); runOnlyForDeploymentPostprocessing = 0; }; 13B07F8E1A680F5B00A75B9A /* Resources */ = { isa = PBXResourcesBuildPhase; buildActionMask = 2147483647; files = ( 13B07FBF1A68108700A75B9A /* Images.xcassets in Resources */, 13B07FBD1A68108700A75B9A /* LaunchScreen.xib in Resources */, ); runOnlyForDeploymentPostprocessing = 0; }; 2D02E4791E0B4A5D006451C7 /* Resources */ = { isa = PBXResourcesBuildPhase; buildActionMask = 2147483647; files = ( 2D02E4BD1E0B4A84006451C7 /* Images.xcassets in Resources */, ); runOnlyForDeploymentPostprocessing = 0; }; 2D02E48E1E0B4A5D006451C7 /* Resources */ = { isa = PBXResourcesBuildPhase; buildActionMask = 2147483647; files = ( ); runOnlyForDeploymentPostprocessing = 0; }; /* End PBXResourcesBuildPhase section */ /* Begin PBXShellScriptBuildPhase section */ 00DD1BFF1BD5951E006B06BC /* Bundle React Native code and images */ = { isa = PBXShellScriptBuildPhase; buildActionMask = 2147483647; files = ( ); inputPaths = ( ); name = "Bundle React Native code and images"; outputPaths = ( ); runOnlyForDeploymentPostprocessing = 0; shellPath = /bin/sh; shellScript = "export NODE_BINARY=node\n../node_modules/react-native/scripts/react-native-xcode.sh"; }; 2C72F05B74D27CCAA7CE917F /* [CP] Check Pods Manifest.lock */ = { isa = PBXShellScriptBuildPhase; buildActionMask = 2147483647; files = ( ); inputFileListPaths = ( ); inputPaths = ( "${PODS_PODFILE_DIR_PATH}/Podfile.lock", "${PODS_ROOT}/Manifest.lock", ); name = "[CP] Check Pods Manifest.lock"; outputFileListPaths = ( ); outputPaths = ( "$(DERIVED_FILE_DIR)/Pods-example-exampleTests-checkManifestLockResult.txt", ); runOnlyForDeploymentPostprocessing = 0; shellPath = /bin/sh; shellScript = "diff \"${PODS_PODFILE_DIR_PATH}/Podfile.lock\" \"${PODS_ROOT}/Manifest.lock\" > /dev/null\nif [ $? != 0 ] ; then\n # print error to STDERR\n echo \"error: The sandbox is not in sync with the Podfile.lock. Run 'pod install' or update your CocoaPods installation.\" >&2\n exit 1\nfi\n# This output is used by Xcode 'outputs' to avoid re-running this script phase.\necho \"SUCCESS\" > \"${SCRIPT_OUTPUT_FILE_0}\"\n"; showEnvVarsInLog = 0; }; 2D02E4CB1E0B4B27006451C7 /* Bundle React Native Code And Images */ = { isa = PBXShellScriptBuildPhase; buildActionMask = 2147483647; files = ( ); inputPaths = ( ); name = "Bundle React Native Code And Images"; outputPaths = ( ); runOnlyForDeploymentPostprocessing = 0; shellPath = /bin/sh; shellScript = "export NODE_BINARY=node\n../node_modules/react-native/scripts/react-native-xcode.sh"; }; 6BAD5807BCC1D8A560241B6E /* [CP] Check Pods Manifest.lock */ = { isa = PBXShellScriptBuildPhase; buildActionMask = 2147483647; files = ( ); inputFileListPaths = ( ); inputPaths = ( "${PODS_PODFILE_DIR_PATH}/Podfile.lock", "${PODS_ROOT}/Manifest.lock", ); name = "[CP] Check Pods Manifest.lock"; outputFileListPaths = ( ); outputPaths = ( "$(DERIVED_FILE_DIR)/Pods-example-tvOS-checkManifestLockResult.txt", ); runOnlyForDeploymentPostprocessing = 0; shellPath = /bin/sh; shellScript = "diff \"${PODS_PODFILE_DIR_PATH}/Podfile.lock\" \"${PODS_ROOT}/Manifest.lock\" > /dev/null\nif [ $? != 0 ] ; then\n # print error to STDERR\n echo \"error: The sandbox is not in sync with the Podfile.lock. Run 'pod install' or update your CocoaPods installation.\" >&2\n exit 1\nfi\n# This output is used by Xcode 'outputs' to avoid re-running this script phase.\necho \"SUCCESS\" > \"${SCRIPT_OUTPUT_FILE_0}\"\n"; showEnvVarsInLog = 0; }; 765D67A132E239CE8FCD87A9 /* [CP] Check Pods Manifest.lock */ = { isa = PBXShellScriptBuildPhase; buildActionMask = 2147483647; files = ( ); inputFileListPaths = ( ); inputPaths = ( "${PODS_PODFILE_DIR_PATH}/Podfile.lock", "${PODS_ROOT}/Manifest.lock", ); name = "[CP] Check Pods Manifest.lock"; outputFileListPaths = ( ); outputPaths = ( "$(DERIVED_FILE_DIR)/Pods-example-checkManifestLockResult.txt", ); runOnlyForDeploymentPostprocessing = 0; shellPath = /bin/sh; shellScript = "diff \"${PODS_PODFILE_DIR_PATH}/Podfile.lock\" \"${PODS_ROOT}/Manifest.lock\" > /dev/null\nif [ $? != 0 ] ; then\n # print error to STDERR\n echo \"error: The sandbox is not in sync with the Podfile.lock. Run 'pod install' or update your CocoaPods installation.\" >&2\n exit 1\nfi\n# This output is used by Xcode 'outputs' to avoid re-running this script phase.\necho \"SUCCESS\" > \"${SCRIPT_OUTPUT_FILE_0}\"\n"; showEnvVarsInLog = 0; }; BF7ED1B0DA42C70A2A25C3A4 /* [CP] Check Pods Manifest.lock */ = { isa = PBXShellScriptBuildPhase; buildActionMask = 2147483647; files = ( ); inputFileListPaths = ( ); inputPaths = ( "${PODS_PODFILE_DIR_PATH}/Podfile.lock", "${PODS_ROOT}/Manifest.lock", ); name = "[CP] Check Pods Manifest.lock"; outputFileListPaths = ( ); outputPaths = ( "$(DERIVED_FILE_DIR)/Pods-example-tvOSTests-checkManifestLockResult.txt", ); runOnlyForDeploymentPostprocessing = 0; shellPath = /bin/sh; shellScript = "diff \"${PODS_PODFILE_DIR_PATH}/Podfile.lock\" \"${PODS_ROOT}/Manifest.lock\" > /dev/null\nif [ $? != 0 ] ; then\n # print error to STDERR\n echo \"error: The sandbox is not in sync with the Podfile.lock. Run 'pod install' or update your CocoaPods installation.\" >&2\n exit 1\nfi\n# This output is used by Xcode 'outputs' to avoid re-running this script phase.\necho \"SUCCESS\" > \"${SCRIPT_OUTPUT_FILE_0}\"\n"; showEnvVarsInLog = 0; }; FD10A7F022414F080027D42C /* Start Packager */ = { isa = PBXShellScriptBuildPhase; buildActionMask = 2147483647; files = ( ); inputFileListPaths = ( ); inputPaths = ( ); name = "Start Packager"; outputFileListPaths = ( ); outputPaths = ( ); runOnlyForDeploymentPostprocessing = 0; shellPath = /bin/sh; shellScript = "export RCT_METRO_PORT=\"${RCT_METRO_PORT:=8081}\"\necho \"export RCT_METRO_PORT=${RCT_METRO_PORT}\" > \"${SRCROOT}/../node_modules/react-native/scripts/.packager.env\"\nif [ -z \"${RCT_NO_LAUNCH_PACKAGER+xxx}\" ] ; then\n if nc -w 5 -z localhost ${RCT_METRO_PORT} ; then\n if ! curl -s \"http://localhost:${RCT_METRO_PORT}/status\" | grep -q \"packager-status:running\" ; then\n echo \"Port ${RCT_METRO_PORT} already in use, packager is either not running or not running correctly\"\n exit 2\n fi\n else\n open \"$SRCROOT/../node_modules/react-native/scripts/launchPackager.command\" || echo \"Can't start packager automatically\"\n fi\nfi\n"; showEnvVarsInLog = 0; }; FD10A7F122414F3F0027D42C /* Start Packager */ = { isa = PBXShellScriptBuildPhase; buildActionMask = 2147483647; files = ( ); inputFileListPaths = ( ); inputPaths = ( ); name = "Start Packager"; outputFileListPaths = ( ); outputPaths = ( ); runOnlyForDeploymentPostprocessing = 0; shellPath = /bin/sh; shellScript = "export RCT_METRO_PORT=\"${RCT_METRO_PORT:=8081}\"\necho \"export RCT_METRO_PORT=${RCT_METRO_PORT}\" > \"${SRCROOT}/../node_modules/react-native/scripts/.packager.env\"\nif [ -z \"${RCT_NO_LAUNCH_PACKAGER+xxx}\" ] ; then\n if nc -w 5 -z localhost ${RCT_METRO_PORT} ; then\n if ! curl -s \"http://localhost:${RCT_METRO_PORT}/status\" | grep -q \"packager-status:running\" ; then\n echo \"Port ${RCT_METRO_PORT} already in use, packager is either not running or not running correctly\"\n exit 2\n fi\n else\n open \"$SRCROOT/../node_modules/react-native/scripts/launchPackager.command\" || echo \"Can't start packager automatically\"\n fi\nfi\n"; showEnvVarsInLog = 0; }; /* End PBXShellScriptBuildPhase section */ /* Begin PBXSourcesBuildPhase section */ 00E356EA1AD99517003FC87E /* Sources */ = { isa = PBXSourcesBuildPhase; buildActionMask = 2147483647; files = ( 00E356F31AD99517003FC87E /* exampleTests.m in Sources */, ); runOnlyForDeploymentPostprocessing = 0; }; 13B07F871A680F5B00A75B9A /* Sources */ = { isa = PBXSourcesBuildPhase; buildActionMask = 2147483647; files = ( 13B07FBC1A68108700A75B9A /* AppDelegate.m in Sources */, 13B07FC11A68108700A75B9A /* main.m in Sources */, ); runOnlyForDeploymentPostprocessing = 0; }; 2D02E4771E0B4A5D006451C7 /* Sources */ = { isa = PBXSourcesBuildPhase; buildActionMask = 2147483647; files = ( 2D02E4BF1E0B4AB3006451C7 /* main.m in Sources */, 2D02E4BC1E0B4A80006451C7 /* AppDelegate.m in Sources */, ); runOnlyForDeploymentPostprocessing = 0; }; 2D02E48C1E0B4A5D006451C7 /* Sources */ = { isa = PBXSourcesBuildPhase; buildActionMask = 2147483647; files = ( 2DCD954D1E0B4F2C00145EB5 /* exampleTests.m in Sources */, ); runOnlyForDeploymentPostprocessing = 0; }; /* End PBXSourcesBuildPhase section */ /* Begin PBXTargetDependency section */ 00E356F51AD99517003FC87E /* PBXTargetDependency */ = { isa = PBXTargetDependency; target = 13B07F861A680F5B00A75B9A /* example */; targetProxy = 00E356F41AD99517003FC87E /* PBXContainerItemProxy */; }; 2D02E4921E0B4A5D006451C7 /* PBXTargetDependency */ = { isa = PBXTargetDependency; target = 2D02E47A1E0B4A5D006451C7 /* example-tvOS */; targetProxy = 2D02E4911E0B4A5D006451C7 /* PBXContainerItemProxy */; }; /* End PBXTargetDependency section */ /* Begin PBXVariantGroup section */ 13B07FB11A68108700A75B9A /* LaunchScreen.xib */ = { isa = PBXVariantGroup; children = ( 13B07FB21A68108700A75B9A /* Base */, ); name = LaunchScreen.xib; path = example; sourceTree = ""; }; /* End PBXVariantGroup section */ /* Begin XCBuildConfiguration section */ 00E356F61AD99517003FC87E /* Debug */ = { isa = XCBuildConfiguration; baseConfigurationReference = BA4822E2C74B5BB7EC454AB6 /* Pods-example-exampleTests.debug.xcconfig */; buildSettings = { BUNDLE_LOADER = "$(TEST_HOST)"; GCC_PREPROCESSOR_DEFINITIONS = ( "DEBUG=1", "$(inherited)", ); INFOPLIST_FILE = exampleTests/Info.plist; IPHONEOS_DEPLOYMENT_TARGET = 9.0; LD_RUNPATH_SEARCH_PATHS = "$(inherited) @executable_path/Frameworks @loader_path/Frameworks"; OTHER_LDFLAGS = ( "-ObjC", "-lc++", "$(inherited)", ); PRODUCT_BUNDLE_IDENTIFIER = "org.reactjs.native.example.$(PRODUCT_NAME:rfc1034identifier)"; PRODUCT_NAME = "$(TARGET_NAME)"; TEST_HOST = "$(BUILT_PRODUCTS_DIR)/example.app/example"; }; name = Debug; }; 00E356F71AD99517003FC87E /* Release */ = { isa = XCBuildConfiguration; baseConfigurationReference = 56889828775BB298BA3A78BB /* Pods-example-exampleTests.release.xcconfig */; buildSettings = { BUNDLE_LOADER = "$(TEST_HOST)"; COPY_PHASE_STRIP = NO; INFOPLIST_FILE = exampleTests/Info.plist; IPHONEOS_DEPLOYMENT_TARGET = 9.0; LD_RUNPATH_SEARCH_PATHS = "$(inherited) @executable_path/Frameworks @loader_path/Frameworks"; OTHER_LDFLAGS = ( "-ObjC", "-lc++", "$(inherited)", ); PRODUCT_BUNDLE_IDENTIFIER = "org.reactjs.native.example.$(PRODUCT_NAME:rfc1034identifier)"; PRODUCT_NAME = "$(TARGET_NAME)"; TEST_HOST = "$(BUILT_PRODUCTS_DIR)/example.app/example"; }; name = Release; }; 13B07F941A680F5B00A75B9A /* Debug */ = { isa = XCBuildConfiguration; baseConfigurationReference = CC401330AB6D2413B5862154 /* Pods-example.debug.xcconfig */; buildSettings = { ASSETCATALOG_COMPILER_APPICON_NAME = AppIcon; CLANG_ENABLE_MODULES = YES; CURRENT_PROJECT_VERSION = 1; ENABLE_BITCODE = NO; GCC_PREPROCESSOR_DEFINITIONS = ( "$(inherited)", "FB_SONARKIT_ENABLED=1", ); INFOPLIST_FILE = example/Info.plist; LD_RUNPATH_SEARCH_PATHS = "$(inherited) @executable_path/Frameworks"; OTHER_LDFLAGS = ( "$(inherited)", "-ObjC", "-lc++", ); PRODUCT_BUNDLE_IDENTIFIER = "org.reactjs.native.example.$(PRODUCT_NAME:rfc1034identifier)"; PRODUCT_NAME = example; SWIFT_OPTIMIZATION_LEVEL = "-Onone"; SWIFT_VERSION = 5.0; VERSIONING_SYSTEM = "apple-generic"; }; name = Debug; }; 13B07F951A680F5B00A75B9A /* Release */ = { isa = XCBuildConfiguration; baseConfigurationReference = FB2F88357A0985EFE367A5C9 /* Pods-example.release.xcconfig */; buildSettings = { ASSETCATALOG_COMPILER_APPICON_NAME = AppIcon; CLANG_ENABLE_MODULES = YES; CURRENT_PROJECT_VERSION = 1; INFOPLIST_FILE = example/Info.plist; LD_RUNPATH_SEARCH_PATHS = "$(inherited) @executable_path/Frameworks"; OTHER_LDFLAGS = ( "$(inherited)", "-ObjC", "-lc++", ); PRODUCT_BUNDLE_IDENTIFIER = "org.reactjs.native.example.$(PRODUCT_NAME:rfc1034identifier)"; PRODUCT_NAME = example; SWIFT_VERSION = 5.0; VERSIONING_SYSTEM = "apple-generic"; }; name = Release; }; 2D02E4971E0B4A5E006451C7 /* Debug */ = { isa = XCBuildConfiguration; baseConfigurationReference = A572B61FF848F429D6AC708A /* Pods-example-tvOS.debug.xcconfig */; buildSettings = { ASSETCATALOG_COMPILER_APPICON_NAME = "App Icon & Top Shelf Image"; ASSETCATALOG_COMPILER_LAUNCHIMAGE_NAME = LaunchImage; CLANG_ANALYZER_NONNULL = YES; CLANG_WARN_DOCUMENTATION_COMMENTS = YES; CLANG_WARN_INFINITE_RECURSION = YES; CLANG_WARN_SUSPICIOUS_MOVE = YES; DEBUG_INFORMATION_FORMAT = dwarf; ENABLE_TESTABILITY = YES; GCC_NO_COMMON_BLOCKS = YES; INFOPLIST_FILE = "example-tvOS/Info.plist"; LD_RUNPATH_SEARCH_PATHS = "$(inherited) @executable_path/Frameworks"; OTHER_LDFLAGS = ( "$(inherited)", "-ObjC", "-lc++", ); PRODUCT_BUNDLE_IDENTIFIER = "org.reactjs.native.example.example-tvOS"; PRODUCT_NAME = "$(TARGET_NAME)"; SDKROOT = appletvos; TARGETED_DEVICE_FAMILY = 3; TVOS_DEPLOYMENT_TARGET = 9.2; }; name = Debug; }; 2D02E4981E0B4A5E006451C7 /* Release */ = { isa = XCBuildConfiguration; baseConfigurationReference = 5C8C0A280A5C8B42E71D5249 /* Pods-example-tvOS.release.xcconfig */; buildSettings = { ASSETCATALOG_COMPILER_APPICON_NAME = "App Icon & Top Shelf Image"; ASSETCATALOG_COMPILER_LAUNCHIMAGE_NAME = LaunchImage; CLANG_ANALYZER_NONNULL = YES; CLANG_WARN_DOCUMENTATION_COMMENTS = YES; CLANG_WARN_INFINITE_RECURSION = YES; CLANG_WARN_SUSPICIOUS_MOVE = YES; COPY_PHASE_STRIP = NO; DEBUG_INFORMATION_FORMAT = "dwarf-with-dsym"; GCC_NO_COMMON_BLOCKS = YES; INFOPLIST_FILE = "example-tvOS/Info.plist"; LD_RUNPATH_SEARCH_PATHS = "$(inherited) @executable_path/Frameworks"; OTHER_LDFLAGS = ( "$(inherited)", "-ObjC", "-lc++", ); PRODUCT_BUNDLE_IDENTIFIER = "org.reactjs.native.example.example-tvOS"; PRODUCT_NAME = "$(TARGET_NAME)"; SDKROOT = appletvos; TARGETED_DEVICE_FAMILY = 3; TVOS_DEPLOYMENT_TARGET = 9.2; }; name = Release; }; 2D02E4991E0B4A5E006451C7 /* Debug */ = { isa = XCBuildConfiguration; baseConfigurationReference = 00C58644282E28E7280C24B0 /* Pods-example-tvOSTests.debug.xcconfig */; buildSettings = { BUNDLE_LOADER = "$(TEST_HOST)"; CLANG_ANALYZER_NONNULL = YES; CLANG_WARN_DOCUMENTATION_COMMENTS = YES; CLANG_WARN_INFINITE_RECURSION = YES; CLANG_WARN_SUSPICIOUS_MOVE = YES; DEBUG_INFORMATION_FORMAT = dwarf; ENABLE_TESTABILITY = YES; GCC_NO_COMMON_BLOCKS = YES; INFOPLIST_FILE = "example-tvOSTests/Info.plist"; LD_RUNPATH_SEARCH_PATHS = "$(inherited) @executable_path/Frameworks @loader_path/Frameworks"; OTHER_LDFLAGS = ( "$(inherited)", "-ObjC", "-lc++", ); PRODUCT_BUNDLE_IDENTIFIER = "org.reactjs.native.example.example-tvOSTests"; PRODUCT_NAME = "$(TARGET_NAME)"; SDKROOT = appletvos; TEST_HOST = "$(BUILT_PRODUCTS_DIR)/example-tvOS.app/example-tvOS"; TVOS_DEPLOYMENT_TARGET = 10.1; }; name = Debug; }; 2D02E49A1E0B4A5E006451C7 /* Release */ = { isa = XCBuildConfiguration; baseConfigurationReference = BD21201151FF1CE1DD8A7E73 /* Pods-example-tvOSTests.release.xcconfig */; buildSettings = { BUNDLE_LOADER = "$(TEST_HOST)"; CLANG_ANALYZER_NONNULL = YES; CLANG_WARN_DOCUMENTATION_COMMENTS = YES; CLANG_WARN_INFINITE_RECURSION = YES; CLANG_WARN_SUSPICIOUS_MOVE = YES; COPY_PHASE_STRIP = NO; DEBUG_INFORMATION_FORMAT = "dwarf-with-dsym"; GCC_NO_COMMON_BLOCKS = YES; INFOPLIST_FILE = "example-tvOSTests/Info.plist"; LD_RUNPATH_SEARCH_PATHS = "$(inherited) @executable_path/Frameworks @loader_path/Frameworks"; OTHER_LDFLAGS = ( "$(inherited)", "-ObjC", "-lc++", ); PRODUCT_BUNDLE_IDENTIFIER = "org.reactjs.native.example.example-tvOSTests"; PRODUCT_NAME = "$(TARGET_NAME)"; SDKROOT = appletvos; TEST_HOST = "$(BUILT_PRODUCTS_DIR)/example-tvOS.app/example-tvOS"; TVOS_DEPLOYMENT_TARGET = 10.1; }; name = Release; }; 83CBBA201A601CBA00E9B192 /* Debug */ = { isa = XCBuildConfiguration; buildSettings = { ALWAYS_SEARCH_USER_PATHS = NO; CLANG_ANALYZER_LOCALIZABILITY_NONLOCALIZED = YES; CLANG_CXX_LANGUAGE_STANDARD = "gnu++0x"; CLANG_CXX_LIBRARY = "libc++"; CLANG_ENABLE_MODULES = YES; CLANG_ENABLE_OBJC_ARC = YES; CLANG_WARN_BLOCK_CAPTURE_AUTORELEASING = YES; CLANG_WARN_BOOL_CONVERSION = YES; CLANG_WARN_COMMA = YES; CLANG_WARN_CONSTANT_CONVERSION = YES; CLANG_WARN_DEPRECATED_OBJC_IMPLEMENTATIONS = YES; CLANG_WARN_DIRECT_OBJC_ISA_USAGE = YES_ERROR; CLANG_WARN_EMPTY_BODY = YES; CLANG_WARN_ENUM_CONVERSION = YES; CLANG_WARN_INFINITE_RECURSION = YES; CLANG_WARN_INT_CONVERSION = YES; CLANG_WARN_NON_LITERAL_NULL_CONVERSION = YES; CLANG_WARN_OBJC_IMPLICIT_RETAIN_SELF = YES; CLANG_WARN_OBJC_LITERAL_CONVERSION = YES; CLANG_WARN_OBJC_ROOT_CLASS = YES_ERROR; CLANG_WARN_RANGE_LOOP_ANALYSIS = YES; CLANG_WARN_STRICT_PROTOTYPES = YES; CLANG_WARN_SUSPICIOUS_MOVE = YES; CLANG_WARN_UNREACHABLE_CODE = YES; CLANG_WARN__DUPLICATE_METHOD_MATCH = YES; "CODE_SIGN_IDENTITY[sdk=iphoneos*]" = "iPhone Developer"; COPY_PHASE_STRIP = NO; ENABLE_STRICT_OBJC_MSGSEND = YES; ENABLE_TESTABILITY = YES; GCC_C_LANGUAGE_STANDARD = gnu99; GCC_DYNAMIC_NO_PIC = NO; GCC_NO_COMMON_BLOCKS = YES; GCC_OPTIMIZATION_LEVEL = 0; GCC_PREPROCESSOR_DEFINITIONS = ( "DEBUG=1", "$(inherited)", ); GCC_SYMBOLS_PRIVATE_EXTERN = NO; GCC_WARN_64_TO_32_BIT_CONVERSION = YES; GCC_WARN_ABOUT_RETURN_TYPE = YES_ERROR; GCC_WARN_UNDECLARED_SELECTOR = YES; GCC_WARN_UNINITIALIZED_AUTOS = YES_AGGRESSIVE; GCC_WARN_UNUSED_FUNCTION = YES; GCC_WARN_UNUSED_VARIABLE = YES; IPHONEOS_DEPLOYMENT_TARGET = 9.0; LD_RUNPATH_SEARCH_PATHS = "/usr/lib/swift $(inherited)"; LIBRARY_SEARCH_PATHS = ( "\"$(TOOLCHAIN_DIR)/usr/lib/swift/$(PLATFORM_NAME)\"", "\"$(TOOLCHAIN_DIR)/usr/lib/swift-5.0/$(PLATFORM_NAME)\"", "\"$(inherited)\"", ); MTL_ENABLE_DEBUG_INFO = YES; ONLY_ACTIVE_ARCH = YES; SDKROOT = iphoneos; }; name = Debug; }; 83CBBA211A601CBA00E9B192 /* Release */ = { isa = XCBuildConfiguration; buildSettings = { ALWAYS_SEARCH_USER_PATHS = NO; CLANG_ANALYZER_LOCALIZABILITY_NONLOCALIZED = YES; CLANG_CXX_LANGUAGE_STANDARD = "gnu++0x"; CLANG_CXX_LIBRARY = "libc++"; CLANG_ENABLE_MODULES = YES; CLANG_ENABLE_OBJC_ARC = YES; CLANG_WARN_BLOCK_CAPTURE_AUTORELEASING = YES; CLANG_WARN_BOOL_CONVERSION = YES; CLANG_WARN_COMMA = YES; CLANG_WARN_CONSTANT_CONVERSION = YES; CLANG_WARN_DEPRECATED_OBJC_IMPLEMENTATIONS = YES; CLANG_WARN_DIRECT_OBJC_ISA_USAGE = YES_ERROR; CLANG_WARN_EMPTY_BODY = YES; CLANG_WARN_ENUM_CONVERSION = YES; CLANG_WARN_INFINITE_RECURSION = YES; CLANG_WARN_INT_CONVERSION = YES; CLANG_WARN_NON_LITERAL_NULL_CONVERSION = YES; CLANG_WARN_OBJC_IMPLICIT_RETAIN_SELF = YES; CLANG_WARN_OBJC_LITERAL_CONVERSION = YES; CLANG_WARN_OBJC_ROOT_CLASS = YES_ERROR; CLANG_WARN_RANGE_LOOP_ANALYSIS = YES; CLANG_WARN_STRICT_PROTOTYPES = YES; CLANG_WARN_SUSPICIOUS_MOVE = YES; CLANG_WARN_UNREACHABLE_CODE = YES; CLANG_WARN__DUPLICATE_METHOD_MATCH = YES; "CODE_SIGN_IDENTITY[sdk=iphoneos*]" = "iPhone Developer"; COPY_PHASE_STRIP = YES; ENABLE_NS_ASSERTIONS = NO; ENABLE_STRICT_OBJC_MSGSEND = YES; GCC_C_LANGUAGE_STANDARD = gnu99; GCC_NO_COMMON_BLOCKS = YES; GCC_WARN_64_TO_32_BIT_CONVERSION = YES; GCC_WARN_ABOUT_RETURN_TYPE = YES_ERROR; GCC_WARN_UNDECLARED_SELECTOR = YES; GCC_WARN_UNINITIALIZED_AUTOS = YES_AGGRESSIVE; GCC_WARN_UNUSED_FUNCTION = YES; GCC_WARN_UNUSED_VARIABLE = YES; IPHONEOS_DEPLOYMENT_TARGET = 9.0; LD_RUNPATH_SEARCH_PATHS = "/usr/lib/swift $(inherited)"; LIBRARY_SEARCH_PATHS = ( "\"$(TOOLCHAIN_DIR)/usr/lib/swift/$(PLATFORM_NAME)\"", "\"$(TOOLCHAIN_DIR)/usr/lib/swift-5.0/$(PLATFORM_NAME)\"", "\"$(inherited)\"", ); MTL_ENABLE_DEBUG_INFO = NO; SDKROOT = iphoneos; VALIDATE_PRODUCT = YES; }; name = Release; }; /* End XCBuildConfiguration section */ /* Begin XCConfigurationList section */ 00E357021AD99517003FC87E /* Build configuration list for PBXNativeTarget "exampleTests" */ = { isa = XCConfigurationList; buildConfigurations = ( 00E356F61AD99517003FC87E /* Debug */, 00E356F71AD99517003FC87E /* Release */, ); defaultConfigurationIsVisible = 0; defaultConfigurationName = Release; }; 13B07F931A680F5B00A75B9A /* Build configuration list for PBXNativeTarget "example" */ = { isa = XCConfigurationList; buildConfigurations = ( 13B07F941A680F5B00A75B9A /* Debug */, 13B07F951A680F5B00A75B9A /* Release */, ); defaultConfigurationIsVisible = 0; defaultConfigurationName = Release; }; 2D02E4BA1E0B4A5E006451C7 /* Build configuration list for PBXNativeTarget "example-tvOS" */ = { isa = XCConfigurationList; buildConfigurations = ( 2D02E4971E0B4A5E006451C7 /* Debug */, 2D02E4981E0B4A5E006451C7 /* Release */, ); defaultConfigurationIsVisible = 0; defaultConfigurationName = Release; }; 2D02E4BB1E0B4A5E006451C7 /* Build configuration list for PBXNativeTarget "example-tvOSTests" */ = { isa = XCConfigurationList; buildConfigurations = ( 2D02E4991E0B4A5E006451C7 /* Debug */, 2D02E49A1E0B4A5E006451C7 /* Release */, ); defaultConfigurationIsVisible = 0; defaultConfigurationName = Release; }; 83CBB9FA1A601CBA00E9B192 /* Build configuration list for PBXProject "example" */ = { isa = XCConfigurationList; buildConfigurations = ( 83CBBA201A601CBA00E9B192 /* Debug */, 83CBBA211A601CBA00E9B192 /* Release */, ); defaultConfigurationIsVisible = 0; defaultConfigurationName = Release; }; /* End XCConfigurationList section */ }; rootObject = 83CBB9F71A601CBA00E9B192 /* Project object */; } ================================================ FILE: example/ios/example.xcodeproj/xcshareddata/xcschemes/example-tvOS.xcscheme ================================================ ================================================ FILE: example/ios/example.xcodeproj/xcshareddata/xcschemes/example.xcscheme ================================================ ================================================ FILE: example/ios/example.xcworkspace/contents.xcworkspacedata ================================================ ================================================ FILE: example/ios/example.xcworkspace/xcshareddata/IDEWorkspaceChecks.plist ================================================ IDEDidComputeMac32BitWarning ================================================ FILE: example/ios/exampleTests/Info.plist ================================================ CFBundleDevelopmentRegion en CFBundleExecutable $(EXECUTABLE_NAME) CFBundleIdentifier $(PRODUCT_BUNDLE_IDENTIFIER) CFBundleInfoDictionaryVersion 6.0 CFBundleName $(PRODUCT_NAME) CFBundlePackageType BNDL CFBundleShortVersionString 1.0 CFBundleSignature ???? CFBundleVersion 1 ================================================ FILE: example/ios/exampleTests/exampleTests.m ================================================ #import #import #import #import #define TIMEOUT_SECONDS 600 #define TEXT_TO_LOOK_FOR @"Welcome to React" @interface exampleTests : XCTestCase @end @implementation exampleTests - (BOOL)findSubviewInView:(UIView *)view matching:(BOOL(^)(UIView *view))test { if (test(view)) { return YES; } for (UIView *subview in [view subviews]) { if ([self findSubviewInView:subview matching:test]) { return YES; } } return NO; } - (void)testRendersWelcomeScreen { UIViewController *vc = [[[RCTSharedApplication() delegate] window] rootViewController]; NSDate *date = [NSDate dateWithTimeIntervalSinceNow:TIMEOUT_SECONDS]; BOOL foundElement = NO; __block NSString *redboxError = nil; #ifdef DEBUG RCTSetLogFunction(^(RCTLogLevel level, RCTLogSource source, NSString *fileName, NSNumber *lineNumber, NSString *message) { if (level >= RCTLogLevelError) { redboxError = message; } }); #endif while ([date timeIntervalSinceNow] > 0 && !foundElement && !redboxError) { [[NSRunLoop mainRunLoop] runMode:NSDefaultRunLoopMode beforeDate:[NSDate dateWithTimeIntervalSinceNow:0.1]]; [[NSRunLoop mainRunLoop] runMode:NSRunLoopCommonModes beforeDate:[NSDate dateWithTimeIntervalSinceNow:0.1]]; foundElement = [self findSubviewInView:vc.view matching:^BOOL(UIView *view) { if ([view.accessibilityLabel isEqualToString:TEXT_TO_LOOK_FOR]) { return YES; } return NO; }]; } #ifdef DEBUG RCTSetLogFunction(RCTDefaultLogFunction); #endif XCTAssertNil(redboxError, @"RedBox error: %@", redboxError); XCTAssertTrue(foundElement, @"Couldn't find element with text '%@' in %d seconds", TEXT_TO_LOOK_FOR, TIMEOUT_SECONDS); } @end ================================================ FILE: example/metro.config.js ================================================ /** * Metro configuration for React Native * https://github.com/facebook/react-native * * @format */ module.exports = { transformer: { getTransformOptions: async () => ({ transform: { experimentalImportSupport: false, inlineRequires: false, }, }), }, }; ================================================ FILE: example/package.json ================================================ { "name": "example", "version": "0.0.1", "private": true, "scripts": { "android": "react-native run-android", "ios": "react-native run-ios", "start": "react-native start", "test": "jest", "lint": "eslint ." }, "dependencies": { "react": "16.11.0", "react-native": "0.62.2", "react-native-rsa-native": "../" }, "devDependencies": { "@babel/core": "^7.9.6", "@babel/runtime": "^7.9.6", "@react-native-community/eslint-config": "^1.1.0", "babel-jest": "^26.0.1", "eslint": "^7.0.0", "jest": "^26.0.1", "metro-react-native-babel-preset": "^0.59.0", "react-test-renderer": "16.11.0" }, "jest": { "preset": "react-native" } } ================================================ FILE: index.d.ts ================================================ declare module 'react-native-rsa-native' { interface PublicKey { public: string; } interface CSRKey { csr: string; } interface KeyPair extends PublicKey { private: string; } type TypeCrypto = 'SHA256withRSA'| 'SHA512withRSA'| 'SHA1withRSA'| 'SHA256withECDSA'| 'SHA512withECDSA'| 'SHA1withECDSA' namespace RSA { export function generate(): Promise; export function generateKeys(keySize: number): Promise; export function encrypt(data: string, key: string): Promise; export function decrypt(data: string, key: string): Promise; export function encrypt64(data: string, key: string): Promise; export function decrypt64(data: string, key: string): Promise; export function sign(data: string, key: string): Promise; export function signWithAlgorithm(data: string, key: string, signature?: TypeCrypto): Promise; export function sign64(data: string, key: string): Promise; export function sign64WithAlgorithm(data: string, key: string, signature?: TypeCrypto): Promise; export function verify(data: string, secretToVerify: string, key: string): Promise; export function verifyWithAlgorithm(data: string, secretToVerify: string, key: string, signature?: TypeCrypto): Promise; export function verify64(data: string, secretToVerify: string, key: string): Promise; export function verify64WithAlgorithm(data: string, secretToVerify: string, key: string, signature?: TypeCrypto): Promise; export const SHA256withRSA: string; export const SHA512withRSA: string; export const SHA1withRSA: string; export const SHA256withECDSA: string; export const SHA512withECDSA: string; export const SHA1withECDSA: string; } namespace RSAKeychain { export function generate(keyTag: string): Promise; export function generateEC(keyTag: string): Promise; export function generateCSR(keyTag: string, CN: string, signature?: TypeCrypto): Promise; export function generateKeys(keyTag: string, keySize: number): Promise; export function generateCSRWithEC(cn: String,keyTag: string, keySize: number): Promise; export function deletePrivateKey(keyTag: string): Promise; export function encrypt(data: string, keyTag: string): Promise; export function decrypt(data: string, keyTag: string): Promise; export function encrypt64(data: string, keyTag: string): Promise; export function decrypt64(data: string, keyTag: string): Promise; export function sign(data: string, keyTag: string): Promise; export function signWithAlgorithm(data: string, keyTag: string, signature?: TypeCrypto): Promise; export function sign64WithAlgorithm(data: string, keyTag: string, signature?: TypeCrypto): Promise; export function verify(data: string, secretToVerify: string, keyTag: string): Promise; export function verifyWithAlgorithm(data: string, secretToVerify: string, keyTag: string, signature?: TypeCrypto): Promise; export function verify64WithAlgorithm(data: string, secretToVerify: string, keyTag: string, signature?: TypeCrypto): Promise; export function getPublicKey(keyTag: string): Promise; export function getPublicKeyDER(keyTag: string): Promise; export function getPublicKeyRSA(keyTag: string): Promise; export function deletePrivateKey(keyTag: string): Promise; export const SHA256withRSA: string; export const SHA512withRSA: string; export const SHA1withRSA: string; export const SHA256withECDSA: string; export const SHA512withECDSA: string; export const SHA1withECDSA: string; } export { RSA, RSAKeychain, KeyPair, CSRKey }; } ================================================ FILE: index.js ================================================ import { NativeModules } from 'react-native'; const { RNRSAKeychain, RNRSA } = NativeModules; export { RNRSAKeychain, RNRSAKeychain as RSAKeychain, RNRSA, RNRSA as RSA }; export default RNRSA; ================================================ FILE: ios/CSRSwift.swift ================================================ // // CertificateSigningRequest.swift // CertificateSigningRequestSwift // // Created by Corey Baker on 10/19/16. // Copyright © Corey Baker. All rights reserved. // // This is a port of ios-csr by Ales Teska (https://github.com/ateska/ios-csr) // from Objective-c to Swift. Additions have been made to allow SHA256 and SHA512. // // Copyright (C) 2016 Corey Baker // // This program is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // You should have received a copy of the GNU General Public License // along with this program. If not, see . /* Certification Request Syntax Specification: http://www.ietf.org/rfc/rfc2986.txt */ import Foundation import CommonCrypto public class CertificateSigningRequest:NSObject { private let OBJECT_commonName:[UInt8] = [0x06, 0x03, 0x55, 0x04, 0x03] private let OBJECT_countryName:[UInt8] = [0x06, 0x03, 0x55, 0x04, 0x06] private let OBJECT_localityName:[UInt8] = [0x06, 0x03, 0x55, 0x04, 0x07] private let OBJECT_organizationName:[UInt8] = [0x06, 0x03, 0x55, 0x04, 0x0A] private let OBJECT_organizationalUnitName:[UInt8] = [0x06, 0x03, 0x55, 0x04, 0x0B] private let OBJECT_stateOrProvinceName:[UInt8] = [0x06, 0x03, 0x55, 0x04, 0x08] private let SEQUENCE_tag:UInt8 = 0x30 private let SET_tag:UInt8 = 0x31 private let commonName:String? private let countryName:String? private let localityName:String? private let organizationName:String? private let organizationUnitName:String? private let stateOrProvinceName:String? private var keyAlgorithm: KeyAlgorithm! private var subjectDER:Data? public init(commonName: String?, organizationName:String?, organizationUnitName:String?, countryName:String?, stateOrProvinceName:String?, localityName:String?, keyAlgorithm: KeyAlgorithm){ self.commonName = commonName self.organizationName = organizationName self.organizationUnitName = organizationUnitName self.countryName = countryName self.stateOrProvinceName = stateOrProvinceName self.localityName = localityName self.subjectDER = nil self.keyAlgorithm = keyAlgorithm super.init() } public convenience override init(){ self.init(commonName: nil, organizationName:nil, organizationUnitName:nil, countryName:nil, stateOrProvinceName:nil, localityName:nil, keyAlgorithm: KeyAlgorithm.rsa(signatureType: .sha512)) } public convenience init(keyAlgorithm: KeyAlgorithm){ self.init(commonName: nil, organizationName:nil, organizationUnitName:nil, countryName:nil, stateOrProvinceName:nil, localityName:nil, keyAlgorithm: keyAlgorithm) } public func build(_ publicKeyBits:Data, privateKey: SecKey) -> Data?{ var certificationRequestInfo = buldCertificationRequestInfo(publicKeyBits) var certificationRequestInfoBytes = [UInt8](repeating: 0, count: certificationRequestInfo.count) certificationRequestInfo.copyBytes(to: &certificationRequestInfoBytes, count: certificationRequestInfo.count) let shaBytes = keyAlgorithm.sequenceObjectEncryptionType // Allocate enough space for RSA-8192 var signature = Data(capacity: 1024); if #available(iOS 11, *) { // Build signature - step 1: SHA1 hash // Build signature - step 2: Sign hash var error: Unmanaged? if let signatureData = SecKeyCreateSignature(privateKey, keyAlgorithm.signatureAlgorithm, certificationRequestInfo as CFData, &error) as Data?{ signature.append(signatureData) } if error != nil{ print("Error in creating signature: \(error!.takeRetainedValue())") } } else { // Fallback on earlier versions // Build signature - step 1: SHA1 hash var digest = [UInt8](repeating: 0, count: keyAlgorithm.digestLength) let padding = keyAlgorithm.padding switch keyAlgorithm! { case .rsa(signatureType: .sha1), .ec(signatureType: .sha1): var SHA1 = CC_SHA1_CTX() CC_SHA1_Init(&SHA1) CC_SHA1_Update(&SHA1, certificationRequestInfoBytes, CC_LONG(certificationRequestInfo.count)) CC_SHA1_Final(&digest, &SHA1) case .rsa(signatureType: .sha256), .ec(signatureType: .sha256): var SHA256 = CC_SHA256_CTX() CC_SHA256_Init(&SHA256) CC_SHA256_Update(&SHA256, certificationRequestInfoBytes, CC_LONG(certificationRequestInfo.count)) CC_SHA256_Final(&digest, &SHA256) case .rsa(signatureType: .sha512), .ec(signatureType: .sha512): var SHA512 = CC_SHA512_CTX() CC_SHA512_Init(&SHA512) CC_SHA512_Update(&SHA512, certificationRequestInfoBytes, CC_LONG(certificationRequestInfo.count)) CC_SHA512_Final(&digest, &SHA512) /* default: print("Error: signing algotirthm \(signAlgorithm) is not implemented") return nil */ } // Build signature - step 2: Sign hash var signatureRaw = [UInt8](repeating: 0, count: 1024); var signatureRawLen = 1024; let result = SecKeyRawSign(privateKey, padding, digest, digest.count, &signatureRaw, &signatureRawLen) signature.append(signatureRaw, count: signatureRawLen) if result != errSecSuccess{ print("Error signing: \(result)") return nil } } var certificationRequest = Data(capacity: 1024) certificationRequest.append(certificationRequestInfo) certificationRequest.append(shaBytes, count: shaBytes.count) var signData = Data(capacity: 257) let zero:UInt8 = 0 // Prepend zero signData.append(zero) signData.append(signature) appendBITSTRING(signData, into: &certificationRequest) enclose(&certificationRequest, by: SEQUENCE_tag) // Enclose into SEQUENCE return certificationRequest } public func buildAndEncodeDataAsString(_ publicKeyBits:Data, privateKey: SecKey)-> String? { guard let buildData = self.build(publicKeyBits, privateKey: privateKey) else{ return nil } return buildData.base64EncodedString(options: NSData.Base64EncodingOptions(rawValue: 0)).addingPercentEncoding(withAllowedCharacters: CharacterSet.urlQueryAllowed) } public func buildCSRAndReturnString(_ publicKeyBits:Data, privateKey: SecKey)-> String? { guard let csrString = self.buildAndEncodeDataAsString(publicKeyBits, privateKey: privateKey) else{ return nil } let head = "-----BEGIN CERTIFICATE REQUEST-----\n"; let foot = "-----END CERTIFICATE REQUEST-----\n"; var isMultiple = false; var newCSRString = head; //Check if string size is a multiple of 64 if (csrString.count % 64 == 0){ isMultiple = true; } for (i, char) in csrString.enumerated() { newCSRString.append(char) if ((i != 0) && ((i+1) % 64 == 0)){ newCSRString.append("\n") } if ((i == csrString.count-1) && !isMultiple){ newCSRString.append("\n") } } newCSRString = newCSRString+foot return newCSRString } func buldCertificationRequestInfo(_ publicKeyBits:Data) -> Data{ var certificationRequestInfo = Data(capacity: 256) //Add version let version: [UInt8] = [0x02, 0x01, 0x00] // ASN.1 Representation of integer with value 1 certificationRequestInfo.append(version, count: version.count) //Add subject var subject = Data(capacity: 256) if countryName != nil{ appendSubjectItem(OBJECT_countryName, value: countryName!, into: &subject) } if stateOrProvinceName != nil { appendSubjectItem(OBJECT_stateOrProvinceName, value: stateOrProvinceName!, into: &subject) } if localityName != nil { appendSubjectItem(OBJECT_localityName, value: localityName!, into: &subject) } if organizationName != nil{ appendSubjectItem(OBJECT_organizationName, value: organizationName!, into: &subject) } if organizationUnitName != nil { appendSubjectItem(OBJECT_organizationalUnitName, value: organizationUnitName!, into: &subject) } if commonName != nil{ appendSubjectItem(OBJECT_commonName, value: commonName!, into: &subject) } enclose(&subject, by: SEQUENCE_tag)// Enclose into SEQUENCE subjectDER = subject certificationRequestInfo.append(subject) //Add public key info let publicKeyInfo = buildPublicKeyInfo(publicKeyBits) certificationRequestInfo.append(publicKeyInfo) // Add attributes let attributes:[UInt8] = [0xA0, 0x00] certificationRequestInfo.append(attributes, count: attributes.count) enclose(&certificationRequestInfo, by: SEQUENCE_tag) // Enclose into SEQUENCE return certificationRequestInfo } // Utility class methods ... func buildPublicKeyInfo(_ publicKeyBits:Data)-> Data{ var publicKeyInfo = Data(capacity: 390) switch keyAlgorithm! { case .rsa: publicKeyInfo.append(OBJECT_rsaEncryptionNULL, count: OBJECT_rsaEncryptionNULL.count) case .ec: publicKeyInfo.append(OBJECT_ecPubicKey, count: OBJECT_ecPubicKey.count) publicKeyInfo.append(OBJECT_ecEncryptionNULL, count: OBJECT_ecEncryptionNULL.count) } enclose(&publicKeyInfo, by: SEQUENCE_tag) // Enclose into SEQUENCE var publicKeyASN = Data(capacity: 260) switch keyAlgorithm! { case .ec: let key = getPublicKey(publicKeyBits) publicKeyASN.append(key) default: let mod = getPublicKeyMod(publicKeyBits) let integer:UInt8 = 0x02 //Integer publicKeyASN.append(integer) appendDERLength(mod.count, into: &publicKeyASN) publicKeyASN.append(mod) let exp = getPublicKeyExp(publicKeyBits) publicKeyASN.append(integer) appendDERLength(exp.count, into: &publicKeyASN) publicKeyASN.append(exp) enclose(&publicKeyASN, by: SEQUENCE_tag)// Enclose into ?? } prependByte(0x00, into: &publicKeyASN) //Prepend 0 (?) appendBITSTRING(publicKeyASN, into: &publicKeyInfo) enclose(&publicKeyInfo, by: SEQUENCE_tag) // Enclose into SEQUENCE return publicKeyInfo } func appendSubjectItem(_ what:[UInt8], value: String, into: inout Data ) ->(){ if what.count != 5{ print("Error: attempting to a non-subject item") return } var subjectItem = Data(capacity: 128) subjectItem.append(what, count: what.count) appendUTF8String(string: value, into: &subjectItem) enclose(&subjectItem, by: SEQUENCE_tag) enclose(&subjectItem, by: SET_tag) into.append(subjectItem) } func appendUTF8String(string: String, into: inout Data) ->(){ let strType:UInt8 = 0x0C //UTF8STRING into.append(strType) appendDERLength(string.lengthOfBytes(using: String.Encoding.utf8), into: &into) into.append(string.data(using: String.Encoding.utf8)!) } func appendDERLength(_ length: Int, into: inout Data){ assert(length < 0x8000) if length < 128{ let d = UInt8(length) into.append(d) }else if (length < 0x100){ var d: [UInt8] = [0x81, UInt8(length & 0xFF)] into.append(&d, count: d.count) }else if length < 0x8000{ let preRes:UInt = UInt(length & 0xFF00) let res = UInt8(preRes >> 8) var d: [UInt8] = [0x82, res, UInt8(length & 0xFF)] into.append(&d, count: d.count) } } func appendBITSTRING(_ data: Data, into: inout Data)->(){ let strType:UInt8 = 0x03 //BIT STRING into.append(strType) appendDERLength(data.count, into: &into) into.append(data) } func enclose(_ data: inout Data, by: UInt8){ var newData = Data(capacity: data.count + 4) newData.append(by) appendDERLength(data.count, into: &newData) newData.append(data) data = newData } func prependByte(_ byte: UInt8, into: inout Data)->(){ var newData = Data(capacity: into.count + 1) newData.append(byte) newData.append(into) into = newData } func getPublicKey(_ publicKeyBits:Data)->Data{ //Current only supports uncompressed keys, 65=1+32+32 var iterator = 0 _ = derEncodingSpecificSize(publicKeyBits, at: &iterator, numOfBytes: 8) let range:Range = 0 ..< 65 return publicKeyBits.subdata(in: range) } // From http://stackoverflow.com/questions/3840005/how-to-find-out-the-modulus-and-exponent-of-rsa-public-key-on-iphone-objective-c func getPublicKeyExp(_ publicKeyBits:Data)->Data{ var iterator = 0 iterator+=1 // TYPE - bit stream - mod + exp _ = derEncodingGetSizeFrom(publicKeyBits, at: &iterator) // Total size iterator+=1 // TYPE - bit stream mod let modSize = derEncodingGetSizeFrom(publicKeyBits, at: &iterator) iterator += modSize iterator+=1 // TYPE - bit stream exp let expSize = derEncodingGetSizeFrom(publicKeyBits, at: &iterator) let range:Range = iterator ..< (iterator + expSize) return publicKeyBits.subdata(in: range) } func getPublicKeyMod(_ publicKeyBits: Data)->Data{ var iterator = 0 iterator+=1 // TYPE - bit stream - mod + exp _ = derEncodingGetSizeFrom(publicKeyBits, at: &iterator) iterator+=1 // TYPE - bit stream mod let modSize = derEncodingGetSizeFrom(publicKeyBits, at: &iterator) let range:Range = iterator ..< (iterator + modSize) return publicKeyBits.subdata(in: range) } func derEncodingSpecificSize(_ buf: Data, at iterator: inout Int, numOfBytes: Int)->Int{ var data = [UInt8](repeating: 0, count: buf.count) buf.copyBytes(to: &data, count: buf.count) if data[0] != 0x04{ print("Error, framework only supports uncompressed keys") } return buf.count } func derEncodingGetSizeFrom(_ buf: Data, at iterator: inout Int)->Int{ var data = [UInt8](repeating: 0, count: buf.count) buf.copyBytes(to: &data, count: buf.count) var itr = iterator var numOfBytes = 1 var ret = 0 if data[itr] > 0x80{ numOfBytes = Int((data[itr] - 0x80)) itr += 1 } for index in 0 ..< numOfBytes { ret = (ret * 0x100) + Int(data[itr + index]) } iterator = itr + numOfBytes return ret } } ================================================ FILE: ios/CSRSwiftConstants.swift ================================================ // // CertificateSigningRequestSwiftConstants.swift // CertificateSigningRequestSwift // // Created by Corey Baker on 10/8/17. // Copyright © 2017 Network Reconnaissance Lab. All rights reserved. // import Foundation import CommonCrypto // Use e.g., https://misc.daniel-marschall.de/asn.1/oid-converter/online.php to convert OID (OBJECT IDENTIFIER) to ASN.1 DER hex forms //Guide to translate OID's to bytes for ANS.1 (Look at comment section on page): https://msdn.microsoft.com/en-us/library/bb540809(v=vs.85).aspx /* RSA */ let OBJECT_rsaEncryptionNULL:[UInt8] = [0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x01, 0x01, 0x05, 0x00] // See: http://oid-info.com/get/1.2.840.113549.1.1.5 let SEQUENCE_OBJECT_sha1WithRSAEncryption:[UInt8] = [0x30, 0x0D, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 1, 1, 5, 0x05, 0x00] // See: http://oid-info.com/get/1.2.840.113549.1.1.11 let SEQUENCE_OBJECT_sha256WithRSAEncryption:[UInt8] = [0x30, 0x0D, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 1, 1, 0x0B, 0x05, 0x00] // See: http://oid-info.com/get/1.2.840.113549.1.1.13 let SEQUENCE_OBJECT_sha512WithRSAEncryption:[UInt8] = [0x30, 0x0D, 0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 1, 1, 0x0D, 0x05, 0x00] /* EC */ let OBJECT_ecEncryptionNULL:[UInt8] = [0x06, 0x08, 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x03, 0x01, 0x07] let OBJECT_ecPubicKey:[UInt8] = [0x06, 0x07, 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x02, 0x01] let SEQUENCE_OBJECT_sha1WithECEncryption:[UInt8] = [0x30, 0x0A, 0x06, 0x07, 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x01] // See: http://www.oid-info.com/get/1.2.840.10045.4.3.2 let SEQUENCE_OBJECT_sha256WithECEncryption:[UInt8] = [0x30, 0x0A, 0x06, 0x08, 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x02] // See: http://oid-info.com/get/1.2.840.10045.4.3.4 let SEQUENCE_OBJECT_sha512WithECEncryption:[UInt8] = [0x30, 0x0A, 0x06, 0x08, 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x04, 0x03, 0x04] //Enums public enum KeyAlgorithm { case rsa(signatureType: signature), ec(signatureType: signature) @available(iOS 10, *) public var secKeyAttrType: CFString { let result: CFString switch self { case .rsa: result = kSecAttrKeyTypeRSA case .ec: result = kSecAttrKeyTypeECSECPrimeRandom } return result } @available(iOS, deprecated: 10.0) public var secKeyAttrTypeiOS9: CFString { let result: CFString switch self { case .rsa: result = kSecAttrKeyTypeRSA case .ec: result = kSecAttrKeyTypeEC } return result } public var availableKeySizes: [Int] { let result: [Int] switch self { case .rsa: result = [512, 1024, 2048] case .ec: result = [256] } return result } public enum signature { case sha1, sha256, sha512 } public var type:String{ let result: String switch self { case .rsa(signatureType: .sha1), .rsa(signatureType: .sha256), .rsa(signatureType: .sha512): result = "RSA" case .ec(signatureType: .sha1), .ec(signatureType: .sha256), .ec(signatureType: .sha512): result = "EC" } return result } @available(iOS 10, *) public var signatureAlgorithm: SecKeyAlgorithm { let result: SecKeyAlgorithm switch self { case .rsa(signatureType: .sha1): result = .rsaSignatureMessagePKCS1v15SHA1 case .rsa(signatureType: .sha256): result = .rsaSignatureMessagePKCS1v15SHA256 case .rsa(signatureType: .sha512): result = .rsaSignatureMessagePKCS1v15SHA512 case .ec(signatureType: .sha1): result = .ecdsaSignatureMessageX962SHA1 case .ec(signatureType: .sha256): result = .ecdsaSignatureMessageX962SHA256 case .ec(signatureType: .sha512): result = .ecdsaSignatureMessageX962SHA512 } return result } @available(iOS, deprecated: 10.0) public var digestLength: Int { let result: Int32 switch self { //case .rsa(signatureType: .md5), .ec(signatureType: .md5): result = CC_MD5_DIGEST_LENGTH case .rsa(signatureType: .sha1), .ec(signatureType: .sha1): result = CC_SHA1_DIGEST_LENGTH //case .rsa(signatureType: .sha224), .ec(signatureType: .sha224): result = CC_SHA224_DIGEST_LENGTH case .rsa(signatureType: .sha256), .ec(signatureType: .sha256): result = CC_SHA256_DIGEST_LENGTH //case .rsa(signatureType: .sha384), .ec(signatureType: .sha384): result = CC_SHA384_DIGEST_LENGTH case .rsa(signatureType: .sha512), .ec(signatureType: .sha512): result = CC_SHA512_DIGEST_LENGTH } return Int(result) } @available(iOS, deprecated: 10.0) public var padding: SecPadding { let result: SecPadding switch self { case .rsa(signatureType: .sha1), .ec(signatureType: .sha1): result = SecPadding.PKCS1SHA1 case .rsa(signatureType: .sha256), .ec(signatureType: .sha256): result = SecPadding.PKCS1SHA256 case .rsa(signatureType: .sha512), .ec(signatureType: .sha512): result = SecPadding.PKCS1SHA512 } return result } var sequenceObjectEncryptionType: [UInt8]{ let result:[UInt8] switch self { case .rsa(signatureType: .sha1): result = SEQUENCE_OBJECT_sha1WithRSAEncryption case .rsa(signatureType: .sha256): result = SEQUENCE_OBJECT_sha256WithRSAEncryption case .rsa(signatureType: .sha512): result = SEQUENCE_OBJECT_sha512WithRSAEncryption case .ec(signatureType: .sha1): result = SEQUENCE_OBJECT_sha1WithECEncryption case .ec(signatureType: .sha256): result = SEQUENCE_OBJECT_sha256WithECEncryption case .ec(signatureType: .sha512): result = SEQUENCE_OBJECT_sha512WithECEncryption } return result } var objectEncryptionKeyType: [UInt8]{ let result:[UInt8] switch self { case .rsa(signatureType: .sha1), .rsa(signatureType: .sha256), .rsa(signatureType: .sha512): result = OBJECT_rsaEncryptionNULL case .ec(signatureType: .sha1), .ec(signatureType: .sha256), .ec(signatureType: .sha512): result = OBJECT_ecEncryptionNULL } return result } } ================================================ FILE: ios/RNRSA-Bridging-Header.h ================================================ // // Use this file to import your target's public headers that you would like to expose to Swift. // #import "RCTBridgeModule.h" ================================================ FILE: ios/RNRSA.m ================================================ // // RNECRSASwift.m // RNECRSA // #import @interface RCT_EXTERN_MODULE(RNRSA, NSObject) RCT_EXTERN_METHOD(generate:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(generateKeys:(int)keySize resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(sign:(NSString *)message withKey:(NSString *)withKey resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(signWithAlgorithm:(NSString *)message withKey:(NSString *)withKey withAlgorithm:(NSString *)withAlgorithm resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(sign64:(NSString *)message withKey:(NSString *)withKey resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(sign64WithAlgorithm:(NSString *)message withKey:(NSString *)withKey withAlgorithm:(NSString *)withAlgorithm resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(verify:(NSString *)signature withMessage:(NSString *)withMessage withKey:(NSString *)withKey resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(verifyWithAlgorithm:(NSString *)signature withMessage:(NSString *)withMessage withKey:(NSString *)withKey withAlgorithm:(NSString *)withAlgorithm resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(verify64:(NSString *)signature withMessage:(NSString *)withMessage withKey:(NSString *)withKey resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(verify64WithAlgorithm:(NSString *)signature withMessage:(NSString *)withMessage withKey:(NSString *)withKey withAlgorithm:(NSString *)withAlgorithm resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(decrypt:(NSString *)message withKey:(NSString *)withKey resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(encrypt:(NSString *)message withKey:(NSString *)withKey resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(decrypt64:(NSString *)message withKey:(NSString *)withKey resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(encrypt64:(NSString *)message withKey:(NSString *)withKey resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) @end ================================================ FILE: ios/RNRSA.swift ================================================ // // RNRSASwift.swift // test // //#if canImport(React) //import React //#endif import Foundation @objc(RNRSA) class RNRSA: NSObject { @objc static func requiresMainQueueSetup() -> Bool { return false } @objc func constantsToExport() -> [AnyHashable : Any]! { return[ "SHA256withRSA": "SHA256withRSA", "SHA512withRSA": "SHA512withRSA", "SHA1withRSA" : "SHA1withRSA", "SHA256withECDSA" : "SHA256withECDSA", "SHA512withECDSA" : "SHA512withECDSA", "SHA1withECDSA" : "SHA1withECDSA" ] } // generate key with default keysize - RSA - DER format @objc func generate(_ resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { self.generateKeys(2048, resolver: resolve, rejecter: reject) } // generate key with keysize - RSA - DER format @objc func generateKeys(_ keySize: Int, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative() let res = rsa_ec.generate(keySize: keySize) if(res ?? false){ let pub = rsa_ec.encodedPublicKeyDER() let prv = rsa_ec.encodedPrivateKeyRSA() let keys = ["public": pub, "private": prv] resolve(keys) return } resolve(false) } @objc func encrypt(_ message: String ,withKey: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative() guard let _ = rsa_ec.setPublicKey(publicKey: withKey) else { resolve(false) return } let msg = rsa_ec.encrypt(message: message) resolve(msg) } @objc func decrypt(_ message: String ,withKey: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative() guard let _ = rsa_ec.setPrivateKey(privateKey: withKey) else { resolve(false) return } let msg = rsa_ec.decrypt(message: message) resolve(msg) } @objc func encrypt64(_ message: String ,withKey: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative() guard let _ = rsa_ec.setPublicKey(publicKey: withKey) else { resolve(false) return } let msg = rsa_ec.encrypt64(message: message) resolve(msg) } @objc func decrypt64(_ message: String ,withKey: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative() guard let _ = rsa_ec.setPrivateKey(privateKey: withKey) else { resolve(false) return } let msg = rsa_ec.decrypt64(message: message) resolve(msg) } @objc func verify(_ signature: String, withMessage: String ,withKey: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative() guard let _ = rsa_ec.setPublicKey(publicKey: withKey) else { resolve(false) return } let verifyResult = rsa_ec.verify(encodedSignature: signature, withMessage: withMessage, withAlgorithm: "SHA512withRSA") if(verifyResult == false){ reject("verify failed", "error", nil) }else { resolve(true) } } @objc func verifyWithAlgorithm(_ signature: String, withMessage: String ,withKey: String, withAlgorithm: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative() guard let _ = rsa_ec.setPublicKey(publicKey: withKey) else { print("public key set failed") resolve(false) return } let verifyResult = rsa_ec.verify(encodedSignature: signature, withMessage: withMessage, withAlgorithm: withAlgorithm) if(verifyResult == false){ print("verify failed") reject("verify failed", "error", nil) }else { resolve(true) } } @objc func verify64(_ signature: String, withMessage: String ,withKey: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative() guard let _ = rsa_ec.setPublicKey(publicKey: withKey) else { resolve(false) return } let verifyResult = rsa_ec.verify64(encodedSignature: signature, withMessage: withMessage, withAlgorithm: "SHA512withRSA") if(verifyResult == false){ reject("verify failed", "error", nil) }else { resolve(true) } } @objc func verify64WithAlgorithm(_ signature: String, withMessage: String ,withKey: String, withAlgorithm: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative() guard let _ = rsa_ec.setPublicKey(publicKey: withKey) else { resolve(false) return } let verifyResult = rsa_ec.verify64(encodedSignature: signature, withMessage: withMessage, withAlgorithm: withAlgorithm) if(verifyResult == false){ reject("verify failed", "error", nil) }else { resolve(true) } } @objc func sign(_ message: String, withKey: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative() guard let _ = rsa_ec.setPrivateKey(privateKey: withKey) else { resolve(false) return } let signature = rsa_ec.sign(message: message, withAlgorithm: "SHA512withRSA", withEncodeOption: NSData.Base64EncodingOptions(rawValue: 0)) if(signature == nil){ reject("not sign it", "error", nil) }else { resolve(signature) } } @objc func signWithAlgorithm(_ message: String, withKey: String, withAlgorithm: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative() guard let _ = rsa_ec.setPrivateKey(privateKey: withKey) else { resolve(false) return } let signature = rsa_ec.sign(message: message, withAlgorithm: withAlgorithm, withEncodeOption: NSData.Base64EncodingOptions(rawValue: 0)) if(signature == nil){ reject("not sign it", "error", nil) }else { resolve(signature) } } @objc func sign64(_ message: String, withKey: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative() guard let _ = rsa_ec.setPrivateKey(privateKey: withKey) else { resolve(false) return } let signature = rsa_ec.sign64(b64message: message, withAlgorithm: "SHA512withRSA") if(signature == nil){ reject("not sign it", "error", nil) }else { resolve(signature) } } @objc func sign64WithAlgorithm(_ message: String, withKey: String, withAlgorithm: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative() guard let _ = rsa_ec.setPrivateKey(privateKey: withKey) else { resolve(false) return } let signature = rsa_ec.sign64(b64message: message, withAlgorithm: withAlgorithm) if(signature == nil){ reject("not sign it", "error", nil) }else { resolve(signature) } } } ================================================ FILE: ios/RNRSA.xcodeproj/project.pbxproj ================================================ // !$*UTF8*$! { archiveVersion = 1; classes = { }; objectVersion = 48; objects = { /* Begin PBXBuildFile section */ A055BADE23D5D02A00E2A830 /* RNRSA.m in Sources */ = {isa = PBXBuildFile; fileRef = A055BADD23D5D02A00E2A830 /* RNRSA.m */; }; A055BAE123D5D04D00E2A830 /* RNRSA.swift in Sources */ = {isa = PBXBuildFile; fileRef = A055BAE023D5D04D00E2A830 /* RNRSA.swift */; }; A055BAE323D5D08700E2A830 /* RNRSAKeychain.m in Sources */ = {isa = PBXBuildFile; fileRef = A055BAE223D5D08700E2A830 /* RNRSAKeychain.m */; }; A055BAE523D5D09F00E2A830 /* RNRSAKeychain.swift in Sources */ = {isa = PBXBuildFile; fileRef = A055BAE423D5D09F00E2A830 /* RNRSAKeychain.swift */; }; A055BAE723D5D0BC00E2A830 /* RSAECFormatter.swift in Sources */ = {isa = PBXBuildFile; fileRef = A055BAE623D5D0BC00E2A830 /* RSAECFormatter.swift */; }; A055BAE923D5D0EF00E2A830 /* RSAECNative.swift in Sources */ = {isa = PBXBuildFile; fileRef = A055BAE823D5D0EF00E2A830 /* RSAECNative.swift */; }; A055BAEB23D5D10C00E2A830 /* RSAKeyEncoding.swift in Sources */ = {isa = PBXBuildFile; fileRef = A055BAEA23D5D10C00E2A830 /* RSAKeyEncoding.swift */; }; A055BAED23D5D12800E2A830 /* CSRSwift.swift in Sources */ = {isa = PBXBuildFile; fileRef = A055BAEC23D5D12800E2A830 /* CSRSwift.swift */; }; A055BAEF23D5D14000E2A830 /* CSRSwiftConstants.swift in Sources */ = {isa = PBXBuildFile; fileRef = A055BAEE23D5D14000E2A830 /* CSRSwiftConstants.swift */; }; /* End PBXBuildFile section */ /* Begin PBXCopyFilesBuildPhase section */ BF40FFBB1F05EC4000DC4E95 /* Copy Headers */ = { isa = PBXCopyFilesBuildPhase; buildActionMask = 2147483647; dstPath = "include/$(PRODUCT_NAME)"; dstSubfolderSpec = 16; files = ( ); name = "Copy Headers"; runOnlyForDeploymentPostprocessing = 0; }; /* End PBXCopyFilesBuildPhase section */ /* Begin PBXFileReference section */ A055BADD23D5D02A00E2A830 /* RNRSA.m */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.objc; path = RNRSA.m; sourceTree = ""; }; A055BADF23D5D04C00E2A830 /* RNRSA-Bridging-Header.h */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.h; path = "RNRSA-Bridging-Header.h"; sourceTree = ""; }; A055BAE023D5D04D00E2A830 /* RNRSA.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = RNRSA.swift; sourceTree = ""; }; A055BAE223D5D08700E2A830 /* RNRSAKeychain.m */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.objc; path = RNRSAKeychain.m; sourceTree = ""; }; A055BAE423D5D09F00E2A830 /* RNRSAKeychain.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = RNRSAKeychain.swift; sourceTree = ""; }; A055BAE623D5D0BC00E2A830 /* RSAECFormatter.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = RSAECFormatter.swift; sourceTree = ""; }; A055BAE823D5D0EF00E2A830 /* RSAECNative.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = RSAECNative.swift; sourceTree = ""; }; A055BAEA23D5D10C00E2A830 /* RSAKeyEncoding.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = RSAKeyEncoding.swift; sourceTree = ""; }; A055BAEC23D5D12800E2A830 /* CSRSwift.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = CSRSwift.swift; sourceTree = ""; }; A055BAEE23D5D14000E2A830 /* CSRSwiftConstants.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = CSRSwiftConstants.swift; sourceTree = ""; }; BF40FFBD1F05EC4000DC4E95 /* libRNRSA.a */ = {isa = PBXFileReference; explicitFileType = archive.ar; includeInIndex = 0; path = libRNRSA.a; sourceTree = BUILT_PRODUCTS_DIR; }; /* End PBXFileReference section */ /* Begin PBXFrameworksBuildPhase section */ BF40FFBA1F05EC4000DC4E95 /* Frameworks */ = { isa = PBXFrameworksBuildPhase; buildActionMask = 2147483647; files = ( ); runOnlyForDeploymentPostprocessing = 0; }; /* End PBXFrameworksBuildPhase section */ /* Begin PBXGroup section */ BF40FFB41F05EC4000DC4E95 = { isa = PBXGroup; children = ( A055BAEE23D5D14000E2A830 /* CSRSwiftConstants.swift */, A055BAEC23D5D12800E2A830 /* CSRSwift.swift */, A055BAEA23D5D10C00E2A830 /* RSAKeyEncoding.swift */, A055BAE823D5D0EF00E2A830 /* RSAECNative.swift */, A055BAE623D5D0BC00E2A830 /* RSAECFormatter.swift */, A055BAE423D5D09F00E2A830 /* RNRSAKeychain.swift */, A055BAE223D5D08700E2A830 /* RNRSAKeychain.m */, A055BAE023D5D04D00E2A830 /* RNRSA.swift */, A055BADD23D5D02A00E2A830 /* RNRSA.m */, BF40FFBE1F05EC4000DC4E95 /* Products */, A055BADF23D5D04C00E2A830 /* RNRSA-Bridging-Header.h */, ); sourceTree = ""; }; BF40FFBE1F05EC4000DC4E95 /* Products */ = { isa = PBXGroup; children = ( BF40FFBD1F05EC4000DC4E95 /* libRNRSA.a */, ); name = Products; sourceTree = ""; }; /* End PBXGroup section */ /* Begin PBXNativeTarget section */ BF40FFBC1F05EC4000DC4E95 /* RNRSA */ = { isa = PBXNativeTarget; buildConfigurationList = BF40FFC61F05EC4000DC4E95 /* Build configuration list for PBXNativeTarget "RNRSA" */; buildPhases = ( BF40FFB91F05EC4000DC4E95 /* Sources */, BF40FFBA1F05EC4000DC4E95 /* Frameworks */, BF40FFBB1F05EC4000DC4E95 /* Copy Headers */, ); buildRules = ( ); dependencies = ( ); name = RNRSA; productName = RNRSA; productReference = BF40FFBD1F05EC4000DC4E95 /* libRNRSA.a */; productType = "com.apple.product-type.library.static"; }; /* End PBXNativeTarget section */ /* Begin PBXProject section */ BF40FFB51F05EC4000DC4E95 /* Project object */ = { isa = PBXProject; attributes = { LastUpgradeCheck = 1030; ORGANIZATIONNAME = RNRSA; TargetAttributes = { BF40FFBC1F05EC4000DC4E95 = { CreatedOnToolsVersion = 9.0; LastSwiftMigration = 1020; }; }; }; buildConfigurationList = BF40FFB81F05EC4000DC4E95 /* Build configuration list for PBXProject "RNRSA" */; compatibilityVersion = "Xcode 8.0"; developmentRegion = en; hasScannedForEncodings = 0; knownRegions = ( en, Base, ); mainGroup = BF40FFB41F05EC4000DC4E95; productRefGroup = BF40FFBE1F05EC4000DC4E95 /* Products */; projectDirPath = ""; projectRoot = ""; targets = ( BF40FFBC1F05EC4000DC4E95 /* RNRSA */, ); }; /* End PBXProject section */ /* Begin PBXSourcesBuildPhase section */ BF40FFB91F05EC4000DC4E95 /* Sources */ = { isa = PBXSourcesBuildPhase; buildActionMask = 2147483647; files = ( A055BAE723D5D0BC00E2A830 /* RSAECFormatter.swift in Sources */, A055BAE923D5D0EF00E2A830 /* RSAECNative.swift in Sources */, A055BAEB23D5D10C00E2A830 /* RSAKeyEncoding.swift in Sources */, A055BAE523D5D09F00E2A830 /* RNRSAKeychain.swift in Sources */, A055BAE123D5D04D00E2A830 /* RNRSA.swift in Sources */, A055BAE323D5D08700E2A830 /* RNRSAKeychain.m in Sources */, A055BAED23D5D12800E2A830 /* CSRSwift.swift in Sources */, A055BADE23D5D02A00E2A830 /* RNRSA.m in Sources */, A055BAEF23D5D14000E2A830 /* CSRSwiftConstants.swift in Sources */, ); runOnlyForDeploymentPostprocessing = 0; }; /* End PBXSourcesBuildPhase section */ /* Begin XCBuildConfiguration section */ BF40FFC41F05EC4000DC4E95 /* Debug */ = { isa = XCBuildConfiguration; buildSettings = { ALWAYS_SEARCH_USER_PATHS = NO; CLANG_ANALYZER_NONNULL = YES; CLANG_ANALYZER_NUMBER_OBJECT_CONVERSION = YES_AGGRESSIVE; CLANG_CXX_LANGUAGE_STANDARD = "gnu++14"; CLANG_CXX_LIBRARY = "libc++"; CLANG_ENABLE_MODULES = YES; CLANG_ENABLE_OBJC_ARC = YES; CLANG_WARN_BLOCK_CAPTURE_AUTORELEASING = YES; CLANG_WARN_BOOL_CONVERSION = YES; CLANG_WARN_COMMA = YES; CLANG_WARN_CONSTANT_CONVERSION = YES; CLANG_WARN_DEPRECATED_OBJC_IMPLEMENTATIONS = YES; CLANG_WARN_DIRECT_OBJC_ISA_USAGE = YES_ERROR; CLANG_WARN_DOCUMENTATION_COMMENTS = YES; CLANG_WARN_EMPTY_BODY = YES; CLANG_WARN_ENUM_CONVERSION = YES; CLANG_WARN_INFINITE_RECURSION = YES; CLANG_WARN_INT_CONVERSION = YES; CLANG_WARN_NON_LITERAL_NULL_CONVERSION = YES; CLANG_WARN_OBJC_IMPLICIT_RETAIN_SELF = YES; CLANG_WARN_OBJC_LITERAL_CONVERSION = YES; CLANG_WARN_OBJC_ROOT_CLASS = YES_ERROR; CLANG_WARN_RANGE_LOOP_ANALYSIS = YES; CLANG_WARN_STRICT_PROTOTYPES = YES; CLANG_WARN_SUSPICIOUS_MOVE = YES; CLANG_WARN_UNGUARDED_AVAILABILITY = YES_AGGRESSIVE; CLANG_WARN_UNREACHABLE_CODE = YES; CLANG_WARN__DUPLICATE_METHOD_MATCH = YES; CODE_SIGN_IDENTITY = "iPhone Developer"; COPY_PHASE_STRIP = NO; DEBUG_INFORMATION_FORMAT = dwarf; ENABLE_STRICT_OBJC_MSGSEND = YES; ENABLE_TESTABILITY = YES; GCC_C_LANGUAGE_STANDARD = gnu11; GCC_DYNAMIC_NO_PIC = NO; GCC_NO_COMMON_BLOCKS = YES; GCC_OPTIMIZATION_LEVEL = 0; GCC_PREPROCESSOR_DEFINITIONS = ( "DEBUG=1", "$(inherited)", ); GCC_WARN_64_TO_32_BIT_CONVERSION = YES; GCC_WARN_ABOUT_RETURN_TYPE = YES_ERROR; GCC_WARN_UNDECLARED_SELECTOR = YES; GCC_WARN_UNINITIALIZED_AUTOS = YES_AGGRESSIVE; GCC_WARN_UNUSED_FUNCTION = YES; GCC_WARN_UNUSED_VARIABLE = YES; IPHONEOS_DEPLOYMENT_TARGET = 10.3; MTL_ENABLE_DEBUG_INFO = YES; ONLY_ACTIVE_ARCH = YES; SDKROOT = iphoneos; }; name = Debug; }; BF40FFC51F05EC4000DC4E95 /* Release */ = { isa = XCBuildConfiguration; buildSettings = { ALWAYS_SEARCH_USER_PATHS = NO; CLANG_ANALYZER_NONNULL = YES; CLANG_ANALYZER_NUMBER_OBJECT_CONVERSION = YES_AGGRESSIVE; CLANG_CXX_LANGUAGE_STANDARD = "gnu++14"; CLANG_CXX_LIBRARY = "libc++"; CLANG_ENABLE_MODULES = YES; CLANG_ENABLE_OBJC_ARC = YES; CLANG_WARN_BLOCK_CAPTURE_AUTORELEASING = YES; CLANG_WARN_BOOL_CONVERSION = YES; CLANG_WARN_COMMA = YES; CLANG_WARN_CONSTANT_CONVERSION = YES; CLANG_WARN_DEPRECATED_OBJC_IMPLEMENTATIONS = YES; CLANG_WARN_DIRECT_OBJC_ISA_USAGE = YES_ERROR; CLANG_WARN_DOCUMENTATION_COMMENTS = YES; CLANG_WARN_EMPTY_BODY = YES; CLANG_WARN_ENUM_CONVERSION = YES; CLANG_WARN_INFINITE_RECURSION = YES; CLANG_WARN_INT_CONVERSION = YES; CLANG_WARN_NON_LITERAL_NULL_CONVERSION = YES; CLANG_WARN_OBJC_IMPLICIT_RETAIN_SELF = YES; CLANG_WARN_OBJC_LITERAL_CONVERSION = YES; CLANG_WARN_OBJC_ROOT_CLASS = YES_ERROR; CLANG_WARN_RANGE_LOOP_ANALYSIS = YES; CLANG_WARN_STRICT_PROTOTYPES = YES; CLANG_WARN_SUSPICIOUS_MOVE = YES; CLANG_WARN_UNGUARDED_AVAILABILITY = YES_AGGRESSIVE; CLANG_WARN_UNREACHABLE_CODE = YES; CLANG_WARN__DUPLICATE_METHOD_MATCH = YES; CODE_SIGN_IDENTITY = "iPhone Developer"; COPY_PHASE_STRIP = NO; DEBUG_INFORMATION_FORMAT = "dwarf-with-dsym"; ENABLE_NS_ASSERTIONS = NO; ENABLE_STRICT_OBJC_MSGSEND = YES; GCC_C_LANGUAGE_STANDARD = gnu11; GCC_NO_COMMON_BLOCKS = YES; GCC_WARN_64_TO_32_BIT_CONVERSION = YES; GCC_WARN_ABOUT_RETURN_TYPE = YES_ERROR; GCC_WARN_UNDECLARED_SELECTOR = YES; GCC_WARN_UNINITIALIZED_AUTOS = YES_AGGRESSIVE; GCC_WARN_UNUSED_FUNCTION = YES; GCC_WARN_UNUSED_VARIABLE = YES; IPHONEOS_DEPLOYMENT_TARGET = 10.3; MTL_ENABLE_DEBUG_INFO = NO; SDKROOT = iphoneos; VALIDATE_PRODUCT = YES; }; name = Release; }; BF40FFC71F05EC4000DC4E95 /* Debug */ = { isa = XCBuildConfiguration; buildSettings = { CLANG_ENABLE_MODULES = YES; LD_RUNPATH_SEARCH_PATHS = "$(inherited) @executable_path/Frameworks @loader_path/Frameworks"; OTHER_LDFLAGS = "-ObjC"; PRODUCT_NAME = "$(TARGET_NAME)"; SKIP_INSTALL = YES; SWIFT_OBJC_BRIDGING_HEADER = "RNRSA-Bridging-Header.h"; SWIFT_OPTIMIZATION_LEVEL = "-Onone"; SWIFT_VERSION = 5.0; TARGETED_DEVICE_FAMILY = "1,2"; }; name = Debug; }; BF40FFC81F05EC4000DC4E95 /* Release */ = { isa = XCBuildConfiguration; buildSettings = { CLANG_ENABLE_MODULES = YES; LD_RUNPATH_SEARCH_PATHS = "$(inherited) @executable_path/Frameworks @loader_path/Frameworks"; OTHER_LDFLAGS = "-ObjC"; PRODUCT_NAME = "$(TARGET_NAME)"; SKIP_INSTALL = YES; SWIFT_OBJC_BRIDGING_HEADER = "RNRSA-Bridging-Header.h"; SWIFT_VERSION = 5.0; TARGETED_DEVICE_FAMILY = "1,2"; }; name = Release; }; /* End XCBuildConfiguration section */ /* Begin XCConfigurationList section */ BF40FFB81F05EC4000DC4E95 /* Build configuration list for PBXProject "RNRSA" */ = { isa = XCConfigurationList; buildConfigurations = ( BF40FFC41F05EC4000DC4E95 /* Debug */, BF40FFC51F05EC4000DC4E95 /* Release */, ); defaultConfigurationIsVisible = 0; defaultConfigurationName = Release; }; BF40FFC61F05EC4000DC4E95 /* Build configuration list for PBXNativeTarget "RNRSA" */ = { isa = XCConfigurationList; buildConfigurations = ( BF40FFC71F05EC4000DC4E95 /* Debug */, BF40FFC81F05EC4000DC4E95 /* Release */, ); defaultConfigurationIsVisible = 0; defaultConfigurationName = Release; }; /* End XCConfigurationList section */ }; rootObject = BF40FFB51F05EC4000DC4E95 /* Project object */; } ================================================ FILE: ios/RNRSAKeychain.m ================================================ // // RNECRSASwift.m // RNECRSA // #import @interface RCT_EXTERN_MODULE(RNRSAKeychain, NSObject) RCT_EXTERN_METHOD(generate:(NSString *)keyTag resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(generateKeys:(NSString *)keyTag keySize:(int)keySize resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(generateCSR:(NSString *)keyTag CN:(NSString *)CN withAlgorithm:(NSString *)withAlgorithm resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(generateCSRWithEC:(NSString *)CN keyTag:(NSString *)keyTag keySize:(int)keySize resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(generateEC:(NSString *)keyTag resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(sign:(NSString *)message keyTag:(NSString *)keyTag resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(signWithAlgorithm:(NSString *)message keyTag:(NSString *)keyTag withAlgorithm:(NSString *)withAlgorithm resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(sign64:(NSString *)message keyTag:(NSString *)keyTag resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(sign64WithAlgorithm:(NSString *)message keyTag:(NSString *)keyTag withAlgorithm:(NSString *)withAlgorithm resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(getPublicKeyDER:(NSString *)keyTag resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(getPublicKeyRSA:(NSString *)keyTag resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(getPublicKey:(NSString *)keyTag resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(verify:(NSString *)signature withMessage:(NSString *)withMessage keyTag:(NSString *)keyTag resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(verifyWithAlgorithm:(NSString *)signature withMessage:(NSString *)withMessage keyTag:(NSString *)keyTag withAlgorithm:(NSString *)withAlgorithm resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(verify64:(NSString *)signature withMessage:(NSString *)withMessage keyTag:(NSString *)keyTag resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(verify64WithAlgorithm:(NSString *)signature withMessage:(NSString *)withMessage keyTag:(NSString *)keyTag withAlgorithm:(NSString *)withAlgorithm resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(deletePrivateKey:(NSString *)keyTag resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(encrypt:(NSString *)message keyTag:(NSString *)keyTag resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(decrypt:(NSString *)message keyTag:(NSString *)keyTag resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(encrypt64:(NSString *)message keyTag:(NSString *)keyTag resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) RCT_EXTERN_METHOD(decrypt64:(NSString *)message keyTag:(NSString *)keyTag resolver:(RCTPromiseResolveBlock)resolve rejecter:(RCTPromiseRejectBlock)reject) @end ================================================ FILE: ios/RNRSAKeychain.swift ================================================ // // RNRSASwift.swift // test // //#if canImport(React) //import React //#endif import Foundation @objc(RNRSAKeychain) class RNRSAKeychain: NSObject { @objc static func requiresMainQueueSetup() -> Bool { return false } @objc func constantsToExport() -> [AnyHashable : Any]! { return[ "SHA256withRSA": "SHA256withRSA", "SHA512withRSA": "SHA512withRSA", "SHA1withRSA" : "SHA1withRSA", "SHA256withECDSA" : "SHA256withECDSA", "SHA512withECDSA" : "SHA512withECDSA", "SHA1withECDSA" : "SHA1withECDSA" ] } // generate key with default keysize - RSA - DER format @objc func generate(_ keyTag: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative(keyTag: keyTag) // with default alogo RSA let res = rsa_ec.generate(keySize: 2048) if(res ?? false){ let pub = rsa_ec.encodedPublicKeyDER() let keys = ["public": pub] resolve(keys) return } resolve(false) } // generate key with keysize - RSA - DER format @objc func generateKeys(_ keyTag: String, keySize: Int, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative(keyTag: keyTag) // with default alogo RSA let res = rsa_ec.generate(keySize: keySize) if(res ?? false){ let pub = rsa_ec.encodedPublicKeyDER() let keys = ["public": pub] resolve(keys) return } resolve(false) } @objc func generateCSR(_ keyTag: String, CN: String, withAlgorithm: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative(keyTag: keyTag) let csr = rsa_ec.generateCSR(CN: CN, withAlgorithm: withAlgorithm) if(csr != nil){ let keys = ["csr": csr] resolve(keys) }else { reject("not exist CSR", "error", nil) } } @objc func generateCSRWithEC(_ CN: String, keyTag: String, keySize: Int, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative(keyTag: keyTag) let res = rsa_ec.generateEC() let pub = rsa_ec.encodedPublicKey() let csr = rsa_ec.generateCSR(CN: CN, withAlgorithm: "SHA256withECDSA") if(csr != nil){ let keys = ["csr": csr, "public": pub] resolve(keys) }else { reject("not exist CSR", "error", nil) } } @objc func generateEC(_ keyTag: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative(keyTag: keyTag) let res = rsa_ec.generateEC() if(res ?? false){ let pub = rsa_ec.encodedPublicKey() let keys = ["public": pub] resolve(keys) return } resolve(false) } @objc func sign(_ message: String, keyTag: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative(keyTag: keyTag) let signature = rsa_ec.sign(message: message, withAlgorithm: "SHA512withRSA", withEncodeOption: NSData.Base64EncodingOptions(rawValue: 0)) if(signature == nil){ reject("not sign it", "error", nil) }else { resolve(signature) } } @objc func signWithAlgorithm(_ message: String, keyTag: String, withAlgorithm: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative(keyTag: keyTag) let signature = rsa_ec.sign(message: message, withAlgorithm: withAlgorithm, withEncodeOption: NSData.Base64EncodingOptions(rawValue: 0)) if(signature == nil){ reject("not sign it", "error", nil) }else { resolve(signature) } } @objc func sign64(_ message: String, keyTag: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative(keyTag: keyTag) let signature = rsa_ec.sign64(b64message: message, withAlgorithm: "SHA512withRSA") if(signature == nil){ reject("not sign it", "error", nil) }else { resolve(signature) } } @objc func sign64WithAlgorithm(_ message: String, keyTag: String, withAlgorithm: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative(keyTag: keyTag) let signature = rsa_ec.sign64(b64message: message, withAlgorithm: withAlgorithm) if(signature == nil){ reject("not sign it", "error", nil) }else { resolve(signature) } } // generate key with default keysize - DER format @objc func getPublicKeyDER(_ keyTag: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative(keyTag: keyTag) let pub = rsa_ec.encodedPublicKeyDER() if(pub == nil){ reject("not exist public key", "error", nil) }else { let keys = ["public": pub] resolve(keys) } } // generate key with default keysize - DER format @objc func getPublicKey(_ keyTag: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative(keyTag: keyTag) let pub = rsa_ec.encodedPublicKey() if(pub == nil){ reject("not exist public key", "error", nil) }else { let keys = ["public": pub] resolve(keys) } } // generate key with default keysize - DER format @objc func getPublicKeyRSA(_ keyTag: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative(keyTag: keyTag) let pub = rsa_ec.encodedPublicKeyRSA() if(pub == nil){ reject("not exist public key", "error", nil) }else { let keys = ["public": pub] resolve(keys) } } @objc func verify(_ signature: String, withMessage: String, keyTag: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative(keyTag: keyTag) let verifyResult = rsa_ec.verify(encodedSignature: signature, withMessage: withMessage, withAlgorithm: "SHA512withRSA") if(verifyResult == false){ reject("verify failed", "error", nil) }else { resolve(true) } } @objc func verifyWithAlgorithm(_ signature: String, withMessage: String ,keyTag: String, withAlgorithm: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative(keyTag: keyTag) let verifyResult = rsa_ec.verify(encodedSignature: signature, withMessage: withMessage, withAlgorithm: withAlgorithm) if(verifyResult == false){ reject("verify failed", "error", nil) }else { resolve(true) } } @objc func verify64(_ signature: String, withMessage: String ,keyTag: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative(keyTag: keyTag) let verifyResult = rsa_ec.verify64(encodedSignature: signature, withMessage: withMessage, withAlgorithm: "SHA512withRSA") if(verifyResult == false){ reject("verify failed", "error", nil) }else { resolve(true) } } @objc func verify64WithAlgorithm(_ signature: String, withMessage: String ,keyTag: String, withAlgorithm: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative(keyTag: keyTag) let verifyResult = rsa_ec.verify64(encodedSignature: signature, withMessage: withMessage, withAlgorithm: withAlgorithm) if(verifyResult == false){ reject("verify failed", "error", nil) }else { resolve(true) } } @objc func deletePrivateKey(_ keyTag: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative(keyTag: keyTag) rsa_ec.deletePrivateKey() resolve(true) } @objc func decrypt(_ message: String ,keyTag: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative(keyTag: keyTag) let msg = rsa_ec.decrypt(message: message) resolve(msg) } @objc func encrypt(_ message: String ,keyTag: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative(keyTag: keyTag) let msg = rsa_ec.encrypt(message: message) resolve(msg) } @objc func decrypt64(_ message: String ,keyTag: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative(keyTag: keyTag) let msg = rsa_ec.decrypt64(message: message) resolve(msg) } @objc func encrypt64(_ message: String ,keyTag: String, resolver resolve: RCTPromiseResolveBlock, rejecter reject: RCTPromiseRejectBlock) -> Void { let rsa_ec = RSAECNative(keyTag: keyTag) let msg = rsa_ec.encrypt64(message: message) resolve(msg) } } ================================================ FILE: ios/RSAECFormatter.swift ================================================ // // RSAECFormatter.swift // BVLinearGradient // import Foundation class RSAECFormatter: NSObject { static let publicTag = "PUBLIC" static let privateTag = "PRIVATE" static let publicRsaTag = "RSA PUBLIC" static let privateRsaTag = "RSA PRIVATE" static public func PEMFormattedPublicKeyRSA(publicKeyData: Data) -> String { var encodedKey = Data() encodedKey.append(publicKeyData) return self.pemFormat(encodedKey: encodedKey, tag: publicRsaTag) } static public func PEMFormattedPrivateKeyRSA(privateKeyData: Data) -> String { var encodedKey = Data() encodedKey.append(privateKeyData) return self.pemFormat(encodedKey: encodedKey, tag: privateRsaTag) } static public func PEMFormattedPublicKey(publicKeyData: Data) -> String { var encodedKey = Data() encodedKey.append(publicKeyData) return self.pemFormat(encodedKey: encodedKey, tag: publicTag) } static public func PEMFormattedPrivateKey(privateKeyData: Data) -> String { var encodedKey = Data() encodedKey.append(privateKeyData) return self.pemFormat(encodedKey: encodedKey, tag: privateTag) } static public func pemFormat(encodedKey: Data, tag: String) -> String { return String(format: "%@\n%@\n%@", self.headerForTag(tag: tag), encodedKey.base64EncodedString(options: NSData.Base64EncodingOptions(rawValue: 0)), self.footerForTag(tag: tag)) } static public func headerForTag(tag: String) -> String{ return String(format: "-----BEGIN %@ KEY-----", tag) } static public func footerForTag(tag: String) -> String { return String(format: "-----END %@ KEY-----", tag) } static public func stripHeaders(pemString: String) -> String? { var str: String? = nil if(pemString.contains(RSAECFormatter.headerForTag(tag: RSAECFormatter.privateRsaTag))){ str = pemString.replacingOccurrences(of: RSAECFormatter.headerForTag(tag: RSAECFormatter.privateRsaTag), with: "") str = str!.replacingOccurrences(of: RSAECFormatter.footerForTag(tag: RSAECFormatter.privateRsaTag), with: "") }else if(pemString.contains(RSAECFormatter.headerForTag(tag: RSAECFormatter.privateTag))){ str = pemString.replacingOccurrences(of: RSAECFormatter.headerForTag(tag: RSAECFormatter.privateTag), with: "") str = str!.replacingOccurrences(of: RSAECFormatter.footerForTag(tag: RSAECFormatter.privateTag), with: "") }else if(pemString.contains(RSAECFormatter.headerForTag(tag: RSAECFormatter.publicRsaTag))){ str = pemString.replacingOccurrences(of: RSAECFormatter.headerForTag(tag: RSAECFormatter.publicRsaTag), with: "") str = str!.replacingOccurrences(of: RSAECFormatter.footerForTag(tag: RSAECFormatter.publicRsaTag), with: "") }else if(pemString.contains(RSAECFormatter.headerForTag(tag: RSAECFormatter.publicTag))){ str = pemString.replacingOccurrences(of: RSAECFormatter.headerForTag(tag: RSAECFormatter.publicTag), with: "") str = str!.replacingOccurrences(of: RSAECFormatter.footerForTag(tag: RSAECFormatter.publicTag), with: "") } return str } } ================================================ FILE: ios/RSAECNative.swift ================================================ // // RSANative.swift // BVLinearGradient import Foundation import CommonCrypto typealias SecKeyPerformBlock = (SecKey) -> () class RSAECNative: NSObject { var publicKey: SecKey? var privateKey: SecKey? var keyTag: String? let publicKeyTag: String? let privateKeyTag: String? var publicKeyBits: Data? var keyAlgorithm = KeyAlgorithm.rsa(signatureType: .sha512) public init(keyTag: String?){ self.publicKeyTag = "\(keyTag ?? "").public" self.privateKeyTag = "\(keyTag ?? "").private" self.keyTag = keyTag super.init() } public convenience override init(){ self.init(keyTag: nil) } public func generate(keySize: Int) -> Bool? { var publicKeyParameters: [String: AnyObject] = [ String(kSecAttrAccessible): kSecAttrAccessibleAlways, ] var privateKeyParameters: [String: AnyObject] = [ String(kSecAttrAccessible): kSecAttrAccessibleAlways, ] if((self.keyTag) != nil){ privateKeyParameters[String(kSecAttrIsPermanent)] = kCFBooleanTrue privateKeyParameters[String(kSecAttrApplicationTag)] = self.privateKeyTag as AnyObject publicKeyParameters[String(kSecAttrIsPermanent)] = kCFBooleanTrue publicKeyParameters[String(kSecAttrApplicationTag)] = self.publicKeyTag as AnyObject } #if !arch(i386) && !arch(x86_64) //This only works for Secure Enclave consistign of 256 bit key, note, the signatureType is irrelavent for this check if keyAlgorithm.type == KeyAlgorithm.ec(signatureType: .sha1).type{ let access = SecAccessControlCreateWithFlags(kCFAllocatorDefault, kSecAttrAccessibleAlwaysThisDeviceOnly, .privateKeyUsage, nil)! // Ignore error privateKeyParameters[String(kSecAttrAccessControl)] = access } #endif //Define what type of keys to be generated here var parameters: [String: AnyObject] = [ String(kSecReturnRef): kCFBooleanTrue, kSecPublicKeyAttrs as String: publicKeyParameters as AnyObject, kSecPrivateKeyAttrs as String: privateKeyParameters as AnyObject, ] parameters[String(kSecAttrKeySizeInBits)] = keySize as AnyObject if #available(iOS 10, *) { parameters[String(kSecAttrKeyType)] = keyAlgorithm.secKeyAttrType } else { // Fallback on earlier versions parameters[String(kSecAttrKeyType)] = keyAlgorithm.secKeyAttrTypeiOS9 } #if !arch(i386) && !arch(x86_64) //iOS only allows EC 256 keys to be secured in enclave. This will attempt to allow any EC key in the enclave, assuming iOS will do it outside of the enclave if it doesn't like the key size, note: the signatureType is irrelavent for this check if keyAlgorithm.type == KeyAlgorithm.ec(signatureType: .sha1).type{ parameters[String(kSecAttrTokenID)] = kSecAttrTokenIDSecureEnclave } #endif // TODO: Fix for when not set keytag and dont use keychain if #available(iOS 10.0, *) { var error: Unmanaged? self.privateKey = SecKeyCreateRandomKey(parameters as CFDictionary, &error) if self.privateKey == nil { print("Error occured: keys weren't created") return nil } self.publicKey = SecKeyCopyPublicKey(self.privateKey!) } else { // Fallback on earlier versions let result = SecKeyGeneratePair(parameters as CFDictionary, &publicKey, &privateKey) if result != errSecSuccess{ print("Error occured: \(result)") return nil } } guard self.publicKey != nil else { print( "Error in setUp(). PublicKey shouldn't be nil") return nil } guard self.privateKey != nil else{ print("Error in setUp(). PrivateKey shouldn't be nil") return nil } return true } public func generateEC() -> Bool? { self.keyAlgorithm = KeyAlgorithm.ec(signatureType: .sha256) // ios support 256 return self.generate(keySize: 256); } public func generateCSR(CN: String?, withAlgorithm: String) -> String? { self.setAlgorithm(algorithm: withAlgorithm) // self.privateKey = self.getPrivateKeyChain(tag: self.privateKeyTag!) self.publicKeyBits = self.getPublicKeyChainData(tag: self.publicKeyTag!) var csrString: String? let csrBlock: SecKeyPerformBlock = { privateKey in let csr = CertificateSigningRequest(commonName: CN, organizationName: nil, organizationUnitName: nil, countryName: nil, stateOrProvinceName: nil, localityName: nil, keyAlgorithm: self.keyAlgorithm) csrString = csr.buildCSRAndReturnString(self.publicKeyBits!, privateKey: privateKey) } if ((self.keyTag) != nil) { self.performWithPrivateKeyTag(keyTag: self.privateKeyTag!, block: csrBlock) } else { csrBlock(self.privateKey!); } return csrString } private func getPublicKeyChainData(tag : String) -> Data? { //Ask keychain to provide the publicKey in bits var query: [String: AnyObject] = [ String(kSecClass): kSecClassKey, String(kSecAttrApplicationTag): self.publicKeyTag as AnyObject, String(kSecReturnData): kCFBooleanTrue ] if #available(iOS 10, *) { query[String(kSecAttrKeyType)] = self.keyAlgorithm.secKeyAttrType } else { // Fallback on earlier versions query[String(kSecAttrKeyType)] = self.keyAlgorithm.secKeyAttrTypeiOS9 } var tempPublicKeyBits:AnyObject? let result = SecItemCopyMatching(query as CFDictionary, &tempPublicKeyBits) switch result { case errSecSuccess: guard let keyBits = tempPublicKeyBits as? Data else { print("error in: convert to publicKeyBits") return nil } return keyBits default: print("error in: convert to publicKeyBits") return nil } } private func setAlgorithm(algorithm: String) -> Void { switch algorithm { case "SHA256withRSA": self.keyAlgorithm = .rsa(signatureType: .sha256) case "SHA512withRSA": self.keyAlgorithm = .rsa(signatureType: .sha512) case "SHA1withRSA": self.keyAlgorithm = .rsa(signatureType: .sha1) case "SHA256withECDSA": self.keyAlgorithm = .ec(signatureType: .sha256) case "SHA512withECDSA": self.keyAlgorithm = .ec(signatureType: .sha512) case "SHA1withECDSA": self.keyAlgorithm = .ec(signatureType: .sha1) default: self.keyAlgorithm = .rsa(signatureType: .sha1) } } public func deletePrivateKey(){ var query: [String: AnyObject] = [ String(kSecClass) : kSecClassKey, String(kSecAttrApplicationTag): self.privateKeyTag as AnyObject, String(kSecReturnRef) : true as AnyObject ] if #available(iOS 10, *) { query[String(kSecAttrKeyType)] = self.keyAlgorithm.secKeyAttrType } else { // Fallback on earlier versions query[String(kSecAttrKeyType)] = self.keyAlgorithm.secKeyAttrTypeiOS9 } let result = SecItemDelete(query as CFDictionary) if result != errSecSuccess{ print("Error delete private key: \(result)") // return nil } } public func encodedPublicKeyRSA() -> String? { if ((self.keyTag) != nil) { var encodedPublicKey: String? self.performWithPublicKeyTag(tag: self.publicKeyTag!) { (publicKey) in encodedPublicKey = self.externalRepresentationForPublicKeyRSA(key: publicKey) } return encodedPublicKey; } if(self.publicKey == nil) { return nil } return self.externalRepresentationForPublicKeyRSA(key: self.publicKey!) } public func encodedPublicKeyDER() -> String? { if ((self.keyTag) != nil) { var encodedPublicKey: String? self.performWithPublicKeyTag(tag: self.publicKeyTag!) { (publicKey) in encodedPublicKey = self.externalRepresentationForPublicKeyDER(key: publicKey) } return encodedPublicKey; } if(self.publicKey == nil) { return nil } return self.externalRepresentationForPublicKeyDER(key: self.publicKey!) } public func encodedPublicKey() -> String? { if ((self.keyTag) != nil) { var encodedPublicKey: String? self.performWithPublicKeyTag(tag: self.publicKeyTag!) { (publicKey) in encodedPublicKey = self.externalRepresentationForPublicKey(key: publicKey) } return encodedPublicKey; } if(self.publicKey == nil) { return nil } return self.externalRepresentationForPublicKey(key: self.publicKey!) } public func encodedPrivateKeyRSA() -> String? { if ((self.keyTag) != nil) { var encodedPrivateKey: String? self.performWithPrivateKeyTag(keyTag: self.privateKeyTag!) { (privateKey) in encodedPrivateKey = self.externalRepresentationForPrivateKeyRSA(key: privateKey) } return encodedPrivateKey; } if(self.privateKey == nil) { return nil } return self.externalRepresentationForPrivateKeyRSA(key: self.privateKey!) } public func encodedPrivateKeyDER() -> String? { if ((self.keyTag) != nil) { var encodedPrivateKey: String? self.performWithPrivateKeyTag(keyTag: self.privateKeyTag!) { (privateKey) in encodedPrivateKey = self.externalRepresentationForPrivateKeyDER(key: privateKey) } return encodedPrivateKey; } if(self.privateKey == nil) { return nil } return self.externalRepresentationForPrivateKeyDER(key: self.privateKey!) } public func setPublicKey(publicKey: String) -> Bool? { guard let publicKeyStr = RSAECFormatter.stripHeaders(pemString: publicKey) else { return false } let query: [String: AnyObject] = [ String(kSecAttrKeyType): kSecAttrKeyTypeRSA, String(kSecAttrKeyClass): kSecAttrKeyClassPublic, ] print(publicKeyStr, "publicKeyStrpublicKeyStr") var error: Unmanaged? guard let data = Data(base64Encoded: publicKeyStr, options: .ignoreUnknownCharacters) else { return false } print(data, "datadatadata") if #available(iOS 10.0, *) { guard let key = SecKeyCreateWithData(data as CFData, query as CFDictionary, &error) else { return false } self.publicKey = key return true } else { // Fallback on earlier versions } return false } public func setPrivateKey(privateKey: String) -> Bool? { guard let privateKeyStr = RSAECFormatter.stripHeaders(pemString: privateKey) else { return nil } let query: [String: AnyObject] = [ String(kSecAttrKeyType): kSecAttrKeyTypeRSA, String(kSecAttrKeyClass): kSecAttrKeyClassPrivate, ] var error: Unmanaged? guard let data = Data(base64Encoded: privateKeyStr, options: .ignoreUnknownCharacters) else { return nil } if #available(iOS 10.0, *) { guard let key = SecKeyCreateWithData(data as CFData, query as CFDictionary, &error) else { return nil } self.privateKey = key return true } else { // Fallback on earlier versions } return nil } public func encrypt64(message: String) -> String? { guard let data = Data(base64Encoded: message, options: .ignoreUnknownCharacters) else { return nil } let encrypted = self._encrypt(data: data) return encrypted?.base64EncodedString(options: NSData.Base64EncodingOptions(rawValue: 0)) } public func encrypt(message: String) -> String? { guard let data = message.data(using: .utf8) else { return nil } let encrypted = self._encrypt(data: data) return encrypted?.base64EncodedString(options: .lineLength64Characters) } public func _encrypt(data: Data) -> Data? { var cipherText: Data? // Closures let encryptor:SecKeyPerformBlock = { publicKey in if #available(iOS 10.0, *) { let canEncrypt = SecKeyIsAlgorithmSupported(publicKey, .encrypt, .rsaEncryptionPKCS1) if(canEncrypt){ var error: Unmanaged? cipherText = SecKeyCreateEncryptedData(publicKey, .rsaEncryptionPKCS1, data as CFData, &error) as Data? } } else { // Fallback on earlier versions }; } if ((self.keyTag) != nil) { self.performWithPublicKeyTag(tag: self.publicKeyTag!, block: encryptor) } else { encryptor(self.publicKey!); } return cipherText; } public func decrypt64(message: String) -> String? { guard let data = Data(base64Encoded: message, options: .ignoreUnknownCharacters) else { return nil } let decrypted = self._decrypt(data: data) return decrypted?.base64EncodedString(options: NSData.Base64EncodingOptions(rawValue: 0)) } public func decrypt(message: String) -> String? { guard let data = Data(base64Encoded: message, options: .ignoreUnknownCharacters) else { return nil } let decrypted = self._decrypt(data: data) if (decrypted == nil) { return nil } return String(data: decrypted!, encoding: String.Encoding.utf8) } private func _decrypt(data: Data) -> Data? { var clearText: Data? let decryptor: SecKeyPerformBlock = {privateKey in if #available(iOS 10.0, *) { let canEncrypt = SecKeyIsAlgorithmSupported(privateKey, .decrypt, .rsaEncryptionPKCS1) if(canEncrypt){ var error: Unmanaged? clearText = SecKeyCreateDecryptedData(privateKey, .rsaEncryptionPKCS1, data as CFData, &error) as Data? } } else { // Fallback on earlier versions }; } if ((self.keyTag) != nil) { self.performWithPrivateKeyTag(keyTag: self.privateKeyTag!, block: decryptor) } else { decryptor(self.privateKey!); } return clearText } public func sign64(b64message: String, withAlgorithm: String) -> String? { guard let data = Data(base64Encoded: b64message, options: .ignoreUnknownCharacters) else { return nil } let encodedSignature = self._sign(messageBytes: data, withAlgorithm: withAlgorithm, withEncodeOption: .lineLength64Characters) return encodedSignature } public func sign(message: String, withAlgorithm: String, withEncodeOption: NSData.Base64EncodingOptions) -> String? { guard let data = message.data(using: .utf8) else { return nil } let encodedSignature = self._sign(messageBytes: data, withAlgorithm: withAlgorithm, withEncodeOption: withEncodeOption) return encodedSignature } private func _sign(messageBytes: Data, withAlgorithm: String, withEncodeOption: NSData.Base64EncodingOptions) -> String? { self.setAlgorithm(algorithm: withAlgorithm) var encodedSignature: String? let signer: SecKeyPerformBlock = { privateKey in if #available(iOS 11, *) { // Build signature - step 1: SHA1 hash // Build signature - step 2: Sign hash // var signature: Data? = nil var error: Unmanaged? let signature = SecKeyCreateSignature(privateKey, self.keyAlgorithm.signatureAlgorithm, messageBytes as CFData, &error) as Data? if error != nil{ print("Error in creating signature: \(error!.takeRetainedValue())") } encodedSignature = signature!.base64EncodedString(options: withEncodeOption) } else { // TODO: fix and test // Fallback on earlier versions // Build signature - step 1: SHA1 hash var signature = [UInt8](repeating: 0, count: self.keyAlgorithm.availableKeySizes.last!) var signatureLen:Int = signature.count var messageDataBytes = [UInt8](repeating: 0, count: messageBytes.count) messageBytes.copyBytes(to: &messageDataBytes, count: messageBytes.count) var digest = [UInt8](repeating: 0, count: self.keyAlgorithm.digestLength) let padding = self.keyAlgorithm.padding switch self.keyAlgorithm { case .rsa(signatureType: .sha1), .ec(signatureType: .sha1): var SHA1 = CC_SHA1_CTX() CC_SHA1_Init(&SHA1) CC_SHA1_Update(&SHA1, messageDataBytes, CC_LONG(messageBytes.count)) CC_SHA1_Final(&digest, &SHA1) case .rsa(signatureType: .sha256), .ec(signatureType: .sha256): var SHA256 = CC_SHA256_CTX() CC_SHA256_Init(&SHA256) CC_SHA256_Update(&SHA256, messageDataBytes, CC_LONG(messageBytes.count)) CC_SHA256_Final(&digest, &SHA256) case .rsa(signatureType: .sha512), .ec(signatureType: .sha512): var SHA512 = CC_SHA512_CTX() CC_SHA512_Init(&SHA512) CC_SHA512_Update(&SHA512, messageDataBytes, CC_LONG(messageBytes.count)) CC_SHA512_Final(&digest, &SHA512) } // Build signature - step 2: Sign hash let result = SecKeyRawSign(privateKey, padding, digest, digest.count, &signature, &signatureLen) if result != errSecSuccess{ print("Error signing: \(result)") return } var signData = Data() let zero:UInt8 = 0 signData.append(zero) signData.append(signature, count: signatureLen) encodedSignature = signData.base64EncodedString(options: withEncodeOption) } } if ((self.keyTag) != nil) { self.performWithPrivateKeyTag(keyTag: self.privateKeyTag!, block: signer) } else { signer(self.privateKey!); } return encodedSignature } public func verify64(encodedSignature: String, withMessage: String, withAlgorithm: String) -> Bool? { guard let messageBytes = Data(base64Encoded: encodedSignature, options: .ignoreUnknownCharacters) else { return nil } guard let signatureBytes = Data(base64Encoded: withMessage, options: .ignoreUnknownCharacters) else { return nil } return self._verify(signatureBytes: signatureBytes, withMessage: messageBytes, withAlgorithm: withAlgorithm) } public func verify(encodedSignature: String, withMessage: String, withAlgorithm: String) -> Bool? { guard let messageBytes = withMessage.data(using: .utf8) else { return nil } guard let signatureBytes = Data(base64Encoded: encodedSignature, options: .ignoreUnknownCharacters) else { return nil } return self._verify(signatureBytes:signatureBytes , withMessage: messageBytes, withAlgorithm: withAlgorithm) } private func _verify(signatureBytes: Data, withMessage: Data, withAlgorithm: String) -> Bool? { var result = false self.setAlgorithm(algorithm: withAlgorithm) // Closures let verifier: SecKeyPerformBlock = { publicKey in if #available(iOS 10.0, *) { var error: Unmanaged? result = SecKeyVerifySignature(publicKey, self.keyAlgorithm.signatureAlgorithm, withMessage as CFData, signatureBytes as CFData, &error) } else { // Fallback on earlier versions } } if ((self.keyTag) != nil) { self.performWithPublicKeyTag(tag: self.publicKeyTag!, block: verifier) } else { verifier(self.publicKey!); } return result } private func performWithPrivateKeyTag(keyTag: String, block: SecKeyPerformBlock){ var query: [String: AnyObject] = [ String(kSecClass) : kSecClassKey, String(kSecAttrApplicationTag): keyTag as AnyObject, String(kSecReturnRef) : true as AnyObject ] if #available(iOS 10, *) { query[String(kSecAttrKeyType)] = self.keyAlgorithm.secKeyAttrType } else { // Fallback on earlier versions query[String(kSecAttrKeyType)] = self.keyAlgorithm.secKeyAttrTypeiOS9 } var result : AnyObject? let status = SecItemCopyMatching(query as CFDictionary, &result) if status == errSecSuccess { print("\(keyTag) Key existed!") block((result as! SecKey?)!) } } private func performWithPublicKeyTag(tag: String, block: SecKeyPerformBlock){ self.performWithPrivateKeyTag(keyTag: self.privateKeyTag!) { (privateKey) in if #available(iOS 10.0, *) { let publicKey = SecKeyCopyPublicKey(privateKey) block(publicKey!) } else { // Fallback on earlier versions } } } private func externalRepresentationForPublicKeyRSA(key: SecKey) -> String? { guard let data = self.dataForKey(key: key) else { return nil } return RSAECFormatter.PEMFormattedPublicKeyRSA(publicKeyData: data) } private func externalRepresentationForPublicKey(key: SecKey) -> String? { guard let data = self.dataForKey(key: key) else { return nil } return RSAECFormatter.PEMFormattedPublicKey(publicKeyData: data) } private func externalRepresentationForPublicKeyDER(key: SecKey) -> String? { guard let data = self.dataForKey(key: key) else { return nil } let convertedData = RSAKeyEncoding().convertToX509EncodedKey(data) return RSAECFormatter.PEMFormattedPublicKey(publicKeyData: convertedData) } private func externalRepresentationForPrivateKeyRSA(key: SecKey) -> String? { guard let data = self.dataForKey(key: key) else { return nil } return RSAECFormatter.PEMFormattedPrivateKeyRSA(privateKeyData: data) } private func externalRepresentationForPrivateKeyDER(key: SecKey) -> String? { guard let data = self.dataForKey(key: key) else { return nil } let convertedData = RSAKeyEncoding().convertToX509EncodedKey(data) return RSAECFormatter.PEMFormattedPrivateKey(privateKeyData: convertedData) } private func externalRepresentationForPrivateKey(key: SecKey) -> String? { guard let data = self.dataForKey(key: key) else { return nil } return RSAECFormatter.PEMFormattedPrivateKey(privateKeyData: data) } private func dataForKey(key: SecKey) -> Data? { var error: Unmanaged? var keyData: Data? if #available(iOS 10.0, *) { keyData = SecKeyCopyExternalRepresentation(key, &error) as Data? } else { // Fallback on earlier versions } if (keyData == nil) { print("error in dataForKey") return nil } return keyData; } } ================================================ FILE: ios/RSAKeyEncoding.swift ================================================ // // RSAKeyEncoding.swift // RNECRSA import Foundation class RSAKeyEncoding: NSObject { // ASN.1 identifiers private let bitStringIdentifier: UInt8 = 0x03 private let sequenceIdentifier: UInt8 = 0x30 // ASN.1 AlgorithmIdentfier for RSA encryption: OID 1 2 840 113549 1 1 1 and NULL private let algorithmIdentifierForRSAEncryption: [UInt8] = [0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x01, 0x05, 0x00] /// Converts the DER encoding of an RSA public key that is either fetched from the /// keychain (e.g. by using `SecItemCopyMatching(_:_:)`) or retrieved in another way /// (e.g. by using `SecKeyCopyExternalRepresentation(_:_:)`), to a format typically /// used by tools and programming languages outside the Apple ecosystem (such as /// OpenSSL, Java, PHP and Perl). The DER encoding of an RSA public key created by /// iOS is represented with the ASN.1 RSAPublicKey type as defined by PKCS #1. /// However, many systems outside the Apple ecosystem expect the DER encoding of a /// key to be represented with the ASN.1 SubjectPublicKeyInfo type as defined by /// X.509. The two types are related in a way that if the SubjectPublicKeyInfo’s /// algorithm field contains the rsaEncryption object identifier as defined by /// PKCS #1, the subjectPublicKey field shall contain the DER encoding of an /// RSAPublicKey type. /// /// - Parameter rsaPublicKeyData: A data object containing the DER encoding of an /// RSA public key, which is represented with the ASN.1 RSAPublicKey type. /// - Returns: A data object containing the DER encoding of an RSA public key, which /// is represented with the ASN.1 SubjectPublicKeyInfo type. func convertToX509EncodedKey(_ rsaPublicKeyData: Data) -> Data { var derEncodedKeyBytes = [UInt8](rsaPublicKeyData) // Insert ASN.1 BIT STRING bytes at the beginning of the array derEncodedKeyBytes.insert(0x00, at: 0) derEncodedKeyBytes.insert(contentsOf: lengthField(of: derEncodedKeyBytes), at: 0) derEncodedKeyBytes.insert(bitStringIdentifier, at: 0) // Insert ASN.1 AlgorithmIdentifier bytes at the beginning of the array derEncodedKeyBytes.insert(contentsOf: algorithmIdentifierForRSAEncryption, at: 0) // Insert ASN.1 SEQUENCE bytes at the beginning of the array derEncodedKeyBytes.insert(contentsOf: lengthField(of: derEncodedKeyBytes), at: 0) derEncodedKeyBytes.insert(sequenceIdentifier, at: 0) return Data(derEncodedKeyBytes) } private func lengthField(of valueField: [UInt8]) -> [UInt8] { var length = valueField.count if length < 128 { return [ UInt8(length) ] } // Number of bytes needed to encode the length let lengthBytesCount = Int((log2(Double(length)) / 8) + 1) // First byte encodes the number of remaining bytes in this field let firstLengthFieldByte = UInt8(128 + lengthBytesCount) var lengthField: [UInt8] = [] for _ in 0..> 8 } // Insert firstLengthFieldByte at the beginning of the array lengthField.insert(firstLengthFieldByte, at: 0) return lengthField } } ================================================ FILE: package.json ================================================ { "name": "react-native-rsa-native", "version": "2.0.5", "description": "A native implementation of RSA key generation and encryption/decryption.", "main": "index.js", "types": "index.d.ts", "scripts": { "test": "echo \"Error: no test specified\" && exit 1" }, "keywords": [ "react-native", "rsa" ], "repository": { "type": "git", "url": "https://github.com/amitaymolko/react-native-rsa-native.git" }, "bugs": { "url": "https://github.com/amitaymolko/react-native-rsa-native/issues" }, "author": { "name": "Amitay Molko" }, "license": "MIT", "homepage": "https://github.com/amitaymolko/react-native-rsa-native#readme" } ================================================ FILE: react-native-rsa-native.podspec ================================================ require "json" Pod::Spec.new do |s| # NPM package specification package = JSON.parse(File.read(File.join(File.dirname(__FILE__), "package.json"))) s.name = "react-native-rsa-native" s.version = package["version"] s.summary = package["description"] s.homepage = package["homepage"] s.license = package["license"] s.authors = package["author"]["name"] s.platforms = { :ios => "10.0", :tvos => "10.0" } s.source = { :git => package["repository"]["url"], :tag => "#{s.version}" } s.source_files = "ios/**/*.{h,m,swift}" s.swift_version = "4.2" s.dependency "React" end