cordova-keychain-aes-ecryption
v1.0.0
Published
Allows access to iOS KeyChain and Android Keystore from Cordova. Using AES encryption for bigger strings for encoding
Downloads
3
Maintainers
Readme
Keychain Plugin for Apache Cordova
Include support for Android Keystore (modified by Venelin Venelinov to use AES encryption for Android to store bigger strings than 246 characters). Requires Android API level 18 (4.3) for Keystore support
Apache 2.0 License except for the SFHFKeychainUtils code that is under src/ios/SFHFKeychainUtils
Follows the Cordova Plugin spec, so that it works with Plugman, or you can install it manually below.
Manually importing the plugin is not supported anymore, please use Plugman or the Cordova CLI tool
The "Keychain" object definition is installed globally.
The plugin's JavaScript functions are called after creating the plugin object thus:
var kc = new Keychain();
kc.getForKey(win, fail, "some_key", "some_servicename");
iCloud keychain enabled
iCloud keychain synchonizing is enabled, so the keychain will be mirrored across all devices if the user is signed in to iCloud (Settings > iCloud) and has iCloud keychain turned on (Settings > iCloud > Keychain)
Usage
Important:
If you are saving a JSON string value in setForKey, for example after applying JSON.stringify on an object, you must escape the characters in that string, if not you cannot retrieve it using getForKey.
var obj = { foo: 'bar' };
var value = JSON.stringify(obj);
value = value
.replace(/[\\]/g, '\\\\')
.replace(/[\"]/g, '\\\"')
.replace(/[\/]/g, '\\/')
.replace(/[\b]/g, '\\b')
.replace(/[\f]/g, '\\f')
.replace(/[\n]/g, '\\n')
.replace(/[\r]/g, '\\r')
.replace(/[\t]/g, '\\t');
See the example folder for example usage.
// Get a reference to the plugin first
// Use optional string parameter 'encryptionRequired' to specify if Android keys should be stored encrypted
// (no affect on iOS)
// Keychain() or Keychain('true') will use encryption to store keys
// Keychain('false') will store unencrypted keys
// If Android screen lock is not configured then an attempt to use Keychain with encrypted keys will fail with error:
// "failed: Android keystore must be in initialized and unlocked state if encryption is required"
var kc = new Keychain();
/*
Retrieves a value for a key and servicename.
@param successCallback returns the value as the argument to the callback when successful
@param failureCallback returns the error string as the argument to the callback, for a failure
@param key the key to retrieve
@param servicename the servicename to use
*/
kc.getForKey(successCallback, failureCallback, 'key', 'servicename');
/*
Sets a value for a key and servicename.
@param successCallback returns when successful
@param failureCallback returns the error string as the argument to the callback, for a failure
@param key the key to set
@param servicename the servicename to use
@param value the value to set
*/
kc.setForKey(successCallback, failureCallback, 'key', 'servicename', 'value');
/*
Removes a value for a key and servicename.
@param successCallback returns when successful
@param failureCallback returns the error string as the argument to the callback
@param key the key to remove
@param servicename the servicename to use
*/
kc.removeForKey(successCallback, failureCallback, 'key', 'servicename');