18
18
#import < CommonCrypto/CommonDigest.h>
19
19
#import < CommonCrypto/CommonHMAC.h>
20
20
#import < CommonCrypto/CommonCryptor.h>
21
- #import " AZCategory .h"
21
+ #import " AWSCategory .h"
22
22
#import " AWSService.h"
23
23
#import " AWSCredentialsProvider.h"
24
- #import " AZLogging .h"
24
+ #import " AWSLogging .h"
25
25
26
26
NSString *const AWSSigV4Marker = @" AWS4" ;
27
27
NSString *const AWSSigV4Algorithm = @" AWS4-HMAC-SHA256" ;
@@ -110,7 +110,7 @@ + (NSString *)HMACSign:(NSData *)data withKey:(NSString *)key usingAlgorithm:(CC
110
110
111
111
NSData *digestData = [NSData dataWithBytes: digestRaw length: digestLength];
112
112
113
- return [digestData az_base64EncodedString ];
113
+ return [digestData aws_base64EncodedString ];
114
114
}
115
115
116
116
@end
@@ -185,8 +185,8 @@ - (NSString *)signS3RequestV4:(NSMutableURLRequest *)urlRequest {
185
185
// }
186
186
187
187
NSDate *date = [NSDate date ];
188
- NSString *dateStamp = [date az_stringValue: AZDateShortDateFormat1 ];
189
- // NSString *dateTime = [date az_stringValue:AZDateAmzDateFormat ];
188
+ NSString *dateStamp = [date aws_stringValue: AWSDateShortDateFormat1 ];
189
+ // NSString *dateTime = [date aws_stringValue:AWSDateAmzDateFormat ];
190
190
191
191
NSString *scope = [NSString stringWithFormat: @" %@ /%@ /%@ /%@ " , dateStamp, self .endpoint.regionName, self .endpoint.serviceName, AWSSigV4Terminator];
192
192
NSString *signingCredentials = [NSString stringWithFormat: @" %@ /%@ " , self .credentialsProvider.accessKey, scope];
@@ -199,7 +199,7 @@ - (NSString *)signS3RequestV4:(NSMutableURLRequest *)urlRequest {
199
199
path = [NSString stringWithFormat: @" /" ];
200
200
} else {
201
201
// SigV4 signs escaped path string
202
- path = [[path az_stringWithURLEncoding ] stringByReplacingOccurrencesOfString: @" \% 2F" withString: @" /" ];
202
+ path = [[path aws_stringWithURLEncoding ] stringByReplacingOccurrencesOfString: @" \% 2F" withString: @" /" ];
203
203
}
204
204
NSString *query = urlRequest.URL .query ;
205
205
if (query == nil ) {
@@ -238,14 +238,14 @@ - (NSString *)signS3RequestV4:(NSMutableURLRequest *)urlRequest {
238
238
query: query
239
239
headers: headers
240
240
contentSha256: contentSha256];
241
- AZLogDebug (@" Canonical request: [%@ ]" , canonicalRequest);
241
+ AWSLogDebug (@" Canonical request: [%@ ]" , canonicalRequest);
242
242
243
243
NSString *stringToSign = [NSString stringWithFormat: @" %@ \n %@ \n %@ \n %@ " ,
244
244
AWSSigV4Algorithm,
245
245
[urlRequest valueForHTTPHeaderField: @" X-Amz-Date" ],
246
246
scope,
247
247
[AWSSignatureSignerUtility hexEncode: [AWSSignatureSignerUtility hashString: canonicalRequest]]];
248
- AZLogDebug (@" AWS4 String to Sign: [%@ ]" , stringToSign);
248
+ AWSLogDebug (@" AWS4 String to Sign: [%@ ]" , stringToSign);
249
249
250
250
NSData *kSigning = [self getV4DerivedKey: self .credentialsProvider.secretKey
251
251
date: dateStamp
@@ -282,12 +282,12 @@ - (NSString *)signRequestV4:(NSURLRequest *)request{
282
282
return nil ;
283
283
}
284
284
285
- NSDate *xAmzDate = [NSDate az_dateFromString : [request valueForHTTPHeaderField: @" X-Amz-Date" ]
286
- format: AZDateISO8601DateFormat2 ];
285
+ NSDate *xAmzDate = [NSDate aws_dateFromString : [request valueForHTTPHeaderField: @" X-Amz-Date" ]
286
+ format: AWSDateISO8601DateFormat2 ];
287
287
288
- NSString *dateStamp = [xAmzDate az_stringValue: AZDateShortDateFormat1 ];
288
+ NSString *dateStamp = [xAmzDate aws_stringValue: AWSDateShortDateFormat1 ];
289
289
290
- NSString *path = [request.URL.path az_stringWithURLEncodingPath ];
290
+ NSString *path = [request.URL.path aws_stringWithURLEncodingPath ];
291
291
if (path.length == 0 ) {
292
292
path = [NSString stringWithFormat: @" /" ];
293
293
}
@@ -304,8 +304,8 @@ - (NSString *)signRequestV4:(NSURLRequest *)request{
304
304
headers: request.allHTTPHeaderFields
305
305
contentSha256: contentSha256];
306
306
307
- AZLogDebug (@" AWS4 Canonical Request: [%@ ]" , canonicalRequest);
308
- AZLogDebug (@" payload %@ " ,[[NSString alloc ] initWithData: request.HTTPBody encoding: NSUTF8StringEncoding]);
307
+ AWSLogDebug (@" AWS4 Canonical Request: [%@ ]" , canonicalRequest);
308
+ AWSLogDebug (@" payload %@ " ,[[NSString alloc ] initWithData: request.HTTPBody encoding: NSUTF8StringEncoding]);
309
309
310
310
NSString *scope = [NSString stringWithFormat: @" %@ /%@ /%@ /%@ " ,
311
311
dateStamp,
@@ -321,7 +321,7 @@ - (NSString *)signRequestV4:(NSURLRequest *)request{
321
321
scope,
322
322
[AWSSignatureSignerUtility hexEncode: [AWSSignatureSignerUtility hashString: canonicalRequest]]];
323
323
324
- AZLogDebug (@" AWS4 String to Sign: [%@ ]" , stringToSign);
324
+ AWSLogDebug (@" AWS4 String to Sign: [%@ ]" , stringToSign);
325
325
326
326
NSData *kSigning = [self getV4DerivedKey: self .credentialsProvider.secretKey
327
327
date: dateStamp
@@ -455,9 +455,9 @@ + (NSString *)canonicalizedQueryString:(NSDictionary *)parameters {
455
455
NSString *key = [sortedKeys objectAtIndex: index ];
456
456
NSString *value = (NSString *)[parameters valueForKey: key];
457
457
458
- [mutableHTTPBodyString appendString: [key az_stringWithURLEncoding ]];
458
+ [mutableHTTPBodyString appendString: [key aws_stringWithURLEncoding ]];
459
459
[mutableHTTPBodyString appendString: @" =" ];
460
- [mutableHTTPBodyString appendString: [value az_stringWithURLEncoding ]];
460
+ [mutableHTTPBodyString appendString: [value aws_stringWithURLEncoding ]];
461
461
462
462
if (index < [sortedKeys count ] - 1 ) {
463
463
[mutableHTTPBodyString appendString: @" &" ];
@@ -527,7 +527,7 @@ - (BFTask *)interceptRequest:(NSMutableURLRequest *)request {
527
527
[parameters setObject: @" HmacSHA256" forKey: @" SignatureMethod" ];
528
528
[parameters setObject: @" 2" forKey: @" SignatureVersion" ];
529
529
[parameters setObject: self .credentialsProvider.accessKey forKey: @" AWSAccessKeyId" ];
530
- [parameters setObject: [[NSDate date ] az_stringValue: AZDateISO8601DateFormat3 ]
530
+ [parameters setObject: [[NSDate date ] aws_stringValue: AWSDateISO8601DateFormat3 ]
531
531
forKey: @" Timestamp" ];
532
532
// Added SecurityToken field in QueryString for SigV2 if STS has been used.
533
533
if ([self .credentialsProvider respondsToSelector: @selector (sessionKey )]) {
@@ -540,7 +540,7 @@ - (BFTask *)interceptRequest:(NSMutableURLRequest *)request {
540
540
NSString *signature = [AWSSignatureSignerUtility HMACSign: dataToSign
541
541
withKey: self .credentialsProvider.secretKey
542
542
usingAlgorithm: kCCHmacAlgSHA256 ];
543
- [canonicalizedQueryString appendFormat: @" &Signature=%@ " , [signature az_stringWithURLEncoding ]];
543
+ [canonicalizedQueryString appendFormat: @" &Signature=%@ " , [signature aws_stringWithURLEncoding ]];
544
544
request.HTTPBody = [canonicalizedQueryString dataUsingEncoding: NSUTF8StringEncoding];
545
545
546
546
return nil ;
@@ -639,7 +639,7 @@ - (BOOL)nextChunk {
639
639
NSData *data = [NSData dataWithBytesNoCopy: chunkBuffer length: read ];
640
640
[self .chunkData appendData: [self getSignedChunk: data]];
641
641
642
- AZLogDebug (@" stream read: %ld , chunk size: %lu " , (long )read , (unsigned long )[self .chunkData length ]);
642
+ AWSLogDebug (@" stream read: %ld , chunk size: %lu " , (long )read , (unsigned long )[self .chunkData length ]);
643
643
644
644
return YES ;
645
645
}
@@ -650,18 +650,18 @@ - (NSData *)getSignedChunk:(NSData *)data {
650
650
NSString *stringToSign = [NSString stringWithFormat:
651
651
@" %@ \n %@ \n %@ \n %@ \n %@ \n %@ " ,
652
652
@" AWS4-HMAC-SHA256-PAYLOAD" ,
653
- [self .date az_stringValue: AZDateISO8601DateFormat2 ],
653
+ [self .date aws_stringValue: AWSDateISO8601DateFormat2 ],
654
654
self .scope,
655
655
self .priorSha256,
656
656
emptyStringSha256,
657
657
chunkSha256];
658
- AZLogDebug (@" AWS4 String to Sign: [%@ ]" , stringToSign);
658
+ AWSLogDebug (@" AWS4 String to Sign: [%@ ]" , stringToSign);
659
659
660
660
NSData *signature = [AWSSignatureSignerUtility sha256HMacWithData: [stringToSign dataUsingEncoding: NSUTF8StringEncoding]
661
661
withKey: self .kSigning ];
662
662
self.priorSha256 = [self dataToHexString: signature];
663
663
NSString *chunkedHeader = [NSString stringWithFormat: @" %06lx ;chunk-signature=%@ \r\n " , (unsigned long )[data length ], self .priorSha256];
664
- AZLogDebug (@" AWS4 Chunked Header: [%@ ]" , chunkedHeader);
664
+ AWSLogDebug (@" AWS4 Chunked Header: [%@ ]" , chunkedHeader);
665
665
666
666
NSMutableData *signedChunk = [NSMutableData data ];
667
667
[signedChunk appendData: [chunkedHeader dataUsingEncoding: NSUTF8StringEncoding]];
0 commit comments