The File-Based Certificate and Key Stores manage cryptography certificates, keys and certificate applications in a device.
To understand File-Based Certificate and Key Stores, you need to have a basic understanding of the following:
A token is a physical instantiation of an object, such as a certificate or a key, stored in a phone. Each token belongs to a group of tokens called a token type. For example, an X.509 certificate is a token which belongs to the X.509 token type.
A cryptography key is a constant value applied using a cryptographic algorithm to encrypt text or to decrypt encrypted text.
Keys are classified as symmetric and asymmetric based on the type of algorithm applied. If the same key is used for both encryption and decryption, it is symmetric. If different keys are used for encryption and decryption, they are asymmetric. Asymmetric keys exist in the form of a public and private key pair, where the public key is used for encryption and the private key is used for decryption.
A certificate (or Public Key Infrastructure (PKI) certificate) is an electronic document that binds an identity to a public key. It is used to authenticate public keys.
Certificates are issued by a certification authority (CA) and usually include information such as a label, serial number, validity period, certificate format (for example, X.509) and algorithm type (for example, RSA).
A certificate store is a database or a file that stores and manipulates certificates.
Certificate stores typically provide the following functionality:
Generation, storage and retrieval of certificates
Assigning trust status to certificates
Retrieving list of applications trusting a certificate
A key store is a repository of keys that can be retrieved and used to accomplish a variety of tasks.
Key stores typically provide the following functionality:
Generation, import and export of RSA, DSA, and DH key pairs
Listing stored keys
Performing private key operations for authenticated users
The certificate applications store holds a list of the human-readable names and UIDs of applications that make use of (trust) the certificates held in the certificate stores.
See the Architecture section of the
Symbian platform provides device creators with a file-based software plug-in implementation of key, certificate and certificate application stores in the device such that these can be directly used. These stores are implemented using the
The
Device creators can choose to exclude this component at the time of ROM build. However, at least one implementation of the stores (Symbian's or the device creator's implementation) must be available to ensure the normal functioning of the applications that use the certificates, keys and certificate applications in the device.
Note: Device creators, by default, are provided with tools to manipulate certificate and key stores. For details of these tools, see
See the Key Classes section of the
See the following sections for details of the typical uses of the certificate and key stores:
The File-Based Certificate and Key Stores manage cryptography certificates, +keys and certificate applications in a device.
+To understand File-Based Certificate +and Key Stores, you need to have a basic understanding of the following:
A token is a physical instantiation of an object, such as a certificate +or a key, stored in a phone. Each token belongs to a group of tokens called +a token type. For example, an X.509 certificate is a token which belongs to +the X.509 token type.
A cryptography key is a constant value applied using a cryptographic +algorithm to encrypt text or to decrypt encrypted text.
Keys are classified +as symmetric and asymmetric based on the type of algorithm applied. If the +same key is used for both encryption and decryption, it is symmetric. If different +keys are used for encryption and decryption, they are asymmetric. Asymmetric +keys exist in the form of a public and private key pair, where the public +key is used for encryption and the private key is used for decryption.
A certificate (or Public Key Infrastructure (PKI) certificate) is an +electronic document that binds an identity to a public key. It is used to +authenticate public keys.
Certificates are issued by a certification +authority (CA) and usually include information such as a label, serial number, +validity period, certificate format (for example, X.509) and algorithm type +(for example, RSA).
A certificate store is a database or a file that stores and manipulates +certificates.
Certificate stores typically provide the following functionality:
Generation, storage +and retrieval of certificates
Assigning trust status +to certificates
Retrieving list of applications +trusting a certificate
A key store is a repository of keys that can be retrieved and used +to accomplish a variety of tasks.
Key stores typically provide the +following functionality:
Generation, import and +export of RSA, DSA, and DH key pairs
Listing stored keys
Performing private key +operations for authenticated users
The certificate applications store holds a list of the human-readable +names and UIDs of applications that make use of (trust) the certificates held +in the certificate stores.
See the Architecture section
+of the
The Symbian platform provides
+device creators with a file-based software plug-in implementation of key,
+certificate and certificate application stores in the device such that these
+can be directly used. These stores are implemented using the
The
Device creators can choose +to exclude this component at the time of ROM build. However, at least one +implementation of the stores (Symbian's or the device creator's implementation) +must be available to ensure the normal functioning of the applications that +use the certificates, keys and certificate applications in the device.
Note: Device
+creators, by default, are provided with tools to manipulate certificate and
+key stores. For details of these tools, see
See the Key Classes section of the
See the following sections for details +of the typical uses of the certificate and key stores: