public void Given() { _fs = new InMemoryFileSystem(); var ks = new KeyStore<string>(_fs, new Settings(@"c:\db\raptile.db")); ks.Dispose(); _dir = _fs.GetDirectory(@"c:\db"); }
/// <summary> /// Default constructor created or loads the store /// </summary> public SecureStorageImplementation() { // verify that password is set if (string.IsNullOrWhiteSpace(StoragePassword)) { throw new Exception($"Must set StoragePassword"); } StoragePasswordArray = StoragePassword.ToCharArray(); // Instantiate store and protection _store = KeyStore.GetInstance(KeyStore.DefaultType); _passwordProtection = new KeyStore.PasswordProtection(StoragePasswordArray); // if store exists, load it from the file try { using (var stream = new IsolatedStorageFileStream(StorageFile, FileMode.Open, FileAccess.Read)) { _store.Load(stream, StoragePasswordArray); } } catch (Exception) { // this will happen for the first run. As no file is expected to be present _store.Load(null, StoragePasswordArray); } }
public Cipher ProvidesCipher (KeyStore keyStore) { try { return Cipher.GetInstance ("AES/CBC/PKCS7Padding"); } catch (NoSuchAlgorithmException e) { throw new RuntimeException ("Failed to get an instance of Cipher", e); } catch (NoSuchPaddingException e) { throw new RuntimeException ("Failed to get an instance of Cipher", e); } }
protected override void OnCreate (Bundle savedInstanceState) { base.OnCreate (savedInstanceState); fingerprintModule = new FingerprintModule(this); mKeyguardManager = fingerprintModule.ProvidesKeyguardManager (this); mKeyStore = fingerprintModule.ProvidesKeystore (); mKeyGenerator = fingerprintModule.ProvidesKeyGenerator (); mCipher = fingerprintModule.ProvidesCipher (mKeyStore); RequestPermissions (new [] { Manifest.Permission.UseFingerprint }, 0); }
static void Save(string clientid, string service, KeyStore ks) { var context = global::Android.App.Application.Context; lock(fileLock) { using(var s = context.OpenFileOutput(clientid, FileCreationMode.Private)) { ks.Store(s, service.ToCharArray()); } } }
public Cipher ProvidesCipher (KeyStore keyStore) { try { return Cipher.GetInstance (KeyProperties.KeyAlgorithmAes + "/" + KeyProperties.BlockModeCbc + "/" + KeyProperties.EncryptionPaddingPkcs7); } catch (NoSuchAlgorithmException e) { throw new RuntimeException ("Failed to get an instance of Cipher", e); } catch (NoSuchPaddingException e) { throw new RuntimeException ("Failed to get an instance of Cipher", e); } }
/// <summary> /// Initializes a new instance of the <see cref="KeyVaultStorage"/> class. /// </summary> /// <param name="password">Password to use for encryption.</param> public KeyVaultStorage(char[] password) { this.keyStore = KeyStore.GetInstance(KeyStore.DefaultType); this.protection = new KeyStore.PasswordProtection(password); if (File.FileExists(StorageFile)) { using (var stream = new IsolatedStorageFileStream(StorageFile, FileMode.Open, FileAccess.Read, File)) { this.keyStore.Load(stream, password); } } else { this.keyStore.Load(null, password); } }
public void RemoveKeyTest() { var path = new Settings("remove.dat"); var rdb = new KeyStore<long>(_fileSystem, path); rdb.Set(1, "a"); rdb.Set(2, "b"); rdb.Dispose(); rdb = new KeyStore<long>(_fileSystem, path); rdb.Remove(1L); rdb.Dispose(); rdb = new KeyStore<long>(_fileSystem, path); string data; bool result = rdb.Get(1, out data); if (result) Assert.Fail(); }
public AndroidAccountStore (Context context) { this.context = context; ks = KeyStore.GetInstance (KeyStore.DefaultType); prot = new KeyStore.PasswordProtection (Password); try { lock (fileLock) { using (var s = context.OpenFileInput (FileName)) { ks.Load (s, Password); } } } catch (FileNotFoundException) { //ks.Load (null, Password); LoadEmptyKeyStore (Password); } }
/// <summary> /// Work around Bug https://bugzilla.xamarin.com/show_bug.cgi?id=6766 /// </summary> static void LoadEmptyKeyStore(KeyStore ks, char[] password) { if (id_load_Ljava_io_InputStream_arrayC == IntPtr.Zero) { id_load_Ljava_io_InputStream_arrayC = JNIEnv.GetMethodID(ks.Class.Handle, "load", "(Ljava/io/InputStream;[C)V"); } IntPtr intPtr = IntPtr.Zero; IntPtr intPtr2 = JNIEnv.NewArray(password); JNIEnv.CallVoidMethod(ks.Handle, id_load_Ljava_io_InputStream_arrayC, new JValue[] { new JValue (intPtr), new JValue (intPtr2) }); JNIEnv.DeleteLocalRef(intPtr); if (password != null) { JNIEnv.CopyArray(intPtr2, password); JNIEnv.DeleteLocalRef(intPtr2); } }
public AndroidKeyStoreStorageService(ISettings settings) { _oldAndroid = Build.VERSION.SdkInt < BuildVersionCodes.M; _rsaMode = _oldAndroid ? "RSA/ECB/PKCS1Padding" : "RSA/ECB/OAEPWithSHA-1AndMGF1Padding"; _settings = settings; _keyStore = KeyStore.GetInstance(AndroidKeyStore); _keyStore.Load(null); try { GenerateStoreKey(true); } catch { GenerateStoreKey(false); } GenerateAesKey(); }
public void Test_KeyStore() { Random random = new Random(); byte[] passwordBytes = new byte[random.Next() % 256]; random.NextBytes(passwordBytes); string password = Convert.ToBase64String(passwordBytes); PrivateKey privateKey = PrivateKey.Random(); ExternalAddress address = Addresser.Create(privateKey); KeyStore keyStore = KeyStore.Create(privateKey, address); string fileName = keyStore.Store(password); keyStore = KeyStore.Load(password, fileName); File.Delete(fileName); Assert.AreEqual(privateKey, keyStore.PrivateKey); Assert.AreEqual(address, keyStore.Address); }
public async Task CreatePrivateKeyWithGivenPrivateKey() { // FIXME: passphrase로 "passphrase" 대신 랜덤 문자열을 사용하면 좋을 것 같습니다. var privateKey = new PrivateKey(); var privateKeyHex = ByteUtil.Hex(privateKey.ByteArray); var result = await ExecuteQueryAsync( $"mutation {{ keyStore {{ createPrivateKey(passphrase: \"passphrase\", privateKey: \"{privateKeyHex}\") {{ hex publicKey {{ address }} }} }} }}"); var privateKeyResult = result.Data.As <Dictionary <string, object> >()["keyStore"] .As <Dictionary <string, object> >()["createPrivateKey"] .As <Dictionary <string, object> >(); var createdPrivateKeyHex = privateKeyResult .As <Dictionary <string, object> >()["hex"].As <string>(); var createdPrivateKeyAddress = privateKeyResult .As <Dictionary <string, object> >()["publicKey"] .As <Dictionary <string, object> >()["address"].As <string>(); Assert.Equal(privateKey, new PrivateKey(ByteUtil.ParseHex(createdPrivateKeyHex))); Assert.Contains(KeyStore.List(), t => t.Item2.Address.ToString() == createdPrivateKeyAddress); }
public SecureStorage_Droid() { _keyStore = KeyStore.GetInstance(_droidKeyStore); _keyStore.Load(null); // Check if the RSA Key for encryptiong the stored credentials already exists // Typically, this needs to be created when the database and its corresponding keys is generated on first App launch if (!_keyStore.ContainsAlias(_secureStoredKeyAlias)) { // We have to check the API level to avoid using deprecated methods when not needed if ((int)Build.VERSION.SdkInt > 22) { GenerateAESKey_New(); } else { GenerateRSAKey(); GenerateAESKey_Depr(); } } }
JwtSecurityToken CreateJwtSecurityToken(User user) { var claims = new List <Claim>() { new Claim(JwtRegisteredClaimNames.Jti, Config.Id), new Claim(JwtRegisteredClaimNames.Sub, user.Name), new Claim(ClaimTypes.Sid, Config.Id), new Claim(ClaimTypes.Name, user.Name), new Claim(ClaimTypes.Role, user.Role) }; var token = new JwtSecurityToken( issuer: Config.Issuer, audience: Config.Audience, claims: claims, expires: DateTime.UtcNow.AddDays(7), signingCredentials: new SigningCredentials(KeyStore.GetSymmetricSecurityKey(), SecurityAlgorithms.HmacSha256) ); return(token); }
/// <summary> /// Work around Bug https://bugzilla.xamarin.com/show_bug.cgi?id=6766 /// </summary> static void LoadEmptyKeyStore(KeyStore ks, char[] password) { if (id_load_Ljava_io_InputStream_arrayC == IntPtr.Zero) { id_load_Ljava_io_InputStream_arrayC = JNIEnv.GetMethodID(ks.Class.Handle, "load", "(Ljava/io/InputStream;[C)V"); } IntPtr intPtr = IntPtr.Zero; IntPtr intPtr2 = JNIEnv.NewArray(password); JNIEnv.CallVoidMethod(ks.Handle, id_load_Ljava_io_InputStream_arrayC, new JValue[] { new JValue(intPtr), new JValue(intPtr2) }); JNIEnv.DeleteLocalRef(intPtr); if (password != null) { JNIEnv.CopyArray(intPtr2, password); JNIEnv.DeleteLocalRef(intPtr2); } }
private void CreateStore() { this.context = Android.App.Application.Context; ks = KeyStore.GetInstance(KeyStore.DefaultType); prot = new KeyStore.PasswordProtection(Password); try { lock (fileLock) { using (var s = context.OpenFileInput(FileName)) { ks.Load(s, Password); } } } catch (Java.IO.FileNotFoundException) { //ks.Load (null, Password); LoadEmptyKeyStore(Password); } }
public static KeyStore <Pbkdf2Params> MapDTOToModel(KeyStorePbkdf2DTO dto) { var pbdk2KeyStore = new KeyStore <Pbkdf2Params>(); pbdk2KeyStore.Address = dto.address; pbdk2KeyStore.Id = dto.id; pbdk2KeyStore.Version = dto.version; pbdk2KeyStore.Crypto = new CryptoInfo <Pbkdf2Params>(); pbdk2KeyStore.Crypto.Cipher = dto.crypto.cipher; pbdk2KeyStore.Crypto.CipherText = dto.crypto.cipherText; pbdk2KeyStore.Crypto.Kdf = dto.crypto.kdf; pbdk2KeyStore.Crypto.Mac = dto.crypto.mac; pbdk2KeyStore.Crypto.Kdfparams = new Pbkdf2Params(); pbdk2KeyStore.Crypto.Kdfparams.Count = dto.crypto.kdfparams.c; pbdk2KeyStore.Crypto.Kdfparams.Prf = dto.crypto.kdfparams.prf; pbdk2KeyStore.Crypto.Kdfparams.Dklen = dto.crypto.kdfparams.dklen; pbdk2KeyStore.Crypto.Kdfparams.Salt = dto.crypto.kdfparams.salt; pbdk2KeyStore.Crypto.CipherParams = new CipherParams(); pbdk2KeyStore.Crypto.CipherParams.Iv = dto.crypto.cipherparams.iv; return(pbdk2KeyStore); }
public void WhenCalculateBalance0PTCSLeft() { RemoveBlockChain(); var serviceProvider = BuildServiceProvider(); var transactionHelper = serviceProvider.GetService <ITransactionHelper>(); var blockChainFactory = serviceProvider.GetService <IBlockChainFactory>(); var blockChainStore = serviceProvider.GetService <IBlockChainStore>(); blockChainStore.Switch(_network); var blockChain = blockChainStore.GetBlockChain(); // Get the genesis block. var genesisBlock = blockChain.GetCurrentBlock(); var firstTransaction = genesisBlock.Transactions.First() as BcBaseTransaction; var firstTransactionOut = firstTransaction.TransactionOut.First(); var genesisKey = KeyStore.GetGenesisKey(); var genesisAdr = new BlockChainAddress(_scriptTypes, _network, genesisKey); // Create block chain address. var destinationBlockChainAddress = GenerateBlockChainAddress(); var signature = genesisKey.GetSignature(); // Create the script. var scriptBuilder = new ScriptBuilder(); var genesisScript = scriptBuilder .New() .AddToStack(signature) .AddToStack(genesisKey.GetPublicKey()) .Build(); var destinationScript = Script.CreateP2PKHScript(destinationBlockChainAddress.PublicKeyHash); var destGenesisScript = Script.CreateP2PKHScript(genesisKey.GetPublicKeyHashed()); var transactionBuilder = new TransactionBuilder(); var noneCoinBaseTransaction = transactionBuilder // ADD GENESIS (10 BTC) => DESTINATION TRANSACTION. .NewNoneCoinbaseTransaction() .Spend(firstTransaction, 0, genesisScript.Serialize()) .AddOutput(2, destinationScript) .Build(); var balance = transactionHelper.CalculateBalance(noneCoinBaseTransaction, new[] { genesisAdr }, _network); var receiverBalance = transactionHelper.CalculateBalance(noneCoinBaseTransaction, new[] { destinationBlockChainAddress }, _network); Assert.IsTrue(balance == 0); Assert.IsTrue(receiverBalance == 2); }
public static Dictionary <X509Certificate2, System.Exception> ValidateCacerts() { var dic = new Dictionary <X509Certificate2, System.Exception>(); var jstore = KeyStore.getInstance("jks"); jstore.load(null); var cf = java.security.cert.CertificateFactory.getInstance("X509"); X509Store store = new X509Store(StoreName.Root, StoreLocation.LocalMachine); store.Open(OpenFlags.ReadOnly | OpenFlags.OpenExistingOnly); Dictionary <string, string> aliases = new Dictionary <string, string>(); foreach (X509Certificate2 cert in store.Certificates) { try { dic[cert] = null; if (!cert.HasPrivateKey) { // the alias must be unique, otherwise we overwrite the previous certificate with that alias string alias = cert.Subject; int unique = 0; while (aliases.ContainsKey(alias)) { alias = cert.Subject + " #" + (++unique); } aliases.Add(alias, null); //jstore.setCertificateEntry(alias, cf.generateCertificate(new ByteArrayInputStream(cert.RawData))); cf.generateCertificate(new ByteArrayInputStream(cert.RawData)); } } catch (System.Exception ex) { dic[cert] = ex; } } store.Close(); return(dic); }
public WalletAccount(Near near, string appKeyPrefix, IExternalAuthService authService, IExternalAuthStorage authStorage) { _networkId = near.Config.NetworkId; _walletBaseUrl = near.Config.WalletUrl; appKeyPrefix = string.IsNullOrEmpty(appKeyPrefix) || string.IsNullOrWhiteSpace(appKeyPrefix) ? "default" : appKeyPrefix; _authDataKey = $"{appKeyPrefix}{LocalStorageKeySuffix}"; _keyStore = (near.Connection.Signer as InMemorySigner).KeyStore; _authService = authService; _authStorage = authStorage; if (_authStorage.HasKey(_authDataKey)) { _authData.AccountId = _authStorage.GetValue(_authDataKey); } else { _authData.AccountId = null; } }
private IKey GetKey(string alias) { var keyStore = KeyStore.GetInstance(KeyStoreType); keyStore.Load(null); if (!keyStore.ContainsAlias(alias)) { var generator = KeyGenerator.GetInstance(KeyProperties.KeyAlgorithmAes, KeyStoreType); generator.Init(new KeyGenParameterSpec.Builder(alias, KeyStorePurpose.Encrypt | KeyStorePurpose.Decrypt) .SetBlockModes(KeyProperties.BlockModeGcm) .SetEncryptionPaddings(KeyProperties.EncryptionPaddingNone) .SetRandomizedEncryptionRequired(false) .Build()); generator.GenerateKey(); } var key = keyStore.GetKey(alias, null); return(key); }
public CertificatePinning() { try { byte[] keyStoreBytes = Base64.Decode("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", 0); KeyStore keyStore = KeyStore.GetInstance("BKS"); System.IO.MemoryStream ms = new System.IO.MemoryStream(keyStoreBytes); GZIPInputStream keyStoreInputStream = new GZIPInputStream(ms); //var readbytes = keyStoreInputStream.ToArray<byte>(); List <byte> values = new List <byte>(); bool notdone = true; while (notdone) { var input = keyStoreInputStream.Read(); if (input < 0 || input > 255) { break; } values.Add((byte)input); } try { keyStore.Load(new System.IO.MemoryStream(values.ToArray()), null); } finally { keyStoreInputStream.Close(); } TRUST_STORE = keyStore; String algorithm = TrustManagerFactory.DefaultAlgorithm; TrustManagerFactory trustManagerFactory = TrustManagerFactory.GetInstance(algorithm); trustManagerFactory.Init(keyStore); SSLContext context = SSLContext.GetInstance("TLS"); context.Init(null, trustManagerFactory.GetTrustManagers(), null); SSL_CONTEXT = context; } catch (Exception e) { } }
public static KeyStore <ScryptParams> MapDTOToModel(KeyStoreScryptDTO dto) { var scryptKeyStore = new KeyStore <ScryptParams>(); scryptKeyStore.Address = dto.address; scryptKeyStore.Id = dto.id; scryptKeyStore.Version = dto.version; scryptKeyStore.Crypto = new CryptoInfo <ScryptParams>(); scryptKeyStore.Crypto.Cipher = dto.crypto.cipher; scryptKeyStore.Crypto.CipherText = dto.crypto.cipherText; scryptKeyStore.Crypto.Kdf = dto.crypto.kdf; scryptKeyStore.Crypto.Mac = dto.crypto.mac; scryptKeyStore.Crypto.Kdfparams = new ScryptParams(); scryptKeyStore.Crypto.Kdfparams.R = dto.crypto.kdfparams.r; scryptKeyStore.Crypto.Kdfparams.N = dto.crypto.kdfparams.n; scryptKeyStore.Crypto.Kdfparams.P = dto.crypto.kdfparams.p; scryptKeyStore.Crypto.Kdfparams.Dklen = dto.crypto.kdfparams.dklen; scryptKeyStore.Crypto.Kdfparams.Salt = dto.crypto.kdfparams.salt; scryptKeyStore.Crypto.CipherParams = new CipherParams(); scryptKeyStore.Crypto.CipherParams.Iv = dto.crypto.cipherparams.iv; return(scryptKeyStore); }
public async Task RevokePrivateKey() { var privateKey = new PrivateKey(); var passphrase = ""; var protectedPrivateKey = ProtectedPrivateKey.Protect(privateKey, passphrase); KeyStore.Add(protectedPrivateKey); var address = privateKey.ToAddress(); var result = await ExecuteQueryAsync( $"mutation {{ keyStore {{ revokePrivateKey(address: \"{address.ToHex()}\") {{ address }} }} }}"); var revokedPrivateKeyAddress = result.Data.As <Dictionary <string, object> >()["keyStore"] .As <Dictionary <string, object> >()["revokePrivateKey"] .As <Dictionary <string, object> >()["address"].As <string>(); Assert.DoesNotContain(KeyStore.List(), t => t.Item2.Address.ToString() == revokedPrivateKeyAddress); Assert.Equal(address.ToString(), revokedPrivateKeyAddress); }
public void RefreshItems() { _listItems.Clear(); foreach (String alias in KeyStore.Aliases) { KeyStoreEntryType entryType; if (KeyStore.IsCertificateEntry(alias)) { entryType = KeyStoreEntryType.TrustCertEntry; } else if (KeyStore.IsKeyEntry(alias) && KeyStore.GetCertificateChain(alias) != null && KeyStore.GetCertificateChain(alias).Length != 0) { entryType = KeyStoreEntryType.KeyPairEntry; } else { entryType = KeyStoreEntryType.KeyEntry; } _listItems.Add(new ListItemEntry(entryType, alias, KeyStore.GetCertificate(alias).Certificate)); } }
public async void StoredSuccessfully() { var calledBack = false; var fileServiceMock = new Mock <IFileService>(); fileServiceMock.Setup(x => x.Exists(It.IsAny <string>())).Returns(false); fileServiceMock.Setup(x => x.WriteAllText(It.IsAny <string>(), It.IsAny <string>())) .Callback((string path, string json) => { var obj = JObject.Parse(json); Assert.Equal("abc123", obj["thehost"].Value <string>()); calledBack = true; }); var fileService = fileServiceMock.Object; var keyStore = new KeyStore(fileService); await keyStore.StoreKeyAsync("thehost", "abc123"); Assert.True(calledBack); }
protected List <T> GetStoredAccounts <T>(KeyStoreTypes keyStoreType, int chainId) where T : KeyStore { var result = new List <T>(); var path = Path.Combine(_accountsPath, keyStoreType.ToString().ToLower()); var files = _storage.GetFiles(path, "*.*"); foreach (var file in files) { try { var ext = file.Extension; if (ext != ".keystore") { continue; } var store = KeyStore.Restore <T>(_storage.ReadFileText(Path.Combine(path, file.Name))); if (chainId > 0) { if (store.ChainId != chainId) { continue; } } if (store.KeyStoreType != keyStoreType) { continue; } result.Add(store); } catch (Exception ex) { Log.IgnoreException(ex, this); } } return(result); }
protected override KeyStore ConfigureKeyStore(KeyStore keyStore) { if (_keyStore != null) { return(_keyStore); } _keyStore = KeyStore.GetInstance(KeyStore.DefaultType); _keyStore.Load(null, null); var cff = CertificateFactory.GetInstance("X.509"); Certificate cert; // Add your Certificate to the Assets folder and address it here by its name using (var certStream = Application.Context.Assets.Open("google-com.cert")) cert = cff.GenerateCertificate(certStream); _keyStore.SetCertificateEntry("TrustedCert", cert); return(_keyStore); }
public override byte[] Decrypt(byte[] encryptedBytes, byte[] iv, string keyName = null) { var key = KeyStore.GetKey(keyName ?? PublicKeyName); using (var aes = Aes.Create()) { aes.Key = Encoding.UTF8.GetBytes(key); aes.IV = iv; aes.Mode = CipherMode.CBC; var decrypter = aes.CreateDecryptor(aes.Key, aes.IV); using (var ms = new MemoryStream(encryptedBytes)) { using (var cs = new CryptoStream(ms, decrypter, CryptoStreamMode.Read)) using (var sr = new StreamReader(cs)) { var value = sr.ReadToEnd(); return(System.Text.Encoding.UTF8.GetBytes(value)); } } } }
/// <summary> /// Remove a user from token cache. /// </summary> /// <param name="account"></param> /// <param name="tokenCache">This parameter is no longer used. However to keep the API unchanged it's not removed.</param> public void RemoveUser(IAzureAccount account, IAzureTokenCache tokenCache) { if (account != null && !string.IsNullOrEmpty(account.Id) && !string.IsNullOrWhiteSpace(account.Type)) { switch (account.Type) { case AzureAccount.AccountType.AccessToken: account.SetProperty(AzureAccount.Property.AccessToken, null); account.SetProperty(AzureAccount.Property.GraphAccessToken, null); account.SetProperty(AzureAccount.Property.KeyVaultAccessToken, null); break; case AzureAccount.AccountType.ManagedService: account.SetProperty(AzureAccount.Property.MSILoginUri, null); break; case AzureAccount.AccountType.ServicePrincipal: try { KeyStore.DeleteKey(new ServicePrincipalKey(AzureAccount.Property.ServicePrincipalSecret, account.Id, account.GetTenants().FirstOrDefault())); KeyStore.DeleteKey(new ServicePrincipalKey(AzureAccount.Property.CertificatePassword, account.Id, account.GetTenants().FirstOrDefault())); } catch { // make best effort to remove credentials } RemoveFromTokenCache(account); break; case AzureAccount.AccountType.User: RemoveFromTokenCache(account); break; } } }
protected override void OnCreate(Bundle savedInstanceState) { base.OnCreate(savedInstanceState); SetContentView(Resource.Layout.activity_main); var attraction = Intent.GetStringExtra(EXTRA_ATTRACTION); if (savedInstanceState == null) { SupportFragmentManager.BeginTransaction() .Add(Resource.Id.container, DetailFragment.CreateInstance(attraction)) .Commit(); } fingerprintModule = new FingerprintModule(this); mKeyguardManager = fingerprintModule.ProvidesKeyguardManager(this); mKeyStore = fingerprintModule.ProvidesKeystore(); mKeyGenerator = fingerprintModule.ProvidesKeyGenerator(); mCipher = fingerprintModule.ProvidesCipher(mKeyStore); RequestPermissions(new[] { Manifest.Permission.UseFingerprint }, FINGERPRINT_PERMISSION_REQUEST_CODE); }
public KeyStoreAccess() { filename = System.IO.Path.Combine(System.Environment.GetFolderPath(Environment.SpecialFolder.MyDocuments), "pseadata"); keyStore = KeyStore.GetInstance(KeyStore.DefaultType); Java.IO.File fileTest = new Java.IO.File(filename); // if an existing keystore is there then use it. Otherwise, create a new, // empty keystore if (fileTest.Exists() && fileTest.IsFile && fileTest.CanRead() && fileTest.CanWrite()) { //FileInputStream file = new FileInputStream(filename); using (System.IO.FileStream file = new FileStream(filename, FileMode.Open)) { keyStore.Load(file, Password.GetPassword()); file.Close(); } } else { keyStore.Load(null, Password.GetPassword()); } }
private static void InitializePrivateKey() { if (!_HasKeyStore) { return; } var keyStore = KeyStore.GetInstance("AndroidKeyStore"); keyStore.Load(null); var entry = keyStore.GetEntry(Alias, null); if (entry != null && entry is KeyStore.SecretKeyEntry) { return; } var keyBuilder = KeyGenerator.GetInstance(KeyProperties.KeyAlgorithmAes, "AndroidKeyStore"); var spec = new KeyGenParameterSpec.Builder(Alias, KeyStorePurpose.Encrypt | KeyStorePurpose.Decrypt).SetBlockModes(KeyProperties.BlockModeCbc).SetEncryptionPaddings(KeyProperties.EncryptionPaddingPkcs7).Build(); keyBuilder.Init(spec); keyBuilder.GenerateKey(); }
public void Dispose(bool disposing) { if (_disposed) { return; } if (disposing) { if (_passProtection != null) { _passProtection.Dispose(); _passProtection = null; } if (_keyStore != null) { _keyStore.Dispose(); _keyStore = null; } } _disposed = true; }
public static void Main(string[] args) { Context ctx = new Context(); KeyStore store = ctx.KeyStore; Key[] publickeys = store.GetKeyList("", false); Key[] secretkeys = store.GetKeyList("", true); Console.WriteLine("Public PGP keys currently saved in your store:"); foreach (Key key in publickeys) { Console.WriteLine("Key " + key.Fingerprint); Console.WriteLine("\tUser: {0}\n", key.Uid.ToString()); } Console.WriteLine("\nSecret PGP keys currently saved in your store:"); foreach (Key key in secretkeys) { Console.WriteLine("Key " + key.Fingerprint); Console.WriteLine("\tUser: {0}\n", key.Uid.ToString()); } }
public static void ExportDemo(string path, string userId, int ID) { // initialize the KeyStore KeyStore ks = new KeyStore(@path, "changeit"); // should the exported files be ASCII or binary bool asciiArmored = true; // export public key having the specified userId // all public sub keys are exported too ks.ExportPublicKey(@"C:/Users/Dua'a-Orcas/Desktop/WebApplication1/WebApplication1/WebApplication1/PageStudents/Sig/" + ID + ".asc", userId, asciiArmored); // export secret key having the specified userId, this is usually our own key // all secret sub keys are exported too ks.ExportPrivateKey(@"C:/Users/Dua'a-Orcas/Desktop/WebApplication1/WebApplication1/WebApplication1/PageStudents/Sig/" + ID + "pr" + ".asc", userId, asciiArmored); // export both public and secret key with all sub keys in one file // the file is in ASCII armored format by default // ks.ExportKeyRing(@"DataFiles\keypair.asc", "*****@*****.**"); }
public KeyStore cargarCertificado(string claveCertificado, long codigoEmisor, byte[] certificado) { KeyStore keyStore = (KeyStore)null; try { keyStore = KeyStore.getInstance("PKCS12"); } catch (Exception ex) { int num = (int)XtraMessageBox.Show(" Error-->" + ex.ToString()); } try { InputStream myInputStream = new ByteArrayInputStream(certificado); keyStore.load(myInputStream, claveCertificado.ToArray <char>()); } catch (Exception ex) { XtraMessageBox.Show(ex.ToString()); } return(keyStore); }
public PasswordStorage(string fileName, char[] passkey) { this.filename = fileName; this.PassKey = passkey; this.keystore = KeyStore.GetInstance (KeyStore.DefaultType); this.protection = new KeyStore.PasswordProtection (this.PassKey); if (File.Exists (this.filename)) { lock (this.locker) { using (var stream = new FileStream (fileName, FileMode.Open)) { keystore.Load (stream, passkey); } } } else { keystore.Load (null, passkey); } }
public AndroidKeyStoreStorageService() { _oldAndroid = Build.VERSION.SdkInt < BuildVersionCodes.M; _rsaMode = _oldAndroid ? "RSA/ECB/PKCS1Padding" : "RSA/ECB/OAEPWithSHA-1AndMGF1Padding"; _settings = ServiceContainer.Resolve <SettingsShim>("settingsShim"); _keyStore = KeyStore.GetInstance(AndroidKeyStore); _keyStore.Load(null); /* * try * { * GenerateStoreKey(true); * } * catch * { * GenerateStoreKey(false); * } * * GenerateAesKey(); */ }
private X509Certificate _LoadCertificate(string path, string password, out PrivateKey privateKey, out Provider provider) { X509Certificate certificate = null; provider = null; privateKey = null; KeyStore ks = KeyStore.getInstance("PKCS12"); ks.load(new BufferedInputStream(new FileInputStream(path)), password.ToCharArray()); IPKStoreManager storeManager = new KSStore(ks, new PassStoreKS(password)); List certificates = storeManager.getSignCertificates(); if (certificates.size() == 1) { certificate = (X509Certificate)certificates.get(0); privateKey = storeManager.getPrivateKey(certificate); provider = storeManager.getProvider(certificate); return(certificate); } return(certificate); }
/// <summary> /// Configures the key store. The <paramref name="keyStore"/> parameter is set to instance of <see cref="KeyStore"/> /// created using the <see cref="KeyStore.DefaultType"/> type and with populated with certificates provided in the <see cref="TrustedCerts"/> /// property. AndroidClientHandler implementation simply returns the instance passed in the <paramref name="keyStore"/> parameter /// </summary> /// <returns>The key store.</returns> /// <param name="keyStore">Key store to configure.</param> protected virtual KeyStore ConfigureKeyStore (KeyStore keyStore) { AssertSelf (); return keyStore; }
public CryptoObjectHelper() { _keystore = KeyStore.GetInstance(KEYSTORE_NAME); _keystore.Load(null); }
private static void insertthread(KeyStore<Guid> rap, List<Guid> guids, int start, int count, char c) { for (int i = 0; i < count; i++) { rap.Set(guids[i + start], "" + (i + start)); if (i % 100000 == 0) { Console.Write(c); } } }
private static void readthread(KeyStore<Guid> rap, List<Guid> guids, int count, char c) { Thread.Sleep(5000); int notfound = 0; for (int i = 0; i < count; i++) { string bb; if (rap.Get(guids[i], out bb)) { if (bb != "" + i) notfound++; } else notfound++; if (i % 100000 == 0) { Console.Write(c); } } if (notfound > 0) { Console.WriteLine("not found = " + notfound); Assert.Fail(); } Console.WriteLine("read done"); }
public SSLSocketFactoryEx(KeyStore truststore) : base(truststore) { ITrustManager tm = new X509TrustManager(); sslContext.Init(null, new ITrustManager[] { tm }, null); }
private static void threadtest(KeyStore<Guid> rap) { const int count = 1000000; var guids = new List<Guid>(); Console.WriteLine("building list..."); for (int i = 0; i < 2 * count; i++) guids.Add(Guid.NewGuid()); Console.WriteLine("starting..."); var t1 = new Thread(() => insertthread(rap, guids, 0, count, '.')); var t2 = new Thread(() => insertthread(rap, guids, count, count, '-')); var t3 = new Thread(() => readthread(rap, guids, count, 'R')); t3.Start(); t2.Start(); t1.Start(); t3.Join(); t2.Join(); t1.Join(); }
public void StringKeyTest() { var db = new KeyStore<string>(_fileSystem, new Settings("strings1")); for (var i = 0; i < 100000; i++) { db.Set("asdfasd" + i, "" + i); } db.Dispose(); }
/** * This method is called when a key store needs to be loaded. * @remark The application must call <tt>KeyStore#PutKeys</tt> to put the new key store data into the * internal key store. * * @param store Reference to the KeyStore to be loaded. * * @return * - QStatus.OK if the load request was satisfied * - An error status otherwise * */ public abstract QStatus LoadRequest(KeyStore store);
/** * This method is called when a key store needs to be stored. * @remark The application must call <tt>KeyStore#GetKeys</tt> to obtain the key data to be stored. * * @param store Reference to the KeyStore to be stored. * * @return * - QStatus.OK if the store request was satisfied * - An error status otherwise */ public abstract QStatus StoreRequest(KeyStore store);
/// <summary> /// Create and configure an instance of <see cref="TrustManagerFactory"/>. The <paramref name="keyStore"/> parameter is set to the /// return value of the <see cref="ConfigureKeyStore"/> method, so it might be null if the application overrode the method and provided /// no key store. It will not be <c>null</c> when the default implementation is used. The application can return <c>null</c> from this /// method in which case AndroidClientHandler will create its own instance of the trust manager factory provided that the <see cref="TrustCerts"/> /// list contains at least one valid certificate. If there are no valid certificates and this method returns <c>null</c>, no custom /// trust manager will be created since that would make all the HTTPS requests fail. /// </summary> /// <returns>The trust manager factory.</returns> /// <param name="keyStore">Key store.</param> protected virtual TrustManagerFactory ConfigureTrustManagerFactory (KeyStore keyStore) { AssertSelf (); return null; }