PDFEncrypt Module
Properties Methods Events Config Settings Errors
The PDFEncrypt module encrypts PDF documents.
Syntax
SecurePDF.PDFEncrypt
Remarks
As with signing, PDF encryption is part of the PDF format itself. It is used to prevent unauthorized access to documents and is performed using either an encryption password (known as password-based or symmetric encryption) or the intended document recipient's public X.509 certificate (known as certificate-based or asymmetric encryption). The PDFEncrypt class supports both encryption types.
The benefit of this encryption scheme as defined in the standard is that encrypted PDF documents are still valid PDF documents and can be handled by almost any PDF reader. Of course, this software will need to be able to decrypt such documents, but it can always reach the metadata (information about the document) and document structure.
Password-Based Encryption
In password-based encryption, the publishers and intended users of the document must know some secret key (a password), which is used both to protect the document and access the protected data. Once the document has been protected (encrypted), the password is required to get access to the document's contents. Although this method is straightforward and widely used for protecting PDF documents, the password must be passed from the publisher to the intended users, which presents a significant disadvantage.The following code shows how to encrypt a PDF document with a user password:
pdfencrypt.InputFile = "input.pdf";
pdfencrypt.OutputFile = "password_encrypted.pdf";
pdfencrypt.Password = "password";
pdfencrypt.Encrypt();
Owner passwords are also supported. Compared to user passwords, these passwords are used to protect the
permissions (set via the Permissions property) that will be embedded into the document. For example, you may
want to prevent the recipient from printing or editing the document. You can encrypt the document with an owner
password by specifying the OwnerPassword configuration setting before calling the Encrypt method.
Certificate-Based Encryption
Certificate-based encryption uses X.509 digital certificates to encrypt data. This encryption type provides a higher level of security compared to password-based encryption, as it relies on cryptographic key pairs, making it more difficult for unauthorized users to gain access. It is often used in environments where secure and authenticated document exchange is critical. Encrypting with a certificate (as opposed to a password) ensures that only the intended recipient who possesses the corresponding private key can decrypt the PDF document.The following code shows how to encrypt a PDF document with a certificate:
pdfencrypt.InputFile = "input.pdf";
pdfencrypt.OutputFile = "cert_encrypted.pdf";
pdfencrypt.EncryptionCert = new Certificate(CertStoreTypes.cstPublicKeyFile, "C:/MyCerts/cert.cer", "", "*");
pdfencrypt.Encrypt();
When encrypting using either a password or certificate, set the EncryptionAlgorithm property to the desired
encryption algorithm. As additional encryption options, you can also decide whether the document metadata will
be encrypted and embed permissions into the document via the EncryptMetadata and Permissions properties
respectively.
Property List
The following is the full list of the properties of the module with short descriptions. Click on the links for further details.
EncryptionAlgorithm | The encryption algorithm to encrypt the PDF document with. |
EncryptionCert | The encryption certificate. |
EncryptMetadata | Whether to encrypt the document metadata. |
InputData | A byte array containing the PDF document to process. |
InputFile | The PDF file to process. |
OutputData | A byte array containing the PDF document after processing. |
OutputFile | The path to a local file where the output will be written. |
Overwrite | Whether or not the module should overwrite files. |
Password | The password to encrypt the document with. |
Permissions | The document permissions associated with the encryption. |
Method List
The following is the full list of the methods of the module with short descriptions. Click on the links for further details.
Close | Closes an opened PDF document. |
Config | Sets or retrieves a configuration setting. |
Encrypt | Encrypts a PDF document. |
Encrypted | Checks whether a PDF document is encrypted. |
Open | Opens a PDF document for processing. |
Reset | Resets the module. |
Event List
The following is the full list of the events fired by the module with short descriptions. Click on the links for further details.
Error | Fired when information is available about errors during data delivery. |
Log | Fired once for each log message. |
Password | Fired when the module detects that the PDF document is encrypted with a password. |
RecipientInfo | Fired for each recipient certificate of the encrypted PDF document. |
Config Settings
The following is a list of config settings for the module with short descriptions. Click on the links for further details.
CloseInputStreamAfterProcessing | Whether to close the input stream after processing. |
CloseOutputStreamAfterProcessing | Whether to close the output stream after processing. |
CompressStreams | Whether to compress stream objects. |
HardenedKeyGeneration | Whether to use hardened key generation. |
LogLevel | The level of detail that is logged. |
OAEPMGF1HashAlgorithm | The MGF1 hash algorithm used with OAEP. |
OAEPParams | The hex-encoded OAEP parameters. |
OAEPRSAHashAlgorithm | The RSA hash algorithm used with OAEP. |
OwnerPassword | The owner password to encrypt the document with. |
RC4KeyBits | The number of key bits used for the RC4 algorithm. |
SaveChanges | Whether to save changes made to the PDF document. |
TempPath | The location where temporary files are stored. |
UseOAEP | Whether to use Optimal Asymmetric Encryption Padding (OAEP) during encryption and decryption. |
BuildInfo | Information about the product's build. |
CodePage | The system code page used for Unicode to Multibyte translations. |
LicenseInfo | Information about the current license. |
MaskSensitiveData | Whether sensitive data is masked in log messages. |
UseInternalSecurityAPI | Whether or not to use the system security libraries or an internal implementation. |
EncryptionAlgorithm Property (PDFEncrypt Module)
The encryption algorithm to encrypt the PDF document with.
Syntax
public var encryptionAlgorithm: String { get {...} set {...} }
@property (nonatomic,readwrite,assign,getter=encryptionAlgorithm,setter=setEncryptionAlgorithm:) NSString* encryptionAlgorithm; - (NSString*)encryptionAlgorithm; - (void)setEncryptionAlgorithm :(NSString*)newEncryptionAlgorithm;
Default Value
"AES256"
Remarks
This property is used to specify the encryption algorithm to encrypt the document with.
Possible values are:
- RC4
- AES128
- AES256
EncryptionCert Property (PDFEncrypt Module)
The encryption certificate.
Syntax
public var encryptionCert: Certificate { get {...} set {...} }
@property (nonatomic,readonly,assign,getter=encryptionCertEffectiveDate) NSString* encryptionCertEffectiveDate; - (NSString*)encryptionCertEffectiveDate; @property (nonatomic,readonly,assign,getter=encryptionCertExpirationDate) NSString* encryptionCertExpirationDate; - (NSString*)encryptionCertExpirationDate; @property (nonatomic,readonly,assign,getter=encryptionCertExtendedKeyUsage) NSString* encryptionCertExtendedKeyUsage; - (NSString*)encryptionCertExtendedKeyUsage; @property (nonatomic,readonly,assign,getter=encryptionCertFingerprint) NSString* encryptionCertFingerprint; - (NSString*)encryptionCertFingerprint; @property (nonatomic,readonly,assign,getter=encryptionCertFingerprintSHA1) NSString* encryptionCertFingerprintSHA1; - (NSString*)encryptionCertFingerprintSHA1; @property (nonatomic,readonly,assign,getter=encryptionCertFingerprintSHA256) NSString* encryptionCertFingerprintSHA256; - (NSString*)encryptionCertFingerprintSHA256; @property (nonatomic,readonly,assign,getter=encryptionCertIssuer) NSString* encryptionCertIssuer; - (NSString*)encryptionCertIssuer; @property (nonatomic,readonly,assign,getter=encryptionCertPrivateKey) NSString* encryptionCertPrivateKey; - (NSString*)encryptionCertPrivateKey; @property (nonatomic,readonly,assign,getter=encryptionCertPrivateKeyAvailable) BOOL encryptionCertPrivateKeyAvailable; - (BOOL)encryptionCertPrivateKeyAvailable; @property (nonatomic,readonly,assign,getter=encryptionCertPrivateKeyContainer) NSString* encryptionCertPrivateKeyContainer; - (NSString*)encryptionCertPrivateKeyContainer; @property (nonatomic,readonly,assign,getter=encryptionCertPublicKey) NSString* encryptionCertPublicKey; - (NSString*)encryptionCertPublicKey; @property (nonatomic,readonly,assign,getter=encryptionCertPublicKeyAlgorithm) NSString* encryptionCertPublicKeyAlgorithm; - (NSString*)encryptionCertPublicKeyAlgorithm; @property (nonatomic,readonly,assign,getter=encryptionCertPublicKeyLength) int encryptionCertPublicKeyLength; - (int)encryptionCertPublicKeyLength; @property (nonatomic,readonly,assign,getter=encryptionCertSerialNumber) NSString* encryptionCertSerialNumber; - (NSString*)encryptionCertSerialNumber; @property (nonatomic,readonly,assign,getter=encryptionCertSignatureAlgorithm) NSString* encryptionCertSignatureAlgorithm; - (NSString*)encryptionCertSignatureAlgorithm; @property (nonatomic,readwrite,assign,getter=encryptionCertStore,setter=setEncryptionCertStore:) NSString* encryptionCertStore; - (NSString*)encryptionCertStore; - (void)setEncryptionCertStore :(NSString*)newEncryptionCertStore; @property (nonatomic,readwrite,assign,getter=encryptionCertStoreB,setter=setEncryptionCertStoreB:) NSData* encryptionCertStoreB; - (NSData*)encryptionCertStoreB; - (void)setEncryptionCertStoreB :(NSData*)newEncryptionCertStore; @property (nonatomic,readwrite,assign,getter=encryptionCertStorePassword,setter=setEncryptionCertStorePassword:) NSString* encryptionCertStorePassword; - (NSString*)encryptionCertStorePassword; - (void)setEncryptionCertStorePassword :(NSString*)newEncryptionCertStorePassword; @property (nonatomic,readwrite,assign,getter=encryptionCertStoreType,setter=setEncryptionCertStoreType:) int encryptionCertStoreType; - (int)encryptionCertStoreType; - (void)setEncryptionCertStoreType :(int)newEncryptionCertStoreType; @property (nonatomic,readonly,assign,getter=encryptionCertSubjectAltNames) NSString* encryptionCertSubjectAltNames; - (NSString*)encryptionCertSubjectAltNames; @property (nonatomic,readonly,assign,getter=encryptionCertThumbprintMD5) NSString* encryptionCertThumbprintMD5; - (NSString*)encryptionCertThumbprintMD5; @property (nonatomic,readonly,assign,getter=encryptionCertThumbprintSHA1) NSString* encryptionCertThumbprintSHA1; - (NSString*)encryptionCertThumbprintSHA1; @property (nonatomic,readonly,assign,getter=encryptionCertThumbprintSHA256) NSString* encryptionCertThumbprintSHA256; - (NSString*)encryptionCertThumbprintSHA256; @property (nonatomic,readonly,assign,getter=encryptionCertUsage) NSString* encryptionCertUsage; - (NSString*)encryptionCertUsage; @property (nonatomic,readonly,assign,getter=encryptionCertUsageFlags) int encryptionCertUsageFlags; - (int)encryptionCertUsageFlags; @property (nonatomic,readonly,assign,getter=encryptionCertVersion) NSString* encryptionCertVersion; - (NSString*)encryptionCertVersion; @property (nonatomic,readwrite,assign,getter=encryptionCertSubject,setter=setEncryptionCertSubject:) NSString* encryptionCertSubject; - (NSString*)encryptionCertSubject; - (void)setEncryptionCertSubject :(NSString*)newEncryptionCertSubject; @property (nonatomic,readwrite,assign,getter=encryptionCertEncoded,setter=setEncryptionCertEncoded:) NSString* encryptionCertEncoded; - (NSString*)encryptionCertEncoded; - (void)setEncryptionCertEncoded :(NSString*)newEncryptionCertEncoded; @property (nonatomic,readwrite,assign,getter=encryptionCertEncodedB,setter=setEncryptionCertEncodedB:) NSData* encryptionCertEncodedB; - (NSData*)encryptionCertEncodedB; - (void)setEncryptionCertEncodedB :(NSData*)newEncryptionCertEncoded;
Default Value
0
Remarks
This property is used to provide the certificate used for encryption. Note that this certificate need not have a private key associated with it, but the intended recipient of the encrypted document does.
Note: Encryption for multiple recipients is currently unsupported.
EncryptMetadata Property (PDFEncrypt Module)
Whether to encrypt the document metadata.
Syntax
public var encryptMetadata: Bool { get {...} set {...} }
@property (nonatomic,readwrite,assign,getter=encryptMetadata,setter=setEncryptMetadata:) BOOL encryptMetadata; - (BOOL)encryptMetadata; - (void)setEncryptMetadata :(BOOL)newEncryptMetadata;
Default Value
True
Remarks
This property indicates whether the document metadata will be encrypted when the Encrypt method is called. Metadata contains additional information about the document, such as its name and author.
InputData Property (PDFEncrypt Module)
A byte array containing the PDF document to process.
Syntax
public var inputData: Data { get {...} set {...} }
@property (nonatomic,readwrite,assign,getter=inputData,setter=setInputData:) NSData* inputData; - (NSData*)inputData; - (void)setInputData :(NSData*)newInputData;
Remarks
This property is used to assign a byte array containing the PDF document to be processed.
InputFile Property (PDFEncrypt Module)
The PDF file to process.
Syntax
public var inputFile: String { get {...} set {...} }
@property (nonatomic,readwrite,assign,getter=inputFile,setter=setInputFile:) NSString* inputFile; - (NSString*)inputFile; - (void)setInputFile :(NSString*)newInputFile;
Default Value
""
Remarks
This property is used to provide a path to the PDF document to be processed.
OutputData Property (PDFEncrypt Module)
A byte array containing the PDF document after processing.
Syntax
public var outputData: Data { get {...} }
@property (nonatomic,readonly,assign,getter=outputData) NSData* outputData; - (NSData*)outputData;
Remarks
This property is used to read the byte array containing the produced output after the operation has completed. It will only be set if an output file and output stream have not been assigned via OutputFile and SetOutputStream respectively.
This property is read-only.
OutputFile Property (PDFEncrypt Module)
The path to a local file where the output will be written.
Syntax
public var outputFile: String { get {...} set {...} }
@property (nonatomic,readwrite,assign,getter=outputFile,setter=setOutputFile:) NSString* outputFile; - (NSString*)outputFile; - (void)setOutputFile :(NSString*)newOutputFile;
Default Value
""
Remarks
This property is used to provide a path where the resulting PDF document will be saved after the operation has completed.
Overwrite Property (PDFEncrypt Module)
Whether or not the module should overwrite files.
Syntax
public var overwrite: Bool { get {...} set {...} }
@property (nonatomic,readwrite,assign,getter=overwrite,setter=setOverwrite:) BOOL overwrite; - (BOOL)overwrite; - (void)setOverwrite :(BOOL)newOverwrite;
Default Value
False
Remarks
This property indicates whether or not the class will overwrite OutputFile, OutputData, or the stream set in SetOutputStream. If set to , an error will be thrown whenever OutputFile, OutputData, or the stream set in SetOutputStream exists before an operation.
Password Property (PDFEncrypt Module)
The password to encrypt the document with.
Syntax
public var password: String { get {...} set {...} }
@property (nonatomic,readwrite,assign,getter=password,setter=setPassword:) NSString* password; - (NSString*)password; - (void)setPassword :(NSString*)newPassword;
Default Value
""
Remarks
This property is used to provide the user password for encryption. Though it may be different from OwnerPassword, most implementations use the same value for both.
Permissions Property (PDFEncrypt Module)
The document permissions associated with the encryption.
Syntax
public var permissions: Int32 { get {...} set {...} }
@property (nonatomic,readwrite,assign,getter=permissions,setter=setPermissions:) int permissions; - (int)permissions; - (void)setPermissions :(int)newPermissions;
Default Value
0
Remarks
This property is used to specify the permissions protected by this encryption. The PDF specification expects applications to comply with these permissions when handling encrypted documents, but note that it is a policy-like requirement rather than an enforcement.
Its value should be provided as a bitmask of the following flags:
0x001 (pepAnnotations) | Annotating is allowed. |
0x002 (pepAssemble) | Assembling a new document on the basis of the processed one is allowed. |
0x004 (pepExtract) | Extraction/copying of the pictures and text from the document is allowed. |
0x008 (pepExtractAcc) | Content extraction is allowed for accessibility purposes only. |
0x010 (pepFillInForms) | Filling in forms is allowed. |
0x020 (pepHighQualityPrint) | High quality printing is allowed. |
0x040 (pepLowQualityPrint) | Low quality printing is allowed. |
0x080 (pepModify) | Modifications are allowed. |
Close Method (PDFEncrypt Module)
Closes an opened PDF document.
Syntax
public func close() throws -> Void
- (void)close;
Remarks
This method is used to close the previously opened document specified in InputFile, InputData, or SetInputStream. It should always be preceded by a call to the Open method.
Example:
component.InputFile = "input.pdf";
component.Open();
// Some operation
component.Close();
If any changes are made to the document, they will be saved automatically to OutputFile, OutputData, or the stream set in SetOutputStream when this method is called. To configure this saving behavior, set the SaveChanges configuration setting.
Config Method (PDFEncrypt Module)
Sets or retrieves a configuration setting.
Syntax
- (NSString*)config:(NSString*)configurationString;
Remarks
Config is a generic method available in every class. It is used to set and retrieve configuration settings for the class.
These settings are similar in functionality to properties, but they are rarely used. In order to avoid "polluting" the property namespace of the class, access to these internal properties is provided through the Config method.
To set a configuration setting named PROPERTY, you must call Config("PROPERTY=VALUE"), where VALUE is the value of the setting expressed as a string. For boolean values, use the strings "True", "False", "0", "1", "Yes", or "No" (case does not matter).
To read (query) the value of a configuration setting, you must call Config("PROPERTY"). The value will be returned as a string.
Encrypt Method (PDFEncrypt Module)
Encrypts a PDF document.
Syntax
public func encrypt() throws -> Void
- (void)encrypt;
Remarks
This method is used to encrypt the PDF document specified in InputFile, InputData, or SetInputStream. The document will be encrypted using EncryptionAlgorithm and either Password (for password-based encryption) or EncryptionCert (for certificate-based encryption), then saved in OutputFile, OutputData, or the stream set in SetOutputStream.
Example:
pdfencrypt.InputFile = "input.pdf";
pdfencrypt.OutputFile = "encrypted.pdf";
pdfencrypt.Password = "password";
pdfencrypt.EncryptionAlgorithm = "AES256";
pdfencrypt.Encrypt();
Note: If the document is not already opened, this method will open it, perform the operation, then close it.
Encrypted Method (PDFEncrypt Module)
Checks whether a PDF document is encrypted.
Syntax
public func encrypted() throws -> Bool
- (BOOL)encrypted;
Remarks
This method is used to determine whether or not the document specified in InputFile, InputData, or SetInputStream is encrypted. It will return if the document is pseudo-encrypted with an empty password.
Example:
pdfencrypt.InputFile = "input.pdf";
if (!pdfencrypt.Encrypted())
{
pdfencrypt.OutputFile = "encrypted.pdf";
// Set Password or EncryptionCert
pdfencrypt.Encrypt();
}
Note: If the document is not already opened, this method will open it, perform the operation, then close it.
Open Method (PDFEncrypt Module)
Opens a PDF document for processing.
Syntax
public func open() throws -> Void
- (void)open;
Remarks
This method is used to open the document specified in InputFile, InputData, or SetInputStream before performing some operation on it, such as encryption. When finished, call Close to complete or discard the operation.
It is recommended to use this method (alongside Close) when performing multiple operations on the document at once.
Automatic Decryption Functionality
If this method is called on an encrypted document, the Password or RecipientInfo event will fire (depending on the encryption type) as a notification that the document must be decrypted before processing can continue.Once the correct decryption material is supplied, the class will then attempt to decrypt the document automatically within this method. When this occurs, the decrypted content is kept in memory so that the document's encrypted status is preserved when it is saved later. Use the Decrypt method to save a decrypted copy of the document instead.
Reset Method (PDFEncrypt Module)
Resets the component.
Syntax
public func reset() throws -> Void
- (void)reset;
Remarks
This method is used to reset the class's properties and configuration settings to their default values.
Error Event (PDFEncrypt Module)
Fired when information is available about errors during data delivery.
Syntax
- (void)onError:(int)errorCode :(NSString*)description;
Remarks
The Error event is fired in case of exceptional conditions during message processing. Normally the class .
The ErrorCode parameter contains an error code, and the Description parameter contains a textual description of the error. For a list of valid error codes and their descriptions, please refer to the Error Codes section.
Log Event (PDFEncrypt Module)
Fired once for each log message.
Syntax
- (void)onLog:(int)logLevel :(NSString*)message :(NSString*)logType;
Remarks
This event is fired once for each log message generated by the class. The verbosity is controlled by the LogLevel configuration setting.
The LogLevel parameter indicates the detail level of the message. Possible values are:
0 (None) | No messages are logged. |
1 (Info - default) | Informational events such as the basics of the chain validation procedure are logged. |
2 (Verbose) | Detailed data such as HTTP requests are logged. |
3 (Debug) | Debug data including the full chain validation procedure are logged. |
The Message parameter is the log message.
The LogType parameter identifies the type of log entry. Possible values are:
- CertValidator
- Font
- HTTP
- PDFInvalidSignature
- PDFRevocationInfo
- Timestamp
- TSL
Password Event (PDFEncrypt Module)
Fired when the component detects that the PDF document is encrypted with a password.
Syntax
func onPassword(available: Bool, cancel: inout Bool)
- (void)onPassword:(BOOL)available :(int*)cancel;
Remarks
This event is fired during document processing to report that the document is encrypted with a password. It may be used to supply the correct decryption password to the Password property.
The Available parameter indicates whether the decryption password is already available to the class or still needs to be set. If this parameter is set to , the correct password must be provided for the decryption attempt to succeed.
The Cancel parameter determines whether the class will stop firing this event to request a password.
RecipientInfo Event (PDFEncrypt Module)
Fired for each recipient certificate of the encrypted PDF document.
Syntax
func onRecipientInfo(issuer: String, serialNumber: String, subjectKeyIdentifier: String, available: Bool, cancel: inout Bool)
- (void)onRecipientInfo:(NSString*)issuer :(NSString*)serialNumber :(NSString*)subjectKeyIdentifier :(BOOL)available :(int*)cancel;
Remarks
This event is fired during document processing for each recipient certificate that the document has been encrypted for (if applicable). It may be used to identify the certificate(s) to load and supply to the DecryptionCert property.
The Issuer parameter specifies the subject of the issuer certificate.
The SerialNumber parameter specifies the serial number of the encryption certificate.
The SubjectKeyIdentifier parameter specifies the X.509 subjectKeyIdentifier extension value of the encryption certificate, encoded as a hex string.
The Available parameter indicates whether the decryption certificate is already available to the class or still needs to be set. If this parameter is set to , the correct certificate must be provided for the decryption attempt to succeed.
The Cancel parameter determines whether the class will stop firing this event to request a certificate.
Note: The document may be encrypted with more than one certificate (or have "more than one recipient"), in which case each certificate will cause its own invocation of this event.
Certificate Type
This is the digital certificate being used.
Remarks
This type describes the current digital certificate. The certificate may be a public or private key. The fields are used to identify or select certificates.
Fields
effectiveDate
String (read-only)
Default Value: ""
The date on which this certificate becomes valid. Before this date, it is not valid. The date is localized to the system's time zone. The following example illustrates the format of an encoded date:
23-Jan-2000 15:00:00.
expirationDate
String (read-only)
Default Value: ""
The date on which the certificate expires. After this date, the certificate will no longer be valid. The date is localized to the system's time zone. The following example illustrates the format of an encoded date:
23-Jan-2001 15:00:00.
extendedKeyUsage
String (read-only)
Default Value: ""
A comma-delimited list of extended key usage identifiers. These are the same as ASN.1 object identifiers (OIDs).
fingerprint
String (read-only)
Default Value: ""
The hex-encoded, 16-byte MD5 fingerprint of the certificate. This property is primarily used for keys which do not have a corresponding X.509 public certificate, such as PEM keys that only contain a private key. It is commonly used for SSH keys.
The following example illustrates the format: bc:2a:72:af:fe:58:17:43:7a:5f:ba:5a:7c:90:f7:02
fingerprintSHA1
String (read-only)
Default Value: ""
The hex-encoded, 20-byte SHA-1 fingerprint of the certificate. This property is primarily used for keys which do not have a corresponding X.509 public certificate, such as PEM keys that only contain a private key. It is commonly used for SSH keys.
The following example illustrates the format: 30:7b:fa:38:65:83:ff:da:b4:4e:07:3f:17:b8:a4:ed:80:be:ff:84
fingerprintSHA256
String (read-only)
Default Value: ""
The hex-encoded, 32-byte SHA-256 fingerprint of the certificate. This property is primarily used for keys which do not have a corresponding X.509 public certificate, such as PEM keys that only contain a private key. It is commonly used for SSH keys.
The following example illustrates the format: 6a:80:5c:33:a9:43:ea:b0:96:12:8a:64:96:30:ef:4a:8a:96:86:ce:f4:c7:be:10:24:8e:2b:60:9e:f3:59:53
issuer
String (read-only)
Default Value: ""
The issuer of the certificate. This property contains a string representation of the name of the issuing authority for the certificate.
privateKey
String (read-only)
Default Value: ""
The private key of the certificate (if available). The key is provided as PEM/Base64-encoded data.
Note: The may be available but not exportable. In this case, returns an empty string.
privateKeyAvailable
Bool (read-only)
Default Value: False
Whether a is available for the selected certificate. If is True, the certificate may be used for authentication purposes (e.g., server authentication).
privateKeyContainer
String (read-only)
Default Value: ""
The name of the container for the certificate (if available). This functionality is available only on Windows platforms.
publicKey
String (read-only)
Default Value: ""
The public key of the certificate. The key is provided as PEM/Base64-encoded data.
publicKeyAlgorithm
String (read-only)
Default Value: ""
The textual description of the certificate's public key algorithm. The property contains either the name of the algorithm (e.g., "RSA" or "RSA_DH") or an object identifier (OID) string representing the algorithm.
publicKeyLength
Int32 (read-only)
Default Value: 0
The length of the certificate's public key (in bits). Common values are 512, 1024, and 2048.
serialNumber
String (read-only)
Default Value: ""
The serial number of the certificate encoded as a string. The number is encoded as a series of hexadecimal digits, with each pair representing a byte of the serial number.
signatureAlgorithm
String (read-only)
Default Value: ""
The text description of the certificate's signature algorithm. The property contains either the name of the algorithm (e.g., "RSA" or "RSA_MD5RSA") or an object identifier (OID) string representing the algorithm.
storeB
Data
Default Value: "MY"
The name of the certificate store for the client certificate.
The property denotes the type of the certificate store specified by . If the store is password-protected, specify the password in .
is used in conjunction with the property to specify client certificates. If has a value, and or is set, a search for a certificate is initiated. Please see the property for details.
Designations of certificate stores are platform dependent.
The following designations are the most common User and Machine certificate stores in Windows:
MY | A certificate store holding personal certificates with their associated private keys. |
CA | Certifying authority certificates. |
ROOT | Root certificates. |
When the certificate store type is cstPFXFile, this property must be set to the name of the file. When the type is cstPFXBlob, the property must be set to the binary contents of a PFX file (i.e., PKCS#12 certificate store).
store
String
Default Value: "MY"
The name of the certificate store for the client certificate.
The property denotes the type of the certificate store specified by . If the store is password-protected, specify the password in .
is used in conjunction with the property to specify client certificates. If has a value, and or is set, a search for a certificate is initiated. Please see the property for details.
Designations of certificate stores are platform dependent.
The following designations are the most common User and Machine certificate stores in Windows:
MY | A certificate store holding personal certificates with their associated private keys. |
CA | Certifying authority certificates. |
ROOT | Root certificates. |
When the certificate store type is cstPFXFile, this property must be set to the name of the file. When the type is cstPFXBlob, the property must be set to the binary contents of a PFX file (i.e., PKCS#12 certificate store).
storePassword
String
Default Value: ""
If the type of certificate store requires a password, this property is used to specify the password needed to open the certificate store.
storeType
CertStoreTypes
Default Value: 0
The type of certificate store for this certificate.
The class supports both public and private keys in a variety of formats. When the cstAuto value is used, the class will automatically determine the type. This property can take one of the following values:
0 (cstUser - default) | For Windows, this specifies that the certificate store is a certificate store owned by the current user.
Note: This store type is not available in Java. |
1 (cstMachine) | For Windows, this specifies that the certificate store is a machine store.
Note: This store type is not available in Java. |
2 (cstPFXFile) | The certificate store is the name of a PFX (PKCS#12) file containing certificates. |
3 (cstPFXBlob) | The certificate store is a string (binary or Base64-encoded) representing a certificate store in PFX (PKCS#12) format. |
4 (cstJKSFile) | The certificate store is the name of a Java Key Store (JKS) file containing certificates.
Note: This store type is only available in Java. |
5 (cstJKSBlob) | The certificate store is a string (binary or Base64-encoded) representing a certificate store in Java Key Store (JKS) format.
Note: This store type is only available in Java. |
6 (cstPEMKeyFile) | The certificate store is the name of a PEM-encoded file that contains a private key and an optional certificate. |
7 (cstPEMKeyBlob) | The certificate store is a string (binary or Base64-encoded) that contains a private key and an optional certificate. |
8 (cstPublicKeyFile) | The certificate store is the name of a file that contains a PEM- or DER-encoded public key certificate. |
9 (cstPublicKeyBlob) | The certificate store is a string (binary or Base64-encoded) that contains a PEM- or DER-encoded public key certificate. |
10 (cstSSHPublicKeyBlob) | The certificate store is a string (binary or Base64-encoded) that contains an SSH-style public key. |
11 (cstP7BFile) | The certificate store is the name of a PKCS#7 file containing certificates. |
12 (cstP7BBlob) | The certificate store is a string (binary) representing a certificate store in PKCS#7 format. |
13 (cstSSHPublicKeyFile) | The certificate store is the name of a file that contains an SSH-style public key. |
14 (cstPPKFile) | The certificate store is the name of a file that contains a PPK (PuTTY Private Key). |
15 (cstPPKBlob) | The certificate store is a string (binary) that contains a PPK (PuTTY Private Key). |
16 (cstXMLFile) | The certificate store is the name of a file that contains a certificate in XML format. |
17 (cstXMLBlob) | The certificate store is a string that contains a certificate in XML format. |
18 (cstJWKFile) | The certificate store is the name of a file that contains a JWK (JSON Web Key). |
19 (cstJWKBlob) | The certificate store is a string that contains a JWK (JSON Web Key). |
21 (cstBCFKSFile) | The certificate store is the name of a file that contains a BCFKS (Bouncy Castle FIPS Key Store).
Note: This store type is only available in Java and .NET. |
22 (cstBCFKSBlob) | The certificate store is a string (binary or Base64-encoded) representing a certificate store in BCFKS (Bouncy Castle FIPS Key Store) format.
Note: This store type is only available in Java and .NET. |
23 (cstPKCS11) | The certificate is present on a physical security key accessible via a PKCS#11 interface.
To use a security key, the necessary data must first be collected using the CertMgr class. The ListStoreCertificates method may be called after setting CertStoreType to cstPKCS11, CertStorePassword to the PIN, and CertStore to the full path of the PKCS#11 DLL. The certificate information returned in the CertList event's CertEncoded parameter may be saved for later use. When using a certificate, pass the previously saved security key information as the and set to the PIN. Code Example. SSH Authentication with Security Key:
|
99 (cstAuto) | The store type is automatically detected from the input data. This setting may be used with both public and private keys and can detect any of the supported formats automatically. |
subjectAltNames
String (read-only)
Default Value: ""
Comma-separated lists of alternative subject names for the certificate.
thumbprintMD5
String (read-only)
Default Value: ""
The MD5 hash of the certificate. It is primarily used for X.509 certificates. If the hash does not already exist, it is automatically computed.
thumbprintSHA1
String (read-only)
Default Value: ""
The SHA-1 hash of the certificate. It is primarily used for X.509 certificates. If the hash does not already exist, it is automatically computed.
thumbprintSHA256
String (read-only)
Default Value: ""
The SHA-256 hash of the certificate. It is primarily used for X.509 certificates. If the hash does not already exist, it is automatically computed.
usage
String (read-only)
Default Value: ""
This value will be one or more of the following strings and will be separated by commas:
- Digital Signature
- Non-Repudiation
- Key Encipherment
- Data Encipherment
- Key Agreement
- Certificate Signing
- CRL Signing
- Encipher Only
If the provider is OpenSSL, the value is a comma-separated list of X.509 certificate extension names.
usageFlags
Int32 (read-only)
Default Value: 0
The flags that show intended use for the certificate. The value of is a combination of the following flags:
0x80 | Digital Signature |
0x40 | Non-Repudiation |
0x20 | Key Encipherment |
0x10 | Data Encipherment |
0x08 | Key Agreement |
0x04 | Certificate Signing |
0x02 | CRL Signing |
0x01 | Encipher Only |
Please see the property for a text representation of .
This functionality currently is not available when the provider is OpenSSL.
version
String (read-only)
Default Value: ""
The certificate's version number. The possible values are the strings "V1", "V2", and "V3".
subject
String
Default Value: ""
The subject of the certificate used for client authentication.
This property must be set after all other certificate properties are set. When this property is set, a search is performed in the current certificate store to locate a certificate with a matching subject.
If a matching certificate is found, the property is set to the full subject of the matching certificate.
If an exact match is not found, the store is searched for subjects containing the value of the property.
If a match is still not found, the property is set to an empty string, and no certificate is selected.
The special value "*" picks a random certificate in the certificate store.
The certificate subject is a comma-separated list of distinguished name fields and values. For instance, "CN=www.server.com, OU=test, C=US, E=support@nsoftware.com". Common fields and their meanings are as follows:
Field | Meaning |
CN | Common Name. This is commonly a hostname like www.server.com. |
O | Organization |
OU | Organizational Unit |
L | Locality |
S | State |
C | Country |
E | Email Address |
If a field value contains a comma, it must be quoted.
encodedB
Data
Default Value: ""
The certificate (PEM/Base64 encoded). This property is used to assign a specific certificate. The and properties also may be used to specify a certificate.
When is set, a search is initiated in the current for the private key of the certificate. If the key is found, is updated to reflect the full subject of the selected certificate; otherwise, is set to an empty string.
encoded
String
Default Value: ""
The certificate (PEM/Base64 encoded). This property is used to assign a specific certificate. The and properties also may be used to specify a certificate.
When is set, a search is initiated in the current for the private key of the certificate. If the key is found, is updated to reflect the full subject of the selected certificate; otherwise, is set to an empty string.
Constructors
public init()
Creates a instance whose properties can be set. This is useful for use with when generating new certificates.
public init(encoded: )
Parses Encoded as an X.509 public key.
public init(storeType: , store: , storePassword: , subject: )
StoreType identifies the type of certificate store to use. See for descriptions of the different certificate stores. Store is a file containing the certificate store. StorePassword is the password used to protect the store.
After the store has been successfully opened, the component will attempt to find the certificate identified by Subject . This can be either a complete or a substring match of the X.509 certificate's subject Distinguished Name (DN). The Subject parameter can also take an MD5, SHA-1, or SHA-256 thumbprint of the certificate to load in a "Thumbprint=value" format.
public init(storeType: , store: , storePassword: , subject: )
StoreType identifies the type of certificate store to use. See for descriptions of the different certificate stores. Store is a byte array containing the certificate data. StorePassword is the password used to protect the store.
After the store has been successfully opened, the component will attempt to find the certificate identified by Subject . This can be either a complete or a substring match of the X.509 certificate's subject Distinguished Name (DN). The Subject parameter can also take an MD5, SHA-1, or SHA-256 thumbprint of the certificate to load in a "Thumbprint=value" format.
Config Settings (PDFEncrypt Module)
The class accepts one or more of the following configuration settings. Configuration settings are similar in functionality to properties, but they are rarely used. In order to avoid "polluting" the property namespace of the class, access to these internal properties is provided through the Config method.PDFEncrypt Config Settings
0 (None) | No messages are logged. |
1 (Info - default) | Informational events such as the basics of the chain validation procedure are logged. |
2 (Verbose) | Detailed data such as HTTP requests are logged. |
3 (Debug) | Debug data including the full chain validation procedure are logged. |
- "SHA1"
- "SHA224"
- "SHA256" (default)
- "SHA384"
- "SHA512"
- "RIPEMD160"
- "MD2"
- "MD5"
- "MD5SHA1"
Note: This setting is not applicable when UseFIPSCompliantAPI is set to or when the private key of the signing certificate is not exportable since the underlying system implementation does not support separate OAEPRSAHashAlgorithm and OAEPMGF1HashAlgorithm values. In this case, the OAEPRSAHashAlgorithm is also used for MGF1.
- "SHA1"
- "SHA224"
- "SHA256" (default)
- "SHA384"
- "SHA512"
- "RIPEMD160"
- "MD2"
- "MD5"
- "MD5SHA1"
0 | Discard all changes. |
1 | Save the document to OutputFile, OutputData, or the stream set in SetOutputStream, even if it has not been modified. |
2 (default) | Save the document to OutputFile, OutputData, or the stream set in SetOutputStream, but only if it has been modified. |
To specify non-default OAEP options, please see OAEPRSAHashAlgorithm, OAEPMGF1HashAlgorithm, and OAEPParams.
Base Config Settings
The following is a list of valid code page identifiers:
Identifier | Name |
037 | IBM EBCDIC - U.S./Canada |
437 | OEM - United States |
500 | IBM EBCDIC - International |
708 | Arabic - ASMO 708 |
709 | Arabic - ASMO 449+, BCON V4 |
710 | Arabic - Transparent Arabic |
720 | Arabic - Transparent ASMO |
737 | OEM - Greek (formerly 437G) |
775 | OEM - Baltic |
850 | OEM - Multilingual Latin I |
852 | OEM - Latin II |
855 | OEM - Cyrillic (primarily Russian) |
857 | OEM - Turkish |
858 | OEM - Multilingual Latin I + Euro symbol |
860 | OEM - Portuguese |
861 | OEM - Icelandic |
862 | OEM - Hebrew |
863 | OEM - Canadian-French |
864 | OEM - Arabic |
865 | OEM - Nordic |
866 | OEM - Russian |
869 | OEM - Modern Greek |
870 | IBM EBCDIC - Multilingual/ROECE (Latin-2) |
874 | ANSI/OEM - Thai (same as 28605, ISO 8859-15) |
875 | IBM EBCDIC - Modern Greek |
932 | ANSI/OEM - Japanese, Shift-JIS |
936 | ANSI/OEM - Simplified Chinese (PRC, Singapore) |
949 | ANSI/OEM - Korean (Unified Hangul Code) |
950 | ANSI/OEM - Traditional Chinese (Taiwan; Hong Kong SAR, PRC) |
1026 | IBM EBCDIC - Turkish (Latin-5) |
1047 | IBM EBCDIC - Latin 1/Open System |
1140 | IBM EBCDIC - U.S./Canada (037 + Euro symbol) |
1141 | IBM EBCDIC - Germany (20273 + Euro symbol) |
1142 | IBM EBCDIC - Denmark/Norway (20277 + Euro symbol) |
1143 | IBM EBCDIC - Finland/Sweden (20278 + Euro symbol) |
1144 | IBM EBCDIC - Italy (20280 + Euro symbol) |
1145 | IBM EBCDIC - Latin America/Spain (20284 + Euro symbol) |
1146 | IBM EBCDIC - United Kingdom (20285 + Euro symbol) |
1147 | IBM EBCDIC - France (20297 + Euro symbol) |
1148 | IBM EBCDIC - International (500 + Euro symbol) |
1149 | IBM EBCDIC - Icelandic (20871 + Euro symbol) |
1200 | Unicode UCS-2 Little-Endian (BMP of ISO 10646) |
1201 | Unicode UCS-2 Big-Endian |
1250 | ANSI - Central European |
1251 | ANSI - Cyrillic |
1252 | ANSI - Latin I |
1253 | ANSI - Greek |
1254 | ANSI - Turkish |
1255 | ANSI - Hebrew |
1256 | ANSI - Arabic |
1257 | ANSI - Baltic |
1258 | ANSI/OEM - Vietnamese |
1361 | Korean (Johab) |
10000 | MAC - Roman |
10001 | MAC - Japanese |
10002 | MAC - Traditional Chinese (Big5) |
10003 | MAC - Korean |
10004 | MAC - Arabic |
10005 | MAC - Hebrew |
10006 | MAC - Greek I |
10007 | MAC - Cyrillic |
10008 | MAC - Simplified Chinese (GB 2312) |
10010 | MAC - Romania |
10017 | MAC - Ukraine |
10021 | MAC - Thai |
10029 | MAC - Latin II |
10079 | MAC - Icelandic |
10081 | MAC - Turkish |
10082 | MAC - Croatia |
12000 | Unicode UCS-4 Little-Endian |
12001 | Unicode UCS-4 Big-Endian |
20000 | CNS - Taiwan |
20001 | TCA - Taiwan |
20002 | Eten - Taiwan |
20003 | IBM5550 - Taiwan |
20004 | TeleText - Taiwan |
20005 | Wang - Taiwan |
20105 | IA5 IRV International Alphabet No. 5 (7-bit) |
20106 | IA5 German (7-bit) |
20107 | IA5 Swedish (7-bit) |
20108 | IA5 Norwegian (7-bit) |
20127 | US-ASCII (7-bit) |
20261 | T.61 |
20269 | ISO 6937 Non-Spacing Accent |
20273 | IBM EBCDIC - Germany |
20277 | IBM EBCDIC - Denmark/Norway |
20278 | IBM EBCDIC - Finland/Sweden |
20280 | IBM EBCDIC - Italy |
20284 | IBM EBCDIC - Latin America/Spain |
20285 | IBM EBCDIC - United Kingdom |
20290 | IBM EBCDIC - Japanese Katakana Extended |
20297 | IBM EBCDIC - France |
20420 | IBM EBCDIC - Arabic |
20423 | IBM EBCDIC - Greek |
20424 | IBM EBCDIC - Hebrew |
20833 | IBM EBCDIC - Korean Extended |
20838 | IBM EBCDIC - Thai |
20866 | Russian - KOI8-R |
20871 | IBM EBCDIC - Icelandic |
20880 | IBM EBCDIC - Cyrillic (Russian) |
20905 | IBM EBCDIC - Turkish |
20924 | IBM EBCDIC - Latin-1/Open System (1047 + Euro symbol) |
20932 | JIS X 0208-1990 & 0121-1990 |
20936 | Simplified Chinese (GB2312) |
21025 | IBM EBCDIC - Cyrillic (Serbian, Bulgarian) |
21027 | Extended Alpha Lowercase |
21866 | Ukrainian (KOI8-U) |
28591 | ISO 8859-1 Latin I |
28592 | ISO 8859-2 Central Europe |
28593 | ISO 8859-3 Latin 3 |
28594 | ISO 8859-4 Baltic |
28595 | ISO 8859-5 Cyrillic |
28596 | ISO 8859-6 Arabic |
28597 | ISO 8859-7 Greek |
28598 | ISO 8859-8 Hebrew |
28599 | ISO 8859-9 Latin 5 |
28605 | ISO 8859-15 Latin 9 |
29001 | Europa 3 |
38598 | ISO 8859-8 Hebrew |
50220 | ISO 2022 Japanese with no halfwidth Katakana |
50221 | ISO 2022 Japanese with halfwidth Katakana |
50222 | ISO 2022 Japanese JIS X 0201-1989 |
50225 | ISO 2022 Korean |
50227 | ISO 2022 Simplified Chinese |
50229 | ISO 2022 Traditional Chinese |
50930 | Japanese (Katakana) Extended |
50931 | US/Canada and Japanese |
50933 | Korean Extended and Korean |
50935 | Simplified Chinese Extended and Simplified Chinese |
50936 | Simplified Chinese |
50937 | US/Canada and Traditional Chinese |
50939 | Japanese (Latin) Extended and Japanese |
51932 | EUC - Japanese |
51936 | EUC - Simplified Chinese |
51949 | EUC - Korean |
51950 | EUC - Traditional Chinese |
52936 | HZ-GB2312 Simplified Chinese |
54936 | Windows XP: GB18030 Simplified Chinese (4 Byte) |
57002 | ISCII Devanagari |
57003 | ISCII Bengali |
57004 | ISCII Tamil |
57005 | ISCII Telugu |
57006 | ISCII Assamese |
57007 | ISCII Oriya |
57008 | ISCII Kannada |
57009 | ISCII Malayalam |
57010 | ISCII Gujarati |
57011 | ISCII Punjabi |
65000 | Unicode UTF-7 |
65001 | Unicode UTF-8 |
Identifier | Name |
1 | ASCII |
2 | NEXTSTEP |
3 | JapaneseEUC |
4 | UTF8 |
5 | ISOLatin1 |
6 | Symbol |
7 | NonLossyASCII |
8 | ShiftJIS |
9 | ISOLatin2 |
10 | Unicode |
11 | WindowsCP1251 |
12 | WindowsCP1252 |
13 | WindowsCP1253 |
14 | WindowsCP1254 |
15 | WindowsCP1250 |
21 | ISO2022JP |
30 | MacOSRoman |
10 | UTF16String |
0x90000100 | UTF16BigEndian |
0x94000100 | UTF16LittleEndian |
0x8c000100 | UTF32String |
0x98000100 | UTF32BigEndian |
0x9c000100 | UTF32LittleEndian |
65536 | Proprietary |
- Product: The product the license is for.
- Product Key: The key the license was generated from.
- License Source: Where the license was found (e.g., RuntimeLicense, License File).
- License Type: The type of license installed (e.g., Royalty Free, Single Server).
- Last Valid Build: The last valid build number for which the license will work.
This setting only works on these classes: AS3Receiver, AS3Sender, Atom, Client(3DS), FTP, FTPServer, IMAP, OFTPClient, SSHClient, SCP, Server(3DS), Sexec, SFTP, SFTPServer, SSHServer, TCPClient, TCPServer.
Setting this configuration setting to tells the class to use the internal implementation instead of using the system security libraries.
This setting is set to by default on all platforms.
Trappable Errors (PDFEncrypt Module)
PDFEncrypt Errors
861 | Cannot encrypt signed document. |
PDF Errors
804 | PDF decompression failed. |
805 | Cannot add entry to cross-reference table. |
806 | Unsupported field size. |
807 | Unsupported Encoding filter. |
808 | Unsupported predictor algorithm. |
809 | Unsupported document version. |
812 | Cannot read PDF file stream. |
813 | Cannot write to PDF file stream. |
814 | OutputFile already exists and Overwrite is . |
815 | Invalid parameter. |
817 | Bad cross-reference entry. |
818 | Invalid object or generation number. |
819 | Invalid object stream. |
820 | Invalid stream dictionary. |
821 | Invalid AcroForm entry. |
822 | Invalid Root entry. |
823 | Invalid annotation. |
824 | The input document is empty. |
826 | OpenType font error. The error description contains the detailed message. |
828 | Invalid CMS data. The error description contains the detailed message. |
835 | Cannot change decryption mode for opened document. |
836 | Unsupported Date string. |
838 | Cryptographic error. The error description contains the detailed message. |
840 | No decryption key found. |
841 | Encryption failed. The error description contains the detailed message. |
842 | No proper certificate for encryption found. |
846 | Unsupported revision. |
847 | Unsupported security handler SubFilter. |
848 | Failed to verify permissions. |
849 | Invalid password. |
850 | Invalid password information. |
852 | Unsupported encryption algorithm. |
859 | Cannot encrypt encrypted document. |
864 | Cannot modify document after signature update. |
868 | Cannot encrypt or decrypt object. |
869 | Invalid security handler information. |
870 | Invalid encrypted data. |
871 | Invalid block cipher padding. |
872 | Failed to reload signature. |
873 | Object is not encrypted. |
874 | Unexpected cipher information. |
877 | Invalid document. Bad document catalog. |
878 | Invalid document Id. |
880 | Invalid document. Invalid requirements dictionary. |
881 | Invalid linearization dictionary. |
882 | Invalid signature information. |
883 | Unsupported document format. |
890 | Unsupported feature. |
891 | Internal error. The error description contains the detailed message. |
Parsing Errors
1001 | Bad object. |
1002 | Bad document trailer. |
1003 | Illegal stream dictionary. |
1004 | Illegal string. |
1005 | Indirect object expected. |
1007 | Invalid reference. |
1008 | Invalid reference table. |
1009 | Invalid stream data. |
1010 | Unexpected character. |
1011 | Unexpected EOF. |
1012 | Unexpected indirect object in cross-reference table. |
1021 | Invalid type in Root object list. |