KMIPServer Class

Properties   Methods   Events   Config Settings   Errors  

The KMIPServer class provides server-side functionality for Key Management Interoperability Protocol (KMIP).

Class Name

SecureBlackbox_KMIPServer

Procedural Interface

 secureblackbox_kmipserver_open();
 secureblackbox_kmipserver_close($res);
 secureblackbox_kmipserver_register_callback($res, $id, $function);
 secureblackbox_kmipserver_get_last_error($res);
 secureblackbox_kmipserver_get_last_error_code($res);
 secureblackbox_kmipserver_set($res, $id, $index, $value);
 secureblackbox_kmipserver_get($res, $id, $index);
 secureblackbox_kmipserver_do_config($res, $configurationstring);
 secureblackbox_kmipserver_do_doaction($res, $actionid, $actionparams);
 secureblackbox_kmipserver_do_dropclient($res, $connectionid, $forced);
 secureblackbox_kmipserver_do_getclientcert($res, $connectionid);
 secureblackbox_kmipserver_do_getclientkey($res, $connectionid);
 secureblackbox_kmipserver_do_getrequestheader($res, $connectionid, $headername);
 secureblackbox_kmipserver_do_getresponseheader($res, $connectionid, $headername);
 secureblackbox_kmipserver_do_listclients($res);
 secureblackbox_kmipserver_do_pinclient($res, $connectionid);
 secureblackbox_kmipserver_do_processgenericrequest($res, $connectionid, $requestbytes);
 secureblackbox_kmipserver_do_reset($res);
 secureblackbox_kmipserver_do_setclientbytes($res, $connectionid, $value);
 secureblackbox_kmipserver_do_setclientcert($res, $connectionid);
 secureblackbox_kmipserver_do_setclientkey($res, $connectionid);
 secureblackbox_kmipserver_do_setresponseheader($res, $connectionid, $headername, $value);
 secureblackbox_kmipserver_do_start($res);
 secureblackbox_kmipserver_do_stop($res);

Remarks

The Key Management Interoperability Protocol (KMIP) is an OASIS standard for communication between key management servers and clients. KMIP servers are typically responsible for managing cryptographic keys and providing access to them to remote client applications.

Property List


The following is the full list of the properties of the class with short descriptions. Click on the links for further details.

ActiveIndicates if the KMIP server is active and listening to incoming connections.
AllowKeepAliveEnables or disables keep-alive mode.
AuthRealmSpecifies authentication realm for digest and NTLM authentication.
AuthTypesDefines allowed HTTP authentication types.
BoundPortIndicates the bound listening port.
CACertBytesReturns the raw certificate data in DER format.
CACertHandleAllows to get or set a 'handle', a unique identifier of the underlying property object.
CertificateBytesReturns the raw certificate data in DER format.
CertificateHandleAllows to get or set a 'handle', a unique identifier of the underlying property object.
CompressionLevelThe default compression level to use.
ExternalCryptoAsyncDocumentIDSpecifies an optional document ID for SignAsyncBegin() and SignAsyncEnd() calls.
ExternalCryptoCustomParamsCustom parameters to be passed to the signing service (uninterpreted).
ExternalCryptoDataAdditional data to be included in the async state and mirrored back by the requestor.
ExternalCryptoExternalHashCalculationSpecifies whether the message hash is to be calculated at the external endpoint.
ExternalCryptoHashAlgorithmSpecifies the request's signature hash algorithm.
ExternalCryptoKeyIDThe ID of the pre-shared key used for DC request authentication.
ExternalCryptoKeySecretThe pre-shared key used for DC request authentication.
ExternalCryptoMethodSpecifies the asynchronous signing method.
ExternalCryptoModeSpecifies the external cryptography mode.
ExternalCryptoPublicKeyAlgorithmProvide the public key algorithm here if the certificate is not available on the pre-signing stage.
FIPSModeReserved.
HandshakeTimeoutSpecifies the handshake timeout in milliseconds.
HostSpecifies the host name of the KMIP server.
KeyAlgorithmThe algorithm of the cryptographic key.
KeyBitsThe length of the key in bits.
KeyCurveThis property specifies the name of the curve the EC key is built on.
KeyExportableReturns True if the key is exportable (can be serialized into an array of bytes), and False otherwise.
KeyFingerprintContains the fingerprint (a hash imprint) of this key.
KeyHandleAllows to get or set a 'handle', a unique identifier of the underlying property object.
KeyIDProvides access to a storage-specific key identifier.
KeyIVThe initialization vector (IV) of a symmetric key.
KeyKeyThe byte array representation of the key.
KeyNonceA nonce value associated with a key.
KeyPrivateReturns True if the object hosts a private key, and False otherwise.
KeyPublicReturns True if the object hosts a public key, and False otherwise.
KeySubjectReturns the key subject.
KeySymmetricReturns True if the object contains a symmetric key, and False otherwise.
KeyValidReturns True if this key is valid.
PinnedClientAEADCipherIndicates whether the encryption algorithm used is an AEAD cipher.
PinnedClientChainValidationDetailsThe details of a certificate chain validation outcome.
PinnedClientChainValidationResultThe outcome of a certificate chain validation routine.
PinnedClientCiphersuiteThe cipher suite employed by this connection.
PinnedClientClientAuthenticatedSpecifies whether client authentication was performed during this connection.
PinnedClientClientAuthRequestedSpecifies whether client authentication was requested during this connection.
PinnedClientConnectionEstablishedIndicates whether the connection has been established fully.
PinnedClientConnectionIDThe unique identifier assigned to this connection.
PinnedClientDigestAlgorithmThe digest algorithm used in a TLS-enabled connection.
PinnedClientEncryptionAlgorithmThe symmetric encryption algorithm used in a TLS-enabled connection.
PinnedClientExportableIndicates whether a TLS connection uses a reduced-strength exportable cipher.
PinnedClientIDThe client connection's unique identifier.
PinnedClientKeyExchangeAlgorithmThe key exchange algorithm used in a TLS-enabled connection.
PinnedClientKeyExchangeKeyBitsThe length of the key exchange key of a TLS-enabled connection.
PinnedClientNamedECCurveThe elliptic curve used in this connection.
PinnedClientPFSCipherIndicates whether the chosen ciphersuite provides perfect forward secrecy (PFS).
PinnedClientPreSharedIdentitySpecifies the identity used when the PSK (Pre-Shared Key) key-exchange mechanism is negotiated.
PinnedClientPreSharedIdentityHintA hint professed by the server to help the client select the PSK identity to use.
PinnedClientPublicKeyBitsThe length of the public key.
PinnedClientRemoteAddressThe client's IP address.
PinnedClientRemotePortThe remote port of the client connection.
PinnedClientResumedSessionIndicates whether a TLS-enabled connection was spawned from another TLS connection.
PinnedClientSecureConnectionIndicates whether TLS or SSL is enabled for this connection.
PinnedClientServerAuthenticatedIndicates whether server authentication was performed during a TLS-enabled connection.
PinnedClientSignatureAlgorithmThe signature algorithm used in a TLS handshake.
PinnedClientSymmetricBlockSizeThe block size of the symmetric algorithm used.
PinnedClientSymmetricKeyBitsThe key length of the symmetric algorithm used.
PinnedClientTotalBytesReceivedThe total number of bytes received over this connection.
PinnedClientTotalBytesSentThe total number of bytes sent over this connection.
PinnedClientValidationLogContains the server certificate's chain validation log.
PinnedClientVersionIndicates the version of SSL/TLS protocol negotiated during this connection.
PinnedClientCertCountThe number of records in the PinnedClientCert arrays.
PinnedClientCertBytesReturns the raw certificate data in DER format.
PinnedClientCertCAKeyIDA unique identifier (fingerprint) of the CA certificate's cryptographic key.
PinnedClientCertFingerprintContains the fingerprint (a hash imprint) of this certificate.
PinnedClientCertHandleAllows to get or set a 'handle', a unique identifier of the underlying property object.
PinnedClientCertIssuerThe common name of the certificate issuer (CA), typically a company name.
PinnedClientCertIssuerRDNA list of Property=Value pairs that uniquely identify the certificate issuer.
PinnedClientCertKeyAlgorithmSpecifies the public key algorithm of this certificate.
PinnedClientCertKeyBitsReturns the length of the public key in bits.
PinnedClientCertKeyFingerprintReturns a SHA1 fingerprint of the public key contained in the certificate.
PinnedClientCertKeyUsageIndicates the purposes of the key contained in the certificate, in the form of an OR'ed flag set.
PinnedClientCertPublicKeyBytesContains the certificate's public key in DER format.
PinnedClientCertSelfSignedIndicates whether the certificate is self-signed (root) or signed by an external CA.
PinnedClientCertSerialNumberReturns the certificate's serial number.
PinnedClientCertSigAlgorithmIndicates the algorithm that was used by the CA to sign this certificate.
PinnedClientCertSubjectThe common name of the certificate holder, typically an individual's name, a URL, an e-mail address, or a company name.
PinnedClientCertSubjectKeyIDContains a unique identifier of the certificate's cryptographic key.
PinnedClientCertSubjectRDNA list of Property=Value pairs that uniquely identify the certificate holder (subject).
PinnedClientCertValidFromThe time point at which the certificate becomes valid, in UTC.
PinnedClientCertValidToThe time point at which the certificate expires, in UTC.
PortA port to listen for connections on.
ReadOnlyToDo.
SessionTimeoutSpecifies the default session timeout value in milliseconds.
SocketIncomingSpeedLimitThe maximum number of bytes to read from the socket, per second.
SocketLocalAddressThe local network interface to bind the socket to.
SocketLocalPortThe local port number to bind the socket to.
SocketOutgoingSpeedLimitThe maximum number of bytes to write to the socket, per second.
SocketTimeoutThe maximum period of waiting, in milliseconds, after which the socket operation is considered unsuccessful.
SocketUseIPv6Enables or disables IP protocol version 6.
StorageFileNameA path to the KMIP object database.
TLSServerCertCountThe number of records in the TLSServerCert arrays.
TLSServerCertBytesReturns the raw certificate data in DER format.
TLSServerCertHandleAllows to get or set a 'handle', a unique identifier of the underlying property object.
TLSAutoValidateCertificatesSpecifies whether server-side TLS certificates should be validated automatically using internal validation rules.
TLSBaseConfigurationSelects the base configuration for the TLS settings.
TLSCiphersuitesA list of ciphersuites separated with commas or semicolons.
TLSClientAuthEnables or disables certificate-based client authentication.
TLSECCurvesDefines the elliptic curves to enable.
TLSExtensionsProvides access to TLS extensions.
TLSForceResumeIfDestinationChangesWhether to force TLS session resumption when the destination address changes.
TLSPreSharedIdentityDefines the identity used when the PSK (Pre-Shared Key) key-exchange mechanism is negotiated.
TLSPreSharedKeyContains the pre-shared key for the PSK (Pre-Shared Key) key-exchange mechanism, encoded with base16.
TLSPreSharedKeyCiphersuiteDefines the ciphersuite used for PSK (Pre-Shared Key) negotiation.
TLSRenegotiationAttackPreventionModeSelects the renegotiation attack prevention mechanism.
TLSRevocationCheckSpecifies the kind(s) of revocation check to perform.
TLSSSLOptionsVarious SSL (TLS) protocol options, set of cssloExpectShutdownMessage 0x001 Wait for the close-notify message when shutting down the connection cssloOpenSSLDTLSWorkaround 0x002 (DEPRECATED) Use a DTLS version workaround when talking to very old OpenSSL versions cssloDisableKexLengthAlignment 0x004 Do not align the client-side PMS by the RSA modulus size.
TLSTLSModeSpecifies the TLS mode to use.
TLSUseExtendedMasterSecretEnables the Extended Master Secret Extension, as defined in RFC 7627.
TLSUseSessionResumptionEnables or disables the TLS session resumption capability.
TLSVersionsThe SSL/TLS versions to enable by default.
UseChunkedTransferEnables chunked transfer.
UseCompressionEnables or disables server-side compression.
UseHTTPToDo.
UserCountThe number of records in the User arrays.
UserAssociatedDataContains the user's Associated Data when SSH AEAD (Authenticated Encryption with Associated Data) algorithm is used.
UserBasePathBase path for this user in the server's file system.
UserCertificateContains the user's certificate.
UserDataContains uninterpreted user-defined data that should be associated with the user account, such as comments or custom settings.
UserEmailThe user's email address.
UserHandleAllows to get or set a 'handle', a unique identifier of the underlying property object.
UserHashAlgorithmSpecifies the hash algorithm used to generate TOTP (Time-based One-Time Passwords) passwords for this user.
UserIncomingSpeedLimitSpecifies the incoming speed limit for this user.
UserOtpAlgorithmThe algorithm used to generate one-time passwords (OTP) for this user, either HOTP (Hash-based OTP) or TOTP (Time-based OTP).
UserOTPLenSpecifies the length of the user's OTP password.
UserOtpValueThe user's time interval (TOTP) or Counter (HOTP).
UserOutgoingSpeedLimitSpecifies the outgoing speed limit for this user.
UserPasswordThe user's authentication password.
UserSharedSecretContains the user's secret key, which is essentially a shared secret between the client and server.
UserSSHKeyContains the user's SSH key.
UserUsernameThe registered name (login) of the user.

Method List


The following is the full list of the methods of the class with short descriptions. Click on the links for further details.

ConfigThis method sets or retrieves a configuration setting.
DoActionPerforms an additional action.
DropClientTerminates a client connection.
GetClientCertPopulates the per-connection certificate object.
GetClientKeyPopulates the per-connection key object.
GetRequestHeaderReturns a request header value.
GetResponseHeaderReturns a response header value.
ListClientsEnumerates the connected clients.
PinClientTakes a snapshot of the connection's properties.
ProcessGenericRequestProcesses a generic HTTP request.
ResetResets the class settings.
SetClientBytesCommits a data buffer to the connection.
SetClientCertCommits the per-connection certificate object to the connection context.
SetClientKeyCommits the per-connection key object to the connection context.
SetResponseHeaderSets a response header.
StartStart the KMIP server.
StopStops the KMIP server.

Event List


The following is the full list of the events fired by the class with short descriptions. Click on the links for further details.

AcceptReports an incoming connection.
ActivateObjectNotifies the application about the object activation request.
AddPasses the certificate import request to the application.
AddKeyExpects the application to handle the key import request.
AfterAddNotifies the application about completion of the certificate import operation.
AfterAddKeyReports the completion of the key import procedure.
AfterBrowseKMIP server uses this event to notify the application about the completion of the browsing (attribute request) operation.
AfterDecryptNotifies the application about completion of the decryption call.
AfterDeriveKeyNotifies the application about completion of the key derivation request.
AfterEditNotifies the application of completion of the object editing operation.
AfterEncryptNotifies the application about the completion of the encryption call.
AfterGenerateSignifies completion of certificate generation.
AfterGenerateKeyNotifies the application of the completion of key generation procedure.
AfterGenerateKeyPairNotifies the application of the completion of keypair generation.
AfterHashNotifies the application about completion of the hashing call.
AfterListNotifies the application about completion of the list command.
AfterObtainLeaseReports the completion of lease allocation operation.
AfterReadObjectNotifies the application of the completion of the read operation on the object.
AfterReCertifyToDo.
AfterReKeyToDo.
AfterRekeyKeyPairToDo.
AfterRemoveObjectNotifies the application about completion of the object removal request.
AfterSignNotifies the application of completion of a signing operation.
AfterVerifyNotifies the application about completion of the Verify operation.
AfterVerifyHashNotifies the application about completion of the hash verification.
ArchiveObjectNotifies the application about the received object archival request.
AuthAttemptFires when a connected client makes an authentication attempt.
BeforeAddFires when a certificate import request is received from a client.
BeforeAddKeyFires when a key import request is received from the client.
BeforeBrowseNotifies the application about the browse request being received.
BeforeDecryptNotifies the application about the initiation of the decryption operation.
BeforeDeriveKeyFires when a derive key request is received.
BeforeEditNotifies the application about the start of the object editing operation.
BeforeEncryptNotifies the application about the initiation of an encryption operation.
BeforeGenerateFires when a certificate generation request is received.
BeforeGenerateKeyFires when a key generation request is received.
BeforeGenerateKeyPairFires when a key generation request is received.
BeforeHashNotifies the application about the initiation of the hashing operation.
BeforeListNotifies the application about the initiation of the list operation.
BeforeObtainLeaseNotifies the application about the client requesting an object lease.
BeforeReadObjectNotifies the application about the start of the object reading request.
BeforeReCertifyNotifies the application about a re-certification request.
BeforeReKeyNotifies the application about a re-key request received.
BeforeRekeyKeyPairNotifies the application about a keypair re-key request received.
BeforeRemoveObjectTBD.
BeforeSignNotifies the application about the initiation of a signing operation.
BeforeVerifyNotifies the application about the initiation of the verify operation.
BeforeVerifyHashNotifies the application about the initiation of the hash verification operation.
CancelReports a cancellation request received from the client.
CheckTBD.
ConnectReports an accepted connection.
DecryptTBD.
DeleteAttributeTBD.
DeriveKeyTBD.
DisconnectFires to report a disconnected client.
EncryptTBD.
ErrorInformation about errors during data delivery.
ExternalSignHandles remote or external signing initiated by the server protocol.
GenerateTBD.
GenerateKeyTBD.
GenerateKeyPairTBD.
GetUsageAllocationTBD.
HashTBD.
HeadersPreparedFires when the response headers have been formed and are ready to be sent to the server.
KMIPAuthAttemptFires when a connected client makes an authentication attempt.
ListTBD.
ListAttributesTBD.
NotificationThis event notifies the application about an underlying control flow event.
ObtainLeaseLets the application handle the lease request.
OperationAttemptFires when a request is received from the client.
PollTBD.
ReadAttributeTBD.
ReadObjectTBD.
ReCertifyTBD.
RecoverObjectTBD.
ReKeyTBD.
RekeyKeyPairTBD.
RemoveObjectTBD.
RequestTBD.
ResponseTBD.
RevokeObjectTBD.
RNGGenerateTBD.
RNGSeedTBD.
SetAttributeTBD.
SignTBD.
TLSCertValidateFires when a client certificate needs to be validated.
TLSEstablishedReports the setup of a TLS session.
TLSHandshakeFires when a newly established client connection initiates a TLS handshake.
TLSPSKRequests a pre-shared key for TLS-PSK.
TLSShutdownReports closure of a TLS session.
ValidateChainTBD.
VerifyTBD.
VerifyHashDelegates the hash verification operation to a custom handler.

Config Settings


The following is a list of config settings for the class with short descriptions. Click on the links for further details.

AuthBasicTurns on/off the basic authentication.
AuthDigestTurns on/off the digest authentication.
DualStackAllows the use of ip4 and ip6 simultaneously.
MajorProtocolVersionMajor protocol version on the KMIP server.
MinorProtocolVersionMinor protocol version on the KMIP server.
SSLModeWhether to establish a TLS-secured connection.
UseChunkedTransferWhether to use chunked encoding of the data.
UseCompressionWhether to use GZip compression.
CheckKeyIntegrityBeforeUseEnables or disable private key integrity check before use.
CookieCachingSpecifies whether a cookie cache should be used for HTTP(S) transports.
CookiesGets or sets local cookies for the class.
DefDeriveKeyIterationsSpecifies the default key derivation algorithm iteration count.
EnableClientSideSSLFFDHEEnables or disables finite field DHE key exchange support in TLS clients.
GlobalCookiesGets or sets global cookies for all the HTTP transports.
HttpUserAgentSpecifies the user agent name to be used by all HTTP clients.
LogDestinationSpecifies the debug log destination.
LogDetailsSpecifies the debug log details to dump.
LogFileSpecifies the debug log filename.
LogFiltersSpecifies the debug log filters.
LogFlushModeSpecifies the log flush mode.
LogLevelSpecifies the debug log level.
LogMaxEventCountSpecifies the maximum number of events to cache before further action is taken.
LogRotationModeSpecifies the log rotation mode.
MaxASN1BufferLengthSpecifies the maximal allowed length for ASN.1 primitive tag data.
MaxASN1TreeDepthSpecifies the maximal depth for processed ASN.1 trees.
OCSPHashAlgorithmSpecifies the hash algorithm to be used to identify certificates in OCSP requests.
StaticDNSSpecifies whether static DNS rules should be used.
StaticIPAddress[domain]Gets or sets an IP address for the specified domain name.
StaticIPAddressesGets or sets all the static DNS rules.
TagAllows to store any custom data.
TLSSessionGroupSpecifies the group name of TLS sessions to be used for session resumption.
TLSSessionLifetimeSpecifies lifetime in seconds of the cached TLS session.
TLSSessionPurgeIntervalSpecifies how often the session cache should remove the expired TLS sessions.
UseOwnDNSResolverSpecifies whether the client classes should use own DNS resolver.
UseSharedSystemStoragesSpecifies whether the validation engine should use a global per-process copy of the system certificate stores.
UseSystemOAEPAndPSSEnforces or disables the use of system-driven RSA OAEP and PSS computations.
UseSystemRandomEnables or disables the use of the OS PRNG.

Active Property (SecureBlackbox_KMIPServer Class)

Indicates if the KMIP server is active and listening to incoming connections.

Object Oriented Interface


public function getActive();


Procedural Interface


secureblackbox_kmipserver_get($res, 1 );


Default Value

false

Remarks

Check this property to find out if the KMIP server is in an active state. Use Start and Stop methods to launch and stop the server.

This property is read-only and not available at design time.

Data Type

Boolean

AllowKeepAlive Property (SecureBlackbox_KMIPServer Class)

Enables or disables keep-alive mode.

Object Oriented Interface


public function getAllowKeepAlive();


public function setAllowKeepAlive($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 2 );


secureblackbox_kmipserver_set($res, 2, $value );

Default Value

true

Remarks

Use this property to enable or disable the keep-alive connection mode. If keep-alive is enabled, clients that choose to use it may stay connected for a while.

Data Type

Boolean

AuthRealm Property (SecureBlackbox_KMIPServer Class)

Specifies authentication realm for digest and NTLM authentication.

Object Oriented Interface


public function getAuthRealm();


public function setAuthRealm($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 3 );


secureblackbox_kmipserver_set($res, 3, $value );

Default Value

'SecureBlackbox'

Remarks

Specifies authentication realm for digest and NTLM authentication types.

Data Type

String

AuthTypes Property (SecureBlackbox_KMIPServer Class)

Defines allowed HTTP authentication types.

Object Oriented Interface


public function getAuthTypes();


public function setAuthTypes($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 4 );


secureblackbox_kmipserver_set($res, 4, $value );

Default Value

0

Remarks

Use this property to define which authentication types the component should support or attempt to use by enabling the relevant bitmask flags:

haBasic0x01Basic authentication

haDigest0x02Digest authentication (RFC 2617)

haNTLM0x04Windows NTLM authentication

haKerberos0x08Kerberos (Negotiate) authentication

haOAuth20x10OAuth2 authentication

Data Type

Integer

BoundPort Property (SecureBlackbox_KMIPServer Class)

Indicates the bound listening port.

Object Oriented Interface


public function getBoundPort();


Procedural Interface


secureblackbox_kmipserver_get($res, 5 );


Default Value

0

Remarks

Check this property to find out the port that has been allocated to the server by the system. The bound port always equals Port if it is provided, or is allocated dynamically if configured to fall in the range between PortRangeFrom and PortRangeTo constraints.

This property is read-only and not available at design time.

Data Type

Integer

CACertBytes Property (SecureBlackbox_KMIPServer Class)

Returns the raw certificate data in DER format.

Object Oriented Interface


public function getCACertBytes();


Procedural Interface


secureblackbox_kmipserver_get($res, 6 );


Remarks

Returns the raw certificate data in DER format.

This property is read-only and not available at design time.

Data Type

Byte Array

CACertHandle Property (SecureBlackbox_KMIPServer Class)

Allows to get or set a 'handle', a unique identifier of the underlying property object.

Object Oriented Interface


public function getCACertHandle();


public function setCACertHandle($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 14 );


secureblackbox_kmipserver_set($res, 14, $value );

Default Value

0

Remarks

Allows to get or set a 'handle', a unique identifier of the underlying property object. Use this property to assign objects of the same type in a quicker manner, without copying them fieldwise.

When you pass a handle of one object to another, the source object is copied to the destination rather than assigned. It is safe to get rid of the original object after such operation. pdfSigner.setSigningCertHandle(certMgr.getCertHandle());

This property is not available at design time.

Data Type

Long64

CertificateBytes Property (SecureBlackbox_KMIPServer Class)

Returns the raw certificate data in DER format.

Object Oriented Interface


public function getCertificateBytes();


Procedural Interface


secureblackbox_kmipserver_get($res, 45 );


Remarks

Returns the raw certificate data in DER format.

This property is read-only and not available at design time.

Data Type

Byte Array

CertificateHandle Property (SecureBlackbox_KMIPServer Class)

Allows to get or set a 'handle', a unique identifier of the underlying property object.

Object Oriented Interface


public function getCertificateHandle();


public function setCertificateHandle($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 53 );


secureblackbox_kmipserver_set($res, 53, $value );

Default Value

0

Remarks

Allows to get or set a 'handle', a unique identifier of the underlying property object. Use this property to assign objects of the same type in a quicker manner, without copying them fieldwise.

When you pass a handle of one object to another, the source object is copied to the destination rather than assigned. It is safe to get rid of the original object after such operation. pdfSigner.setSigningCertHandle(certMgr.getCertHandle());

This property is not available at design time.

Data Type

Long64

CompressionLevel Property (SecureBlackbox_KMIPServer Class)

The default compression level to use.

Object Oriented Interface


public function getCompressionLevel();


public function setCompressionLevel($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 84 );


secureblackbox_kmipserver_set($res, 84, $value );

Default Value

6

Remarks

Assign this property with the compression level (1 to 9) to apply for gzipped responses. 1 stands for the lightest but fastest compression, and 9 for the best but the slowest.

Data Type

Integer

ExternalCryptoAsyncDocumentID Property (SecureBlackbox_KMIPServer Class)

Specifies an optional document ID for SignAsyncBegin() and SignAsyncEnd() calls.

Object Oriented Interface


public function getExternalCryptoAsyncDocumentID();


public function setExternalCryptoAsyncDocumentID($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 85 );


secureblackbox_kmipserver_set($res, 85, $value );

Default Value

''

Remarks

Specifies an optional document ID for SignAsyncBegin() and SignAsyncEnd() calls.

Use this property when working with multi-signature DCAuth requests and responses to uniquely identify documents signed within a larger batch. On the completion stage, this value helps the signing component identify the correct signature in the returned batch of responses.

If using batched requests, make sure to set this property to the same value on both the pre-signing (SignAsyncBegin) and completion (SignAsyncEnd) stages.

Data Type

String

ExternalCryptoCustomParams Property (SecureBlackbox_KMIPServer Class)

Custom parameters to be passed to the signing service (uninterpreted).

Object Oriented Interface


public function getExternalCryptoCustomParams();


public function setExternalCryptoCustomParams($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 86 );


secureblackbox_kmipserver_set($res, 86, $value );

Default Value

''

Remarks

Custom parameters to be passed to the signing service (uninterpreted).

This property is not available at design time.

Data Type

String

ExternalCryptoData Property (SecureBlackbox_KMIPServer Class)

Additional data to be included in the async state and mirrored back by the requestor.

Object Oriented Interface


public function getExternalCryptoData();


public function setExternalCryptoData($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 87 );


secureblackbox_kmipserver_set($res, 87, $value );

Default Value

''

Remarks

Additional data to be included in the async state and mirrored back by the requestor.

This property is not available at design time.

Data Type

String

ExternalCryptoExternalHashCalculation Property (SecureBlackbox_KMIPServer Class)

Specifies whether the message hash is to be calculated at the external endpoint.

Object Oriented Interface


public function getExternalCryptoExternalHashCalculation();


public function setExternalCryptoExternalHashCalculation($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 88 );


secureblackbox_kmipserver_set($res, 88, $value );

Default Value

false

Remarks

Specifies whether the message hash is to be calculated at the external endpoint. Please note that this mode is not supported by the DCAuth class.

If set to true, the class will pass a few kilobytes of to-be-signed data from the document to the OnExternalSign event. This only applies when SignExternal() is called.

Data Type

Boolean

ExternalCryptoHashAlgorithm Property (SecureBlackbox_KMIPServer Class)

Specifies the request's signature hash algorithm.

Object Oriented Interface


public function getExternalCryptoHashAlgorithm();


public function setExternalCryptoHashAlgorithm($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 89 );


secureblackbox_kmipserver_set($res, 89, $value );

Default Value

'SHA256'

Remarks

Specifies the request's signature hash algorithm.

SB_HASH_ALGORITHM_SHA1SHA1
SB_HASH_ALGORITHM_SHA224SHA224
SB_HASH_ALGORITHM_SHA256SHA256
SB_HASH_ALGORITHM_SHA384SHA384
SB_HASH_ALGORITHM_SHA512SHA512
SB_HASH_ALGORITHM_MD2MD2
SB_HASH_ALGORITHM_MD4MD4
SB_HASH_ALGORITHM_MD5MD5
SB_HASH_ALGORITHM_RIPEMD160RIPEMD160
SB_HASH_ALGORITHM_CRC32CRC32
SB_HASH_ALGORITHM_SSL3SSL3
SB_HASH_ALGORITHM_GOST_R3411_1994GOST1994
SB_HASH_ALGORITHM_WHIRLPOOLWHIRLPOOL
SB_HASH_ALGORITHM_POLY1305POLY1305
SB_HASH_ALGORITHM_SHA3_224SHA3_224
SB_HASH_ALGORITHM_SHA3_256SHA3_256
SB_HASH_ALGORITHM_SHA3_384SHA3_384
SB_HASH_ALGORITHM_SHA3_512SHA3_512
SB_HASH_ALGORITHM_BLAKE2S_128BLAKE2S_128
SB_HASH_ALGORITHM_BLAKE2S_160BLAKE2S_160
SB_HASH_ALGORITHM_BLAKE2S_224BLAKE2S_224
SB_HASH_ALGORITHM_BLAKE2S_256BLAKE2S_256
SB_HASH_ALGORITHM_BLAKE2B_160BLAKE2B_160
SB_HASH_ALGORITHM_BLAKE2B_256BLAKE2B_256
SB_HASH_ALGORITHM_BLAKE2B_384BLAKE2B_384
SB_HASH_ALGORITHM_BLAKE2B_512BLAKE2B_512
SB_HASH_ALGORITHM_SHAKE_128SHAKE_128
SB_HASH_ALGORITHM_SHAKE_256SHAKE_256
SB_HASH_ALGORITHM_SHAKE_128_LENSHAKE_128_LEN
SB_HASH_ALGORITHM_SHAKE_256_LENSHAKE_256_LEN

Data Type

String

ExternalCryptoKeyID Property (SecureBlackbox_KMIPServer Class)

The ID of the pre-shared key used for DC request authentication.

Object Oriented Interface


public function getExternalCryptoKeyID();


public function setExternalCryptoKeyID($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 90 );


secureblackbox_kmipserver_set($res, 90, $value );

Default Value

''

Remarks

The ID of the pre-shared key used for DC request authentication.

Asynchronous DCAuth-driven communication requires that parties authenticate each other with a secret pre-shared cryptographic key. This provides an extra protection layer for the protocol and diminishes the risk of the private key becoming abused by foreign parties. Use this property to provide the pre-shared key identifier, and use ExternalCryptoKeySecret to pass the key itself.

The same KeyID/KeySecret pair should be used on the DCAuth side for the signing requests to be accepted.

Note: The KeyID/KeySecret scheme is very similar to the AuthKey scheme used in various Cloud service providers to authenticate users.

Example: signer.ExternalCrypto.KeyID = "MainSigningKey"; signer.ExternalCrypto.KeySecret = "abcdef0123456789";

Data Type

String

ExternalCryptoKeySecret Property (SecureBlackbox_KMIPServer Class)

The pre-shared key used for DC request authentication.

Object Oriented Interface


public function getExternalCryptoKeySecret();


public function setExternalCryptoKeySecret($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 91 );


secureblackbox_kmipserver_set($res, 91, $value );

Default Value

''

Remarks

The pre-shared key used for DC request authentication. This key must be set and match the key used by the DCAuth counterpart for the scheme to work.

Read more about configuring authentication in the ExternalCryptoKeyID topic.

Data Type

String

ExternalCryptoMethod Property (SecureBlackbox_KMIPServer Class)

Specifies the asynchronous signing method.

Object Oriented Interface


public function getExternalCryptoMethod();


public function setExternalCryptoMethod($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 92 );


secureblackbox_kmipserver_set($res, 92, $value );

Default Value

0

Remarks

Specifies the asynchronous signing method. This is typically defined by the DC server capabilities and setup.

Available options:

asmdPKCS10
asmdPKCS71

Data Type

Integer

ExternalCryptoMode Property (SecureBlackbox_KMIPServer Class)

Specifies the external cryptography mode.

Object Oriented Interface


public function getExternalCryptoMode();


public function setExternalCryptoMode($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 93 );


secureblackbox_kmipserver_set($res, 93, $value );

Default Value

0

Remarks

Specifies the external cryptography mode.

Available options:

ecmDefaultThe default value (0)
ecmDisabledDo not use DC or external signing (1)
ecmGenericGeneric external signing with the OnExternalSign event (2)
ecmDCAuthDCAuth signing (3)
ecmDCAuthJSONDCAuth signing in JSON format (4)

This property is not available at design time.

Data Type

Integer

ExternalCryptoPublicKeyAlgorithm Property (SecureBlackbox_KMIPServer Class)

Provide the public key algorithm here if the certificate is not available on the pre-signing stage.

Object Oriented Interface


public function getExternalCryptoPublicKeyAlgorithm();


public function setExternalCryptoPublicKeyAlgorithm($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 94 );


secureblackbox_kmipserver_set($res, 94, $value );

Default Value

''

Remarks

Provide the public key algorithm here if the certificate is not available on the pre-signing stage.

SB_CERT_ALGORITHM_ID_RSA_ENCRYPTIONrsaEncryption
SB_CERT_ALGORITHM_MD2_RSA_ENCRYPTIONmd2withRSAEncryption
SB_CERT_ALGORITHM_MD5_RSA_ENCRYPTIONmd5withRSAEncryption
SB_CERT_ALGORITHM_SHA1_RSA_ENCRYPTIONsha1withRSAEncryption
SB_CERT_ALGORITHM_ID_DSAid-dsa
SB_CERT_ALGORITHM_ID_DSA_SHA1id-dsa-with-sha1
SB_CERT_ALGORITHM_DH_PUBLICdhpublicnumber
SB_CERT_ALGORITHM_SHA224_RSA_ENCRYPTIONsha224WithRSAEncryption
SB_CERT_ALGORITHM_SHA256_RSA_ENCRYPTIONsha256WithRSAEncryption
SB_CERT_ALGORITHM_SHA384_RSA_ENCRYPTIONsha384WithRSAEncryption
SB_CERT_ALGORITHM_SHA512_RSA_ENCRYPTIONsha512WithRSAEncryption
SB_CERT_ALGORITHM_ID_RSAPSSid-RSASSA-PSS
SB_CERT_ALGORITHM_ID_RSAOAEPid-RSAES-OAEP
SB_CERT_ALGORITHM_RSASIGNATURE_RIPEMD160ripemd160withRSA
SB_CERT_ALGORITHM_ID_ELGAMALelGamal
SB_CERT_ALGORITHM_SHA1_ECDSAecdsa-with-SHA1
SB_CERT_ALGORITHM_RECOMMENDED_ECDSAecdsa-recommended
SB_CERT_ALGORITHM_SHA224_ECDSAecdsa-with-SHA224
SB_CERT_ALGORITHM_SHA256_ECDSAecdsa-with-SHA256
SB_CERT_ALGORITHM_SHA384_ECDSAecdsa-with-SHA384
SB_CERT_ALGORITHM_SHA512_ECDSAecdsa-with-SHA512
SB_CERT_ALGORITHM_ECid-ecPublicKey
SB_CERT_ALGORITHM_SPECIFIED_ECDSAecdsa-specified
SB_CERT_ALGORITHM_GOST_R3410_1994id-GostR3410-94
SB_CERT_ALGORITHM_GOST_R3410_2001id-GostR3410-2001
SB_CERT_ALGORITHM_GOST_R3411_WITH_R3410_1994id-GostR3411-94-with-GostR3410-94
SB_CERT_ALGORITHM_GOST_R3411_WITH_R3410_2001id-GostR3411-94-with-GostR3410-2001
SB_CERT_ALGORITHM_SHA1_ECDSA_PLAINecdsa-plain-SHA1
SB_CERT_ALGORITHM_SHA224_ECDSA_PLAINecdsa-plain-SHA224
SB_CERT_ALGORITHM_SHA256_ECDSA_PLAINecdsa-plain-SHA256
SB_CERT_ALGORITHM_SHA384_ECDSA_PLAINecdsa-plain-SHA384
SB_CERT_ALGORITHM_SHA512_ECDSA_PLAINecdsa-plain-SHA512
SB_CERT_ALGORITHM_RIPEMD160_ECDSA_PLAINecdsa-plain-RIPEMD160
SB_CERT_ALGORITHM_WHIRLPOOL_RSA_ENCRYPTIONwhirlpoolWithRSAEncryption
SB_CERT_ALGORITHM_ID_DSA_SHA224id-dsa-with-sha224
SB_CERT_ALGORITHM_ID_DSA_SHA256id-dsa-with-sha256
SB_CERT_ALGORITHM_SHA3_224_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-sha3-224
SB_CERT_ALGORITHM_SHA3_256_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-sha3-256
SB_CERT_ALGORITHM_SHA3_384_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-sha3-384
SB_CERT_ALGORITHM_SHA3_512_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-sha3-512
SB_CERT_ALGORITHM_SHA3_224_ECDSAid-ecdsa-with-sha3-224
SB_CERT_ALGORITHM_SHA3_256_ECDSAid-ecdsa-with-sha3-256
SB_CERT_ALGORITHM_SHA3_384_ECDSAid-ecdsa-with-sha3-384
SB_CERT_ALGORITHM_SHA3_512_ECDSAid-ecdsa-with-sha3-512
SB_CERT_ALGORITHM_SHA3_224_ECDSA_PLAINid-ecdsa-plain-with-sha3-224
SB_CERT_ALGORITHM_SHA3_256_ECDSA_PLAINid-ecdsa-plain-with-sha3-256
SB_CERT_ALGORITHM_SHA3_384_ECDSA_PLAINid-ecdsa-plain-with-sha3-384
SB_CERT_ALGORITHM_SHA3_512_ECDSA_PLAINid-ecdsa-plain-with-sha3-512
SB_CERT_ALGORITHM_ID_DSA_SHA3_224id-dsa-with-sha3-224
SB_CERT_ALGORITHM_ID_DSA_SHA3_256id-dsa-with-sha3-256
SB_CERT_ALGORITHM_BLAKE2S_128_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-blake2s128
SB_CERT_ALGORITHM_BLAKE2S_160_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-blake2s160
SB_CERT_ALGORITHM_BLAKE2S_224_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-blake2s224
SB_CERT_ALGORITHM_BLAKE2S_256_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-blake2s256
SB_CERT_ALGORITHM_BLAKE2B_160_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-blake2b160
SB_CERT_ALGORITHM_BLAKE2B_256_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-blake2b256
SB_CERT_ALGORITHM_BLAKE2B_384_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-blake2b384
SB_CERT_ALGORITHM_BLAKE2B_512_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-blake2b512
SB_CERT_ALGORITHM_BLAKE2S_128_ECDSAid-ecdsa-with-blake2s128
SB_CERT_ALGORITHM_BLAKE2S_160_ECDSAid-ecdsa-with-blake2s160
SB_CERT_ALGORITHM_BLAKE2S_224_ECDSAid-ecdsa-with-blake2s224
SB_CERT_ALGORITHM_BLAKE2S_256_ECDSAid-ecdsa-with-blake2s256
SB_CERT_ALGORITHM_BLAKE2B_160_ECDSAid-ecdsa-with-blake2b160
SB_CERT_ALGORITHM_BLAKE2B_256_ECDSAid-ecdsa-with-blake2b256
SB_CERT_ALGORITHM_BLAKE2B_384_ECDSAid-ecdsa-with-blake2b384
SB_CERT_ALGORITHM_BLAKE2B_512_ECDSAid-ecdsa-with-blake2b512
SB_CERT_ALGORITHM_BLAKE2S_128_ECDSA_PLAINid-ecdsa-plain-with-blake2s128
SB_CERT_ALGORITHM_BLAKE2S_160_ECDSA_PLAINid-ecdsa-plain-with-blake2s160
SB_CERT_ALGORITHM_BLAKE2S_224_ECDSA_PLAINid-ecdsa-plain-with-blake2s224
SB_CERT_ALGORITHM_BLAKE2S_256_ECDSA_PLAINid-ecdsa-plain-with-blake2s256
SB_CERT_ALGORITHM_BLAKE2B_160_ECDSA_PLAINid-ecdsa-plain-with-blake2b160
SB_CERT_ALGORITHM_BLAKE2B_256_ECDSA_PLAINid-ecdsa-plain-with-blake2b256
SB_CERT_ALGORITHM_BLAKE2B_384_ECDSA_PLAINid-ecdsa-plain-with-blake2b384
SB_CERT_ALGORITHM_BLAKE2B_512_ECDSA_PLAINid-ecdsa-plain-with-blake2b512
SB_CERT_ALGORITHM_ID_DSA_BLAKE2S_224id-dsa-with-blake2s224
SB_CERT_ALGORITHM_ID_DSA_BLAKE2S_256id-dsa-with-blake2s256
SB_CERT_ALGORITHM_EDDSA_ED25519id-Ed25519
SB_CERT_ALGORITHM_EDDSA_ED448id-Ed448
SB_CERT_ALGORITHM_EDDSA_ED25519_PHid-Ed25519ph
SB_CERT_ALGORITHM_EDDSA_ED448_PHid-Ed448ph
SB_CERT_ALGORITHM_EDDSAid-EdDSA
SB_CERT_ALGORITHM_EDDSA_SIGNATUREid-EdDSA-sig

Data Type

String

FIPSMode Property (SecureBlackbox_KMIPServer Class)

Reserved.

Object Oriented Interface


public function getFIPSMode();


public function setFIPSMode($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 95 );


secureblackbox_kmipserver_set($res, 95, $value );

Default Value

false

Remarks

This property is reserved for future use.

Data Type

Boolean

HandshakeTimeout Property (SecureBlackbox_KMIPServer Class)

Specifies the handshake timeout in milliseconds.

Object Oriented Interface


public function getHandshakeTimeout();


public function setHandshakeTimeout($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 96 );


secureblackbox_kmipserver_set($res, 96, $value );

Default Value

20000

Remarks

Use this property to set the TLS handshake timeout.

Data Type

Integer

Host Property (SecureBlackbox_KMIPServer Class)

Specifies the host name of the KMIP server.

Object Oriented Interface


public function getHost();


public function setHost($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 97 );


secureblackbox_kmipserver_set($res, 97, $value );

Default Value

''

Remarks

Use this property to specify the address of the KMIP server.

Data Type

String

KeyAlgorithm Property (SecureBlackbox_KMIPServer Class)

The algorithm of the cryptographic key.

Object Oriented Interface


public function getKeyAlgorithm();


public function setKeyAlgorithm($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 98 );


secureblackbox_kmipserver_set($res, 98, $value );

Default Value

''

Remarks

The algorithm of the cryptographic key. A cryptokey object may hold either symmetric, MAC, or public key. Public key algorithms: RSA, ECDSA, Elgamal, DH.

SB_SYMMETRIC_ALGORITHM_RC4RC4
SB_SYMMETRIC_ALGORITHM_DESDES
SB_SYMMETRIC_ALGORITHM_3DES3DES
SB_SYMMETRIC_ALGORITHM_RC2RC2
SB_SYMMETRIC_ALGORITHM_AES128AES128
SB_SYMMETRIC_ALGORITHM_AES192AES192
SB_SYMMETRIC_ALGORITHM_AES256AES256
SB_SYMMETRIC_ALGORITHM_IDENTITYIdentity
SB_SYMMETRIC_ALGORITHM_BLOWFISHBlowfish
SB_SYMMETRIC_ALGORITHM_CAST128CAST128
SB_SYMMETRIC_ALGORITHM_IDEAIDEA
SB_SYMMETRIC_ALGORITHM_TWOFISHTwofish
SB_SYMMETRIC_ALGORITHM_TWOFISH128Twofish128
SB_SYMMETRIC_ALGORITHM_TWOFISH192Twofish192
SB_SYMMETRIC_ALGORITHM_TWOFISH256Twofish256
SB_SYMMETRIC_ALGORITHM_CAMELLIACamellia
SB_SYMMETRIC_ALGORITHM_CAMELLIA128Camellia128
SB_SYMMETRIC_ALGORITHM_CAMELLIA192Camellia192
SB_SYMMETRIC_ALGORITHM_CAMELLIA256Camellia256
SB_SYMMETRIC_ALGORITHM_SERPENTSerpent
SB_SYMMETRIC_ALGORITHM_SERPENT128Serpent128
SB_SYMMETRIC_ALGORITHM_SERPENT192Serpent192
SB_SYMMETRIC_ALGORITHM_SERPENT256Serpent256
SB_SYMMETRIC_ALGORITHM_SEEDSEED
SB_SYMMETRIC_ALGORITHM_RABBITRabbit
SB_SYMMETRIC_ALGORITHM_SYMMETRICGeneric
SB_SYMMETRIC_ALGORITHM_GOST_28147_1989GOST-28147-1989
SB_SYMMETRIC_ALGORITHM_CHACHA20ChaCha20
SB_HASH_ALGORITHM_SHA1SHA1
SB_HASH_ALGORITHM_SHA224SHA224
SB_HASH_ALGORITHM_SHA256SHA256
SB_HASH_ALGORITHM_SHA384SHA384
SB_HASH_ALGORITHM_SHA512SHA512
SB_HASH_ALGORITHM_MD2MD2
SB_HASH_ALGORITHM_MD4MD4
SB_HASH_ALGORITHM_MD5MD5
SB_HASH_ALGORITHM_RIPEMD160RIPEMD160
SB_HASH_ALGORITHM_CRC32CRC32
SB_HASH_ALGORITHM_SSL3SSL3
SB_HASH_ALGORITHM_GOST_R3411_1994GOST1994
SB_HASH_ALGORITHM_WHIRLPOOLWHIRLPOOL
SB_HASH_ALGORITHM_POLY1305POLY1305
SB_HASH_ALGORITHM_SHA3_224SHA3_224
SB_HASH_ALGORITHM_SHA3_256SHA3_256
SB_HASH_ALGORITHM_SHA3_384SHA3_384
SB_HASH_ALGORITHM_SHA3_512SHA3_512
SB_HASH_ALGORITHM_BLAKE2S_128BLAKE2S_128
SB_HASH_ALGORITHM_BLAKE2S_160BLAKE2S_160
SB_HASH_ALGORITHM_BLAKE2S_224BLAKE2S_224
SB_HASH_ALGORITHM_BLAKE2S_256BLAKE2S_256
SB_HASH_ALGORITHM_BLAKE2B_160BLAKE2B_160
SB_HASH_ALGORITHM_BLAKE2B_256BLAKE2B_256
SB_HASH_ALGORITHM_BLAKE2B_384BLAKE2B_384
SB_HASH_ALGORITHM_BLAKE2B_512BLAKE2B_512
SB_HASH_ALGORITHM_SHAKE_128SHAKE_128
SB_HASH_ALGORITHM_SHAKE_256SHAKE_256
SB_HASH_ALGORITHM_SHAKE_128_LENSHAKE_128_LEN
SB_HASH_ALGORITHM_SHAKE_256_LENSHAKE_256_LEN

This property is not available at design time.

Data Type

String

KeyBits Property (SecureBlackbox_KMIPServer Class)

The length of the key in bits.

Object Oriented Interface


public function getKeyBits();


Procedural Interface


secureblackbox_kmipserver_get($res, 99 );


Default Value

0

Remarks

The length of the key in bits.

This property is read-only and not available at design time.

Data Type

Integer

KeyCurve Property (SecureBlackbox_KMIPServer Class)

This property specifies the name of the curve the EC key is built on.

Object Oriented Interface


public function getKeyCurve();


public function setKeyCurve($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 100 );


secureblackbox_kmipserver_set($res, 100, $value );

Default Value

''

Remarks

This property specifies the name of the curve the EC key is built on.

This property is not available at design time.

Data Type

String

KeyExportable Property (SecureBlackbox_KMIPServer Class)

Returns True if the key is exportable (can be serialized into an array of bytes), and False otherwise.

Object Oriented Interface


public function getKeyExportable();


Procedural Interface


secureblackbox_kmipserver_get($res, 101 );


Default Value

false

Remarks

Returns True if the key is exportable (can be serialized into an array of bytes), and False otherwise.

This property is read-only and not available at design time.

Data Type

Boolean

KeyFingerprint Property (SecureBlackbox_KMIPServer Class)

Contains the fingerprint (a hash imprint) of this key.

Object Oriented Interface


public function getKeyFingerprint();


Procedural Interface


secureblackbox_kmipserver_get($res, 102 );


Default Value

''

Remarks

Contains the fingerprint (a hash imprint) of this key.

This property is read-only and not available at design time.

Data Type

String

KeyHandle Property (SecureBlackbox_KMIPServer Class)

Allows to get or set a 'handle', a unique identifier of the underlying property object.

Object Oriented Interface


public function getKeyHandle();


public function setKeyHandle($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 103 );


secureblackbox_kmipserver_set($res, 103, $value );

Default Value

0

Remarks

Allows to get or set a 'handle', a unique identifier of the underlying property object. Use this property to assign objects of the same type in a quicker manner, without copying them fieldwise.

When you pass a handle of one object to another, the source object is copied to the destination rather than assigned. It is safe to get rid of the original object after such operation. pdfSigner.setSigningCertHandle(certMgr.getCertHandle());

This property is not available at design time.

Data Type

Long64

KeyID Property (SecureBlackbox_KMIPServer Class)

Provides access to a storage-specific key identifier.

Object Oriented Interface


public function getKeyID();


public function setKeyID($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 104 );


secureblackbox_kmipserver_set($res, 104, $value );

Remarks

Provides access to a storage-specific key identifier. Key identifiers are used by cryptographic providers to refer to a particular key and/or distinguish between different keys. They are typically unique within a storage, but there is no guarantee that a particular cryptoprovider will conform to that (or will assign any key IDs at all).

This property is not available at design time.

Data Type

Byte Array

KeyIV Property (SecureBlackbox_KMIPServer Class)

The initialization vector (IV) of a symmetric key.

Object Oriented Interface


public function getKeyIV();


public function setKeyIV($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 105 );


secureblackbox_kmipserver_set($res, 105, $value );

Remarks

The initialization vector (IV) of a symmetric key. This is normally a public part of a symmetric key, the idea of which is to introduce randomness to the encrypted data and/or serve as a first block in chaining ciphers.

This property is not available at design time.

Data Type

Byte Array

KeyKey Property (SecureBlackbox_KMIPServer Class)

The byte array representation of the key.

Object Oriented Interface


public function getKeyKey();


Procedural Interface


secureblackbox_kmipserver_get($res, 106 );


Remarks

The byte array representation of the key. This may not be available for non-KeyExportable keys.

This property is read-only and not available at design time.

Data Type

Byte Array

KeyNonce Property (SecureBlackbox_KMIPServer Class)

A nonce value associated with a key.

Object Oriented Interface


public function getKeyNonce();


public function setKeyNonce($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 107 );


secureblackbox_kmipserver_set($res, 107, $value );

Remarks

A nonce value associated with a key. It is similar to IV, but its only purpose is to introduce randomness.

This property is not available at design time.

Data Type

Byte Array

KeyPrivate Property (SecureBlackbox_KMIPServer Class)

Returns True if the object hosts a private key, and False otherwise.

Object Oriented Interface


public function getKeyPrivate();


Procedural Interface


secureblackbox_kmipserver_get($res, 108 );


Default Value

false

Remarks

Returns True if the object hosts a private key, and False otherwise.

This property is read-only and not available at design time.

Data Type

Boolean

KeyPublic Property (SecureBlackbox_KMIPServer Class)

Returns True if the object hosts a public key, and False otherwise.

Object Oriented Interface


public function getKeyPublic();


Procedural Interface


secureblackbox_kmipserver_get($res, 109 );


Default Value

false

Remarks

Returns True if the object hosts a public key, and False otherwise.

This property is read-only and not available at design time.

Data Type

Boolean

KeySubject Property (SecureBlackbox_KMIPServer Class)

Returns the key subject.

Object Oriented Interface


public function getKeySubject();


public function setKeySubject($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 110 );


secureblackbox_kmipserver_set($res, 110, $value );

Remarks

Returns the key subject. This is a cryptoprovider-dependent value, which normally aims to provide some user-friendly insight into the key owner.

This property is not available at design time.

Data Type

Byte Array

KeySymmetric Property (SecureBlackbox_KMIPServer Class)

Returns True if the object contains a symmetric key, and False otherwise.

Object Oriented Interface


public function getKeySymmetric();


Procedural Interface


secureblackbox_kmipserver_get($res, 111 );


Default Value

false

Remarks

Returns True if the object contains a symmetric key, and False otherwise.

This property is read-only and not available at design time.

Data Type

Boolean

KeyValid Property (SecureBlackbox_KMIPServer Class)

Returns True if this key is valid.

Object Oriented Interface


public function getKeyValid();


Procedural Interface


secureblackbox_kmipserver_get($res, 112 );


Default Value

false

Remarks

Returns True if this key is valid. The term Valid highly depends on the kind of the key being stored. A symmetric key is considered valid if its length fits the algorithm being set. The validity of an RSA key also ensures that the RSA key elements (primes, exponents, and modulus) are consistent.

This property is read-only and not available at design time.

Data Type

Boolean

PinnedClientAEADCipher Property (SecureBlackbox_KMIPServer Class)

Indicates whether the encryption algorithm used is an AEAD cipher.

Object Oriented Interface


public function getPinnedClientAEADCipher();


Procedural Interface


secureblackbox_kmipserver_get($res, 113 );


Default Value

false

Remarks

Indicates whether the encryption algorithm used is an AEAD cipher.

This property is read-only and not available at design time.

Data Type

Boolean

PinnedClientChainValidationDetails Property (SecureBlackbox_KMIPServer Class)

The details of a certificate chain validation outcome.

Object Oriented Interface


public function getPinnedClientChainValidationDetails();


Procedural Interface


secureblackbox_kmipserver_get($res, 114 );


Default Value

0

Remarks

The details of a certificate chain validation outcome. They may often suggest the reasons that contributed to the overall validation result.

Returns a bit mask of the following options:

cvrBadData0x0001One or more certificates in the validation path are malformed

cvrRevoked0x0002One or more certificates are revoked

cvrNotYetValid0x0004One or more certificates are not yet valid

cvrExpired0x0008One or more certificates are expired

cvrInvalidSignature0x0010A certificate contains a non-valid digital signature

cvrUnknownCA0x0020A CA certificate for one or more certificates has not been found (chain incomplete)

cvrCAUnauthorized0x0040One of the CA certificates are not authorized to act as CA

cvrCRLNotVerified0x0080One or more CRLs could not be verified

cvrOCSPNotVerified0x0100One or more OCSP responses could not be verified

cvrIdentityMismatch0x0200The identity protected by the certificate (a TLS endpoint or an e-mail addressee) does not match what is recorded in the certificate

cvrNoKeyUsage0x0400A mandatory key usage is not enabled in one of the chain certificates

cvrBlocked0x0800One or more certificates are blocked

cvrFailure0x1000General validation failure

cvrChainLoop0x2000Chain loop: one of the CA certificates recursively signs itself

cvrWeakAlgorithm0x4000A weak algorithm is used in one of certificates or revocation elements

cvrUserEnforced0x8000The chain was considered invalid following intervention from a user code

This property is read-only and not available at design time.

Data Type

Integer

PinnedClientChainValidationResult Property (SecureBlackbox_KMIPServer Class)

The outcome of a certificate chain validation routine.

Object Oriented Interface


public function getPinnedClientChainValidationResult();


Procedural Interface


secureblackbox_kmipserver_get($res, 115 );


Default Value

0

Remarks

The outcome of a certificate chain validation routine.

Available options:

cvtValid0The chain is valid

cvtValidButUntrusted1The chain is valid, but the root certificate is not trusted

cvtInvalid2The chain is not valid (some of certificates are revoked, expired, or contain an invalid signature)

cvtCantBeEstablished3The validity of the chain cannot be established because of missing or unavailable validation information (certificates, CRLs, or OCSP responses)

Use the ValidationLog property to access the detailed validation log.

This property is read-only and not available at design time.

Data Type

Integer

PinnedClientCiphersuite Property (SecureBlackbox_KMIPServer Class)

The cipher suite employed by this connection.

Object Oriented Interface


public function getPinnedClientCiphersuite();


Procedural Interface


secureblackbox_kmipserver_get($res, 116 );


Default Value

''

Remarks

The cipher suite employed by this connection.

For TLS connections, this property returns the ciphersuite that was/is employed by the connection.

This property is read-only and not available at design time.

Data Type

String

PinnedClientClientAuthenticated Property (SecureBlackbox_KMIPServer Class)

Specifies whether client authentication was performed during this connection.

Object Oriented Interface


public function getPinnedClientClientAuthenticated();


Procedural Interface


secureblackbox_kmipserver_get($res, 117 );


Default Value

false

Remarks

Specifies whether client authentication was performed during this connection.

This property is read-only and not available at design time.

Data Type

Boolean

PinnedClientClientAuthRequested Property (SecureBlackbox_KMIPServer Class)

Specifies whether client authentication was requested during this connection.

Object Oriented Interface


public function getPinnedClientClientAuthRequested();


Procedural Interface


secureblackbox_kmipserver_get($res, 118 );


Default Value

false

Remarks

Specifies whether client authentication was requested during this connection.

This property is read-only and not available at design time.

Data Type

Boolean

PinnedClientConnectionEstablished Property (SecureBlackbox_KMIPServer Class)

Indicates whether the connection has been established fully.

Object Oriented Interface


public function getPinnedClientConnectionEstablished();


Procedural Interface


secureblackbox_kmipserver_get($res, 119 );


Default Value

false

Remarks

Indicates whether the connection has been established fully.

This property is read-only and not available at design time.

Data Type

Boolean

PinnedClientConnectionID Property (SecureBlackbox_KMIPServer Class)

The unique identifier assigned to this connection.

Object Oriented Interface


public function getPinnedClientConnectionID();


Procedural Interface


secureblackbox_kmipserver_get($res, 120 );


Remarks

The unique identifier assigned to this connection.

This property is read-only and not available at design time.

Data Type

Byte Array

PinnedClientDigestAlgorithm Property (SecureBlackbox_KMIPServer Class)

The digest algorithm used in a TLS-enabled connection.

Object Oriented Interface


public function getPinnedClientDigestAlgorithm();


Procedural Interface


secureblackbox_kmipserver_get($res, 121 );


Default Value

''

Remarks

The digest algorithm used in a TLS-enabled connection.

This property is read-only and not available at design time.

Data Type

String

PinnedClientEncryptionAlgorithm Property (SecureBlackbox_KMIPServer Class)

The symmetric encryption algorithm used in a TLS-enabled connection.

Object Oriented Interface


public function getPinnedClientEncryptionAlgorithm();


Procedural Interface


secureblackbox_kmipserver_get($res, 122 );


Default Value

''

Remarks

The symmetric encryption algorithm used in a TLS-enabled connection.

This property is read-only and not available at design time.

Data Type

String

PinnedClientExportable Property (SecureBlackbox_KMIPServer Class)

Indicates whether a TLS connection uses a reduced-strength exportable cipher.

Object Oriented Interface


public function getPinnedClientExportable();


Procedural Interface


secureblackbox_kmipserver_get($res, 123 );


Default Value

false

Remarks

Indicates whether a TLS connection uses a reduced-strength exportable cipher.

This property is read-only and not available at design time.

Data Type

Boolean

PinnedClientID Property (SecureBlackbox_KMIPServer Class)

The client connection's unique identifier.

Object Oriented Interface


public function getPinnedClientID();


Procedural Interface


secureblackbox_kmipserver_get($res, 124 );


Default Value

-1

Remarks

The client connection's unique identifier. This value is used throughout to refer to a particular client connection.

This property is read-only and not available at design time.

Data Type

Long64

PinnedClientKeyExchangeAlgorithm Property (SecureBlackbox_KMIPServer Class)

The key exchange algorithm used in a TLS-enabled connection.

Object Oriented Interface


public function getPinnedClientKeyExchangeAlgorithm();


Procedural Interface


secureblackbox_kmipserver_get($res, 125 );


Default Value

''

Remarks

The key exchange algorithm used in a TLS-enabled connection.

This property is read-only and not available at design time.

Data Type

String

PinnedClientKeyExchangeKeyBits Property (SecureBlackbox_KMIPServer Class)

The length of the key exchange key of a TLS-enabled connection.

Object Oriented Interface


public function getPinnedClientKeyExchangeKeyBits();


Procedural Interface


secureblackbox_kmipserver_get($res, 126 );


Default Value

0

Remarks

The length of the key exchange key of a TLS-enabled connection.

This property is read-only and not available at design time.

Data Type

Integer

PinnedClientNamedECCurve Property (SecureBlackbox_KMIPServer Class)

The elliptic curve used in this connection.

Object Oriented Interface


public function getPinnedClientNamedECCurve();


Procedural Interface


secureblackbox_kmipserver_get($res, 127 );


Default Value

''

Remarks

The elliptic curve used in this connection.

This property is read-only and not available at design time.

Data Type

String

PinnedClientPFSCipher Property (SecureBlackbox_KMIPServer Class)

Indicates whether the chosen ciphersuite provides perfect forward secrecy (PFS).

Object Oriented Interface


public function getPinnedClientPFSCipher();


Procedural Interface


secureblackbox_kmipserver_get($res, 128 );


Default Value

false

Remarks

Indicates whether the chosen ciphersuite provides perfect forward secrecy (PFS).

This property is read-only and not available at design time.

Data Type

Boolean

PinnedClientPreSharedIdentity Property (SecureBlackbox_KMIPServer Class)

Specifies the identity used when the PSK (Pre-Shared Key) key-exchange mechanism is negotiated.

Object Oriented Interface


public function getPinnedClientPreSharedIdentity();


Procedural Interface


secureblackbox_kmipserver_get($res, 129 );


Default Value

''

Remarks

Specifies the identity used when the PSK (Pre-Shared Key) key-exchange mechanism is negotiated.

This property is read-only and not available at design time.

Data Type

String

PinnedClientPreSharedIdentityHint Property (SecureBlackbox_KMIPServer Class)

A hint professed by the server to help the client select the PSK identity to use.

Object Oriented Interface


public function getPinnedClientPreSharedIdentityHint();


Procedural Interface


secureblackbox_kmipserver_get($res, 130 );


Default Value

''

Remarks

A hint professed by the server to help the client select the PSK identity to use.

This property is read-only and not available at design time.

Data Type

String

PinnedClientPublicKeyBits Property (SecureBlackbox_KMIPServer Class)

The length of the public key.

Object Oriented Interface


public function getPinnedClientPublicKeyBits();


Procedural Interface


secureblackbox_kmipserver_get($res, 131 );


Default Value

0

Remarks

The length of the public key.

This property is read-only and not available at design time.

Data Type

Integer

PinnedClientRemoteAddress Property (SecureBlackbox_KMIPServer Class)

The client's IP address.

Object Oriented Interface


public function getPinnedClientRemoteAddress();


Procedural Interface


secureblackbox_kmipserver_get($res, 132 );


Default Value

''

Remarks

The client's IP address.

This property is read-only and not available at design time.

Data Type

String

PinnedClientRemotePort Property (SecureBlackbox_KMIPServer Class)

The remote port of the client connection.

Object Oriented Interface


public function getPinnedClientRemotePort();


Procedural Interface


secureblackbox_kmipserver_get($res, 133 );


Default Value

0

Remarks

The remote port of the client connection.

This property is read-only and not available at design time.

Data Type

Integer

PinnedClientResumedSession Property (SecureBlackbox_KMIPServer Class)

Indicates whether a TLS-enabled connection was spawned from another TLS connection.

Object Oriented Interface


public function getPinnedClientResumedSession();


Procedural Interface


secureblackbox_kmipserver_get($res, 134 );


Default Value

false

Remarks

Indicates whether a TLS-enabled connection was spawned from another TLS connection

This property is read-only and not available at design time.

Data Type

Boolean

PinnedClientSecureConnection Property (SecureBlackbox_KMIPServer Class)

Indicates whether TLS or SSL is enabled for this connection.

Object Oriented Interface


public function getPinnedClientSecureConnection();


Procedural Interface


secureblackbox_kmipserver_get($res, 135 );


Default Value

false

Remarks

Indicates whether TLS or SSL is enabled for this connection.

This property is read-only and not available at design time.

Data Type

Boolean

PinnedClientServerAuthenticated Property (SecureBlackbox_KMIPServer Class)

Indicates whether server authentication was performed during a TLS-enabled connection.

Object Oriented Interface


public function getPinnedClientServerAuthenticated();


Procedural Interface


secureblackbox_kmipserver_get($res, 136 );


Default Value

false

Remarks

Indicates whether server authentication was performed during a TLS-enabled connection.

This property is read-only and not available at design time.

Data Type

Boolean

PinnedClientSignatureAlgorithm Property (SecureBlackbox_KMIPServer Class)

The signature algorithm used in a TLS handshake.

Object Oriented Interface


public function getPinnedClientSignatureAlgorithm();


Procedural Interface


secureblackbox_kmipserver_get($res, 137 );


Default Value

''

Remarks

The signature algorithm used in a TLS handshake.

This property is read-only and not available at design time.

Data Type

String

PinnedClientSymmetricBlockSize Property (SecureBlackbox_KMIPServer Class)

The block size of the symmetric algorithm used.

Object Oriented Interface


public function getPinnedClientSymmetricBlockSize();


Procedural Interface


secureblackbox_kmipserver_get($res, 138 );


Default Value

0

Remarks

The block size of the symmetric algorithm used.

This property is read-only and not available at design time.

Data Type

Integer

PinnedClientSymmetricKeyBits Property (SecureBlackbox_KMIPServer Class)

The key length of the symmetric algorithm used.

Object Oriented Interface


public function getPinnedClientSymmetricKeyBits();


Procedural Interface


secureblackbox_kmipserver_get($res, 139 );


Default Value

0

Remarks

The key length of the symmetric algorithm used.

This property is read-only and not available at design time.

Data Type

Integer

PinnedClientTotalBytesReceived Property (SecureBlackbox_KMIPServer Class)

The total number of bytes received over this connection.

Object Oriented Interface


public function getPinnedClientTotalBytesReceived();


Procedural Interface


secureblackbox_kmipserver_get($res, 140 );


Default Value

0

Remarks

The total number of bytes received over this connection.

This property is read-only and not available at design time.

Data Type

Long64

PinnedClientTotalBytesSent Property (SecureBlackbox_KMIPServer Class)

The total number of bytes sent over this connection.

Object Oriented Interface


public function getPinnedClientTotalBytesSent();


Procedural Interface


secureblackbox_kmipserver_get($res, 141 );


Default Value

0

Remarks

The total number of bytes sent over this connection.

This property is read-only and not available at design time.

Data Type

Long64

PinnedClientValidationLog Property (SecureBlackbox_KMIPServer Class)

Contains the server certificate's chain validation log.

Object Oriented Interface


public function getPinnedClientValidationLog();


Procedural Interface


secureblackbox_kmipserver_get($res, 142 );


Default Value

''

Remarks

Contains the server certificate's chain validation log. This information may be very useful in investigating chain validation failures.

This property is read-only and not available at design time.

Data Type

String

PinnedClientVersion Property (SecureBlackbox_KMIPServer Class)

Indicates the version of SSL/TLS protocol negotiated during this connection.

Object Oriented Interface


public function getPinnedClientVersion();


Procedural Interface


secureblackbox_kmipserver_get($res, 143 );


Default Value

''

Remarks

Indicates the version of SSL/TLS protocol negotiated during this connection.

This property is read-only and not available at design time.

Data Type

String

PinnedClientCertCount Property (SecureBlackbox_KMIPServer Class)

The number of records in the PinnedClientCert arrays.

Object Oriented Interface


public function getPinnedClientCertCount();


Procedural Interface


secureblackbox_kmipserver_get($res, 144 );


Default Value

0

Remarks

This property controls the size of the following arrays:

The array indices start at 0 and end at PinnedClientCertCount - 1.

This property is read-only and not available at design time.

Data Type

Integer

PinnedClientCertBytes Property (SecureBlackbox_KMIPServer Class)

Returns the raw certificate data in DER format.

Object Oriented Interface


public function getPinnedClientCertBytes($pinnedclientcertindex);


Procedural Interface


secureblackbox_kmipserver_get($res, 145 , $pinnedclientcertindex);


Remarks

Returns the raw certificate data in DER format.

The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.

This property is read-only and not available at design time.

Data Type

Byte Array

PinnedClientCertCAKeyID Property (SecureBlackbox_KMIPServer Class)

A unique identifier (fingerprint) of the CA certificate's cryptographic key.

Object Oriented Interface


public function getPinnedClientCertCAKeyID($pinnedclientcertindex);


Procedural Interface


secureblackbox_kmipserver_get($res, 147 , $pinnedclientcertindex);


Remarks

A unique identifier (fingerprint) of the CA certificate's cryptographic key.

Authority Key Identifier is a certificate extension which allows identification of certificates belonging to the same issuer, but with different public keys. It is a de-facto standard to include this extension in all certificates to facilitate chain building.

This setting cannot be set when generating a certificate as it always derives from another certificate property. CertificateManager generates this setting automatically if enough information is available to it: for self-signed certificates, this value is copied from the PinnedClientCertSubjectKeyID setting, and for lower-level certificates, from the parent certificate's subject key ID extension.

The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.

This property is read-only and not available at design time.

Data Type

Byte Array

PinnedClientCertFingerprint Property (SecureBlackbox_KMIPServer Class)

Contains the fingerprint (a hash imprint) of this certificate.

Object Oriented Interface


public function getPinnedClientCertFingerprint($pinnedclientcertindex);


Procedural Interface


secureblackbox_kmipserver_get($res, 151 , $pinnedclientcertindex);


Default Value

''

Remarks

Contains the fingerprint (a hash imprint) of this certificate.

While there is no formal standard defining what a fingerprint is, a SHA1 hash of the certificate's DER-encoded body is typically used.

The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.

This property is read-only and not available at design time.

Data Type

String

PinnedClientCertHandle Property (SecureBlackbox_KMIPServer Class)

Allows to get or set a 'handle', a unique identifier of the underlying property object.

Object Oriented Interface


public function getPinnedClientCertHandle($pinnedclientcertindex);


Procedural Interface


secureblackbox_kmipserver_get($res, 153 , $pinnedclientcertindex);


Default Value

0

Remarks

Allows to get or set a 'handle', a unique identifier of the underlying property object. Use this property to assign objects of the same type in a quicker manner, without copying them fieldwise.

When you pass a handle of one object to another, the source object is copied to the destination rather than assigned. It is safe to get rid of the original object after such operation. pdfSigner.setSigningCertHandle(certMgr.getCertHandle());

The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.

This property is read-only and not available at design time.

Data Type

Long64

PinnedClientCertIssuer Property (SecureBlackbox_KMIPServer Class)

The common name of the certificate issuer (CA), typically a company name.

Object Oriented Interface


public function getPinnedClientCertIssuer($pinnedclientcertindex);


Procedural Interface


secureblackbox_kmipserver_get($res, 155 , $pinnedclientcertindex);


Default Value

''

Remarks

The common name of the certificate issuer (CA), typically a company name. This is part of a larger set of credentials available via PinnedClientCertIssuerRDN.

The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.

This property is read-only and not available at design time.

Data Type

String

PinnedClientCertIssuerRDN Property (SecureBlackbox_KMIPServer Class)

A list of Property=Value pairs that uniquely identify the certificate issuer.

Object Oriented Interface


public function getPinnedClientCertIssuerRDN($pinnedclientcertindex);


Procedural Interface


secureblackbox_kmipserver_get($res, 156 , $pinnedclientcertindex);


Default Value

''

Remarks

A list of Property=Value pairs that uniquely identify the certificate issuer.

Example: /C=US/O=Nationwide CA/CN=Web Certification Authority

The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.

This property is read-only and not available at design time.

Data Type

String

PinnedClientCertKeyAlgorithm Property (SecureBlackbox_KMIPServer Class)

Specifies the public key algorithm of this certificate.

Object Oriented Interface


public function getPinnedClientCertKeyAlgorithm($pinnedclientcertindex);


Procedural Interface


secureblackbox_kmipserver_get($res, 157 , $pinnedclientcertindex);


Default Value

'0'

Remarks

Specifies the public key algorithm of this certificate.

SB_CERT_ALGORITHM_ID_RSA_ENCRYPTIONrsaEncryption
SB_CERT_ALGORITHM_MD2_RSA_ENCRYPTIONmd2withRSAEncryption
SB_CERT_ALGORITHM_MD5_RSA_ENCRYPTIONmd5withRSAEncryption
SB_CERT_ALGORITHM_SHA1_RSA_ENCRYPTIONsha1withRSAEncryption
SB_CERT_ALGORITHM_ID_DSAid-dsa
SB_CERT_ALGORITHM_ID_DSA_SHA1id-dsa-with-sha1
SB_CERT_ALGORITHM_DH_PUBLICdhpublicnumber
SB_CERT_ALGORITHM_SHA224_RSA_ENCRYPTIONsha224WithRSAEncryption
SB_CERT_ALGORITHM_SHA256_RSA_ENCRYPTIONsha256WithRSAEncryption
SB_CERT_ALGORITHM_SHA384_RSA_ENCRYPTIONsha384WithRSAEncryption
SB_CERT_ALGORITHM_SHA512_RSA_ENCRYPTIONsha512WithRSAEncryption
SB_CERT_ALGORITHM_ID_RSAPSSid-RSASSA-PSS
SB_CERT_ALGORITHM_ID_RSAOAEPid-RSAES-OAEP
SB_CERT_ALGORITHM_RSASIGNATURE_RIPEMD160ripemd160withRSA
SB_CERT_ALGORITHM_ID_ELGAMALelGamal
SB_CERT_ALGORITHM_SHA1_ECDSAecdsa-with-SHA1
SB_CERT_ALGORITHM_RECOMMENDED_ECDSAecdsa-recommended
SB_CERT_ALGORITHM_SHA224_ECDSAecdsa-with-SHA224
SB_CERT_ALGORITHM_SHA256_ECDSAecdsa-with-SHA256
SB_CERT_ALGORITHM_SHA384_ECDSAecdsa-with-SHA384
SB_CERT_ALGORITHM_SHA512_ECDSAecdsa-with-SHA512
SB_CERT_ALGORITHM_ECid-ecPublicKey
SB_CERT_ALGORITHM_SPECIFIED_ECDSAecdsa-specified
SB_CERT_ALGORITHM_GOST_R3410_1994id-GostR3410-94
SB_CERT_ALGORITHM_GOST_R3410_2001id-GostR3410-2001
SB_CERT_ALGORITHM_GOST_R3411_WITH_R3410_1994id-GostR3411-94-with-GostR3410-94
SB_CERT_ALGORITHM_GOST_R3411_WITH_R3410_2001id-GostR3411-94-with-GostR3410-2001
SB_CERT_ALGORITHM_SHA1_ECDSA_PLAINecdsa-plain-SHA1
SB_CERT_ALGORITHM_SHA224_ECDSA_PLAINecdsa-plain-SHA224
SB_CERT_ALGORITHM_SHA256_ECDSA_PLAINecdsa-plain-SHA256
SB_CERT_ALGORITHM_SHA384_ECDSA_PLAINecdsa-plain-SHA384
SB_CERT_ALGORITHM_SHA512_ECDSA_PLAINecdsa-plain-SHA512
SB_CERT_ALGORITHM_RIPEMD160_ECDSA_PLAINecdsa-plain-RIPEMD160
SB_CERT_ALGORITHM_WHIRLPOOL_RSA_ENCRYPTIONwhirlpoolWithRSAEncryption
SB_CERT_ALGORITHM_ID_DSA_SHA224id-dsa-with-sha224
SB_CERT_ALGORITHM_ID_DSA_SHA256id-dsa-with-sha256
SB_CERT_ALGORITHM_SHA3_224_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-sha3-224
SB_CERT_ALGORITHM_SHA3_256_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-sha3-256
SB_CERT_ALGORITHM_SHA3_384_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-sha3-384
SB_CERT_ALGORITHM_SHA3_512_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-sha3-512
SB_CERT_ALGORITHM_SHA3_224_ECDSAid-ecdsa-with-sha3-224
SB_CERT_ALGORITHM_SHA3_256_ECDSAid-ecdsa-with-sha3-256
SB_CERT_ALGORITHM_SHA3_384_ECDSAid-ecdsa-with-sha3-384
SB_CERT_ALGORITHM_SHA3_512_ECDSAid-ecdsa-with-sha3-512
SB_CERT_ALGORITHM_SHA3_224_ECDSA_PLAINid-ecdsa-plain-with-sha3-224
SB_CERT_ALGORITHM_SHA3_256_ECDSA_PLAINid-ecdsa-plain-with-sha3-256
SB_CERT_ALGORITHM_SHA3_384_ECDSA_PLAINid-ecdsa-plain-with-sha3-384
SB_CERT_ALGORITHM_SHA3_512_ECDSA_PLAINid-ecdsa-plain-with-sha3-512
SB_CERT_ALGORITHM_ID_DSA_SHA3_224id-dsa-with-sha3-224
SB_CERT_ALGORITHM_ID_DSA_SHA3_256id-dsa-with-sha3-256
SB_CERT_ALGORITHM_BLAKE2S_128_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-blake2s128
SB_CERT_ALGORITHM_BLAKE2S_160_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-blake2s160
SB_CERT_ALGORITHM_BLAKE2S_224_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-blake2s224
SB_CERT_ALGORITHM_BLAKE2S_256_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-blake2s256
SB_CERT_ALGORITHM_BLAKE2B_160_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-blake2b160
SB_CERT_ALGORITHM_BLAKE2B_256_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-blake2b256
SB_CERT_ALGORITHM_BLAKE2B_384_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-blake2b384
SB_CERT_ALGORITHM_BLAKE2B_512_RSA_ENCRYPTIONid-rsassa-pkcs1-v1_5-with-blake2b512
SB_CERT_ALGORITHM_BLAKE2S_128_ECDSAid-ecdsa-with-blake2s128
SB_CERT_ALGORITHM_BLAKE2S_160_ECDSAid-ecdsa-with-blake2s160
SB_CERT_ALGORITHM_BLAKE2S_224_ECDSAid-ecdsa-with-blake2s224
SB_CERT_ALGORITHM_BLAKE2S_256_ECDSAid-ecdsa-with-blake2s256
SB_CERT_ALGORITHM_BLAKE2B_160_ECDSAid-ecdsa-with-blake2b160
SB_CERT_ALGORITHM_BLAKE2B_256_ECDSAid-ecdsa-with-blake2b256
SB_CERT_ALGORITHM_BLAKE2B_384_ECDSAid-ecdsa-with-blake2b384
SB_CERT_ALGORITHM_BLAKE2B_512_ECDSAid-ecdsa-with-blake2b512
SB_CERT_ALGORITHM_BLAKE2S_128_ECDSA_PLAINid-ecdsa-plain-with-blake2s128
SB_CERT_ALGORITHM_BLAKE2S_160_ECDSA_PLAINid-ecdsa-plain-with-blake2s160
SB_CERT_ALGORITHM_BLAKE2S_224_ECDSA_PLAINid-ecdsa-plain-with-blake2s224
SB_CERT_ALGORITHM_BLAKE2S_256_ECDSA_PLAINid-ecdsa-plain-with-blake2s256
SB_CERT_ALGORITHM_BLAKE2B_160_ECDSA_PLAINid-ecdsa-plain-with-blake2b160
SB_CERT_ALGORITHM_BLAKE2B_256_ECDSA_PLAINid-ecdsa-plain-with-blake2b256
SB_CERT_ALGORITHM_BLAKE2B_384_ECDSA_PLAINid-ecdsa-plain-with-blake2b384
SB_CERT_ALGORITHM_BLAKE2B_512_ECDSA_PLAINid-ecdsa-plain-with-blake2b512
SB_CERT_ALGORITHM_ID_DSA_BLAKE2S_224id-dsa-with-blake2s224
SB_CERT_ALGORITHM_ID_DSA_BLAKE2S_256id-dsa-with-blake2s256
SB_CERT_ALGORITHM_EDDSA_ED25519id-Ed25519
SB_CERT_ALGORITHM_EDDSA_ED448id-Ed448
SB_CERT_ALGORITHM_EDDSA_ED25519_PHid-Ed25519ph
SB_CERT_ALGORITHM_EDDSA_ED448_PHid-Ed448ph
SB_CERT_ALGORITHM_EDDSAid-EdDSA
SB_CERT_ALGORITHM_EDDSA_SIGNATUREid-EdDSA-sig

Use the PinnedClientCertKeyBits, PinnedClientCertCurve, and PinnedClientCertPublicKeyBytes properties to get more details about the key the certificate contains.

The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.

This property is read-only and not available at design time.

Data Type

String

PinnedClientCertKeyBits Property (SecureBlackbox_KMIPServer Class)

Returns the length of the public key in bits.

Object Oriented Interface


public function getPinnedClientCertKeyBits($pinnedclientcertindex);


Procedural Interface


secureblackbox_kmipserver_get($res, 158 , $pinnedclientcertindex);


Default Value

0

Remarks

Returns the length of the public key in bits.

This value indicates the length of the principal cryptographic parameter of the key, such as the length of the RSA modulus or ECDSA field. The key data returned by the PinnedClientCertPublicKeyBytes or PinnedClientCertPrivateKeyBytes property would typically contain auxiliary values, and therefore be longer.

The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.

This property is read-only and not available at design time.

Data Type

Integer

PinnedClientCertKeyFingerprint Property (SecureBlackbox_KMIPServer Class)

Returns a SHA1 fingerprint of the public key contained in the certificate.

Object Oriented Interface


public function getPinnedClientCertKeyFingerprint($pinnedclientcertindex);


Procedural Interface


secureblackbox_kmipserver_get($res, 159 , $pinnedclientcertindex);


Default Value

''

Remarks

Returns a SHA1 fingerprint of the public key contained in the certificate.

Note that the key fingerprint is different from the certificate fingerprint accessible via the PinnedClientCertFingerprint property. The key fingeprint uniquely identifies the public key, and so can be the same for multiple certificates containing the same key.

The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.

This property is read-only and not available at design time.

Data Type

String

PinnedClientCertKeyUsage Property (SecureBlackbox_KMIPServer Class)

Indicates the purposes of the key contained in the certificate, in the form of an OR'ed flag set.

Object Oriented Interface


public function getPinnedClientCertKeyUsage($pinnedclientcertindex);


Procedural Interface


secureblackbox_kmipserver_get($res, 160 , $pinnedclientcertindex);


Default Value

0

Remarks

Indicates the purposes of the key contained in the certificate, in the form of an OR'ed flag set.

This value is a bit mask of the following values:

ckuUnknown0x00000Unknown key usage

ckuDigitalSignature0x00001Digital signature

ckuNonRepudiation0x00002Non-repudiation

ckuKeyEncipherment0x00004Key encipherment

ckuDataEncipherment0x00008Data encipherment

ckuKeyAgreement0x00010Key agreement

ckuKeyCertSign0x00020Certificate signing

ckuCRLSign0x00040Revocation signing

ckuEncipherOnly0x00080Encipher only

ckuDecipherOnly0x00100Decipher only

ckuServerAuthentication0x00200Server authentication

ckuClientAuthentication0x00400Client authentication

ckuCodeSigning0x00800Code signing

ckuEmailProtection0x01000Email protection

ckuTimeStamping0x02000Timestamping

ckuOCSPSigning0x04000OCSP signing

ckuSmartCardLogon0x08000Smartcard logon

ckuKeyPurposeClientAuth0x10000Kerberos - client authentication

ckuKeyPurposeKDC0x20000Kerberos - KDC

Set this property before generating the certificate to propagate the key usage flags to the new certificate.

The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.

This property is read-only and not available at design time.

Data Type

Integer

PinnedClientCertPublicKeyBytes Property (SecureBlackbox_KMIPServer Class)

Contains the certificate's public key in DER format.

Object Oriented Interface


public function getPinnedClientCertPublicKeyBytes($pinnedclientcertindex);


Procedural Interface


secureblackbox_kmipserver_get($res, 169 , $pinnedclientcertindex);


Remarks

Contains the certificate's public key in DER format.

This typically would contain an ASN.1-encoded public key value. The exact format depends on the type of the public key contained in the certificate.

The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.

This property is read-only and not available at design time.

Data Type

Byte Array

PinnedClientCertSelfSigned Property (SecureBlackbox_KMIPServer Class)

Indicates whether the certificate is self-signed (root) or signed by an external CA.

Object Oriented Interface


public function getPinnedClientCertSelfSigned($pinnedclientcertindex);


Procedural Interface


secureblackbox_kmipserver_get($res, 173 , $pinnedclientcertindex);


Default Value

false

Remarks

Indicates whether the certificate is self-signed (root) or signed by an external CA.

The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.

This property is read-only and not available at design time.

Data Type

Boolean

PinnedClientCertSerialNumber Property (SecureBlackbox_KMIPServer Class)

Returns the certificate's serial number.

Object Oriented Interface


public function getPinnedClientCertSerialNumber($pinnedclientcertindex);


Procedural Interface


secureblackbox_kmipserver_get($res, 174 , $pinnedclientcertindex);


Remarks

Returns the certificate's serial number.

The serial number is a binary string that uniquely identifies a certificate among others issued by the same CA. According to the X.509 standard, the (issuer, serial number) pair should be globally unique to facilitate chain building.

The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.

This property is read-only and not available at design time.

Data Type

Byte Array

PinnedClientCertSigAlgorithm Property (SecureBlackbox_KMIPServer Class)

Indicates the algorithm that was used by the CA to sign this certificate.

Object Oriented Interface


public function getPinnedClientCertSigAlgorithm($pinnedclientcertindex);


Procedural Interface


secureblackbox_kmipserver_get($res, 175 , $pinnedclientcertindex);


Default Value

''

Remarks

Indicates the algorithm that was used by the CA to sign this certificate.

A signature algorithm typically combines hash and public key algorithms together, such as sha256WithRSAEncryption or ecdsa-with-SHA256.

The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.

This property is read-only and not available at design time.

Data Type

String

PinnedClientCertSubject Property (SecureBlackbox_KMIPServer Class)

The common name of the certificate holder, typically an individual's name, a URL, an e-mail address, or a company name.

Object Oriented Interface


public function getPinnedClientCertSubject($pinnedclientcertindex);


Procedural Interface


secureblackbox_kmipserver_get($res, 177 , $pinnedclientcertindex);


Default Value

''

Remarks

The common name of the certificate holder, typically an individual's name, a URL, an e-mail address, or a company name. This is part of a larger set of credentials available via PinnedClientCertSubjectRDN.

The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.

This property is read-only and not available at design time.

Data Type

String

PinnedClientCertSubjectKeyID Property (SecureBlackbox_KMIPServer Class)

Contains a unique identifier of the certificate's cryptographic key.

Object Oriented Interface


public function getPinnedClientCertSubjectKeyID($pinnedclientcertindex);


Procedural Interface


secureblackbox_kmipserver_get($res, 179 , $pinnedclientcertindex);


Remarks

Contains a unique identifier of the certificate's cryptographic key.

Subject Key Identifier is a certificate extension which allows a specific public key to be associated with a certificate holder. Typically, subject key identifiers of CA certificates are recorded as respective CA key identifiers in the subordinate certificates that they issue, which facilitates chain building.

The PinnedClientCertSubjectKeyID and PinnedClientCertCAKeyID properties of self-signed certificates typically contain identical values, as in that specific case, the issuer and the subject are the same entity.

The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.

This property is read-only and not available at design time.

Data Type

Byte Array

PinnedClientCertSubjectRDN Property (SecureBlackbox_KMIPServer Class)

A list of Property=Value pairs that uniquely identify the certificate holder (subject).

Object Oriented Interface


public function getPinnedClientCertSubjectRDN($pinnedclientcertindex);


Procedural Interface


secureblackbox_kmipserver_get($res, 180 , $pinnedclientcertindex);


Default Value

''

Remarks

A list of Property=Value pairs that uniquely identify the certificate holder (subject).

Depending on the purpose of the certificate and the policies of the CA that issued it, the values included in the subject record may differ drastically and contain business or personal names, web URLs, email addresses, and other data.

Example: /C=US/O=Oranges and Apples, Inc./OU=Accounts Receivable/1.2.3.4.5=Value with unknown OID/CN=Margaret Watkins.

The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.

This property is read-only and not available at design time.

Data Type

String

PinnedClientCertValidFrom Property (SecureBlackbox_KMIPServer Class)

The time point at which the certificate becomes valid, in UTC.

Object Oriented Interface


public function getPinnedClientCertValidFrom($pinnedclientcertindex);


Procedural Interface


secureblackbox_kmipserver_get($res, 182 , $pinnedclientcertindex);


Default Value

''

Remarks

The time point at which the certificate becomes valid, in UTC.

The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.

This property is read-only and not available at design time.

Data Type

String

PinnedClientCertValidTo Property (SecureBlackbox_KMIPServer Class)

The time point at which the certificate expires, in UTC.

Object Oriented Interface


public function getPinnedClientCertValidTo($pinnedclientcertindex);


Procedural Interface


secureblackbox_kmipserver_get($res, 183 , $pinnedclientcertindex);


Default Value

''

Remarks

The time point at which the certificate expires, in UTC.

The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.

This property is read-only and not available at design time.

Data Type

String

Port Property (SecureBlackbox_KMIPServer Class)

A port to listen for connections on.

Object Oriented Interface


public function getPort();


public function setPort($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 184 );


secureblackbox_kmipserver_set($res, 184, $value );

Default Value

5696

Remarks

Use this property to specify the listening port.

Data Type

Integer

ReadOnly Property (SecureBlackbox_KMIPServer Class)

ToDo.

Object Oriented Interface


public function getReadOnly();


public function setReadOnly($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 185 );


secureblackbox_kmipserver_set($res, 185, $value );

Default Value

false

Remarks

ToDo

This property is not available at design time.

Data Type

Boolean

SessionTimeout Property (SecureBlackbox_KMIPServer Class)

Specifies the default session timeout value in milliseconds.

Object Oriented Interface


public function getSessionTimeout();


public function setSessionTimeout($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 186 );


secureblackbox_kmipserver_set($res, 186, $value );

Default Value

360000

Remarks

Specifies the period of inactivity (in milliseconds) after which the connection will be terminated by the server.

Data Type

Integer

SocketIncomingSpeedLimit Property (SecureBlackbox_KMIPServer Class)

The maximum number of bytes to read from the socket, per second.

Object Oriented Interface


public function getSocketIncomingSpeedLimit();


public function setSocketIncomingSpeedLimit($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 192 );


secureblackbox_kmipserver_set($res, 192, $value );

Default Value

0

Remarks

The maximum number of bytes to read from the socket, per second.

Data Type

Integer

SocketLocalAddress Property (SecureBlackbox_KMIPServer Class)

The local network interface to bind the socket to.

Object Oriented Interface


public function getSocketLocalAddress();


public function setSocketLocalAddress($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 193 );


secureblackbox_kmipserver_set($res, 193, $value );

Default Value

''

Remarks

The local network interface to bind the socket to.

Data Type

String

SocketLocalPort Property (SecureBlackbox_KMIPServer Class)

The local port number to bind the socket to.

Object Oriented Interface


public function getSocketLocalPort();


public function setSocketLocalPort($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 194 );


secureblackbox_kmipserver_set($res, 194, $value );

Default Value

0

Remarks

The local port number to bind the socket to.

Data Type

Integer

SocketOutgoingSpeedLimit Property (SecureBlackbox_KMIPServer Class)

The maximum number of bytes to write to the socket, per second.

Object Oriented Interface


public function getSocketOutgoingSpeedLimit();


public function setSocketOutgoingSpeedLimit($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 195 );


secureblackbox_kmipserver_set($res, 195, $value );

Default Value

0

Remarks

The maximum number of bytes to write to the socket, per second.

Data Type

Integer

SocketTimeout Property (SecureBlackbox_KMIPServer Class)

The maximum period of waiting, in milliseconds, after which the socket operation is considered unsuccessful.

Object Oriented Interface


public function getSocketTimeout();


public function setSocketTimeout($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 196 );


secureblackbox_kmipserver_set($res, 196, $value );

Default Value

60000

Remarks

The maximum period of waiting, in milliseconds, after which the socket operation is considered unsuccessful.

If Timeout is set to 0, a socket operation will expire after the system-default timeout (2 hrs 8 min for TCP stack).

Data Type

Integer

SocketUseIPv6 Property (SecureBlackbox_KMIPServer Class)

Enables or disables IP protocol version 6.

Object Oriented Interface


public function getSocketUseIPv6();


public function setSocketUseIPv6($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 197 );


secureblackbox_kmipserver_set($res, 197, $value );

Default Value

false

Remarks

Enables or disables IP protocol version 6.

Data Type

Boolean

StorageFileName Property (SecureBlackbox_KMIPServer Class)

A path to the KMIP object database.

Object Oriented Interface


public function getStorageFileName();


public function setStorageFileName($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 198 );


secureblackbox_kmipserver_set($res, 198, $value );

Default Value

''

Remarks

Assign the path to the database of objects managed by the KMIP server to this property.

Data Type

String

TLSServerCertCount Property (SecureBlackbox_KMIPServer Class)

The number of records in the TLSServerCert arrays.

Object Oriented Interface


public function getTLSServerCertCount();


public function setTLSServerCertCount($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 199 );


secureblackbox_kmipserver_set($res, 199, $value );

Default Value

0

Remarks

This property controls the size of the following arrays:

The array indices start at 0 and end at TLSServerCertCount - 1.

This property is not available at design time.

Data Type

Integer

TLSServerCertBytes Property (SecureBlackbox_KMIPServer Class)

Returns the raw certificate data in DER format.

Object Oriented Interface


public function getTLSServerCertBytes($tlsservercertindex);


Procedural Interface


secureblackbox_kmipserver_get($res, 200 , $tlsservercertindex);


Remarks

Returns the raw certificate data in DER format.

The $tlsservercertindex parameter specifies the index of the item in the array. The size of the array is controlled by the TLSServerCertCount property.

This property is read-only and not available at design time.

Data Type

Byte Array

TLSServerCertHandle Property (SecureBlackbox_KMIPServer Class)

Allows to get or set a 'handle', a unique identifier of the underlying property object.

Object Oriented Interface


public function getTLSServerCertHandle($tlsservercertindex);


public function setTLSServerCertHandle($tlsservercertindex, $value);

Procedural Interface


secureblackbox_kmipserver_get($res, 208 , $tlsservercertindex);


secureblackbox_kmipserver_set($res, 208, $value , $tlsservercertindex);

Default Value

0

Remarks

Allows to get or set a 'handle', a unique identifier of the underlying property object. Use this property to assign objects of the same type in a quicker manner, without copying them fieldwise.

When you pass a handle of one object to another, the source object is copied to the destination rather than assigned. It is safe to get rid of the original object after such operation. pdfSigner.setSigningCertHandle(certMgr.getCertHandle());

The $tlsservercertindex parameter specifies the index of the item in the array. The size of the array is controlled by the TLSServerCertCount property.

This property is not available at design time.

Data Type

Long64

TLSAutoValidateCertificates Property (SecureBlackbox_KMIPServer Class)

Specifies whether server-side TLS certificates should be validated automatically using internal validation rules.

Object Oriented Interface


public function getTLSAutoValidateCertificates();


public function setTLSAutoValidateCertificates($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 239 );


secureblackbox_kmipserver_set($res, 239, $value );

Default Value

true

Remarks

Specifies whether server-side TLS certificates should be validated automatically using internal validation rules.

Data Type

Boolean

TLSBaseConfiguration Property (SecureBlackbox_KMIPServer Class)

Selects the base configuration for the TLS settings.

Object Oriented Interface


public function getTLSBaseConfiguration();


public function setTLSBaseConfiguration($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 240 );


secureblackbox_kmipserver_set($res, 240, $value );

Default Value

0

Remarks

Selects the base configuration for the TLS settings. Several profiles are offered and tuned up for different purposes, such as high security or higher compatibility.

stpcDefault0
stpcCompatible1
stpcComprehensiveInsecure2
stpcHighlySecure3

Data Type

Integer

TLSCiphersuites Property (SecureBlackbox_KMIPServer Class)

A list of ciphersuites separated with commas or semicolons.

Object Oriented Interface


public function getTLSCiphersuites();


public function setTLSCiphersuites($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 241 );


secureblackbox_kmipserver_set($res, 241, $value );

Default Value

''

Remarks

A list of ciphersuites separated with commas or semicolons. Each ciphersuite in the list may be prefixed with a minus sign (-) to indicate that the ciphersuite should be disabled rather than enabled. Besides the specific ciphersuite modifiers, this property supports the all (and -all) aliases, allowing all ciphersuites to be blanketly enabled or disabled at once.

Note: the list of ciphersuites provided to this property alters the baseline list of ciphersuites as defined by TLSBaseConfiguration. Remember to start your ciphersuite string with -all; if you need to only enable a specific fixed set of ciphersuites. The list of supported ciphersuites is provided below:

  • NULL_NULL_NULL
  • RSA_NULL_MD5
  • RSA_NULL_SHA
  • RSA_RC4_MD5
  • RSA_RC4_SHA
  • RSA_RC2_MD5
  • RSA_IDEA_MD5
  • RSA_IDEA_SHA
  • RSA_DES_MD5
  • RSA_DES_SHA
  • RSA_3DES_MD5
  • RSA_3DES_SHA
  • RSA_AES128_SHA
  • RSA_AES256_SHA
  • DH_DSS_DES_SHA
  • DH_DSS_3DES_SHA
  • DH_DSS_AES128_SHA
  • DH_DSS_AES256_SHA
  • DH_RSA_DES_SHA
  • DH_RSA_3DES_SHA
  • DH_RSA_AES128_SHA
  • DH_RSA_AES256_SHA
  • DHE_DSS_DES_SHA
  • DHE_DSS_3DES_SHA
  • DHE_DSS_AES128_SHA
  • DHE_DSS_AES256_SHA
  • DHE_RSA_DES_SHA
  • DHE_RSA_3DES_SHA
  • DHE_RSA_AES128_SHA
  • DHE_RSA_AES256_SHA
  • DH_ANON_RC4_MD5
  • DH_ANON_DES_SHA
  • DH_ANON_3DES_SHA
  • DH_ANON_AES128_SHA
  • DH_ANON_AES256_SHA
  • RSA_RC2_MD5_EXPORT
  • RSA_RC4_MD5_EXPORT
  • RSA_DES_SHA_EXPORT
  • DH_DSS_DES_SHA_EXPORT
  • DH_RSA_DES_SHA_EXPORT
  • DHE_DSS_DES_SHA_EXPORT
  • DHE_RSA_DES_SHA_EXPORT
  • DH_ANON_RC4_MD5_EXPORT
  • DH_ANON_DES_SHA_EXPORT
  • RSA_CAMELLIA128_SHA
  • DH_DSS_CAMELLIA128_SHA
  • DH_RSA_CAMELLIA128_SHA
  • DHE_DSS_CAMELLIA128_SHA
  • DHE_RSA_CAMELLIA128_SHA
  • DH_ANON_CAMELLIA128_SHA
  • RSA_CAMELLIA256_SHA
  • DH_DSS_CAMELLIA256_SHA
  • DH_RSA_CAMELLIA256_SHA
  • DHE_DSS_CAMELLIA256_SHA
  • DHE_RSA_CAMELLIA256_SHA
  • DH_ANON_CAMELLIA256_SHA
  • PSK_RC4_SHA
  • PSK_3DES_SHA
  • PSK_AES128_SHA
  • PSK_AES256_SHA
  • DHE_PSK_RC4_SHA
  • DHE_PSK_3DES_SHA
  • DHE_PSK_AES128_SHA
  • DHE_PSK_AES256_SHA
  • RSA_PSK_RC4_SHA
  • RSA_PSK_3DES_SHA
  • RSA_PSK_AES128_SHA
  • RSA_PSK_AES256_SHA
  • RSA_SEED_SHA
  • DH_DSS_SEED_SHA
  • DH_RSA_SEED_SHA
  • DHE_DSS_SEED_SHA
  • DHE_RSA_SEED_SHA
  • DH_ANON_SEED_SHA
  • SRP_SHA_3DES_SHA
  • SRP_SHA_RSA_3DES_SHA
  • SRP_SHA_DSS_3DES_SHA
  • SRP_SHA_AES128_SHA
  • SRP_SHA_RSA_AES128_SHA
  • SRP_SHA_DSS_AES128_SHA
  • SRP_SHA_AES256_SHA
  • SRP_SHA_RSA_AES256_SHA
  • SRP_SHA_DSS_AES256_SHA
  • ECDH_ECDSA_NULL_SHA
  • ECDH_ECDSA_RC4_SHA
  • ECDH_ECDSA_3DES_SHA
  • ECDH_ECDSA_AES128_SHA
  • ECDH_ECDSA_AES256_SHA
  • ECDHE_ECDSA_NULL_SHA
  • ECDHE_ECDSA_RC4_SHA
  • ECDHE_ECDSA_3DES_SHA
  • ECDHE_ECDSA_AES128_SHA
  • ECDHE_ECDSA_AES256_SHA
  • ECDH_RSA_NULL_SHA
  • ECDH_RSA_RC4_SHA
  • ECDH_RSA_3DES_SHA
  • ECDH_RSA_AES128_SHA
  • ECDH_RSA_AES256_SHA
  • ECDHE_RSA_NULL_SHA
  • ECDHE_RSA_RC4_SHA
  • ECDHE_RSA_3DES_SHA
  • ECDHE_RSA_AES128_SHA
  • ECDHE_RSA_AES256_SHA
  • ECDH_ANON_NULL_SHA
  • ECDH_ANON_RC4_SHA
  • ECDH_ANON_3DES_SHA
  • ECDH_ANON_AES128_SHA
  • ECDH_ANON_AES256_SHA
  • RSA_NULL_SHA256
  • RSA_AES128_SHA256
  • RSA_AES256_SHA256
  • DH_DSS_AES128_SHA256
  • DH_RSA_AES128_SHA256
  • DHE_DSS_AES128_SHA256
  • DHE_RSA_AES128_SHA256
  • DH_DSS_AES256_SHA256
  • DH_RSA_AES256_SHA256
  • DHE_DSS_AES256_SHA256
  • DHE_RSA_AES256_SHA256
  • DH_ANON_AES128_SHA256
  • DH_ANON_AES256_SHA256
  • RSA_AES128_GCM_SHA256
  • RSA_AES256_GCM_SHA384
  • DHE_RSA_AES128_GCM_SHA256
  • DHE_RSA_AES256_GCM_SHA384
  • DH_RSA_AES128_GCM_SHA256
  • DH_RSA_AES256_GCM_SHA384
  • DHE_DSS_AES128_GCM_SHA256
  • DHE_DSS_AES256_GCM_SHA384
  • DH_DSS_AES128_GCM_SHA256
  • DH_DSS_AES256_GCM_SHA384
  • DH_ANON_AES128_GCM_SHA256
  • DH_ANON_AES256_GCM_SHA384
  • ECDHE_ECDSA_AES128_SHA256
  • ECDHE_ECDSA_AES256_SHA384
  • ECDH_ECDSA_AES128_SHA256
  • ECDH_ECDSA_AES256_SHA384
  • ECDHE_RSA_AES128_SHA256
  • ECDHE_RSA_AES256_SHA384
  • ECDH_RSA_AES128_SHA256
  • ECDH_RSA_AES256_SHA384
  • ECDHE_ECDSA_AES128_GCM_SHA256
  • ECDHE_ECDSA_AES256_GCM_SHA384
  • ECDH_ECDSA_AES128_GCM_SHA256
  • ECDH_ECDSA_AES256_GCM_SHA384
  • ECDHE_RSA_AES128_GCM_SHA256
  • ECDHE_RSA_AES256_GCM_SHA384
  • ECDH_RSA_AES128_GCM_SHA256
  • ECDH_RSA_AES256_GCM_SHA384
  • PSK_AES128_GCM_SHA256
  • PSK_AES256_GCM_SHA384
  • DHE_PSK_AES128_GCM_SHA256
  • DHE_PSK_AES256_GCM_SHA384
  • RSA_PSK_AES128_GCM_SHA256
  • RSA_PSK_AES256_GCM_SHA384
  • PSK_AES128_SHA256
  • PSK_AES256_SHA384
  • PSK_NULL_SHA256
  • PSK_NULL_SHA384
  • DHE_PSK_AES128_SHA256
  • DHE_PSK_AES256_SHA384
  • DHE_PSK_NULL_SHA256
  • DHE_PSK_NULL_SHA384
  • RSA_PSK_AES128_SHA256
  • RSA_PSK_AES256_SHA384
  • RSA_PSK_NULL_SHA256
  • RSA_PSK_NULL_SHA384
  • RSA_CAMELLIA128_SHA256
  • DH_DSS_CAMELLIA128_SHA256
  • DH_RSA_CAMELLIA128_SHA256
  • DHE_DSS_CAMELLIA128_SHA256
  • DHE_RSA_CAMELLIA128_SHA256
  • DH_ANON_CAMELLIA128_SHA256
  • RSA_CAMELLIA256_SHA256
  • DH_DSS_CAMELLIA256_SHA256
  • DH_RSA_CAMELLIA256_SHA256
  • DHE_DSS_CAMELLIA256_SHA256
  • DHE_RSA_CAMELLIA256_SHA256
  • DH_ANON_CAMELLIA256_SHA256
  • ECDHE_ECDSA_CAMELLIA128_SHA256
  • ECDHE_ECDSA_CAMELLIA256_SHA384
  • ECDH_ECDSA_CAMELLIA128_SHA256
  • ECDH_ECDSA_CAMELLIA256_SHA384
  • ECDHE_RSA_CAMELLIA128_SHA256
  • ECDHE_RSA_CAMELLIA256_SHA384
  • ECDH_RSA_CAMELLIA128_SHA256
  • ECDH_RSA_CAMELLIA256_SHA384
  • RSA_CAMELLIA128_GCM_SHA256
  • RSA_CAMELLIA256_GCM_SHA384
  • DHE_RSA_CAMELLIA128_GCM_SHA256
  • DHE_RSA_CAMELLIA256_GCM_SHA384
  • DH_RSA_CAMELLIA128_GCM_SHA256
  • DH_RSA_CAMELLIA256_GCM_SHA384
  • DHE_DSS_CAMELLIA128_GCM_SHA256
  • DHE_DSS_CAMELLIA256_GCM_SHA384
  • DH_DSS_CAMELLIA128_GCM_SHA256
  • DH_DSS_CAMELLIA256_GCM_SHA384
  • DH_anon_CAMELLIA128_GCM_SHA256
  • DH_anon_CAMELLIA256_GCM_SHA384
  • ECDHE_ECDSA_CAMELLIA128_GCM_SHA256
  • ECDHE_ECDSA_CAMELLIA256_GCM_SHA384
  • ECDH_ECDSA_CAMELLIA128_GCM_SHA256
  • ECDH_ECDSA_CAMELLIA256_GCM_SHA384
  • ECDHE_RSA_CAMELLIA128_GCM_SHA256
  • ECDHE_RSA_CAMELLIA256_GCM_SHA384
  • ECDH_RSA_CAMELLIA128_GCM_SHA256
  • ECDH_RSA_CAMELLIA256_GCM_SHA384
  • PSK_CAMELLIA128_GCM_SHA256
  • PSK_CAMELLIA256_GCM_SHA384
  • DHE_PSK_CAMELLIA128_GCM_SHA256
  • DHE_PSK_CAMELLIA256_GCM_SHA384
  • RSA_PSK_CAMELLIA128_GCM_SHA256
  • RSA_PSK_CAMELLIA256_GCM_SHA384
  • PSK_CAMELLIA128_SHA256
  • PSK_CAMELLIA256_SHA384
  • DHE_PSK_CAMELLIA128_SHA256
  • DHE_PSK_CAMELLIA256_SHA384
  • RSA_PSK_CAMELLIA128_SHA256
  • RSA_PSK_CAMELLIA256_SHA384
  • ECDHE_PSK_CAMELLIA128_SHA256
  • ECDHE_PSK_CAMELLIA256_SHA384
  • ECDHE_PSK_RC4_SHA
  • ECDHE_PSK_3DES_SHA
  • ECDHE_PSK_AES128_SHA
  • ECDHE_PSK_AES256_SHA
  • ECDHE_PSK_AES128_SHA256
  • ECDHE_PSK_AES256_SHA384
  • ECDHE_PSK_NULL_SHA
  • ECDHE_PSK_NULL_SHA256
  • ECDHE_PSK_NULL_SHA384
  • ECDHE_RSA_CHACHA20_POLY1305_SHA256
  • ECDHE_ECDSA_CHACHA20_POLY1305_SHA256
  • DHE_RSA_CHACHA20_POLY1305_SHA256
  • PSK_CHACHA20_POLY1305_SHA256
  • ECDHE_PSK_CHACHA20_POLY1305_SHA256
  • DHE_PSK_CHACHA20_POLY1305_SHA256
  • RSA_PSK_CHACHA20_POLY1305_SHA256
  • AES128_GCM_SHA256
  • AES256_GCM_SHA384
  • CHACHA20_POLY1305_SHA256
  • AES128_CCM_SHA256
  • AES128_CCM8_SHA256

Data Type

String

TLSClientAuth Property (SecureBlackbox_KMIPServer Class)

Enables or disables certificate-based client authentication.

Object Oriented Interface


public function getTLSClientAuth();


public function setTLSClientAuth($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 242 );


secureblackbox_kmipserver_set($res, 242, $value );

Default Value

0

Remarks

Enables or disables certificate-based client authentication.

Set this property to true to tune up the client authentication type:

ccatNoAuth0
ccatRequestCert1
ccatRequireCert2

Data Type

Integer

TLSECCurves Property (SecureBlackbox_KMIPServer Class)

Defines the elliptic curves to enable.

Object Oriented Interface


public function getTLSECCurves();


public function setTLSECCurves($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 243 );


secureblackbox_kmipserver_set($res, 243, $value );

Default Value

''

Remarks

Defines the elliptic curves to enable.

Data Type

String

TLSExtensions Property (SecureBlackbox_KMIPServer Class)

Provides access to TLS extensions.

Object Oriented Interface


public function getTLSExtensions();


public function setTLSExtensions($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 244 );


secureblackbox_kmipserver_set($res, 244, $value );

Default Value

''

Remarks

Provides access to TLS extensions.

Data Type

String

TLSForceResumeIfDestinationChanges Property (SecureBlackbox_KMIPServer Class)

Whether to force TLS session resumption when the destination address changes.

Object Oriented Interface


public function getTLSForceResumeIfDestinationChanges();


public function setTLSForceResumeIfDestinationChanges($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 245 );


secureblackbox_kmipserver_set($res, 245, $value );

Default Value

false

Remarks

Whether to force TLS session resumption when the destination address changes.

Data Type

Boolean

TLSPreSharedIdentity Property (SecureBlackbox_KMIPServer Class)

Defines the identity used when the PSK (Pre-Shared Key) key-exchange mechanism is negotiated.

Object Oriented Interface


public function getTLSPreSharedIdentity();


public function setTLSPreSharedIdentity($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 246 );


secureblackbox_kmipserver_set($res, 246, $value );

Default Value

''

Remarks

Defines the identity used when the PSK (Pre-Shared Key) key-exchange mechanism is negotiated.

This property is not available at design time.

Data Type

String

TLSPreSharedKey Property (SecureBlackbox_KMIPServer Class)

Contains the pre-shared key for the PSK (Pre-Shared Key) key-exchange mechanism, encoded with base16.

Object Oriented Interface


public function getTLSPreSharedKey();


public function setTLSPreSharedKey($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 247 );


secureblackbox_kmipserver_set($res, 247, $value );

Default Value

''

Remarks

Contains the pre-shared key for the PSK (Pre-Shared Key) key-exchange mechanism, encoded with base16.

This property is not available at design time.

Data Type

String

TLSPreSharedKeyCiphersuite Property (SecureBlackbox_KMIPServer Class)

Defines the ciphersuite used for PSK (Pre-Shared Key) negotiation.

Object Oriented Interface


public function getTLSPreSharedKeyCiphersuite();


public function setTLSPreSharedKeyCiphersuite($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 248 );


secureblackbox_kmipserver_set($res, 248, $value );

Default Value

''

Remarks

Defines the ciphersuite used for PSK (Pre-Shared Key) negotiation.

Data Type

String

TLSRenegotiationAttackPreventionMode Property (SecureBlackbox_KMIPServer Class)

Selects the renegotiation attack prevention mechanism.

Object Oriented Interface


public function getTLSRenegotiationAttackPreventionMode();


public function setTLSRenegotiationAttackPreventionMode($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 249 );


secureblackbox_kmipserver_set($res, 249, $value );

Default Value

2

Remarks

Selects the renegotiation attack prevention mechanism.

The following options are available:

crapmCompatible0TLS 1.0 and 1.1 compatibility mode (renegotiation indication extension is disabled).
crapmStrict1Renegotiation attack prevention is enabled and enforced.
crapmAuto2Automatically choose whether to enable or disable renegotiation attack prevention.

Data Type

Integer

TLSRevocationCheck Property (SecureBlackbox_KMIPServer Class)

Specifies the kind(s) of revocation check to perform.

Object Oriented Interface


public function getTLSRevocationCheck();


public function setTLSRevocationCheck($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 250 );


secureblackbox_kmipserver_set($res, 250, $value );

Default Value

1

Remarks

Specifies the kind(s) of revocation check to perform.

Revocation checking is necessary to ensure the integrity of the chain and obtain up-to-date certificate validity and trustworthiness information.

crcNone0No revocation checking
crcAuto1Automatic mode selection. Currently this maps to crcAnyOCSPOrCRL, but it may change in the future.
crcAllCRL2Check all provided CRL endpoints for all chain certificates.
crcAllOCSP3Check all provided OCSP endpoints for all chain certificates.
crcAllCRLAndOCSP4Check all CRL and OCSP endpoints for all chain certificates.
crcAnyCRL5At least one CRL check for every certificate in the chain must succeed.
crcAnyOCSP6At least one OCSP check for every certificate in the chain must succeed.
crcAnyCRLOrOCSP7At least one CRL or OCSP check for every certificate in the chain must succeed. CRL endpoints are checked first.
crcAnyOCSPOrCRL8At least one CRL or OCSP check for every certificate in the chain must succeed. OCSP endpoints are checked first.

This setting controls the way the revocation checks are performed. Typically certificates come with two types of revocation information sources: CRL (certificate revocation lists) and OCSP responders. CRLs are static objects periodically published by the CA at some online location. OCSP responders are active online services maintained by the CA that can provide up-to-date information on certificate statuses in near real time.

There are some conceptual differences between the two. CRLs are normally larger in size. Their use involves some latency because there is normally some delay between the time when a certificate was revoked and the time the subsequent CRL mentioning that is published. The benefits of CRL is that the same object can provide statuses for all certificates issued by a particular CA, and that the whole technology is much simpler than OCSP (and thus is supported by more CAs).

This setting lets you adjust the validation course by including or excluding certain types of revocation sources from the validation process. The crcAnyOCSPOrCRL setting (give preference to the faster OCSP route and only demand one source to succeed) is a good choice for most typical validation environments. The "crcAll*" modes are much stricter, and may be used in scenarios where bulletproof validity information is essential.

This property is not available at design time.

Data Type

Integer

TLSSSLOptions Property (SecureBlackbox_KMIPServer Class)

Various SSL (TLS) protocol options, set of cssloExpectShutdownMessage 0x001 Wait for the close-notify message when shutting down the connection cssloOpenSSLDTLSWorkaround 0x002 (DEPRECATED) Use a DTLS version workaround when talking to very old OpenSSL versions cssloDisableKexLengthAlignment 0x004 Do not align the client-side PMS by the RSA modulus size.

Object Oriented Interface


public function getTLSSSLOptions();


public function setTLSSSLOptions($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 251 );


secureblackbox_kmipserver_set($res, 251, $value );

Default Value

16

Remarks

Various SSL (TLS) protocol options, set of

cssloExpectShutdownMessage0x001Wait for the close-notify message when shutting down the connection

cssloOpenSSLDTLSWorkaround0x002(DEPRECATED) Use a DTLS version workaround when talking to very old OpenSSL versions

cssloDisableKexLengthAlignment0x004Do not align the client-side PMS by the RSA modulus size. It is unlikely that you will ever need to adjust it.

cssloForceUseOfClientCertHashAlg0x008Enforce the use of the client certificate hash algorithm. It is unlikely that you will ever need to adjust it.

cssloAutoAddServerNameExtension0x010Automatically add the server name extension when known

cssloAcceptTrustedSRPPrimesOnly0x020Accept trusted SRP primes only

cssloDisableSignatureAlgorithmsExtension0x040Disable (do not send) the signature algorithms extension. It is unlikely that you will ever need to adjust it.

cssloIntolerateHigherProtocolVersions0x080(server option) Do not allow fallback from TLS versions higher than currently enabled

cssloStickToPrefCertHashAlg0x100Stick to preferred certificate hash algorithms

cssloNoImplicitTLS12Fallback0x200Disable implicit TLS 1.3 to 1.2 fallbacks

cssloUseHandshakeBatches0x400Send the handshake message as large batches rather than individually

Data Type

Integer

TLSTLSMode Property (SecureBlackbox_KMIPServer Class)

Specifies the TLS mode to use.

Object Oriented Interface


public function getTLSTLSMode();


public function setTLSTLSMode($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 252 );


secureblackbox_kmipserver_set($res, 252, $value );

Default Value

0

Remarks

Specifies the TLS mode to use.

smDefault0
smNoTLS1Do not use TLS
smExplicitTLS2Connect to the server without any encryption and then request an SSL session.
smImplicitTLS3Connect to the specified port, and establish the SSL session at once.
smMixedTLS4Connect to the specified port, and establish the SSL session at once, but allow plain data.

Data Type

Integer

TLSUseExtendedMasterSecret Property (SecureBlackbox_KMIPServer Class)

Enables the Extended Master Secret Extension, as defined in RFC 7627.

Object Oriented Interface


public function getTLSUseExtendedMasterSecret();


public function setTLSUseExtendedMasterSecret($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 253 );


secureblackbox_kmipserver_set($res, 253, $value );

Default Value

false

Remarks

Enables the Extended Master Secret Extension, as defined in RFC 7627.

Data Type

Boolean

TLSUseSessionResumption Property (SecureBlackbox_KMIPServer Class)

Enables or disables the TLS session resumption capability.

Object Oriented Interface


public function getTLSUseSessionResumption();


public function setTLSUseSessionResumption($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 254 );


secureblackbox_kmipserver_set($res, 254, $value );

Default Value

false

Remarks

Enables or disables the TLS session resumption capability.

Data Type

Boolean

TLSVersions Property (SecureBlackbox_KMIPServer Class)

The SSL/TLS versions to enable by default.

Object Oriented Interface


public function getTLSVersions();


public function setTLSVersions($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 255 );


secureblackbox_kmipserver_set($res, 255, $value );

Default Value

16

Remarks

The SSL/TLS versions to enable by default.

csbSSL20x01SSL 2

csbSSL30x02SSL 3

csbTLS10x04TLS 1.0

csbTLS110x08TLS 1.1

csbTLS120x10TLS 1.2

csbTLS130x20TLS 1.3

Data Type

Integer

UseChunkedTransfer Property (SecureBlackbox_KMIPServer Class)

Enables chunked transfer.

Object Oriented Interface


public function getUseChunkedTransfer();


public function setUseChunkedTransfer($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 256 );


secureblackbox_kmipserver_set($res, 256, $value );

Default Value

false

Remarks

Use this property to enable chunked content encoding.

Data Type

Boolean

UseCompression Property (SecureBlackbox_KMIPServer Class)

Enables or disables server-side compression.

Object Oriented Interface


public function getUseCompression();


public function setUseCompression($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 257 );


secureblackbox_kmipserver_set($res, 257, $value );

Default Value

false

Remarks

Use this property to enable or disable server-side content compression.

Data Type

Boolean

UseHTTP Property (SecureBlackbox_KMIPServer Class)

ToDo.

Object Oriented Interface


public function getUseHTTP();


public function setUseHTTP($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 258 );


secureblackbox_kmipserver_set($res, 258, $value );

Default Value

false

Remarks

ToDo

This property is not available at design time.

Data Type

Boolean

UserCount Property (SecureBlackbox_KMIPServer Class)

The number of records in the User arrays.

Object Oriented Interface


public function getUserCount();


public function setUserCount($value);

Procedural Interface


secureblackbox_kmipserver_get($res, 259 );


secureblackbox_kmipserver_set($res, 259, $value );

Default Value

0

Remarks

This property controls the size of the following arrays:

The array indices start at 0 and end at UserCount - 1.

This property is not available at design time.

Data Type

Integer

UserAssociatedData Property (SecureBlackbox_KMIPServer Class)

Contains the user's Associated Data when SSH AEAD (Authenticated Encryption with Associated Data) algorithm is used.

Object Oriented Interface


public function getUserAssociatedData($userindex);


public function setUserAssociatedData($userindex, $value);

Procedural Interface


secureblackbox_kmipserver_get($res, 260 , $userindex);


secureblackbox_kmipserver_set($res, 260, $value , $userindex);

Remarks

Contains the user's Associated Data when SSH AEAD (Authenticated Encryption with Associated Data) algorithm is used.

The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.

This property is not available at design time.

Data Type

Byte Array

UserBasePath Property (SecureBlackbox_KMIPServer Class)

Base path for this user in the server's file system.

Object Oriented Interface


public function getUserBasePath($userindex);


public function setUserBasePath($userindex, $value);

Procedural Interface


secureblackbox_kmipserver_get($res, 261 , $userindex);


secureblackbox_kmipserver_set($res, 261, $value , $userindex);

Default Value

''

Remarks

Base path for this user in the server's file system.

The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.

This property is not available at design time.

Data Type

String

UserCertificate Property (SecureBlackbox_KMIPServer Class)

Contains the user's certificate.

Object Oriented Interface


public function getUserCertificate($userindex);


public function setUserCertificate($userindex, $value);

Procedural Interface


secureblackbox_kmipserver_get($res, 262 , $userindex);


secureblackbox_kmipserver_set($res, 262, $value , $userindex);

Remarks

Contains the user's certificate.

The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.

This property is not available at design time.

Data Type

Byte Array

UserData Property (SecureBlackbox_KMIPServer Class)

Contains uninterpreted user-defined data that should be associated with the user account, such as comments or custom settings.

Object Oriented Interface


public function getUserData($userindex);


public function setUserData($userindex, $value);

Procedural Interface


secureblackbox_kmipserver_get($res, 263 , $userindex);


secureblackbox_kmipserver_set($res, 263, $value , $userindex);

Default Value

''

Remarks

Contains uninterpreted user-defined data that should be associated with the user account, such as comments or custom settings.

The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.

This property is not available at design time.

Data Type

String

UserEmail Property (SecureBlackbox_KMIPServer Class)

The user's email address.

Object Oriented Interface


public function getUserEmail($userindex);


public function setUserEmail($userindex, $value);

Procedural Interface


secureblackbox_kmipserver_get($res, 264 , $userindex);


secureblackbox_kmipserver_set($res, 264, $value , $userindex);

Default Value

''

Remarks

The user's email address.

The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.

This property is not available at design time.

Data Type

String

UserHandle Property (SecureBlackbox_KMIPServer Class)

Allows to get or set a 'handle', a unique identifier of the underlying property object.

Object Oriented Interface


public function getUserHandle($userindex);


public function setUserHandle($userindex, $value);

Procedural Interface


secureblackbox_kmipserver_get($res, 265 , $userindex);


secureblackbox_kmipserver_set($res, 265, $value , $userindex);

Default Value

0

Remarks

Allows to get or set a 'handle', a unique identifier of the underlying property object. Use this property to assign objects of the same type in a quicker manner, without copying them fieldwise.

When you pass a handle of one object to another, the source object is copied to the destination rather than assigned. It is safe to get rid of the original object after such operation. pdfSigner.setSigningCertHandle(certMgr.getCertHandle());

The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.

This property is not available at design time.

Data Type

Long64

UserHashAlgorithm Property (SecureBlackbox_KMIPServer Class)

Specifies the hash algorithm used to generate TOTP (Time-based One-Time Passwords) passwords for this user.

Object Oriented Interface


public function getUserHashAlgorithm($userindex);


public function setUserHashAlgorithm($userindex, $value);

Procedural Interface


secureblackbox_kmipserver_get($res, 266 , $userindex);


secureblackbox_kmipserver_set($res, 266, $value , $userindex);

Default Value

''

Remarks

Specifies the hash algorithm used to generate TOTP (Time-based One-Time Passwords) passwords for this user. Three HMAC algorithms are supported, with SHA-1, SHA-256, and SHA-512 digests:

SB_MAC_ALGORITHM_HMAC_SHA1SHA1
SB_MAC_ALGORITHM_HMAC_SHA256SHA256
SB_MAC_ALGORITHM_HMAC_SHA512SHA512

The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.

This property is not available at design time.

Data Type

String

UserIncomingSpeedLimit Property (SecureBlackbox_KMIPServer Class)

Specifies the incoming speed limit for this user.

Object Oriented Interface


public function getUserIncomingSpeedLimit($userindex);


public function setUserIncomingSpeedLimit($userindex, $value);

Procedural Interface


secureblackbox_kmipserver_get($res, 267 , $userindex);


secureblackbox_kmipserver_set($res, 267, $value , $userindex);

Default Value

0

Remarks

Specifies the incoming speed limit for this user. The value of 0 (zero) means "no limitation".

The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.

This property is not available at design time.

Data Type

Integer

UserOtpAlgorithm Property (SecureBlackbox_KMIPServer Class)

The algorithm used to generate one-time passwords (OTP) for this user, either HOTP (Hash-based OTP) or TOTP (Time-based OTP).

Object Oriented Interface


public function getUserOtpAlgorithm($userindex);


public function setUserOtpAlgorithm($userindex, $value);

Procedural Interface


secureblackbox_kmipserver_get($res, 268 , $userindex);


secureblackbox_kmipserver_set($res, 268, $value , $userindex);

Default Value

0

Remarks

The algorithm used to generate one-time passwords (OTP) for this user, either HOTP (Hash-based OTP) or TOTP (Time-based OTP). In the former case, a value of a dedicated counter is used to generate a unique password, while in the latter the password is generated on the basis of the current time value.

oaHmac0
oaTime1

The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.

This property is not available at design time.

Data Type

Integer

UserOTPLen Property (SecureBlackbox_KMIPServer Class)

Specifies the length of the user's OTP password.

Object Oriented Interface


public function getUserOTPLen($userindex);


public function setUserOTPLen($userindex, $value);

Procedural Interface


secureblackbox_kmipserver_get($res, 269 , $userindex);


secureblackbox_kmipserver_set($res, 269, $value , $userindex);

Default Value

0

Remarks

Specifies the length of the user's OTP password.

The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.

This property is not available at design time.

Data Type

Integer

UserOtpValue Property (SecureBlackbox_KMIPServer Class)

The user's time interval (TOTP) or Counter (HOTP).

Object Oriented Interface


public function getUserOtpValue($userindex);


public function setUserOtpValue($userindex, $value);

Procedural Interface


secureblackbox_kmipserver_get($res, 270 , $userindex);


secureblackbox_kmipserver_set($res, 270, $value , $userindex);

Default Value

0

Remarks

The user's time interval (TOTP) or Counter (HOTP).

The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.

This property is not available at design time.

Data Type

Integer

UserOutgoingSpeedLimit Property (SecureBlackbox_KMIPServer Class)

Specifies the outgoing speed limit for this user.

Object Oriented Interface


public function getUserOutgoingSpeedLimit($userindex);


public function setUserOutgoingSpeedLimit($userindex, $value);

Procedural Interface


secureblackbox_kmipserver_get($res, 271 , $userindex);


secureblackbox_kmipserver_set($res, 271, $value , $userindex);

Default Value

0

Remarks

Specifies the outgoing speed limit for this user. The value of 0 (zero) means "no limitation".

The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.

This property is not available at design time.

Data Type

Integer

UserPassword Property (SecureBlackbox_KMIPServer Class)

The user's authentication password.

Object Oriented Interface


public function getUserPassword($userindex);


public function setUserPassword($userindex, $value);

Procedural Interface


secureblackbox_kmipserver_get($res, 272 , $userindex);


secureblackbox_kmipserver_set($res, 272, $value , $userindex);

Default Value

''

Remarks

The user's authentication password.

The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.

This property is not available at design time.

Data Type

String

UserSharedSecret Property (SecureBlackbox_KMIPServer Class)

Contains the user's secret key, which is essentially a shared secret between the client and server.

Object Oriented Interface


public function getUserSharedSecret($userindex);


public function setUserSharedSecret($userindex, $value);

Procedural Interface


secureblackbox_kmipserver_get($res, 273 , $userindex);


secureblackbox_kmipserver_set($res, 273, $value , $userindex);

Remarks

Contains the user's secret key, which is essentially a shared secret between the client and server.

Shared secrets can be used in TLS-driven protocols, as well as in OTP (where it is called a 'key secret') for generating one-time passwords on one side, and validate them on the other.

The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.

This property is not available at design time.

Data Type

Byte Array

UserSSHKey Property (SecureBlackbox_KMIPServer Class)

Contains the user's SSH key.

Object Oriented Interface


public function getUserSSHKey($userindex);


public function setUserSSHKey($userindex, $value);

Procedural Interface


secureblackbox_kmipserver_get($res, 274 , $userindex);


secureblackbox_kmipserver_set($res, 274, $value , $userindex);

Remarks

Contains the user's SSH key.

The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.

This property is not available at design time.

Data Type

Byte Array

UserUsername Property (SecureBlackbox_KMIPServer Class)

The registered name (login) of the user.

Object Oriented Interface


public function getUserUsername($userindex);


public function setUserUsername($userindex, $value);

Procedural Interface


secureblackbox_kmipserver_get($res, 275 , $userindex);


secureblackbox_kmipserver_set($res, 275, $value , $userindex);

Default Value

''

Remarks

The registered name (login) of the user.

The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.

This property is not available at design time.

Data Type

String

Config Method (SecureBlackbox_KMIPServer Class)

This method sets or retrieves a configuration setting.

Object Oriented Interface

public function doConfig($configurationstring);

Procedural Interface

secureblackbox_kmipserver_do_config($res, $configurationstring);

Remarks

Config is a generic method available in every class. It is used to set and retrieve configuration settings for the class.

These settings are similar in functionality to properties, but they are rarely used. In order to avoid "polluting" the property namespace of the class, access to these internal properties is provided through the Config method.

To set a configuration setting named PROPERTY, you must call Config("PROPERTY=VALUE"), where VALUE is the value of the setting expressed as a string. For boolean values, use the strings "True", "False", "0", "1", "Yes", or "No" (case does not matter).

To read (query) the value of a configuration setting, you must call Config("PROPERTY"). The value will be returned as a string.

DoAction Method (SecureBlackbox_KMIPServer Class)

Performs an additional action.

Object Oriented Interface

public function doDoAction($actionid, $actionparams);

Procedural Interface

secureblackbox_kmipserver_do_doaction($res, $actionid, $actionparams);

Remarks

DoAction is a generic method available in every class. It is used to perform an additional action introduced after the product major release. The list of actions is not fixed, and may be flexibly extended over time.

The unique identifier (case insensitive) of the action is provided in the ActionID parameter.

ActionParams contains the value of a single parameter, or a list of multiple parameters for the action in the form of PARAM1=VALUE1;PARAM2=VALUE2;....

DropClient Method (SecureBlackbox_KMIPServer Class)

Terminates a client connection.

Object Oriented Interface

public function doDropClient($connectionid, $forced);

Procedural Interface

secureblackbox_kmipserver_do_dropclient($res, $connectionid, $forced);

Remarks

Call this method to shut down a connected client. Forced indicates whether the connection should be closed in a graceful manner.

GetClientCert Method (SecureBlackbox_KMIPServer Class)

Populates the per-connection certificate object.

Object Oriented Interface

public function doGetClientCert($connectionid);

Procedural Interface

secureblackbox_kmipserver_do_getclientcert($res, $connectionid);

Remarks

This method populates the certificate template/object received with the certificate generation request in Certificate property.

Call this method from your BeforeGenerate event handler to populate the certificate template, as received in the request. It is still not late to alter the details of the certificate on this stage.

Call it from your AfterGenerate event handler to populate the certificate that has been generated.

GetClientKey Method (SecureBlackbox_KMIPServer Class)

Populates the per-connection key object.

Object Oriented Interface

public function doGetClientKey($connectionid);

Procedural Interface

secureblackbox_kmipserver_do_getclientkey($res, $connectionid);

Remarks

This method populates the key template/object received with the key generation request in Key property.

Call this method from your BeforeGenerateKey event handler to populate the key template, as received in the request. It is still not late to alter the details of the key on this stage.

Call it from your AfterGenerateKey event handler to populate the key that has been generated.

GetRequestHeader Method (SecureBlackbox_KMIPServer Class)

Returns a request header value.

Object Oriented Interface

public function doGetRequestHeader($connectionid, $headername);

Procedural Interface

secureblackbox_kmipserver_do_getrequestheader($res, $connectionid, $headername);

Remarks

Use this method to get the value of a request header. A good place to call this method is a request-marking event, such as GetRequest or PostRequest.

GetResponseHeader Method (SecureBlackbox_KMIPServer Class)

Returns a response header value.

Object Oriented Interface

public function doGetResponseHeader($connectionid, $headername);

Procedural Interface

secureblackbox_kmipserver_do_getresponseheader($res, $connectionid, $headername);

Remarks

Use this method to get the value of a response header. A good place to call this method is HeadersPrepared event. Call the method with empty HeaderName to get the whole response header.

ListClients Method (SecureBlackbox_KMIPServer Class)

Enumerates the connected clients.

Object Oriented Interface

public function doListClients();

Procedural Interface

secureblackbox_kmipserver_do_listclients($res);

Remarks

This method enumerates the connected clients. It returns a list of strings, with each string being of 'ConnectionID|Address|Port' format, and representing a single connection.

PinClient Method (SecureBlackbox_KMIPServer Class)

Takes a snapshot of the connection's properties.

Object Oriented Interface

public function doPinClient($connectionid);

Procedural Interface

secureblackbox_kmipserver_do_pinclient($res, $connectionid);

Remarks

Use this method to take a snapshot of a connected client. The captured properties are populated in PinnedClient and PinnedClientChain properties.

ProcessGenericRequest Method (SecureBlackbox_KMIPServer Class)

Processes a generic HTTP request.

Object Oriented Interface

public function doProcessGenericRequest($connectionid, $requestbytes);

Procedural Interface

secureblackbox_kmipserver_do_processgenericrequest($res, $connectionid, $requestbytes);

Remarks

This method processes a generic HTTP request and produces a response. Use it to generate HTTP responses for requests obtained externally, out of the default HTTP channel.

This method respects all current settings of the server object, and invokes the corresponding events to consult about the request and response details with the application. ConnectionId allows to identify the request in the events.

The method returns the complete HTTP response including HTTP headers.

Reset Method (SecureBlackbox_KMIPServer Class)

Resets the class settings.

Object Oriented Interface

public function doReset();

Procedural Interface

secureblackbox_kmipserver_do_reset($res);

Remarks

Reset is a generic method available in every class.

SetClientBytes Method (SecureBlackbox_KMIPServer Class)

Commits a data buffer to the connection.

Object Oriented Interface

public function doSetClientBytes($connectionid, $value);

Procedural Interface

secureblackbox_kmipserver_do_setclientbytes($res, $connectionid, $value);

Remarks

Use this method from your Response Encrypt AfterEncrypt Decrypt AfterDecrypt Sign AfterSign events handler to commit a new data to the server component.

SetClientCert Method (SecureBlackbox_KMIPServer Class)

Commits the per-connection certificate object to the connection context.

Object Oriented Interface

public function doSetClientCert($connectionid);

Procedural Interface

secureblackbox_kmipserver_do_setclientcert($res, $connectionid);

Remarks

This method commits the certificate object stored in Certificate to the connection context.

SetClientKey Method (SecureBlackbox_KMIPServer Class)

Commits the per-connection key object to the connection context.

Object Oriented Interface

public function doSetClientKey($connectionid);

Procedural Interface

secureblackbox_kmipserver_do_setclientkey($res, $connectionid);

Remarks

This method commits the key object stored in Key to the connection context.

SetResponseHeader Method (SecureBlackbox_KMIPServer Class)

Sets a response header.

Object Oriented Interface

public function doSetResponseHeader($connectionid, $headername, $value);

Procedural Interface

secureblackbox_kmipserver_do_setresponseheader($res, $connectionid, $headername, $value);

Remarks

Use this method to set a response header. A good place to call this method is a request-marking event, such as GetRequest or PostRequest.

Start Method (SecureBlackbox_KMIPServer Class)

Start the KMIP server.

Object Oriented Interface

public function doStart();

Procedural Interface

secureblackbox_kmipserver_do_start($res);

Remarks

Call this method to activate the KMIP server and start listening to incoming connections.

Stop Method (SecureBlackbox_KMIPServer Class)

Stops the KMIP server.

Object Oriented Interface

public function doStop();

Procedural Interface

secureblackbox_kmipserver_do_stop($res);

Remarks

Call this method to stop the KMIP server.

Accept Event (SecureBlackbox_KMIPServer Class)

Reports an incoming connection.

Object Oriented Interface

public function fireAccept($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 1, array($this, 'fireAccept'));

Parameter List

 'remoteaddress'
'remoteport'
'accept'

Remarks

This event is fired when a new connection from RemoteAddress:RemotePort is ready to be accepted. Use the Accept parameter to accept or decline it.

Subscribe to Connect event to be notified of every connection that has been set up.

ActivateObject Event (SecureBlackbox_KMIPServer Class)

Notifies the application about the object activation request.

Object Oriented Interface

public function fireActivateObject($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 2, array($this, 'fireActivateObject'));

Parameter List

 'connectionid'
'objectid'
'operationstatus'

Remarks

Subscribe to this event to get notified about object activation requests. The ObjectId parameter contain the unique identifier of the object being activated.

Object activation requests are handled in a simplified way, without using the three-step virtualization approach.

Add Event (SecureBlackbox_KMIPServer Class)

Passes the certificate import request to the application.

Object Oriented Interface

public function fireAdd($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 3, array($this, 'fireAdd'));

Parameter List

 'connectionid'
'group'
'certid'
'operationstatus'

Remarks

The server uses this event to allow the application to customize a certificate import request. This request fires after BeforeAdd if the Action parameter passed back to it was set to fraCustom.

The Group parameter indicates the shared name for the certificate elements (public key, private key, certificate). The CertId provides a unique identifier for the certificate object. Both can be adjusted by the application as required. Use the Certificate object to access the certificate parameters.

Upon completion of the processing, set the value of OperationStatus to match the result of the operation.

AddKey Event (SecureBlackbox_KMIPServer Class)

Expects the application to handle the key import request.

Object Oriented Interface

public function fireAddKey($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 4, array($this, 'fireAddKey'));

Parameter List

 'connectionid'
'group'
'keyid'
'operationstatus'

Remarks

Application uses this event to wiretap into the key import procedure. For this event to be invoked, the fraCustom action needs to be previously returned from the BeforeAddKey event.

The handler of this event should process the key data provided via the Key property, typically by storing the key object in a local database. The handler also should set the KeyId and, optionally, Group parameters to match the properties of the new key object. The result of the operation should be returned via the OperationStatus parameter.

See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

AfterAdd Event (SecureBlackbox_KMIPServer Class)

Notifies the application about completion of the certificate import operation.

Object Oriented Interface

public function fireAfterAdd($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 5, array($this, 'fireAfterAdd'));

Parameter List

 'connectionid'
'group'
'certid'
'operationstatus'

Remarks

The class fires this event upon completion of certificate import routine. The certificate object that has been generated can be read from the Certificate property.

The Group and CertId parameters contain the name of the group and the unique identifier assigned to the new certificate. The OperationStatus parameter contains the result of the operation. The application can adjust them as required.

AfterAddKey Event (SecureBlackbox_KMIPServer Class)

Reports the completion of the key import procedure.

Object Oriented Interface

public function fireAfterAddKey($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 6, array($this, 'fireAfterAddKey'));

Parameter List

 'connectionid'
'group'
'keyid'
'operationstatus'

Remarks

The component uses the AfterAddKey event to notify the application about completion of the key import processing. The OperationStatus parameter returns the operation result. The KeyId and Group parameters are set to match the properties of the newly created key. The application can change them if required.

This event fires both for "normal" and "virtualized" requests, independently of the value of the Action parameter returned from the BeforeAddKey event. See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

AfterBrowse Event (SecureBlackbox_KMIPServer Class)

KMIP server uses this event to notify the application about the completion of the browsing (attribute request) operation.

Object Oriented Interface

public function fireAfterBrowse($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 7, array($this, 'fireAfterBrowse'));

Parameter List

 'connectionid'
'objectid'
'operationstatus'

Remarks

The ConnectionID parameter identifies the client connection, and the ObjectId parameter specifies the unique ID of the object the attributes of which are being requested.

This event follows the three-step virtualization approach, and fires after the preceding BeforeBrowse and ReadAttribute events.

Check the operation status, and alter it, if needed, through the OperationStatus parameter:

ostOk1
ostNoSuchFile2
ostAccessDenied3
ostWriteProtect4
ostUnsupported5
ostInvalidParameter6
ostEOF7

See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

AfterDecrypt Event (SecureBlackbox_KMIPServer Class)

Notifies the application about completion of the decryption call.

Object Oriented Interface

public function fireAfterDecrypt($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 8, array($this, 'fireAfterDecrypt'));

Parameter List

 'connectionid'
'objectid'
'decrypteddata'
'correlationvalue'
'operationstatus'

Remarks

The component uses this event to notify the application about completion of the decrypt request. The event parameters provide the details of the decryption operation. This event fires independently of whether the build-in or virtualized decryption is used.

The ObjectId parameter contains the unique identifier of the decryption key. DecryptedData contains the decryption result. The CorrelationValue string is a linking token that allows to associate several pieces of a multi-step decryption operation together. The OperationStatus contains the result of the operation.

See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

AfterDeriveKey Event (SecureBlackbox_KMIPServer Class)

Notifies the application about completion of the key derivation request.

Object Oriented Interface

public function fireAfterDeriveKey($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 9, array($this, 'fireAfterDeriveKey'));

Parameter List

 'connectionid'
'newkeyid'
'operationstatus'

Remarks

Use this event to get notified about completion of key derivation requests. The OperationStatus parameter specifies the result of the key derivation operation. The NewKeyId contains the unique identifier of the new key. You can change both parameters if required.

See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

AfterEdit Event (SecureBlackbox_KMIPServer Class)

Notifies the application of completion of the object editing operation.

Object Oriented Interface

public function fireAfterEdit($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 10, array($this, 'fireAfterEdit'));

Parameter List

 'connectionid'
'objectid'
'operationstatus'

Remarks

The component fires this event to notify the application about completion of an edit operation. An edit operation consists of a number of individual attribute update requests.

The ObjectId parameter contains the unique identifier of the object that was edited. Use the OperationStatus parameter to check or update the result of the operation.

AfterEncrypt Event (SecureBlackbox_KMIPServer Class)

Notifies the application about the completion of the encryption call.

Object Oriented Interface

public function fireAfterEncrypt($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 11, array($this, 'fireAfterEncrypt'));

Parameter List

 'connectionid'
'objectid'
'encrypteddata'
'correlationvalue'
'operationstatus'

Remarks

The component uses this event to notify the application about completion of the encrypt request. The event parameters provide the details of the encryption operation. This event fires independently of whether the build-in or virtualized decryption is used.

The ObjectId parameter contains the unique identifier of the encryption key. EncryptedData contains the encryption result. The CorrelationValue string is a linking token that allows to associate several pieces of a multi-step encryption operation together. The OperationStatus contains the result of the operation.

See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

AfterGenerate Event (SecureBlackbox_KMIPServer Class)

Signifies completion of certificate generation.

Object Oriented Interface

public function fireAfterGenerate($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 12, array($this, 'fireAfterGenerate'));

Parameter List

 'connectionid'
'certid'
'operationstatus'

Remarks

The class fires this event upon completion of certificate generation routine. The generated certificate can be read from Certificate.

AfterGenerateKey Event (SecureBlackbox_KMIPServer Class)

Notifies the application of the completion of key generation procedure.

Object Oriented Interface

public function fireAfterGenerateKey($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 13, array($this, 'fireAfterGenerateKey'));

Parameter List

 'connectionid'
'keyid'
'operationstatus'

Remarks

The component uses this event to notify the application about the completion of the key generation procedure. The KeyId parameter contains the ID of the new key object (and can be changed by the user code if required). The OperationStatus parameter reports the result of the operation.

This event is the third and conclusive in the sequence of BeforeGenerateKey, GenerateKey, and the AfterGenerateKey events. See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

AfterGenerateKeyPair Event (SecureBlackbox_KMIPServer Class)

Notifies the application of the completion of keypair generation.

Object Oriented Interface

public function fireAfterGenerateKeyPair($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 14, array($this, 'fireAfterGenerateKeyPair'));

Parameter List

 'connectionid'
'privatekeyid'
'publickeyid'
'operationstatus'

Remarks

The component uses this event to notify the application about the completion of the keypair generation operation. The PrivateKeyId and PublicKeyId parameters contain the IDs of the new private and public keys respectively. The OperationStatus parameter returns the result of the operation.

See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

AfterHash Event (SecureBlackbox_KMIPServer Class)

Notifies the application about completion of the hashing call.

Object Oriented Interface

public function fireAfterHash($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 15, array($this, 'fireAfterHash'));

Parameter List

 'connectionid'
'objectid'
'hashdata'
'correlationvalue'
'operationstatus'

Remarks

Subscribe to this event to be notified about completion of the hashing request processing. The DataHash parameter contains the hash that has been calculated. The OperationStatus parameter contains the operation result. If the hashing operation was a MAC (keyed) operation, the ID of the key is passed to the ObjectId parameter.

See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

AfterList Event (SecureBlackbox_KMIPServer Class)

Notifies the application about completion of the list command.

Object Oriented Interface

public function fireAfterList($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 16, array($this, 'fireAfterList'));

Parameter List

 'connectionid'
'objecttype'
'objectstatus'
'onlyfreshobjects'
'objectids'
'operationstatus'

Remarks

The component uses this event to notify the application about the completion of the list command. The ObjectType, ObjectStatus, and OnlyFreshObjects contain the listing criteria. The ObjectIds contains a list of object unique identifiers, separated by newlines.

See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

AfterObtainLease Event (SecureBlackbox_KMIPServer Class)

Reports the completion of lease allocation operation.

Object Oriented Interface

public function fireAfterObtainLease($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 17, array($this, 'fireAfterObtainLease'));

Parameter List

 'connectionid'
'objectid'
'leasetime'
'lastchangedate'
'operationstatus'

Remarks

The component uses this event to notify the application about the completion of lease allocation operation. The ObjectId parameter specifies the identifier of the object a lease for each is allocated. The LeaseTime and LastChangeDate parameters specify parameters of the lease.

See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

AfterReadObject Event (SecureBlackbox_KMIPServer Class)

Notifies the application of the completion of the read operation on the object.

Object Oriented Interface

public function fireAfterReadObject($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 18, array($this, 'fireAfterReadObject'));

Parameter List

 'connectionid'
'objectid'
'objecttype'
'operationstatus'

Remarks

Use this event to be notified about completion of the read operation.

See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

AfterReCertify Event (SecureBlackbox_KMIPServer Class)

ToDo.

Object Oriented Interface

public function fireAfterReCertify($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 19, array($this, 'fireAfterReCertify'));

Parameter List

 'connectionid'
'newcertid'
'operationstatus'

Remarks

ToDo

AfterReKey Event (SecureBlackbox_KMIPServer Class)

ToDo.

Object Oriented Interface

public function fireAfterReKey($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 20, array($this, 'fireAfterReKey'));

Parameter List

 'connectionid'
'newkeyid'
'operationstatus'

Remarks

ToDo

AfterRekeyKeyPair Event (SecureBlackbox_KMIPServer Class)

ToDo.

Object Oriented Interface

public function fireAfterRekeyKeyPair($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 21, array($this, 'fireAfterRekeyKeyPair'));

Parameter List

 'connectionid'
'newprivatekeyid'
'newpublickeyid'
'operationstatus'

Remarks

ToDo

AfterRemoveObject Event (SecureBlackbox_KMIPServer Class)

Notifies the application about completion of the object removal request.

Object Oriented Interface

public function fireAfterRemoveObject($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 22, array($this, 'fireAfterRemoveObject'));

Parameter List

 'connectionid'
'objectid'
'operationstatus'

Remarks

Subscribe to this event to be notified about completion of an object removal request. The OperationStatus parameter contains the result of the operation.

See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

AfterSign Event (SecureBlackbox_KMIPServer Class)

Notifies the application of completion of a signing operation.

Object Oriented Interface

public function fireAfterSign($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 23, array($this, 'fireAfterSign'));

Parameter List

 'connectionid'
'objectid'
'inputishash'
'signaturedata'
'correlationvalue'
'operationstatus'

Remarks

The component uses this event to notify the application about the completion of a signing operation.

The ObjectId parameter contains the unique identifier of the signing key. SignatureData contains the signing result. The CorrelationValue string is a linking token that allows to associate several pieces of a multi-step signing operation together. The OperationStatus contains the result of the operation.

See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

AfterVerify Event (SecureBlackbox_KMIPServer Class)

Notifies the application about completion of the Verify operation.

Object Oriented Interface

public function fireAfterVerify($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 24, array($this, 'fireAfterVerify'));

Parameter List

 'connectionid'
'objectid'
'inputishash'
'validationresult'
'correlationvalue'
'operationstatus'

Remarks

The component fires this event to notify the application of a completion of a verification operation. The ValidationResult parameter contains the validity status of the signature.

The ObjectId parameter contains the unique identifier of the verifying key. The OperationStatus parameter contains the result of the operation.

See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

AfterVerifyHash Event (SecureBlackbox_KMIPServer Class)

Notifies the application about completion of the hash verification.

Object Oriented Interface

public function fireAfterVerifyHash($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 25, array($this, 'fireAfterVerifyHash'));

Parameter List

 'connectionid'
'objectid'
'isvalid'
'correlationvalue'
'operationstatus'

Remarks

The component uses this event to notify the application about hash verification result. The optional ObjectId parameter contains the unique identifier of the key object if HMAC algorithm is used.

The IsValid parameter contains the validity factor of the hash.

See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

ArchiveObject Event (SecureBlackbox_KMIPServer Class)

Notifies the application about the received object archival request.

Object Oriented Interface

public function fireArchiveObject($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 26, array($this, 'fireArchiveObject'));

Parameter List

 'connectionid'
'objectid'
'operationstatus'

Remarks

The component fires this event when it receives an object archival request from a connected client. The archival procedure go through a simplified handling route, without the three-step flow.

AuthAttempt Event (SecureBlackbox_KMIPServer Class)

Fires when a connected client makes an authentication attempt.

Object Oriented Interface

public function fireAuthAttempt($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 27, array($this, 'fireAuthAttempt'));

Parameter List

 'connectionid'
'httpmethod'
'uri'
'authmethod'
'username'
'password'
'allow'

Remarks

The class fires this event whenever a client attempts to authenticate itself. Use the Allow parameter to let the client through.

ConnectionID contains the unique session identifier for that client, HTTPMethod specifies the HTTP method (GET, POST, etc.) used to access the URI resource, AuthMethod specifies the authentication method, and Username and Password contain the professed credentials.

BeforeAdd Event (SecureBlackbox_KMIPServer Class)

Fires when a certificate import request is received from a client.

Object Oriented Interface

public function fireBeforeAdd($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 28, array($this, 'fireBeforeAdd'));

Parameter List

 'connectionid'
'group'
'action'

Remarks

The class fires this event when it receives a request from the client to import a certificate on to the server. The supplied certificate is available in Certificate object.

The Group parameter specifies a common identifier for objects related to the certificate being imported: the certificate, its public key, and its private key.

BeforeAddKey Event (SecureBlackbox_KMIPServer Class)

Fires when a key import request is received from the client.

Object Oriented Interface

public function fireBeforeAddKey($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 29, array($this, 'fireBeforeAddKey'));

Parameter List

 'connectionid'
'group'
'action'

Remarks

The class fires this event when it receives a request from the client to import a key on to the server. The supplied key is available in the Key parameter.

For keypairs, the Group parameter contains a common label that will be applied to both parts of that keypair (the public key object and the private key object).

BeforeBrowse Event (SecureBlackbox_KMIPServer Class)

Notifies the application about the browse request being received.

Object Oriented Interface

public function fireBeforeBrowse($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 30, array($this, 'fireBeforeBrowse'));

Parameter List

 'connectionid'
'objectid'
'action'

Remarks

The component uses this event to notify the application about a browse request received for an object ObjectId.

BeforeDecrypt Event (SecureBlackbox_KMIPServer Class)

Notifies the application about the initiation of the decryption operation.

Object Oriented Interface

public function fireBeforeDecrypt($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 31, array($this, 'fireBeforeDecrypt'));

Parameter List

 'connectionid'
'objectid'
'correlationvalue'
'action'

Remarks

The component fires this event to notify the application about the initiation of the decryption operation. The ObjectId parameter contains a reference to the decryption key. The optional CorrelationValue parameter can be used to link consecutive steps of multi-part decryption operation together.

Use the Action parameter to indicate the procedure you want to use for this request. See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

BeforeDeriveKey Event (SecureBlackbox_KMIPServer Class)

Fires when a derive key request is received.

Object Oriented Interface

public function fireBeforeDeriveKey($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 32, array($this, 'fireBeforeDeriveKey'));

Parameter List

 'connectionid'
'objecttype'
'objectids'
'derivationmethod'
'action'

Remarks

The class fires this event when it receives a request from the client to derive a key. The supplied certificate is available in Key.

BeforeEdit Event (SecureBlackbox_KMIPServer Class)

Notifies the application about the start of the object editing operation.

Object Oriented Interface

public function fireBeforeEdit($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 33, array($this, 'fireBeforeEdit'));

Parameter List

 'connectionid'
'objectid'
'action'

Remarks

The editing operation consists of a sequence of attribute update requests. Each attribute is provided to the application via an individual SetAttribute call. When the list of supplied attributes has been exhausted, the AfterEdit event call follows.

The ObjectId parameter specifies the identifier of the object being edited.

BeforeEncrypt Event (SecureBlackbox_KMIPServer Class)

Notifies the application about the initiation of an encryption operation.

Object Oriented Interface

public function fireBeforeEncrypt($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 34, array($this, 'fireBeforeEncrypt'));

Parameter List

 'connectionid'
'objectid'
'correlationvalue'
'action'

Remarks

The component fires this event to notify the application about the initiation of an encryption operation. The ObjectId parameter contains a reference to the encryption key. The optional CorrelationValue parameter can be used to link consecutive steps of multi-part encryption operation together.

Use the Action parameter to indicate the procedure you want to use for this request. See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

BeforeGenerate Event (SecureBlackbox_KMIPServer Class)

Fires when a certificate generation request is received.

Object Oriented Interface

public function fireBeforeGenerate($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 35, array($this, 'fireBeforeGenerate'));

Parameter List

 'connectionid'
'publickeyid'
'action'

Remarks

The class fires this event when it receives a request from the client to generate a certificate. The supplied certificate template is available in Certificate.

BeforeGenerateKey Event (SecureBlackbox_KMIPServer Class)

Fires when a key generation request is received.

Object Oriented Interface

public function fireBeforeGenerateKey($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 36, array($this, 'fireBeforeGenerateKey'));

Parameter List

 'connectionid'
'keyalgorithm'
'keylength'
'action'

Remarks

The class fires this event when it receives a request from the client to generate a key. KeyAlgorithm and KeyLength parameters specify the requested key properties.

BeforeGenerateKeyPair Event (SecureBlackbox_KMIPServer Class)

Fires when a key generation request is received.

Object Oriented Interface

public function fireBeforeGenerateKeyPair($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 37, array($this, 'fireBeforeGenerateKeyPair'));

Parameter List

 'connectionid'
'keyalgorithm'
'keylength'
'scheme'
'schemeparams'
'action'

Remarks

The class fires this event when it receives a request from the client to generate a keypair. KeyAlgorithm, KeyLength, Scheme and SchemeParams parameters specify the requested key properties.

BeforeHash Event (SecureBlackbox_KMIPServer Class)

Notifies the application about the initiation of the hashing operation.

Object Oriented Interface

public function fireBeforeHash($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 38, array($this, 'fireBeforeHash'));

Parameter List

 'connectionid'
'objectid'
'hashalgorithm'
'correlationvalue'
'action'

Remarks

The component fires this event to notify the application about the initiation of a hashing operation. The optional ObjectId parameter contains a reference to the hashing key if HMAC-based hashing is used. The optional CorrelationValue parameter can be used to link consecutive steps of multi-part hash operation together.

Use the Action parameter to indicate the procedure you want to use for this request. See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

BeforeList Event (SecureBlackbox_KMIPServer Class)

Notifies the application about the initiation of the list operation.

Object Oriented Interface

public function fireBeforeList($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 39, array($this, 'fireBeforeList'));

Parameter List

 'connectionid'
'objecttype'
'objectstatus'
'onlyfreshobjects'
'action'

Remarks

The component uses this event to notify the application of the received list call. The ObjectType, ObjectStatus, and OnlyFreshObjects parameters provide the listing criteria.

BeforeObtainLease Event (SecureBlackbox_KMIPServer Class)

Notifies the application about the client requesting an object lease.

Object Oriented Interface

public function fireBeforeObtainLease($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 40, array($this, 'fireBeforeObtainLease'));

Parameter List

 'connectionid'
'objectid'
'action'

Remarks

Use this event to get notified about the connected client requesting an object lease.

BeforeReadObject Event (SecureBlackbox_KMIPServer Class)

Notifies the application about the start of the object reading request.

Object Oriented Interface

public function fireBeforeReadObject($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 41, array($this, 'fireBeforeReadObject'));

Parameter List

 'connectionid'
'objectid'
'action'

Remarks

Object "reading" consists of a number of individual attribute requests. If fraCustom action is returned from this event handler, the component will fire ReadObject and ReadAttribute events repeatedly to request information about the object from your code.

BeforeReCertify Event (SecureBlackbox_KMIPServer Class)

Notifies the application about a re-certification request.

Object Oriented Interface

public function fireBeforeReCertify($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 42, array($this, 'fireBeforeReCertify'));

Parameter List

 'connectionid'
'oldcertid'
'action'

Remarks

The component uses this event to notify the application about a re-certification request (a request to re-issue an existing certificate).

The OldCertId parameter indicates the unique identifier of the certificate object that needs to be re-issued.

This event provides a pre-notification for the operation. If your code sets the Action parameter to fraCustom, this event will be followed by a ReCertify call that will let you handle the actual request as required.

BeforeReKey Event (SecureBlackbox_KMIPServer Class)

Notifies the application about a re-key request received.

Object Oriented Interface

public function fireBeforeReKey($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 43, array($this, 'fireBeforeReKey'));

Parameter List

 'connectionid'
'oldkeyid'
'action'

Remarks

The component uses this event to notify the application about a key re-issue request received from the client. The OldKeyId parameter contains the unique identifier of the old key object.

BeforeRekeyKeyPair Event (SecureBlackbox_KMIPServer Class)

Notifies the application about a keypair re-key request received.

Object Oriented Interface

public function fireBeforeRekeyKeyPair($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 44, array($this, 'fireBeforeRekeyKeyPair'));

Parameter List

 'connectionid'
'oldprivatekeyid'
'action'

Remarks

The component uses this event to notify the application about a keypair re-issue request received from the client. The OldPrivateKeyId parameter contains the unique identifier of the old private key object.

BeforeRemoveObject Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireBeforeRemoveObject($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 45, array($this, 'fireBeforeRemoveObject'));

Parameter List

 'connectionid'
'objectid'
'action'

Remarks

TBD

BeforeSign Event (SecureBlackbox_KMIPServer Class)

Notifies the application about the initiation of a signing operation.

Object Oriented Interface

public function fireBeforeSign($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 46, array($this, 'fireBeforeSign'));

Parameter List

 'connectionid'
'objectid'
'hashalgorithm'
'inputishash'
'correlationvalue'
'action'

Remarks

The component fires this event to notify the application about the initiation of the signing operation. The ObjectId parameter contains a reference to the signing key. The optional CorrelationValue parameter can be used to link consecutive steps of multi-part signing operation together.

Use the Action parameter to indicate the procedure you want to use for this request. See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

BeforeVerify Event (SecureBlackbox_KMIPServer Class)

Notifies the application about the initiation of the verify operation.

Object Oriented Interface

public function fireBeforeVerify($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 47, array($this, 'fireBeforeVerify'));

Parameter List

 'connectionid'
'objectid'
'hashalgorithm'
'inputishash'
'correlationvalue'
'action'

Remarks

The component fires this event to notify the application about the initiation of the verification operation. The ObjectId parameter contains a reference to the verification key.

Use the Action parameter to indicate the procedure you want to use for this request. See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

BeforeVerifyHash Event (SecureBlackbox_KMIPServer Class)

Notifies the application about the initiation of the hash verification operation.

Object Oriented Interface

public function fireBeforeVerifyHash($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 48, array($this, 'fireBeforeVerifyHash'));

Parameter List

 'connectionid'
'objectid'
'hashalgorithm'
'correlationvalue'
'action'

Remarks

The component fires this event to notify the application about the initiation of the hash verification operation. The ObjectId parameter contains a reference to the HMAC key, if MAC algorithm is used.

Use the Action parameter to indicate the procedure you want to use for this request. See the

Handling and overriding server operations using the Three-Step Virtualization

Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.

The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:

  • BeforeRenameFile
  • RenameFile
  • AfterRenameFile

The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:

  • fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
  • fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
  • fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.

The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.

If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.

The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.

To summarize:

  • If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
  • If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
  • If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
notes for more details about handling and virtualizing requests in SecureBlackbox servers.

Cancel Event (SecureBlackbox_KMIPServer Class)

Reports a cancellation request received from the client.

Object Oriented Interface

public function fireCancel($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 49, array($this, 'fireCancel'));

Parameter List

 'connectionid'
'asynccorrelationvalue'
'cancellationresult'
'operationstatus'

Remarks

The component uses this event to notify the application about the cancellation request received. TBD

Check Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireCheck($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 50, array($this, 'fireCheck'));

Parameter List

 'connectionid'
'objectid'
'usagelimitscount'
'cryptographicusagemask'
'leasetime'
'operationstatus'

Remarks

TBD

Connect Event (SecureBlackbox_KMIPServer Class)

Reports an accepted connection.

Object Oriented Interface

public function fireConnect($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 51, array($this, 'fireConnect'));

Parameter List

 'connectionid'
'remoteaddress'
'remoteport'

Remarks

The class fires this event to report that a new connection has been established. ConnectionId indicates the unique ID assigned to this connection. The same ID will be supplied to any other events related to this connection, such as GetRequest or AuthAttempt.

Decrypt Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireDecrypt($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 52, array($this, 'fireDecrypt'));

Parameter List

 'connectionid'
'objectid'
'data'
'iv'
'initindicator'
'finalindicator'
'blockciphermode'
'taglength'
'paddingmethod'
'correlationvalue'
'operationstatus'

Remarks

TBD

DeleteAttribute Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireDeleteAttribute($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 53, array($this, 'fireDeleteAttribute'));

Parameter List

 'connectionid'
'objectid'
'attributename'
'attributevalue'
'operationstatus'

Remarks

TBD

DeriveKey Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireDeriveKey($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 54, array($this, 'fireDeriveKey'));

Parameter List

 'connectionid'
'objecttype'
'objectids'
'derivationmethod'
'initializationvector'
'derivationdata'
'newkeyid'
'operationstatus'

Remarks

TBD

Disconnect Event (SecureBlackbox_KMIPServer Class)

Fires to report a disconnected client.

Object Oriented Interface

public function fireDisconnect($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 55, array($this, 'fireDisconnect'));

Parameter List

 'connectionid'

Remarks

The class fires this event when a connected client disconnects.

Encrypt Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireEncrypt($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 56, array($this, 'fireEncrypt'));

Parameter List

 'connectionid'
'objectid'
'data'
'initindicator'
'finalindicator'
'blockciphermode'
'taglength'
'paddingmethod'
'randomiv'
'iv'
'correlationvalue'
'operationstatus'

Remarks

TBD

Error Event (SecureBlackbox_KMIPServer Class)

Information about errors during data delivery.

Object Oriented Interface

public function fireError($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 57, array($this, 'fireError'));

Parameter List

 'connectionid'
'errorcode'
'fatal'
'remote'
'description'

Remarks

The event is fired in case of exceptional conditions during message processing.

ErrorCode contains an error code and Description contains a textual description of the error. For a list of valid error codes and their descriptions, please refer to the HTTPS section.

ExternalSign Event (SecureBlackbox_KMIPServer Class)

Handles remote or external signing initiated by the server protocol.

Object Oriented Interface

public function fireExternalSign($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 58, array($this, 'fireExternalSign'));

Parameter List

 'connectionid'
'operationid'
'hashalgorithm'
'pars'
'data'
'signeddata'

Remarks

Assign a handler to this event if you need to delegate a low-level signing operation to an external, remote, or custom signing engine. Depending on the settings, the handler will receive a hashed or unhashed value to be signed.

The event handler must pass the value of Data to the signer, obtain the signature, and pass it back to the class via the SignedData parameter.

OperationId provides a comment about the operation and its origin. It depends on the exact class being used, and may be empty. HashAlgorithm specifies the hash algorithm being used for the operation, and Pars contains algorithm-dependent parameters.

The class uses base16 (hex) encoding for the Data, SignedData, and Pars parameters. If your signing engine uses a different input and output encoding, you may need to decode and/or encode the data before and/or after the signing.

A sample MD5 hash encoded in base16: a0dee2a0382afbb09120ffa7ccd8a152 - lower case base16 A0DEE2A0382AFBB09120FFA7CCD8A152 - upper case base16

A sample event handler that uses the .NET RSACryptoServiceProvider class may look like the following: signer.OnExternalSign += (s, e) => { var cert = new X509Certificate2("cert.pfx", "", X509KeyStorageFlags.Exportable); var key = (RSACryptoServiceProvider)cert.PrivateKey; var dataToSign = e.Data.FromBase16String(); var signedData = key.SignHash(dataToSign, "2.16.840.1.101.3.4.2.1"); e.SignedData = signedData.ToBase16String(); };

Generate Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireGenerate($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 59, array($this, 'fireGenerate'));

Parameter List

 'connectionid'
'publickeyid'
'certid'
'operationstatus'

Remarks

TBD

GenerateKey Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireGenerateKey($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 60, array($this, 'fireGenerateKey'));

Parameter List

 'connectionid'
'keyalgorithm'
'keylength'
'group'
'keyid'
'operationstatus'

Remarks

TBD

GenerateKeyPair Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireGenerateKeyPair($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 61, array($this, 'fireGenerateKeyPair'));

Parameter List

 'connectionid'
'keyalgorithm'
'keylength'
'scheme'
'schemeparams'
'group'
'privatekeyid'
'publickeyid'
'operationstatus'

Remarks

TBD

GetUsageAllocation Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireGetUsageAllocation($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 62, array($this, 'fireGetUsageAllocation'));

Parameter List

 'connectionid'
'objectid'
'usagelimitscount'
'operationstatus'

Remarks

TBD

Hash Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireHash($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 63, array($this, 'fireHash'));

Parameter List

 'connectionid'
'objectid'
'hashalgorithm'
'data'
'initindicator'
'finalindicator'
'correlationvalue'
'operationstatus'

Remarks

TBD

HeadersPrepared Event (SecureBlackbox_KMIPServer Class)

Fires when the response headers have been formed and are ready to be sent to the server.

Object Oriented Interface

public function fireHeadersPrepared($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 64, array($this, 'fireHeadersPrepared'));

Parameter List

 'connectionid'

Remarks

The class fires this event when the response headers are ready to be sent to the server. ConnectionID indicates the connection that processed the request.

Use GetResponseHeader method with an empty header name to get the whole response header.

KMIPAuthAttempt Event (SecureBlackbox_KMIPServer Class)

Fires when a connected client makes an authentication attempt.

Object Oriented Interface

public function fireKMIPAuthAttempt($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 65, array($this, 'fireKMIPAuthAttempt'));

Parameter List

 'connectionid'
'username'
'password'
'accept'

Remarks

The class fires this event whenever a client attempts to authenticate itself. Use the Accept parameter to let the client through.

Username and Password contain the professed credentials.

List Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireList($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 66, array($this, 'fireList'));

Parameter List

 'connectionid'
'objecttype'
'objectstatus'
'onlyfreshobject'
'offsetitems'
'maximumitems'
'objectids'
'locateditems'
'operationstatus'

Remarks

TBD

ListAttributes Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireListAttributes($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 67, array($this, 'fireListAttributes'));

Parameter List

 'connectionid'
'objectid'
'attributenames'
'operationstatus'

Remarks

TBD

Notification Event (SecureBlackbox_KMIPServer Class)

This event notifies the application about an underlying control flow event.

Object Oriented Interface

public function fireNotification($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 68, array($this, 'fireNotification'));

Parameter List

 'eventid'
'eventparam'

Remarks

The class fires this event to let the application know about some event, occurrence, or milestone in the class. For example, it may fire to report completion of the document processing. The list of events being reported is not fixed, and may be flexibly extended over time.

The unique identifier of the event is provided in the EventID parameter. EventParam contains any parameters accompanying the occurrence. Depending on the type of the class, the exact action it is performing, or the document being processed, one or both may be omitted.

ObtainLease Event (SecureBlackbox_KMIPServer Class)

Lets the application handle the lease request.

Object Oriented Interface

public function fireObtainLease($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 69, array($this, 'fireObtainLease'));

Parameter List

 'connectionid'
'objectid'
'leasetime'
'lastchangedate'
'operationstatus'

Remarks

Subscribe to this event to react to object lease requests in virtualized mode.

The ObjectId parameter indicates the object a lease for which is requested. The LeaseTime and LastChangeDate specify the requested parameters of the lease. You can adjust them as required.

Set OperationStatus to indicate the intended operation result to the client.

OperationAttempt Event (SecureBlackbox_KMIPServer Class)

Fires when a request is received from the client.

Object Oriented Interface

public function fireOperationAttempt($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 70, array($this, 'fireOperationAttempt'));

Parameter List

 'connectionid'
'operation'
'username'
'reject'

Remarks

The Operation parameter specifies the operation to perform, and Username the originator of the request. Use the Reject parameter to reject the request.

Poll Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function firePoll($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 71, array($this, 'firePoll'));

Parameter List

 'connectionid'
'asynccorrelationvalue'
'operationstatus'

Remarks

TBD

ReadAttribute Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireReadAttribute($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 72, array($this, 'fireReadAttribute'));

Parameter List

 'connectionid'
'objectid'
'attributename'
'attributevalue'
'operationstatus'

Remarks

TBD

ReadObject Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireReadObject($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 73, array($this, 'fireReadObject'));

Parameter List

 'connectionid'
'objectid'
'objecttype'
'operationstatus'

Remarks

TBD

ReCertify Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireReCertify($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 74, array($this, 'fireReCertify'));

Parameter List

 'connectionid'
'oldcertid'
'offset'
'group'
'newcertid'
'operationstatus'

Remarks

TBD

RecoverObject Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireRecoverObject($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 75, array($this, 'fireRecoverObject'));

Parameter List

 'connectionid'
'objectid'
'operationstatus'

Remarks

TBD

ReKey Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireReKey($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 76, array($this, 'fireReKey'));

Parameter List

 'connectionid'
'oldkeyid'
'offset'
'group'
'newkeyid'
'operationstatus'

Remarks

TBD

RekeyKeyPair Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireRekeyKeyPair($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 77, array($this, 'fireRekeyKeyPair'));

Parameter List

 'connectionid'
'oldprivatekeyid'
'offset'
'group'
'newprivatekeyid'
'newpublickeyid'
'operationstatus'

Remarks

TBD

RemoveObject Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireRemoveObject($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 78, array($this, 'fireRemoveObject'));

Parameter List

 'connectionid'
'objectid'
'operationstatus'

Remarks

TBD

Request Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireRequest($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 79, array($this, 'fireRequest'));

Parameter List

 'connectionid'
'requestdata'

Remarks

TBD

Response Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireResponse($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 80, array($this, 'fireResponse'));

Parameter List

 'connectionid'
'responsedata'

Remarks

TBD

RevokeObject Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireRevokeObject($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 81, array($this, 'fireRevokeObject'));

Parameter List

 'connectionid'
'objectid'
'reasoncode'
'reasonmessage'
'operationstatus'

Remarks

TBD

RNGGenerate Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireRNGGenerate($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 82, array($this, 'fireRNGGenerate'));

Parameter List

 'connectionid'
'datalength'
'operationstatus'

Remarks

TBD

RNGSeed Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireRNGSeed($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 83, array($this, 'fireRNGSeed'));

Parameter List

 'connectionid'
'data'
'bytesused'
'operationstatus'

Remarks

TBD

SetAttribute Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireSetAttribute($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 84, array($this, 'fireSetAttribute'));

Parameter List

 'connectionid'
'objectid'
'attributename'
'attributevalue'
'operationstatus'

Remarks

TBD

Sign Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireSign($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 85, array($this, 'fireSign'));

Parameter List

 'connectionid'
'objectid'
'hashalgorithm'
'inputishash'
'data'
'initindicator'
'finalindicator'
'correlationvalue'
'operationstatus'

Remarks

TBD

TLSCertValidate Event (SecureBlackbox_KMIPServer Class)

Fires when a client certificate needs to be validated.

Object Oriented Interface

public function fireTLSCertValidate($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 86, array($this, 'fireTLSCertValidate'));

Parameter List

 'connectionid'
'accept'

Remarks

The class fires this event to notify the application of an authenticating client. Use the event handler to validate the certificate and pass your decision back to the server component via the Accept parameter.

TLSEstablished Event (SecureBlackbox_KMIPServer Class)

Reports the setup of a TLS session.

Object Oriented Interface

public function fireTLSEstablished($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 87, array($this, 'fireTLSEstablished'));

Parameter List

 'connectionid'

Remarks

Subscribe to this event to be notified about the setup of a TLS connection by a connected client.

TLSHandshake Event (SecureBlackbox_KMIPServer Class)

Fires when a newly established client connection initiates a TLS handshake.

Object Oriented Interface

public function fireTLSHandshake($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 88, array($this, 'fireTLSHandshake'));

Parameter List

 'connectionid'
'servername'
'abort'

Remarks

Use this event to get notified about the initiation of the TLS handshake by the remote client. The ServerName parameter specifies the requested host from the client hello message.

TLSPSK Event (SecureBlackbox_KMIPServer Class)

Requests a pre-shared key for TLS-PSK.

Object Oriented Interface

public function fireTLSPSK($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 89, array($this, 'fireTLSPSK'));

Parameter List

 'connectionid'
'identity'
'psk'
'ciphersuite'

Remarks

The class fires this event to report that a client has requested a TLS-PSK negotiation. ConnectionId indicates the unique connection ID that requested the PSK handshake.

Use Identity to look up for the corresponding pre-shared key in the server's database, then assign the key to the PSK parameter. If TLS 1.3 PSK is used, you will also need to assign the Ciphersuite parameter with the cipher suite associated with that identity and their key.

TLSShutdown Event (SecureBlackbox_KMIPServer Class)

Reports closure of a TLS session.

Object Oriented Interface

public function fireTLSShutdown($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 90, array($this, 'fireTLSShutdown'));

Parameter List

 'connectionid'

Remarks

The class fires this event when a connected client closes their TLS session gracefully. This event is typically followed by a Disconnect, which marks the closure of the underlying TCP session.

ValidateChain Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireValidateChain($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 91, array($this, 'fireValidateChain'));

Parameter List

 'connectionid'
'objectids'
'validity'
'operationstatus'

Remarks

TBD

Verify Event (SecureBlackbox_KMIPServer Class)

TBD.

Object Oriented Interface

public function fireVerify($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 92, array($this, 'fireVerify'));

Parameter List

 'connectionid'
'objectid'
'hashalgorithm'
'inputishash'
'data'
'signaturedata'
'initindicator'
'finalindicator'
'validationresult'
'correlationvalue'
'operationstatus'

Remarks

TBD

VerifyHash Event (SecureBlackbox_KMIPServer Class)

Delegates the hash verification operation to a custom handler.

Object Oriented Interface

public function fireVerifyHash($param);

Procedural Interface

secureblackbox_kmipserver_register_callback($res, 93, array($this, 'fireVerifyHash'));

Parameter List

 'connectionid'
'objectid'
'hashalgorithm'
'data'
'hash'
'initindicator'
'finalindicator'
'isvalid'
'correlationvalue'
'operationstatus'

Remarks

This event allows the application to wiretap into the server's verification procedure. It is invoked if the Action parameter in the preceding BeforeVerify hash call was set to fraCustom.

KMIPServer uses this event to delegate both hash and MAC (keyed hash) verifications.

The ObjectId parameter contains the identifier of the key object that should be used to calculate the MAC code. This parameter is empty if a simple hashing operation is requested. The Data parameter contains the data that should be verified against the hash.

The Hash parameter contains the hash or MAC record. The Algorithm parameter specifies the hash algorithm.

In this handler, the application should calculate an Algorithm hash over Data, and verify that the result matches Hash. If the result does match, it should set the IsValid parameter to true. If the hashes do not match, or if any of the call parameters are malformed or not understood by the application, it should set IsValid to false.

Config Settings (KMIPServer Class)

The class accepts one or more of the following configuration settings. Configuration settings are similar in functionality to properties, but they are rarely used. In order to avoid "polluting" the property namespace of the class, access to these internal properties is provided through the Config method.

KMIPServer Config Settings

AuthBasic:   Turns on/off the basic authentication.

When switched on, connecting clients can use the basic authentication.

AuthDigest:   Turns on/off the digest authentication.

When switched on, connecting clients can use the digest authentication.

DualStack:   Allows the use of ip4 and ip6 simultaneously.

This setting specifies a socket can use ip4 and ip6 simultaneously.

MajorProtocolVersion:   Major protocol version on the KMIP server.

Use this property to specify the major version of KMIP used on the server.

MinorProtocolVersion:   Minor protocol version on the KMIP server.

Use this property to specify the minor version of KMIP used on the server.

SSLMode:   Whether to establish a TLS-secured connection.

When SSLMode is True, the class establishes a TLS session and encrypts the data.

UseChunkedTransfer:   Whether to use chunked encoding of the data.

Set this property to true to generate chunked responses to the clients.

UseCompression:   Whether to use GZip compression.

Use this property to tell the class that it should use data compression when generating responses.

Base Config Settings

CheckKeyIntegrityBeforeUse:   Enables or disable private key integrity check before use.

This global property enables or disables private key material check before each signing operation. This slows down performance a bit, but prevents a selection of attacks on RSA keys where keys with unknown origins are used.

You can switch this property off to improve performance if your project only uses known, good private keys.

CookieCaching:   Specifies whether a cookie cache should be used for HTTP(S) transports.

Set this property to enable or disable cookies caching for the class.

Supported values are:

offNo caching (default)
localLocal caching
globalGlobal caching

Cookies:   Gets or sets local cookies for the class.

Use this property to get cookies from the internal cookie storage of the class and/or restore them back between application sessions.

DefDeriveKeyIterations:   Specifies the default key derivation algorithm iteration count.

This global property sets the default number of iterations for all supported key derivation algorithms. Note that you can provide the required number of iterations by using properties of the relevant key generation component; this global setting is used in scenarios where specific iteration count is not or cannot be provided.

EnableClientSideSSLFFDHE:   Enables or disables finite field DHE key exchange support in TLS clients.

This global property enables or disables support for finite field DHE key exchange methods in TLS clients. FF DHE is a slower algorithm if compared to EC DHE; enabling it may result in slower connections.

This setting only applies to sessions negotiated with TLS version 1.3.

GlobalCookies:   Gets or sets global cookies for all the HTTP transports.

Use this property to get cookies from the GLOBAL cookie storage or restore them back between application sessions. These cookies will be used by all the classes that have its CookieCaching property set to "global".

HttpUserAgent:   Specifies the user agent name to be used by all HTTP clients.

This global setting defines the User-Agent field of the HTTP request provides information about the software that initiates the request. This value will be used by all the HTTP clients including the ones used internally in other classes.

LogDestination:   Specifies the debug log destination.

Contains a comma-separated list of values that specifies where debug log should be dumped.

Supported values are:

fileFile
consoleConsole
systemlogSystem Log (supported for Android only)
debuggerDebugger (supported for VCL for Windows and .Net)

LogDetails:   Specifies the debug log details to dump.

Contains a comma-separated list of values that specifies which debug log details to dump.

Supported values are:

timeCurrent time
levelLevel
packagePackage name
moduleModule name
classClass name
methodMethod name
threadidThread Id
contenttypeContent type
contentContent
allAll details

LogFile:   Specifies the debug log filename.

Use this property to provide a path to the log file.

LogFilters:   Specifies the debug log filters.

Contains a comma-separated list of value pairs ("name:value") that describe filters.

Supported filter names are:

exclude-packageExclude a package specified in the value
exclude-moduleExclude a module specified in the value
exclude-classExclude a class specified in the value
exclude-methodExclude a method specified in the value
include-packageInclude a package specified in the value
include-moduleInclude a module specified in the value
include-classInclude a class specified in the value
include-methodInclude a method specified in the value

LogFlushMode:   Specifies the log flush mode.

Use this property to set the log flush mode. The following values are defined:

noneNo flush (caching only)
immediateImmediate flush (real-time logging)
maxcountFlush cached entries upon reaching LogMaxEventCount entries in the cache.

LogLevel:   Specifies the debug log level.

Use this property to provide the desired debug log level.

Supported values are:

noneNone (by default)
fatalSevere errors that cause premature termination.
errorOther runtime errors or unexpected conditions.
warningUse of deprecated APIs, poor use of API, 'almost' errors, other runtime situations that are undesirable or unexpected, but not necessarily "wrong".
infoInteresting runtime events (startup/shutdown).
debugDetailed information on flow of through the system.
traceMore detailed information.

LogMaxEventCount:   Specifies the maximum number of events to cache before further action is taken.

Use this property to specify the log event number threshold. This threshold may have different effects, depending on the rotation setting and/or the flush mode.

The default value of this setting is 100.

LogRotationMode:   Specifies the log rotation mode.

Use this property to set the log rotation mode. The following values are defined:

noneNo rotation
deleteolderDelete older entries from the cache upon reaching LogMaxEventCount
keepolderKeep older entries in the cache upon reaching LogMaxEventCount (newer entries are discarded)

MaxASN1BufferLength:   Specifies the maximal allowed length for ASN.1 primitive tag data.

This global property limits the maximal allowed length for ASN.1 tag data for non-content-carrying structures, such as certificates, CRLs, or timestamps. It does not affect structures that can carry content, such as CMS/CAdES messages. This is a security property aiming at preventing DoS attacks.

MaxASN1TreeDepth:   Specifies the maximal depth for processed ASN.1 trees.

This global property limits the maximal depth of ASN.1 trees that the component can handle without throwing an error. This is a security property aiming at preventing DoS attacks.

OCSPHashAlgorithm:   Specifies the hash algorithm to be used to identify certificates in OCSP requests.

This global setting defines the hash algorithm to use in OCSP requests during chain validation. Some OCSP responders can only use older algorithms, in which case setting this property to SHA1 may be helpful.

StaticDNS:   Specifies whether static DNS rules should be used.

Set this property to enable or disable static DNS rules for the class. Works only if UseOwnDNSResolver is set to true.

Supported values are:

noneNo static DNS rules (default)
localLocal static DNS rules
globalGlobal static DNS rules

StaticIPAddress[domain]:   Gets or sets an IP address for the specified domain name.

Use this property to get or set an IP address for the specified domain name in the internal (of the class) or global DNS rules storage depending on the StaticDNS value. The type of the IP address (IPv4 or IPv6) is determined automatically. If both addresses are available, they are devided by the | (pipe) character.

StaticIPAddresses:   Gets or sets all the static DNS rules.

Use this property to get static DNS rules from the current rules storage or restore them back between application sessions. If StaticDNS of the class is set to "local", the property returns/restores the rules from/to the internal storage of the class. If StaticDNS of the class is set to "global", the property returns/restores the rules from/to the GLOBAL storage. The rules list is returned and accepted in JSON format.

Tag:   Allows to store any custom data.

Use this config property to store any custom data.

TLSSessionGroup:   Specifies the group name of TLS sessions to be used for session resumption.

Use this property to limit the search of chached TLS sessions to the specified group. Sessions from other groups will be ignored. By default, all sessions are cached with an empty group name and available to all the classes.

TLSSessionLifetime:   Specifies lifetime in seconds of the cached TLS session.

Use this property to specify how much time the TLS session should be kept in the session cache. After this time, the session expires and will be automatically removed from the cache. Default value is 300 seconds (5 minutes).

TLSSessionPurgeInterval:   Specifies how often the session cache should remove the expired TLS sessions.

Use this property to specify the time interval of purging the expired TLS sessions from the session cache. Default value is 60 seconds (1 minute).

UseOwnDNSResolver:   Specifies whether the client components should use own DNS resolver.

Set this global property to false to force all the client components to use the DNS resolver provided by the target OS instead of using own one.

UseSharedSystemStorages:   Specifies whether the validation engine should use a global per-process copy of the system certificate stores.

Set this global property to false to make each validation run use its own copy of system certificate stores.

UseSystemOAEPAndPSS:   Enforces or disables the use of system-driven RSA OAEP and PSS computations.

This global setting defines who is responsible for performing RSA-OAEP and RSA-PSS computations where the private key is stored in a Windows system store and is exportable. If set to true, SBB will delegate the computations to Windows via a CryptoAPI call. Otherwise, it will export the key material and perform the computations using its own OAEP/PSS implementation.

This setting only applies to certificates originating from a Windows system store.

UseSystemRandom:   Enables or disables the use of the OS PRNG.

Use this global property to enable or disable the use of operating system-driven pseudorandom number generation.

Trappable Errors (KMIPServer Class)

KMIPServer Errors

1048577   Invalid parameter (SB_ERROR_INVALID_PARAMETER)
1048578   Invalid configuration (SB_ERROR_INVALID_SETUP)
1048579   Invalid state (SB_ERROR_INVALID_STATE)
1048580   Invalid value (SB_ERROR_INVALID_VALUE)
1048581   Private key not found (SB_ERROR_NO_PRIVATE_KEY)
1048582   Cancelled by the user (SB_ERROR_CANCELLED_BY_USER)
1048583   The file was not found (SB_ERROR_NO_SUCH_FILE)
1048584   Unsupported feature or operation (SB_ERROR_UNSUPPORTED_FEATURE)
1048585   General error (SB_ERROR_GENERAL_ERROR)
20971521   KMIP request failed (SB_ERROR_KMIP_REQUEST_FAILED)
20971522   The input file does not exist (SB_ERROR_KMIP_INPUTFILE_NOT_EXISTS)
20971523   Unsupported key algorithm (SB_ERROR_KMIP_UNSUPPORTED_KEY_ALGORITHM)
20971524   Invalid key (SB_ERROR_KMIP_INVALID_KEY)