KMIPServer Class
Properties Methods Events Config Settings Errors
The KMIPServer class provides server-side functionality for Key Management Interoperability Protocol (KMIP).
Class Name
SecureBlackbox_KMIPServer
Procedural Interface
secureblackbox_kmipserver_open(); secureblackbox_kmipserver_close($res); secureblackbox_kmipserver_register_callback($res, $id, $function); secureblackbox_kmipserver_get_last_error($res); secureblackbox_kmipserver_get_last_error_code($res); secureblackbox_kmipserver_set($res, $id, $index, $value); secureblackbox_kmipserver_get($res, $id, $index); secureblackbox_kmipserver_do_cleanup($res); secureblackbox_kmipserver_do_config($res, $configurationstring); secureblackbox_kmipserver_do_doaction($res, $actionid, $actionparams); secureblackbox_kmipserver_do_dropclient($res, $connectionid, $forced); secureblackbox_kmipserver_do_getclientcert($res, $connectionid); secureblackbox_kmipserver_do_getclientkey($res, $connectionid); secureblackbox_kmipserver_do_getrequestheader($res, $connectionid, $headername); secureblackbox_kmipserver_do_getresponseheader($res, $connectionid, $headername); secureblackbox_kmipserver_do_listclients($res); secureblackbox_kmipserver_do_pinclient($res, $connectionid); secureblackbox_kmipserver_do_processgenericrequest($res, $connectionid, $requestbytes); secureblackbox_kmipserver_do_reset($res); secureblackbox_kmipserver_do_setclientbytes($res, $connectionid, $value); secureblackbox_kmipserver_do_setclientcert($res, $connectionid); secureblackbox_kmipserver_do_setclientkey($res, $connectionid); secureblackbox_kmipserver_do_setresponseheader($res, $connectionid, $headername, $value); secureblackbox_kmipserver_do_start($res); secureblackbox_kmipserver_do_stop($res);
Remarks
The Key Management Interoperability Protocol (KMIP) is an OASIS standard for communication between key management servers and clients. KMIP servers are typically responsible for managing cryptographic keys and providing access to them to remote client applications.
Property List
The following is the full list of the properties of the class with short descriptions. Click on the links for further details.
Active | Indicates if the KMIP server is active and listening to incoming connections. |
AllowKeepAlive | Enables or disables keep-alive mode. |
AuthRealm | Specifies authentication realm for digest and NTLM authentication. |
AuthTypes | Defines allowed HTTP authentication types. |
BoundPort | Indicates the bound listening port. |
CACertBytes | Returns the raw certificate data in DER format. |
CACertHandle | Allows to get or set a 'handle', a unique identifier of the underlying property object. |
CertificateBytes | Returns the raw certificate data in DER format. |
CertificateHandle | Allows to get or set a 'handle', a unique identifier of the underlying property object. |
CompressionLevel | The default compression level to use. |
ExternalCryptoAsyncDocumentID | Specifies an optional document ID for SignAsyncBegin() and SignAsyncEnd() calls. |
ExternalCryptoCustomParams | Custom parameters to be passed to the signing service (uninterpreted). |
ExternalCryptoData | Additional data to be included in the async state and mirrored back by the requestor. |
ExternalCryptoExternalHashCalculation | Specifies whether the message hash is to be calculated at the external endpoint. |
ExternalCryptoHashAlgorithm | Specifies the request's signature hash algorithm. |
ExternalCryptoKeyID | The ID of the pre-shared key used for DC request authentication. |
ExternalCryptoKeySecret | The pre-shared key used for DC request authentication. |
ExternalCryptoMethod | Specifies the asynchronous signing method. |
ExternalCryptoMode | Specifies the external cryptography mode. |
ExternalCryptoPublicKeyAlgorithm | Provide the public key algorithm here if the certificate is not available on the pre-signing stage. |
FIPSMode | Reserved. |
HandshakeTimeout | Specifies the handshake timeout in milliseconds. |
Host | Specifies the host name of the KMIP server. |
KeyAlgorithm | The algorithm of the cryptographic key. |
KeyBits | The length of the key in bits. |
KeyCurve | This property specifies the name of the curve the EC key is built on. |
KeyExportable | Returns True if the key is exportable (can be serialized into an array of bytes), and False otherwise. |
KeyFingerprint | Contains the fingerprint (a hash imprint) of this key. |
KeyHandle | Allows to get or set a 'handle', a unique identifier of the underlying property object. |
KeyID | Provides access to a storage-specific key identifier. |
KeyIV | The initialization vector (IV) of a symmetric key. |
KeyKey | The byte array representation of the key. |
KeyNonce | A nonce value associated with a key. |
KeyPrivate | Returns True if the object hosts a private key, and False otherwise. |
KeyPublic | Returns True if the object hosts a public key, and False otherwise. |
KeySubject | Returns the key subject. |
KeySymmetric | Returns True if the object contains a symmetric key, and False otherwise. |
KeyValid | Returns True if this key is valid. |
PinnedClientAEADCipher | Indicates whether the encryption algorithm used is an AEAD cipher. |
PinnedClientChainValidationDetails | The details of a certificate chain validation outcome. |
PinnedClientChainValidationResult | The outcome of a certificate chain validation routine. |
PinnedClientCiphersuite | The cipher suite employed by this connection. |
PinnedClientClientAuthenticated | Specifies whether client authentication was performed during this connection. |
PinnedClientClientAuthRequested | Specifies whether client authentication was requested during this connection. |
PinnedClientConnectionEstablished | Indicates whether the connection has been established fully. |
PinnedClientConnectionID | The unique identifier assigned to this connection. |
PinnedClientDigestAlgorithm | The digest algorithm used in a TLS-enabled connection. |
PinnedClientEncryptionAlgorithm | The symmetric encryption algorithm used in a TLS-enabled connection. |
PinnedClientExportable | Indicates whether a TLS connection uses a reduced-strength exportable cipher. |
PinnedClientID | The client connection's unique identifier. |
PinnedClientKeyExchangeAlgorithm | The key exchange algorithm used in a TLS-enabled connection. |
PinnedClientKeyExchangeKeyBits | The length of the key exchange key of a TLS-enabled connection. |
PinnedClientNamedECCurve | The elliptic curve used in this connection. |
PinnedClientPFSCipher | Indicates whether the chosen ciphersuite provides perfect forward secrecy (PFS). |
PinnedClientPreSharedIdentity | Specifies the identity used when the PSK (Pre-Shared Key) key-exchange mechanism is negotiated. |
PinnedClientPreSharedIdentityHint | A hint professed by the server to help the client select the PSK identity to use. |
PinnedClientPublicKeyBits | The length of the public key. |
PinnedClientRemoteAddress | The client's IP address. |
PinnedClientRemotePort | The remote port of the client connection. |
PinnedClientResumedSession | Indicates whether a TLS-enabled connection was spawned from another TLS connection. |
PinnedClientSecureConnection | Indicates whether TLS or SSL is enabled for this connection. |
PinnedClientServerAuthenticated | Indicates whether server authentication was performed during a TLS-enabled connection. |
PinnedClientSignatureAlgorithm | The signature algorithm used in a TLS handshake. |
PinnedClientSymmetricBlockSize | The block size of the symmetric algorithm used. |
PinnedClientSymmetricKeyBits | The key length of the symmetric algorithm used. |
PinnedClientTotalBytesReceived | The total number of bytes received over this connection. |
PinnedClientTotalBytesSent | The total number of bytes sent over this connection. |
PinnedClientValidationLog | Contains the server certificate's chain validation log. |
PinnedClientVersion | Indicates the version of SSL/TLS protocol negotiated during this connection. |
PinnedClientCertCount | The number of records in the PinnedClientCert arrays. |
PinnedClientCertBytes | Returns the raw certificate data in DER format. |
PinnedClientCertCAKeyID | A unique identifier (fingerprint) of the CA certificate's cryptographic key. |
PinnedClientCertFingerprint | Contains the fingerprint (a hash imprint) of this certificate. |
PinnedClientCertHandle | Allows to get or set a 'handle', a unique identifier of the underlying property object. |
PinnedClientCertIssuer | The common name of the certificate issuer (CA), typically a company name. |
PinnedClientCertIssuerRDN | A list of Property=Value pairs that uniquely identify the certificate issuer. |
PinnedClientCertKeyAlgorithm | Specifies the public key algorithm of this certificate. |
PinnedClientCertKeyBits | Returns the length of the public key in bits. |
PinnedClientCertKeyFingerprint | Returns a SHA1 fingerprint of the public key contained in the certificate. |
PinnedClientCertKeyUsage | Indicates the purposes of the key contained in the certificate, in the form of an OR'ed flag set. |
PinnedClientCertPublicKeyBytes | Contains the certificate's public key in DER format. |
PinnedClientCertSelfSigned | Indicates whether the certificate is self-signed (root) or signed by an external CA. |
PinnedClientCertSerialNumber | Returns the certificate's serial number. |
PinnedClientCertSigAlgorithm | Indicates the algorithm that was used by the CA to sign this certificate. |
PinnedClientCertSubject | The common name of the certificate holder, typically an individual's name, a URL, an e-mail address, or a company name. |
PinnedClientCertSubjectKeyID | Contains a unique identifier of the certificate's cryptographic key. |
PinnedClientCertSubjectRDN | A list of Property=Value pairs that uniquely identify the certificate holder (subject). |
PinnedClientCertValidFrom | The time point at which the certificate becomes valid, in UTC. |
PinnedClientCertValidTo | The time point at which the certificate expires, in UTC. |
Port | A port to listen for connections on. |
ReadOnly | Controls whether the server works in read-only mode. |
SessionTimeout | Specifies the default session timeout value in milliseconds. |
SocketIncomingSpeedLimit | The maximum number of bytes to read from the socket, per second. |
SocketLocalAddress | The local network interface to bind the socket to. |
SocketLocalPort | The local port number to bind the socket to. |
SocketOutgoingSpeedLimit | The maximum number of bytes to write to the socket, per second. |
SocketTimeout | The maximum period of waiting, in milliseconds, after which the socket operation is considered unsuccessful. |
SocketUseIPv6 | Enables or disables IP protocol version 6. |
StorageFileName | A path to the KMIP object database. |
TLSServerCertCount | The number of records in the TLSServerCert arrays. |
TLSServerCertBytes | Returns the raw certificate data in DER format. |
TLSServerCertHandle | Allows to get or set a 'handle', a unique identifier of the underlying property object. |
TLSAutoValidateCertificates | Specifies whether server-side TLS certificates should be validated automatically using internal validation rules. |
TLSBaseConfiguration | Selects the base configuration for the TLS settings. |
TLSCiphersuites | A list of ciphersuites separated with commas or semicolons. |
TLSClientAuth | Enables or disables certificate-based client authentication. |
TLSECCurves | Defines the elliptic curves to enable. |
TLSExtensions | Provides access to TLS extensions. |
TLSForceResumeIfDestinationChanges | Whether to force TLS session resumption when the destination address changes. |
TLSPreSharedIdentity | Defines the identity used when the PSK (Pre-Shared Key) key-exchange mechanism is negotiated. |
TLSPreSharedKey | Contains the pre-shared key for the PSK (Pre-Shared Key) key-exchange mechanism, encoded with base16. |
TLSPreSharedKeyCiphersuite | Defines the ciphersuite used for PSK (Pre-Shared Key) negotiation. |
TLSRenegotiationAttackPreventionMode | Selects the renegotiation attack prevention mechanism. |
TLSRevocationCheck | Specifies the kind(s) of revocation check to perform. |
TLSSSLOptions | Various SSL (TLS) protocol options, set of cssloExpectShutdownMessage 0x001 Wait for the close-notify message when shutting down the connection cssloOpenSSLDTLSWorkaround 0x002 (DEPRECATED) Use a DTLS version workaround when talking to very old OpenSSL versions cssloDisableKexLengthAlignment 0x004 Do not align the client-side PMS by the RSA modulus size. |
TLSTLSMode | Specifies the TLS mode to use. |
TLSUseExtendedMasterSecret | Enables the Extended Master Secret Extension, as defined in RFC 7627. |
TLSUseSessionResumption | Enables or disables the TLS session resumption capability. |
TLSVersions | The SSL/TLS versions to enable by default. |
UseChunkedTransfer | Enables chunked transfer. |
UseCompression | Enables or disables server-side compression. |
UseHTTP | Specifies whether the server should use HTTP instead of KMIP-over-TCP/TLS. |
UserCount | The number of records in the User arrays. |
UserAssociatedData | Contains the user's Associated Data when SSH AEAD (Authenticated Encryption with Associated Data) algorithm is used. |
UserBasePath | Base path for this user in the server's file system. |
UserCertificate | Contains the user's certificate. |
UserData | Contains uninterpreted user-defined data that should be associated with the user account, such as comments or custom settings. |
UserEmail | The user's email address. |
UserHandle | Allows to get or set a 'handle', a unique identifier of the underlying property object. |
UserHashAlgorithm | Specifies the hash algorithm used to generate TOTP (Time-based One-Time Passwords) passwords for this user. |
UserIncomingSpeedLimit | Specifies the incoming speed limit for this user. |
UserOtpAlgorithm | The algorithm used to generate one-time passwords (OTP) for this user, either HOTP (Hash-based OTP) or TOTP (Time-based OTP). |
UserOTPLen | Specifies the length of the user's OTP password. |
UserOtpValue | The user's time interval (TOTP) or Counter (HOTP). |
UserOutgoingSpeedLimit | Specifies the outgoing speed limit for this user. |
UserPassword | The user's authentication password. |
UserSharedSecret | Contains the user's secret key, which is essentially a shared secret between the client and server. |
UserSSHKey | Contains the user's SSH key. |
UserUsername | The registered name (login) of the user. |
Method List
The following is the full list of the methods of the class with short descriptions. Click on the links for further details.
Cleanup | Cleans up the server environment by purging expired sessions and cleaning caches. |
Config | Sets or retrieves a configuration setting. |
DoAction | Performs an additional action. |
DropClient | Terminates a client connection. |
GetClientCert | Populates the per-connection certificate object. |
GetClientKey | Populates the per-connection key object. |
GetRequestHeader | Returns a request header value. |
GetResponseHeader | Returns a response header value. |
ListClients | Enumerates the connected clients. |
PinClient | Takes a snapshot of the connection's properties. |
ProcessGenericRequest | Processes a generic HTTP request. |
Reset | Resets the class settings. |
SetClientBytes | Commits a data buffer to the connection. |
SetClientCert | Commits the per-connection certificate object to the connection context. |
SetClientKey | Commits the per-connection key object to the connection context. |
SetResponseHeader | Sets a response header. |
Start | Start the KMIP server. |
Stop | Stops the KMIP server. |
Event List
The following is the full list of the events fired by the class with short descriptions. Click on the links for further details.
Accept | Reports an incoming connection. |
ActivateObject | Notifies the application about the object activation request. |
Add | Passes the certificate import request to the application. |
AddKey | Expects the application to handle the key import request. |
AfterAdd | Notifies the application about completion of the certificate import operation. |
AfterAddKey | Reports the completion of the key import procedure. |
AfterBrowse | KMIP server uses this event to notify the application about the completion of the browsing (attribute request) operation. |
AfterDecrypt | Notifies the application about completion of the decryption call. |
AfterDeriveKey | Notifies the application about completion of the key derivation request. |
AfterEdit | Notifies the application of completion of the object editing operation. |
AfterEncrypt | Notifies the application about the completion of the encryption call. |
AfterGenerate | Signifies completion of certificate generation. |
AfterGenerateKey | Notifies the application of the completion of key generation procedure. |
AfterGenerateKeyPair | Notifies the application of the completion of keypair generation. |
AfterHash | Notifies the application about completion of the hashing call. |
AfterList | Notifies the application about completion of the list command. |
AfterObtainLease | Reports the completion of lease allocation operation. |
AfterReadObject | Notifies the application of the completion of the read operation on the object. |
AfterReCertify | Notifies the application about the completion of the re-certify operation. |
AfterReKey | Notifies the application about the completion of the re-key operation. |
AfterRekeyKeyPair | Notifies the application about the completion of the re-key keypair operation. |
AfterRemoveObject | Notifies the application about completion of the object removal request. |
AfterSign | Notifies the application of completion of a signing operation. |
AfterVerify | Notifies the application about completion of the Verify operation. |
AfterVerifyHash | Notifies the application about completion of the hash verification. |
ArchiveObject | Notifies the application about the received object archival request. |
AuthAttempt | Fires when a connected client makes an authentication attempt. |
BeforeAdd | Fires when a certificate import request is received from a client. |
BeforeAddKey | Fires when a key import request is received from the client. |
BeforeBrowse | Notifies the application about the browse request being received. |
BeforeDecrypt | Notifies the application about the initiation of the decryption operation. |
BeforeDeriveKey | Fires when a derive key request is received. |
BeforeEdit | Notifies the application about the start of the object editing operation. |
BeforeEncrypt | Notifies the application about the initiation of an encryption operation. |
BeforeGenerate | Fires when a certificate generation request is received. |
BeforeGenerateKey | Fires when a key generation request is received. |
BeforeGenerateKeyPair | Fires when a key generation request is received. |
BeforeHash | Notifies the application about the initiation of the hashing operation. |
BeforeList | Notifies the application about the initiation of the list operation. |
BeforeObtainLease | Notifies the application about the client requesting an object lease. |
BeforeReadObject | Notifies the application about the start of the object reading request. |
BeforeReCertify | Notifies the application about a re-certification request. |
BeforeReKey | Notifies the application about a re-key request received. |
BeforeRekeyKeyPair | Notifies the application about a keypair re-key request received. |
BeforeRemoveObject | Notifies the application about an incoming Remove Object request. |
BeforeSign | Notifies the application about the initiation of a signing operation. |
BeforeVerify | Notifies the application about the initiation of the verify operation. |
BeforeVerifyHash | Notifies the application about the initiation of the hash verification operation. |
Cancel | Reports a cancellation request received from the client. |
Check | Notifies the application about a Check request received. |
Connect | Reports an accepted connection. |
Decrypt | Instructs the application to decrypt a chunk of data. |
DeleteAttribute | Instructs the application to delete an object attribute. |
DeriveKey | Notifies the application of key derivation request. |
Disconnect | Fires to report a disconnected client. |
Encrypt | Instructs the application to encrypt a chunk of data. |
Error | Information about errors during data delivery. |
ExternalSign | Handles remote or external signing initiated by the server protocol. |
Generate | Notifies the application about an incoming Generate request. |
GenerateKey | Notifies the application about an incoming Generate request. |
GenerateKeyPair | Notifies the application about an incoming Generate request. |
GetUsageAllocation | Notifies the application about an incoming Get Usage Allocation request. |
Hash | Instructs the application to update the current hashing operation. |
HeadersPrepared | Fires when the response headers have been formed and are ready to be sent to the server. |
KMIPAuthAttempt | Fires when a connected client makes an authentication attempt. |
List | Instructs the application to return the list of objects that match the specified criteria. |
ListAttributes | Requests a list of object attribute names from the application. |
Notification | This event notifies the application about an underlying control flow event. |
ObtainLease | Lets the application handle the lease request. |
OperationAttempt | Fires when a request is received from the client. |
Poll | Notifies the application about the received Poll request. |
ReadAttribute | Requests an object attribute value from the application. |
ReadObject | Requests the details of the object from the application. |
ReCertify | Notifies the application about an incoming re-certification request. |
RecoverObject | Notifies the application about an incoming Recover Object request. |
ReKey | Notifies the application about an incoming re-key request. |
RekeyKeyPair | Notifies the application about an incoming re-key request. |
RemoveObject | Notifies the application about the object deletion request. |
Request | Notifies the application about KMIP requests being received. |
Response | Notifies the application about KMIP responses being sent back. |
RevokeObject | Instructs the application to revoke an object. |
RNGGenerate | Asks the application for another block of random numbers. |
RNGSeed | Tells the application to seed the random number generator. |
SetAttribute | Passes a set-attribute request to the application. |
Sign | Instructs the application to sign data with a private key. |
TLSCertValidate | Fires when a client certificate needs to be validated. |
TLSEstablished | Reports the setup of a TLS session. |
TLSHandshake | Fires when a newly established client connection initiates a TLS handshake. |
TLSPSK | Requests a pre-shared key for TLS-PSK. |
TLSShutdown | Reports closure of a TLS session. |
ValidateChain | Passes the chain validation request to the application. |
Verify | KMIPServer fires this event to notify the application about a verification operation request, and expects the application to perform it. |
VerifyHash | Delegates the hash verification operation to a custom handler. |
Config Settings
The following is a list of config settings for the class with short descriptions. Click on the links for further details.
AllowKeepAlive | Enables or disables keep-alive mode. |
AllowOptionsResponseWithoutAuth | Enables unauthenticated responses to OPTIONS requests. |
AuthBasic | Turns on/off the basic authentication. |
AuthDigest | Turns on/off the digest authentication. |
AuthDigestExpire | Specifies digest expiration time for digest authentication. |
AuthRealm | Specifies authentication realm for digest and NTLM authentication. |
CompressionLevel | The default compression level to use. |
DualStack | Allows the use of ip4 and ip6 simultaneously. |
HomePage | Specifies the home page resource name. |
MajorProtocolVersion | Major protocol version on the KMIP server. |
MinorProtocolVersion | Minor protocol version on the KMIP server. |
RequestFilter | The request string modifier. |
SSLMode | Whether to establish a TLS-secured connection. |
UseChunkedTransfer | Whether to use chunked encoding of the data. |
UseChunkedTransfer | Enables chunked transfer. |
UseCompression | Whether to use GZip compression. |
UseCompression | Enables or disables server-side compression. |
ASN1UseGlobalTagCache | Controls whether ASN.1 module should use a global object cache. |
AssignSystemSmartCardPins | Specifies whether CSP-level PINs should be assigned to CNG keys. |
CheckKeyIntegrityBeforeUse | Enables or disable private key integrity check before use. |
CookieCaching | Specifies whether a cookie cache should be used for HTTP(S) transports. |
Cookies | Gets or sets local cookies for the class. |
DefDeriveKeyIterations | Specifies the default key derivation algorithm iteration count. |
DNSLocalSuffix | The suffix to assign for TLD names. |
EnableClientSideSSLFFDHE | Enables or disables finite field DHE key exchange support in TLS clients. |
GlobalCookies | Gets or sets global cookies for all the HTTP transports. |
HardwareCryptoUsePolicy | The hardware crypto usage policy. |
HttpUserAgent | Specifies the user agent name to be used by all HTTP clients. |
HttpVersion | The HTTP version to use in any inner HTTP client classes created. |
IgnoreExpiredMSCTLSigningCert | Whether to tolerate the expired Windows Update signing certificate. |
ListDelimiter | The delimiter character for multi-element lists. |
LogDestination | Specifies the debug log destination. |
LogDetails | Specifies the debug log details to dump. |
LogFile | Specifies the debug log filename. |
LogFilters | Specifies the debug log filters. |
LogFlushMode | Specifies the log flush mode. |
LogLevel | Specifies the debug log level. |
LogMaxEventCount | Specifies the maximum number of events to cache before further action is taken. |
LogRotationMode | Specifies the log rotation mode. |
MaxASN1BufferLength | Specifies the maximal allowed length for ASN.1 primitive tag data. |
MaxASN1TreeDepth | Specifies the maximal depth for processed ASN.1 trees. |
OCSPHashAlgorithm | Specifies the hash algorithm to be used to identify certificates in OCSP requests. |
OldClientSideRSAFallback | Specifies whether the SSH client should use a SHA1 fallback. |
PKICache | Specifies which PKI elements (certificates, CRLs, OCSP responses) should be cached. |
PKICachePath | Specifies the file system path where cached PKI data is stored. |
ProductVersion | Returns the version of the SecureBlackbox library. |
ServerSSLDHKeyLength | Sets the size of the TLS DHE key exchange group. |
StaticDNS | Specifies whether static DNS rules should be used. |
StaticIPAddress[domain] | Gets or sets an IP address for the specified domain name. |
StaticIPAddresses | Gets or sets all the static DNS rules. |
Tag | Allows to store any custom data. |
TLSSessionGroup | Specifies the group name of TLS sessions to be used for session resumption. |
TLSSessionLifetime | Specifies lifetime in seconds of the cached TLS session. |
TLSSessionPurgeInterval | Specifies how often the session cache should remove the expired TLS sessions. |
UseCRLObjectCaching | Specifies whether reuse of loaded CRL objects is enabled. |
UseInternalRandom | Switches between SecureBlackbox-own and platform PRNGs. |
UseLegacyAdESValidation | Enables legacy AdES validation mode. |
UseOCSPResponseObjectCaching | Specifies whether reuse of loaded OCSP response objects is enabled. |
UseOwnDNSResolver | Specifies whether the client classes should use own DNS resolver. |
UseSharedSystemStorages | Specifies whether the validation engine should use a global per-process copy of the system certificate stores. |
UseSystemNativeSizeCalculation | An internal CryptoAPI access tweak. |
UseSystemOAEPAndPSS | Enforces or disables the use of system-driven RSA OAEP and PSS computations. |
UseSystemRandom | Enables or disables the use of the OS PRNG. |
XMLRDNDescriptorName[OID] | Defines an OID mapping to descriptor names for the certificate's IssuerRDN or SubjectRDN. |
XMLRDNDescriptorPriority[OID] | Specifies the priority of descriptor names associated with a specific OID. |
XMLRDNDescriptorReverseOrder | Specifies whether to reverse the order of descriptors in RDN. |
XMLRDNDescriptorSeparator | Specifies the separator used between descriptors in RDN. |
Active Property (SecureBlackbox_KMIPServer Class)
Indicates if the KMIP server is active and listening to incoming connections.
Object Oriented Interface
public function getActive();
Procedural Interface
secureblackbox_kmipserver_get($res, 1 );
Default Value
false
Remarks
Check this property to find out if the KMIP server is in an active state. Use Start and Stop methods to launch and stop the server.
This property is read-only and not available at design time.
Data Type
Boolean
AllowKeepAlive Property (SecureBlackbox_KMIPServer Class)
Enables or disables keep-alive mode.
Object Oriented Interface
public function getAllowKeepAlive(); public function setAllowKeepAlive($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 2 ); secureblackbox_kmipserver_set($res, 2, $value );
Default Value
true
Remarks
Use this property to enable or disable the keep-alive connection mode. If keep-alive is enabled, clients that choose to use it may stay connected for a while.
Data Type
Boolean
AuthRealm Property (SecureBlackbox_KMIPServer Class)
Specifies authentication realm for digest and NTLM authentication.
Object Oriented Interface
public function getAuthRealm(); public function setAuthRealm($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 3 ); secureblackbox_kmipserver_set($res, 3, $value );
Default Value
'SecureBlackbox'
Remarks
Specifies authentication realm for digest and NTLM authentication types.
Data Type
String
AuthTypes Property (SecureBlackbox_KMIPServer Class)
Defines allowed HTTP authentication types.
Object Oriented Interface
public function getAuthTypes(); public function setAuthTypes($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 4 ); secureblackbox_kmipserver_set($res, 4, $value );
Default Value
0
Remarks
Use this property to define which authentication types the component should support or attempt to use by enabling the relevant bitmask flags:
haBasic | 0x01 | Basic authentication |
haDigest | 0x02 | Digest authentication (RFC 2617) |
haNTLM | 0x04 | Windows NTLM authentication |
haKerberos | 0x08 | Kerberos (Negotiate) authentication |
haOAuth2 | 0x10 | OAuth2 authentication |
Data Type
Integer
BoundPort Property (SecureBlackbox_KMIPServer Class)
Indicates the bound listening port.
Object Oriented Interface
public function getBoundPort();
Procedural Interface
secureblackbox_kmipserver_get($res, 5 );
Default Value
0
Remarks
Check this property to find out the port that has been allocated to the server by the system. The bound port always equals Port if it is provided, or is allocated dynamically if configured to fall in the range between PortRangeFrom and PortRangeTo constraints.
This property is read-only and not available at design time.
Data Type
Integer
CACertBytes Property (SecureBlackbox_KMIPServer Class)
Returns the raw certificate data in DER format.
Object Oriented Interface
public function getCACertBytes();
Procedural Interface
secureblackbox_kmipserver_get($res, 6 );
Remarks
Returns the raw certificate data in DER format.
This property is read-only and not available at design time.
Data Type
Byte Array
CACertHandle Property (SecureBlackbox_KMIPServer Class)
Allows to get or set a 'handle', a unique identifier of the underlying property object.
Object Oriented Interface
public function getCACertHandle(); public function setCACertHandle($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 14 ); secureblackbox_kmipserver_set($res, 14, $value );
Default Value
0
Remarks
Allows to get or set a 'handle', a unique identifier of the underlying property object. Use this property to assign objects of the same type in a quicker manner, without copying them fieldwise.
When you pass a handle of one object to another, the source object is copied to the destination rather than assigned. It is safe to get rid of the original object
after such operation.
pdfSigner.setSigningCertHandle(certMgr.getCertHandle());
This property is not available at design time.
Data Type
Long64
CertificateBytes Property (SecureBlackbox_KMIPServer Class)
Returns the raw certificate data in DER format.
Object Oriented Interface
public function getCertificateBytes();
Procedural Interface
secureblackbox_kmipserver_get($res, 45 );
Remarks
Returns the raw certificate data in DER format.
This property is read-only and not available at design time.
Data Type
Byte Array
CertificateHandle Property (SecureBlackbox_KMIPServer Class)
Allows to get or set a 'handle', a unique identifier of the underlying property object.
Object Oriented Interface
public function getCertificateHandle(); public function setCertificateHandle($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 53 ); secureblackbox_kmipserver_set($res, 53, $value );
Default Value
0
Remarks
Allows to get or set a 'handle', a unique identifier of the underlying property object. Use this property to assign objects of the same type in a quicker manner, without copying them fieldwise.
When you pass a handle of one object to another, the source object is copied to the destination rather than assigned. It is safe to get rid of the original object
after such operation.
pdfSigner.setSigningCertHandle(certMgr.getCertHandle());
This property is not available at design time.
Data Type
Long64
CompressionLevel Property (SecureBlackbox_KMIPServer Class)
The default compression level to use.
Object Oriented Interface
public function getCompressionLevel(); public function setCompressionLevel($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 84 ); secureblackbox_kmipserver_set($res, 84, $value );
Default Value
6
Remarks
Assign this property with the compression level (1 to 9) to apply for gzipped responses. 1 stands for the lightest but fastest compression, and 9 for the best but the slowest.
Data Type
Integer
ExternalCryptoAsyncDocumentID Property (SecureBlackbox_KMIPServer Class)
Specifies an optional document ID for SignAsyncBegin() and SignAsyncEnd() calls.
Object Oriented Interface
public function getExternalCryptoAsyncDocumentID(); public function setExternalCryptoAsyncDocumentID($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 85 ); secureblackbox_kmipserver_set($res, 85, $value );
Default Value
''
Remarks
Specifies an optional document ID for SignAsyncBegin() and SignAsyncEnd() calls.
Use this property when working with multi-signature DCAuth requests and responses to uniquely identify documents signed within a larger batch. On the completion stage, this value helps the signing component identify the correct signature in the returned batch of responses.
If using batched requests, make sure to set this property to the same value on both the pre-signing (SignAsyncBegin) and completion (SignAsyncEnd) stages.
Data Type
String
ExternalCryptoCustomParams Property (SecureBlackbox_KMIPServer Class)
Custom parameters to be passed to the signing service (uninterpreted).
Object Oriented Interface
public function getExternalCryptoCustomParams(); public function setExternalCryptoCustomParams($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 86 ); secureblackbox_kmipserver_set($res, 86, $value );
Default Value
''
Remarks
Custom parameters to be passed to the signing service (uninterpreted).
This property is not available at design time.
Data Type
String
ExternalCryptoData Property (SecureBlackbox_KMIPServer Class)
Additional data to be included in the async state and mirrored back by the requestor.
Object Oriented Interface
public function getExternalCryptoData(); public function setExternalCryptoData($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 87 ); secureblackbox_kmipserver_set($res, 87, $value );
Default Value
''
Remarks
Additional data to be included in the async state and mirrored back by the requestor.
This property is not available at design time.
Data Type
String
ExternalCryptoExternalHashCalculation Property (SecureBlackbox_KMIPServer Class)
Specifies whether the message hash is to be calculated at the external endpoint.
Object Oriented Interface
public function getExternalCryptoExternalHashCalculation(); public function setExternalCryptoExternalHashCalculation($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 88 ); secureblackbox_kmipserver_set($res, 88, $value );
Default Value
false
Remarks
Specifies whether the message hash is to be calculated at the external endpoint. Please note that this mode is not supported by the DCAuth class.
If set to true, the class will pass a few kilobytes of to-be-signed data from the document to the OnExternalSign event. This only applies when SignExternal() is called.
Data Type
Boolean
ExternalCryptoHashAlgorithm Property (SecureBlackbox_KMIPServer Class)
Specifies the request's signature hash algorithm.
Object Oriented Interface
public function getExternalCryptoHashAlgorithm(); public function setExternalCryptoHashAlgorithm($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 89 ); secureblackbox_kmipserver_set($res, 89, $value );
Default Value
'SHA256'
Remarks
Specifies the request's signature hash algorithm.
SB_HASH_ALGORITHM_SHA1 | SHA1 | |
SB_HASH_ALGORITHM_SHA224 | SHA224 | |
SB_HASH_ALGORITHM_SHA256 | SHA256 | |
SB_HASH_ALGORITHM_SHA384 | SHA384 | |
SB_HASH_ALGORITHM_SHA512 | SHA512 | |
SB_HASH_ALGORITHM_MD2 | MD2 | |
SB_HASH_ALGORITHM_MD4 | MD4 | |
SB_HASH_ALGORITHM_MD5 | MD5 | |
SB_HASH_ALGORITHM_RIPEMD160 | RIPEMD160 | |
SB_HASH_ALGORITHM_CRC32 | CRC32 | |
SB_HASH_ALGORITHM_SSL3 | SSL3 | |
SB_HASH_ALGORITHM_GOST_R3411_1994 | GOST1994 | |
SB_HASH_ALGORITHM_WHIRLPOOL | WHIRLPOOL | |
SB_HASH_ALGORITHM_POLY1305 | POLY1305 | |
SB_HASH_ALGORITHM_SHA3_224 | SHA3_224 | |
SB_HASH_ALGORITHM_SHA3_256 | SHA3_256 | |
SB_HASH_ALGORITHM_SHA3_384 | SHA3_384 | |
SB_HASH_ALGORITHM_SHA3_512 | SHA3_512 | |
SB_HASH_ALGORITHM_BLAKE2S_128 | BLAKE2S_128 | |
SB_HASH_ALGORITHM_BLAKE2S_160 | BLAKE2S_160 | |
SB_HASH_ALGORITHM_BLAKE2S_224 | BLAKE2S_224 | |
SB_HASH_ALGORITHM_BLAKE2S_256 | BLAKE2S_256 | |
SB_HASH_ALGORITHM_BLAKE2B_160 | BLAKE2B_160 | |
SB_HASH_ALGORITHM_BLAKE2B_256 | BLAKE2B_256 | |
SB_HASH_ALGORITHM_BLAKE2B_384 | BLAKE2B_384 | |
SB_HASH_ALGORITHM_BLAKE2B_512 | BLAKE2B_512 | |
SB_HASH_ALGORITHM_SHAKE_128 | SHAKE_128 | |
SB_HASH_ALGORITHM_SHAKE_256 | SHAKE_256 | |
SB_HASH_ALGORITHM_SHAKE_128_LEN | SHAKE_128_LEN | |
SB_HASH_ALGORITHM_SHAKE_256_LEN | SHAKE_256_LEN |
Data Type
String
ExternalCryptoKeyID Property (SecureBlackbox_KMIPServer Class)
The ID of the pre-shared key used for DC request authentication.
Object Oriented Interface
public function getExternalCryptoKeyID(); public function setExternalCryptoKeyID($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 90 ); secureblackbox_kmipserver_set($res, 90, $value );
Default Value
''
Remarks
The ID of the pre-shared key used for DC request authentication.
Asynchronous DCAuth-driven communication requires that parties authenticate each other with a secret pre-shared cryptographic key. This provides an extra protection layer for the protocol and diminishes the risk of the private key becoming abused by foreign parties. Use this property to provide the pre-shared key identifier, and use ExternalCryptoKeySecret to pass the key itself.
The same KeyID/KeySecret pair should be used on the DCAuth side for the signing requests to be accepted.
Note: The KeyID/KeySecret scheme is very similar to the AuthKey scheme used in various Cloud service providers to authenticate users.
Example:
signer.ExternalCrypto.KeyID = "MainSigningKey";
signer.ExternalCrypto.KeySecret = "abcdef0123456789";
Data Type
String
ExternalCryptoKeySecret Property (SecureBlackbox_KMIPServer Class)
The pre-shared key used for DC request authentication.
Object Oriented Interface
public function getExternalCryptoKeySecret(); public function setExternalCryptoKeySecret($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 91 ); secureblackbox_kmipserver_set($res, 91, $value );
Default Value
''
Remarks
The pre-shared key used for DC request authentication. This key must be set and match the key used by the DCAuth counterpart for the scheme to work.
Read more about configuring authentication in the ExternalCryptoKeyID topic.
Data Type
String
ExternalCryptoMethod Property (SecureBlackbox_KMIPServer Class)
Specifies the asynchronous signing method.
Object Oriented Interface
public function getExternalCryptoMethod(); public function setExternalCryptoMethod($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 92 ); secureblackbox_kmipserver_set($res, 92, $value );
Default Value
0
Remarks
Specifies the asynchronous signing method. This is typically defined by the DC server capabilities and setup.
Available options:
asmdPKCS1 | 0 |
asmdPKCS7 | 1 |
Data Type
Integer
ExternalCryptoMode Property (SecureBlackbox_KMIPServer Class)
Specifies the external cryptography mode.
Object Oriented Interface
public function getExternalCryptoMode(); public function setExternalCryptoMode($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 93 ); secureblackbox_kmipserver_set($res, 93, $value );
Default Value
0
Remarks
Specifies the external cryptography mode.
Available options:
ecmDefault | The default value (0) |
ecmDisabled | Do not use DC or external signing (1) |
ecmGeneric | Generic external signing with the OnExternalSign event (2) |
ecmDCAuth | DCAuth signing (3) |
ecmDCAuthJSON | DCAuth signing in JSON format (4) |
This property is not available at design time.
Data Type
Integer
ExternalCryptoPublicKeyAlgorithm Property (SecureBlackbox_KMIPServer Class)
Provide the public key algorithm here if the certificate is not available on the pre-signing stage.
Object Oriented Interface
public function getExternalCryptoPublicKeyAlgorithm(); public function setExternalCryptoPublicKeyAlgorithm($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 94 ); secureblackbox_kmipserver_set($res, 94, $value );
Default Value
''
Remarks
Provide the public key algorithm here if the certificate is not available on the pre-signing stage.
SB_CERT_ALGORITHM_ID_RSA_ENCRYPTION | rsaEncryption | |
SB_CERT_ALGORITHM_MD2_RSA_ENCRYPTION | md2withRSAEncryption | |
SB_CERT_ALGORITHM_MD5_RSA_ENCRYPTION | md5withRSAEncryption | |
SB_CERT_ALGORITHM_SHA1_RSA_ENCRYPTION | sha1withRSAEncryption | |
SB_CERT_ALGORITHM_ID_DSA | id-dsa | |
SB_CERT_ALGORITHM_ID_DSA_SHA1 | id-dsa-with-sha1 | |
SB_CERT_ALGORITHM_DH_PUBLIC | dhpublicnumber | |
SB_CERT_ALGORITHM_SHA224_RSA_ENCRYPTION | sha224WithRSAEncryption | |
SB_CERT_ALGORITHM_SHA256_RSA_ENCRYPTION | sha256WithRSAEncryption | |
SB_CERT_ALGORITHM_SHA384_RSA_ENCRYPTION | sha384WithRSAEncryption | |
SB_CERT_ALGORITHM_SHA512_RSA_ENCRYPTION | sha512WithRSAEncryption | |
SB_CERT_ALGORITHM_ID_RSAPSS | id-RSASSA-PSS | |
SB_CERT_ALGORITHM_ID_RSAOAEP | id-RSAES-OAEP | |
SB_CERT_ALGORITHM_RSASIGNATURE_RIPEMD160 | ripemd160withRSA | |
SB_CERT_ALGORITHM_ID_ELGAMAL | elGamal | |
SB_CERT_ALGORITHM_SHA1_ECDSA | ecdsa-with-SHA1 | |
SB_CERT_ALGORITHM_RECOMMENDED_ECDSA | ecdsa-recommended | |
SB_CERT_ALGORITHM_SHA224_ECDSA | ecdsa-with-SHA224 | |
SB_CERT_ALGORITHM_SHA256_ECDSA | ecdsa-with-SHA256 | |
SB_CERT_ALGORITHM_SHA384_ECDSA | ecdsa-with-SHA384 | |
SB_CERT_ALGORITHM_SHA512_ECDSA | ecdsa-with-SHA512 | |
SB_CERT_ALGORITHM_EC | id-ecPublicKey | |
SB_CERT_ALGORITHM_SPECIFIED_ECDSA | ecdsa-specified | |
SB_CERT_ALGORITHM_GOST_R3410_1994 | id-GostR3410-94 | |
SB_CERT_ALGORITHM_GOST_R3410_2001 | id-GostR3410-2001 | |
SB_CERT_ALGORITHM_GOST_R3411_WITH_R3410_1994 | id-GostR3411-94-with-GostR3410-94 | |
SB_CERT_ALGORITHM_GOST_R3411_WITH_R3410_2001 | id-GostR3411-94-with-GostR3410-2001 | |
SB_CERT_ALGORITHM_SHA1_ECDSA_PLAIN | ecdsa-plain-SHA1 | |
SB_CERT_ALGORITHM_SHA224_ECDSA_PLAIN | ecdsa-plain-SHA224 | |
SB_CERT_ALGORITHM_SHA256_ECDSA_PLAIN | ecdsa-plain-SHA256 | |
SB_CERT_ALGORITHM_SHA384_ECDSA_PLAIN | ecdsa-plain-SHA384 | |
SB_CERT_ALGORITHM_SHA512_ECDSA_PLAIN | ecdsa-plain-SHA512 | |
SB_CERT_ALGORITHM_RIPEMD160_ECDSA_PLAIN | ecdsa-plain-RIPEMD160 | |
SB_CERT_ALGORITHM_WHIRLPOOL_RSA_ENCRYPTION | whirlpoolWithRSAEncryption | |
SB_CERT_ALGORITHM_ID_DSA_SHA224 | id-dsa-with-sha224 | |
SB_CERT_ALGORITHM_ID_DSA_SHA256 | id-dsa-with-sha256 | |
SB_CERT_ALGORITHM_SHA3_224_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-sha3-224 | |
SB_CERT_ALGORITHM_SHA3_256_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-sha3-256 | |
SB_CERT_ALGORITHM_SHA3_384_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-sha3-384 | |
SB_CERT_ALGORITHM_SHA3_512_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-sha3-512 | |
SB_CERT_ALGORITHM_SHA3_224_ECDSA | id-ecdsa-with-sha3-224 | |
SB_CERT_ALGORITHM_SHA3_256_ECDSA | id-ecdsa-with-sha3-256 | |
SB_CERT_ALGORITHM_SHA3_384_ECDSA | id-ecdsa-with-sha3-384 | |
SB_CERT_ALGORITHM_SHA3_512_ECDSA | id-ecdsa-with-sha3-512 | |
SB_CERT_ALGORITHM_SHA3_224_ECDSA_PLAIN | id-ecdsa-plain-with-sha3-224 | |
SB_CERT_ALGORITHM_SHA3_256_ECDSA_PLAIN | id-ecdsa-plain-with-sha3-256 | |
SB_CERT_ALGORITHM_SHA3_384_ECDSA_PLAIN | id-ecdsa-plain-with-sha3-384 | |
SB_CERT_ALGORITHM_SHA3_512_ECDSA_PLAIN | id-ecdsa-plain-with-sha3-512 | |
SB_CERT_ALGORITHM_ID_DSA_SHA3_224 | id-dsa-with-sha3-224 | |
SB_CERT_ALGORITHM_ID_DSA_SHA3_256 | id-dsa-with-sha3-256 | |
SB_CERT_ALGORITHM_BLAKE2S_128_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-blake2s128 | |
SB_CERT_ALGORITHM_BLAKE2S_160_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-blake2s160 | |
SB_CERT_ALGORITHM_BLAKE2S_224_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-blake2s224 | |
SB_CERT_ALGORITHM_BLAKE2S_256_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-blake2s256 | |
SB_CERT_ALGORITHM_BLAKE2B_160_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-blake2b160 | |
SB_CERT_ALGORITHM_BLAKE2B_256_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-blake2b256 | |
SB_CERT_ALGORITHM_BLAKE2B_384_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-blake2b384 | |
SB_CERT_ALGORITHM_BLAKE2B_512_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-blake2b512 | |
SB_CERT_ALGORITHM_BLAKE2S_128_ECDSA | id-ecdsa-with-blake2s128 | |
SB_CERT_ALGORITHM_BLAKE2S_160_ECDSA | id-ecdsa-with-blake2s160 | |
SB_CERT_ALGORITHM_BLAKE2S_224_ECDSA | id-ecdsa-with-blake2s224 | |
SB_CERT_ALGORITHM_BLAKE2S_256_ECDSA | id-ecdsa-with-blake2s256 | |
SB_CERT_ALGORITHM_BLAKE2B_160_ECDSA | id-ecdsa-with-blake2b160 | |
SB_CERT_ALGORITHM_BLAKE2B_256_ECDSA | id-ecdsa-with-blake2b256 | |
SB_CERT_ALGORITHM_BLAKE2B_384_ECDSA | id-ecdsa-with-blake2b384 | |
SB_CERT_ALGORITHM_BLAKE2B_512_ECDSA | id-ecdsa-with-blake2b512 | |
SB_CERT_ALGORITHM_BLAKE2S_128_ECDSA_PLAIN | id-ecdsa-plain-with-blake2s128 | |
SB_CERT_ALGORITHM_BLAKE2S_160_ECDSA_PLAIN | id-ecdsa-plain-with-blake2s160 | |
SB_CERT_ALGORITHM_BLAKE2S_224_ECDSA_PLAIN | id-ecdsa-plain-with-blake2s224 | |
SB_CERT_ALGORITHM_BLAKE2S_256_ECDSA_PLAIN | id-ecdsa-plain-with-blake2s256 | |
SB_CERT_ALGORITHM_BLAKE2B_160_ECDSA_PLAIN | id-ecdsa-plain-with-blake2b160 | |
SB_CERT_ALGORITHM_BLAKE2B_256_ECDSA_PLAIN | id-ecdsa-plain-with-blake2b256 | |
SB_CERT_ALGORITHM_BLAKE2B_384_ECDSA_PLAIN | id-ecdsa-plain-with-blake2b384 | |
SB_CERT_ALGORITHM_BLAKE2B_512_ECDSA_PLAIN | id-ecdsa-plain-with-blake2b512 | |
SB_CERT_ALGORITHM_ID_DSA_BLAKE2S_224 | id-dsa-with-blake2s224 | |
SB_CERT_ALGORITHM_ID_DSA_BLAKE2S_256 | id-dsa-with-blake2s256 | |
SB_CERT_ALGORITHM_EDDSA_ED25519 | id-Ed25519 | |
SB_CERT_ALGORITHM_EDDSA_ED448 | id-Ed448 | |
SB_CERT_ALGORITHM_EDDSA_ED25519_PH | id-Ed25519ph | |
SB_CERT_ALGORITHM_EDDSA_ED448_PH | id-Ed448ph | |
SB_CERT_ALGORITHM_EDDSA | id-EdDSA | |
SB_CERT_ALGORITHM_EDDSA_SIGNATURE | id-EdDSA-sig |
Data Type
String
FIPSMode Property (SecureBlackbox_KMIPServer Class)
Reserved.
Object Oriented Interface
public function getFIPSMode(); public function setFIPSMode($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 95 ); secureblackbox_kmipserver_set($res, 95, $value );
Default Value
false
Remarks
This property is reserved for future use.
Data Type
Boolean
HandshakeTimeout Property (SecureBlackbox_KMIPServer Class)
Specifies the handshake timeout in milliseconds.
Object Oriented Interface
public function getHandshakeTimeout(); public function setHandshakeTimeout($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 96 ); secureblackbox_kmipserver_set($res, 96, $value );
Default Value
20000
Remarks
Use this property to set the TLS handshake timeout.
Data Type
Integer
Host Property (SecureBlackbox_KMIPServer Class)
Specifies the host name of the KMIP server.
Object Oriented Interface
public function getHost(); public function setHost($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 97 ); secureblackbox_kmipserver_set($res, 97, $value );
Default Value
''
Remarks
Use this property to specify the address of the KMIP server.
Data Type
String
KeyAlgorithm Property (SecureBlackbox_KMIPServer Class)
The algorithm of the cryptographic key.
Object Oriented Interface
public function getKeyAlgorithm(); public function setKeyAlgorithm($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 98 ); secureblackbox_kmipserver_set($res, 98, $value );
Default Value
''
Remarks
The algorithm of the cryptographic key. A cryptokey object may hold either symmetric, MAC, or public key. Public key algorithms: RSA, ECDSA, Elgamal, DH.
SB_SYMMETRIC_ALGORITHM_RC4 | RC4 | |
SB_SYMMETRIC_ALGORITHM_DES | DES | |
SB_SYMMETRIC_ALGORITHM_3DES | 3DES | |
SB_SYMMETRIC_ALGORITHM_RC2 | RC2 | |
SB_SYMMETRIC_ALGORITHM_AES128 | AES128 | |
SB_SYMMETRIC_ALGORITHM_AES192 | AES192 | |
SB_SYMMETRIC_ALGORITHM_AES256 | AES256 | |
SB_SYMMETRIC_ALGORITHM_IDENTITY | Identity | |
SB_SYMMETRIC_ALGORITHM_BLOWFISH | Blowfish | |
SB_SYMMETRIC_ALGORITHM_CAST128 | CAST128 | |
SB_SYMMETRIC_ALGORITHM_IDEA | IDEA | |
SB_SYMMETRIC_ALGORITHM_TWOFISH | Twofish | |
SB_SYMMETRIC_ALGORITHM_TWOFISH128 | Twofish128 | |
SB_SYMMETRIC_ALGORITHM_TWOFISH192 | Twofish192 | |
SB_SYMMETRIC_ALGORITHM_TWOFISH256 | Twofish256 | |
SB_SYMMETRIC_ALGORITHM_CAMELLIA | Camellia | |
SB_SYMMETRIC_ALGORITHM_CAMELLIA128 | Camellia128 | |
SB_SYMMETRIC_ALGORITHM_CAMELLIA192 | Camellia192 | |
SB_SYMMETRIC_ALGORITHM_CAMELLIA256 | Camellia256 | |
SB_SYMMETRIC_ALGORITHM_SERPENT | Serpent | |
SB_SYMMETRIC_ALGORITHM_SERPENT128 | Serpent128 | |
SB_SYMMETRIC_ALGORITHM_SERPENT192 | Serpent192 | |
SB_SYMMETRIC_ALGORITHM_SERPENT256 | Serpent256 | |
SB_SYMMETRIC_ALGORITHM_SEED | SEED | |
SB_SYMMETRIC_ALGORITHM_RABBIT | Rabbit | |
SB_SYMMETRIC_ALGORITHM_SYMMETRIC | Generic | |
SB_SYMMETRIC_ALGORITHM_GOST_28147_1989 | GOST-28147-1989 | |
SB_SYMMETRIC_ALGORITHM_CHACHA20 | ChaCha20 |
SB_HASH_ALGORITHM_SHA1 | SHA1 | |
SB_HASH_ALGORITHM_SHA224 | SHA224 | |
SB_HASH_ALGORITHM_SHA256 | SHA256 | |
SB_HASH_ALGORITHM_SHA384 | SHA384 | |
SB_HASH_ALGORITHM_SHA512 | SHA512 | |
SB_HASH_ALGORITHM_MD2 | MD2 | |
SB_HASH_ALGORITHM_MD4 | MD4 | |
SB_HASH_ALGORITHM_MD5 | MD5 | |
SB_HASH_ALGORITHM_RIPEMD160 | RIPEMD160 | |
SB_HASH_ALGORITHM_CRC32 | CRC32 | |
SB_HASH_ALGORITHM_SSL3 | SSL3 | |
SB_HASH_ALGORITHM_GOST_R3411_1994 | GOST1994 | |
SB_HASH_ALGORITHM_WHIRLPOOL | WHIRLPOOL | |
SB_HASH_ALGORITHM_POLY1305 | POLY1305 | |
SB_HASH_ALGORITHM_SHA3_224 | SHA3_224 | |
SB_HASH_ALGORITHM_SHA3_256 | SHA3_256 | |
SB_HASH_ALGORITHM_SHA3_384 | SHA3_384 | |
SB_HASH_ALGORITHM_SHA3_512 | SHA3_512 | |
SB_HASH_ALGORITHM_BLAKE2S_128 | BLAKE2S_128 | |
SB_HASH_ALGORITHM_BLAKE2S_160 | BLAKE2S_160 | |
SB_HASH_ALGORITHM_BLAKE2S_224 | BLAKE2S_224 | |
SB_HASH_ALGORITHM_BLAKE2S_256 | BLAKE2S_256 | |
SB_HASH_ALGORITHM_BLAKE2B_160 | BLAKE2B_160 | |
SB_HASH_ALGORITHM_BLAKE2B_256 | BLAKE2B_256 | |
SB_HASH_ALGORITHM_BLAKE2B_384 | BLAKE2B_384 | |
SB_HASH_ALGORITHM_BLAKE2B_512 | BLAKE2B_512 | |
SB_HASH_ALGORITHM_SHAKE_128 | SHAKE_128 | |
SB_HASH_ALGORITHM_SHAKE_256 | SHAKE_256 | |
SB_HASH_ALGORITHM_SHAKE_128_LEN | SHAKE_128_LEN | |
SB_HASH_ALGORITHM_SHAKE_256_LEN | SHAKE_256_LEN |
This property is not available at design time.
Data Type
String
KeyBits Property (SecureBlackbox_KMIPServer Class)
The length of the key in bits.
Object Oriented Interface
public function getKeyBits();
Procedural Interface
secureblackbox_kmipserver_get($res, 99 );
Default Value
0
Remarks
The length of the key in bits.
This property is read-only and not available at design time.
Data Type
Integer
KeyCurve Property (SecureBlackbox_KMIPServer Class)
This property specifies the name of the curve the EC key is built on.
Object Oriented Interface
public function getKeyCurve(); public function setKeyCurve($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 100 ); secureblackbox_kmipserver_set($res, 100, $value );
Default Value
''
Remarks
This property specifies the name of the curve the EC key is built on.
This property is not available at design time.
Data Type
String
KeyExportable Property (SecureBlackbox_KMIPServer Class)
Returns True if the key is exportable (can be serialized into an array of bytes), and False otherwise.
Object Oriented Interface
public function getKeyExportable();
Procedural Interface
secureblackbox_kmipserver_get($res, 101 );
Default Value
false
Remarks
Returns True if the key is exportable (can be serialized into an array of bytes), and False otherwise.
This property is read-only and not available at design time.
Data Type
Boolean
KeyFingerprint Property (SecureBlackbox_KMIPServer Class)
Contains the fingerprint (a hash imprint) of this key.
Object Oriented Interface
public function getKeyFingerprint();
Procedural Interface
secureblackbox_kmipserver_get($res, 102 );
Default Value
''
Remarks
Contains the fingerprint (a hash imprint) of this key.
This property is read-only and not available at design time.
Data Type
String
KeyHandle Property (SecureBlackbox_KMIPServer Class)
Allows to get or set a 'handle', a unique identifier of the underlying property object.
Object Oriented Interface
public function getKeyHandle(); public function setKeyHandle($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 103 ); secureblackbox_kmipserver_set($res, 103, $value );
Default Value
0
Remarks
Allows to get or set a 'handle', a unique identifier of the underlying property object. Use this property to assign objects of the same type in a quicker manner, without copying them fieldwise.
When you pass a handle of one object to another, the source object is copied to the destination rather than assigned. It is safe to get rid of the original object
after such operation.
pdfSigner.setSigningCertHandle(certMgr.getCertHandle());
This property is not available at design time.
Data Type
Long64
KeyID Property (SecureBlackbox_KMIPServer Class)
Provides access to a storage-specific key identifier.
Object Oriented Interface
public function getKeyID(); public function setKeyID($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 104 ); secureblackbox_kmipserver_set($res, 104, $value );
Remarks
Provides access to a storage-specific key identifier. Key identifiers are used by cryptographic providers to refer to a particular key and/or distinguish between different keys. They are typically unique within a storage, but there is no guarantee that a particular cryptoprovider will conform to that (or will assign any key IDs at all).
This property is not available at design time.
Data Type
Byte Array
KeyIV Property (SecureBlackbox_KMIPServer Class)
The initialization vector (IV) of a symmetric key.
Object Oriented Interface
public function getKeyIV(); public function setKeyIV($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 105 ); secureblackbox_kmipserver_set($res, 105, $value );
Remarks
The initialization vector (IV) of a symmetric key. This is normally a public part of a symmetric key, the idea of which is to introduce randomness to the encrypted data and/or serve as a first block in chaining ciphers.
This property is not available at design time.
Data Type
Byte Array
KeyKey Property (SecureBlackbox_KMIPServer Class)
The byte array representation of the key.
Object Oriented Interface
public function getKeyKey();
Procedural Interface
secureblackbox_kmipserver_get($res, 106 );
Remarks
The byte array representation of the key. This may not be available for non-KeyExportable keys.
This property is read-only and not available at design time.
Data Type
Byte Array
KeyNonce Property (SecureBlackbox_KMIPServer Class)
A nonce value associated with a key.
Object Oriented Interface
public function getKeyNonce(); public function setKeyNonce($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 107 ); secureblackbox_kmipserver_set($res, 107, $value );
Remarks
A nonce value associated with a key. It is similar to IV, but its only purpose is to introduce randomness.
This property is not available at design time.
Data Type
Byte Array
KeyPrivate Property (SecureBlackbox_KMIPServer Class)
Returns True if the object hosts a private key, and False otherwise.
Object Oriented Interface
public function getKeyPrivate();
Procedural Interface
secureblackbox_kmipserver_get($res, 108 );
Default Value
false
Remarks
Returns True if the object hosts a private key, and False otherwise.
This property is read-only and not available at design time.
Data Type
Boolean
KeyPublic Property (SecureBlackbox_KMIPServer Class)
Returns True if the object hosts a public key, and False otherwise.
Object Oriented Interface
public function getKeyPublic();
Procedural Interface
secureblackbox_kmipserver_get($res, 109 );
Default Value
false
Remarks
Returns True if the object hosts a public key, and False otherwise.
This property is read-only and not available at design time.
Data Type
Boolean
KeySubject Property (SecureBlackbox_KMIPServer Class)
Returns the key subject.
Object Oriented Interface
public function getKeySubject(); public function setKeySubject($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 110 ); secureblackbox_kmipserver_set($res, 110, $value );
Remarks
Returns the key subject. This is a cryptoprovider-dependent value, which normally aims to provide some user-friendly insight into the key owner.
This property is not available at design time.
Data Type
Byte Array
KeySymmetric Property (SecureBlackbox_KMIPServer Class)
Returns True if the object contains a symmetric key, and False otherwise.
Object Oriented Interface
public function getKeySymmetric();
Procedural Interface
secureblackbox_kmipserver_get($res, 111 );
Default Value
false
Remarks
Returns True if the object contains a symmetric key, and False otherwise.
This property is read-only and not available at design time.
Data Type
Boolean
KeyValid Property (SecureBlackbox_KMIPServer Class)
Returns True if this key is valid.
Object Oriented Interface
public function getKeyValid();
Procedural Interface
secureblackbox_kmipserver_get($res, 112 );
Default Value
false
Remarks
Returns True if this key is valid. The term Valid highly depends on the kind of the key being stored. A symmetric key is considered valid if its length fits the algorithm being set. The validity of an RSA key also ensures that the RSA key elements (primes, exponents, and modulus) are consistent.
This property is read-only and not available at design time.
Data Type
Boolean
PinnedClientAEADCipher Property (SecureBlackbox_KMIPServer Class)
Indicates whether the encryption algorithm used is an AEAD cipher.
Object Oriented Interface
public function getPinnedClientAEADCipher();
Procedural Interface
secureblackbox_kmipserver_get($res, 113 );
Default Value
false
Remarks
Indicates whether the encryption algorithm used is an AEAD cipher.
This property is read-only and not available at design time.
Data Type
Boolean
PinnedClientChainValidationDetails Property (SecureBlackbox_KMIPServer Class)
The details of a certificate chain validation outcome.
Object Oriented Interface
public function getPinnedClientChainValidationDetails();
Procedural Interface
secureblackbox_kmipserver_get($res, 114 );
Default Value
0
Remarks
The details of a certificate chain validation outcome. They may often suggest the reasons that contributed to the overall validation result.
Returns a bit mask of the following options:
cvrBadData | 0x0001 | One or more certificates in the validation path are malformed |
cvrRevoked | 0x0002 | One or more certificates are revoked |
cvrNotYetValid | 0x0004 | One or more certificates are not yet valid |
cvrExpired | 0x0008 | One or more certificates are expired |
cvrInvalidSignature | 0x0010 | A certificate contains a non-valid digital signature |
cvrUnknownCA | 0x0020 | A CA certificate for one or more certificates has not been found (chain incomplete) |
cvrCAUnauthorized | 0x0040 | One of the CA certificates are not authorized to act as CA |
cvrCRLNotVerified | 0x0080 | One or more CRLs could not be verified |
cvrOCSPNotVerified | 0x0100 | One or more OCSP responses could not be verified |
cvrIdentityMismatch | 0x0200 | The identity protected by the certificate (a TLS endpoint or an e-mail addressee) does not match what is recorded in the certificate |
cvrNoKeyUsage | 0x0400 | A mandatory key usage is not enabled in one of the chain certificates |
cvrBlocked | 0x0800 | One or more certificates are blocked |
cvrFailure | 0x1000 | General validation failure |
cvrChainLoop | 0x2000 | Chain loop: one of the CA certificates recursively signs itself |
cvrWeakAlgorithm | 0x4000 | A weak algorithm is used in one of certificates or revocation elements |
cvrUserEnforced | 0x8000 | The chain was considered invalid following intervention from a user code |
This property is read-only and not available at design time.
Data Type
Integer
PinnedClientChainValidationResult Property (SecureBlackbox_KMIPServer Class)
The outcome of a certificate chain validation routine.
Object Oriented Interface
public function getPinnedClientChainValidationResult();
Procedural Interface
secureblackbox_kmipserver_get($res, 115 );
Default Value
0
Remarks
The outcome of a certificate chain validation routine.
Available options:
cvtValid | 0 | The chain is valid |
cvtValidButUntrusted | 1 | The chain is valid, but the root certificate is not trusted |
cvtInvalid | 2 | The chain is not valid (some of certificates are revoked, expired, or contain an invalid signature) |
cvtCantBeEstablished | 3 | The validity of the chain cannot be established because of missing or unavailable validation information (certificates, CRLs, or OCSP responses) |
Use the ValidationLog property to access the detailed validation log.
This property is read-only and not available at design time.
Data Type
Integer
PinnedClientCiphersuite Property (SecureBlackbox_KMIPServer Class)
The cipher suite employed by this connection.
Object Oriented Interface
public function getPinnedClientCiphersuite();
Procedural Interface
secureblackbox_kmipserver_get($res, 116 );
Default Value
''
Remarks
The cipher suite employed by this connection.
For TLS connections, this property returns the ciphersuite that was/is employed by the connection.
This property is read-only and not available at design time.
Data Type
String
PinnedClientClientAuthenticated Property (SecureBlackbox_KMIPServer Class)
Specifies whether client authentication was performed during this connection.
Object Oriented Interface
public function getPinnedClientClientAuthenticated();
Procedural Interface
secureblackbox_kmipserver_get($res, 117 );
Default Value
false
Remarks
Specifies whether client authentication was performed during this connection.
This property is read-only and not available at design time.
Data Type
Boolean
PinnedClientClientAuthRequested Property (SecureBlackbox_KMIPServer Class)
Specifies whether client authentication was requested during this connection.
Object Oriented Interface
public function getPinnedClientClientAuthRequested();
Procedural Interface
secureblackbox_kmipserver_get($res, 118 );
Default Value
false
Remarks
Specifies whether client authentication was requested during this connection.
This property is read-only and not available at design time.
Data Type
Boolean
PinnedClientConnectionEstablished Property (SecureBlackbox_KMIPServer Class)
Indicates whether the connection has been established fully.
Object Oriented Interface
public function getPinnedClientConnectionEstablished();
Procedural Interface
secureblackbox_kmipserver_get($res, 119 );
Default Value
false
Remarks
Indicates whether the connection has been established fully.
This property is read-only and not available at design time.
Data Type
Boolean
PinnedClientConnectionID Property (SecureBlackbox_KMIPServer Class)
The unique identifier assigned to this connection.
Object Oriented Interface
public function getPinnedClientConnectionID();
Procedural Interface
secureblackbox_kmipserver_get($res, 120 );
Remarks
The unique identifier assigned to this connection.
This property is read-only and not available at design time.
Data Type
Byte Array
PinnedClientDigestAlgorithm Property (SecureBlackbox_KMIPServer Class)
The digest algorithm used in a TLS-enabled connection.
Object Oriented Interface
public function getPinnedClientDigestAlgorithm();
Procedural Interface
secureblackbox_kmipserver_get($res, 121 );
Default Value
''
Remarks
The digest algorithm used in a TLS-enabled connection.
This property is read-only and not available at design time.
Data Type
String
PinnedClientEncryptionAlgorithm Property (SecureBlackbox_KMIPServer Class)
The symmetric encryption algorithm used in a TLS-enabled connection.
Object Oriented Interface
public function getPinnedClientEncryptionAlgorithm();
Procedural Interface
secureblackbox_kmipserver_get($res, 122 );
Default Value
''
Remarks
The symmetric encryption algorithm used in a TLS-enabled connection.
This property is read-only and not available at design time.
Data Type
String
PinnedClientExportable Property (SecureBlackbox_KMIPServer Class)
Indicates whether a TLS connection uses a reduced-strength exportable cipher.
Object Oriented Interface
public function getPinnedClientExportable();
Procedural Interface
secureblackbox_kmipserver_get($res, 123 );
Default Value
false
Remarks
Indicates whether a TLS connection uses a reduced-strength exportable cipher.
This property is read-only and not available at design time.
Data Type
Boolean
PinnedClientID Property (SecureBlackbox_KMIPServer Class)
The client connection's unique identifier.
Object Oriented Interface
public function getPinnedClientID();
Procedural Interface
secureblackbox_kmipserver_get($res, 124 );
Default Value
-1
Remarks
The client connection's unique identifier. This value is used throughout to refer to a particular client connection.
This property is read-only and not available at design time.
Data Type
Long64
PinnedClientKeyExchangeAlgorithm Property (SecureBlackbox_KMIPServer Class)
The key exchange algorithm used in a TLS-enabled connection.
Object Oriented Interface
public function getPinnedClientKeyExchangeAlgorithm();
Procedural Interface
secureblackbox_kmipserver_get($res, 125 );
Default Value
''
Remarks
The key exchange algorithm used in a TLS-enabled connection.
This property is read-only and not available at design time.
Data Type
String
PinnedClientKeyExchangeKeyBits Property (SecureBlackbox_KMIPServer Class)
The length of the key exchange key of a TLS-enabled connection.
Object Oriented Interface
public function getPinnedClientKeyExchangeKeyBits();
Procedural Interface
secureblackbox_kmipserver_get($res, 126 );
Default Value
0
Remarks
The length of the key exchange key of a TLS-enabled connection.
This property is read-only and not available at design time.
Data Type
Integer
PinnedClientNamedECCurve Property (SecureBlackbox_KMIPServer Class)
The elliptic curve used in this connection.
Object Oriented Interface
public function getPinnedClientNamedECCurve();
Procedural Interface
secureblackbox_kmipserver_get($res, 127 );
Default Value
''
Remarks
The elliptic curve used in this connection.
This property is read-only and not available at design time.
Data Type
String
PinnedClientPFSCipher Property (SecureBlackbox_KMIPServer Class)
Indicates whether the chosen ciphersuite provides perfect forward secrecy (PFS).
Object Oriented Interface
public function getPinnedClientPFSCipher();
Procedural Interface
secureblackbox_kmipserver_get($res, 128 );
Default Value
false
Remarks
Indicates whether the chosen ciphersuite provides perfect forward secrecy (PFS).
This property is read-only and not available at design time.
Data Type
Boolean
PinnedClientPreSharedIdentity Property (SecureBlackbox_KMIPServer Class)
Specifies the identity used when the PSK (Pre-Shared Key) key-exchange mechanism is negotiated.
Object Oriented Interface
public function getPinnedClientPreSharedIdentity();
Procedural Interface
secureblackbox_kmipserver_get($res, 129 );
Default Value
''
Remarks
Specifies the identity used when the PSK (Pre-Shared Key) key-exchange mechanism is negotiated.
This property is read-only and not available at design time.
Data Type
String
PinnedClientPreSharedIdentityHint Property (SecureBlackbox_KMIPServer Class)
A hint professed by the server to help the client select the PSK identity to use.
Object Oriented Interface
public function getPinnedClientPreSharedIdentityHint();
Procedural Interface
secureblackbox_kmipserver_get($res, 130 );
Default Value
''
Remarks
A hint professed by the server to help the client select the PSK identity to use.
This property is read-only and not available at design time.
Data Type
String
PinnedClientPublicKeyBits Property (SecureBlackbox_KMIPServer Class)
The length of the public key.
Object Oriented Interface
public function getPinnedClientPublicKeyBits();
Procedural Interface
secureblackbox_kmipserver_get($res, 131 );
Default Value
0
Remarks
The length of the public key.
This property is read-only and not available at design time.
Data Type
Integer
PinnedClientRemoteAddress Property (SecureBlackbox_KMIPServer Class)
The client's IP address.
Object Oriented Interface
public function getPinnedClientRemoteAddress();
Procedural Interface
secureblackbox_kmipserver_get($res, 132 );
Default Value
''
Remarks
The client's IP address.
This property is read-only and not available at design time.
Data Type
String
PinnedClientRemotePort Property (SecureBlackbox_KMIPServer Class)
The remote port of the client connection.
Object Oriented Interface
public function getPinnedClientRemotePort();
Procedural Interface
secureblackbox_kmipserver_get($res, 133 );
Default Value
0
Remarks
The remote port of the client connection.
This property is read-only and not available at design time.
Data Type
Integer
PinnedClientResumedSession Property (SecureBlackbox_KMIPServer Class)
Indicates whether a TLS-enabled connection was spawned from another TLS connection.
Object Oriented Interface
public function getPinnedClientResumedSession();
Procedural Interface
secureblackbox_kmipserver_get($res, 134 );
Default Value
false
Remarks
Indicates whether a TLS-enabled connection was spawned from another TLS connection
This property is read-only and not available at design time.
Data Type
Boolean
PinnedClientSecureConnection Property (SecureBlackbox_KMIPServer Class)
Indicates whether TLS or SSL is enabled for this connection.
Object Oriented Interface
public function getPinnedClientSecureConnection();
Procedural Interface
secureblackbox_kmipserver_get($res, 135 );
Default Value
false
Remarks
Indicates whether TLS or SSL is enabled for this connection.
This property is read-only and not available at design time.
Data Type
Boolean
PinnedClientServerAuthenticated Property (SecureBlackbox_KMIPServer Class)
Indicates whether server authentication was performed during a TLS-enabled connection.
Object Oriented Interface
public function getPinnedClientServerAuthenticated();
Procedural Interface
secureblackbox_kmipserver_get($res, 136 );
Default Value
false
Remarks
Indicates whether server authentication was performed during a TLS-enabled connection.
This property is read-only and not available at design time.
Data Type
Boolean
PinnedClientSignatureAlgorithm Property (SecureBlackbox_KMIPServer Class)
The signature algorithm used in a TLS handshake.
Object Oriented Interface
public function getPinnedClientSignatureAlgorithm();
Procedural Interface
secureblackbox_kmipserver_get($res, 137 );
Default Value
''
Remarks
The signature algorithm used in a TLS handshake.
This property is read-only and not available at design time.
Data Type
String
PinnedClientSymmetricBlockSize Property (SecureBlackbox_KMIPServer Class)
The block size of the symmetric algorithm used.
Object Oriented Interface
public function getPinnedClientSymmetricBlockSize();
Procedural Interface
secureblackbox_kmipserver_get($res, 138 );
Default Value
0
Remarks
The block size of the symmetric algorithm used.
This property is read-only and not available at design time.
Data Type
Integer
PinnedClientSymmetricKeyBits Property (SecureBlackbox_KMIPServer Class)
The key length of the symmetric algorithm used.
Object Oriented Interface
public function getPinnedClientSymmetricKeyBits();
Procedural Interface
secureblackbox_kmipserver_get($res, 139 );
Default Value
0
Remarks
The key length of the symmetric algorithm used.
This property is read-only and not available at design time.
Data Type
Integer
PinnedClientTotalBytesReceived Property (SecureBlackbox_KMIPServer Class)
The total number of bytes received over this connection.
Object Oriented Interface
public function getPinnedClientTotalBytesReceived();
Procedural Interface
secureblackbox_kmipserver_get($res, 140 );
Default Value
0
Remarks
The total number of bytes received over this connection.
This property is read-only and not available at design time.
Data Type
Long64
PinnedClientTotalBytesSent Property (SecureBlackbox_KMIPServer Class)
The total number of bytes sent over this connection.
Object Oriented Interface
public function getPinnedClientTotalBytesSent();
Procedural Interface
secureblackbox_kmipserver_get($res, 141 );
Default Value
0
Remarks
The total number of bytes sent over this connection.
This property is read-only and not available at design time.
Data Type
Long64
PinnedClientValidationLog Property (SecureBlackbox_KMIPServer Class)
Contains the server certificate's chain validation log.
Object Oriented Interface
public function getPinnedClientValidationLog();
Procedural Interface
secureblackbox_kmipserver_get($res, 142 );
Default Value
''
Remarks
Contains the server certificate's chain validation log. This information may be very useful in investigating chain validation failures.
This property is read-only and not available at design time.
Data Type
String
PinnedClientVersion Property (SecureBlackbox_KMIPServer Class)
Indicates the version of SSL/TLS protocol negotiated during this connection.
Object Oriented Interface
public function getPinnedClientVersion();
Procedural Interface
secureblackbox_kmipserver_get($res, 143 );
Default Value
''
Remarks
Indicates the version of SSL/TLS protocol negotiated during this connection.
This property is read-only and not available at design time.
Data Type
String
PinnedClientCertCount Property (SecureBlackbox_KMIPServer Class)
The number of records in the PinnedClientCert arrays.
Object Oriented Interface
public function getPinnedClientCertCount();
Procedural Interface
secureblackbox_kmipserver_get($res, 144 );
Default Value
0
Remarks
This property controls the size of the following arrays:
- PinnedClientCertBytes
- PinnedClientCertCAKeyID
- PinnedClientCertFingerprint
- PinnedClientCertHandle
- PinnedClientCertIssuer
- PinnedClientCertIssuerRDN
- PinnedClientCertKeyAlgorithm
- PinnedClientCertKeyBits
- PinnedClientCertKeyFingerprint
- PinnedClientCertKeyUsage
- PinnedClientCertPublicKeyBytes
- PinnedClientCertSelfSigned
- PinnedClientCertSerialNumber
- PinnedClientCertSigAlgorithm
- PinnedClientCertSubject
- PinnedClientCertSubjectKeyID
- PinnedClientCertSubjectRDN
- PinnedClientCertValidFrom
- PinnedClientCertValidTo
This property is read-only and not available at design time.
Data Type
Integer
PinnedClientCertBytes Property (SecureBlackbox_KMIPServer Class)
Returns the raw certificate data in DER format.
Object Oriented Interface
public function getPinnedClientCertBytes($pinnedclientcertindex);
Procedural Interface
secureblackbox_kmipserver_get($res, 145 , $pinnedclientcertindex);
Remarks
Returns the raw certificate data in DER format.
The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.
This property is read-only and not available at design time.
Data Type
Byte Array
PinnedClientCertCAKeyID Property (SecureBlackbox_KMIPServer Class)
A unique identifier (fingerprint) of the CA certificate's cryptographic key.
Object Oriented Interface
public function getPinnedClientCertCAKeyID($pinnedclientcertindex);
Procedural Interface
secureblackbox_kmipserver_get($res, 147 , $pinnedclientcertindex);
Remarks
A unique identifier (fingerprint) of the CA certificate's cryptographic key.
Authority Key Identifier is a certificate extension which allows identification of certificates belonging to the same issuer, but with different public keys. It is a de-facto standard to include this extension in all certificates to facilitate chain building.
This setting cannot be set when generating a certificate as it always derives from another certificate property. CertificateManager generates this setting automatically if enough information is available to it: for self-signed certificates, this value is copied from the PinnedClientCertSubjectKeyID setting, and for lower-level certificates, from the parent certificate's subject key ID extension.
The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.
This property is read-only and not available at design time.
Data Type
Byte Array
PinnedClientCertFingerprint Property (SecureBlackbox_KMIPServer Class)
Contains the fingerprint (a hash imprint) of this certificate.
Object Oriented Interface
public function getPinnedClientCertFingerprint($pinnedclientcertindex);
Procedural Interface
secureblackbox_kmipserver_get($res, 151 , $pinnedclientcertindex);
Default Value
''
Remarks
Contains the fingerprint (a hash imprint) of this certificate.
While there is no formal standard defining what a fingerprint is, a SHA1 hash of the certificate's DER-encoded body is typically used.
The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.
This property is read-only and not available at design time.
Data Type
String
PinnedClientCertHandle Property (SecureBlackbox_KMIPServer Class)
Allows to get or set a 'handle', a unique identifier of the underlying property object.
Object Oriented Interface
public function getPinnedClientCertHandle($pinnedclientcertindex);
Procedural Interface
secureblackbox_kmipserver_get($res, 153 , $pinnedclientcertindex);
Default Value
0
Remarks
Allows to get or set a 'handle', a unique identifier of the underlying property object. Use this property to assign objects of the same type in a quicker manner, without copying them fieldwise.
When you pass a handle of one object to another, the source object is copied to the destination rather than assigned. It is safe to get rid of the original object
after such operation.
pdfSigner.setSigningCertHandle(certMgr.getCertHandle());
The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.
This property is read-only and not available at design time.
Data Type
Long64
PinnedClientCertIssuer Property (SecureBlackbox_KMIPServer Class)
The common name of the certificate issuer (CA), typically a company name.
Object Oriented Interface
public function getPinnedClientCertIssuer($pinnedclientcertindex);
Procedural Interface
secureblackbox_kmipserver_get($res, 155 , $pinnedclientcertindex);
Default Value
''
Remarks
The common name of the certificate issuer (CA), typically a company name. This is part of a larger set of credentials available via PinnedClientCertIssuerRDN.
The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.
This property is read-only and not available at design time.
Data Type
String
PinnedClientCertIssuerRDN Property (SecureBlackbox_KMIPServer Class)
A list of Property=Value pairs that uniquely identify the certificate issuer.
Object Oriented Interface
public function getPinnedClientCertIssuerRDN($pinnedclientcertindex);
Procedural Interface
secureblackbox_kmipserver_get($res, 156 , $pinnedclientcertindex);
Default Value
''
Remarks
A list of Property=Value pairs that uniquely identify the certificate issuer.
Example: /C=US/O=Nationwide CA/CN=Web Certification Authority
The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.
This property is read-only and not available at design time.
Data Type
String
PinnedClientCertKeyAlgorithm Property (SecureBlackbox_KMIPServer Class)
Specifies the public key algorithm of this certificate.
Object Oriented Interface
public function getPinnedClientCertKeyAlgorithm($pinnedclientcertindex);
Procedural Interface
secureblackbox_kmipserver_get($res, 157 , $pinnedclientcertindex);
Default Value
'0'
Remarks
Specifies the public key algorithm of this certificate.
SB_CERT_ALGORITHM_ID_RSA_ENCRYPTION | rsaEncryption | |
SB_CERT_ALGORITHM_MD2_RSA_ENCRYPTION | md2withRSAEncryption | |
SB_CERT_ALGORITHM_MD5_RSA_ENCRYPTION | md5withRSAEncryption | |
SB_CERT_ALGORITHM_SHA1_RSA_ENCRYPTION | sha1withRSAEncryption | |
SB_CERT_ALGORITHM_ID_DSA | id-dsa | |
SB_CERT_ALGORITHM_ID_DSA_SHA1 | id-dsa-with-sha1 | |
SB_CERT_ALGORITHM_DH_PUBLIC | dhpublicnumber | |
SB_CERT_ALGORITHM_SHA224_RSA_ENCRYPTION | sha224WithRSAEncryption | |
SB_CERT_ALGORITHM_SHA256_RSA_ENCRYPTION | sha256WithRSAEncryption | |
SB_CERT_ALGORITHM_SHA384_RSA_ENCRYPTION | sha384WithRSAEncryption | |
SB_CERT_ALGORITHM_SHA512_RSA_ENCRYPTION | sha512WithRSAEncryption | |
SB_CERT_ALGORITHM_ID_RSAPSS | id-RSASSA-PSS | |
SB_CERT_ALGORITHM_ID_RSAOAEP | id-RSAES-OAEP | |
SB_CERT_ALGORITHM_RSASIGNATURE_RIPEMD160 | ripemd160withRSA | |
SB_CERT_ALGORITHM_ID_ELGAMAL | elGamal | |
SB_CERT_ALGORITHM_SHA1_ECDSA | ecdsa-with-SHA1 | |
SB_CERT_ALGORITHM_RECOMMENDED_ECDSA | ecdsa-recommended | |
SB_CERT_ALGORITHM_SHA224_ECDSA | ecdsa-with-SHA224 | |
SB_CERT_ALGORITHM_SHA256_ECDSA | ecdsa-with-SHA256 | |
SB_CERT_ALGORITHM_SHA384_ECDSA | ecdsa-with-SHA384 | |
SB_CERT_ALGORITHM_SHA512_ECDSA | ecdsa-with-SHA512 | |
SB_CERT_ALGORITHM_EC | id-ecPublicKey | |
SB_CERT_ALGORITHM_SPECIFIED_ECDSA | ecdsa-specified | |
SB_CERT_ALGORITHM_GOST_R3410_1994 | id-GostR3410-94 | |
SB_CERT_ALGORITHM_GOST_R3410_2001 | id-GostR3410-2001 | |
SB_CERT_ALGORITHM_GOST_R3411_WITH_R3410_1994 | id-GostR3411-94-with-GostR3410-94 | |
SB_CERT_ALGORITHM_GOST_R3411_WITH_R3410_2001 | id-GostR3411-94-with-GostR3410-2001 | |
SB_CERT_ALGORITHM_SHA1_ECDSA_PLAIN | ecdsa-plain-SHA1 | |
SB_CERT_ALGORITHM_SHA224_ECDSA_PLAIN | ecdsa-plain-SHA224 | |
SB_CERT_ALGORITHM_SHA256_ECDSA_PLAIN | ecdsa-plain-SHA256 | |
SB_CERT_ALGORITHM_SHA384_ECDSA_PLAIN | ecdsa-plain-SHA384 | |
SB_CERT_ALGORITHM_SHA512_ECDSA_PLAIN | ecdsa-plain-SHA512 | |
SB_CERT_ALGORITHM_RIPEMD160_ECDSA_PLAIN | ecdsa-plain-RIPEMD160 | |
SB_CERT_ALGORITHM_WHIRLPOOL_RSA_ENCRYPTION | whirlpoolWithRSAEncryption | |
SB_CERT_ALGORITHM_ID_DSA_SHA224 | id-dsa-with-sha224 | |
SB_CERT_ALGORITHM_ID_DSA_SHA256 | id-dsa-with-sha256 | |
SB_CERT_ALGORITHM_SHA3_224_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-sha3-224 | |
SB_CERT_ALGORITHM_SHA3_256_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-sha3-256 | |
SB_CERT_ALGORITHM_SHA3_384_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-sha3-384 | |
SB_CERT_ALGORITHM_SHA3_512_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-sha3-512 | |
SB_CERT_ALGORITHM_SHA3_224_ECDSA | id-ecdsa-with-sha3-224 | |
SB_CERT_ALGORITHM_SHA3_256_ECDSA | id-ecdsa-with-sha3-256 | |
SB_CERT_ALGORITHM_SHA3_384_ECDSA | id-ecdsa-with-sha3-384 | |
SB_CERT_ALGORITHM_SHA3_512_ECDSA | id-ecdsa-with-sha3-512 | |
SB_CERT_ALGORITHM_SHA3_224_ECDSA_PLAIN | id-ecdsa-plain-with-sha3-224 | |
SB_CERT_ALGORITHM_SHA3_256_ECDSA_PLAIN | id-ecdsa-plain-with-sha3-256 | |
SB_CERT_ALGORITHM_SHA3_384_ECDSA_PLAIN | id-ecdsa-plain-with-sha3-384 | |
SB_CERT_ALGORITHM_SHA3_512_ECDSA_PLAIN | id-ecdsa-plain-with-sha3-512 | |
SB_CERT_ALGORITHM_ID_DSA_SHA3_224 | id-dsa-with-sha3-224 | |
SB_CERT_ALGORITHM_ID_DSA_SHA3_256 | id-dsa-with-sha3-256 | |
SB_CERT_ALGORITHM_BLAKE2S_128_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-blake2s128 | |
SB_CERT_ALGORITHM_BLAKE2S_160_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-blake2s160 | |
SB_CERT_ALGORITHM_BLAKE2S_224_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-blake2s224 | |
SB_CERT_ALGORITHM_BLAKE2S_256_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-blake2s256 | |
SB_CERT_ALGORITHM_BLAKE2B_160_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-blake2b160 | |
SB_CERT_ALGORITHM_BLAKE2B_256_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-blake2b256 | |
SB_CERT_ALGORITHM_BLAKE2B_384_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-blake2b384 | |
SB_CERT_ALGORITHM_BLAKE2B_512_RSA_ENCRYPTION | id-rsassa-pkcs1-v1_5-with-blake2b512 | |
SB_CERT_ALGORITHM_BLAKE2S_128_ECDSA | id-ecdsa-with-blake2s128 | |
SB_CERT_ALGORITHM_BLAKE2S_160_ECDSA | id-ecdsa-with-blake2s160 | |
SB_CERT_ALGORITHM_BLAKE2S_224_ECDSA | id-ecdsa-with-blake2s224 | |
SB_CERT_ALGORITHM_BLAKE2S_256_ECDSA | id-ecdsa-with-blake2s256 | |
SB_CERT_ALGORITHM_BLAKE2B_160_ECDSA | id-ecdsa-with-blake2b160 | |
SB_CERT_ALGORITHM_BLAKE2B_256_ECDSA | id-ecdsa-with-blake2b256 | |
SB_CERT_ALGORITHM_BLAKE2B_384_ECDSA | id-ecdsa-with-blake2b384 | |
SB_CERT_ALGORITHM_BLAKE2B_512_ECDSA | id-ecdsa-with-blake2b512 | |
SB_CERT_ALGORITHM_BLAKE2S_128_ECDSA_PLAIN | id-ecdsa-plain-with-blake2s128 | |
SB_CERT_ALGORITHM_BLAKE2S_160_ECDSA_PLAIN | id-ecdsa-plain-with-blake2s160 | |
SB_CERT_ALGORITHM_BLAKE2S_224_ECDSA_PLAIN | id-ecdsa-plain-with-blake2s224 | |
SB_CERT_ALGORITHM_BLAKE2S_256_ECDSA_PLAIN | id-ecdsa-plain-with-blake2s256 | |
SB_CERT_ALGORITHM_BLAKE2B_160_ECDSA_PLAIN | id-ecdsa-plain-with-blake2b160 | |
SB_CERT_ALGORITHM_BLAKE2B_256_ECDSA_PLAIN | id-ecdsa-plain-with-blake2b256 | |
SB_CERT_ALGORITHM_BLAKE2B_384_ECDSA_PLAIN | id-ecdsa-plain-with-blake2b384 | |
SB_CERT_ALGORITHM_BLAKE2B_512_ECDSA_PLAIN | id-ecdsa-plain-with-blake2b512 | |
SB_CERT_ALGORITHM_ID_DSA_BLAKE2S_224 | id-dsa-with-blake2s224 | |
SB_CERT_ALGORITHM_ID_DSA_BLAKE2S_256 | id-dsa-with-blake2s256 | |
SB_CERT_ALGORITHM_EDDSA_ED25519 | id-Ed25519 | |
SB_CERT_ALGORITHM_EDDSA_ED448 | id-Ed448 | |
SB_CERT_ALGORITHM_EDDSA_ED25519_PH | id-Ed25519ph | |
SB_CERT_ALGORITHM_EDDSA_ED448_PH | id-Ed448ph | |
SB_CERT_ALGORITHM_EDDSA | id-EdDSA | |
SB_CERT_ALGORITHM_EDDSA_SIGNATURE | id-EdDSA-sig |
Use the PinnedClientCertKeyBits, PinnedClientCertCurve, and PinnedClientCertPublicKeyBytes properties to get more details about the key the certificate contains.
The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.
This property is read-only and not available at design time.
Data Type
String
PinnedClientCertKeyBits Property (SecureBlackbox_KMIPServer Class)
Returns the length of the public key in bits.
Object Oriented Interface
public function getPinnedClientCertKeyBits($pinnedclientcertindex);
Procedural Interface
secureblackbox_kmipserver_get($res, 158 , $pinnedclientcertindex);
Default Value
0
Remarks
Returns the length of the public key in bits.
This value indicates the length of the principal cryptographic parameter of the key, such as the length of the RSA modulus or ECDSA field. The key data returned by the PinnedClientCertPublicKeyBytes or PinnedClientCertPrivateKeyBytes property would typically contain auxiliary values, and therefore be longer.
The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.
This property is read-only and not available at design time.
Data Type
Integer
PinnedClientCertKeyFingerprint Property (SecureBlackbox_KMIPServer Class)
Returns a SHA1 fingerprint of the public key contained in the certificate.
Object Oriented Interface
public function getPinnedClientCertKeyFingerprint($pinnedclientcertindex);
Procedural Interface
secureblackbox_kmipserver_get($res, 159 , $pinnedclientcertindex);
Default Value
''
Remarks
Returns a SHA1 fingerprint of the public key contained in the certificate.
Note that the key fingerprint is different from the certificate fingerprint accessible via the PinnedClientCertFingerprint property. The key fingeprint uniquely identifies the public key, and so can be the same for multiple certificates containing the same key.
The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.
This property is read-only and not available at design time.
Data Type
String
PinnedClientCertKeyUsage Property (SecureBlackbox_KMIPServer Class)
Indicates the purposes of the key contained in the certificate, in the form of an OR'ed flag set.
Object Oriented Interface
public function getPinnedClientCertKeyUsage($pinnedclientcertindex);
Procedural Interface
secureblackbox_kmipserver_get($res, 160 , $pinnedclientcertindex);
Default Value
0
Remarks
Indicates the purposes of the key contained in the certificate, in the form of an OR'ed flag set.
This value is a bit mask of the following values:
ckuUnknown | 0x00000 | Unknown key usage |
ckuDigitalSignature | 0x00001 | Digital signature |
ckuNonRepudiation | 0x00002 | Non-repudiation |
ckuKeyEncipherment | 0x00004 | Key encipherment |
ckuDataEncipherment | 0x00008 | Data encipherment |
ckuKeyAgreement | 0x00010 | Key agreement |
ckuKeyCertSign | 0x00020 | Certificate signing |
ckuCRLSign | 0x00040 | Revocation signing |
ckuEncipherOnly | 0x00080 | Encipher only |
ckuDecipherOnly | 0x00100 | Decipher only |
ckuServerAuthentication | 0x00200 | Server authentication |
ckuClientAuthentication | 0x00400 | Client authentication |
ckuCodeSigning | 0x00800 | Code signing |
ckuEmailProtection | 0x01000 | Email protection |
ckuTimeStamping | 0x02000 | Timestamping |
ckuOCSPSigning | 0x04000 | OCSP signing |
ckuSmartCardLogon | 0x08000 | Smartcard logon |
ckuKeyPurposeClientAuth | 0x10000 | Kerberos - client authentication |
ckuKeyPurposeKDC | 0x20000 | Kerberos - KDC |
Set this property before generating the certificate to propagate the key usage flags to the new certificate.
The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.
This property is read-only and not available at design time.
Data Type
Integer
PinnedClientCertPublicKeyBytes Property (SecureBlackbox_KMIPServer Class)
Contains the certificate's public key in DER format.
Object Oriented Interface
public function getPinnedClientCertPublicKeyBytes($pinnedclientcertindex);
Procedural Interface
secureblackbox_kmipserver_get($res, 169 , $pinnedclientcertindex);
Remarks
Contains the certificate's public key in DER format.
This typically would contain an ASN.1-encoded public key value. The exact format depends on the type of the public key contained in the certificate.
The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.
This property is read-only and not available at design time.
Data Type
Byte Array
PinnedClientCertSelfSigned Property (SecureBlackbox_KMIPServer Class)
Indicates whether the certificate is self-signed (root) or signed by an external CA.
Object Oriented Interface
public function getPinnedClientCertSelfSigned($pinnedclientcertindex);
Procedural Interface
secureblackbox_kmipserver_get($res, 173 , $pinnedclientcertindex);
Default Value
false
Remarks
Indicates whether the certificate is self-signed (root) or signed by an external CA.
The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.
This property is read-only and not available at design time.
Data Type
Boolean
PinnedClientCertSerialNumber Property (SecureBlackbox_KMIPServer Class)
Returns the certificate's serial number.
Object Oriented Interface
public function getPinnedClientCertSerialNumber($pinnedclientcertindex);
Procedural Interface
secureblackbox_kmipserver_get($res, 174 , $pinnedclientcertindex);
Remarks
Returns the certificate's serial number.
The serial number is a binary string that uniquely identifies a certificate among others issued by the same CA. According to the X.509 standard, the (issuer, serial number) pair should be globally unique to facilitate chain building.
The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.
This property is read-only and not available at design time.
Data Type
Byte Array
PinnedClientCertSigAlgorithm Property (SecureBlackbox_KMIPServer Class)
Indicates the algorithm that was used by the CA to sign this certificate.
Object Oriented Interface
public function getPinnedClientCertSigAlgorithm($pinnedclientcertindex);
Procedural Interface
secureblackbox_kmipserver_get($res, 175 , $pinnedclientcertindex);
Default Value
''
Remarks
Indicates the algorithm that was used by the CA to sign this certificate.
A signature algorithm typically combines hash and public key algorithms together, such as sha256WithRSAEncryption or ecdsa-with-SHA256.
The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.
This property is read-only and not available at design time.
Data Type
String
PinnedClientCertSubject Property (SecureBlackbox_KMIPServer Class)
The common name of the certificate holder, typically an individual's name, a URL, an e-mail address, or a company name.
Object Oriented Interface
public function getPinnedClientCertSubject($pinnedclientcertindex);
Procedural Interface
secureblackbox_kmipserver_get($res, 177 , $pinnedclientcertindex);
Default Value
''
Remarks
The common name of the certificate holder, typically an individual's name, a URL, an e-mail address, or a company name. This is part of a larger set of credentials available via PinnedClientCertSubjectRDN.
The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.
This property is read-only and not available at design time.
Data Type
String
PinnedClientCertSubjectKeyID Property (SecureBlackbox_KMIPServer Class)
Contains a unique identifier of the certificate's cryptographic key.
Object Oriented Interface
public function getPinnedClientCertSubjectKeyID($pinnedclientcertindex);
Procedural Interface
secureblackbox_kmipserver_get($res, 179 , $pinnedclientcertindex);
Remarks
Contains a unique identifier of the certificate's cryptographic key.
Subject Key Identifier is a certificate extension which allows a specific public key to be associated with a certificate holder. Typically, subject key identifiers of CA certificates are recorded as respective CA key identifiers in the subordinate certificates that they issue, which facilitates chain building.
The PinnedClientCertSubjectKeyID and PinnedClientCertCAKeyID properties of self-signed certificates typically contain identical values, as in that specific case, the issuer and the subject are the same entity.
The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.
This property is read-only and not available at design time.
Data Type
Byte Array
PinnedClientCertSubjectRDN Property (SecureBlackbox_KMIPServer Class)
A list of Property=Value pairs that uniquely identify the certificate holder (subject).
Object Oriented Interface
public function getPinnedClientCertSubjectRDN($pinnedclientcertindex);
Procedural Interface
secureblackbox_kmipserver_get($res, 180 , $pinnedclientcertindex);
Default Value
''
Remarks
A list of Property=Value pairs that uniquely identify the certificate holder (subject).
Depending on the purpose of the certificate and the policies of the CA that issued it, the values included in the subject record may differ drastically and contain business or personal names, web URLs, email addresses, and other data.
Example: /C=US/O=Oranges and Apples, Inc./OU=Accounts Receivable/1.2.3.4.5=Value with unknown OID/CN=Margaret Watkins.
The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.
This property is read-only and not available at design time.
Data Type
String
PinnedClientCertValidFrom Property (SecureBlackbox_KMIPServer Class)
The time point at which the certificate becomes valid, in UTC.
Object Oriented Interface
public function getPinnedClientCertValidFrom($pinnedclientcertindex);
Procedural Interface
secureblackbox_kmipserver_get($res, 182 , $pinnedclientcertindex);
Default Value
''
Remarks
The time point at which the certificate becomes valid, in UTC.
The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.
This property is read-only and not available at design time.
Data Type
String
PinnedClientCertValidTo Property (SecureBlackbox_KMIPServer Class)
The time point at which the certificate expires, in UTC.
Object Oriented Interface
public function getPinnedClientCertValidTo($pinnedclientcertindex);
Procedural Interface
secureblackbox_kmipserver_get($res, 183 , $pinnedclientcertindex);
Default Value
''
Remarks
The time point at which the certificate expires, in UTC.
The $pinnedclientcertindex parameter specifies the index of the item in the array. The size of the array is controlled by the PinnedClientCertCount property.
This property is read-only and not available at design time.
Data Type
String
Port Property (SecureBlackbox_KMIPServer Class)
A port to listen for connections on.
Object Oriented Interface
public function getPort(); public function setPort($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 184 ); secureblackbox_kmipserver_set($res, 184, $value );
Default Value
5696
Remarks
Use this property to specify the listening port.
Data Type
Integer
ReadOnly Property (SecureBlackbox_KMIPServer Class)
Controls whether the server works in read-only mode.
Object Oriented Interface
public function getReadOnly(); public function setReadOnly($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 185 ); secureblackbox_kmipserver_set($res, 185, $value );
Default Value
false
Remarks
Use this property to enable or disable read-only mode on the server. It is an easy way to prevent connecting users from adding or removing objects managed by the server.
This property is not available at design time.
Data Type
Boolean
SessionTimeout Property (SecureBlackbox_KMIPServer Class)
Specifies the default session timeout value in milliseconds.
Object Oriented Interface
public function getSessionTimeout(); public function setSessionTimeout($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 186 ); secureblackbox_kmipserver_set($res, 186, $value );
Default Value
360000
Remarks
Specifies the period of inactivity (in milliseconds) after which the connection will be terminated by the server.
Data Type
Integer
SocketIncomingSpeedLimit Property (SecureBlackbox_KMIPServer Class)
The maximum number of bytes to read from the socket, per second.
Object Oriented Interface
public function getSocketIncomingSpeedLimit(); public function setSocketIncomingSpeedLimit($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 192 ); secureblackbox_kmipserver_set($res, 192, $value );
Default Value
0
Remarks
The maximum number of bytes to read from the socket, per second.
Data Type
Integer
SocketLocalAddress Property (SecureBlackbox_KMIPServer Class)
The local network interface to bind the socket to.
Object Oriented Interface
public function getSocketLocalAddress(); public function setSocketLocalAddress($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 193 ); secureblackbox_kmipserver_set($res, 193, $value );
Default Value
''
Remarks
The local network interface to bind the socket to.
Data Type
String
SocketLocalPort Property (SecureBlackbox_KMIPServer Class)
The local port number to bind the socket to.
Object Oriented Interface
public function getSocketLocalPort(); public function setSocketLocalPort($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 194 ); secureblackbox_kmipserver_set($res, 194, $value );
Default Value
0
Remarks
The local port number to bind the socket to.
Data Type
Integer
SocketOutgoingSpeedLimit Property (SecureBlackbox_KMIPServer Class)
The maximum number of bytes to write to the socket, per second.
Object Oriented Interface
public function getSocketOutgoingSpeedLimit(); public function setSocketOutgoingSpeedLimit($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 195 ); secureblackbox_kmipserver_set($res, 195, $value );
Default Value
0
Remarks
The maximum number of bytes to write to the socket, per second.
Data Type
Integer
SocketTimeout Property (SecureBlackbox_KMIPServer Class)
The maximum period of waiting, in milliseconds, after which the socket operation is considered unsuccessful.
Object Oriented Interface
public function getSocketTimeout(); public function setSocketTimeout($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 196 ); secureblackbox_kmipserver_set($res, 196, $value );
Default Value
60000
Remarks
The maximum period of waiting, in milliseconds, after which the socket operation is considered unsuccessful.
If Timeout is set to 0, a socket operation will expire after the system-default timeout (2 hrs 8 min for TCP stack).
Data Type
Integer
SocketUseIPv6 Property (SecureBlackbox_KMIPServer Class)
Enables or disables IP protocol version 6.
Object Oriented Interface
public function getSocketUseIPv6(); public function setSocketUseIPv6($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 197 ); secureblackbox_kmipserver_set($res, 197, $value );
Default Value
false
Remarks
Enables or disables IP protocol version 6.
Data Type
Boolean
StorageFileName Property (SecureBlackbox_KMIPServer Class)
A path to the KMIP object database.
Object Oriented Interface
public function getStorageFileName(); public function setStorageFileName($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 198 ); secureblackbox_kmipserver_set($res, 198, $value );
Default Value
''
Remarks
Assign the path to the database of objects managed by the KMIP server to this property.
Data Type
String
TLSServerCertCount Property (SecureBlackbox_KMIPServer Class)
The number of records in the TLSServerCert arrays.
Object Oriented Interface
public function getTLSServerCertCount(); public function setTLSServerCertCount($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 199 ); secureblackbox_kmipserver_set($res, 199, $value );
Default Value
0
Remarks
This property controls the size of the following arrays:
The array indices start at 0 and end at TLSServerCertCount - 1.This property is not available at design time.
Data Type
Integer
TLSServerCertBytes Property (SecureBlackbox_KMIPServer Class)
Returns the raw certificate data in DER format.
Object Oriented Interface
public function getTLSServerCertBytes($tlsservercertindex);
Procedural Interface
secureblackbox_kmipserver_get($res, 200 , $tlsservercertindex);
Remarks
Returns the raw certificate data in DER format.
The $tlsservercertindex parameter specifies the index of the item in the array. The size of the array is controlled by the TLSServerCertCount property.
This property is read-only and not available at design time.
Data Type
Byte Array
TLSServerCertHandle Property (SecureBlackbox_KMIPServer Class)
Allows to get or set a 'handle', a unique identifier of the underlying property object.
Object Oriented Interface
public function getTLSServerCertHandle($tlsservercertindex); public function setTLSServerCertHandle($tlsservercertindex, $value);
Procedural Interface
secureblackbox_kmipserver_get($res, 208 , $tlsservercertindex); secureblackbox_kmipserver_set($res, 208, $value , $tlsservercertindex);
Default Value
0
Remarks
Allows to get or set a 'handle', a unique identifier of the underlying property object. Use this property to assign objects of the same type in a quicker manner, without copying them fieldwise.
When you pass a handle of one object to another, the source object is copied to the destination rather than assigned. It is safe to get rid of the original object
after such operation.
pdfSigner.setSigningCertHandle(certMgr.getCertHandle());
The $tlsservercertindex parameter specifies the index of the item in the array. The size of the array is controlled by the TLSServerCertCount property.
This property is not available at design time.
Data Type
Long64
TLSAutoValidateCertificates Property (SecureBlackbox_KMIPServer Class)
Specifies whether server-side TLS certificates should be validated automatically using internal validation rules.
Object Oriented Interface
public function getTLSAutoValidateCertificates(); public function setTLSAutoValidateCertificates($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 239 ); secureblackbox_kmipserver_set($res, 239, $value );
Default Value
true
Remarks
Specifies whether server-side TLS certificates should be validated automatically using internal validation rules.
Data Type
Boolean
TLSBaseConfiguration Property (SecureBlackbox_KMIPServer Class)
Selects the base configuration for the TLS settings.
Object Oriented Interface
public function getTLSBaseConfiguration(); public function setTLSBaseConfiguration($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 240 ); secureblackbox_kmipserver_set($res, 240, $value );
Default Value
0
Remarks
Selects the base configuration for the TLS settings. Several profiles are offered and tuned up for different purposes, such as high security or higher compatibility.
stpcDefault | 0 | |
stpcCompatible | 1 | |
stpcComprehensiveInsecure | 2 | |
stpcHighlySecure | 3 |
Data Type
Integer
TLSCiphersuites Property (SecureBlackbox_KMIPServer Class)
A list of ciphersuites separated with commas or semicolons.
Object Oriented Interface
public function getTLSCiphersuites(); public function setTLSCiphersuites($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 241 ); secureblackbox_kmipserver_set($res, 241, $value );
Default Value
''
Remarks
A list of ciphersuites separated with commas or semicolons. Each ciphersuite in the list may be prefixed with a minus sign (-) to indicate that the ciphersuite should be disabled rather than enabled. Besides the specific ciphersuite modifiers, this property supports the all (and -all) aliases, allowing all ciphersuites to be blanketly enabled or disabled at once.
Note: the list of ciphersuites provided to this property alters the baseline list of ciphersuites as defined by TLSBaseConfiguration. Remember to start your ciphersuite string with -all; if you need to only enable a specific fixed set of ciphersuites. The list of supported ciphersuites is provided below:
- NULL_NULL_NULL
- RSA_NULL_MD5
- RSA_NULL_SHA
- RSA_RC4_MD5
- RSA_RC4_SHA
- RSA_RC2_MD5
- RSA_IDEA_MD5
- RSA_IDEA_SHA
- RSA_DES_MD5
- RSA_DES_SHA
- RSA_3DES_MD5
- RSA_3DES_SHA
- RSA_AES128_SHA
- RSA_AES256_SHA
- DH_DSS_DES_SHA
- DH_DSS_3DES_SHA
- DH_DSS_AES128_SHA
- DH_DSS_AES256_SHA
- DH_RSA_DES_SHA
- DH_RSA_3DES_SHA
- DH_RSA_AES128_SHA
- DH_RSA_AES256_SHA
- DHE_DSS_DES_SHA
- DHE_DSS_3DES_SHA
- DHE_DSS_AES128_SHA
- DHE_DSS_AES256_SHA
- DHE_RSA_DES_SHA
- DHE_RSA_3DES_SHA
- DHE_RSA_AES128_SHA
- DHE_RSA_AES256_SHA
- DH_ANON_RC4_MD5
- DH_ANON_DES_SHA
- DH_ANON_3DES_SHA
- DH_ANON_AES128_SHA
- DH_ANON_AES256_SHA
- RSA_RC2_MD5_EXPORT
- RSA_RC4_MD5_EXPORT
- RSA_DES_SHA_EXPORT
- DH_DSS_DES_SHA_EXPORT
- DH_RSA_DES_SHA_EXPORT
- DHE_DSS_DES_SHA_EXPORT
- DHE_RSA_DES_SHA_EXPORT
- DH_ANON_RC4_MD5_EXPORT
- DH_ANON_DES_SHA_EXPORT
- RSA_CAMELLIA128_SHA
- DH_DSS_CAMELLIA128_SHA
- DH_RSA_CAMELLIA128_SHA
- DHE_DSS_CAMELLIA128_SHA
- DHE_RSA_CAMELLIA128_SHA
- DH_ANON_CAMELLIA128_SHA
- RSA_CAMELLIA256_SHA
- DH_DSS_CAMELLIA256_SHA
- DH_RSA_CAMELLIA256_SHA
- DHE_DSS_CAMELLIA256_SHA
- DHE_RSA_CAMELLIA256_SHA
- DH_ANON_CAMELLIA256_SHA
- PSK_RC4_SHA
- PSK_3DES_SHA
- PSK_AES128_SHA
- PSK_AES256_SHA
- DHE_PSK_RC4_SHA
- DHE_PSK_3DES_SHA
- DHE_PSK_AES128_SHA
- DHE_PSK_AES256_SHA
- RSA_PSK_RC4_SHA
- RSA_PSK_3DES_SHA
- RSA_PSK_AES128_SHA
- RSA_PSK_AES256_SHA
- RSA_SEED_SHA
- DH_DSS_SEED_SHA
- DH_RSA_SEED_SHA
- DHE_DSS_SEED_SHA
- DHE_RSA_SEED_SHA
- DH_ANON_SEED_SHA
- SRP_SHA_3DES_SHA
- SRP_SHA_RSA_3DES_SHA
- SRP_SHA_DSS_3DES_SHA
- SRP_SHA_AES128_SHA
- SRP_SHA_RSA_AES128_SHA
- SRP_SHA_DSS_AES128_SHA
- SRP_SHA_AES256_SHA
- SRP_SHA_RSA_AES256_SHA
- SRP_SHA_DSS_AES256_SHA
- ECDH_ECDSA_NULL_SHA
- ECDH_ECDSA_RC4_SHA
- ECDH_ECDSA_3DES_SHA
- ECDH_ECDSA_AES128_SHA
- ECDH_ECDSA_AES256_SHA
- ECDHE_ECDSA_NULL_SHA
- ECDHE_ECDSA_RC4_SHA
- ECDHE_ECDSA_3DES_SHA
- ECDHE_ECDSA_AES128_SHA
- ECDHE_ECDSA_AES256_SHA
- ECDH_RSA_NULL_SHA
- ECDH_RSA_RC4_SHA
- ECDH_RSA_3DES_SHA
- ECDH_RSA_AES128_SHA
- ECDH_RSA_AES256_SHA
- ECDHE_RSA_NULL_SHA
- ECDHE_RSA_RC4_SHA
- ECDHE_RSA_3DES_SHA
- ECDHE_RSA_AES128_SHA
- ECDHE_RSA_AES256_SHA
- ECDH_ANON_NULL_SHA
- ECDH_ANON_RC4_SHA
- ECDH_ANON_3DES_SHA
- ECDH_ANON_AES128_SHA
- ECDH_ANON_AES256_SHA
- RSA_NULL_SHA256
- RSA_AES128_SHA256
- RSA_AES256_SHA256
- DH_DSS_AES128_SHA256
- DH_RSA_AES128_SHA256
- DHE_DSS_AES128_SHA256
- DHE_RSA_AES128_SHA256
- DH_DSS_AES256_SHA256
- DH_RSA_AES256_SHA256
- DHE_DSS_AES256_SHA256
- DHE_RSA_AES256_SHA256
- DH_ANON_AES128_SHA256
- DH_ANON_AES256_SHA256
- RSA_AES128_GCM_SHA256
- RSA_AES256_GCM_SHA384
- DHE_RSA_AES128_GCM_SHA256
- DHE_RSA_AES256_GCM_SHA384
- DH_RSA_AES128_GCM_SHA256
- DH_RSA_AES256_GCM_SHA384
- DHE_DSS_AES128_GCM_SHA256
- DHE_DSS_AES256_GCM_SHA384
- DH_DSS_AES128_GCM_SHA256
- DH_DSS_AES256_GCM_SHA384
- DH_ANON_AES128_GCM_SHA256
- DH_ANON_AES256_GCM_SHA384
- ECDHE_ECDSA_AES128_SHA256
- ECDHE_ECDSA_AES256_SHA384
- ECDH_ECDSA_AES128_SHA256
- ECDH_ECDSA_AES256_SHA384
- ECDHE_RSA_AES128_SHA256
- ECDHE_RSA_AES256_SHA384
- ECDH_RSA_AES128_SHA256
- ECDH_RSA_AES256_SHA384
- ECDHE_ECDSA_AES128_GCM_SHA256
- ECDHE_ECDSA_AES256_GCM_SHA384
- ECDH_ECDSA_AES128_GCM_SHA256
- ECDH_ECDSA_AES256_GCM_SHA384
- ECDHE_RSA_AES128_GCM_SHA256
- ECDHE_RSA_AES256_GCM_SHA384
- ECDH_RSA_AES128_GCM_SHA256
- ECDH_RSA_AES256_GCM_SHA384
- PSK_AES128_GCM_SHA256
- PSK_AES256_GCM_SHA384
- DHE_PSK_AES128_GCM_SHA256
- DHE_PSK_AES256_GCM_SHA384
- RSA_PSK_AES128_GCM_SHA256
- RSA_PSK_AES256_GCM_SHA384
- PSK_AES128_SHA256
- PSK_AES256_SHA384
- PSK_NULL_SHA256
- PSK_NULL_SHA384
- DHE_PSK_AES128_SHA256
- DHE_PSK_AES256_SHA384
- DHE_PSK_NULL_SHA256
- DHE_PSK_NULL_SHA384
- RSA_PSK_AES128_SHA256
- RSA_PSK_AES256_SHA384
- RSA_PSK_NULL_SHA256
- RSA_PSK_NULL_SHA384
- RSA_CAMELLIA128_SHA256
- DH_DSS_CAMELLIA128_SHA256
- DH_RSA_CAMELLIA128_SHA256
- DHE_DSS_CAMELLIA128_SHA256
- DHE_RSA_CAMELLIA128_SHA256
- DH_ANON_CAMELLIA128_SHA256
- RSA_CAMELLIA256_SHA256
- DH_DSS_CAMELLIA256_SHA256
- DH_RSA_CAMELLIA256_SHA256
- DHE_DSS_CAMELLIA256_SHA256
- DHE_RSA_CAMELLIA256_SHA256
- DH_ANON_CAMELLIA256_SHA256
- ECDHE_ECDSA_CAMELLIA128_SHA256
- ECDHE_ECDSA_CAMELLIA256_SHA384
- ECDH_ECDSA_CAMELLIA128_SHA256
- ECDH_ECDSA_CAMELLIA256_SHA384
- ECDHE_RSA_CAMELLIA128_SHA256
- ECDHE_RSA_CAMELLIA256_SHA384
- ECDH_RSA_CAMELLIA128_SHA256
- ECDH_RSA_CAMELLIA256_SHA384
- RSA_CAMELLIA128_GCM_SHA256
- RSA_CAMELLIA256_GCM_SHA384
- DHE_RSA_CAMELLIA128_GCM_SHA256
- DHE_RSA_CAMELLIA256_GCM_SHA384
- DH_RSA_CAMELLIA128_GCM_SHA256
- DH_RSA_CAMELLIA256_GCM_SHA384
- DHE_DSS_CAMELLIA128_GCM_SHA256
- DHE_DSS_CAMELLIA256_GCM_SHA384
- DH_DSS_CAMELLIA128_GCM_SHA256
- DH_DSS_CAMELLIA256_GCM_SHA384
- DH_anon_CAMELLIA128_GCM_SHA256
- DH_anon_CAMELLIA256_GCM_SHA384
- ECDHE_ECDSA_CAMELLIA128_GCM_SHA256
- ECDHE_ECDSA_CAMELLIA256_GCM_SHA384
- ECDH_ECDSA_CAMELLIA128_GCM_SHA256
- ECDH_ECDSA_CAMELLIA256_GCM_SHA384
- ECDHE_RSA_CAMELLIA128_GCM_SHA256
- ECDHE_RSA_CAMELLIA256_GCM_SHA384
- ECDH_RSA_CAMELLIA128_GCM_SHA256
- ECDH_RSA_CAMELLIA256_GCM_SHA384
- PSK_CAMELLIA128_GCM_SHA256
- PSK_CAMELLIA256_GCM_SHA384
- DHE_PSK_CAMELLIA128_GCM_SHA256
- DHE_PSK_CAMELLIA256_GCM_SHA384
- RSA_PSK_CAMELLIA128_GCM_SHA256
- RSA_PSK_CAMELLIA256_GCM_SHA384
- PSK_CAMELLIA128_SHA256
- PSK_CAMELLIA256_SHA384
- DHE_PSK_CAMELLIA128_SHA256
- DHE_PSK_CAMELLIA256_SHA384
- RSA_PSK_CAMELLIA128_SHA256
- RSA_PSK_CAMELLIA256_SHA384
- ECDHE_PSK_CAMELLIA128_SHA256
- ECDHE_PSK_CAMELLIA256_SHA384
- ECDHE_PSK_RC4_SHA
- ECDHE_PSK_3DES_SHA
- ECDHE_PSK_AES128_SHA
- ECDHE_PSK_AES256_SHA
- ECDHE_PSK_AES128_SHA256
- ECDHE_PSK_AES256_SHA384
- ECDHE_PSK_NULL_SHA
- ECDHE_PSK_NULL_SHA256
- ECDHE_PSK_NULL_SHA384
- ECDHE_RSA_CHACHA20_POLY1305_SHA256
- ECDHE_ECDSA_CHACHA20_POLY1305_SHA256
- DHE_RSA_CHACHA20_POLY1305_SHA256
- PSK_CHACHA20_POLY1305_SHA256
- ECDHE_PSK_CHACHA20_POLY1305_SHA256
- DHE_PSK_CHACHA20_POLY1305_SHA256
- RSA_PSK_CHACHA20_POLY1305_SHA256
- AES128_GCM_SHA256
- AES256_GCM_SHA384
- CHACHA20_POLY1305_SHA256
- AES128_CCM_SHA256
- AES128_CCM8_SHA256
Data Type
String
TLSClientAuth Property (SecureBlackbox_KMIPServer Class)
Enables or disables certificate-based client authentication.
Object Oriented Interface
public function getTLSClientAuth(); public function setTLSClientAuth($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 242 ); secureblackbox_kmipserver_set($res, 242, $value );
Default Value
0
Remarks
Enables or disables certificate-based client authentication.
Set this property to true to tune up the client authentication type:
ccatNoAuth | 0 | |
ccatRequestCert | 1 | |
ccatRequireCert | 2 |
Data Type
Integer
TLSECCurves Property (SecureBlackbox_KMIPServer Class)
Defines the elliptic curves to enable.
Object Oriented Interface
public function getTLSECCurves(); public function setTLSECCurves($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 243 ); secureblackbox_kmipserver_set($res, 243, $value );
Default Value
''
Remarks
Defines the elliptic curves to enable.
Data Type
String
TLSExtensions Property (SecureBlackbox_KMIPServer Class)
Provides access to TLS extensions.
Object Oriented Interface
public function getTLSExtensions(); public function setTLSExtensions($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 244 ); secureblackbox_kmipserver_set($res, 244, $value );
Default Value
''
Remarks
Provides access to TLS extensions.
Data Type
String
TLSForceResumeIfDestinationChanges Property (SecureBlackbox_KMIPServer Class)
Whether to force TLS session resumption when the destination address changes.
Object Oriented Interface
public function getTLSForceResumeIfDestinationChanges(); public function setTLSForceResumeIfDestinationChanges($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 245 ); secureblackbox_kmipserver_set($res, 245, $value );
Default Value
false
Remarks
Whether to force TLS session resumption when the destination address changes.
Data Type
Boolean
TLSPreSharedIdentity Property (SecureBlackbox_KMIPServer Class)
Defines the identity used when the PSK (Pre-Shared Key) key-exchange mechanism is negotiated.
Object Oriented Interface
public function getTLSPreSharedIdentity(); public function setTLSPreSharedIdentity($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 246 ); secureblackbox_kmipserver_set($res, 246, $value );
Default Value
''
Remarks
Defines the identity used when the PSK (Pre-Shared Key) key-exchange mechanism is negotiated.
This property is not available at design time.
Data Type
String
TLSPreSharedKey Property (SecureBlackbox_KMIPServer Class)
Contains the pre-shared key for the PSK (Pre-Shared Key) key-exchange mechanism, encoded with base16.
Object Oriented Interface
public function getTLSPreSharedKey(); public function setTLSPreSharedKey($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 247 ); secureblackbox_kmipserver_set($res, 247, $value );
Default Value
''
Remarks
Contains the pre-shared key for the PSK (Pre-Shared Key) key-exchange mechanism, encoded with base16.
This property is not available at design time.
Data Type
String
TLSPreSharedKeyCiphersuite Property (SecureBlackbox_KMIPServer Class)
Defines the ciphersuite used for PSK (Pre-Shared Key) negotiation.
Object Oriented Interface
public function getTLSPreSharedKeyCiphersuite(); public function setTLSPreSharedKeyCiphersuite($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 248 ); secureblackbox_kmipserver_set($res, 248, $value );
Default Value
''
Remarks
Defines the ciphersuite used for PSK (Pre-Shared Key) negotiation.
Data Type
String
TLSRenegotiationAttackPreventionMode Property (SecureBlackbox_KMIPServer Class)
Selects the renegotiation attack prevention mechanism.
Object Oriented Interface
public function getTLSRenegotiationAttackPreventionMode(); public function setTLSRenegotiationAttackPreventionMode($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 249 ); secureblackbox_kmipserver_set($res, 249, $value );
Default Value
2
Remarks
Selects the renegotiation attack prevention mechanism.
The following options are available:
crapmCompatible | 0 | TLS 1.0 and 1.1 compatibility mode (renegotiation indication extension is disabled). |
crapmStrict | 1 | Renegotiation attack prevention is enabled and enforced. |
crapmAuto | 2 | Automatically choose whether to enable or disable renegotiation attack prevention. |
Data Type
Integer
TLSRevocationCheck Property (SecureBlackbox_KMIPServer Class)
Specifies the kind(s) of revocation check to perform.
Object Oriented Interface
public function getTLSRevocationCheck(); public function setTLSRevocationCheck($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 250 ); secureblackbox_kmipserver_set($res, 250, $value );
Default Value
1
Remarks
Specifies the kind(s) of revocation check to perform.
Revocation checking is necessary to ensure the integrity of the chain and obtain up-to-date certificate validity and trustworthiness information.
crcNone | 0 | No revocation checking. |
crcAuto | 1 | Automatic mode selection. Currently this maps to crcAnyOCSPOrCRL, but it may change in the future. |
crcAllCRL | 2 | All provided CRL endpoints will be checked, and all checks must succeed. |
crcAllOCSP | 3 | All provided OCSP endpoints will be checked, and all checks must succeed. |
crcAllCRLAndOCSP | 4 | All provided CRL and OCSP endpoints will be checked, and all checks must succeed. |
crcAnyCRL | 5 | All provided CRL endpoints will be checked, and at least one check must succeed. |
crcAnyOCSP | 6 | All provided OCSP endpoints will be checked, and at least one check must succeed. |
crcAnyCRLOrOCSP | 7 | All provided CRL and OCSP endpoints will be checked, and at least one check must succeed. CRL endpoints are checked first. |
crcAnyOCSPOrCRL | 8 | All provided CRL and OCSP endpoints will be checked, and at least one check must succeed. OCSP endpoints are checked first. |
This setting controls the way the revocation checks are performed for every certificate in the chain. Typically certificates come with two types of revocation information sources: CRL (certificate revocation lists) and OCSP responders. CRLs are static objects periodically published by the CA at some online location. OCSP responders are active online services maintained by the CA that can provide up-to-date information on certificate statuses in near real time.
There are some conceptual differences between the two. CRLs are normally larger in size. Their use involves some latency because there is normally some delay between the time when a certificate was revoked and the time the subsequent CRL mentioning that is published. The benefits of CRL is that the same object can provide statuses for all certificates issued by a particular CA, and that the whole technology is much simpler than OCSP (and thus is supported by more CAs).
This setting lets you adjust the validation course by including or excluding certain types of revocation sources from the validation process. The crcAnyOCSPOrCRL setting (give preference to the faster OCSP route and only demand one source to succeed) is a good choice for most typical validation environments. The "crcAll*" modes are much stricter, and may be used in scenarios where bulletproof validity information is essential.
Note: If no CRL or OCSP endpoints are provided by the CA, the revocation check will be considered successful. This is because the CA chose not to supply revocation information for its certificates, meaning they are considered irrevocable.
Note: Within each of the above settings, if any retrieved CRL or OCSP response indicates that the certificate has been revoked, the revocation check fails.
This property is not available at design time.
Data Type
Integer
TLSSSLOptions Property (SecureBlackbox_KMIPServer Class)
Various SSL (TLS) protocol options, set of cssloExpectShutdownMessage 0x001 Wait for the close-notify message when shutting down the connection cssloOpenSSLDTLSWorkaround 0x002 (DEPRECATED) Use a DTLS version workaround when talking to very old OpenSSL versions cssloDisableKexLengthAlignment 0x004 Do not align the client-side PMS by the RSA modulus size.
Object Oriented Interface
public function getTLSSSLOptions(); public function setTLSSSLOptions($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 251 ); secureblackbox_kmipserver_set($res, 251, $value );
Default Value
16
Remarks
Various SSL (TLS) protocol options, set of
cssloExpectShutdownMessage | 0x001 | Wait for the close-notify message when shutting down the connection |
cssloOpenSSLDTLSWorkaround | 0x002 | (DEPRECATED) Use a DTLS version workaround when talking to very old OpenSSL versions |
cssloDisableKexLengthAlignment | 0x004 | Do not align the client-side PMS by the RSA modulus size. It is unlikely that you will ever need to adjust it. |
cssloForceUseOfClientCertHashAlg | 0x008 | Enforce the use of the client certificate hash algorithm. It is unlikely that you will ever need to adjust it. |
cssloAutoAddServerNameExtension | 0x010 | Automatically add the server name extension when known |
cssloAcceptTrustedSRPPrimesOnly | 0x020 | Accept trusted SRP primes only |
cssloDisableSignatureAlgorithmsExtension | 0x040 | Disable (do not send) the signature algorithms extension. It is unlikely that you will ever need to adjust it. |
cssloIntolerateHigherProtocolVersions | 0x080 | (server option) Do not allow fallback from TLS versions higher than currently enabled |
cssloStickToPrefCertHashAlg | 0x100 | Stick to preferred certificate hash algorithms |
cssloNoImplicitTLS12Fallback | 0x200 | Disable implicit TLS 1.3 to 1.2 fallbacks |
cssloUseHandshakeBatches | 0x400 | Send the handshake message as large batches rather than individually |
Data Type
Integer
TLSTLSMode Property (SecureBlackbox_KMIPServer Class)
Specifies the TLS mode to use.
Object Oriented Interface
public function getTLSTLSMode(); public function setTLSTLSMode($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 252 ); secureblackbox_kmipserver_set($res, 252, $value );
Default Value
0
Remarks
Specifies the TLS mode to use.
smDefault | 0 | |
smNoTLS | 1 | Do not use TLS |
smExplicitTLS | 2 | Connect to the server without any encryption and then request an SSL session. |
smImplicitTLS | 3 | Connect to the specified port, and establish the SSL session at once. |
smMixedTLS | 4 | Connect to the specified port, and establish the SSL session at once, but allow plain data. |
Data Type
Integer
TLSUseExtendedMasterSecret Property (SecureBlackbox_KMIPServer Class)
Enables the Extended Master Secret Extension, as defined in RFC 7627.
Object Oriented Interface
public function getTLSUseExtendedMasterSecret(); public function setTLSUseExtendedMasterSecret($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 253 ); secureblackbox_kmipserver_set($res, 253, $value );
Default Value
false
Remarks
Enables the Extended Master Secret Extension, as defined in RFC 7627.
Data Type
Boolean
TLSUseSessionResumption Property (SecureBlackbox_KMIPServer Class)
Enables or disables the TLS session resumption capability.
Object Oriented Interface
public function getTLSUseSessionResumption(); public function setTLSUseSessionResumption($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 254 ); secureblackbox_kmipserver_set($res, 254, $value );
Default Value
false
Remarks
Enables or disables the TLS session resumption capability.
Data Type
Boolean
TLSVersions Property (SecureBlackbox_KMIPServer Class)
The SSL/TLS versions to enable by default.
Object Oriented Interface
public function getTLSVersions(); public function setTLSVersions($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 255 ); secureblackbox_kmipserver_set($res, 255, $value );
Default Value
16
Remarks
The SSL/TLS versions to enable by default.
csbSSL2 | 0x01 | SSL 2 |
csbSSL3 | 0x02 | SSL 3 |
csbTLS1 | 0x04 | TLS 1.0 |
csbTLS11 | 0x08 | TLS 1.1 |
csbTLS12 | 0x10 | TLS 1.2 |
csbTLS13 | 0x20 | TLS 1.3 |
Data Type
Integer
UseChunkedTransfer Property (SecureBlackbox_KMIPServer Class)
Enables chunked transfer.
Object Oriented Interface
public function getUseChunkedTransfer(); public function setUseChunkedTransfer($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 256 ); secureblackbox_kmipserver_set($res, 256, $value );
Default Value
false
Remarks
Use this property to enable chunked content encoding.
Data Type
Boolean
UseCompression Property (SecureBlackbox_KMIPServer Class)
Enables or disables server-side compression.
Object Oriented Interface
public function getUseCompression(); public function setUseCompression($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 257 ); secureblackbox_kmipserver_set($res, 257, $value );
Default Value
false
Remarks
Use this property to enable or disable server-side content compression.
Data Type
Boolean
UseHTTP Property (SecureBlackbox_KMIPServer Class)
Specifies whether the server should use HTTP instead of KMIP-over-TCP/TLS.
Object Oriented Interface
public function getUseHTTP(); public function setUseHTTP($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 258 ); secureblackbox_kmipserver_set($res, 258, $value );
Default Value
false
Remarks
Set this property to true to tell the server to expect HTTP(S) connections instead of TCP-based KMIP requests.
This property is not available at design time.
Data Type
Boolean
UserCount Property (SecureBlackbox_KMIPServer Class)
The number of records in the User arrays.
Object Oriented Interface
public function getUserCount(); public function setUserCount($value);
Procedural Interface
secureblackbox_kmipserver_get($res, 259 ); secureblackbox_kmipserver_set($res, 259, $value );
Default Value
0
Remarks
This property controls the size of the following arrays:
- UserAssociatedData
- UserBasePath
- UserCertificate
- UserData
- UserEmail
- UserHandle
- UserHashAlgorithm
- UserIncomingSpeedLimit
- UserOtpAlgorithm
- UserOTPLen
- UserOtpValue
- UserOutgoingSpeedLimit
- UserPassword
- UserSharedSecret
- UserSSHKey
- UserUsername
This property is not available at design time.
Data Type
Integer
UserAssociatedData Property (SecureBlackbox_KMIPServer Class)
Contains the user's Associated Data when SSH AEAD (Authenticated Encryption with Associated Data) algorithm is used.
Object Oriented Interface
public function getUserAssociatedData($userindex); public function setUserAssociatedData($userindex, $value);
Procedural Interface
secureblackbox_kmipserver_get($res, 260 , $userindex); secureblackbox_kmipserver_set($res, 260, $value , $userindex);
Remarks
Contains the user's Associated Data when SSH AEAD (Authenticated Encryption with Associated Data) algorithm is used.
The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.
This property is not available at design time.
Data Type
Byte Array
UserBasePath Property (SecureBlackbox_KMIPServer Class)
Base path for this user in the server's file system.
Object Oriented Interface
public function getUserBasePath($userindex); public function setUserBasePath($userindex, $value);
Procedural Interface
secureblackbox_kmipserver_get($res, 261 , $userindex); secureblackbox_kmipserver_set($res, 261, $value , $userindex);
Default Value
''
Remarks
Base path for this user in the server's file system.
The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.
This property is not available at design time.
Data Type
String
UserCertificate Property (SecureBlackbox_KMIPServer Class)
Contains the user's certificate.
Object Oriented Interface
public function getUserCertificate($userindex); public function setUserCertificate($userindex, $value);
Procedural Interface
secureblackbox_kmipserver_get($res, 262 , $userindex); secureblackbox_kmipserver_set($res, 262, $value , $userindex);
Remarks
Contains the user's certificate.
The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.
This property is not available at design time.
Data Type
Byte Array
UserData Property (SecureBlackbox_KMIPServer Class)
Contains uninterpreted user-defined data that should be associated with the user account, such as comments or custom settings.
Object Oriented Interface
public function getUserData($userindex); public function setUserData($userindex, $value);
Procedural Interface
secureblackbox_kmipserver_get($res, 263 , $userindex); secureblackbox_kmipserver_set($res, 263, $value , $userindex);
Default Value
''
Remarks
Contains uninterpreted user-defined data that should be associated with the user account, such as comments or custom settings.
The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.
This property is not available at design time.
Data Type
String
UserEmail Property (SecureBlackbox_KMIPServer Class)
The user's email address.
Object Oriented Interface
public function getUserEmail($userindex); public function setUserEmail($userindex, $value);
Procedural Interface
secureblackbox_kmipserver_get($res, 264 , $userindex); secureblackbox_kmipserver_set($res, 264, $value , $userindex);
Default Value
''
Remarks
The user's email address.
The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.
This property is not available at design time.
Data Type
String
UserHandle Property (SecureBlackbox_KMIPServer Class)
Allows to get or set a 'handle', a unique identifier of the underlying property object.
Object Oriented Interface
public function getUserHandle($userindex); public function setUserHandle($userindex, $value);
Procedural Interface
secureblackbox_kmipserver_get($res, 265 , $userindex); secureblackbox_kmipserver_set($res, 265, $value , $userindex);
Default Value
0
Remarks
Allows to get or set a 'handle', a unique identifier of the underlying property object. Use this property to assign objects of the same type in a quicker manner, without copying them fieldwise.
When you pass a handle of one object to another, the source object is copied to the destination rather than assigned. It is safe to get rid of the original object
after such operation.
pdfSigner.setSigningCertHandle(certMgr.getCertHandle());
The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.
This property is not available at design time.
Data Type
Long64
UserHashAlgorithm Property (SecureBlackbox_KMIPServer Class)
Specifies the hash algorithm used to generate TOTP (Time-based One-Time Passwords) passwords for this user.
Object Oriented Interface
public function getUserHashAlgorithm($userindex); public function setUserHashAlgorithm($userindex, $value);
Procedural Interface
secureblackbox_kmipserver_get($res, 266 , $userindex); secureblackbox_kmipserver_set($res, 266, $value , $userindex);
Default Value
''
Remarks
Specifies the hash algorithm used to generate TOTP (Time-based One-Time Passwords) passwords for this user. Three HMAC algorithms are supported, with SHA-1, SHA-256, and SHA-512 digests:
SB_MAC_ALGORITHM_HMAC_SHA1 | SHA1 | |
SB_MAC_ALGORITHM_HMAC_SHA256 | SHA256 | |
SB_MAC_ALGORITHM_HMAC_SHA512 | SHA512 |
The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.
This property is not available at design time.
Data Type
String
UserIncomingSpeedLimit Property (SecureBlackbox_KMIPServer Class)
Specifies the incoming speed limit for this user.
Object Oriented Interface
public function getUserIncomingSpeedLimit($userindex); public function setUserIncomingSpeedLimit($userindex, $value);
Procedural Interface
secureblackbox_kmipserver_get($res, 267 , $userindex); secureblackbox_kmipserver_set($res, 267, $value , $userindex);
Default Value
0
Remarks
Specifies the incoming speed limit for this user. The value of 0 (zero) means "no limitation".
The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.
This property is not available at design time.
Data Type
Integer
UserOtpAlgorithm Property (SecureBlackbox_KMIPServer Class)
The algorithm used to generate one-time passwords (OTP) for this user, either HOTP (Hash-based OTP) or TOTP (Time-based OTP).
Object Oriented Interface
public function getUserOtpAlgorithm($userindex); public function setUserOtpAlgorithm($userindex, $value);
Procedural Interface
secureblackbox_kmipserver_get($res, 268 , $userindex); secureblackbox_kmipserver_set($res, 268, $value , $userindex);
Default Value
0
Remarks
The algorithm used to generate one-time passwords (OTP) for this user, either HOTP (Hash-based OTP) or TOTP (Time-based OTP). In the former case, a value of a dedicated counter is used to generate a unique password, while in the latter the password is generated on the basis of the current time value.
oaHmac | 0 | |
oaTime | 1 |
The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.
This property is not available at design time.
Data Type
Integer
UserOTPLen Property (SecureBlackbox_KMIPServer Class)
Specifies the length of the user's OTP password.
Object Oriented Interface
public function getUserOTPLen($userindex); public function setUserOTPLen($userindex, $value);
Procedural Interface
secureblackbox_kmipserver_get($res, 269 , $userindex); secureblackbox_kmipserver_set($res, 269, $value , $userindex);
Default Value
0
Remarks
Specifies the length of the user's OTP password.
The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.
This property is not available at design time.
Data Type
Integer
UserOtpValue Property (SecureBlackbox_KMIPServer Class)
The user's time interval (TOTP) or Counter (HOTP).
Object Oriented Interface
public function getUserOtpValue($userindex); public function setUserOtpValue($userindex, $value);
Procedural Interface
secureblackbox_kmipserver_get($res, 270 , $userindex); secureblackbox_kmipserver_set($res, 270, $value , $userindex);
Default Value
0
Remarks
The user's time interval (TOTP) or Counter (HOTP).
The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.
This property is not available at design time.
Data Type
Integer
UserOutgoingSpeedLimit Property (SecureBlackbox_KMIPServer Class)
Specifies the outgoing speed limit for this user.
Object Oriented Interface
public function getUserOutgoingSpeedLimit($userindex); public function setUserOutgoingSpeedLimit($userindex, $value);
Procedural Interface
secureblackbox_kmipserver_get($res, 271 , $userindex); secureblackbox_kmipserver_set($res, 271, $value , $userindex);
Default Value
0
Remarks
Specifies the outgoing speed limit for this user. The value of 0 (zero) means "no limitation".
The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.
This property is not available at design time.
Data Type
Integer
UserPassword Property (SecureBlackbox_KMIPServer Class)
The user's authentication password.
Object Oriented Interface
public function getUserPassword($userindex); public function setUserPassword($userindex, $value);
Procedural Interface
secureblackbox_kmipserver_get($res, 272 , $userindex); secureblackbox_kmipserver_set($res, 272, $value , $userindex);
Default Value
''
Remarks
The user's authentication password.
The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.
This property is not available at design time.
Data Type
String
UserSharedSecret Property (SecureBlackbox_KMIPServer Class)
Contains the user's secret key, which is essentially a shared secret between the client and server.
Object Oriented Interface
public function getUserSharedSecret($userindex); public function setUserSharedSecret($userindex, $value);
Procedural Interface
secureblackbox_kmipserver_get($res, 273 , $userindex); secureblackbox_kmipserver_set($res, 273, $value , $userindex);
Remarks
Contains the user's secret key, which is essentially a shared secret between the client and server.
Shared secrets can be used in TLS-driven protocols, as well as in OTP (where it is called a 'key secret') for generating one-time passwords on one side, and validate them on the other.
The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.
This property is not available at design time.
Data Type
Byte Array
UserSSHKey Property (SecureBlackbox_KMIPServer Class)
Contains the user's SSH key.
Object Oriented Interface
public function getUserSSHKey($userindex); public function setUserSSHKey($userindex, $value);
Procedural Interface
secureblackbox_kmipserver_get($res, 274 , $userindex); secureblackbox_kmipserver_set($res, 274, $value , $userindex);
Remarks
Contains the user's SSH key.
The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.
This property is not available at design time.
Data Type
Byte Array
UserUsername Property (SecureBlackbox_KMIPServer Class)
The registered name (login) of the user.
Object Oriented Interface
public function getUserUsername($userindex); public function setUserUsername($userindex, $value);
Procedural Interface
secureblackbox_kmipserver_get($res, 275 , $userindex); secureblackbox_kmipserver_set($res, 275, $value , $userindex);
Default Value
''
Remarks
The registered name (login) of the user.
The $userindex parameter specifies the index of the item in the array. The size of the array is controlled by the UserCount property.
This property is not available at design time.
Data Type
String
Cleanup Method (SecureBlackbox_KMIPServer Class)
Cleans up the server environment by purging expired sessions and cleaning caches.
Object Oriented Interface
public function doCleanup();
Procedural Interface
secureblackbox_kmipserver_do_cleanup($res);
Remarks
Call this method while the server is active to clean up the environment allocated for the server by releasing unused resources and cleaning caches.
Config Method (SecureBlackbox_KMIPServer Class)
Sets or retrieves a configuration setting.
Object Oriented Interface
public function doConfig($configurationstring);
Procedural Interface
secureblackbox_kmipserver_do_config($res, $configurationstring);
Remarks
Config is a generic method available in every class. It is used to set and retrieve configuration settings for the class.
These settings are similar in functionality to properties, but they are rarely used. In order to avoid "polluting" the property namespace of the class, access to these internal properties is provided through the Config method.
To set a configuration setting named PROPERTY, you must call Config("PROPERTY=VALUE"), where VALUE is the value of the setting expressed as a string. For boolean values, use the strings "True", "False", "0", "1", "Yes", or "No" (case does not matter).
To read (query) the value of a configuration setting, you must call Config("PROPERTY"). The value will be returned as a string.
DoAction Method (SecureBlackbox_KMIPServer Class)
Performs an additional action.
Object Oriented Interface
public function doDoAction($actionid, $actionparams);
Procedural Interface
secureblackbox_kmipserver_do_doaction($res, $actionid, $actionparams);
Remarks
DoAction is a generic method available in every class. It is used to perform an additional action introduced after the product major release. The list of actions is not fixed, and may be flexibly extended over time.
The unique identifier (case insensitive) of the action is provided in the ActionID parameter.
ActionParams contains the value of a single parameter, or a list of multiple parameters for the action in the form of PARAM1=VALUE1;PARAM2=VALUE2;....
Common ActionIDs:
Action | Parameters | Returned value | Description |
ResetTrustedListCache | none | none | Clears the cached list of trusted lists. |
ResetCertificateCache | none | none | Clears the cached certificates. |
ResetCRLCache | none | none | Clears the cached CRLs. |
ResetOCSPResponseCache | none | none | Clears the cached OCSP responses. |
DropClient Method (SecureBlackbox_KMIPServer Class)
Terminates a client connection.
Object Oriented Interface
public function doDropClient($connectionid, $forced);
Procedural Interface
secureblackbox_kmipserver_do_dropclient($res, $connectionid, $forced);
Remarks
Call this method to shut down a connected client. Forced indicates whether the connection should be closed in a graceful manner.
GetClientCert Method (SecureBlackbox_KMIPServer Class)
Populates the per-connection certificate object.
Object Oriented Interface
public function doGetClientCert($connectionid);
Procedural Interface
secureblackbox_kmipserver_do_getclientcert($res, $connectionid);
Remarks
This method populates the certificate template/object received with the certificate generation request in Certificate property.
Call this method from your BeforeGenerate event handler to populate the certificate template, as received in the request. It is still not late to alter the details of the certificate on this stage.
Call it from your AfterGenerate event handler to populate the certificate that has been generated.
GetClientKey Method (SecureBlackbox_KMIPServer Class)
Populates the per-connection key object.
Object Oriented Interface
public function doGetClientKey($connectionid);
Procedural Interface
secureblackbox_kmipserver_do_getclientkey($res, $connectionid);
Remarks
This method populates the key template/object received with the key generation request in Key property.
Call this method from your BeforeGenerateKey event handler to populate the key template, as received in the request. It is still not late to alter the details of the key on this stage.
Call it from your AfterGenerateKey event handler to populate the key that has been generated.
GetRequestHeader Method (SecureBlackbox_KMIPServer Class)
Returns a request header value.
Object Oriented Interface
public function doGetRequestHeader($connectionid, $headername);
Procedural Interface
secureblackbox_kmipserver_do_getrequestheader($res, $connectionid, $headername);
Remarks
Use this method to get the value of a request header. A good place to call this method is a request-marking event, such as GetRequest or PostRequest.
GetResponseHeader Method (SecureBlackbox_KMIPServer Class)
Returns a response header value.
Object Oriented Interface
public function doGetResponseHeader($connectionid, $headername);
Procedural Interface
secureblackbox_kmipserver_do_getresponseheader($res, $connectionid, $headername);
Remarks
Use this method to get the value of a response header. A good place to call this method is HeadersPrepared event. Call the method with empty HeaderName to get the whole response header.
ListClients Method (SecureBlackbox_KMIPServer Class)
Enumerates the connected clients.
Object Oriented Interface
public function doListClients();
Procedural Interface
secureblackbox_kmipserver_do_listclients($res);
Remarks
This method enumerates the connected clients. It returns a list of strings, with each string being of 'ConnectionID|Address|Port' format, and representing a single connection.
PinClient Method (SecureBlackbox_KMIPServer Class)
Takes a snapshot of the connection's properties.
Object Oriented Interface
public function doPinClient($connectionid);
Procedural Interface
secureblackbox_kmipserver_do_pinclient($res, $connectionid);
Remarks
Use this method to take a snapshot of a connected client. The captured properties are populated in PinnedClient and PinnedClientChain properties.
ProcessGenericRequest Method (SecureBlackbox_KMIPServer Class)
Processes a generic HTTP request.
Object Oriented Interface
public function doProcessGenericRequest($connectionid, $requestbytes);
Procedural Interface
secureblackbox_kmipserver_do_processgenericrequest($res, $connectionid, $requestbytes);
Remarks
This method processes a generic HTTP request and produces a response. Use it to generate HTTP responses for requests obtained externally, out of the default HTTP channel.
This method respects all current settings of the server object, and invokes the corresponding events to consult about the request and response details with the application. ConnectionId allows to identify the request in the events.
The method returns the complete HTTP response including HTTP headers.
Reset Method (SecureBlackbox_KMIPServer Class)
Resets the class settings.
Object Oriented Interface
public function doReset();
Procedural Interface
secureblackbox_kmipserver_do_reset($res);
Remarks
Reset is a generic method available in every class.
SetClientBytes Method (SecureBlackbox_KMIPServer Class)
Commits a data buffer to the connection.
Object Oriented Interface
public function doSetClientBytes($connectionid, $value);
Procedural Interface
secureblackbox_kmipserver_do_setclientbytes($res, $connectionid, $value);
Remarks
Use this method from your Response Encrypt AfterEncrypt Decrypt AfterDecrypt Sign AfterSign events handler to commit a new data to the server component.
SetClientCert Method (SecureBlackbox_KMIPServer Class)
Commits the per-connection certificate object to the connection context.
Object Oriented Interface
public function doSetClientCert($connectionid);
Procedural Interface
secureblackbox_kmipserver_do_setclientcert($res, $connectionid);
Remarks
This method commits the certificate object stored in Certificate to the connection context.
SetClientKey Method (SecureBlackbox_KMIPServer Class)
Commits the per-connection key object to the connection context.
Object Oriented Interface
public function doSetClientKey($connectionid);
Procedural Interface
secureblackbox_kmipserver_do_setclientkey($res, $connectionid);
Remarks
This method commits the key object stored in Key to the connection context.
SetResponseHeader Method (SecureBlackbox_KMIPServer Class)
Sets a response header.
Object Oriented Interface
public function doSetResponseHeader($connectionid, $headername, $value);
Procedural Interface
secureblackbox_kmipserver_do_setresponseheader($res, $connectionid, $headername, $value);
Remarks
Use this method to set a response header. A good place to call this method is a request-marking event, such as GetRequest or PostRequest.
Start Method (SecureBlackbox_KMIPServer Class)
Start the KMIP server.
Object Oriented Interface
public function doStart();
Procedural Interface
secureblackbox_kmipserver_do_start($res);
Remarks
Call this method to activate the KMIP server and start listening to incoming connections.
Stop Method (SecureBlackbox_KMIPServer Class)
Stops the KMIP server.
Object Oriented Interface
public function doStop();
Procedural Interface
secureblackbox_kmipserver_do_stop($res);
Remarks
Call this method to stop the KMIP server.
Accept Event (SecureBlackbox_KMIPServer Class)
Reports an incoming connection.
Object Oriented Interface
public function fireAccept($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 1, array($this, 'fireAccept'));
Parameter List
'remoteaddress'
'remoteport'
'accept'
Remarks
This event is fired when a new connection from RemoteAddress:RemotePort is ready to be accepted. Use the Accept parameter to accept or decline it.
Subscribe to Connect event to be notified of every connection that has been set up.
ActivateObject Event (SecureBlackbox_KMIPServer Class)
Notifies the application about the object activation request.
Object Oriented Interface
public function fireActivateObject($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 2, array($this, 'fireActivateObject'));
Parameter List
'connectionid'
'objectid'
'operationstatus'
Remarks
Subscribe to this event to get notified about object activation requests. The ObjectId parameter contain the unique identifier of the object being activated.
Object activation requests are handled in a simplified way, without using the three-step virtualization approach.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
Add Event (SecureBlackbox_KMIPServer Class)
Passes the certificate import request to the application.
Object Oriented Interface
public function fireAdd($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 3, array($this, 'fireAdd'));
Parameter List
'connectionid'
'group'
'certid'
'operationstatus'
Remarks
The server uses this event to allow the application to customize a certificate import request. This request fires after BeforeAdd if the Action parameter passed back to it was set to fraCustom.
The Group parameter indicates the shared name for the certificate elements (public key, private key, certificate). The CertId provides a unique identifier for the certificate object. Both can be adjusted by the application as required. Use the Certificate object to access the certificate parameters.
Upon completion of the processing, set the value of OperationStatus to match the result of the operation.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AddKey Event (SecureBlackbox_KMIPServer Class)
Expects the application to handle the key import request.
Object Oriented Interface
public function fireAddKey($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 4, array($this, 'fireAddKey'));
Parameter List
'connectionid'
'group'
'keyid'
'operationstatus'
Remarks
Application uses this event to wiretap into the key import procedure. For this event to be invoked, the fraCustom action needs to be previously returned from the BeforeAddKey event.
The handler of this event should process the key data provided via the Key property, typically by storing the key object in a local database. The handler also should set the KeyId and, optionally, Group parameters to match the properties of the new key object. The result of the operation should be returned via the OperationStatus parameter.
See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AfterAdd Event (SecureBlackbox_KMIPServer Class)
Notifies the application about completion of the certificate import operation.
Object Oriented Interface
public function fireAfterAdd($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 5, array($this, 'fireAfterAdd'));
Parameter List
'connectionid'
'group'
'certid'
'operationstatus'
Remarks
The class fires this event upon completion of certificate import routine. The certificate object that has been generated can be read from the Certificate property.
The Group and CertId parameters contain the name of the group and the unique identifier assigned to the new certificate. The OperationStatus parameter contains the result of the operation. The application can adjust them as required.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AfterAddKey Event (SecureBlackbox_KMIPServer Class)
Reports the completion of the key import procedure.
Object Oriented Interface
public function fireAfterAddKey($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 6, array($this, 'fireAfterAddKey'));
Parameter List
'connectionid'
'group'
'keyid'
'operationstatus'
Remarks
The component uses the AfterAddKey event to notify the application about completion of the key import processing. The OperationStatus parameter returns the operation result. The KeyId and Group parameters are set to match the properties of the newly created key. The application can change them if required.
This event fires both for "normal" and "virtualized" requests, independently of the value of the Action parameter returned from the BeforeAddKey event. See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AfterBrowse Event (SecureBlackbox_KMIPServer Class)
KMIP server uses this event to notify the application about the completion of the browsing (attribute request) operation.
Object Oriented Interface
public function fireAfterBrowse($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 7, array($this, 'fireAfterBrowse'));
Parameter List
'connectionid'
'objectid'
'operationstatus'
Remarks
The ConnectionID parameter identifies the client connection, and the ObjectId parameter specifies the unique ID of the object the attributes of which are being requested.
This event follows the three-step virtualization approach, and fires after the preceding BeforeBrowse and ReadAttribute events.
Check the operation status, and alter it, if needed, through the OperationStatus parameter:
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AfterDecrypt Event (SecureBlackbox_KMIPServer Class)
Notifies the application about completion of the decryption call.
Object Oriented Interface
public function fireAfterDecrypt($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 8, array($this, 'fireAfterDecrypt'));
Parameter List
'connectionid'
'objectid'
'decrypteddata'
'correlationvalue'
'operationstatus'
Remarks
The component uses this event to notify the application about completion of the decrypt request. The event parameters provide the details of the decryption operation. This event fires independently of whether the build-in or virtualized decryption is used.
The ObjectId parameter contains the unique identifier of the decryption key. DecryptedData contains the decryption result. The CorrelationValue string is a linking token that allows to associate several pieces of a multi-step decryption operation together. The OperationStatus contains the result of the operation.
See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AfterDeriveKey Event (SecureBlackbox_KMIPServer Class)
Notifies the application about completion of the key derivation request.
Object Oriented Interface
public function fireAfterDeriveKey($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 9, array($this, 'fireAfterDeriveKey'));
Parameter List
'connectionid'
'newkeyid'
'operationstatus'
Remarks
Use this event to get notified about completion of key derivation requests. The OperationStatus parameter specifies the result of the key derivation operation. The NewKeyId contains the unique identifier of the new key. You can change both parameters if required.
See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AfterEdit Event (SecureBlackbox_KMIPServer Class)
Notifies the application of completion of the object editing operation.
Object Oriented Interface
public function fireAfterEdit($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 10, array($this, 'fireAfterEdit'));
Parameter List
'connectionid'
'objectid'
'operationstatus'
Remarks
The component fires this event to notify the application about completion of an edit operation. An edit operation consists of a number of individual attribute update requests.
The ObjectId parameter contains the unique identifier of the object that was edited. Use the OperationStatus parameter to check or update the result of the operation.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AfterEncrypt Event (SecureBlackbox_KMIPServer Class)
Notifies the application about the completion of the encryption call.
Object Oriented Interface
public function fireAfterEncrypt($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 11, array($this, 'fireAfterEncrypt'));
Parameter List
'connectionid'
'objectid'
'encrypteddata'
'correlationvalue'
'operationstatus'
Remarks
The component uses this event to notify the application about completion of the encrypt request. The event parameters provide the details of the encryption operation. This event fires independently of whether the build-in or virtualized decryption is used.
The ObjectId parameter contains the unique identifier of the encryption key. EncryptedData contains the encryption result. The CorrelationValue string is a linking token that allows to associate several pieces of a multi-step encryption operation together. The OperationStatus contains the result of the operation.
See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AfterGenerate Event (SecureBlackbox_KMIPServer Class)
Signifies completion of certificate generation.
Object Oriented Interface
public function fireAfterGenerate($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 12, array($this, 'fireAfterGenerate'));
Parameter List
'connectionid'
'certid'
'operationstatus'
Remarks
The class fires this event upon completion of certificate generation routine. The generated certificate can be read from Certificate.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AfterGenerateKey Event (SecureBlackbox_KMIPServer Class)
Notifies the application of the completion of key generation procedure.
Object Oriented Interface
public function fireAfterGenerateKey($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 13, array($this, 'fireAfterGenerateKey'));
Parameter List
'connectionid'
'keyid'
'operationstatus'
Remarks
The component uses this event to notify the application about the completion of the key generation procedure. The KeyId parameter contains the ID of the new key object (and can be changed by the user code if required). The OperationStatus parameter reports the result of the operation.
This event is the third and conclusive in the sequence of BeforeGenerateKey, GenerateKey, and the AfterGenerateKey events. See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AfterGenerateKeyPair Event (SecureBlackbox_KMIPServer Class)
Notifies the application of the completion of keypair generation.
Object Oriented Interface
public function fireAfterGenerateKeyPair($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 14, array($this, 'fireAfterGenerateKeyPair'));
Parameter List
'connectionid'
'privatekeyid'
'publickeyid'
'operationstatus'
Remarks
The component uses this event to notify the application about the completion of the keypair generation operation. The PrivateKeyId and PublicKeyId parameters contain the IDs of the new private and public keys respectively. The OperationStatus parameter returns the result of the operation.
See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AfterHash Event (SecureBlackbox_KMIPServer Class)
Notifies the application about completion of the hashing call.
Object Oriented Interface
public function fireAfterHash($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 15, array($this, 'fireAfterHash'));
Parameter List
'connectionid'
'objectid'
'hashdata'
'correlationvalue'
'operationstatus'
Remarks
Subscribe to this event to be notified about completion of the hashing request processing. The DataHash parameter contains the hash that has been calculated. The OperationStatus parameter contains the operation result. If the hashing operation was a MAC (keyed) operation, the ID of the key is passed to the ObjectId parameter.
See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AfterList Event (SecureBlackbox_KMIPServer Class)
Notifies the application about completion of the list command.
Object Oriented Interface
public function fireAfterList($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 16, array($this, 'fireAfterList'));
Parameter List
'connectionid'
'objecttype'
'objectstatus'
'onlyfreshobjects'
'objectids'
'operationstatus'
Remarks
The component uses this event to notify the application about the completion of the list command. The ObjectType, ObjectStatus, and OnlyFreshObjects contain the listing criteria. The ObjectIds contains a list of object unique identifiers, separated by newlines.
See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AfterObtainLease Event (SecureBlackbox_KMIPServer Class)
Reports the completion of lease allocation operation.
Object Oriented Interface
public function fireAfterObtainLease($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 17, array($this, 'fireAfterObtainLease'));
Parameter List
'connectionid'
'objectid'
'leasetime'
'lastchangedate'
'operationstatus'
Remarks
The component uses this event to notify the application about the completion of lease allocation operation. The ObjectId parameter specifies the identifier of the object a lease for each is allocated. The LeaseTime and LastChangeDate parameters specify parameters of the lease.
See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AfterReadObject Event (SecureBlackbox_KMIPServer Class)
Notifies the application of the completion of the read operation on the object.
Object Oriented Interface
public function fireAfterReadObject($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 18, array($this, 'fireAfterReadObject'));
Parameter List
'connectionid'
'objectid'
'objecttype'
'operationstatus'
Remarks
Use this event to be notified about completion of the read operation.
See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AfterReCertify Event (SecureBlackbox_KMIPServer Class)
Notifies the application about the completion of the re-certify operation.
Object Oriented Interface
public function fireAfterReCertify($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 19, array($this, 'fireAfterReCertify'));
Parameter List
'connectionid'
'newcertid'
'operationstatus'
Remarks
The server component uses this event to notify the application about the completion of the re-certification (certificate renewal) operation. The NewCertId contains the unique ID of the new certificate object. You can adjust it if required.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AfterReKey Event (SecureBlackbox_KMIPServer Class)
Notifies the application about the completion of the re-key operation.
Object Oriented Interface
public function fireAfterReKey($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 20, array($this, 'fireAfterReKey'));
Parameter List
'connectionid'
'newkeyid'
'operationstatus'
Remarks
The server component uses this event to notify the application about the completion of the re-key (key renewal) operation. The NewKeyId contains the unique ID of the new key object. You can adjust it if required.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AfterRekeyKeyPair Event (SecureBlackbox_KMIPServer Class)
Notifies the application about the completion of the re-key keypair operation.
Object Oriented Interface
public function fireAfterRekeyKeyPair($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 21, array($this, 'fireAfterRekeyKeyPair'));
Parameter List
'connectionid'
'newprivatekeyid'
'newpublickeyid'
'operationstatus'
Remarks
The server component uses this event to notify the application about the completion of the re-key (asymmetric key renewal) operation. The NewPrivateKeyId and NewPublicKeyId parameters contains the unique ID of the new key objects. You can adjust them if required.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AfterRemoveObject Event (SecureBlackbox_KMIPServer Class)
Notifies the application about completion of the object removal request.
Object Oriented Interface
public function fireAfterRemoveObject($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 22, array($this, 'fireAfterRemoveObject'));
Parameter List
'connectionid'
'objectid'
'operationstatus'
Remarks
Subscribe to this event to be notified about completion of an object removal request. The OperationStatus parameter contains the result of the operation.
See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AfterSign Event (SecureBlackbox_KMIPServer Class)
Notifies the application of completion of a signing operation.
Object Oriented Interface
public function fireAfterSign($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 23, array($this, 'fireAfterSign'));
Parameter List
'connectionid'
'objectid'
'inputishash'
'signaturedata'
'correlationvalue'
'operationstatus'
Remarks
The component uses this event to notify the application about the completion of a signing operation.
The ObjectId parameter contains the unique identifier of the signing key. SignatureData contains the signing result. The CorrelationValue string is a linking token that allows to associate several pieces of a multi-step signing operation together. The OperationStatus contains the result of the operation.
See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AfterVerify Event (SecureBlackbox_KMIPServer Class)
Notifies the application about completion of the Verify operation.
Object Oriented Interface
public function fireAfterVerify($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 24, array($this, 'fireAfterVerify'));
Parameter List
'connectionid'
'objectid'
'inputishash'
'validationresult'
'correlationvalue'
'operationstatus'
Remarks
The component fires this event to notify the application of a completion of a verification operation. The ValidationResult parameter contains the validity status of the signature.
The ObjectId parameter contains the unique identifier of the verifying key. The OperationStatus parameter contains the result of the operation.
See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AfterVerifyHash Event (SecureBlackbox_KMIPServer Class)
Notifies the application about completion of the hash verification.
Object Oriented Interface
public function fireAfterVerifyHash($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 25, array($this, 'fireAfterVerifyHash'));
Parameter List
'connectionid'
'objectid'
'isvalid'
'correlationvalue'
'operationstatus'
Remarks
The component uses this event to notify the application about hash verification result. The optional ObjectId parameter contains the unique identifier of the key object if HMAC algorithm is used.
The IsValid parameter contains the validity factor of the hash.
See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
ArchiveObject Event (SecureBlackbox_KMIPServer Class)
Notifies the application about the received object archival request.
Object Oriented Interface
public function fireArchiveObject($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 26, array($this, 'fireArchiveObject'));
Parameter List
'connectionid'
'objectid'
'operationstatus'
Remarks
The component fires this event when it receives an object archival request from a connected client. The archival procedure go through a simplified handling route, without the three-step flow.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
AuthAttempt Event (SecureBlackbox_KMIPServer Class)
Fires when a connected client makes an authentication attempt.
Object Oriented Interface
public function fireAuthAttempt($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 27, array($this, 'fireAuthAttempt'));
Parameter List
'connectionid'
'httpmethod'
'uri'
'authmethod'
'username'
'password'
'allow'
Remarks
The class fires this event whenever a client attempts to authenticate itself. Use the Allow parameter to let the client through.
ConnectionID contains the unique session identifier for that client, HTTPMethod specifies the HTTP method (GET, POST, etc.) used to access the URI resource, AuthMethod specifies the authentication method, and Username and Password contain the professed credentials.
BeforeAdd Event (SecureBlackbox_KMIPServer Class)
Fires when a certificate import request is received from a client.
Object Oriented Interface
public function fireBeforeAdd($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 28, array($this, 'fireBeforeAdd'));
Parameter List
'connectionid'
'group'
'action'
Remarks
The class fires this event when it receives a request from the client to import a certificate on to the server. The supplied certificate is available in Certificate object.
The Group parameter specifies a common identifier for objects related to the certificate being imported: the certificate, its public key, and its private key.
BeforeAddKey Event (SecureBlackbox_KMIPServer Class)
Fires when a key import request is received from the client.
Object Oriented Interface
public function fireBeforeAddKey($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 29, array($this, 'fireBeforeAddKey'));
Parameter List
'connectionid'
'group'
'action'
Remarks
The class fires this event when it receives a request from the client to import a key on to the server. The supplied key is available in the Key parameter.
For keypairs, the Group parameter contains a common label that will be applied to both parts of that keypair (the public key object and the private key object).
BeforeBrowse Event (SecureBlackbox_KMIPServer Class)
Notifies the application about the browse request being received.
Object Oriented Interface
public function fireBeforeBrowse($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 30, array($this, 'fireBeforeBrowse'));
Parameter List
'connectionid'
'objectid'
'action'
Remarks
The component uses this event to notify the application about a browse request received for an object ObjectId.
BeforeDecrypt Event (SecureBlackbox_KMIPServer Class)
Notifies the application about the initiation of the decryption operation.
Object Oriented Interface
public function fireBeforeDecrypt($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 31, array($this, 'fireBeforeDecrypt'));
Parameter List
'connectionid'
'objectid'
'correlationvalue'
'action'
Remarks
The component fires this event to notify the application about the initiation of the decryption operation. The ObjectId parameter contains a reference to the decryption key. The optional CorrelationValue parameter can be used to link consecutive steps of multi-part decryption operation together.
Use the Action parameter to indicate the procedure you want to use for this request. See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
BeforeDeriveKey Event (SecureBlackbox_KMIPServer Class)
Fires when a derive key request is received.
Object Oriented Interface
public function fireBeforeDeriveKey($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 32, array($this, 'fireBeforeDeriveKey'));
Parameter List
'connectionid'
'objecttype'
'objectids'
'derivationmethod'
'action'
Remarks
The class fires this event when it receives a request from the client to derive a key. The supplied certificate is available in Key.
BeforeEdit Event (SecureBlackbox_KMIPServer Class)
Notifies the application about the start of the object editing operation.
Object Oriented Interface
public function fireBeforeEdit($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 33, array($this, 'fireBeforeEdit'));
Parameter List
'connectionid'
'objectid'
'action'
Remarks
The editing operation consists of a sequence of attribute update requests. Each attribute is provided to the application via an individual SetAttribute call. When the list of supplied attributes has been exhausted, the AfterEdit event call follows.
The ObjectId parameter specifies the identifier of the object being edited.
BeforeEncrypt Event (SecureBlackbox_KMIPServer Class)
Notifies the application about the initiation of an encryption operation.
Object Oriented Interface
public function fireBeforeEncrypt($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 34, array($this, 'fireBeforeEncrypt'));
Parameter List
'connectionid'
'objectid'
'correlationvalue'
'action'
Remarks
The component fires this event to notify the application about the initiation of an encryption operation. The ObjectId parameter contains a reference to the encryption key. The optional CorrelationValue parameter can be used to link consecutive steps of multi-part encryption operation together.
Use the Action parameter to indicate the procedure you want to use for this request. See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
BeforeGenerate Event (SecureBlackbox_KMIPServer Class)
Fires when a certificate generation request is received.
Object Oriented Interface
public function fireBeforeGenerate($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 35, array($this, 'fireBeforeGenerate'));
Parameter List
'connectionid'
'publickeyid'
'action'
Remarks
The class fires this event when it receives a request from the client to generate a certificate. The supplied certificate template is available in Certificate.
BeforeGenerateKey Event (SecureBlackbox_KMIPServer Class)
Fires when a key generation request is received.
Object Oriented Interface
public function fireBeforeGenerateKey($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 36, array($this, 'fireBeforeGenerateKey'));
Parameter List
'connectionid'
'keyalgorithm'
'keylength'
'action'
Remarks
The class fires this event when it receives a request from the client to generate a key. KeyAlgorithm and KeyLength parameters specify the requested key properties.
BeforeGenerateKeyPair Event (SecureBlackbox_KMIPServer Class)
Fires when a key generation request is received.
Object Oriented Interface
public function fireBeforeGenerateKeyPair($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 37, array($this, 'fireBeforeGenerateKeyPair'));
Parameter List
'connectionid'
'keyalgorithm'
'keylength'
'scheme'
'schemeparams'
'action'
Remarks
The class fires this event when it receives a request from the client to generate a keypair. KeyAlgorithm, KeyLength, Scheme and SchemeParams parameters specify the requested key properties.
BeforeHash Event (SecureBlackbox_KMIPServer Class)
Notifies the application about the initiation of the hashing operation.
Object Oriented Interface
public function fireBeforeHash($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 38, array($this, 'fireBeforeHash'));
Parameter List
'connectionid'
'objectid'
'hashalgorithm'
'correlationvalue'
'action'
Remarks
The component fires this event to notify the application about the initiation of a hashing operation. The optional ObjectId parameter contains a reference to the hashing key if HMAC-based hashing is used. The optional CorrelationValue parameter can be used to link consecutive steps of multi-part hash operation together.
Use the Action parameter to indicate the procedure you want to use for this request. See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
BeforeList Event (SecureBlackbox_KMIPServer Class)
Notifies the application about the initiation of the list operation.
Object Oriented Interface
public function fireBeforeList($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 39, array($this, 'fireBeforeList'));
Parameter List
'connectionid'
'objecttype'
'objectstatus'
'onlyfreshobjects'
'action'
Remarks
The component uses this event to notify the application of the received list call. The ObjectType, ObjectStatus, and OnlyFreshObjects parameters provide the listing criteria.
BeforeObtainLease Event (SecureBlackbox_KMIPServer Class)
Notifies the application about the client requesting an object lease.
Object Oriented Interface
public function fireBeforeObtainLease($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 40, array($this, 'fireBeforeObtainLease'));
Parameter List
'connectionid'
'objectid'
'action'
Remarks
Use this event to get notified about the connected client requesting an object lease.
BeforeReadObject Event (SecureBlackbox_KMIPServer Class)
Notifies the application about the start of the object reading request.
Object Oriented Interface
public function fireBeforeReadObject($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 41, array($this, 'fireBeforeReadObject'));
Parameter List
'connectionid'
'objectid'
'action'
Remarks
Object "reading" consists of a number of individual attribute requests. If fraCustom action is returned from this event handler, the component will fire ReadObject and ReadAttribute events repeatedly to request information about the object from your code.
BeforeReCertify Event (SecureBlackbox_KMIPServer Class)
Notifies the application about a re-certification request.
Object Oriented Interface
public function fireBeforeReCertify($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 42, array($this, 'fireBeforeReCertify'));
Parameter List
'connectionid'
'oldcertid'
'action'
Remarks
The component uses this event to notify the application about a re-certification request (a request to re-issue an existing certificate).
The OldCertId parameter indicates the unique identifier of the certificate object that needs to be re-issued.
This event provides a pre-notification for the operation. If your code sets the Action parameter to fraCustom, this event will be followed by a ReCertify call that will let you handle the actual request as required.
BeforeReKey Event (SecureBlackbox_KMIPServer Class)
Notifies the application about a re-key request received.
Object Oriented Interface
public function fireBeforeReKey($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 43, array($this, 'fireBeforeReKey'));
Parameter List
'connectionid'
'oldkeyid'
'action'
Remarks
The component uses this event to notify the application about a key re-issue request received from the client. The OldKeyId parameter contains the unique identifier of the old key object.
BeforeRekeyKeyPair Event (SecureBlackbox_KMIPServer Class)
Notifies the application about a keypair re-key request received.
Object Oriented Interface
public function fireBeforeRekeyKeyPair($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 44, array($this, 'fireBeforeRekeyKeyPair'));
Parameter List
'connectionid'
'oldprivatekeyid'
'action'
Remarks
The component uses this event to notify the application about a keypair re-issue request received from the client. The OldPrivateKeyId parameter contains the unique identifier of the old private key object.
BeforeRemoveObject Event (SecureBlackbox_KMIPServer Class)
Notifies the application about an incoming Remove Object request.
Object Oriented Interface
public function fireBeforeRemoveObject($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 45, array($this, 'fireBeforeRemoveObject'));
Parameter List
'connectionid'
'objectid'
'action'
Remarks
Subscribe to this event to choose the operation flow (automated/custom) for the object removal operation.
BeforeSign Event (SecureBlackbox_KMIPServer Class)
Notifies the application about the initiation of a signing operation.
Object Oriented Interface
public function fireBeforeSign($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 46, array($this, 'fireBeforeSign'));
Parameter List
'connectionid'
'objectid'
'algorithm'
'hashalgorithm'
'inputishash'
'correlationvalue'
'action'
Remarks
The component fires this event to notify the application about the initiation of the signing operation. The ObjectId parameter contains a reference to the signing key. The optional CorrelationValue parameter can be used to link consecutive steps of multi-part signing operation together.
Use the Action parameter to indicate the procedure you want to use for this request. See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
BeforeVerify Event (SecureBlackbox_KMIPServer Class)
Notifies the application about the initiation of the verify operation.
Object Oriented Interface
public function fireBeforeVerify($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 47, array($this, 'fireBeforeVerify'));
Parameter List
'connectionid'
'objectid'
'hashalgorithm'
'inputishash'
'correlationvalue'
'action'
Remarks
The component fires this event to notify the application about the initiation of the verification operation. The ObjectId parameter contains a reference to the verification key.
Use the Action parameter to indicate the procedure you want to use for this request. See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
BeforeVerifyHash Event (SecureBlackbox_KMIPServer Class)
Notifies the application about the initiation of the hash verification operation.
Object Oriented Interface
public function fireBeforeVerifyHash($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 48, array($this, 'fireBeforeVerifyHash'));
Parameter List
'connectionid'
'objectid'
'hashalgorithm'
'correlationvalue'
'action'
Remarks
The component fires this event to notify the application about the initiation of the hash verification operation. The ObjectId parameter contains a reference to the HMAC key, if MAC algorithm is used.
Use the Action parameter to indicate the procedure you want to use for this request. See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
Cancel Event (SecureBlackbox_KMIPServer Class)
Reports a cancellation request received from the client.
Object Oriented Interface
public function fireCancel($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 49, array($this, 'fireCancel'));
Parameter List
'connectionid'
'asynccorrelationvalue'
'cancellationresult'
'operationstatus'
Remarks
The component uses this event to notify the application about the cancellation request received. The application should handle the cancellation request and set CancellationResult and OperationStatus to one of the following values:
kccCancelled | 0x01 | |
kccUnableToCancel | 0x02 | |
kccCompleted | 0x03 | |
kccFailed | 0x04 | |
kccUnavailable | 0x05 |
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
Check Event (SecureBlackbox_KMIPServer Class)
Notifies the application about a Check request received.
Object Oriented Interface
public function fireCheck($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 50, array($this, 'fireCheck'));
Parameter List
'connectionid'
'objectid'
'usagelimitscount'
'cryptographicusagemask'
'leasetime'
'operationstatus'
Remarks
The component fires this event to notify the application about the Check request received from the client side. Applications working in virtual mode should implement the relevant logic in their event handlers.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
Connect Event (SecureBlackbox_KMIPServer Class)
Reports an accepted connection.
Object Oriented Interface
public function fireConnect($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 51, array($this, 'fireConnect'));
Parameter List
'connectionid'
'remoteaddress'
'remoteport'
Remarks
The class fires this event to report that a new connection has been established. ConnectionId indicates the unique ID assigned to this connection. The same ID will be supplied to any other events related to this connection, such as GetRequest or AuthAttempt.
Decrypt Event (SecureBlackbox_KMIPServer Class)
Instructs the application to decrypt a chunk of data.
Object Oriented Interface
public function fireDecrypt($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 52, array($this, 'fireDecrypt'));
Parameter List
'connectionid'
'objectid'
'data'
'iv'
'initindicator'
'finalindicator'
'blockciphermode'
'taglength'
'paddingmethod'
'correlationvalue'
'operationstatus'
Remarks
The server uses this event to inform the application of a decryption request submitted by the client and, optionally, request the application to decrypt the data block with the provided set of parameters. The decryption logic only needs to be implemented if the application uses the virtual storage mode.
In the event handler, use the parameters provided to decrypt Data with the key identified with ObjectId. The InitIndicator and FinalIndicator tell whether the provided block is first and/or last in a sequence of blocks forming a multi-step decryption operation. If the block is not the last one, set CorrelationValue to a random string to preserve continuity between consecutive block decryptions.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
DeleteAttribute Event (SecureBlackbox_KMIPServer Class)
Instructs the application to delete an object attribute.
Object Oriented Interface
public function fireDeleteAttribute($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 53, array($this, 'fireDeleteAttribute'));
Parameter List
'connectionid'
'objectid'
'attributename'
'attributevalue'
'operationstatus'
Remarks
The server fires this event to relay the KMIP client's Delete Attribute request to the application if the application chose to use custom flow in the preceding BeforeEdit event.
The event handler is expected to delete the AttributeName from the ObjectId's attribute set, and return the (now deleted) AttributeValue and the OperationStatus back to the server.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
DeriveKey Event (SecureBlackbox_KMIPServer Class)
Notifies the application of key derivation request.
Object Oriented Interface
public function fireDeriveKey($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 54, array($this, 'fireDeriveKey'));
Parameter List
'connectionid'
'objecttype'
'objectids'
'derivationmethod'
'initializationvector'
'derivationdata'
'newkeyid'
'operationstatus'
Remarks
The server fires this event to notify the application of a received key derivation request. Applications working in virtual mode should react to this event by performing the requested operation and returning the ID of the new key via the NewKeyId parameter.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
Disconnect Event (SecureBlackbox_KMIPServer Class)
Fires to report a disconnected client.
Object Oriented Interface
public function fireDisconnect($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 55, array($this, 'fireDisconnect'));
Parameter List
'connectionid'
Remarks
The class fires this event when a connected client disconnects.
Encrypt Event (SecureBlackbox_KMIPServer Class)
Instructs the application to encrypt a chunk of data.
Object Oriented Interface
public function fireEncrypt($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 56, array($this, 'fireEncrypt'));
Parameter List
'connectionid'
'objectid'
'data'
'initindicator'
'finalindicator'
'blockciphermode'
'taglength'
'paddingmethod'
'randomiv'
'iv'
'correlationvalue'
'operationstatus'
Remarks
The server uses this event to request the application to encrypt a data block with the provided set of parameters. This event is only fired if the application chose to use a custom encryption flow in the preceding BeforeEncrypt call.
In the event handler, use the parameters provided to encrypt Data with the key identified with ObjectId. The InitIndicator and FinalIndicator tell whether the provided block is first and/or last in a sequence of blocks forming a multi-step encryption operation. If the block is not last, set CorrelationValue to a random string to preserve continuity between consecutive block encryptions.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
Error Event (SecureBlackbox_KMIPServer Class)
Information about errors during data delivery.
Object Oriented Interface
public function fireError($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 57, array($this, 'fireError'));
Parameter List
'connectionid'
'errorcode'
'fatal'
'remote'
'description'
Remarks
The event is fired in case of exceptional conditions during message processing.
ErrorCode contains an error code and Description contains a textual description of the error. For a list of valid error codes and their descriptions, please refer to the HTTPS section.
ExternalSign Event (SecureBlackbox_KMIPServer Class)
Handles remote or external signing initiated by the server protocol.
Object Oriented Interface
public function fireExternalSign($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 58, array($this, 'fireExternalSign'));
Parameter List
'connectionid'
'operationid'
'hashalgorithm'
'pars'
'data'
'signeddata'
Remarks
Assign a handler to this event if you need to delegate a low-level signing operation to an external, remote, or custom signing engine. Depending on the settings, the handler will receive a hashed or unhashed value to be signed.
The event handler must pass the value of Data to the signer, obtain the signature, and pass it back to the class via the SignedData parameter.
OperationId provides a comment about the operation and its origin. It depends on the exact class being used, and may be empty. HashAlgorithm specifies the hash algorithm being used for the operation, and Pars contains algorithm-dependent parameters.
The class uses base16 (hex) encoding for the Data, SignedData, and Pars parameters. If your signing engine uses a different input and output encoding, you may need to decode and/or encode the data before and/or after the signing.
A sample MD5 hash encoded in base16: a0dee2a0382afbb09120ffa7ccd8a152 - lower case base16 A0DEE2A0382AFBB09120FFA7CCD8A152 - upper case base16
A sample event handler that uses the .NET RSACryptoServiceProvider class may look like the following:
signer.OnExternalSign += (s, e) =>
{
var cert = new X509Certificate2("cert.pfx", "", X509KeyStorageFlags.Exportable);
var key = (RSACryptoServiceProvider)cert.PrivateKey;
var dataToSign = e.Data.FromBase16String();
var signedData = key.SignHash(dataToSign, "2.16.840.1.101.3.4.2.1");
e.SignedData = signedData.ToBase16String();
};
Generate Event (SecureBlackbox_KMIPServer Class)
Notifies the application about an incoming Generate request.
Object Oriented Interface
public function fireGenerate($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 59, array($this, 'fireGenerate'));
Parameter List
'connectionid'
'publickeyid'
'certid'
'operationstatus'
Remarks
Subscribe to this event to get notified about incoming certificate generate requests. The PublicKeyId parameter specifies the public key that the new certificate should be generated over.
Applications using the server in virtual storage mode should implement the generation logic in the event handler and return the new CertId back along with OperationStatus.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
GenerateKey Event (SecureBlackbox_KMIPServer Class)
Notifies the application about an incoming Generate request.
Object Oriented Interface
public function fireGenerateKey($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 60, array($this, 'fireGenerateKey'));
Parameter List
'connectionid'
'keyalgorithm'
'keylength'
'group'
'keyid'
'operationstatus'
Remarks
Subscribe to this event to get notified about incoming key generation requests. The KeyAlgorithm and KeyLength parameters specify the parameters of the key to be generated. Use the Group parameter to arrange together keys belonging to the same set, such as private and public parts of a keypair.
Applications using the server in virtual storage mode should implement the generation logic in the event handler and return the new KeyId back along with OperationStatus.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
GenerateKeyPair Event (SecureBlackbox_KMIPServer Class)
Notifies the application about an incoming Generate request.
Object Oriented Interface
public function fireGenerateKeyPair($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 61, array($this, 'fireGenerateKeyPair'));
Parameter List
'connectionid'
'keyalgorithm'
'keylength'
'scheme'
'schemeparams'
'group'
'privatekeyid'
'publickeyid'
'operationstatus'
Remarks
Subscribe to this event to get notified about incoming keypair generation requests. The KeyAlgorithm, KeyLength, Scheme and SchemeParams parameters specify the parameters of the keypair to be generated. Use the Group parameter to put together keys belonging to the same set, such as private and public parts of a keypair.
Applications using the server in virtual storage mode should implement the generation logic in the event handler and return the new PrivateKeyId and PublicKeyId back along with OperationStatus.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
GetUsageAllocation Event (SecureBlackbox_KMIPServer Class)
Notifies the application about an incoming Get Usage Allocation request.
Object Oriented Interface
public function fireGetUsageAllocation($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 62, array($this, 'fireGetUsageAllocation'));
Parameter List
'connectionid'
'objectid'
'usagelimitscount'
'operationstatus'
Remarks
The component uses this event to tell the application about a Get Usage Allocation request received.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
Hash Event (SecureBlackbox_KMIPServer Class)
Instructs the application to update the current hashing operation.
Object Oriented Interface
public function fireHash($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 63, array($this, 'fireHash'));
Parameter List
'connectionid'
'objectid'
'hashalgorithm'
'data'
'initindicator'
'finalindicator'
'correlationvalue'
'operationstatus'
Remarks
The server fires this event to pass a new chunk of data to the application for inclusion in the hash. This event is only fired if the application chose to process the hashing operation manually in the preceding BeforeHash event.
The ObjectId specifies the key object for Hash+MAC operations. The Data parameters contains the data buffer that needs to be added to the hash, with InitIndicator and FinalIndicator specifying the very first and very last data blocks respectively.
Return a unique CorrelationValue to chain pieces of a multi-block hashing operation together.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
HeadersPrepared Event (SecureBlackbox_KMIPServer Class)
Fires when the response headers have been formed and are ready to be sent to the server.
Object Oriented Interface
public function fireHeadersPrepared($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 64, array($this, 'fireHeadersPrepared'));
Parameter List
'connectionid'
Remarks
The class fires this event when the response headers are ready to be sent to the server. ConnectionID indicates the connection that processed the request.
Use GetResponseHeader method with an empty header name to get the whole response header.
KMIPAuthAttempt Event (SecureBlackbox_KMIPServer Class)
Fires when a connected client makes an authentication attempt.
Object Oriented Interface
public function fireKMIPAuthAttempt($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 65, array($this, 'fireKMIPAuthAttempt'));
Parameter List
'connectionid'
'username'
'password'
'accept'
Remarks
The class fires this event whenever a client attempts to authenticate itself. Use the Accept parameter to let the client through.
Username and Password contain the professed credentials.
List Event (SecureBlackbox_KMIPServer Class)
Instructs the application to return the list of objects that match the specified criteria.
Object Oriented Interface
public function fireList($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 66, array($this, 'fireList'));
Parameter List
'connectionid'
'objecttype'
'objectstatus'
'onlyfreshobjects'
'offsetitems'
'maximumitems'
'objectids'
'locateditems'
'operationstatus'
Remarks
The server uses this event to request a list of objects in accordance with the List call received from a KMIP client. This event only fires if the application chose to follow a custom listing flow in the preceding BeforeList event.
The event handler should use the filtering parameters provided to form the list of IDs and return it via the ObjectIds parameters. Note that ObjectType contains a bit mask of the object types that need to be returned. If that mask is set to zero, objects of all types must be considered.
The OnlyFreshObjects modifier tells the server to only return the objects that were not previously exported to the client.
otUnknown | 0x00 | |
otCertificate | 0x01 | |
otSymmetricKey | 0x02 | |
otPublicKey | 0x04 | |
otPrivateKey | 0x08 |
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
ListAttributes Event (SecureBlackbox_KMIPServer Class)
Requests a list of object attribute names from the application.
Object Oriented Interface
public function fireListAttributes($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 67, array($this, 'fireListAttributes'));
Parameter List
'connectionid'
'objectid'
'attributenames'
'operationstatus'
Remarks
The server fires this event to request a list of names of attributes defined for the object. This event is only fired if the application chose to use a custom flow for attribute listing in the preceding BeforeBrowse event call.
Following completion of this event, the server will call the ReadAttribute event for each attribute name to request the respective values.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
Notification Event (SecureBlackbox_KMIPServer Class)
This event notifies the application about an underlying control flow event.
Object Oriented Interface
public function fireNotification($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 68, array($this, 'fireNotification'));
Parameter List
'eventid'
'eventparam'
Remarks
The class fires this event to let the application know about some event, occurrence, or milestone in the class. For example, it may fire to report completion of the document processing. The list of events being reported is not fixed, and may be flexibly extended over time.
The unique identifier of the event is provided in the EventID parameter. EventParam contains any parameters accompanying the occurrence. Depending on the type of the class, the exact action it is performing, or the document being processed, one or both may be omitted.
This class can fire this event with the following EventID values:
ListeningStarted | Notifies the application that the server has started listening for incoming connections. |
ListeningStopped | Notifies the application that the server has stopped listening to incoming connections. |
ObtainLease Event (SecureBlackbox_KMIPServer Class)
Lets the application handle the lease request.
Object Oriented Interface
public function fireObtainLease($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 69, array($this, 'fireObtainLease'));
Parameter List
'connectionid'
'objectid'
'leasetime'
'lastchangedate'
'operationstatus'
Remarks
Subscribe to this event to react to object lease requests in virtualized mode.
The ObjectId parameter indicates the object a lease for which is requested. The LeaseTime and LastChangeDate specify the requested parameters of the lease. You can adjust them as required.
Set OperationStatus to indicate the intended operation result to the client.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
OperationAttempt Event (SecureBlackbox_KMIPServer Class)
Fires when a request is received from the client.
Object Oriented Interface
public function fireOperationAttempt($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 70, array($this, 'fireOperationAttempt'));
Parameter List
'connectionid'
'operation'
'username'
'reject'
Remarks
The Operation parameter specifies the operation to perform, and Username the originator of the request. Use the Reject parameter to reject the request.
Poll Event (SecureBlackbox_KMIPServer Class)
Notifies the application about the received Poll request.
Object Oriented Interface
public function firePoll($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 71, array($this, 'firePoll'));
Parameter List
'connectionid'
'asynccorrelationvalue'
'operationstatus'
Remarks
KMIP clients may use Poll requests to check with the server asynchronously about the progress of an operation they started earlier. Use the handler of this event to return the OperationStatus for the operation identified with the AsyncCorrelationValue parameter.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
ReadAttribute Event (SecureBlackbox_KMIPServer Class)
Requests an object attribute value from the application.
Object Oriented Interface
public function fireReadAttribute($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 72, array($this, 'fireReadAttribute'));
Parameter List
'connectionid'
'objectid'
'attributename'
'attributevalue'
'operationstatus'
Remarks
The server uses this event to request an attribute value from the application. This event is only fired if the application chose the custom object browsing flow in the preceding BeforeBrowse event.
This event is fired for every AttributeName in the list returned by the application from a preceding ListAttributes event call.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
ReadObject Event (SecureBlackbox_KMIPServer Class)
Requests the details of the object from the application.
Object Oriented Interface
public function fireReadObject($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 73, array($this, 'fireReadObject'));
Parameter List
'connectionid'
'objectid'
'objecttype'
'operationstatus'
Remarks
The server fires this event to request the details of the object from the application. This event is only invoked if the application chose to use custom operation handling in the preceding BeforeReadObject event call.
The event handler should set the ObjectType and OperationStatus as required, and provide the relevant object via the Certificate or Key property and commiting it using SetClientCert or SetClientKey respectively.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
ReCertify Event (SecureBlackbox_KMIPServer Class)
Notifies the application about an incoming re-certification request.
Object Oriented Interface
public function fireReCertify($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 74, array($this, 'fireReCertify'));
Parameter List
'connectionid'
'oldcertid'
'offset'
'group'
'newcertid'
'operationstatus'
Remarks
The server uses this event to notify the application about the incoming re-certification request.
If the application uses the component in virtual mode, it should perform the requested re-certification operation in the event handler and return the identifier of the new certificate via the NewCertId parameter.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
RecoverObject Event (SecureBlackbox_KMIPServer Class)
Notifies the application about an incoming Recover Object request.
Object Oriented Interface
public function fireRecoverObject($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 75, array($this, 'fireRecoverObject'));
Parameter List
'connectionid'
'objectid'
'operationstatus'
Remarks
Subscribe to this event to get notified about the Recover Object request. Applications that use the component in the virtual mode should handle the request in their event handler and set OperationStatus in accordance with the operation result.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
ReKey Event (SecureBlackbox_KMIPServer Class)
Notifies the application about an incoming re-key request.
Object Oriented Interface
public function fireReKey($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 76, array($this, 'fireReKey'));
Parameter List
'connectionid'
'oldkeyid'
'offset'
'group'
'newkeyid'
'operationstatus'
Remarks
The server uses this event to notify the application about the incoming re-keying request.
If the application uses the component in virtual mode, it should perform the requested re-key operation in the event handler and return the identifier of the new key via the NewKeyId parameter.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
RekeyKeyPair Event (SecureBlackbox_KMIPServer Class)
Notifies the application about an incoming re-key request.
Object Oriented Interface
public function fireRekeyKeyPair($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 77, array($this, 'fireRekeyKeyPair'));
Parameter List
'connectionid'
'oldprivatekeyid'
'offset'
'group'
'newprivatekeyid'
'newpublickeyid'
'operationstatus'
Remarks
The server uses this event to notify the application about the incoming asymmetric re-keying request.
If the application uses the component in virtual mode, it should perform the requested re-certification operation in the event handler and return the identifiers of the new public and private keys via the NewPublicKeyId and NewPrivateKeyId parameters.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
RemoveObject Event (SecureBlackbox_KMIPServer Class)
Notifies the application about the object deletion request.
Object Oriented Interface
public function fireRemoveObject($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 78, array($this, 'fireRemoveObject'));
Parameter List
'connectionid'
'objectid'
'operationstatus'
Remarks
The server uses this event to notify the application about the incoming object removal request. Applications working in virtual mode should perform the requested operation in the event handler and set OperationStatus according to the outcome of the operation.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
Request Event (SecureBlackbox_KMIPServer Class)
Notifies the application about KMIP requests being received.
Object Oriented Interface
public function fireRequest($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 79, array($this, 'fireRequest'));
Parameter List
'connectionid'
'requestdata'
Remarks
Subscribe to this event to get notified about incoming KMIP requests. The RequestData parameter contains the serialized KMIP request object.
Response Event (SecureBlackbox_KMIPServer Class)
Notifies the application about KMIP responses being sent back.
Object Oriented Interface
public function fireResponse($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 80, array($this, 'fireResponse'));
Parameter List
'connectionid'
'responsedata'
Remarks
Subscribe to this event to get notified about KMIP protocol responses being sent back to KMIP clients.
RevokeObject Event (SecureBlackbox_KMIPServer Class)
Instructs the application to revoke an object.
Object Oriented Interface
public function fireRevokeObject($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 81, array($this, 'fireRevokeObject'));
Parameter List
'connectionid'
'objectid'
'reasoncode'
'reasonmessage'
'operationstatus'
Remarks
The server uses this event to relay a client's Revoke Object request to the application.
The application must mark the requested object (ObjectId) as revoked, providing ReasonCode and ReasonMessage as evidence.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
RNGGenerate Event (SecureBlackbox_KMIPServer Class)
Asks the application for another block of random numbers.
Object Oriented Interface
public function fireRNGGenerate($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 82, array($this, 'fireRNGGenerate'));
Parameter List
'connectionid'
'datalength'
'operationstatus'
Remarks
The server uses this event to request another chunk of random data from the application, following a client's PRNG Generate request.
An application that handles this event must use its PRNG to generate DataLength bytes of data and pass that data buffer back to the server via the SetClientBytes method.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
RNGSeed Event (SecureBlackbox_KMIPServer Class)
Tells the application to seed the random number generator.
Object Oriented Interface
public function fireRNGSeed($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 83, array($this, 'fireRNGSeed'));
Parameter List
'connectionid'
'data'
'bytesused'
'operationstatus'
Remarks
The server component uses this event to notify the application about the client's RNG Seed call. The application that handles this event must seed the provided data to its PRNG and return the number of BytesUsed along with the OperationStatus.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
SetAttribute Event (SecureBlackbox_KMIPServer Class)
Passes a set-attribute request to the application.
Object Oriented Interface
public function fireSetAttribute($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 84, array($this, 'fireSetAttribute'));
Parameter List
'connectionid'
'objectid'
'attributename'
'attributevalue'
'operationstatus'
Remarks
The server component uses this event to tell the application that a certain attribute on an object should be set. This event only fires if the application chose to handle the edit operation manually in BeforeEdit event handler.
The handler of this event should attempt to set the AttributeName attribute of the respective object as requested and return the operation result in the OperationStatus parameter.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
Sign Event (SecureBlackbox_KMIPServer Class)
Instructs the application to sign data with a private key.
Object Oriented Interface
public function fireSign($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 85, array($this, 'fireSign'));
Parameter List
'connectionid'
'objectid'
'algorithm'
'hashalgorithm'
'inputishash'
'data'
'initindicator'
'finalindicator'
'correlationvalue'
'operationstatus'
Remarks
The server used this event to request the application to sign the provided Data (or the hash of the data, subject to InputIsHash) with the private key identified by the ObjectId parameter. This event is only fired if the application chose to proceed with the custom signing flow in the preceding BeforeSign event.
The InitIndicator and FinalIndicator provide guidance as to whether the data block is the first or last in a sequence of blocks. For blocks that are not last, generate a unique CorrelationValue to ensure continuity between consecutive data blocks.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
TLSCertValidate Event (SecureBlackbox_KMIPServer Class)
Fires when a client certificate needs to be validated.
Object Oriented Interface
public function fireTLSCertValidate($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 86, array($this, 'fireTLSCertValidate'));
Parameter List
'connectionid'
'accept'
Remarks
The class fires this event to notify the application of an authenticating client. Use the event handler to validate the certificate and pass your decision back to the server component via the Accept parameter.
TLSEstablished Event (SecureBlackbox_KMIPServer Class)
Reports the setup of a TLS session.
Object Oriented Interface
public function fireTLSEstablished($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 87, array($this, 'fireTLSEstablished'));
Parameter List
'connectionid'
Remarks
Subscribe to this event to be notified about the setup of a TLS connection by a connected client.
TLSHandshake Event (SecureBlackbox_KMIPServer Class)
Fires when a newly established client connection initiates a TLS handshake.
Object Oriented Interface
public function fireTLSHandshake($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 88, array($this, 'fireTLSHandshake'));
Parameter List
'connectionid'
'servername'
'abort'
Remarks
Use this event to get notified about the initiation of the TLS handshake by the remote client. The ServerName parameter specifies the requested host from the client hello message.
TLSPSK Event (SecureBlackbox_KMIPServer Class)
Requests a pre-shared key for TLS-PSK.
Object Oriented Interface
public function fireTLSPSK($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 89, array($this, 'fireTLSPSK'));
Parameter List
'connectionid'
'identity'
'psk'
'ciphersuite'
Remarks
The class fires this event to report that a client has requested a TLS-PSK negotiation. ConnectionId indicates the unique connection ID that requested the PSK handshake.
Use Identity to look up for the corresponding pre-shared key in the server's database, then assign the key to the PSK parameter. If TLS 1.3 PSK is used, you will also need to assign the Ciphersuite parameter with the cipher suite associated with that identity and their key.
TLSShutdown Event (SecureBlackbox_KMIPServer Class)
Reports closure of a TLS session.
Object Oriented Interface
public function fireTLSShutdown($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 90, array($this, 'fireTLSShutdown'));
Parameter List
'connectionid'
Remarks
The class fires this event when a connected client closes their TLS session gracefully. This event is typically followed by a Disconnect, which marks the closure of the underlying TCP session.
ValidateChain Event (SecureBlackbox_KMIPServer Class)
Passes the chain validation request to the application.
Object Oriented Interface
public function fireValidateChain($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 91, array($this, 'fireValidateChain'));
Parameter List
'connectionid'
'objectids'
'validity'
'operationstatus'
Remarks
The server fires this event to notify the application about the received chain validation request. The application needs to build a chain out of certificates contained in the ObjectIds list, validate it, and return the validation result via the Validity parameter, which can take one of the following values:
cvtValid | 0 | The chain is valid |
cvtValidButUntrusted | 1 | The chain is valid, but the root certificate is not trusted |
cvtInvalid | 2 | The chain is not valid (some of certificates are revoked, expired, or contain an invalid signature) |
cvtCantBeEstablished | 3 | The validity of the chain cannot be established because of missing or unavailable validation information (certificates, CRLs, or OCSP responses) |
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
Verify Event (SecureBlackbox_KMIPServer Class)
KMIPServer fires this event to notify the application about a verification operation request, and expects the application to perform it.
Object Oriented Interface
public function fireVerify($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 92, array($this, 'fireVerify'));
Parameter List
'connectionid'
'objectid'
'hashalgorithm'
'inputishash'
'data'
'signaturedata'
'initindicator'
'finalindicator'
'validationresult'
'correlationvalue'
'operationstatus'
Remarks
Subscribe to this event to be notified about public key signature verification operations. For this event to be invoked, the fraCustom action needs to be previously returned from the BeforeVerify event.
The parameters of this event provide the details of the verification request:
- ObjectId: the key object to verify the signature with.
- HashAlgorithm: the hash algorithm to use for verification.
- InputIsHash: specifies whether Data contains the hash of the signed object or the object itself.
- Data: the signed data that needs to be verified.
- SignatureData: the signature data.
- InitIndicator: whether the provided data block starts a sequence of blocks.
- FinalIndicator: whether the provided data block ends a sequence of blocks.
Upon processing, set the ValidationResult and OperationStatus in accordance with the operation result.
See the
Handling and overriding server operations using the Three-Step Virtualization
Most of the server components shipped with SecureBlackbox are highly customizable, allowing the user to override or alter the way the clients' requests are handled by default. The customization feature paves the way for creation of bespoke or virtualized server solutions that work over standardized protocols.
The possibility of customization is typically offered through a three-step virtualization model. Every customizable operation or request that can be handled by the server - say, RenameFile - is represented with a triple of events:
- BeforeRenameFile
- RenameFile
- AfterRenameFile
The first event fires right after the respective request has been received from a client. It provides the details of the operation, such as the original and target file names, and, importantly, a by-reference (writable) Action parameter. The event handler can set the Action parameter to one of the three settings given below. The setting chosen defines the further operation flow:
- fraAuto: the operation shall be handled automatically by the server: in this case, a file will be searched in the provided local directory and renamed.
- fraCustom: indicates that the user wants to take care of the operation by themselves. If this setting is chosen, the server takes no action, and instead fires the RenameFile event shortly after BeforeRenameFile completes. The user is expected to handle RenameFile and perform the requested action - that is, rename the file - manually.
- fraAbort: the operation should be aborted as not supported/allowed. Neither the server nor the user are expected to perform it.
The second event (RenameFile) only fires if Action was set to fraCustom in the earlier call to BeforeRenameFile. It lets the user handle the requested operation in the way they want. The user code must fulfil the operation (for example, rename a database entry, if building a virtualized server), and return the operation result as the event's OperationResult parameter.
If the Action parameter was set to fraAuto, RenameFile is not called. The server performs the operation automatically.
The third event, AfterRenameFile, fires upon completion of the operation, either in automatic or custom mode. The user code can check and/or adjust the result to be returned to the client.
To summarize:
- If Action is set to fraAuto, the next call about this operation will be to AfterRenameFile.
- If Action is set to fraCustom, the next call about the operation will be to RenameFile, and after that to AfterRenameFile.
- If Action is set to fraAbort, the operation is rejected and no further calls about it are performed.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
VerifyHash Event (SecureBlackbox_KMIPServer Class)
Delegates the hash verification operation to a custom handler.
Object Oriented Interface
public function fireVerifyHash($param);
Procedural Interface
secureblackbox_kmipserver_register_callback($res, 93, array($this, 'fireVerifyHash'));
Parameter List
'connectionid'
'objectid'
'hashalgorithm'
'data'
'hash'
'initindicator'
'finalindicator'
'isvalid'
'correlationvalue'
'operationstatus'
Remarks
This event allows the application to wiretap into the server's verification procedure. It is invoked if the Action parameter in the preceding BeforeVerify hash call was set to fraCustom.
KMIPServer uses this event to delegate both hash and MAC (keyed hash) verifications.
The ObjectId parameter contains the identifier of the key object that should be used to calculate the MAC code. This parameter is empty if a simple hashing operation is requested. The Data parameter contains the data that should be verified against the hash.
The Hash parameter contains the hash or MAC record. The Algorithm parameter specifies the hash algorithm.
In this handler, the application should calculate an Algorithm hash over Data, and verify that the result matches Hash. If the result does match, it should set the IsValid parameter to true. If the hashes do not match, or if any of the call parameters are malformed or not understood by the application, it should set IsValid to false.
ostOk | 1 | |
ostNoSuchFile | 2 | |
ostAccessDenied | 3 | |
ostWriteProtect | 4 | |
ostUnsupported | 5 | |
ostInvalidParameter | 6 | |
ostEOF | 7 |
Config Settings (KMIPServer Class)
The class accepts one or more of the following configuration settings. Configuration settings are similar in functionality to properties, but they are rarely used. In order to avoid "polluting" the property namespace of the class, access to these internal properties is provided through the Config method.KMIPServer Config Settings
Base Config Settings
You can switch this property off to improve performance if your project only uses known, good private keys.
Supported values are:
off | No caching (default) | |
local | Local caching | |
global | Global caching |
This setting only applies to sessions negotiated with TLS version 1.3.
Supported values are:
file | File | |
console | Console | |
systemlog | System Log (supported for Android only) | |
debugger | Debugger (supported for VCL for Windows and .Net) |
Supported values are:
time | Current time | |
level | Level | |
package | Package name | |
module | Module name | |
class | Class name | |
method | Method name | |
threadid | Thread Id | |
contenttype | Content type | |
content | Content | |
all | All details |
Supported filter names are:
exclude-package | Exclude a package specified in the value | |
exclude-module | Exclude a module specified in the value | |
exclude-class | Exclude a class specified in the value | |
exclude-method | Exclude a method specified in the value | |
include-package | Include a package specified in the value | |
include-module | Include a module specified in the value | |
include-class | Include a class specified in the value | |
include-method | Include a method specified in the value |
none | No flush (caching only) | |
immediate | Immediate flush (real-time logging) | |
maxcount | Flush cached entries upon reaching LogMaxEventCount entries in the cache. |
Supported values are:
none | None (by default) | |
fatal | Severe errors that cause premature termination. | |
error | Other runtime errors or unexpected conditions. | |
warning | Use of deprecated APIs, poor use of API, 'almost' errors, other runtime situations that are undesirable or unexpected, but not necessarily "wrong". | |
info | Interesting runtime events (startup/shutdown). | |
debug | Detailed information on flow of through the system. | |
trace | More detailed information. |
The default value of this setting is 100.
none | No rotation | |
deleteolder | Delete older entries from the cache upon reaching LogMaxEventCount | |
keepolder | Keep older entries in the cache upon reaching LogMaxEventCount (newer entries are discarded) |
Supported Values:
certificate | Enables caching of certificates. |
crl | Enables caching of Certificate Revocation Lists (CRLs). |
ocsp | Enables caching of OCSP (Online Certificate Status Protocol) responses. |
Example (default value):
PKICache=certificate,crl,ocsp
In this example, the component caches certificates, CRLs, and OCSP responses.
The default value is an empty string - no cached PKI data is stored on disk.
Example:
PKICachePath=C:\Temp\cache
In this example, the cached PKI data is stored in the C:\Temp\cache directory.
Supported values are:
none | No static DNS rules (default) | |
local | Local static DNS rules | |
global | Global static DNS rules |
This setting only applies to certificates originating from a Windows system store.
The property accepts comma-separated values where the first descriptor name is used when the OID is mapped, and subsequent values act as aliases for parsing.
Syntax:
Config("XMLRDNDescriptorName[OID]=PrimaryName,Alias1,Alias2");
Where:
OID: The Object Identifier from the certificate's IssuerRDN or SubjectRDN that you want to map.
PrimaryName: The main descriptor name used in the XML signature when the OID is encountered.
Alias1, Alias2, ...: Optional alternative names recognized during parsing.
Usage Examples:
Map OID 2.5.4.5 to SERIALNUMBER:
Config("XMLRDNDescriptorName[2.5.4.5]=SERIALNUMBER");
Map OID 1.2.840.113549.1.9.1 to E, with aliases EMAIL and EMAILADDRESS:
Config("XMLRDNDescriptorName[1.2.840.113549.1.9.1]=E,EMAIL,EMAILADDRESS");
Trappable Errors (KMIPServer Class)
KMIPServer Errors
1048577 | Invalid parameter (SB_ERROR_INVALID_PARAMETER) |
1048578 | Invalid configuration (SB_ERROR_INVALID_SETUP) |
1048579 | Invalid state (SB_ERROR_INVALID_STATE) |
1048580 | Invalid value (SB_ERROR_INVALID_VALUE) |
1048581 | Private key not found (SB_ERROR_NO_PRIVATE_KEY) |
1048582 | Cancelled by the user (SB_ERROR_CANCELLED_BY_USER) |
1048583 | The file was not found (SB_ERROR_NO_SUCH_FILE) |
1048584 | Unsupported feature or operation (SB_ERROR_UNSUPPORTED_FEATURE) |
1048585 | General error (SB_ERROR_GENERAL_ERROR) |
20971521 | KMIP request failed (SB_ERROR_KMIP_REQUEST_FAILED) |
20971522 | The input file does not exist (SB_ERROR_KMIP_INPUTFILE_NOT_EXISTS) |
20971523 | Unsupported key algorithm (SB_ERROR_KMIP_UNSUPPORTED_KEY_ALGORITHM) |
20971524 | Invalid key (SB_ERROR_KMIP_INVALID_KEY) |