Cert Unicode C Reference Documentation

Cert

Digital certificate component / class

Create/Dispose

HCkCertW CkCertW_Create(void);

Creates an instance of the HCkCertW object and returns a handle (i.e. a "void *" pointer). The handle is passed in the 1st argument for the functions listed on this page.

void CkCertW_Dispose(HCkCertW handle);

Objects created by calling CkCertW_Create must be freed by calling this method. A memory leak occurs if a handle is not disposed by calling this function. Also, any handle returned by a Chilkat "C" function must also be freed by the application by calling the appropriate Dispose method, such as CkCertW_Dispose.

Properties

void CkCertW_getAuthorityKeyId(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_authorityKeyId(HCkCertW cHandle);

Introduced in version 9.5.0.40

The authority key identifier of the certificate in base64 string format. This is only present if the certificate contains the extension OID 2.5.29.35.

BOOL CkCertW_getAvoidWindowsPkAccess(HCkCertW cHandle);

void CkCertW_putAvoidWindowsPkAccess(HCkCertW cHandle, BOOL newVal);

Applies only when running on a Microsoft Windows operating system. If TRUE, then any method that returns a certificate will not try to also access the associated private key, assuming one exists. This is useful if the certificate was installed with high-security such that a private key access would trigger the Windows OS to display a security warning dialog. The default value of this property is FALSE.

int CkCertW_getCertVersion(HCkCertW cHandle);

The version of the certificate (1, 2, or 3). A value of 0 indicates an error -- the most likely cause being that the certificate object is empty (i.e. was never loaded with a certificate). Note: This is not the version of the software, it is the version of the X.509 certificate object. The version of the Chilkat certificate software is indicated by the Version property.

void CkCertW_getCspName(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_cspName(HCkCertW cHandle);

(Relevant only when running on a Microsoft Windows operating system.) If the HasKeyContainer property is TRUE, then the certificate is linked to a key container and this property contains the name of the associated CSP (cryptographic service provider). When a certificate is linked to a key container , the following properties will provide information about the key container and private key: CspName, KeyContainerName, MachineKeyset, and Silent.

void CkCertW_getDebugLogFilePath(HCkCertW cHandle, HCkString retval);

void CkCertW_putDebugLogFilePath(HCkCertW cHandle, const wchar_t *newVal);

const wchar_t *CkCertW_debugLogFilePath(HCkCertW cHandle);

If set to a file path, causes each Chilkat method or property call to automatically append it's LastErrorText to the specified log file. The information is appended such that if a hang or crash occurs, it is possible to see the context in which the problem occurred, as well as a history of all Chilkat calls up to the point of the problem. The VerboseLogging property can be set to provide more detailed information.

This property is typically used for debugging the rare cases where a Chilkat method call hangs or generates an exception that halts program execution (i.e. crashes). A hang or crash should generally never happen. The typical causes of a hang are:

  1. a timeout related property was set to 0 to explicitly indicate that an infinite timeout is desired,
  2. the hang is actually a hang within an event callback (i.e. it is a hang within the application code), or
  3. there is an internal problem (bug) in the Chilkat code that causes the hang.

BOOL CkCertW_getExpired(HCkCertW cHandle);

Has a value of TRUE if the certificate or any certificate in the chain of authority has expired. (This information is not available when running on Windows 95/98 computers.)

BOOL CkCertW_getForClientAuthentication(HCkCertW cHandle);

TRUE if this certificate can be used for client authentication, otherwise FALSE.

BOOL CkCertW_getForCodeSigning(HCkCertW cHandle);

TRUE if this certificate can be used for code signing, otherwise FALSE.

BOOL CkCertW_getForSecureEmail(HCkCertW cHandle);

TRUE if this certificate can be used for sending secure email, otherwise FALSE.

BOOL CkCertW_getForServerAuthentication(HCkCertW cHandle);

TRUE if this certificate can be used for server authentication, otherwise FALSE.

BOOL CkCertW_getForTimeStamping(HCkCertW cHandle);

TRUE if this certificate can be used for time stamping, otherwise FALSE.

BOOL CkCertW_getHasKeyContainer(HCkCertW cHandle);

(Relevant only when running on a Microsoft Windows operating system.) Indicates whether this certificate is linked to a key container. If TRUE then the certificate is linked to a key container (usually containing a private key). If FALSE, then it is not.

When a certificate is linked to a key container , the following properties will provide information about the key container and private key: CspName, KeyContainerName, MachineKeyset, and Silent.

unsigned long CkCertW_getIntendedKeyUsage(HCkCertW cHandle);

Bitflags indicating the intended usages of the certificate. The flags are:
Digital Signature: 0x80
Non-Repudiation: 0x40
Key Encipherment: 0x20
Data Encipherment: 0x10
Key Agreement: 0x08
Certificate Signing: 0x04
CRL Signing: 0x02
Encipher-Only: 0x01

BOOL CkCertW_getIsRoot(HCkCertW cHandle);

TRUE if this is the root certificate, otherwise FALSE.

void CkCertW_getIssuerC(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_issuerC(HCkCertW cHandle);

The certificate issuer's country.

void CkCertW_getIssuerCN(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_issuerCN(HCkCertW cHandle);

The certificate issuer's common name.

void CkCertW_getIssuerDN(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_issuerDN(HCkCertW cHandle);

The issuer's full distinguished name.

void CkCertW_getIssuerE(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_issuerE(HCkCertW cHandle);

The certificate issuer's email address.

void CkCertW_getIssuerL(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_issuerL(HCkCertW cHandle);

The certificate issuer's locality, which could be a city, count, township, or other geographic region.

void CkCertW_getIssuerO(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_issuerO(HCkCertW cHandle);

The certificate issuer's organization, which is typically the company name.

void CkCertW_getIssuerOU(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_issuerOU(HCkCertW cHandle);

The certificate issuer's organizational unit, which is the unit within the organization.

void CkCertW_getIssuerS(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_issuerS(HCkCertW cHandle);

The certificate issuer's state or province.

void CkCertW_getKeyContainerName(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_keyContainerName(HCkCertW cHandle);

(Relevant only when running on a Microsoft Windows operating system.) If the HasKeyContainer property is TRUE, then the certificate is linked to a key container and this property contains the name of the key container.

When a certificate is linked to a key container , the following properties will provide information about the key container and private key: CspName, KeyContainerName, MachineKeyset, and Silent.

void CkCertW_getLastErrorHtml(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_lastErrorHtml(HCkCertW cHandle);

Provides information in HTML format about the last method/property called. If a method call returns a value indicating failure, or behaves unexpectedly, examine this property to get more information.

void CkCertW_getLastErrorText(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_lastErrorText(HCkCertW cHandle);

Provides information in plain-text format about the last method/property called. If a method call returns a value indicating failure, or behaves unexpectedly, examine this property to get more information.

Concept of LastErrorText

LastErrorText Standard Information

void CkCertW_getLastErrorXml(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_lastErrorXml(HCkCertW cHandle);

Provides information in XML format about the last method/property called. If a method call returns a value indicating failure, or behaves unexpectedly, examine this property to get more information.

BOOL CkCertW_getLastMethodSuccess(HCkCertW cHandle);

void CkCertW_putLastMethodSuccess(HCkCertW cHandle, BOOL newVal);

Introduced in version 9.5.0.52

Indicate whether the last method call succeeded or failed. A value of TRUE indicates success, a value of FALSE indicates failure. This property is automatically set for method calls. It is not modified by property accesses. The property is automatically set to indicate success for the following types of method calls:

  • Any method that returns a string.
  • Any method returning a Chilkat object, binary bytes, or a date/time.
  • Any method returning a standard boolean status value where success = TRUE and failure = FALSE.
  • Any method returning an integer where failure is defined by a return value less than zero.

Note: Methods that do not fit the above requirements will always set this property equal to TRUE. For example, a method that returns no value (such as a "void" in C++) will technically always succeed.

BOOL CkCertW_getMachineKeyset(HCkCertW cHandle);

(Relevant only when running on a Microsoft Windows operating system.) If the HasKeyContainer property is TRUE, then the certificate is linked to a key container and this property indicates whether the key container is in the machine's keyset or in the keyset specific to the logged on user's account. If TRUE, the key container is within the machine keyset. If FALSE, it's in the user's keyset.

When a certificate is linked to a key container , the following properties will provide information about the key container and private key: CspName, KeyContainerName, MachineKeyset, and Silent.

void CkCertW_getOcspUrl(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_ocspUrl(HCkCertW cHandle);

If present in the certificate's extensions, returns the OCSP URL of the certificate. (The Online Certificate Status Protocol (OCSP) is an Internet protocol used for obtaining the revocation status of an X.509 digital certificate.)

BOOL CkCertW_getPrivateKeyExportable(HCkCertW cHandle);

(Relevant only when running on a Microsoft Windows operating system.) Indicates whether the private key was installed with security settings that allow it to be re-exported.

Backup Windows Current User / Personal Certificates to a .zip

BOOL CkCertW_getRevoked(HCkCertW cHandle);

TRUE if the certificate or any certificate in the chain of authority has been revoked. This information is not available when running on Windows 95/98 computers. Note: If this property is FALSE, it could mean that it was not able to check the revocation status. Because of this uncertainty, a CheckRevoked method has been added. It returns an integer indicating one of three possible states: 1 (revoked) , 0 (not revoked), -1 (unable to check revocation status).

void CkCertW_getRfc822Name(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_rfc822Name(HCkCertW cHandle);

The RFC-822 name of the certificate. (Also known as the Subject Alternative Name.)

If the certificate contains a list of Subject Alternative Names, such as a list of host names to be protected by a single SSL certificate, then this property will contain the comma separated list of names.

BOOL CkCertW_getSelfSigned(HCkCertW cHandle);

TRUE if this is a self-signed certificate, otherwise FALSE.

void CkCertW_getSerialNumber(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_serialNumber(HCkCertW cHandle);

The certificate's serial number as a hexidecimal string.

void CkCertW_getSha1Thumbprint(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_sha1Thumbprint(HCkCertW cHandle);

Hexidecimal string of the SHA-1 thumbprint for the certificate.

BOOL CkCertW_getSignatureVerified(HCkCertW cHandle);

Returns TRUE if the certificate and all certificates in the chain of authority have valid signatures, otherwise returns FALSE.

BOOL CkCertW_getSilent(HCkCertW cHandle);

(Relevant only when running on a Microsoft Windows operating system.) If the HasKeyContainer property is TRUE, then the certificate is linked to a key container and this property indicates whether accessing the private key will cause the operating system to launch an interactive warning dialog. If FALSE a warning dialog will be displayed. If TRUE then private key accesses are silent.

When a certificate is linked to a key container , the following properties will provide information about the key container and private key: CspName, KeyContainerName, MachineKeyset, and Silent.

void CkCertW_getSubjectC(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_subjectC(HCkCertW cHandle);

The certificate subject's country.

void CkCertW_getSubjectCN(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_subjectCN(HCkCertW cHandle);

The certificate subject's common name.

void CkCertW_getSubjectDN(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_subjectDN(HCkCertW cHandle);

The certificate subject's full distinguished name.

void CkCertW_getSubjectE(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_subjectE(HCkCertW cHandle);

The certificate subject's email address.

void CkCertW_getSubjectKeyId(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_subjectKeyId(HCkCertW cHandle);

Introduced in version 9.5.0.40

The subject key identifier of the certificate in base64 string format. This is only present if the certificate contains the extension OID 2.5.29.14.

void CkCertW_getSubjectL(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_subjectL(HCkCertW cHandle);

The certificate subject's locality, which could be a city, count, township, or other geographic region.

void CkCertW_getSubjectO(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_subjectO(HCkCertW cHandle);

The certificate subject's organization, which is typically the company name.

void CkCertW_getSubjectOU(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_subjectOU(HCkCertW cHandle);

The certificate subject's organizational unit, which is the unit within the organization.

void CkCertW_getSubjectS(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_subjectS(HCkCertW cHandle);

The certificate subject's state or province.

BOOL CkCertW_getTrustedRoot(HCkCertW cHandle);

Returns TRUE if the certificate has a trusted root authority, otherwise returns FALSE.

Note: As of version 9.5.0.41, the notion of what your application deems as trusted becomes more specific. The TrustedRoots class/object was added in v9.5.0.0. Prior to this, a certificate was considered to be anchored by a trusted root if the certificate chain could be established to a root (self-signed) certificate, AND if the root certificate was located somewhere in the Windows registry-based certificate stores. There are two problems with this: (1) it's a Windows-only solution. This property would always return FALSE on non-Windows systems, and (2) it might be considered not a strong enough set of conditions for trusting a root certificate.

As of version 9.5.0.41, this property pays attention to the new TrustedRoots class/object, which allows for an application to specificallly indicate which root certificates are to be trusted. Certificates may be added to the TrustedRoots object via the LoadCaCertsPem or AddCert methods, and then activated by calling the TrustedRoots.Activate method. The activated trusted roots are deemed to be trusted in any Chilkat API method/property that needs to make this determination. In addition, the TrustedRoots object has a property named TrustSystemCaRoots, which defaults to TRUE, which allows for backward compatibility. It will trust CA certificates stored in the Windows registry-based certificate stores, or if on Linux, will trust certificates found in /etc/ssl/certs/ca-certificates.crt.

SYSTEMTIME * CkCertW_getValidFrom(HCkCertW cHandle);

This property is deprecated. It will be removed in a future version.

The date this certificate becomes (or became) valid. It is a GMT/UTC date that is returned.

void CkCertW_getValidFromStr(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_validFromStr(HCkCertW cHandle);

The date (in RFC822 string format) that this certificate becomes (or became) valid. It is a GMT/UTC date that is returned.

SYSTEMTIME * CkCertW_getValidTo(HCkCertW cHandle);

This property is deprecated. It will be removed in a future version.

The date this certificate becomes (or became) invalid. It is a GMT/UTC date that is returned.

void CkCertW_getValidToStr(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_validToStr(HCkCertW cHandle);

The date (in RFC822 string format) that this certificate becomes (or became) invalid. It is a GMT/UTC date that is returned.

BOOL CkCertW_getVerboseLogging(HCkCertW cHandle);

void CkCertW_putVerboseLogging(HCkCertW cHandle, BOOL newVal);

If set to TRUE, then the contents of LastErrorText (or LastErrorXml, or LastErrorHtml) may contain more verbose information. The default value is FALSE. Verbose logging should only be used for debugging. The potentially large quantity of logged information may adversely affect peformance.

void CkCertW_getVersion(HCkCertW cHandle, HCkString retval);

const wchar_t *CkCertW_version(HCkCertW cHandle);

Version of the component/library, such as "9.5.0.63"

Methods

int CkCertW_CheckRevoked(HCkCertW cHandle);

Returns 1 if the certificate has been revoked, 0 if not revoked, and -1 if unable to check the revocation status.

BOOL CkCertW_ExportCertDer(HCkCertW cHandle, const unsigned char * outData);

Exports the digital certificate to ASN.1 DER format.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_ExportCertDerBd(HCkCertW cHandle, HCkBinDataW cerData);

Introduced in version 9.5.0.70

Exports the digital certificate in ASN.1 DER format to a BinData object.

Returns TRUE for success, FALSE for failure.

Backup Windows Current User / Personal Certificates to a .zip

BOOL CkCertW_ExportCertDerFile(HCkCertW cHandle, const wchar_t *path);

Exports the digital certificate to ASN.1 DER format binary file.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_ExportCertPem(HCkCertW cHandle, const wchar_t *outStr);

const wchar_t *CkCertW_exportCertPem(HCkCertW cHandle);

Exports the digital certificate to an unencrypted PEM formatted string.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_ExportCertPemFile(HCkCertW cHandle, const wchar_t *path);

Exports the digital certificate to an unencrypted PEM formatted file.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_ExportCertXml(HCkCertW cHandle, const wchar_t *outStr);

const wchar_t *CkCertW_exportCertXml(HCkCertW cHandle);

Exports a certificate to an XML format where the XML tags are the names of the ASN.1 objects that compose the X.509 certificate. Binary data is either hex or base64 encoded. (The binary data for a "bits" ASN.1 tag is hex encoded, whereas for all other ASN.1 tags, such as "octets", it is base64.)

Returns TRUE for success, FALSE for failure.

Get Certificate As XML (and gets Signature Algorithm Identifier)

HCkPrivateKeyW CkCertW_ExportPrivateKey(HCkCertW cHandle);

Exports the certificate's private key.

Returns NULL on failure

HCkPublicKeyW CkCertW_ExportPublicKey(HCkCertW cHandle);

Exports the certificate's public key.

Returns NULL on failure

Get RSA Key Modulus from .cer or .key

BOOL CkCertW_ExportToPfxBd(HCkCertW cHandle, const wchar_t *password, BOOL includeCertChain, HCkBinDataW pfxData);

Introduced in version 9.5.0.70

Exports the certificate and private key (if available) to pfxData. The password is what will be required to access the PFX contents at a later time. If includeCertChain is TRUE, then the certificates in the chain of authority are also included in the PFX.

Returns TRUE for success, FALSE for failure.

Backup Windows Current User / Personal Certificates to a .zip

BOOL CkCertW_ExportToPfxData(HCkCertW cHandle, const wchar_t *password, BOOL includeCertChain, const unsigned char * outBytes);

Introduced in version 9.5.0.31

Exports the certificate and private key (if available) to an in-memory PFX image. The password is what will be required to access the PFX contents at a later time. If includeCertChain is TRUE, then the certificates in the chain of authority are also included in the PFX.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_ExportToPfxFile(HCkCertW cHandle, const wchar_t *pfxFilename, const wchar_t *pfxPassword, BOOL bIncludeCertChain);

Exports the certificate and private key (if available) to a PFX (.pfx or .p12) file. The output PFX is secured using the pfxPassword. If bIncludeCertChain is TRUE, then the certificates in the chain of authority are also included in the PFX output file.

Returns TRUE for success, FALSE for failure.

HCkCertW CkCertW_FindIssuer(HCkCertW cHandle);

Finds and returns the issuer certificate. If the certificate is a root or self-issued, then the certificate returned is a copy of the caller certificate. (The IsRoot property can be check to see if the certificate is a root (or self-issued) certificate.)

Returns NULL on failure

HCkCertChainW CkCertW_GetCertChain(HCkCertW cHandle);

Introduced in version 9.5.0.40

Returns a certficate chain object containing all the certificates (including this one), in the chain of authentication to the trusted root (if possible). If this certificate object was loaded from a PFX, then the certiicates contained in the PFX are automatically available for building the certificate chain. The UseCertVault method can be called to provide additional certificates that might be required to build the cert chain. Finally, the TrustedRoots object can be used to provide a way of making trusted root certificates available.

Note: Prior to v9.5.0.50, this method would fail if the certificate chain could not be completed to the root. Starting in v9.5.0.50, the incomplete certificate chain will be returned. The certificate chain's ReachesRoot property can be examined to see if the chain was completed to the root.

On Windows systems, the registry-based certificate stores are automatically consulted if needed to locate intermediate or root certificates in the chain.

Returns NULL on failure

Get the Server Certificate, Certificate Chain, and Root CA Certificate

BOOL CkCertW_GetEncoded(HCkCertW cHandle, const wchar_t *outStr);

const wchar_t *CkCertW_getEncoded(HCkCertW cHandle);

Returns a base64 encoded string representation of the certificate's binary DER format, which can be passed to SetFromEncoded to recreate the certificate object.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_GetExtensionAsXml(HCkCertW cHandle, const wchar_t *oid, const wchar_t *outStr);

const wchar_t *CkCertW_getExtensionAsXml(HCkCertW cHandle, const wchar_t *oid);

Introduced in version 9.5.0.49

Returns the certificate extension data in XML format (converted from ASN.1). The oid is an OID, such as the ones listed here: http://www.alvestrand.no/objectid/2.5.29.html

Note: In many cases, the data within the XML is returned base64 encoded. An application may need to take one further step to base64 decode the information contained within the XML.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_GetPrivateKeyPem(HCkCertW cHandle, const wchar_t *outStr);

const wchar_t *CkCertW_getPrivateKeyPem(HCkCertW cHandle);

Exports the certificate's private key to a PEM string (if the private key is available).

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_GetSpkiFingerprint(HCkCertW cHandle, const wchar_t *hashAlg, const wchar_t *encoding, const wchar_t *outStr);

const wchar_t *CkCertW_getSpkiFingerprint(HCkCertW cHandle, const wchar_t *hashAlg, const wchar_t *encoding);

Introduced in version 9.5.0.55

Returns the SPKI Fingerprint suitable for use in pinning. (See RFC 7469.) An SPKI Fingerprint is defined as the output of a known cryptographic hash algorithm whose input is the DER-encoded ASN.1 representation of the Subject Public Key Info (SPKI) of an X.509 certificate. The hashAlg specifies the hash algorithm and may be "sha256", "sha384", "sha512", "sha1", "md2", "md5", "haval", "ripemd128", "ripemd160","ripemd256", or "ripemd320". The encoding specifies the encoding, and may be "base64", "hex", or any of the encoding modes specified in the article at the link below.

Returns TRUE for success, FALSE for failure.

List of Chilkat Encoding Modes

SPKI Fingerprint

HCkDateTimeW CkCertW_GetValidFromDt(HCkCertW cHandle);

Returns the date/time this certificate becomes (or became) valid.

Returns NULL on failure

HCkDateTimeW CkCertW_GetValidToDt(HCkCertW cHandle);

Returns the date/time this certificate becomes (or became) invalid.

Returns NULL on failure

BOOL CkCertW_HasPrivateKey(HCkCertW cHandle);

Returns true if the private key is installed on the local system for the certificate.

BOOL CkCertW_LinkPrivateKey(HCkCertW cHandle, const wchar_t *keyContainerName, BOOL bMachineKeyset, BOOL bForSigning);

(Relevant only when running on a Microsoft Windows operating system.) Associates a private key with a certificate. The private key is specified by providing the name of the key container where it can be found. The 2nd argument indicates whether the key container is from the machine-wide keyset (TRUE), or from the keyset specific to the logged-on user (FALSE). Private keys can be imported into a key container by calling the KeyContainer's ImportPrivateKey method. Once a certificate has been linked, the private key is available for creating digital signatures or decrypting. Note: Certificates imported from a PFX or from a Certificate Authority will already be "linked" and it is not necessary to call this method.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_LoadByCommonName(HCkCertW cHandle, const wchar_t *cn);

(Relevant only when running on a Microsoft Windows operating system.) Searches the Windows Local Machine and Current User registry-based certificate stores for a certificate having the common name specified. If found, the certificate is loaded and ready for use.

Returns TRUE for success, FALSE for failure.

Select Cert for Encrypted Email

Create P7M Using Pre-Installed Windows Certificate

BOOL CkCertW_LoadByEmailAddress(HCkCertW cHandle, const wchar_t *emailAddress);

(Relevant only when running on a Microsoft Windows operating system.) Searches the Windows Local Machine and Current User registry-based certificate stores for a certificate containing the email address specified. If found, the certificate is loaded and ready for use.

Returns TRUE for success, FALSE for failure.

Select Cert for Encrypted Email

BOOL CkCertW_LoadByIssuerAndSerialNumber(HCkCertW cHandle, const wchar_t *issuerCN, const wchar_t *serialNumber);

(Relevant only when running on a Microsoft Windows operating system.) Searches the Windows Local Machine and Current User registry-based certificate stores for a certificate matching the issuerCN and having an issuer matching the serialNumber. If found, the certificate is loaded and ready for use.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_LoadFromBase64(HCkCertW cHandle, const wchar_t *encodedCert);

Loads an ASN.1 or DER encoded certificate represented in a Base64 string.

Returns TRUE for success, FALSE for failure.

Get a Certificate's Key Size

BOOL CkCertW_LoadFromBd(HCkCertW cHandle, HCkBinDataW certBytes);

Introduced in version 9.5.0.70

Loads an X.509 certificate from the ASN.1 DER encoded bytes contained in certBytes.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_LoadFromBinary(HCkCertW cHandle, const unsigned char * data);

Loads an X.509 certificate from ASN.1 DER encoded bytes.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_LoadFromBinary2(HCkCertW cHandle, const unsigned char * pByteData, unsigned long szByteData);

The same as LoadFromBinary, but instead of using a CkByteData object, the pointer to the byte data and length (in number of bytes) are specified directly in the method arguments.

BOOL CkCertW_LoadFromFile(HCkCertW cHandle, const wchar_t *path);

Loads a certificate from a .cer, .crt, .p7b, or .pem file. This method accepts certificates from files in any of the following formats:
1. DER encoded binary X.509 (.CER)
2. Base-64 encoded X.509 (.CER)
3. Cryptographic Message Syntax Standard - PKCS #7 Certificates (.P7B)
4. PEM format
This method decodes the certificate based on the contents if finds within the file, and not based on the file extension. If your certificate is in a file having a different extension, try loading it using this method before assuming it won't work. This method does not load .p12 or .pfx (PKCS #12) files.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_LoadPem(HCkCertW cHandle, const wchar_t *strPem);

Introduced in version 9.5.0.49

Loads the certificate from a PEM string.

Returns TRUE for success, FALSE for failure.

Load Certificate from PEM and Access the Public Key

BOOL CkCertW_LoadPfxBd(HCkCertW cHandle, HCkBinDataW pfxData, const wchar_t *password);

Introduced in version 9.5.0.70

Loads the certificate from the PFX contained in pfxData. Note: If the PFX contains multiple certificates, the 1st certificate in the PFX is loaded.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_LoadPfxData(HCkCertW cHandle, const unsigned char * pfxData, const wchar_t *password);

Loads a PFX from an in-memory image of a PFX file. Note: If the PFX contains multiple certificates, the 1st certificate in the PFX is loaded.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_LoadPfxData2(HCkCertW cHandle, const unsigned char * pByteData, unsigned long szByteData, const wchar_t *password);

Loads a PFX from an in-memory image of a PFX file. Note: If the PFX contains multiple certificates, the 1st certificate in the PFX is loaded.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_LoadPfxFile(HCkCertW cHandle, const wchar_t *pfxPath, const wchar_t *password);

Loads a PFX file. Note: If the PFX contains multiple certificates, the 1st certificate in the PFX is loaded.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_LoadTaskResult(HCkCertW cHandle, HCkTaskW task);

Introduced in version 9.5.0.52

Loads the certificate from a completed asynchronous task.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_PemFileToDerFile(HCkCertW cHandle, const wchar_t *fromPath, const wchar_t *toPath);

Converts a PEM file to a DER file.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_SaveLastError(HCkCertW cHandle, const wchar_t *path);

Saves the last-error information (the contents of LastErrorXml) to an XML formatted file.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_SaveToFile(HCkCertW cHandle, const wchar_t *path);

Saves a certificate object to a .cer file.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_SetFromEncoded(HCkCertW cHandle, const wchar_t *encodedCert);

Initializes the certificate object from a base64 encoded string representation of the certificate's binary DER format.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_SetPrivateKey(HCkCertW cHandle, HCkPrivateKeyW privKey);

Used to associate a private key with the certificate for subsequent (PKCS7) signature creation or decryption.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_SetPrivateKeyPem(HCkCertW cHandle, const wchar_t *privKeyPem);

Same as SetPrivateKey, but the key is provided in unencrypted PEM format. (Note: The privKeyPem is not a file path, it is the actual PEM text.)

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_UseCertVault(HCkCertW cHandle, HCkXmlCertVaultW vault);

Introduced in version 9.5.0.40

Adds an XML certificate vault to the object's internal list of sources to be searched for certificates for help in building certificate chains and verifying the certificate signature to the trusted root.

Returns TRUE for success, FALSE for failure.

BOOL CkCertW_VerifySignature(HCkCertW cHandle);

Introduced in version 9.5.0.40

Verifies the certificate signature, as well as the signatures of all certificates in the chain of authentication to the trusted root. Returns TRUE if all signatures are verified to the trusted root. Otherwise returns FALSE.