Crypt2 JavaScript Reference Documentation

Crypt2

Current Version: 11.4.0

Chilkat encryption component.

Object Creation

Note: This is intended for running within a Chilkat.Js embedded JavaScript engine.

var obj = new CkCrypt2();

Properties

AbortCurrent
AbortCurrent
· boolean
Introduced in version 9.5.0.58

Setting this property to true will abort the current method, but only for those methods having an Async alternative. The property automatically resets to false at the start of each method and after an abort. Both synchronous and asynchronous methods can be aborted; synchronous methods require setting this property from another thread.

top
BCryptWorkFactor
BCryptWorkFactor
· int
Introduced in version 9.5.0.65

The BCrypt work factor determines the computational cost of BCryptHash and BCryptVerify . It represents the base-2 logarithm of the number of hashing rounds. For instance, a work factor of 12 corresponds to 2^12 hashing rounds. This cost factor is designed to make computations challenging enough to deter brute-force attacks. The work factor must be set between 4 and 31, inclusive, with a default value of 10.

top
BlockSize
BlockSize
· int, read-only

This property indicates the block size in bytes for the chosen encryption algorithm. For instance, if the CryptAlgorithm is set to AES, the BlockSize is automatically set to 16 bytes. In contrast, the block size for the ChaCha20 streaming algorithm is 1 byte.

top
CadesEnabled
CadesEnabled
· boolean

This property applies to all PKCS7 signature creation methods. When set to true, it ensures the inclusion of required attributes (such as content-type, message-digest, and signing-certificate-v2) to qualify the signature as at least a CAdES-BES signature. By default, this property is set to false.

top
CadesSigPolicyHash
CadesSigPolicyHash
· string

This property is for PKCS7 CMS signatures that wish to include CAdES signature policy attributes. Set it to the base64-encoded hash of the policy document at the CadesSigPolicyUri using either SHA256 or SHA1.

top
CadesSigPolicyId
CadesSigPolicyId
· string

This property is for PKCS7 CMS signatures that wish to include CAdES signature policy attributes. The CAdES Signature Policy ID is an object identifier (OID) included in a CAdES signature that specifies the exact signature policy the signer followed. It is the OID associated with the policy URL. An example OID would look like this: 2.16.840.1.101.3.2.1.48.1

An application that wishes to include signature policy attributes should set all three properties: CadesSigPolicyHash , CadesSigPolicyUri , and CadesSigPolicyId .

More Information and Examples
top
CadesSigPolicyUri
CadesSigPolicyUri
· string

This property is for PKCS7 CMS signatures that wish to include CAdES signature policy attributes. The signature policy URI in a CAdES digital signature is a link that points to a document describing the rules and conditions under which the signature was created. Typically the Signature Policy URI in a CAdES signature points to a .der file, not a PDF or human-readable document. For example: http://example.com/policies/my-policy.der

More Information and Examples
top
Charset
Charset
· string

This property specifies the character encoding used to represent text as bytes for encryption and hashing. By default, it uses the computer's ANSI charset, such as Windows-1252 for locales like the United States, United Kingdom, Western Europe, Australia, and New Zealand.

Most applications are advised to set this property to UTF-8. Chilkat plans to change its default to UTF-8 in a future major version to align with current standards. The current default of ANSI stems from a time when UTF-8 was not widely adopted.

top
CipherMode
CipherMode
· string

Sets the cipher mode for block encryption algorithms (AES, Blowfish,TwoFish, DES, 3DES, RC2). Possible values are CBC (the default) , ECB, CTR, OFB, GCM, and CFB. These acronyms have the following meanings:

  • CBC: Cipher Block Chaining,
  • ECB: Electronic CookBook
  • CTR: Counter Mode
  • CFB: Cipher Feedback
  • OFB: Output Feedback
  • GCM: Galois/Counter Mode
  • XTS: AES-XTS (starting in Chilkat v9.5.0.91, only works with AES encryption)

The GCM (Galois/Counter Mode) is available with any cipher having a 16-byte block size, such as AES. The CFB, OFB, CTR, and GCM modes convert block ciphers into stream ciphers. In these modes of operation, the PaddingScheme property is unused because no padding occurs.

Starting in v9.5.0.91 Chilkat supports AES-XTS mode. XTS mode additionally uses a tweak key and tweak value, which are set via the XtsSetEncodedTweakKey, XtsSetEncodedTweakValue, and XtsSetDataUnitNumber. (The latter two functions provide alternative means of setting the tweak value.) Chilkat fully supports AES-XTS mode with ciphertext-stealing, which means it will correctly encrypt/decrypt data with size not divisible by the block size (i.e. divisible by 16 bytes).

top
CmsOptions
CmsOptions
· string
Introduced in version 9.5.0.78

A JSON string to manage additional CMS (PKCS7) signature and validation options. Possible options are:

  • boolean OmitAlgorithmIdNull: Set this JSON member to true to omit the explicit NULL within an AlgorithmIdentifier ASN.1 within the PKCS7. This should almost never be used, but helps for rare cases where a validator dislikes the explicit NULL being present.
  • boolean ValidateTimestampTokens: Tells Chilkat to also validate the timestamp tokens when validating a signature that includes a timestamp.
  • boolean ConstructedOctets: When set to true, tells Chilkat to use the ASN.1 constructed octets format for the data contained in the CMS (PKCS7) signed-data.
  • boolean CanonicalizeITIDA: This applies to Egypt ITIDA, which requires signed documents in a CAdES-BES CMS format, using ITIDA’s JSON canonicalization (for JSON payloads), with only the Base64‑encoded signature attached—not the original data itself. When set to true, Chilkat will automatically do the special ITIDA JSON canonicalization.

top
CryptAlgorithm
CryptAlgorithm
· string

Selects the encryption algorithm for encrypting and decrypting. Possible values are:

Algorithm Type Symmetric? Key Size(s) Block/Stream Mode of Operation Notes
aes Block cipher ✔ Yes 128, 192, 256 bits Block (128-bit) CBC, CTR, GCM, etc. Widely used, FIPS-approved
pki (Public-Key Encryption) Asymmetric ✗ No 1024–4096+ bits N/A N/A Used for key exchange, not bulk data
chacha20 Stream cipher ✔ Yes 256 bits Stream N/A High speed, secure, designed for simplicity
des Block cipher ✔ Yes 56 bits Block (64-bit) ECB, CBC, etc. Deprecated, insecure
3des Block cipher ✔ Yes 112 or 168 bits Block (64-bit) ECB, CBC, etc. Legacy use, weak by modern standards
rc2 Block cipher ✔ Yes 40–128 bits (variable) Block (64-bit) ECB, CBC, etc. Obsolete, variable strength
blowfish2 (Blowfish) Block cipher ✔ Yes 32–448 bits (variable) Block (64-bit) ECB, CBC, etc. Fast, but 64-bit block size is a limitation
twofish Block cipher ✔ Yes Up to 256 bits Block (128-bit) ECB, CBC, etc. AES finalist, secure and flexible
pbes1 Key derivation ✔ Yes Based on underlying cipher Block (varies) PKCS#5 v1.5 Obsolete, uses DES/RC2
pbes2 Key derivation ✔ Yes Based on underlying cipher Block (varies) PKCS#5 v2.0 Modern, supports AES, SHA, etc.
arc4 (RC4) Stream cipher ✔ Yes 40–2048 bits (variable) Stream N/A Deprecated, insecure due to biases

top
DebugLogFilePath
DebugLogFilePath
· string

If set to a file path, this property logs the LastErrorText of each Chilkat method or property call to the specified file. This logging helps identify the context and history of Chilkat calls leading up to any crash or hang, aiding in debugging.

Enabling the VerboseLogging property provides more detailed information. This property is mainly used for debugging rare instances where a Chilkat method call causes a hang or crash, which should generally not happen.

Possible causes of hangs include:

  • A timeout property set to 0, indicating an infinite timeout.
  • A hang occurring within an event callback in the application code.
  • An internal bug in the Chilkat code causing the hang.

More Information and Examples
top
EncodingMode
EncodingMode
· string

The EncodingMode property specifies the binary encoding format (e.g., base64, hex, base58, base64url) used by functions ending in "ENC", like EncryptStringENC and DecryptStringENC. For encryption functions, EncodingMode determines the encoding of the output. For decryption functions, it specifies the encoding of the input data.

A list of supported binary encodings is available at the link below.

The default value is base64

More Information and Examples
top
FirstChunk
FirstChunk
· boolean

Using the FirstChunk and LastChunk properties is the way to do streaming encryption or decryption with Chilkat.

By default, both FirstChunk and LastChunk are set to true, indicating that the data passed to the encryption or decryption method is the full amount. To process data in multiple chunks, adjust these settings as follows:

1. For the first chunk, set FirstChunk = true and LastChunk = false.
2. For intermediate chunks, set both FirstChunk = false and LastChunk = false.
3. For the final chunk, set FirstChunk = false and LastChunk = true.

You can feed data chunks of any size, regardless of the encryption algorithm's block size (e.g., 16 bytes for AES). Chilkat will handle buffering and, upon receiving the final chunk, pad the output to the appropriate block size according to the selected PaddingScheme.

top
HashAlgorithm
HashAlgorithm
· string

Selects the hash algorithm used by methods that create hashes. The valid choices are sha256, sha384, sha512, sha3-224, sha3-256, sha3-384, sha3-512, sha1, md2, md5, haval, ripemd128, ripemd160,ripemd256, or ripemd320.

(Chilkat supports SHA-2 because it includes the SHA-256, SHA-384, and SHA-512 hash functions.)

The default value is sha256.

Note: The HAVAL hash algorithm is affected by two other properties: HavalRounds and KeyLength .

  • The HavalRounds may have values of 3, 4, or 5.
  • For HAVAL hashing, the KeyLength can be 128, 160, 192, 224, or 256.

More Information and Examples
top
HavalRounds
HavalRounds
· int

Applies to the HAVAL hash algorithm only and must be set to the integer value 3, 4, or 5. The default value is 3.

top
IncludeCertChain
IncludeCertChain
· boolean

This applies only to creating digital signatures. By default (true), any additional certificates in the authentication chain are included in the PKCS7 digital signature.

top
InitialCount
InitialCount
· int
Introduced in version 9.5.0.55

The initial counter for the ChaCha20 encryption algorithm, which has a default value of 0, is pre-agreed by both the encryptor and decryptor.

top
IterationCount
IterationCount
· int

The iteration count in password-based encryption (PBE) establishes the computational difficulty for encryption and decryption, thereby enhancing resistance to exhaustive search attacks. The default iteration count is 1024, which is considered low, so it is recommended that applications increase this number when using pbes2 encryption.

PBES2 Iteration Count Recommendations

Aim for a 100–200 ms derive time on your target hardware.

  • Server/Desktop: 100000 – 1000000+
  • Mobile/Embedded: 50000 - 100000

Benchmark annually and increase iterations as hardware improves.

top
KeyLength
KeyLength
· int

The key length in bits for symmetric encryption algorithms. The default value is 256.

top
LastChunk
LastChunk
· boolean

See the documentation for the FirstChunk property.

top
LastErrorHtml
LastErrorHtml
· string, read-only

Provides HTML-formatted information about the last called method or property. If a method call fails or behaves unexpectedly, check this property for details. Note that information is available regardless of the method call's success.

top
LastErrorText
LastErrorText
· string, read-only

Provides plain text information about the last called method or property. If a method call fails or behaves unexpectedly, check this property for details. Note that information is available regardless of the method call's success.

top
LastErrorXml
LastErrorXml
· string, read-only

Provides XML-formatted information about the last called method or property. If a method call fails or behaves unexpectedly, check this property for details. Note that information is available regardless of the method call's success.

top
LastMethodSuccess
LastMethodSuccess
· boolean

Indicates the success or failure of the most recent method call: true means success, false means failure. This property remains unchanged by property setters or getters. This method is present to address challenges in checking for null or Nothing returns in certain programming languages. Note: This property does not apply to methods that return integer values or to boolean-returning methods where the boolean does not indicate success or failure.

top
MacAlgorithm
MacAlgorithm
· string
Introduced in version 9.5.0.55

Selects the MAC algorithm to be used for any of the Mac methods, such as MacStringENC, MacBytes, etc. The default value is hmac. Possible values are hmac and poly1305.

More Information and Examples
top
NumSignerCerts
NumSignerCerts
· int, read-only

This property is set upon verifying a digital signature and indicates the number of signer certificates. You can retrieve each signing certificate using the LastSignerCert method with an index ranging from 0 to NumSignerCerts-1.

top
OaepHash
OaepHash
· string
Introduced in version 9.5.0.67

Selects the hash algorithm for use within OAEP padding when encrypting using pki with RSAES-OAEP. The valid choices are sha1, sha256, sha384, sha512,

The default value is sha256

top
OaepMgfHash
OaepMgfHash
· string
Introduced in version 9.5.0.71

Selects the MGF hash algorithm for use within OAEP padding when encrypting using pki with RSAES-OAEP. The valid choices are sha1, sha256, sha384, sha512, The default is sha256.

top
OaepPadding
OaepPadding
· boolean
Introduced in version 9.5.0.67

Selects the RSA encryption scheme when encrypting using pki (with a certificate and private key). The default value is false, which selects RSAES_PKCS1-V1_5. If set to true, then RSAES_OAEP is used.

top
PaddingScheme
PaddingScheme
· int

This property defines the padding scheme Chilkat uses for adding padding to input data during encryption and removing it during decryption. It is applicable only to symmetric block ciphers, such as AES, Blowfish, and Twofish, which require input sizes matching their exact block size. Padding ensures the last block is completely filled.

The possible values are:

  1. PKCS#5/PKCS#7 (RFC 1423) default
    Each pad byte = number of padding bytes.
    Block size: 8
    Data: "HELLO" (5 bytes)
    Padding: 0x03 0x03 0x03
  2. FIPS 81
    Last byte = count; others = random.
    Block size: 8
    Data: "HELLO"
    Padding: 0xA4 0x2F 0x9C 0x03
  3. Random
    All pad bytes random; decryptor must know original length.
    Block size: 8
    Data: "HELLO"
    Padding: 0x7D 0x20 0xCB 0x81
  4. Null (0x00)
    Pad with zeros; no padding if already exact.
    Block size: 8
    Data: "HEL" (3 bytes)
    Padding: 0x00 0x00 0x00 0x00 0x00
  5. Space (0x20)
    Pad with spaces; no padding if already exact.
    Block size: 8
    Data: "HEL" (3 bytes)
    Padding: 0x20 0x20 0x20 0x20 0x20

More Information and Examples
top
PbesAlgorithm
PbesAlgorithm
· string

If the CryptAlgorithm property is set to pbes1 or pbes2, this property defines the symmetric encryption algorithm to be used for password-based encryption (PBE). The default is "des". Applications should set this property equal to "aes".

More Information and Examples
top
PbesPassword
PbesPassword
· string

The password to be used when the CryptAlgorithm is "pbes1" or "pbes2".

More Information and Examples
top
Pkcs7CryptAlg
Pkcs7CryptAlg
· string

This property determines the underlying symmetric encryption algorithm when the CryptAlgorithm property is set to pki for selecting PKCS7 public-key encryption.

The default is aes.

top
Rc2EffectiveKeyLength
Rc2EffectiveKeyLength
· int

The effective key length (in bits) for the RC2 encryption algorithm. When using RC2, set both the KeyLength and Rc2EffectiveKeyLength properties to values between 8 and 1024, inclusive. The default setting for both is 128.

The default value is 128

RC2 is an old symmetric encryption algorithm, now considered insecure due to its small key size and vulnerability to cryptanalysis. Modern algorithms like AES are recommended instead.

top
SigningAlg
SigningAlg
· string
Introduced in version 9.5.0.67

This property applies when creating RSA signatures.

It defines the RSA signature scheme. The default is PKCS1-v1_5. You can change it to RSASSA-PSS (or pss) to use the RSASSA-PSS signature scheme.

  1. PKCS#1 v1.5
    Older, deterministic scheme.
    - Simple padding.
    - Vulnerable to certain attacks if not used carefully.
    - Still widely used for compatibility.
  2. RSASSA-PSS
    Newer, probabilistic scheme (recommended by modern standards).
    - Adds random salt for each signature.
    - More secure against chosen-plaintext and padding oracle attacks.
    - Recommended by modern standards like PKCS#1 v2.1 and FIPS.

top
SigningAttributes
SigningAttributes
· string
Introduced in version 9.5.0.75

Contains JSON to specify the authenticated (signed) attributes or unauthenticated (unsigned) attributes that are to be included in CMS signatures. The default value is:

{
    "contentType": true,
    "signingTime": true,
    "messageDigest": true
}

More Information and Examples
top
UncommonOptions
UncommonOptions
· string
Introduced in version 9.5.0.83

This is a catch-all property to be used for uncommon needs. This property defaults to the empty string and should typically remain empty.

Can be set to a list of the following comma separated keywords:

  • UseConstructedOctets - Introduced in v9.5.0.83. When creating opaque CMS signatures (signatures that embed the data being signed), will use the constructed octets form of the ASN.1 that holds the data. This is to satify some validators that are brittle/fragile/picky and require a particular format, such as for the ICP-Brazil Digital Signature Standard.

top
UuFilename
UuFilename
· string

When UU encoding, this is the filename to be embedded in UU encoded output. The default is file.dat. When UU decoding, this is the filename found in the UU encoded input.

More Information and Examples
top
UuMode
UuMode
· string

When UU encoding, this is the file permissions mode to be embedded in UU encoded output. The default is 644. When UU decoding, this property is set to the mode found in the UU encoded input.

top
VerboseLogging
VerboseLogging
· boolean

If set to true, then the contents of LastErrorText (or LastErrorXml, or LastErrorHtml) may contain more verbose information. The default value is false. Verbose logging should only be used for debugging. The potentially large quantity of logged information may adversely affect peformance.

top
Version
Version
· string, read-only

Version of the component/library, such as "10.1.0"

More Information and Examples
top

Methods

AddEncryptCert
AddEncryptCert(cert);
· return: undefined
· cert: CkCert

Adds a certificate for public-key encryption. To enable public-key encryption with digital certificates, set the CryptAlgorithm property to pki. Call AddEncryptCert separately for each certificate you wish to use for encryption.

Any of the Encrypt* methods will do RSA public-key encryption when the CryptAlgorithm is set to the keyword pki. The output is a PKCS#7 enveloped-data secure container.

top
AddPfxSourceBd
var success = AddPfxSourceBd(bd, password);
· return: boolean; true for success, false for failure
· bd: CkBinData
· password: string
Introduced in version 11.0.0

Adds a PFX file to the object's list of sources for locating certificates and private keys during public-key decryption or signing. To add multiple PFX sources, call this method multiple times. bd should contain the bytes of a PFX file (also known as PKCS12 or .p12).

Note: Information about the certificate(s) needed for public-key decryption are included in the PKCS#7 enveloped-data. Chilkat will automatically find a usable certificate and private key from sources like Windows certificate stores, the Apple keychain, or other sources provided by the application.

Returns true for success, false for failure.

More Information and Examples
top
AddPfxSourceFile
var success = AddPfxSourceFile(pfxFilePath, pfxPassword);
· return: boolean; true for success, false for failure
· pfxFilePath: string
· pfxPassword: string

Adds a PFX file to the object's list of sources for locating certificates and private keys during public-key decryption or signing. To add multiple PFX sources, call this method multiple times.

Note: Information about the certificate(s) needed for public-key decryption are included in the PKCS#7 enveloped-data. Chilkat will automatically find a usable certificate and private key from sources like Windows certificate stores, the Apple keychain, or other sources provided by the application.

Returns true for success, false for failure.

More Information and Examples
top
AddSigningCert
var success = AddSigningCert(cert);
· return: boolean; true for success, false for failure
· cert: CkCert
Introduced in version 9.5.0.83

Call this method once per certificate to add multiple certificates for signing. If signing with a single certificate, then the SetSigningCert or SetSigningCert2 methods can be used instead.

Returns true for success, false for failure.

top
AesKeyUnwrap
var strVal = AesKeyUnwrap(kek, wrappedKeyData, encoding);
· return: string
· kek: string
· wrappedKeyData: string
· encoding: string
Introduced in version 9.5.0.66

Implements the AES Key Wrap Algorithm (RFC 3394) for unwrapping. The kek is the Key Encryption Key (the AES key used to unwrap the wrappedKeyData). The arguments and return value are binary encoded strings using the encoding specified by encoding (which can be base64, hex, base64url, etc.) The full list of supported encodings is available at the link below.

The kek should be an AES key of 16 bytes, 24 bytes, or 32 bytes (i.e. 128-bits, 192- bits, or 256-bits). For example, if passed as a hex string, then the kek should be 32 chars in length, 48 chars, or 64 chars (because each byte is represented as 2 chars in hex).

The wrappedKeyData contains the data to be unwrapped. The result, if decoded, is 8 bytes less than the wrapped key data. For example, if a 256-bit AES key (32 bytes) is wrapped, the size of the wrapped key data is 40 bytes. Unwrapping restores it to the original 32 bytes.

Returns null on failure

top
AesKeyUnwrapWithPadding
var strVal = AesKeyUnwrapWithPadding(kek, wrappedKeyData, encoding);
· return: string
· kek: string
· wrappedKeyData: string
· encoding: string
Introduced in version 9.5.0.96

Implements the AES Key Wrap with Padding Algorithm (RFC 5649) for unwrapping. The kek is the Key Encryption Key (the AES key used to unwrap the wrappedKeyData). The arguments and return value are binary encoded strings using the encoding specified by encoding (which can be base64, hex, base64url, etc.)

The kek should be an AES key of 16 bytes, 24 bytes, or 32 bytes (i.e. 128-bits, 192- bits, or 256-bits). For example, if passed as a hex string, then the kek should be 32 chars in length, 48 chars, or 64 chars (because each byte is represented as 2 chars in hex).

The wrappedKeyData contains the data to be unwrapped.

The unwrapped key is returned as an encoded string (using the encoding specified in encoding).

Returns null on failure

top
AesKeyWrap
var strVal = AesKeyWrap(kek, keyData, encoding);
· return: string
· kek: string
· keyData: string
· encoding: string
Introduced in version 9.5.0.66

Implements the AES Key Wrap Algorithm (RFC 3394). The kek is the Key Encryption Key (the AES key used to encrypt the keyData). The arguments and return value are binary encoded strings using the encoding specified by encoding (which can be base64, hex, base64url, etc.) The full list of supported encodings is available at the link below.

The kek should be an AES key of 16 bytes, 24 bytes, or 32 bytes (i.e. 128-bits, 192- bits, or 256-bits). For example, if passed as a hex string, then the kek should be 32 chars in length, 48 chars, or 64 chars (because each byte is represented as 2 chars in hex).

The keyData contains the data to be key wrapped. It must be a multiple of 64-bits in length. In other words, if the keyData is decoded to binary, it should be a number of bytes that is a multiple of 8.

The return string, if decoded to binary bytes, is equal to the size of the key data + 8 additional bytes.

Returns null on failure

top
AesKeyWrapWithPadding
var strVal = AesKeyWrapWithPadding(kek, keyData, encoding);
· return: string
· kek: string
· keyData: string
· encoding: string
Introduced in version 9.5.0.96

Implements the AES Key Wrap with Padding Algorithm (RFC 5649). The kek is the Key Encryption Key (the AES key used to encrypt the keyData). The arguments and return value are binary encoded strings using the encoding specified by encoding (which can be base64, hex, base64url, etc.)

The kek should be an AES key of 16 bytes, 24 bytes, or 32 bytes (i.e. 128-bits, 192- bits, or 256-bits). For example, if passed as a hex string, then the kek should be 32 chars in length, 48 chars, or 64 chars (because each byte is represented as 2 chars in hex).

The keyData contains the data to be key wrapped.

Returns the wrapped key using the encoding specified in encoding.

Returns null on failure

top
BCryptHash
var strVal = BCryptHash(password);
· return: string
· password: string
Introduced in version 9.5.0.65

Computes and returns a bcrypt hash of the password. The number of rounds of hashing is determined by the BCryptWorkFactor property.

Starting in v9.5.0.76, if the password is prefixed with $2b$ then the output will use the $2b version of bcrypt. For example, to create a $2b$ bcrypt has for the password secret, pass in the string $2b$secret for password.

Returns null on failure

More Information and Examples
top
BCryptVerify
var success = BCryptVerify(password, bcryptHash);
· return: boolean; true for success, false for failure
· password: string
· bcryptHash: string
Introduced in version 9.5.0.65

Verifies the password against a previously computed BCrypt hash. Returns true if the password matches the bcryptHash. Returns false if the password does not match.

Returns true for success, false for failure.

top
CkDecryptFile
var success = CkDecryptFile(srcFile, destFile);
· return: boolean; true for success, false for failure
· srcFile: string
· destFile: string

File-to-file decryption that supports files of any size by using internal streaming mode.

Returns true for success, false for failure.

More Information and Examples
top
CkEncryptFile
var success = CkEncryptFile(srcFile, destFile);
· return: boolean; true for success, false for failure
· srcFile: string
· destFile: string

File-to-file encryption that operates in streaming mode, allowing it to encrypt files of any size.

Returns true for success, false for failure.

top
ClearEncryptCerts
ClearEncryptCerts();
· return: undefined

Clears the internal list of digital certificates to be used for public-key encryption.

More Information and Examples
top
ClearSigningCerts
ClearSigningCerts();
· return: undefined
Introduced in version 9.5.0.83

Clears the set of certificates to be used in signing.

Returns true for success, false for failure.

More Information and Examples
top
CoSign
var success = CoSign(bdIn, cert, bdOut);
· return: boolean; true for success, false for failure
· bdIn: CkBinData
· cert: CkCert
· bdOut: CkBinData
Introduced in version 9.5.0.89

Co-sign's an existing CMS signature. bdIn contains the existing CMS signature. If successful, cert is the output co-signed CMS signature.

Returns true for success, false for failure.

More Information and Examples
top
CrcBd
var uintVal = CrcBd(crcAlg, bd);
· return: unsigned int
· crcAlg: string
· bd: CkBinData
Introduced in version 11.0.0

Computes a CRC for data contained in crcAlg, which can be either crc-32 used in the Zip file format, or crc8 for the CRC8 algorithm.

More Information and Examples
top
CrcFile
var uintVal = CrcFile(crcAlg, path);
· return: unsigned int
· crcAlg: string
· path: string
Introduced in version 9.5.0.38

Calculates the CRC for a file's contents using the CRC algorithm specified by crcAlg. Possible algorithms are:

  • crc-32 - This is the CRC used in the Zip file format.
  • crc8

More Information and Examples
top
CreateP7M
var success = CreateP7M(inFilename, p7mPath);
· return: boolean; true for success, false for failure
· inFilename: string
· p7mPath: string

Signs the contents of inFilename and writes the enveloping (i.e. opaque) PKCS7 signature (.p7m) to p7mPath.

In a PKCS#7/CMS signature, the signer computes a cryptographic hash (e.g. SHA-256) of the data, then uses their private key to sign that hash.

The signature = Sign( Hash(data) )

This signed hash is what gets stored in the signature file. For enveloping/opaque signatures, the signed data is also stored in the signature file.

Set the HashAlgorithm property to specify the hash algorithmg. The valid options are sha256, sha1, sha384, and sha512.

Returns true for success, false for failure.

top
CreateP7S
var success = CreateP7S(inFilename, p7sPath);
· return: boolean; true for success, false for failure
· inFilename: string
· p7sPath: string

Signs the contents of inFilename and writes the detached PKCS7 signature (.p7s) to p7sPath.

In a PKCS#7/CMS detached signature, the signer computes a cryptographic hash (e.g. SHA-256) of the data, then uses their private key to sign that hash.

The signature = Sign( Hash(data) )

This signed hash is what gets stored in the signature file.

Set the HashAlgorithm property to specify the hash algorithmg. The valid options are sha256, sha1, sha384, and sha512.

Returns true for success, false for failure.

top
DecodeString
var strVal = DecodeString(inStr, charset, encoding);
· return: string
· inStr: string
· charset: string
· encoding: string

Decodes from an encoding back to the original string. The encoding can be set to any of the following strings: base64, hex, quoted-printable, url, base32, Q, B, url_rc1738, url_rfc2396, url_rfc3986, url_oauth, uu, modBase64, or html (for HTML entity encoding).

Returns null on failure

top
DecryptBd
var success = DecryptBd(bd);
· return: boolean; true for success, false for failure
· bd: CkBinData
Introduced in version 9.5.0.67

Decrypts the contents of bd. This method can do either symmetric key decryption or CMS public key decryption (e.g., PKCS#7 EnvelopedData).

Before calling this method for symmetric key decryption (e.g., AES, ChaCha20, Blowfish, etc.), ensure the following setup:

  1. Define the encryption algorithm using the CryptAlgorithm property.
  2. Specify the encryption key length with the KeyLength property.
  3. Establish the cipher mode through the CipherMode property.
  4. Use the SetEncodedIV method to set the IV, if needed by the cipher mode.
  5. Set the encryption key with the SetEncodedKey method.
  6. Ensure the PaddingScheme property matches the encryptor's value.

When calling this method for public key decryption (i.e. decrypting a PKCS7 CMS message), the following setup is required:

  1. The CryptAlgorithm property should be set to the string "pki".
  2. Optionally specify the certificate to be used for decryption by calling SetDecryptCert. If SetDecryptCert is not called, then Chilkat will automatically search certificate sources (Windows certificate stores, Apple keychain, etc.) for the required certificate.

Returns true for success, false for failure.

top
DecryptEncoded
var strVal = DecryptEncoded(encodedEncryptedData);
· return: string
· encodedEncryptedData: string

Decrypts encoded encrypted data, and returns the decrypted data as a binary encoded string. For example:

InputDecode EncodingModeDecryptEncode EncodingModeOutput

The encoding (e.g. base64, hex, etc.) is determined by the EncodingMode property.

This method supports symmetric key and public key decryption. For more information on properties that affect decryption, such as CryptAlgorithm, CipherMode, etc., refer to the DecryptBd method documentation.

Returns null on failure

More Information and Examples
top
DecryptSb
var success = DecryptSb(bdIn, sbOut);
· return: boolean; true for success, false for failure
· bdIn: CkBinData
· sbOut: CkStringBuilder
Introduced in version 9.5.0.67

This function is intended for use when the expected decrypted output is text. It decrypts the contents of bdIn and appends the resulting string to sbOut. Ensure that the Charset property, such as utf-8, matches the one used during encryption to interpret the decrypted bytes correctly as characters.

InputDecryptInterpret Bytes according to CharsetAppend to StringBuilder

This method supports symmetric key and public key decryption. For more information on properties that affect decryption, such as CryptAlgorithm, CipherMode, etc., refer to the DecryptBd method documentation.

Returns true for success, false for failure.

top
DecryptSecureENC
var success = DecryptSecureENC(cipherText, secureStr);
· return: boolean; true for success, false for failure
· cipherText: string
· secureStr: CkSecureString
Introduced in version 9.5.0.71

This function is intended for use when the expected decrypted output is text. It decrypts binary encoded encrypted bytes passed in cipherText and appends the resulting string to secureStr. Ensure that the Charset property, such as utf-8, matches the one used during encryption to interpret the decrypted bytes correctly as characters.

InputDecode using EncodingModeDecryptInterpret Bytes according to CharsetAppend to Secure String

The encoding (e.g. base64, hex, etc.) is determined by the EncodingMode property.

This method supports symmetric key and public key decryption. For more information on properties that affect decryption, such as CryptAlgorithm, CipherMode, etc., refer to the DecryptBd method documentation.

Returns true for success, false for failure.

More Information and Examples
top
DecryptStringENC
var strVal = DecryptStringENC(str);
· return: string
· str: string

This function is intended for use when the expected decrypted output is text. It decrypts binary encoded encrypted bytes passed in str and appends the resulting string to ARG2. Ensure that the Charset property, such as utf-8, matches the one used during encryption to interpret the decrypted bytes correctly as characters.

InputDecode using EncodingModeDecryptInterpret Bytes according to CharsetOutput

The encoding (e.g. base64, hex, etc.) is determined by the EncodingMode property.

This method supports symmetric key and public key decryption. For more information on properties that affect decryption, such as CryptAlgorithm, CipherMode, etc., refer to the DecryptBd method documentation.

Returns null on failure

top
EncodeInt
var strVal = EncodeInt(value, numBytes, littleEndian, encoding);
· return: string
· value: int
· numBytes: int
· littleEndian: boolean
· encoding: string
Introduced in version 9.5.0.77

Encodes an integer to N bytes and returns in the specified encoding. If littleEndian is true, then little-endian byte ordering is used. Otherwise big-endian byte order is used.

Returns null on failure

top
EncodeString
var strVal = EncodeString(strToEncode, charsetName, toEncodingName);
· return: string
· strToEncode: string
· charsetName: string
· toEncodingName: string

Binary encodes a string. The toEncodingName can be set to any of the binary encodings supported by Chilkat, such as base64, hex, etc. (see the link below for the full list of encodings). The charsetName, such as "utf-8", determines the bytes that are encoded.

The toEncodingName can also be set to the value html for HTML entity encoding.

Returns null on failure

top
EncryptBd
var success = EncryptBd(bd);
· return: boolean; true for success, false for failure
· bd: CkBinData
Introduced in version 9.5.0.67

Encrypts the contents of bd. This method can do either symmetric key encryption or CMS public key encryption (e.g., PKCS#7 EnvelopedData).

Before calling this method for symmetric key encryption (e.g., AES, ChaCha20, Blowfish, etc.), ensure the following setup:

  1. Define the encryption algorithm using the CryptAlgorithm property.
  2. Specify the encryption key length with the KeyLength property.
  3. Establish the cipher mode through the CipherMode property.
  4. Use the SetEncodedIV method to set the IV, if needed by the cipher mode.
  5. Set the encryption key with the SetEncodedKey method.
  6. Set the PaddingScheme property if needing something different than the default.

When calling this method for public key encryption (i.e. creating a PKCS7 CMS message), the following setup is required:

  1. The CryptAlgorithm property should be set to the string "pki".
  2. To specify the encryption certificate, use SetEncryptCert. For multiple certificates, call AddEncryptCert for each one.

Returns true for success, false for failure.

top
EncryptEncoded
var strVal = EncryptEncoded(str);
· return: string
· str: string

Encrypts binary-encoded data and returns it as a binary-encoded string. For example:

InputDecode EncodingModeEncryptEncode EncodingModeOutput

The encoding (e.g. base64, hex, etc.) is determined by the EncodingMode property.

This method supports symmetric key and public key decryption. For more information on properties that affect decryption, such as CryptAlgorithm, CipherMode, etc., refer to the method documentation.

Returns null on failure

top
EncryptSb
var success = EncryptSb(sbIn, bdOut);
· return: boolean; true for success, false for failure
· sbIn: CkStringBuilder
· bdOut: CkBinData
Introduced in version 9.5.0.67

Encrypts text and appends the encrypted bytes in bdOut. The Charset property, such as utf-8, determines the actual bytes that are encrypted.

StringBuilderGet bytes according to CharsetEncryptAppend to BinData

This method supports symmetric key and public key encryption. For more information on properties that affect encryption, such as CryptAlgorithm, CipherMode, etc., refer to the EncryptBd method documentation.

Returns true for success, false for failure.

top
EncryptSecureENC
var strVal = EncryptSecureENC(secureStr);
· return: string
· secureStr: CkSecureString
Introduced in version 9.5.0.71

Encrypts the secure string and returns the encrypted bytes as a binary encoded string. The Charset property determines the actual bytes that are encrypted.

SecureStringGet bytes according to CharsetEncryptEncode using EncodingModeOutput

The encoding (e.g. base64, hex, etc.) is determined by the EncodingMode property.

This method supports symmetric key and public key encryption. For more information on properties that affect encryption, such as CryptAlgorithm, CipherMode, etc., refer to the EncryptBd method documentation.

Returns null on failure

top
EncryptStringENC
var strVal = EncryptStringENC(str);
· return: string
· str: string

Encrypts the str and returns the encrypted bytes as a binary encoded string. The Charset property determines the actual bytes that are encrypted.

InputGet bytes according to CharsetEncryptEncode using EncodingModeOutput

The encoding (e.g. base64, hex, etc.) is determined by the EncodingMode property.

This method supports symmetric key and public key encryption. For more information on properties that affect encryption, such as CryptAlgorithm, CipherMode, etc., refer to the EncryptBd method documentation.

Returns null on failure

top
GenerateUuid
var strVal = GenerateUuid();
· return: string
Introduced in version 9.5.0.55

Generates a random UUID string having standard UUID format, such as de305d54-75b4-431b-adb2-eb6b9e546014.

Note: This generates a version 4 UUID using random byte values. See RFC 4122.

Returns null on failure

More Information and Examples
top
GenRandomBytesENC
var strVal = GenRandomBytesENC(numBytes);
· return: string
· numBytes: int

Generates numBytes random bytes and returns them as an encoded string. The encoding format (e.g., base64, hex) is determined by the EncodingMode property. It utilizes the Fortuna cryptographically secure random number generator, auto-seeded by an OS-dependent secure entropy source.

Returns null on failure

top
GetEncodedAuthTag
var strVal = GetEncodedAuthTag(encoding);
· return: string
· encoding: string
Introduced in version 9.5.0.55

When encrypting in GCM mode, Chilkat generates the GCM authentication tag. The application can then use this method to retrieve the tag, which should be sent to the decrypting party along with the encrypted data. For further details on GCM authenticated encryption, please refer to the web pages linked below.

Returns null on failure

top
GetEncodedIV
var strVal = GetEncodedIV(encoding);
· return: string
· encoding: string

This method retrieves the IV set by the application during the last call to SetEncodedIV or RandomizeIV.

Returns null on failure

top
GetLastJsonData
GetLastJsonData(json);
· return: undefined
· json: CkJsonObject
Introduced in version 11.0.0

Offers details on the last method executed. While many methods provide no information, some do through GetLastJsonData. For instance, after invoking a signature verification method, GetLastJsonData will return JSON detailing the algorithms used.

More Information and Examples
top
GetSignatureSigningTimeStr
var strVal = GetSignatureSigningTimeStr(index);
· return: string
· index: int

This method retrieves the signing time of the Nth certificate in a digital signature after verification. The signing time for the first certificate is at index 0. The NumSignerCerts property indicates the total number of signing certificates, although typically only one is used. Note: Before accessing the signing time, use the HasSignatureSigningTime method to verify its availability, and skip indices lacking a signing time. The signing time is returned in RFC822 string format.

Returns null on failure

top
GetSignedAttributes
var success = GetSignedAttributes(signerIndex, pkcs7Der, sbJson);
· return: boolean; true for success, false for failure
· signerIndex: int
· pkcs7Der: CkBinData
· sbJson: CkStringBuilder
Introduced in version 9.5.0.75

Extracts the signed (authenticated) attributes for the Nth signer, where signerIndex is typically 0, as most signatures have only one signer. Provide the binary PKCS7 in pkcs7Der. If successful, sbJson will hold the signed attributes in JSON format.

Sample JSON output:

{
  "signedAttributes": [
    {
      "oid": "1.2.840.113549.1.9.3",
      "name": "Content Type"
    },
    {
      "oid": "1.2.840.113549.1.9.5",
      "name": "Signing Time"
    },
    {
      "oid": "1.2.840.113549.1.9.4"
      "name": "Message Digest"
    },
    {
      "oid": "1.2.840.113549.1.9.16.2.47",
      "name": "Signing Certificate V2"
    }
  ]
}

Returns true for success, false for failure.

More Information and Examples
top
HashBdENC
var strVal = HashBdENC(bd);
· return: string
· bd: CkBinData
Introduced in version 9.5.0.66

Hashes the bytes in bd and returns the hash as a binary-encoded string. The hash algorithm is determined by the HashAlgorithm property, while the encoding is specified by the EncodingMode property. Encoding options include base64, hex, base64url, or others listed at the link below.

Returns null on failure

top
HashBeginString
var success = HashBeginString(strData);
· return: boolean; true for success, false for failure
· strData: string

To hash a large amount of text, start by processing the first chunk using this method. For subsequent chunks, use the HashMoreString method as needed. Conclude by calling HashFinalENC to obtain the final result. The hash algorithm is determined by the HashAlgorithm property setting.

Returns true for success, false for failure.

top
HashChunkBd
var success = HashChunkBd(firstChunk, bd);
· return: boolean; true for success, false for failure
· firstChunk: boolean
· bd: CkBinData
Introduced in version 11.1.0

Start or continue hashing data in chunks. Set firstChunk to true for the first chunk, and false for subsequent chunks. Finish by calling HashFinalENC to obtain the result. The hash algorithm used is determined by the HashAlgorithm property.

Returns true for success, false for failure.

top
HashFileENC
var strVal = HashFileENC(path);
· return: string
· path: string

Hashes a file and returns the hash as an encoded string.

The hash algorithm is specified by the HashAlgorithm property, The encoding is controlled by the EncodingMode property, which can be set to base64, hex, base64url, or any of the encodings listed at the link below.

Any size file is supported because the file is hashed internally in streaming mode (keeping memory usage low and constant).

Returns null on failure

top
HashFinalENC
var strVal = HashFinalENC();
· return: string

Finalizes a multi-step hash computation and returns the hash bytes encoded according to the EncodingMode property setting.

Returns null on failure

top
HashMoreString
var success = HashMoreString(strData);
· return: boolean; true for success, false for failure
· strData: string

Adds more text to the hash currently under computation. (See HashBeginString)

Returns true for success, false for failure.

More Information and Examples
top
HashStringENC
var strVal = HashStringENC(str);
· return: string
· str: string

Hashes the str and returns the hash as a binary encoded string. The Charset property determines the actual bytes that are hashed.

InputGet bytes according to CharsetHashEncode using EncodingModeOutput

The encoding (e.g. base64, hex, etc.) is determined by the EncodingMode property.

The hash algorithm is determined by the HashAlgorithm property.

Returns null on failure

top
HasSignatureSigningTime
var boolVal = HasSignatureSigningTime(index);
· return: boolean
· index: int

After verifying a digital signature with a signature verification method, you can call this method. It returns true if the signing time for the Nth certificate is available and can be accessed using the GetSignatureSigningTimeStr method.

More Information and Examples
top
Hotp
var strVal = Hotp(secret, secretEnc, counterHex, numDigits, truncOffset, hashAlg);
· return: string
· secret: string
· secretEnc: string
· counterHex: string
· numDigits: int
· truncOffset: int
· hashAlg: string
Introduced in version 9.5.0.77

Implements RFC 4226: HOTP: An HMAC-Based One-Time Password Algorithm. The arguments to this method are:

  • secret: The shared secret in an enocded representation such as base64, hex, ascii, etc.
  • secretEnc: The encoding of the shared secret, such as base64
  • counterHex: The 8-byte counter in hexidecimal format.
  • numDigits: The number of decimal digits to return.
  • truncOffset: Normally set this to -1 for dynamic truncation. Otherwise can be set in the range 0..15.
  • hashAlg: Normally set to sha1. Can be set to other hash algorithms such as sha256, sha512, etc.

Returns null on failure

top
LastDecryptCert
var success = LastDecryptCert(cert);
· return: boolean; true for success, false for failure
· cert: CkCert
Introduced in version 11.0.0

Returns in cert the last certificate used for public-key decryption.

Returns true for success, false for failure.

More Information and Examples
top
LastSignerCert
var success = LastSignerCert(index, cert);
· return: boolean; true for success, false for failure
· index: int
· cert: CkCert
Introduced in version 11.0.0

Retrieves the Nth certificate used for signing in cert, where the first certificate is at index 0. Use this method after verifying a digital signature to access the signer certificates. The NumSignerCerts property indicates the total number of signing certificates. Usually, only one certificate is used when creating a digital signature.

Returns true for success, false for failure.

More Information and Examples
top
MacBdENC
var strVal = MacBdENC(bd);
· return: string
· bd: CkBinData
Introduced in version 9.5.0.66

Generates a Message Authentication Code (MAC) for the bytes in bd using the algorithm defined by the MacAlgorithm property. The resulting MAC is encoded into a string based on the EncodingMode property (e.g., base64 or hex). The HashAlgorithm property determines the internal hash function. Before generating the MAC, specify the secret key using SetMacKeyEncoded .

Returns null on failure

top
MacStringENC
var strVal = MacStringENC(inText);
· return: string
· inText: string
Introduced in version 9.5.0.55

Computes a Message Authentication Code (MAC) and returns it as a binary encoded string. The MAC algorithm is defined by the MacAlgorithm property. The Charset property determines the actual bytes that are hashed.

InputGet bytes according to CharsetMACEncode using EncodingModeOutput

The encoding (e.g. base64, hex, etc.) is determined by the EncodingMode property.

The hash algorithm is determined by the HashAlgorithm property. The secret key must be set beforehand by calling SetMacKeyEncoded .

Returns null on failure

top
MySqlAesDecrypt
var strVal = MySqlAesDecrypt(strEncryptedHex, strPassword);
· return: string
· strEncryptedHex: string
· strPassword: string

Matches MySQL's AES_DECRYPT function. strEncryptedHex is a hex-encoded AES-encrypted string, and the return value is the original unencrypted string.

Returns null on failure

More Information and Examples
top
MySqlAesEncrypt
var strVal = MySqlAesEncrypt(strData, strPassword);
· return: string
· strData: string
· strPassword: string

This function replicates MySQL's AES_ENCRYPT, returning the encrypted data as a hex-encoded string. In MySQL, this is done using: HEX(AES_ENCRYPT('The quick brown fox jumps over the lazy dog', 'password')).

Returns null on failure

More Information and Examples
top
OpaqueSignBd
var success = OpaqueSignBd(bd);
· return: boolean; true for success, false for failure
· bd: CkBinData
Introduced in version 9.5.0.67

Digitally signs the contents of bd. If successful, the contents of bd are replaced with the PKCS#7 signed-data, which embeds the original data within the signature. Ensure a certificate is set using SetSigningCert before invoking this method. The HashAlgorithm property specifies the hash algorithm for creating the data's hash during signing.

Returns true for success, false for failure.

top
OpaqueSignStringENC
var strVal = OpaqueSignStringENC(str);
· return: string
· str: string

Digitally signs a string and returns PKCS#7 signed-data as a binary encoded string. The EncodingMode property determines the binary encoding, such as base64, hex, hex_lower, base64_mime, etc. The Charset property determines the actual bytes that are hashed and signed. The HashAlgorithm property specifies the hash algorithm for creating the data's hash during signing.

Returns null on failure

top
OpaqueVerifyBd
var success = OpaqueVerifyBd(bd);
· return: boolean; true for success, false for failure
· bd: CkBinData
Introduced in version 9.5.0.67

The method performs in-place verification of the PKCS#7 signed-data content of bd. If the signature is successfully verified, the content of bd is replaced with the original data, and the method returns true. If verification fails, bd remains unchanged, and the method returns false. Afterwards, you can retrieve signer certificates by using the NumSignerCerts property and the LastSignerCert method.

Returns true for success, false for failure.

top
OpaqueVerifyStringENC
var strVal = OpaqueVerifyStringENC(p7m);
· return: string
· p7m: string

This function verifies a PKCS#7 signed-data binary-encoded signature and returns the original text data. The EncodingMode property determines how p7m is decoded to bytes. If the signature does not verify successfully, it returns an empty string. The Charset property specifies how the original data bytes are converted to characters. You can obtain signer certificates using the NumSignerCerts property and the LastSignerCert method.

Returns null on failure

top
Pbkdf1
var strVal = Pbkdf1(password, charset, hashAlg, salt, iterationCount, outputKeyBitLen, encoding);
· return: string
· password: string
· charset: string
· hashAlg: string
· salt: string
· iterationCount: int
· outputKeyBitLen: int
· encoding: string

This function implements the PBKDF1 (Password-Based Key Derivation Function #1) algorithm. Follow these guidelines to use it:

  1. password (the password) is first converted using the character encoding specified by charset before being processed by the key derivation function.
  2. hashAlg specifies the hash function to use, such as md5, sha1, or md2.
  3. salt represents the salt, which should be random data of at least 8 bytes (64 bits). You can use the GenRandomBytesENC method to generate this.
  4. iterationCount sets the iteration count, which must be a minimum of 1000.
  5. outputKeyBitLen determines the length (in bits) of the derived key.
  6. encoding defines the output encoding format, such as base64 or hex, and also the expected encoding of salt (the salt).

The function returns the derived key.

Note: If charset is specified as hex or base64, the password (password) will be treated as binary data encoded in that format. It will be decoded into binary form and used directly as such.

Returns null on failure

top
Pbkdf2
var strVal = Pbkdf2(password, charset, hashAlg, salt, iterationCount, outputKeyBitLen, encoding);
· return: string
· password: string
· charset: string
· hashAlg: string
· salt: string
· iterationCount: int
· outputKeyBitLen: int
· encoding: string

Implements the PBKDF2 algorithm as follows:

  1. Convert password to the character encoding specified by charset before using it in the key derivation function.
  2. hashAlg specifies the hash algorithm. Options include sha256, sha384, sha512, md5, sha1, md2, or any algorithm listed in the HashAlgorithm property.
  3. Provide a random salt value that is at least 8 bytes (64 bits) long. Use methods like GenRandomBytesENC to generate this salt value.
  4. Ensure iterationCount is 1000 or greater.
  5. Control the length of the derived key output using outputKeyBitLen.
  6. Set encoding to specify the encoding format for the output and the expected encoding for salt. Options include base64 and hex.

The derived key is the output of this process. Internally, PBKDF2 uses a pseudorandom function (PRF), specifically a keyed HMAC. The hash algorithm chosen with hashAlg dictates this PRF; for example, SHA256 uses HMAC-SHA256, while SHA1 uses HMAC-SHA1.

Note: If charset is hex or base64, password is treated as binary data. It will be decoded and used directly as a binary password. SHA256 uses HMAC-SHA256, while SHA1 uses HMAC-SHA1.

PBKDF1 and PBKDF2 are both key derivation functions used to strengthen passwords for cryptographic purposes, but PBKDF2 is the improved version.

  • PBKDF1: Older and limited—it can only generate small keys (up to the hash function’s output size), making it less flexible and secure.
  • PBKDF2: More advanced—it can generate longer keys, is more resistant to attacks, and is widely recommended for modern security needs.

In short, PBKDF2 is stronger and more versatile than PBKDF1.

Returns null on failure

top
RandomizeIV
RandomizeIV();
· return: undefined

Sets the initialization vector (IV) to a random value. The CryptAlgorithm property should be set prior to calling this method.

A random IV is used in symmetric encryption (like AES-CBC or AES-GCM) to ensure that encrypting the same plaintext with the same key produces different ciphertext each time. This prevents attackers from recognizing patterns in encrypted data and strengthens security.

Why use a random IV?

  • It ensures semantic security (i.e. same plaintext never results in same ciphertext).
  • Prevents replay and pattern attacks.
  • Especially important in modes like CBC and GCM.

How is the IV sent to the decrypting party?

The IV is not secret, but it must be available for decryption. Common methods:

  • Prepended to the ciphertext (e.g., IV || ciphertext)
  • Sent in a separate field (e.g., JSON field, HTTP header)
  • Concatenated and encoded (e.g., base64 of IV + ciphertext)

At the receiving side, the decryptor extracts the IV and uses it with the shared key to decrypt the ciphertext correctly.

top
ReEncode
var strVal = ReEncode(encodedData, fromEncoding, toEncoding);
· return: string
· encodedData: string
· fromEncoding: string
· toEncoding: string

This method converts between different encodings, such as from base64 to hex. Each argument can be any binary encoding supported by Chilkat.

Returns null on failure

top
SetDecryptCert
var success = SetDecryptCert(cert);
· return: boolean; true for success, false for failure
· cert: CkCert

Sets the digital certificate for decryption when the CryptAlgorithm property is set to "pki". This method requires that the certificate has a private key.

Returns true for success, false for failure.

top
SetDecryptCert2
var success = SetDecryptCert2(cert, key);
· return: boolean; true for success, false for failure
· cert: CkCert
· key: CkPrivateKey

Sets the digital certificate and associated private key for decryption when the CryptAlgorithm property is set to "pki". The private key must be the one that matches the certificate's public key.

Returns true for success, false for failure.

More Information and Examples
top
SetEncodedAad
var success = SetEncodedAad(aadStr, encoding);
· return: boolean; true for success, false for failure
· aadStr: string
· encoding: string
Introduced in version 9.5.0.55

Sets the optional authenticated additional data (AAD) for AES encryption in GCM mode. The data is provided as a binary-encoded string using the specified encoding, and any binary encoding supported by Chilkat can be used.

In GCM (Galois/Counter Mode) encryption, AAD (Additional Authenticated Data) is optional input that is not encrypted but is authenticated along with the ciphertext. It's used to verify integrity of associated data like headers or metadata. If AAD is modified, decryption will fail due to authentication tag mismatch.

Returns true for success, false for failure.

More Information and Examples
top
SetEncodedAuthTag
var success = SetEncodedAuthTag(authTagStr, encoding);
· return: boolean; true for success, false for failure
· authTagStr: string
· encoding: string
Introduced in version 9.5.0.55

In GCM mode, the authentication tag is a short value (e.g. 16 bytes) generated during encryption that ensures the integrity and authenticity of both the ciphertext and any AAD. It must be verified during decryption to confirm the data hasn't been altered.

When decrypting AES-GCM, applications must call this method to provide the expected authentication tag.

To prevent Chilkat from checking the authentication tag after decryption, you can set the authentication tag to the special hex value FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF (16 bytes of 0xFF).

Returns true for success, false for failure.

top
SetEncodedIV
SetEncodedIV(ivStr, encoding);
· return: undefined
· ivStr: string
· encoding: string

Sets the initialization vector used in symmetric encrpytion (AES, Blowfish, etc.) from a binary-encoded string using any Chilkat-supported encoding method (e.g., base64, hex).

An Initialization Vector (IV) is a random or unique value used in symmetric encryption to ensure that encrypting the same plaintext multiple times produces different ciphertexts. It prevents pattern leakage.

Cipher Modes That Require an IV:

  • CBC (Cipher Block Chaining)
  • CFB (Cipher Feedback)
  • OFB (Output Feedback)
  • CTR (Counter Mode)
  • GCM (Galois/Counter Mode)

ECB (Electronic Codebook) does *not* use an IV, which makes it less secure.

top
SetEncodedKey
SetEncodedKey(keyStr, encoding);
· return: undefined
· keyStr: string
· encoding: string

Sets the encryption key used in symmetric encryption (AES, Blowfish, etc.) from a binary-encoded string using any Chilkat-supported encoding method (e.g., base64, hex).

The key must have a byte size equal to the KeyLength property. For instance, a KeyLength of 128 bits requires a 16-byte key, and a KeyLength of 256 bits requires a 32-byte key.

top
SetEncodedSalt
SetEncodedSalt(saltStr, encoding);
· return: undefined
· saltStr: string
· encoding: string

Sets the pbes2 or pbes1 salt bytes from a binary-encoded string using any Chilkat-supported encoding method (e.g., base64, hex).

This salt is used for encryption and decryption when the CryptAlgorithm property is set to pbes1 or pbes2. Note: This does not apply to the Pbkdf1 or Pbkdf2 methods, where the salt is provided as a function argument.

top
SetEncryptCert
var success = SetEncryptCert(cert);
· return: boolean; true for success, false for failure
· cert: CkCert

Instructs the encryption library to use a specified digital certificate for public-key encryption. To encrypt using multiple certificates, call AddEncryptCert for each one. This action is equivalent to calling ClearEncryptCerts before AddEncryptCert .

Returns true for success, false for failure.

top
SetMacKeyEncoded
var success = SetMacKeyEncoded(key, encoding);
· return: boolean; true for success, false for failure
· key: string
· encoding: string
Introduced in version 9.5.0.55

Sets the MAC key from a binary-encoded string using any Chilkat-supported encoding method (e.g., base64, hex).

Returns true for success, false for failure.

top
SetMacKeyString
var success = SetMacKeyString(key);
· return: boolean; true for success, false for failure
· key: string
Introduced in version 9.5.0.55

Sets the MAC key from a string. The Charset property determines the actual bytes used for the MAC key.

Returns true for success, false for failure.

top
SetSigningCert
var success = SetSigningCert(cert);
· return: boolean; true for success, false for failure
· cert: CkCert

Sets the digital certificate to be used for signing. Signing requires that the certificate has a private key.

Returns true for success, false for failure.

top
SetSigningCert2
var success = SetSigningCert2(cert, privateKey);
· return: boolean; true for success, false for failure
· cert: CkCert
· privateKey: CkPrivateKey

Sets the digital certificate and associated private key for signing. The private key must be the one that matches the certificate's public key.

Returns true for success, false for failure.

top
SetTsaHttpObj
SetTsaHttpObj(http);
· return: undefined
· http: CkHttp

If timestamp server communications are needed for signing and special Internet settings like a proxy server are necessary, this method can provide an Http object configured with these settings.

top
SetVerifyCert
var success = SetVerifyCert(cert);
· return: boolean; true for success, false for failure
· cert: CkCert

Assigns the digital certificate for signature verification. Typically, a PKCS7 (CMS) signature includes the signing certificate information, making it unnecessary to call this method explicitly. This is only required in rare instances.

Returns true for success, false for failure.

top
SignBdENC
var strVal = SignBdENC(dataToSign);
· return: string
· dataToSign: CkBinData
Introduced in version 9.5.0.67

Digitally signs the content in dataToSign and returns a detached signature (PKCS#7 signed-data) as a binary-encoded string. The EncodingMode property determines the binary-encoding. Possible encodings include base64, base64_mime, hex, and hex_lower. The HashAlgorithm property specifies the hash algorithm for creating the data's hash during signing.

Returns null on failure

top
SignHashENC
var strVal = SignHashENC(encodedHash, hashAlg, hashEncoding);
· return: string
· encodedHash: string
· hashAlg: string
· hashEncoding: string
Introduced in version 9.5.0.90

Digitally signs a pre-computed hash and returns a detached signature (PKCS#7 signed-data) as a binary-encoded string. The EncodingMode property determines the binary-encoding. Possible encodings include base64, base64_mime, hex, and hex_lower

encodedHash is a binary-encoded hash to be signed, with its encoding format specified by hashEncoding (e.g., base64, hex). hashAlg specifies the hash algorithm (e.g., sha256, sha1, sha512) used for encodedHash.

Returns null on failure

top
SignSbENC
var strVal = SignSbENC(sb);
· return: string
· sb: CkStringBuilder
Introduced in version 9.5.0.67

Digitally signs the text contained in sb and returns a detached signature (PKCS#7 signed-data) as a binary-encoded string. The EncodingMode property determines the binary-encoding. Possible encodings include base64, base64_mime, hex, and hex_lower. The HashAlgorithm property specifies the hash algorithm for creating the data's hash during signing. The Charset property determines the actual bytes that are hashed and signed.

Returns null on failure

top
SignStringENC
var strVal = SignStringENC(str);
· return: string
· str: string

Digitally signs a string and returns a detached signature (PKCS#7 signed-data) as a binary-encoded string. The EncodingMode property determines the binary-encoding. Possible encodings include base64, base64_mime, hex, and hex_lower. The HashAlgorithm property specifies the hash algorithm for creating the data's hash during signing. The Charset property determines the actual bytes that are hashed and signed.

Returns null on failure

top
Totp
var strVal = Totp(secret, secretEnc, t0, tNow, tStep, numDigits, truncOffset, hashAlg);
· return: string
· secret: string
· secretEnc: string
· t0: string
· tNow: string
· tStep: int
· numDigits: int
· truncOffset: int
· hashAlg: string
Introduced in version 9.5.0.77

Implements RFC 6238: TOTP: Time-Based One-Time Password Algorithm. The arguments to this method are:

  • secret: The shared secret in an enocded representation such as base64, hex, ascii, etc.
  • secretEnc: The encoding of the shared secret, such as base64
  • t0: The Unix time to start counting time steps. It is a number in decimal string form. A Unix time is the number of seconds elapsed since midnight UTC of January 1, 1970. 0 is a typical value used for this argument.
  • tNow: The current Unix time in decimal string form. To use the current system date/time, pass an empty string for this argument.
  • tStep: The time step in seconds. A typical value is 30. Note: Both client and server must pre-agree on the secret, the t0, and the tStep.
  • numDigits: The number of decimal digits to return.
  • truncOffset: Normally set this to -1 for dynamic truncation. Otherwise can be set in the range 0..15.
  • hashAlg: Normally set to sha1. Can be set to other hash algorithms such as sha256, sha512, etc.

Returns null on failure

top
UseCertVault
var success = UseCertVault(vault);
· return: boolean; true for success, false for failure
· vault: CkXmlCertVault
Introduced in version 9.5.0.40

Adds an XML certificate vault to the object's internal list of sources to be searched for certificates and private keys when encrypting/decrypting or signing/verifying. Unlike the AddPfxSourceData and AddPfxSourceFile methods, only a single XML certificate vault can be used. If UseCertVault is called multiple times, only the last certificate vault will be used, as each call to UseCertVault will replace the certificate vault provided in previous calls.

Returns true for success, false for failure.

top
VerifyBdENC
var success = VerifyBdENC(data, encodedSig);
· return: boolean; true for success, false for failure
· data: CkBinData
· encodedSig: string
Introduced in version 9.5.0.67

Verifies a detached digital signature against the original data contained in data. Returns true if the signature is verified. The encodedSig holds a binary-encoded PKCS#7 signed-data detached signature. The type of binary encoding, such as base64, hex, or base64_mime, is determined by the EncodingMode property.

Afterwards, you can retrieve signer certificates by using the NumSignerCerts property and the LastSignerCert method.

Returns true for success, false for failure.

top
VerifyP7M
var success = VerifyP7M(p7mPath, destPath);
· return: boolean; true for success, false for failure
· p7mPath: string
· destPath: string

Verifies an opaque digital signature contained in a .p7m file and extracts the original data to destPath. Returns true if the .p7m is validated and the original data was extracted. Otherwise returns false.

Afterwards, you can retrieve signer certificates by using the NumSignerCerts property and the LastSignerCert method.

Returns true for success, false for failure.

top
VerifyP7S
var success = VerifyP7S(originalDataPath, p7sPath);
· return: boolean; true for success, false for failure
· originalDataPath: string
· p7sPath: string

Verifies a detached digital signature contained in a .p7s file against the original data contained in originalDataPath. Returns true if the signature is verified.

Afterwards, you can retrieve signer certificates by using the NumSignerCerts property and the LastSignerCert method.

Returns true for success, false for failure.

top
VerifySbENC
var success = VerifySbENC(sb, encodedSig);
· return: boolean; true for success, false for failure
· sb: CkStringBuilder
· encodedSig: string
Introduced in version 9.5.0.67

Verifies a detached digital signature against the original text contained in sb. Returns true if the signature is verified. The encodedSig holds a binary-encoded PKCS#7 signed-data detached signature. The type of binary encoding, such as base64, hex, or base64_mime, is determined by the EncodingMode property. The Charset property determines how the text in sb is converted to bytes for signature validation.

Afterwards, you can retrieve signer certificates by using the NumSignerCerts property and the LastSignerCert method.

Returns true for success, false for failure.

top
VerifyStringENC
var success = VerifyStringENC(str, encodedSig);
· return: boolean; true for success, false for failure
· str: string
· encodedSig: string

Verifies a detached digital signature against the original text in str. Returns true if the signature is verified. The encodedSig holds a binary-encoded PKCS#7 signed-data detached signature. The type of binary encoding, such as base64, hex, or base64_mime, is determined by the EncodingMode property. The Charset property determines how the text in str is converted to bytes for signature validation.

Afterwards, you can retrieve signer certificates by using the NumSignerCerts property and the LastSignerCert method.

Returns true for success, false for failure.

top
XtsSetDataUnitNumber
XtsSetDataUnitNumber(loUint32, hiUint32);
· return: undefined
· loUint32: unsigned int
· hiUint32: unsigned int
Introduced in version 9.5.0.91

Sets the XTS-AES mode data unit number. The data unit number is a 64-bit unsigned integer. It is passed in as two 32-bit unsigned integers representing the high and low 32-bits.

Setting the data unit number is one way of setting the tweak value. The tweak value is 16 bytes in length and can alternatively be set by calling XtsSetEncodedTweakValue.

This method sets the tweak value such that the first 8 bytes are composed of the little-endian 64-bit data unit number, followed by 8 zero bytes.

(Unfortunately, Chilkat cannot use 64-bit integers in method arguments because many older programming environments, such as ActiveX, do not support it. Chilkat must present an identical and uniform API across all programming languages.)

top
XtsSetEncodedTweakKey
XtsSetEncodedTweakKey(key, encoding);
· return: undefined
· key: string
· encoding: string
Introduced in version 9.5.0.91

Sets the XTS-AES mode tweak key from an encoded string. The encoding argument can be set to any of the following strings: base64, hex, quoted-printable, ascii, or url. The tweak key should be equal in size to the encryption key. For example, to do 256-bit AES-XTS, the encryption key is 256-bits, and the tweak key is also 256-bits.

More Information and Examples
top
XtsSetEncodedTweakValue
XtsSetEncodedTweakValue(tweak, encoding);
· return: undefined
· tweak: string
· encoding: string
Introduced in version 9.5.0.91

Sets the XTS-AES mode tweak value from an encoded string. The encoding argument can be set to any of the following strings: base64, hex, quoted-printable, ascii, or url.

The tweak value must be 16 bytes in length. An application can set the initial tweak value by calling this method, or by calling XtsSetDataUnitNumber (but not both).

More Information and Examples
top