Solved: Perl undefined symbol: PL_stack_base at … DynaLoader.pm

Solution for Perl undefined symbol: PL_stack_base This problem was reported when trying to use Chilkat for the first time on a RHEL8 machine using chilkat-9.5.0-perl-5.26-x86_64-linux. Here’s the environment: # lsb_release -a LSB Version: :core-4.1-amd64:core-4.1-noarch Distributor ID: RedHatEnterprise Description: Red Hat Enterprise Linux release 8.9 (Ootpa) Release: 8.9 Codename: Ootpa # perl -v This is perl 5, version 26, subversion 3 […]

Solved: Mail Server Error “message body contains illegal bare CR LF characters”

A Chilkat user reported suddenly getting an error message from two receiving mail servers when sending mail generated by Chilkat. The message is:   message body contains illegal bare CR LF characters  Solution:  The cause has been found. The affected users are using AVG or Avast Antivirus and there is an optional signature text added after the outgoing email scan. If […]

Office365 App Setup for SMTP, POP, IMAP OAuth2 Client Credentials

This blog post walks you through the complete Azure App Registration process, including the subsequent Exchange Online PowerShell commands needed to achieve the OAuth2 client credentials flow for Office365 email sending and reading via the SMTP, IMAP, and POP3 protocols. I wish there was an “easy button”, but unfortunately it does not exist. Step 1. Register an Azure App Go […]

How to Load Binary Data into a PowerBuilder Blob

Question:  I am using Chilkat in a PowerBuilder 9 (ANSI) application where I receive a JSON from a request. The JSON contains binary data (a file) encoded in Base64. I am able to handle and save this data to disk using the BinData component. However, I am struggling to pass that binary information to a PowerBuilder BLOB data type. How […]

How Chilkat .NET Framework is different than Chilkat .NET Core

The architecture of the Chilkat .NET Core assembly is different than that for the .NET Framework in the following ways. Chilkat for .NET Framework Downloaded from https://www.chilkatsoft.com/downloads_DotNet.asp can alternatively be used directly from NuGet: such as https://www.nuget.org/packages/chilkat-x64 The assembly DLL is a mixed-mode assembly, which means the outer layer is managed, but the inner core is native code. This prevents […]

PROXKey Token

This blog post is a summary of information about the PROXKey token… Drivers, Manuals, and Brochure:  https://proxkeytoken.in/download.php Supports PKCS#11 V2.10 Microsoft CAPI 2.0 Microsoft CNG but apparently not ScMinidriver Microsoft CSP provider name:  PROXKey CSP India V3.0 ATR: 3b6d000057443641018693111184124934 PKCS11 driver DLL:   C:\Windows\System32\SignatureP11.dll Repository for various token drivers, including WatchData PROXKey v2 and v3 drivers for Windows, Linux, and Mac:  […]

Does Chilkat Support Angular?

The answer is No and Yes. Angular is a client-side JavaScript framework, which means that it primarily runs on the client side (in the user’s browser) rather than on the web server. When a user accesses a web page built with Angular, the Angular application is downloaded to the user’s browser, and the majority of the processing occurs on the […]

Possible Solution for Failure to Produce LTV Enabled PDF Signature

This blog post describes the case where your application asks Chilkat to produce an LTV-enabled PDF signature by specifying “ltvOcsp” in the signing attributes, yet the signed PDF as viewed in Adobe Acrobat does not show the signature as being LTV enabled. For example, in Adobe Acrobat, an LTV enabled signature looks like this: You can see the message “Signature […]

Don’t Forget to Give Your Android Application INTERNET Permissions

In Android, network permissions are necessary for applications that want to establish network connections and use sockets to communicate over the internet. These permissions are declared in the AndroidManifest.xml file, and they inform the Android system about the specific capabilities an application requires. For applications that use sockets and perform network-related operations, the following permissions are commonly used: 1. INTERNET […]