Chilkat Secrets Class added in Version 10.1.0

Introduced in version 10.1.0, the Chilkat Secrets class enables managing secrets like passwords and OAuth2 tokens locally (on Windows and MacOS/iOS) and across various cloud platforms. It offers a unified API for seamless secret storage and supports the following standard operations: Create/Update a Secret List Secrets Delete a Secret Get a Secret’s Value Secrets can be located in: Windows Credentials […]

FTP Rename Remote File – What Happens if the Target Remote File Already Exists?

The behavior of the FTP “RNTO” command when the target file already exists depends on the FTP server implementation and configuration. The File Transfer Protocol (FTP) itself, as defined in RFC 959, does not explicitly specify what should happen in this case, leaving it up to the server’s discretion. Typical Behaviors for “RNTO” When the Target File Exists Overwrite the […]

PKCS7 (CMS) Encryption vs RSA Encryption

The difference between PKCS7 (CMS) encryption and RSA encryption lies in their purpose, scope, and how they handle encryption. * Output size differences are described further below. PKCS7 (CMS) Encryption Type: A data format and protocol, not an encryption algorithm itself. Purpose: Used for encrypting data and supporting digital signatures in a standard format. Mechanism: PKCS7 (or CMS, Cryptographic Message […]

Explaining Email Return Receipts and Disposition-Notification-To

Disposition-Notification-To Email Header The “Disposition-Notification-To” email header is used to request a return receipt or read receipt from the recipient’s email client. When this header is present, the recipient’s email client may send a notification back to the sender indicating that the email was received, opened, or processed in some way. How It Works: The “Disposition-Notification-To” header specifies the email […]

Multiple Reply-To Email Addresses

Is it Possible for an Email to Have Multiple “Reply-To” Addresses? Yes, it is technically possible for an email to have multiple “Reply-To” addresses. The “Reply-To” header in an email can list multiple email addresses separated by commas, similar to the “To” or “Cc” headers. This is defined by the RFC 5322 standard, which governs the Internet Message Format used […]

Wrapping a Chilkat Synchronous Method in C# async/await

Chilkat provides its own Async functions, separate from C#’s async/await. For each synchronous Chilkat function that may take time due to network communication or other factors, an Async version is also available, returning a Chilkat Task object (distinct from C#’s Task object). Chilkat’s Async functionality exists in all of the programming languages: C++, PHP, Ruby, Perl, Python, VB6, VBScript, DataFlex, […]

How ASN.1 Encodes Lengths

In ASN.1 (Abstract Syntax Notation One), lengths are encoded as part of the TLV (Type-Length-Value) structure, where each element consists of: Type: Identifies the data type of the element. Length: Specifies the number of bytes that make up the element’s content. Value: Contains the actual data or content. The Length field in ASN.1 encoding is designed to allow both short […]

What is a .p7m or .p7s File?

“.p7m” and “.p7s” files are both related to PKCS #7 (Public Key Cryptography Standards #7) and are used for secure email and digital signatures. These files encapsulate data with cryptographic signatures and certificates to verify the identity of the sender and/or the integrity of the message. 1. “.p7m” File (Signed and Encrypted Content) Description: A “.p7m” file is a digitally […]

OCSP Nonce Lengths

In the OCSP (Online Certificate Status Protocol), the nonce is an optional field used to prevent replay attacks by ensuring that the OCSP response corresponds to the specific OCSP request. The nonce is a randomly generated value included in the OCSP request and echoed back in the response by the OCSP server. Nonce Length in OCSP There is no strict […]