Session Methods |
The Session type exposes the following members.
Name | Description | |
---|---|---|
CreateSignature | Create a signature configuration based on signing certificate | |
CreateSignatureFromKeyId | Create a signature configuration based on the private key's ID and an external certificate Create a signature configuration where only the private key is contained in the PKCS#11 device and the signing certificate is provided externally. This is intended for PKCS#11 devices that can only store private keys, e.g. the Google Cloud Key Management (KMS). The private key object is identified using its ID, i.e. the CKA_ID object attribute in the PKCS#11 store. The certificates of the trust chain should be added using AddCertificate(Stream). | |
CreateSignatureFromKeyLabel | Create a signature configuration based on the private key's label (name) and an external certificate Create a signature configuration where only the private key is contained in the PKCS#11 device and the signing certificate is provided externally. This is intended for PKCS#11 devices that can only store private keys, e.g. the Google Cloud Key Management (KMS). The private key object is identified using its label, i.e. the CKA_LABEL object attribute in the PKCS#11 store. The certificates of the trust chain should be added using AddCertificate(Stream). | |
CreateSignatureFromName | Create a signature configuration based on certificate name | |
CreateTimestamp | Create a time-stamp configuration Note that to create time-stamps, the TimestampUrl must be set. | |
Dispose | Close the object Release all resources associated with the object.(Inherited from Provider) | |
Equals | (Inherited from NativeObject) | |
GetHashCode | (Inherited from NativeObject) | |
Login | Log in user into the cryptographic device Login is typically required to enable cryptographic operations. Furthermore, some of the device's objects such as certificates or private keys might only be visible when logged in. Note that many devices are locked after a number of failed login attempts. Therefore, it is crucial to not retry this method using the same password after a failed attempt. |