PDFVerify Class

Properties   Methods   Events   Config Settings   Errors  

The PDFVerify class verifies PDF signatures.

Syntax

PDFVerify

Remarks

The PDFVerify class verifies electronic signatures over PDF documents. Basic Adobe and PAdES signatures are supported.

PDFVerify validates each signature from two perspectives: the integrity and validity of the signature itself (i.e., its correspondence to the document data it covers), and the validity and trustworthiness of the signing certificate chain. These two signature aspects are generally independent of each other - the signature may be valid but the chain may not be trusted, or the chain may be trusted but the integrity of the signature may be violated. Under normal circumstances, both the signature and the chain must be valid for the signature to be considered good.

Preparing the Validation

To initiate the validation, first provide the signed PDF document as a file (InputFile), byte array (InputData), or stream (SetInputStream). Then adjust any chain validation parameters as necessary (please see the Chain Validation Setup section for more details) and call the Verify method.

For every signature in the document, PDFVerify will fire the SignatureInfo event, allowing you to specify whether you want the component to validate the signature, the chain, or both.

Once SignatureInfo returns, PDFVerify proceeds to the signature validation routine in accordance with the provided settings.

Validation Results

Upon completion of the validation, the SignatureProcessed event is fired, and the validation results are published here as well as in the following fields of the associated PDFSignature object:

  • ValidationResult contains the outcome of the signature validation: valid, corrupted, the signing certificate was missing, or failed.
  • ChainValidationResult contains the primary result of the chain validation routine: valid, valid but untrusted, invalid, or undefined.
  • ChainValidationDetails provides the details of the factors that contributed to the chain validation result, such as an outdated certificate, a missing CRL, or a missing CA certificate.
Other information about the signature can be accessed via the Signatures property.

Checking Signature Coverage

The PDF format uses incremental updates to introduce changes to the document. This implies that a signature may not cover the whole document, but rather a certain revision of it. Strictly speaking, every signature in a PDF document, apart from potentially the last one, covers just some part of the document. In most cases, that part matches the revision of the document that existed before all the subsequent signatures were added.

Because of these specifics of the PDF format, it is crucially important to understand which part of the document is covered by a specific signature. Use the CoverageEndsAt field of the associated PDFSignature object to establish the scope of a signature. The revision of the document covered by that specific signature ranges from byte 0 to CoverageEndsAt. Alternatively, you can use the GetSignedVersion method to extract the signed revision to a file.

Chain Validation Setup

Chain validation is a sophisticated, multi-faceted procedure that involves a lot of variables. Depending on the configuration of your operating environment, the specifics of the PKI framework being used, and the validation policy you need to follow, you may want to adjust your chain validation parameters to best fit your requirements. A summary of these parameters is given below.

Note that these parameters apply to the Sign and Update methods in PDFSign as well as the Verify method in PDFVerify, as all three methods execute the chain validation procedure (if it is enabled).

Validation Policy

The ValidationPolicy property dictates how thoroughly the chain will be validated. It includes options to control which checks the class will perform, allowing you to tailor the validation process to meet your specific security needs. For example, if it is not essential to check each certificate's revocation status, set this property to vpFullNoRevocation.

Revocation

The revocation aspect of chain validation is controlled by the RevocationCheck property, which allows you to choose between and prioritize revocation origins. Note that OCSP sources are often preferred to CRL endpoints because of their real-time capability and the smaller size of the responses they produce.

Trust

The trust aspect of chain validation is controlled by the TrustSources property, which allows you to specify the locations in which the class will search for trust anchors. Local system stores, your own trusted root certificates (via the TrustedCerts property), and Trusted Lists (via the TrustedLists property) are all supported.

Offline Mode

The OfflineMode property provides the ability to sign or verify the document without contacting online sources. If this property is enabled, the class will only use KnownCerts, TrustedCerts, data structures within the document itself, and revocation and Trusted List data that it previously saved to its internal cache when looking for missing validation material.

Property List


The following is the full list of the properties of the class with short descriptions. Click on the links for further details.

AttachmentsA collection of all attached files found in the PDF document.
BlockedCertsThe certificates that must be rejected as trust anchors.
DecryptionCertThe decryption certificate.
DocumentCertsA collection of certificates read from the document during processing.
FirewallA set of properties related to firewall access.
InputDataA byte array containing the PDF document to process.
InputFileThe PDF file to process.
KnownCertsA collection of additional certificates for chain validation.
OfflineModeWhether the class is operating in offline mode.
OutputDataA byte array containing the PDF document after processing.
OutputFileThe path to a local file where the output will be written.
OverwriteWhether or not the class should overwrite files.
PasswordThe password to decrypt the document with.
ProxyA set of properties related to proxy access.
RevocationCheckThe kind(s) of revocation check to perform for all chain certificates.
SignaturesA collection of all the signatures and empty fields found in the PDF document.
TrustedCertsA collection of trusted certificates for chain validation.
TrustedListsA list of known Trusted Lists for chain validation.
TrustSourcesThe trust sources to use during chain validation.
ValidationFlagsAdditional chain validation settings.
ValidationPolicyThe level at which to perform chain validation.
ValidationTimeThe time point at which the signature should be validated.

Method List


The following is the full list of the methods of the class with short descriptions. Click on the links for further details.

CloseCloses an opened PDF document.
ConfigSets or retrieves a configuration setting.
EncryptedChecks whether a PDF document is encrypted.
GetPagePropertyRetrieves the value of a page property.
GetSignedVersionReturns the part of a signed PDF document that is covered by the signature.
InterruptInterrupts the current action.
OpenOpens a PDF document for processing.
ResetResets the class.
SaveAttachmentSaves a PDF attachment to a file.
SetInputStreamSets the stream containing the PDF document to process.
SetOutputStreamSets the stream to write the processed document to.
SignedChecks whether a PDF document is signed.
UnsignRemoves a signature from a PDF document.
VerifyVerifies a signed PDF document.

Event List


The following is the full list of the events fired by the class with short descriptions. Click on the links for further details.

ChainCertFired when the class encounters a chain certificate.
DocumentInfoFired when the document has been loaded into memory.
ErrorFired when information is available about errors during data delivery.
LogFired once for each log message.
PasswordFired when the class detects that the PDF document is encrypted with a password.
RecipientInfoFired for each recipient certificate of the encrypted PDF document.
SignatureInfoFired when the class finds a signature in the document.
SignatureProcessedFired after a signature has been processed.
SSLServerAuthenticationFired after the server presents its certificate to the client.
SSLStatusFired when secure connection progress messages are available.

Config Settings


The following is a list of config settings for the class with short descriptions. Click on the links for further details.

CacheRevocationInfoWhether to cache revocation information.
CloseInputStreamAfterProcessingWhether to close the input stream after processing.
CloseOutputStreamAfterProcessingWhether to close the output stream after processing.
ContactInfo[Index]The signer's contact information.
FilterName[Index]The signature filter name.
FullSignatureName[Index]The full name of the signature field.
HTTPRetryCountThe number of HTTP request retries.
HTTPRetryIntervalA time interval to apply between HTTP request retries.
LogLevelThe level of detail that is logged.
OwnerPasswordThe owner password to decrypt the document with.
PermissionsThe document permissions associated with the encryption.
PreferEmbeddedRevocationInfoWhether to prioritize revocation information that is embedded into the document.
SaveChangesWhether to save changes made to the PDF document.
SignatureData[Index]The hex-encoded representation of the underlying PKCS#7 signature blob.
TempPathThe location where temporary files are stored.
BuildInfoInformation about the product's build.
CodePageThe system code page used for Unicode to Multibyte translations.
LicenseInfoInformation about the current license.
MaskSensitiveDataWhether sensitive data is masked in log messages.
ProcessIdleEventsWhether the class uses its internal event loop to process events when the main thread is idle.
SelectWaitMillisThe length of time in milliseconds the class will wait when DoEvents is called if there are no events to process.
UseInternalSecurityAPIWhether or not to use the system security libraries or an internal implementation.

Attachments Property (PDFVerify Class)

A collection of all attached files found in the PDF document.

Syntax

SecurePDFList<SecurePDFPDFAttachment>* GetAttachments();
int SetAttachments(SecurePDFList<SecurePDFPDFAttachment>* val);
int securepdf_pdfverify_getattachmentcount(void* lpObj);
int securepdf_pdfverify_setattachmentcount(void* lpObj, int iAttachmentCount);
char* securepdf_pdfverify_getattachmentcontenttype(void* lpObj, int attachmentindex);
int securepdf_pdfverify_setattachmentcontenttype(void* lpObj, int attachmentindex, const char* lpszAttachmentContentType);
char* securepdf_pdfverify_getattachmentcreationdate(void* lpObj, int attachmentindex);
int securepdf_pdfverify_setattachmentcreationdate(void* lpObj, int attachmentindex, const char* lpszAttachmentCreationDate);
int securepdf_pdfverify_getattachmentdata(void* lpObj, int attachmentindex, char** lpAttachmentData, int* lenAttachmentData);
int securepdf_pdfverify_setattachmentdata(void* lpObj, int attachmentindex, const char* lpAttachmentData, int lenAttachmentData);
char* securepdf_pdfverify_getattachmentdescription(void* lpObj, int attachmentindex);
int securepdf_pdfverify_setattachmentdescription(void* lpObj, int attachmentindex, const char* lpszAttachmentDescription);
char* securepdf_pdfverify_getattachmentfilename(void* lpObj, int attachmentindex);
int securepdf_pdfverify_setattachmentfilename(void* lpObj, int attachmentindex, const char* lpszAttachmentFileName);
int securepdf_pdfverify_setattachmentinputstream(void* lpObj, int attachmentindex, SecurePDFStream* sAttachmentInputStream);
char* securepdf_pdfverify_getattachmentmodificationdate(void* lpObj, int attachmentindex);
int securepdf_pdfverify_setattachmentmodificationdate(void* lpObj, int attachmentindex, const char* lpszAttachmentModificationDate);
char* securepdf_pdfverify_getattachmentname(void* lpObj, int attachmentindex);
int securepdf_pdfverify_setattachmentname(void* lpObj, int attachmentindex, const char* lpszAttachmentName);
int securepdf_pdfverify_setattachmentoutputstream(void* lpObj, int attachmentindex, SecurePDFStream* sAttachmentOutputStream);
int64 securepdf_pdfverify_getattachmentsize(void* lpObj, int attachmentindex);
int GetAttachmentCount();
int SetAttachmentCount(int iAttachmentCount); QString GetAttachmentContentType(int iAttachmentIndex);
int SetAttachmentContentType(int iAttachmentIndex, QString qsAttachmentContentType); QString GetAttachmentCreationDate(int iAttachmentIndex);
int SetAttachmentCreationDate(int iAttachmentIndex, QString qsAttachmentCreationDate); QByteArray GetAttachmentData(int iAttachmentIndex);
int SetAttachmentData(int iAttachmentIndex, QByteArray qbaAttachmentData); QString GetAttachmentDescription(int iAttachmentIndex);
int SetAttachmentDescription(int iAttachmentIndex, QString qsAttachmentDescription); QString GetAttachmentFileName(int iAttachmentIndex);
int SetAttachmentFileName(int iAttachmentIndex, QString qsAttachmentFileName); int SetAttachmentInputStream(int iAttachmentIndex, SecurePDFStream* sAttachmentInputStream); QString GetAttachmentModificationDate(int iAttachmentIndex);
int SetAttachmentModificationDate(int iAttachmentIndex, QString qsAttachmentModificationDate); QString GetAttachmentName(int iAttachmentIndex);
int SetAttachmentName(int iAttachmentIndex, QString qsAttachmentName); int SetAttachmentOutputStream(int iAttachmentIndex, SecurePDFStream* sAttachmentOutputStream); qint64 GetAttachmentSize(int iAttachmentIndex);

Remarks

This property is used to access the details of all the attached files identified in the document. Use the SaveAttachment method to save attachments from this properties.

This property is not available at design time.

Data Type

SecurePDFPDFAttachment

BlockedCerts Property (PDFVerify Class)

The certificates that must be rejected as trust anchors.

Syntax

SecurePDFList<SecurePDFCertificate>* GetBlockedCerts();
int SetBlockedCerts(SecurePDFList<SecurePDFCertificate>* val);
int securepdf_pdfverify_getblockedcertcount(void* lpObj);
int securepdf_pdfverify_setblockedcertcount(void* lpObj, int iBlockedCertCount);
char* securepdf_pdfverify_getblockedcerteffectivedate(void* lpObj, int blockedcertindex);
char* securepdf_pdfverify_getblockedcertexpirationdate(void* lpObj, int blockedcertindex);
char* securepdf_pdfverify_getblockedcertextendedkeyusage(void* lpObj, int blockedcertindex);
char* securepdf_pdfverify_getblockedcertfingerprint(void* lpObj, int blockedcertindex);
char* securepdf_pdfverify_getblockedcertfingerprintsha1(void* lpObj, int blockedcertindex);
char* securepdf_pdfverify_getblockedcertfingerprintsha256(void* lpObj, int blockedcertindex);
char* securepdf_pdfverify_getblockedcertissuer(void* lpObj, int blockedcertindex);
char* securepdf_pdfverify_getblockedcertprivatekey(void* lpObj, int blockedcertindex);
int securepdf_pdfverify_getblockedcertprivatekeyavailable(void* lpObj, int blockedcertindex);
char* securepdf_pdfverify_getblockedcertprivatekeycontainer(void* lpObj, int blockedcertindex);
char* securepdf_pdfverify_getblockedcertpublickey(void* lpObj, int blockedcertindex);
char* securepdf_pdfverify_getblockedcertpublickeyalgorithm(void* lpObj, int blockedcertindex);
int securepdf_pdfverify_getblockedcertpublickeylength(void* lpObj, int blockedcertindex);
char* securepdf_pdfverify_getblockedcertserialnumber(void* lpObj, int blockedcertindex);
char* securepdf_pdfverify_getblockedcertsignaturealgorithm(void* lpObj, int blockedcertindex);
int securepdf_pdfverify_getblockedcertstore(void* lpObj, int blockedcertindex, char** lpBlockedCertStore, int* lenBlockedCertStore);
int securepdf_pdfverify_setblockedcertstore(void* lpObj, int blockedcertindex, const char* lpBlockedCertStore, int lenBlockedCertStore);
char* securepdf_pdfverify_getblockedcertstorepassword(void* lpObj, int blockedcertindex);
int securepdf_pdfverify_setblockedcertstorepassword(void* lpObj, int blockedcertindex, const char* lpszBlockedCertStorePassword);
int securepdf_pdfverify_getblockedcertstoretype(void* lpObj, int blockedcertindex);
int securepdf_pdfverify_setblockedcertstoretype(void* lpObj, int blockedcertindex, int iBlockedCertStoreType);
char* securepdf_pdfverify_getblockedcertsubjectaltnames(void* lpObj, int blockedcertindex);
char* securepdf_pdfverify_getblockedcertthumbprintmd5(void* lpObj, int blockedcertindex);
char* securepdf_pdfverify_getblockedcertthumbprintsha1(void* lpObj, int blockedcertindex);
char* securepdf_pdfverify_getblockedcertthumbprintsha256(void* lpObj, int blockedcertindex);
char* securepdf_pdfverify_getblockedcertusage(void* lpObj, int blockedcertindex);
int securepdf_pdfverify_getblockedcertusageflags(void* lpObj, int blockedcertindex);
char* securepdf_pdfverify_getblockedcertversion(void* lpObj, int blockedcertindex);
char* securepdf_pdfverify_getblockedcertsubject(void* lpObj, int blockedcertindex);
int securepdf_pdfverify_setblockedcertsubject(void* lpObj, int blockedcertindex, const char* lpszBlockedCertSubject);
int securepdf_pdfverify_getblockedcertencoded(void* lpObj, int blockedcertindex, char** lpBlockedCertEncoded, int* lenBlockedCertEncoded);
int securepdf_pdfverify_setblockedcertencoded(void* lpObj, int blockedcertindex, const char* lpBlockedCertEncoded, int lenBlockedCertEncoded);
int GetBlockedCertCount();
int SetBlockedCertCount(int iBlockedCertCount); QString GetBlockedCertEffectiveDate(int iBlockedCertIndex); QString GetBlockedCertExpirationDate(int iBlockedCertIndex); QString GetBlockedCertExtendedKeyUsage(int iBlockedCertIndex); QString GetBlockedCertFingerprint(int iBlockedCertIndex); QString GetBlockedCertFingerprintSHA1(int iBlockedCertIndex); QString GetBlockedCertFingerprintSHA256(int iBlockedCertIndex); QString GetBlockedCertIssuer(int iBlockedCertIndex); QString GetBlockedCertPrivateKey(int iBlockedCertIndex); bool GetBlockedCertPrivateKeyAvailable(int iBlockedCertIndex); QString GetBlockedCertPrivateKeyContainer(int iBlockedCertIndex); QString GetBlockedCertPublicKey(int iBlockedCertIndex); QString GetBlockedCertPublicKeyAlgorithm(int iBlockedCertIndex); int GetBlockedCertPublicKeyLength(int iBlockedCertIndex); QString GetBlockedCertSerialNumber(int iBlockedCertIndex); QString GetBlockedCertSignatureAlgorithm(int iBlockedCertIndex); QByteArray GetBlockedCertStore(int iBlockedCertIndex);
int SetBlockedCertStore(int iBlockedCertIndex, QByteArray qbaBlockedCertStore); QString GetBlockedCertStorePassword(int iBlockedCertIndex);
int SetBlockedCertStorePassword(int iBlockedCertIndex, QString qsBlockedCertStorePassword); int GetBlockedCertStoreType(int iBlockedCertIndex);
int SetBlockedCertStoreType(int iBlockedCertIndex, int iBlockedCertStoreType); QString GetBlockedCertSubjectAltNames(int iBlockedCertIndex); QString GetBlockedCertThumbprintMD5(int iBlockedCertIndex); QString GetBlockedCertThumbprintSHA1(int iBlockedCertIndex); QString GetBlockedCertThumbprintSHA256(int iBlockedCertIndex); QString GetBlockedCertUsage(int iBlockedCertIndex); int GetBlockedCertUsageFlags(int iBlockedCertIndex); QString GetBlockedCertVersion(int iBlockedCertIndex); QString GetBlockedCertSubject(int iBlockedCertIndex);
int SetBlockedCertSubject(int iBlockedCertIndex, QString qsBlockedCertSubject); QByteArray GetBlockedCertEncoded(int iBlockedCertIndex);
int SetBlockedCertEncoded(int iBlockedCertIndex, QByteArray qbaBlockedCertEncoded);

Remarks

This property is used to supply a list of compromised or blocked certificates to the class. Note that any chain containing a blocked certificate will fail validation.

This property is not available at design time.

Data Type

SecurePDFCertificate

DecryptionCert Property (PDFVerify Class)

The decryption certificate.

Syntax

SecurePDFCertificate* GetDecryptionCert();
int SetDecryptionCert(SecurePDFCertificate* val);
char* securepdf_pdfverify_getdecryptioncerteffectivedate(void* lpObj);
char* securepdf_pdfverify_getdecryptioncertexpirationdate(void* lpObj);
char* securepdf_pdfverify_getdecryptioncertextendedkeyusage(void* lpObj);
char* securepdf_pdfverify_getdecryptioncertfingerprint(void* lpObj);
char* securepdf_pdfverify_getdecryptioncertfingerprintsha1(void* lpObj);
char* securepdf_pdfverify_getdecryptioncertfingerprintsha256(void* lpObj);
char* securepdf_pdfverify_getdecryptioncertissuer(void* lpObj);
char* securepdf_pdfverify_getdecryptioncertprivatekey(void* lpObj);
int securepdf_pdfverify_getdecryptioncertprivatekeyavailable(void* lpObj);
char* securepdf_pdfverify_getdecryptioncertprivatekeycontainer(void* lpObj);
char* securepdf_pdfverify_getdecryptioncertpublickey(void* lpObj);
char* securepdf_pdfverify_getdecryptioncertpublickeyalgorithm(void* lpObj);
int securepdf_pdfverify_getdecryptioncertpublickeylength(void* lpObj);
char* securepdf_pdfverify_getdecryptioncertserialnumber(void* lpObj);
char* securepdf_pdfverify_getdecryptioncertsignaturealgorithm(void* lpObj);
int securepdf_pdfverify_getdecryptioncertstore(void* lpObj, char** lpDecryptionCertStore, int* lenDecryptionCertStore);
int securepdf_pdfverify_setdecryptioncertstore(void* lpObj, const char* lpDecryptionCertStore, int lenDecryptionCertStore);
char* securepdf_pdfverify_getdecryptioncertstorepassword(void* lpObj);
int securepdf_pdfverify_setdecryptioncertstorepassword(void* lpObj, const char* lpszDecryptionCertStorePassword);
int securepdf_pdfverify_getdecryptioncertstoretype(void* lpObj);
int securepdf_pdfverify_setdecryptioncertstoretype(void* lpObj, int iDecryptionCertStoreType);
char* securepdf_pdfverify_getdecryptioncertsubjectaltnames(void* lpObj);
char* securepdf_pdfverify_getdecryptioncertthumbprintmd5(void* lpObj);
char* securepdf_pdfverify_getdecryptioncertthumbprintsha1(void* lpObj);
char* securepdf_pdfverify_getdecryptioncertthumbprintsha256(void* lpObj);
char* securepdf_pdfverify_getdecryptioncertusage(void* lpObj);
int securepdf_pdfverify_getdecryptioncertusageflags(void* lpObj);
char* securepdf_pdfverify_getdecryptioncertversion(void* lpObj);
char* securepdf_pdfverify_getdecryptioncertsubject(void* lpObj);
int securepdf_pdfverify_setdecryptioncertsubject(void* lpObj, const char* lpszDecryptionCertSubject);
int securepdf_pdfverify_getdecryptioncertencoded(void* lpObj, char** lpDecryptionCertEncoded, int* lenDecryptionCertEncoded);
int securepdf_pdfverify_setdecryptioncertencoded(void* lpObj, const char* lpDecryptionCertEncoded, int lenDecryptionCertEncoded);
QString GetDecryptionCertEffectiveDate();

QString GetDecryptionCertExpirationDate();

QString GetDecryptionCertExtendedKeyUsage();

QString GetDecryptionCertFingerprint();

QString GetDecryptionCertFingerprintSHA1();

QString GetDecryptionCertFingerprintSHA256();

QString GetDecryptionCertIssuer();

QString GetDecryptionCertPrivateKey();

bool GetDecryptionCertPrivateKeyAvailable();

QString GetDecryptionCertPrivateKeyContainer();

QString GetDecryptionCertPublicKey();

QString GetDecryptionCertPublicKeyAlgorithm();

int GetDecryptionCertPublicKeyLength();

QString GetDecryptionCertSerialNumber();

QString GetDecryptionCertSignatureAlgorithm();

QByteArray GetDecryptionCertStore();
int SetDecryptionCertStore(QByteArray qbaDecryptionCertStore); QString GetDecryptionCertStorePassword();
int SetDecryptionCertStorePassword(QString qsDecryptionCertStorePassword); int GetDecryptionCertStoreType();
int SetDecryptionCertStoreType(int iDecryptionCertStoreType); QString GetDecryptionCertSubjectAltNames(); QString GetDecryptionCertThumbprintMD5(); QString GetDecryptionCertThumbprintSHA1(); QString GetDecryptionCertThumbprintSHA256(); QString GetDecryptionCertUsage(); int GetDecryptionCertUsageFlags(); QString GetDecryptionCertVersion(); QString GetDecryptionCertSubject();
int SetDecryptionCertSubject(QString qsDecryptionCertSubject); QByteArray GetDecryptionCertEncoded();
int SetDecryptionCertEncoded(QByteArray qbaDecryptionCertEncoded);

Remarks

This property is used to provide the certificate used for decryption. Note that this certificate must have a private key associated with it.

This property is not available at design time.

Data Type

SecurePDFCertificate

DocumentCerts Property (PDFVerify Class)

A collection of certificates read from the document during processing.

Syntax

SecurePDFList<SecurePDFCertificate>* GetDocumentCerts();

int securepdf_pdfverify_getdocumentcertcount(void* lpObj);
char* securepdf_pdfverify_getdocumentcerteffectivedate(void* lpObj, int documentcertindex);
char* securepdf_pdfverify_getdocumentcertexpirationdate(void* lpObj, int documentcertindex);
char* securepdf_pdfverify_getdocumentcertextendedkeyusage(void* lpObj, int documentcertindex);
char* securepdf_pdfverify_getdocumentcertfingerprint(void* lpObj, int documentcertindex);
char* securepdf_pdfverify_getdocumentcertfingerprintsha1(void* lpObj, int documentcertindex);
char* securepdf_pdfverify_getdocumentcertfingerprintsha256(void* lpObj, int documentcertindex);
char* securepdf_pdfverify_getdocumentcertissuer(void* lpObj, int documentcertindex);
char* securepdf_pdfverify_getdocumentcertprivatekey(void* lpObj, int documentcertindex);
int securepdf_pdfverify_getdocumentcertprivatekeyavailable(void* lpObj, int documentcertindex);
char* securepdf_pdfverify_getdocumentcertprivatekeycontainer(void* lpObj, int documentcertindex);
char* securepdf_pdfverify_getdocumentcertpublickey(void* lpObj, int documentcertindex);
char* securepdf_pdfverify_getdocumentcertpublickeyalgorithm(void* lpObj, int documentcertindex);
int securepdf_pdfverify_getdocumentcertpublickeylength(void* lpObj, int documentcertindex);
char* securepdf_pdfverify_getdocumentcertserialnumber(void* lpObj, int documentcertindex);
char* securepdf_pdfverify_getdocumentcertsignaturealgorithm(void* lpObj, int documentcertindex);
int securepdf_pdfverify_getdocumentcertstore(void* lpObj, int documentcertindex, char** lpDocumentCertStore, int* lenDocumentCertStore);
char* securepdf_pdfverify_getdocumentcertstorepassword(void* lpObj, int documentcertindex);
int securepdf_pdfverify_getdocumentcertstoretype(void* lpObj, int documentcertindex);
char* securepdf_pdfverify_getdocumentcertsubjectaltnames(void* lpObj, int documentcertindex);
char* securepdf_pdfverify_getdocumentcertthumbprintmd5(void* lpObj, int documentcertindex);
char* securepdf_pdfverify_getdocumentcertthumbprintsha1(void* lpObj, int documentcertindex);
char* securepdf_pdfverify_getdocumentcertthumbprintsha256(void* lpObj, int documentcertindex);
char* securepdf_pdfverify_getdocumentcertusage(void* lpObj, int documentcertindex);
int securepdf_pdfverify_getdocumentcertusageflags(void* lpObj, int documentcertindex);
char* securepdf_pdfverify_getdocumentcertversion(void* lpObj, int documentcertindex);
char* securepdf_pdfverify_getdocumentcertsubject(void* lpObj, int documentcertindex);
int securepdf_pdfverify_getdocumentcertencoded(void* lpObj, int documentcertindex, char** lpDocumentCertEncoded, int* lenDocumentCertEncoded);
int GetDocumentCertCount();

QString GetDocumentCertEffectiveDate(int iDocumentCertIndex);

QString GetDocumentCertExpirationDate(int iDocumentCertIndex);

QString GetDocumentCertExtendedKeyUsage(int iDocumentCertIndex);

QString GetDocumentCertFingerprint(int iDocumentCertIndex);

QString GetDocumentCertFingerprintSHA1(int iDocumentCertIndex);

QString GetDocumentCertFingerprintSHA256(int iDocumentCertIndex);

QString GetDocumentCertIssuer(int iDocumentCertIndex);

QString GetDocumentCertPrivateKey(int iDocumentCertIndex);

bool GetDocumentCertPrivateKeyAvailable(int iDocumentCertIndex);

QString GetDocumentCertPrivateKeyContainer(int iDocumentCertIndex);

QString GetDocumentCertPublicKey(int iDocumentCertIndex);

QString GetDocumentCertPublicKeyAlgorithm(int iDocumentCertIndex);

int GetDocumentCertPublicKeyLength(int iDocumentCertIndex);

QString GetDocumentCertSerialNumber(int iDocumentCertIndex);

QString GetDocumentCertSignatureAlgorithm(int iDocumentCertIndex);

QByteArray GetDocumentCertStore(int iDocumentCertIndex);

QString GetDocumentCertStorePassword(int iDocumentCertIndex);

int GetDocumentCertStoreType(int iDocumentCertIndex);

QString GetDocumentCertSubjectAltNames(int iDocumentCertIndex);

QString GetDocumentCertThumbprintMD5(int iDocumentCertIndex);

QString GetDocumentCertThumbprintSHA1(int iDocumentCertIndex);

QString GetDocumentCertThumbprintSHA256(int iDocumentCertIndex);

QString GetDocumentCertUsage(int iDocumentCertIndex);

int GetDocumentCertUsageFlags(int iDocumentCertIndex);

QString GetDocumentCertVersion(int iDocumentCertIndex);

QString GetDocumentCertSubject(int iDocumentCertIndex);

QByteArray GetDocumentCertEncoded(int iDocumentCertIndex);

Remarks

This property is used to access all certificates encountered during document processing and embedded into the signature(s). When signing or verifying, this properties will be populated automatically during chain validation.

This property is read-only and not available at design time.

Data Type

SecurePDFCertificate

Firewall Property (PDFVerify Class)

A set of properties related to firewall access.

Syntax

SecurePDFFirewall* GetFirewall();
int SetFirewall(SecurePDFFirewall* val);
int securepdf_pdfverify_getfirewallautodetect(void* lpObj);
int securepdf_pdfverify_setfirewallautodetect(void* lpObj, int bFirewallAutoDetect);
int securepdf_pdfverify_getfirewalltype(void* lpObj);
int securepdf_pdfverify_setfirewalltype(void* lpObj, int iFirewallType);
char* securepdf_pdfverify_getfirewallhost(void* lpObj);
int securepdf_pdfverify_setfirewallhost(void* lpObj, const char* lpszFirewallHost);
char* securepdf_pdfverify_getfirewallpassword(void* lpObj);
int securepdf_pdfverify_setfirewallpassword(void* lpObj, const char* lpszFirewallPassword);
int securepdf_pdfverify_getfirewallport(void* lpObj);
int securepdf_pdfverify_setfirewallport(void* lpObj, int iFirewallPort);
char* securepdf_pdfverify_getfirewalluser(void* lpObj);
int securepdf_pdfverify_setfirewalluser(void* lpObj, const char* lpszFirewallUser);
bool GetFirewallAutoDetect();
int SetFirewallAutoDetect(bool bFirewallAutoDetect); int GetFirewallType();
int SetFirewallType(int iFirewallType); QString GetFirewallHost();
int SetFirewallHost(QString qsFirewallHost); QString GetFirewallPassword();
int SetFirewallPassword(QString qsFirewallPassword); int GetFirewallPort();
int SetFirewallPort(int iFirewallPort); QString GetFirewallUser();
int SetFirewallUser(QString qsFirewallUser);

Remarks

This is a Firewall-type property, which contains fields describing the firewall through which the class will attempt to connect.

Data Type

SecurePDFFirewall

InputData Property (PDFVerify Class)

A byte array containing the PDF document to process.

Syntax

ANSI (Cross Platform)
int GetInputData(char* &lpInputData, int &lenInputData);
int SetInputData(const char* lpInputData, int lenInputData); Unicode (Windows) INT GetInputData(LPSTR &lpInputData, INT &lenInputData);
INT SetInputData(LPCSTR lpInputData, INT lenInputData);
int securepdf_pdfverify_getinputdata(void* lpObj, char** lpInputData, int* lenInputData);
int securepdf_pdfverify_setinputdata(void* lpObj, const char* lpInputData, int lenInputData);
QByteArray GetInputData();
int SetInputData(QByteArray qbaInputData);

Remarks

This property is used to assign a byte array containing the PDF document to be processed.

This property is not available at design time.

Data Type

Byte Array

InputFile Property (PDFVerify Class)

The PDF file to process.

Syntax

ANSI (Cross Platform)
char* GetInputFile();
int SetInputFile(const char* lpszInputFile); Unicode (Windows) LPWSTR GetInputFile();
INT SetInputFile(LPCWSTR lpszInputFile);
char* securepdf_pdfverify_getinputfile(void* lpObj);
int securepdf_pdfverify_setinputfile(void* lpObj, const char* lpszInputFile);
QString GetInputFile();
int SetInputFile(QString qsInputFile);

Default Value

""

Remarks

This property is used to provide a path to the PDF document to be processed.

Data Type

String

KnownCerts Property (PDFVerify Class)

A collection of additional certificates for chain validation.

Syntax

SecurePDFList<SecurePDFCertificate>* GetKnownCerts();
int SetKnownCerts(SecurePDFList<SecurePDFCertificate>* val);
int securepdf_pdfverify_getknowncertcount(void* lpObj);
int securepdf_pdfverify_setknowncertcount(void* lpObj, int iKnownCertCount);
char* securepdf_pdfverify_getknowncerteffectivedate(void* lpObj, int knowncertindex);
char* securepdf_pdfverify_getknowncertexpirationdate(void* lpObj, int knowncertindex);
char* securepdf_pdfverify_getknowncertextendedkeyusage(void* lpObj, int knowncertindex);
char* securepdf_pdfverify_getknowncertfingerprint(void* lpObj, int knowncertindex);
char* securepdf_pdfverify_getknowncertfingerprintsha1(void* lpObj, int knowncertindex);
char* securepdf_pdfverify_getknowncertfingerprintsha256(void* lpObj, int knowncertindex);
char* securepdf_pdfverify_getknowncertissuer(void* lpObj, int knowncertindex);
char* securepdf_pdfverify_getknowncertprivatekey(void* lpObj, int knowncertindex);
int securepdf_pdfverify_getknowncertprivatekeyavailable(void* lpObj, int knowncertindex);
char* securepdf_pdfverify_getknowncertprivatekeycontainer(void* lpObj, int knowncertindex);
char* securepdf_pdfverify_getknowncertpublickey(void* lpObj, int knowncertindex);
char* securepdf_pdfverify_getknowncertpublickeyalgorithm(void* lpObj, int knowncertindex);
int securepdf_pdfverify_getknowncertpublickeylength(void* lpObj, int knowncertindex);
char* securepdf_pdfverify_getknowncertserialnumber(void* lpObj, int knowncertindex);
char* securepdf_pdfverify_getknowncertsignaturealgorithm(void* lpObj, int knowncertindex);
int securepdf_pdfverify_getknowncertstore(void* lpObj, int knowncertindex, char** lpKnownCertStore, int* lenKnownCertStore);
int securepdf_pdfverify_setknowncertstore(void* lpObj, int knowncertindex, const char* lpKnownCertStore, int lenKnownCertStore);
char* securepdf_pdfverify_getknowncertstorepassword(void* lpObj, int knowncertindex);
int securepdf_pdfverify_setknowncertstorepassword(void* lpObj, int knowncertindex, const char* lpszKnownCertStorePassword);
int securepdf_pdfverify_getknowncertstoretype(void* lpObj, int knowncertindex);
int securepdf_pdfverify_setknowncertstoretype(void* lpObj, int knowncertindex, int iKnownCertStoreType);
char* securepdf_pdfverify_getknowncertsubjectaltnames(void* lpObj, int knowncertindex);
char* securepdf_pdfverify_getknowncertthumbprintmd5(void* lpObj, int knowncertindex);
char* securepdf_pdfverify_getknowncertthumbprintsha1(void* lpObj, int knowncertindex);
char* securepdf_pdfverify_getknowncertthumbprintsha256(void* lpObj, int knowncertindex);
char* securepdf_pdfverify_getknowncertusage(void* lpObj, int knowncertindex);
int securepdf_pdfverify_getknowncertusageflags(void* lpObj, int knowncertindex);
char* securepdf_pdfverify_getknowncertversion(void* lpObj, int knowncertindex);
char* securepdf_pdfverify_getknowncertsubject(void* lpObj, int knowncertindex);
int securepdf_pdfverify_setknowncertsubject(void* lpObj, int knowncertindex, const char* lpszKnownCertSubject);
int securepdf_pdfverify_getknowncertencoded(void* lpObj, int knowncertindex, char** lpKnownCertEncoded, int* lenKnownCertEncoded);
int securepdf_pdfverify_setknowncertencoded(void* lpObj, int knowncertindex, const char* lpKnownCertEncoded, int lenKnownCertEncoded);
int GetKnownCertCount();
int SetKnownCertCount(int iKnownCertCount); QString GetKnownCertEffectiveDate(int iKnownCertIndex); QString GetKnownCertExpirationDate(int iKnownCertIndex); QString GetKnownCertExtendedKeyUsage(int iKnownCertIndex); QString GetKnownCertFingerprint(int iKnownCertIndex); QString GetKnownCertFingerprintSHA1(int iKnownCertIndex); QString GetKnownCertFingerprintSHA256(int iKnownCertIndex); QString GetKnownCertIssuer(int iKnownCertIndex); QString GetKnownCertPrivateKey(int iKnownCertIndex); bool GetKnownCertPrivateKeyAvailable(int iKnownCertIndex); QString GetKnownCertPrivateKeyContainer(int iKnownCertIndex); QString GetKnownCertPublicKey(int iKnownCertIndex); QString GetKnownCertPublicKeyAlgorithm(int iKnownCertIndex); int GetKnownCertPublicKeyLength(int iKnownCertIndex); QString GetKnownCertSerialNumber(int iKnownCertIndex); QString GetKnownCertSignatureAlgorithm(int iKnownCertIndex); QByteArray GetKnownCertStore(int iKnownCertIndex);
int SetKnownCertStore(int iKnownCertIndex, QByteArray qbaKnownCertStore); QString GetKnownCertStorePassword(int iKnownCertIndex);
int SetKnownCertStorePassword(int iKnownCertIndex, QString qsKnownCertStorePassword); int GetKnownCertStoreType(int iKnownCertIndex);
int SetKnownCertStoreType(int iKnownCertIndex, int iKnownCertStoreType); QString GetKnownCertSubjectAltNames(int iKnownCertIndex); QString GetKnownCertThumbprintMD5(int iKnownCertIndex); QString GetKnownCertThumbprintSHA1(int iKnownCertIndex); QString GetKnownCertThumbprintSHA256(int iKnownCertIndex); QString GetKnownCertUsage(int iKnownCertIndex); int GetKnownCertUsageFlags(int iKnownCertIndex); QString GetKnownCertVersion(int iKnownCertIndex); QString GetKnownCertSubject(int iKnownCertIndex);
int SetKnownCertSubject(int iKnownCertIndex, QString qsKnownCertSubject); QByteArray GetKnownCertEncoded(int iKnownCertIndex);
int SetKnownCertEncoded(int iKnownCertIndex, QByteArray qbaKnownCertEncoded);

Remarks

This property is used to supply a list of additional certificates to the class that might be needed for chain validation. For instance, intermediary CA certificates may be absent from the standard system locations (or there may be no standard system locations) and therefore should be supplied to the class manually.

The purpose of this certificate properties is roughly equivalent to that of the Intermediate Certification Authorities system store in Windows.

Note: Do not add trust anchors or root certificates to this properties; add them to TrustedCerts instead.

This property is not available at design time.

Data Type

SecurePDFCertificate

OfflineMode Property (PDFVerify Class)

Whether the class is operating in offline mode.

Syntax

ANSI (Cross Platform)
int GetOfflineMode();
int SetOfflineMode(int bOfflineMode); Unicode (Windows) BOOL GetOfflineMode();
INT SetOfflineMode(BOOL bOfflineMode);
int securepdf_pdfverify_getofflinemode(void* lpObj);
int securepdf_pdfverify_setofflinemode(void* lpObj, int bOfflineMode);
bool GetOfflineMode();
int SetOfflineMode(bool bOfflineMode);

Default Value

FALSE

Remarks

This property indicates whether the class should operate in offline mode.

In offline mode, the class restricts itself from accessing online Trusted Lists and revocation information sources such as CRLs or OCSP responders. It may be useful to set this property to true if there is a need to verify the completeness of the validation information included within the signature or provided via KnownCerts.

Data Type

Boolean

OutputData Property (PDFVerify Class)

A byte array containing the PDF document after processing.

Syntax

ANSI (Cross Platform)
int GetOutputData(char* &lpOutputData, int &lenOutputData);

Unicode (Windows)
INT GetOutputData(LPSTR &lpOutputData, INT &lenOutputData);
int securepdf_pdfverify_getoutputdata(void* lpObj, char** lpOutputData, int* lenOutputData);
QByteArray GetOutputData();

Remarks

This property is used to read the byte array containing the produced output after the operation has completed. It will only be set if an output file and output stream have not been assigned via OutputFile and SetOutputStream respectively.

This property is read-only and not available at design time.

Data Type

Byte Array

OutputFile Property (PDFVerify Class)

The path to a local file where the output will be written.

Syntax

ANSI (Cross Platform)
char* GetOutputFile();
int SetOutputFile(const char* lpszOutputFile); Unicode (Windows) LPWSTR GetOutputFile();
INT SetOutputFile(LPCWSTR lpszOutputFile);
char* securepdf_pdfverify_getoutputfile(void* lpObj);
int securepdf_pdfverify_setoutputfile(void* lpObj, const char* lpszOutputFile);
QString GetOutputFile();
int SetOutputFile(QString qsOutputFile);

Default Value

""

Remarks

This property is used to provide a path where the resulting PDF document will be saved after the operation has completed.

Data Type

String

Overwrite Property (PDFVerify Class)

Whether or not the class should overwrite files.

Syntax

ANSI (Cross Platform)
int GetOverwrite();
int SetOverwrite(int bOverwrite); Unicode (Windows) BOOL GetOverwrite();
INT SetOverwrite(BOOL bOverwrite);
int securepdf_pdfverify_getoverwrite(void* lpObj);
int securepdf_pdfverify_setoverwrite(void* lpObj, int bOverwrite);
bool GetOverwrite();
int SetOverwrite(bool bOverwrite);

Default Value

FALSE

Remarks

This property indicates whether or not the class will overwrite OutputFile, OutputData, or the stream set in SetOutputStream. If set to false, an error will be thrown whenever OutputFile, OutputData, or the stream set in SetOutputStream exists before an operation.

Data Type

Boolean

Password Property (PDFVerify Class)

The password to decrypt the document with.

Syntax

ANSI (Cross Platform)
char* GetPassword();
int SetPassword(const char* lpszPassword); Unicode (Windows) LPWSTR GetPassword();
INT SetPassword(LPCWSTR lpszPassword);
char* securepdf_pdfverify_getpassword(void* lpObj);
int securepdf_pdfverify_setpassword(void* lpObj, const char* lpszPassword);
QString GetPassword();
int SetPassword(QString qsPassword);

Default Value

""

Remarks

This property is used to provide the user password for decryption. Though it may be different from OwnerPassword, most implementations use the same value for both.

Data Type

String

Proxy Property (PDFVerify Class)

A set of properties related to proxy access.

Syntax

SecurePDFProxy* GetProxy();
int SetProxy(SecurePDFProxy* val);
int securepdf_pdfverify_getproxyauthscheme(void* lpObj);
int securepdf_pdfverify_setproxyauthscheme(void* lpObj, int iProxyAuthScheme);
int securepdf_pdfverify_getproxyautodetect(void* lpObj);
int securepdf_pdfverify_setproxyautodetect(void* lpObj, int bProxyAutoDetect);
char* securepdf_pdfverify_getproxypassword(void* lpObj);
int securepdf_pdfverify_setproxypassword(void* lpObj, const char* lpszProxyPassword);
int securepdf_pdfverify_getproxyport(void* lpObj);
int securepdf_pdfverify_setproxyport(void* lpObj, int iProxyPort);
char* securepdf_pdfverify_getproxyserver(void* lpObj);
int securepdf_pdfverify_setproxyserver(void* lpObj, const char* lpszProxyServer);
int securepdf_pdfverify_getproxyssl(void* lpObj);
int securepdf_pdfverify_setproxyssl(void* lpObj, int iProxySSL);
char* securepdf_pdfverify_getproxyuser(void* lpObj);
int securepdf_pdfverify_setproxyuser(void* lpObj, const char* lpszProxyUser);
int GetProxyAuthScheme();
int SetProxyAuthScheme(int iProxyAuthScheme); bool GetProxyAutoDetect();
int SetProxyAutoDetect(bool bProxyAutoDetect); QString GetProxyPassword();
int SetProxyPassword(QString qsProxyPassword); int GetProxyPort();
int SetProxyPort(int iProxyPort); QString GetProxyServer();
int SetProxyServer(QString qsProxyServer); int GetProxySSL();
int SetProxySSL(int iProxySSL); QString GetProxyUser();
int SetProxyUser(QString qsProxyUser);

Remarks

This property contains fields describing the proxy through which the class will attempt to connect.

Data Type

SecurePDFProxy

RevocationCheck Property (PDFVerify Class)

The kind(s) of revocation check to perform for all chain certificates.

Syntax

ANSI (Cross Platform)
int GetRevocationCheck();
int SetRevocationCheck(int iRevocationCheck); Unicode (Windows) INT GetRevocationCheck();
INT SetRevocationCheck(INT iRevocationCheck);

Possible Values

RC_ALL_CRL(0), 
RC_ALL_OCSP(1),
RC_ALL_CRLAND_OCSP(2),
RC_ANY_CRL(3),
RC_ANY_OCSP(4),
RC_ANY_CRLOR_OCSP(5),
RC_ANY_OCSPOR_CRL(6)
int securepdf_pdfverify_getrevocationcheck(void* lpObj);
int securepdf_pdfverify_setrevocationcheck(void* lpObj, int iRevocationCheck);
int GetRevocationCheck();
int SetRevocationCheck(int iRevocationCheck);

Default Value

6

Remarks

This property is used to specify the revocation sources and preferences the class will use during chain validation. Revocation checking is necessary to ensure the integrity of the chain and to obtain up-to-date certificate validity and trust information.

Certificate Revocation Lists (CRLs) and Online Certificate Status Protocol (OCSP) responses serve the same purpose of ensuring that the certificate has not been revoked by the Certificate Authority (CA) at the time of use. Depending on the circumstances and security policy requirements, either one or both of the revocation information source types may be used.

Possible values are:

0 (rcAllCRL) All provided CRL endpoints will be checked, and all checks must succeed.
1 (rcAllOCSP) All provided OCSP endpoints will be checked, and all checks must succeed.
2 (rcAllCRLAndOCSP) All provided CRL and OCSP endpoints will be checked, and all checks must succeed.
3 (rcAnyCRL) All provided CRL endpoints will be checked, and at least one check must succeed.
4 (rcAnyOCSP) All provided OCSP endpoints will be checked, and at least one check must succeed.
5 (rcAnyCRLOrOCSP) All provided CRL and OCSP endpoints will be checked, and at least one check must succeed. CRL endpoints are checked first.
6 (rcAnyOCSPOrCRL - default) All provided CRL and OCSP endpoints will be checked, and at least one check must succeed. OCSP endpoints are checked first.

This property controls the way revocation checks are performed for every certificate in the chain. Typically, certificates come with two types of revocation information sources: CRLs (Certificate Revocation Lists) and OCSP responses. CRLs are static objects periodically published by the CA at some online location. OCSP responders are active online services maintained by the CA that can provide up-to-date information on certificate statuses in near real time.

There are some conceptual differences between the two. CRLs are normally larger in size. Their use involves some latency because there is normally a delay between the time at which a certificate was revoked and the time at which the subsequent CRL mentioning that revocation is published. The benefits of CRLs are that the same object can provide statuses for all certificates issued by a particular CA, and that the whole technology is much simpler than OCSP (and thus is supported by more CAs).

This property allows the validation course to be adjusted by including or excluding certain types of revocation sources from the validation process. The rcAnyOCSPOrCRL setting (give preference to the faster OCSP route and only demand one source to succeed) is a good choice for most typical validation environments. The rcAll* modes are much stricter, and may be used in scenarios where bulletproof validity information is essential.

Note: If no CRL or OCSP endpoints are provided by the CA, the revocation check will be considered successful. This is because the CA chose not to supply revocation information for its certificates, meaning they are considered irrevocable.

Note: Within each of the above settings, if any retrieved CRL or OCSP response indicates that the certificate has been revoked, the revocation check fails.

Data Type

Integer

Signatures Property (PDFVerify Class)

A collection of all the signatures and empty fields found in the PDF document.

Syntax

int securepdf_pdfverify_getpdfsignaturecount(void* lpObj);
char* securepdf_pdfverify_getpdfsignatureauthorname(void* lpObj, int pdfsignatureindex);
int securepdf_pdfverify_getpdfsignaturechainvalidationdetails(void* lpObj, int pdfsignatureindex);
int securepdf_pdfverify_getpdfsignaturechainvalidationresult(void* lpObj, int pdfsignatureindex);
char* securepdf_pdfverify_getpdfsignatureclaimedsigningtime(void* lpObj, int pdfsignatureindex);
int securepdf_pdfverify_getpdfsignaturecoverageendsat(void* lpObj, int pdfsignatureindex);
char* securepdf_pdfverify_getpdfsignaturehashalgorithm(void* lpObj, int pdfsignatureindex);
int securepdf_pdfverify_getpdfsignatureprofile(void* lpObj, int pdfsignatureindex);
char* securepdf_pdfverify_getpdfsignaturereason(void* lpObj, int pdfsignatureindex);
int securepdf_pdfverify_getpdfsignaturetype(void* lpObj, int pdfsignatureindex);
int securepdf_pdfverify_getpdfsignaturesignercertindex(void* lpObj, int pdfsignatureindex);
int securepdf_pdfverify_getpdfsignaturetimestampcertindex(void* lpObj, int pdfsignatureindex);
int securepdf_pdfverify_getpdfsignaturetimestamped(void* lpObj, int pdfsignatureindex);
char* securepdf_pdfverify_getpdfsignaturevalidatedsigningtime(void* lpObj, int pdfsignatureindex);
int securepdf_pdfverify_getpdfsignaturevalidationresult(void* lpObj, int pdfsignatureindex);
char* securepdf_pdfverify_getpdfsignaturewidgetheight(void* lpObj, int pdfsignatureindex);
char* securepdf_pdfverify_getpdfsignaturewidgetoffsetx(void* lpObj, int pdfsignatureindex);
char* securepdf_pdfverify_getpdfsignaturewidgetoffsety(void* lpObj, int pdfsignatureindex);
char* securepdf_pdfverify_getpdfsignaturewidgetpages(void* lpObj, int pdfsignatureindex);
char* securepdf_pdfverify_getpdfsignaturewidgetwidth(void* lpObj, int pdfsignatureindex);
int GetPDFSignatureCount();

QString GetPDFSignatureAuthorName(int iPDFSignatureIndex);

int GetPDFSignatureChainValidationDetails(int iPDFSignatureIndex);

int GetPDFSignatureChainValidationResult(int iPDFSignatureIndex);

QString GetPDFSignatureClaimedSigningTime(int iPDFSignatureIndex);

int GetPDFSignatureCoverageEndsAt(int iPDFSignatureIndex);

QString GetPDFSignatureHashAlgorithm(int iPDFSignatureIndex);

int GetPDFSignatureProfile(int iPDFSignatureIndex);

QString GetPDFSignatureReason(int iPDFSignatureIndex);

int GetPDFSignatureType(int iPDFSignatureIndex);

int GetPDFSignatureSignerCertIndex(int iPDFSignatureIndex);

int GetPDFSignatureTimestampCertIndex(int iPDFSignatureIndex);

bool GetPDFSignatureTimestamped(int iPDFSignatureIndex);

QString GetPDFSignatureValidatedSigningTime(int iPDFSignatureIndex);

int GetPDFSignatureValidationResult(int iPDFSignatureIndex);

QString GetPDFSignatureWidgetHeight(int iPDFSignatureIndex);

QString GetPDFSignatureWidgetOffsetX(int iPDFSignatureIndex);

QString GetPDFSignatureWidgetOffsetY(int iPDFSignatureIndex);

QString GetPDFSignatureWidgetPages(int iPDFSignatureIndex);

QString GetPDFSignatureWidgetWidth(int iPDFSignatureIndex);

Remarks

This property is used to access the details of all the signatures and empty signature fields identified in the document.

This property is read-only and not available at design time.

Data Type

SecurePDFPDFSignature

TrustedCerts Property (PDFVerify Class)

A collection of trusted certificates for chain validation.

Syntax

SecurePDFList<SecurePDFCertificate>* GetTrustedCerts();
int SetTrustedCerts(SecurePDFList<SecurePDFCertificate>* val);
int securepdf_pdfverify_gettrustedcertcount(void* lpObj);
int securepdf_pdfverify_settrustedcertcount(void* lpObj, int iTrustedCertCount);
char* securepdf_pdfverify_gettrustedcerteffectivedate(void* lpObj, int trustedcertindex);
char* securepdf_pdfverify_gettrustedcertexpirationdate(void* lpObj, int trustedcertindex);
char* securepdf_pdfverify_gettrustedcertextendedkeyusage(void* lpObj, int trustedcertindex);
char* securepdf_pdfverify_gettrustedcertfingerprint(void* lpObj, int trustedcertindex);
char* securepdf_pdfverify_gettrustedcertfingerprintsha1(void* lpObj, int trustedcertindex);
char* securepdf_pdfverify_gettrustedcertfingerprintsha256(void* lpObj, int trustedcertindex);
char* securepdf_pdfverify_gettrustedcertissuer(void* lpObj, int trustedcertindex);
char* securepdf_pdfverify_gettrustedcertprivatekey(void* lpObj, int trustedcertindex);
int securepdf_pdfverify_gettrustedcertprivatekeyavailable(void* lpObj, int trustedcertindex);
char* securepdf_pdfverify_gettrustedcertprivatekeycontainer(void* lpObj, int trustedcertindex);
char* securepdf_pdfverify_gettrustedcertpublickey(void* lpObj, int trustedcertindex);
char* securepdf_pdfverify_gettrustedcertpublickeyalgorithm(void* lpObj, int trustedcertindex);
int securepdf_pdfverify_gettrustedcertpublickeylength(void* lpObj, int trustedcertindex);
char* securepdf_pdfverify_gettrustedcertserialnumber(void* lpObj, int trustedcertindex);
char* securepdf_pdfverify_gettrustedcertsignaturealgorithm(void* lpObj, int trustedcertindex);
int securepdf_pdfverify_gettrustedcertstore(void* lpObj, int trustedcertindex, char** lpTrustedCertStore, int* lenTrustedCertStore);
int securepdf_pdfverify_settrustedcertstore(void* lpObj, int trustedcertindex, const char* lpTrustedCertStore, int lenTrustedCertStore);
char* securepdf_pdfverify_gettrustedcertstorepassword(void* lpObj, int trustedcertindex);
int securepdf_pdfverify_settrustedcertstorepassword(void* lpObj, int trustedcertindex, const char* lpszTrustedCertStorePassword);
int securepdf_pdfverify_gettrustedcertstoretype(void* lpObj, int trustedcertindex);
int securepdf_pdfverify_settrustedcertstoretype(void* lpObj, int trustedcertindex, int iTrustedCertStoreType);
char* securepdf_pdfverify_gettrustedcertsubjectaltnames(void* lpObj, int trustedcertindex);
char* securepdf_pdfverify_gettrustedcertthumbprintmd5(void* lpObj, int trustedcertindex);
char* securepdf_pdfverify_gettrustedcertthumbprintsha1(void* lpObj, int trustedcertindex);
char* securepdf_pdfverify_gettrustedcertthumbprintsha256(void* lpObj, int trustedcertindex);
char* securepdf_pdfverify_gettrustedcertusage(void* lpObj, int trustedcertindex);
int securepdf_pdfverify_gettrustedcertusageflags(void* lpObj, int trustedcertindex);
char* securepdf_pdfverify_gettrustedcertversion(void* lpObj, int trustedcertindex);
char* securepdf_pdfverify_gettrustedcertsubject(void* lpObj, int trustedcertindex);
int securepdf_pdfverify_settrustedcertsubject(void* lpObj, int trustedcertindex, const char* lpszTrustedCertSubject);
int securepdf_pdfverify_gettrustedcertencoded(void* lpObj, int trustedcertindex, char** lpTrustedCertEncoded, int* lenTrustedCertEncoded);
int securepdf_pdfverify_settrustedcertencoded(void* lpObj, int trustedcertindex, const char* lpTrustedCertEncoded, int lenTrustedCertEncoded);
int GetTrustedCertCount();
int SetTrustedCertCount(int iTrustedCertCount); QString GetTrustedCertEffectiveDate(int iTrustedCertIndex); QString GetTrustedCertExpirationDate(int iTrustedCertIndex); QString GetTrustedCertExtendedKeyUsage(int iTrustedCertIndex); QString GetTrustedCertFingerprint(int iTrustedCertIndex); QString GetTrustedCertFingerprintSHA1(int iTrustedCertIndex); QString GetTrustedCertFingerprintSHA256(int iTrustedCertIndex); QString GetTrustedCertIssuer(int iTrustedCertIndex); QString GetTrustedCertPrivateKey(int iTrustedCertIndex); bool GetTrustedCertPrivateKeyAvailable(int iTrustedCertIndex); QString GetTrustedCertPrivateKeyContainer(int iTrustedCertIndex); QString GetTrustedCertPublicKey(int iTrustedCertIndex); QString GetTrustedCertPublicKeyAlgorithm(int iTrustedCertIndex); int GetTrustedCertPublicKeyLength(int iTrustedCertIndex); QString GetTrustedCertSerialNumber(int iTrustedCertIndex); QString GetTrustedCertSignatureAlgorithm(int iTrustedCertIndex); QByteArray GetTrustedCertStore(int iTrustedCertIndex);
int SetTrustedCertStore(int iTrustedCertIndex, QByteArray qbaTrustedCertStore); QString GetTrustedCertStorePassword(int iTrustedCertIndex);
int SetTrustedCertStorePassword(int iTrustedCertIndex, QString qsTrustedCertStorePassword); int GetTrustedCertStoreType(int iTrustedCertIndex);
int SetTrustedCertStoreType(int iTrustedCertIndex, int iTrustedCertStoreType); QString GetTrustedCertSubjectAltNames(int iTrustedCertIndex); QString GetTrustedCertThumbprintMD5(int iTrustedCertIndex); QString GetTrustedCertThumbprintSHA1(int iTrustedCertIndex); QString GetTrustedCertThumbprintSHA256(int iTrustedCertIndex); QString GetTrustedCertUsage(int iTrustedCertIndex); int GetTrustedCertUsageFlags(int iTrustedCertIndex); QString GetTrustedCertVersion(int iTrustedCertIndex); QString GetTrustedCertSubject(int iTrustedCertIndex);
int SetTrustedCertSubject(int iTrustedCertIndex, QString qsTrustedCertSubject); QByteArray GetTrustedCertEncoded(int iTrustedCertIndex);
int SetTrustedCertEncoded(int iTrustedCertIndex, QByteArray qbaTrustedCertEncoded);

Remarks

This property is used to supply a list of trusted certificates to the class that might be needed for chain validation. For instance, root CA certificates may be absent from the standard system locations (or there may be no standard system locations) and therefore should be supplied to the class manually.

The purpose of this certificate properties is largely the same as that of the Windows Trusted Root Certification Authorities system store.

Use this property with extreme care as it directly affects chain verifiability; a wrong certificate added to the list of trusted certificates may result in bad chains being accepted and forfeited signatures being recognized as genuine. Only add certificates that originate from parties that are known and trusted.

This property is not available at design time.

Data Type

SecurePDFCertificate

TrustedLists Property (PDFVerify Class)

A list of known Trusted Lists for chain validation.

Syntax

ANSI (Cross Platform)
char* GetTrustedLists();
int SetTrustedLists(const char* lpszTrustedLists); Unicode (Windows) LPWSTR GetTrustedLists();
INT SetTrustedLists(LPCWSTR lpszTrustedLists);
char* securepdf_pdfverify_gettrustedlists(void* lpObj);
int securepdf_pdfverify_settrustedlists(void* lpObj, const char* lpszTrustedLists);
QString GetTrustedLists();
int SetTrustedLists(QString qsTrustedLists);

Default Value

"%EUTL%"

Remarks

This property is used to supply a semicolon-separated list of URLs or paths of known Trusted Lists to the class for chain validation.

A Trusted List is an XML document that contains a government-issued list of CAs that have passed regulated compliance checks. When validating the chain, the class will consult the Trusted List to establish certificate trust, ensuring that the CA is legitimate and entitled to issue certificates of the kind being checked.

The default value is the special %EUTL% macro, which, if applicable, instructs the class to check the root certificate against up-to-date versions of the primary EU Trusted Lists from the EU LOTL. Custom values can be appended: component.TrustedLists = "%EUTL%;http://my.company/tsl;c:\tsls\mytsl.xml"; Note: The class will cache all Trusted Lists it downloads and uses during chain validation. This cache is shared between class instances within the same process. If this property contains a URL that is also present in the cache, the class will retrieve the cached data and reuse them in the current validation. If the data are invalid, the class will download a fresh Trusted List and add it to the cache.

Data Type

String

TrustSources Property (PDFVerify Class)

The trust sources to use during chain validation.

Syntax

ANSI (Cross Platform)
int GetTrustSources();
int SetTrustSources(int iTrustSources); Unicode (Windows) INT GetTrustSources();
INT SetTrustSources(INT iTrustSources);

Possible Values

TS_MANUAL(0), 
TS_LOCAL(1),
TS_TRUSTED_LISTS(2),
TS_LOCAL_AND_TRUSTED_LISTS(3)
int securepdf_pdfverify_gettrustsources(void* lpObj);
int securepdf_pdfverify_settrustsources(void* lpObj, int iTrustSources);
int GetTrustSources();
int SetTrustSources(int iTrustSources);

Default Value

3

Remarks

This property is used to specify the sources the class will use to establish certificate trust during chain validation.

Establishing trust for a particular certificate, when either signing or verifying, involves building a chain up to a valid trust anchor. This trust anchor is a root certificate that typically resides on the local system. If the certificate does not eventually chain up to a valid trust anchor, the chain is considered untrusted and therefore invalid.

Possible values are:

0 (tsManual) The class will consult the TrustedCerts property only.
1 (tsLocal) The class will consult local system stores (e.g., Windows Trusted Root Certification Authorities) as well as TrustedCerts.
2 (tsTrustedLists) The class will consult TrustedLists only.
3 (tsLocalAndTrustedLists - default) The class will consult local system stores, TrustedCerts, and TrustedLists.

Data Type

Integer

ValidationFlags Property (PDFVerify Class)

Additional chain validation settings.

Syntax

ANSI (Cross Platform)
int GetValidationFlags();
int SetValidationFlags(int iValidationFlags); Unicode (Windows) INT GetValidationFlags();
INT SetValidationFlags(INT iValidationFlags);
int securepdf_pdfverify_getvalidationflags(void* lpObj);
int securepdf_pdfverify_setvalidationflags(void* lpObj, int iValidationFlags);
int GetValidationFlags();
int SetValidationFlags(int iValidationFlags);

Default Value

0

Remarks

This property is used to specify additional settings that affect the overall flow of the chain validation.

Its value should be provided as a bitmask of the following flags:

0x001 (cvfForceCompleteChainValidationForTrusted) Perform full chain validation for explicitly trusted intermediary or end-entity certificates. This may be useful when creating signatures to enforce the completeness of the collected revocation information. It often makes sense to omit this flag when validating signatures to reduce validation time and avoid issues with poorly configured environments.
0x002 (cvfIgnoreChainLoops) Currently unsupported.
0x004 (cvfIgnoreOCSPNoCheckExtension) Currently unsupported.
0x008 (cvfTolerateMinorChainIssues) Currently unsupported.

Data Type

Integer

ValidationPolicy Property (PDFVerify Class)

The level at which to perform chain validation.

Syntax

ANSI (Cross Platform)
int GetValidationPolicy();
int SetValidationPolicy(int iValidationPolicy); Unicode (Windows) INT GetValidationPolicy();
INT SetValidationPolicy(INT iValidationPolicy);

Possible Values

VP_NONE(0), 
VP_FULL(1),
VP_FULL_NO_TRUST(2),
VP_FULL_NO_REVOCATION(3),
VP_BEST_EFFORT(4)
int securepdf_pdfverify_getvalidationpolicy(void* lpObj);
int securepdf_pdfverify_setvalidationpolicy(void* lpObj, int iValidationPolicy);
int GetValidationPolicy();
int SetValidationPolicy(int iValidationPolicy);

Default Value

1

Remarks

This property is used to specify the overall validation policy the class will follow.

Possible values are:

0 (vpNone) No chain validation is attempted at all.
1 (vpFull - default) Revocation and trust checks must succeed for all chains.
2 (vpFullNoTrust) Revocation checks must succeed, but trust checks will not occur.
3 (vpFullNoRevocation) Trust checks must succeed, but revocation checks will not occur.
4 (vpBestEffort) Currently unsupported.

Validation Policy Heuristics

The choice of validation policy will depend on the scenario for which the chain is validated.

Creating a new signature:

  • For a basic signature with or without a timestamp, chain validation is not required, so it is recommended to use vpNone. This policy may also be used in test environments or on offline systems.
  • For an LTV signature, use vpFull or vpFullNoTrust depending on whether trust checks are necessary in the current environment. If the signature is being created in an environment that does not match the prospective validation environment, consider vpFullNoTrust to validate the chain properly and fully without expecting good trust.

Updating or extending an existing signature:

  • When updating a basic signature to LTV, similarly use vpFull or vpFullNoTrust as above.
  • When extending an LTV signature, similarly use vpFull or vpFullNoTrust as above.

Validating an existing signature:

  • For basic signature validation, use vpFullNoRevocation if trust checks, but not revocation checks, are necessary in the current environment. This policy may also be used on offline systems if the trust anchor is already available to the class.
  • For archival validation, use vpFull to validate the chain properly and fully. This policy expects the trust anchor and all the revocation material to be available.

Data Type

Integer

ValidationTime Property (PDFVerify Class)

The time point at which the signature should be validated.

Syntax

ANSI (Cross Platform)
char* GetValidationTime();
int SetValidationTime(const char* lpszValidationTime); Unicode (Windows) LPWSTR GetValidationTime();
INT SetValidationTime(LPCWSTR lpszValidationTime);
char* securepdf_pdfverify_getvalidationtime(void* lpObj);
int securepdf_pdfverify_setvalidationtime(void* lpObj, const char* lpszValidationTime);
QString GetValidationTime();
int SetValidationTime(QString qsValidationTime);

Default Value

""

Remarks

This property is used to specify the moment in time at which the signature validity should be established. The time should be provided in UTC in yyyyMMddHHmmssZ format.

Leave this property empty to stick to the default time point. The class will then prioritize:

Note: The validity of the same signature may differ depending on the time point chosen due to temporal changes in chain validities, revocation statuses, and timestamp times.

Data Type

String

Close Method (PDFVerify Class)

Closes an opened PDF document.

Syntax

ANSI (Cross Platform)
int Close();

Unicode (Windows)
INT Close();
int securepdf_pdfverify_close(void* lpObj);
int Close();

Remarks

This method is used to close the previously opened document specified in InputFile, InputData, or SetInputStream. It should always be preceded by a call to the Open method.

Example: component.InputFile = "input.pdf"; component.Open(); // Some operation component.Close();

If any changes are made to the document, they will be saved automatically to OutputFile, OutputData, or the stream set in SetOutputStream when this method is called. To configure this saving behavior, set the SaveChanges configuration setting.

Error Handling (C++)

This method returns a result code; 0 indicates success, while a non-zero error code indicates that this method encountered an error during its execution. If an error occurs, the GetLastError() method can be called to retrieve the associated error message. (Note: This method's result code can also be obtained by calling the GetLastErrorCode() method after it returns.)

Config Method (PDFVerify Class)

Sets or retrieves a configuration setting.

Syntax

ANSI (Cross Platform)
char* Config(const char* lpszConfigurationString);

Unicode (Windows)
LPWSTR Config(LPCWSTR lpszConfigurationString);
char* securepdf_pdfverify_config(void* lpObj, const char* lpszConfigurationString);
QString Config(const QString& qsConfigurationString);

Remarks

Config is a generic method available in every class. It is used to set and retrieve configuration settings for the class.

These settings are similar in functionality to properties, but they are rarely used. In order to avoid "polluting" the property namespace of the class, access to these internal properties is provided through the Config method.

To set a configuration setting named PROPERTY, you must call Config("PROPERTY=VALUE"), where VALUE is the value of the setting expressed as a string. For boolean values, use the strings "True", "False", "0", "1", "Yes", or "No" (case does not matter).

To read (query) the value of a configuration setting, you must call Config("PROPERTY"). The value will be returned as a string.

Error Handling (C++)

This method returns a String value; after it returns, call the GetLastErrorCode() method to obtain its result code; 0 indicates success, while a non-zero error code indicates that this method encountered an error during its execution. If an error occurs, the GetLastError() method can be called to retrieve the associated error message.

Encrypted Method (PDFVerify Class)

Checks whether a PDF document is encrypted.

Syntax

ANSI (Cross Platform)
bool Encrypted();

Unicode (Windows)
bool Encrypted();
bool securepdf_pdfverify_encrypted(void* lpObj);
bool Encrypted();

Remarks

This method is used to determine whether or not the document specified in InputFile, InputData, or SetInputStream is encrypted. It will return false if the document is pseudo-encrypted with an empty password.

Example: component.InputFile = "input.pdf"; if (component.Encrypted()) { // Set Password or DecryptionCert } component.Open(); // Some operation component.Close(); Note: If the document is not already opened, this method will open it, perform the operation, then close it.

Error Handling (C++)

This method returns a Boolean value; after it returns, call the GetLastErrorCode() method to obtain its result code; 0 indicates success, while a non-zero error code indicates that this method encountered an error during its execution. If an error occurs, the GetLastError() method can be called to retrieve the associated error message.

GetPageProperty Method (PDFVerify Class)

Retrieves the value of a page property.

Syntax

ANSI (Cross Platform)
char* GetPageProperty(int iPage, const char* lpszPageProperty);

Unicode (Windows)
LPWSTR GetPageProperty(INT iPage, LPCWSTR lpszPageProperty);
char* securepdf_pdfverify_getpageproperty(void* lpObj, int iPage, const char* lpszPageProperty);
QString GetPageProperty(int iPage, const QString& qsPageProperty);

Remarks

This method is used to read general information about the pages of the document specified in InputFile, InputData, or SetInputStream, such as their dimensions and content positioning details.

The Page parameter specifies the page to read information about (with a valid range from 1 to PageCount), and the PageProperty parameter specifies the page property to read. The latter can take one of the following values:

Page property Default value Description
CropLowerLeftX 0 The lower-left X coordinate of the page crop area in points.
CropLowerLeftY 0 The lower-left Y coordinate of the page crop area in points.
CropUpperRightX 0 The upper-right X coordinate of the page crop area in points.
CropUpperRightY 0 The upper-right Y coordinate of the page crop area in points.
Height 0 The height of the page in points. Both integer and decimal values are supported.
MediaLowerLeftX 0 The lower-left X coordinate of the page media area in points.
MediaLowerLeftY 0 The lower-left Y coordinate of the page media area in points.
MediaUpperRightX 0 The upper-right X coordinate of the page media area in points.
MediaUpperRightY 0 The upper-right Y coordinate of the page media area in points.
Rotation 0 The rotation angle of the page in degrees. Possible values: 0, 90, 180, 270.
Width 0 The width of the page in points. Both integer and decimal values are supported.

Note: Each page property is only populated once the document has been loaded, which is reported by the DocumentInfo event.

Example: int pageCount = 0; component.OnDocumentInfo += (s, e) => { pageCount = e.PageCount; }; component.InputFile = "input.pdf"; component.Open(); for (int i = 1; i <= pageCount; i++) component.GetPageProperty(i, "Height"); component.Close(); The page properties can be used to adjust the position of the signature widget based on the page dimensions. For example: int x = int.Parse(pdfsign.GetPageProperty(1, "Width")) - 100; int y = int.Parse(pdfsign.GetPageProperty(1, "Height")) - 100; pdfsign.SetWidgetProperty("OffsetX", x.ToString()); pdfsign.SetWidgetProperty("OffsetY", y.ToString()); Note: If the document is not already opened, this method will open it, perform the operation, then close it.

Error Handling (C++)

This method returns a String value; after it returns, call the GetLastErrorCode() method to obtain its result code; 0 indicates success, while a non-zero error code indicates that this method encountered an error during its execution. If an error occurs, the GetLastError() method can be called to retrieve the associated error message.

GetSignedVersion Method (PDFVerify Class)

Returns the part of a signed PDF document that is covered by the signature.

Syntax

ANSI (Cross Platform)
int GetSignedVersion(int iSignatureIndex);

Unicode (Windows)
INT GetSignedVersion(INT iSignatureIndex);
int securepdf_pdfverify_getsignedversion(void* lpObj, int iSignatureIndex);
int GetSignedVersion(int iSignatureIndex);

Remarks

This method is used to retrieve the revision of the document specified in InputFile, InputData, or SetInputStream that is covered by the signature specified by SignatureIndex. The extracted revision will be saved to OutputFile, OutputData, or the stream set in SetOutputStream.

The SignatureIndex parameter is the index of the signature of interest in the Signatures properties.

Example: pdfverify.InputFile = "signed.pdf"; pdfverify.OutputFile = "revision0.pdf"; pdfverify.GetSignedVersion(0); PDF documents often use an incremental update approach, with any changes being appended to the document without altering the existing revision. This may lead to situations where a signature only covers part of the document (one of the past revisions), but not subsequent changes. This method provides a means to extract the revision that is actually certified by the signature.

It is recommended to use this method when validating signatures to make sure the signature covers the byte range it is expected to cover.

An alternative to this method is to check the CoverageEndsAt field of the signature object and match it to the document length.

Note: If the document is not already opened, this method will open it, perform the operation, then close it.

Error Handling (C++)

This method returns a result code; 0 indicates success, while a non-zero error code indicates that this method encountered an error during its execution. If an error occurs, the GetLastError() method can be called to retrieve the associated error message. (Note: This method's result code can also be obtained by calling the GetLastErrorCode() method after it returns.)

Interrupt Method (PDFVerify Class)

Interrupts the current action.

Syntax

ANSI (Cross Platform)
int Interrupt();

Unicode (Windows)
INT Interrupt();
int securepdf_pdfverify_interrupt(void* lpObj);
int Interrupt();

Remarks

This method interrupts the current action. It can be used, for example, within the ChainCert event to abort the chain validation procedure.

If there is no action in progress, this method simply returns, doing nothing.

Error Handling (C++)

This method returns a result code; 0 indicates success, while a non-zero error code indicates that this method encountered an error during its execution. If an error occurs, the GetLastError() method can be called to retrieve the associated error message. (Note: This method's result code can also be obtained by calling the GetLastErrorCode() method after it returns.)

Open Method (PDFVerify Class)

Opens a PDF document for processing.

Syntax

ANSI (Cross Platform)
int Open();

Unicode (Windows)
INT Open();
int securepdf_pdfverify_open(void* lpObj);
int Open();

Remarks

This method is used to open the document specified in InputFile, InputData, or SetInputStream before performing some operation on it, such as verifying or removing signatures. When finished, call Close to complete or discard the operation.

It is recommended to use this method (alongside Close) when performing multiple operations on the document at once.

Note: This method will populate the Attachments, DocumentCerts, and Signatures collections with any corresponding objects found in the document.

Automatic Decryption Functionality

If this method is called on an encrypted document, the Password or RecipientInfo event will fire (depending on the encryption type) as a notification that the document must be decrypted before processing can continue.

Once the correct decryption material is supplied, the class will then attempt to decrypt the document automatically within this method. When this occurs, the decrypted content is kept in memory so that the document's encrypted status is preserved when it is saved later. Use the Decrypt method to save a decrypted copy of the document instead.

Error Handling (C++)

This method returns a result code; 0 indicates success, while a non-zero error code indicates that this method encountered an error during its execution. If an error occurs, the GetLastError() method can be called to retrieve the associated error message. (Note: This method's result code can also be obtained by calling the GetLastErrorCode() method after it returns.)

Reset Method (PDFVerify Class)

Resets the class.

Syntax

ANSI (Cross Platform)
int Reset();

Unicode (Windows)
INT Reset();
int securepdf_pdfverify_reset(void* lpObj);
int Reset();

Remarks

This method is used to reset the class's properties and configuration settings to their default values.

Error Handling (C++)

This method returns a result code; 0 indicates success, while a non-zero error code indicates that this method encountered an error during its execution. If an error occurs, the GetLastError() method can be called to retrieve the associated error message. (Note: This method's result code can also be obtained by calling the GetLastErrorCode() method after it returns.)

SaveAttachment Method (PDFVerify Class)

Saves a PDF attachment to a file.

Syntax

ANSI (Cross Platform)
int SaveAttachment(int iIndex, const char* lpszFileName);

Unicode (Windows)
INT SaveAttachment(INT iIndex, LPCWSTR lpszFileName);
int securepdf_pdfverify_saveattachment(void* lpObj, int iIndex, const char* lpszFileName);
int SaveAttachment(int iIndex, const QString& qsFileName);

Remarks

This method is used to retrieve the contents of an attachment from the document specified in InputFile, InputData, or SetInputStream and save it to the file specified by FileName. It does not modify the existence of the Attachments properties's contents.

The Index parameter is the index of the attachment in the Attachments properties to be saved.

The FileName parameter specifies the filename that the attachment will be saved to.

Example: component.InputFile = "input_with_attachment.pdf"; component.Open(); component.SaveAttachment(0, "a.dat"); component.Close(); Example (saving to a stream): component.InputFile = "input_with_attachment.pdf"; component.Attachments[0].OutputStream = myStream; component.SaveAttachment(0, null); // null means use the OutputStream field if it's set Note: If the document is not already opened, this method will open it, perform the operation, then close it.

Error Handling (C++)

This method returns a result code; 0 indicates success, while a non-zero error code indicates that this method encountered an error during its execution. If an error occurs, the GetLastError() method can be called to retrieve the associated error message. (Note: This method's result code can also be obtained by calling the GetLastErrorCode() method after it returns.)

SetInputStream Method (PDFVerify Class)

Sets the stream containing the PDF document to process.

Syntax

ANSI (Cross Platform)
int SetInputStream(SecurePDFStream* sInputStream);

Unicode (Windows)
INT SetInputStream(SecurePDFStream* sInputStream);
int securepdf_pdfverify_setinputstream(void* lpObj, SecurePDFStream* sInputStream);
int SetInputStream(SecurePDFStream* sInputStream);

Remarks

This method is used to set the stream from which the class will read the PDF document to be processed. If an input stream is set before the class attempts to perform operations on the document, the class will read the data from the input stream instead of from the InputFile or InputData properties.

Note: It may be useful to additionally set the CloseInputStreamAfterProcessing configuration setting to true when using input streams.

Error Handling (C++)

This method returns a result code; 0 indicates success, while a non-zero error code indicates that this method encountered an error during its execution. If an error occurs, the GetLastError() method can be called to retrieve the associated error message. (Note: This method's result code can also be obtained by calling the GetLastErrorCode() method after it returns.)

SetOutputStream Method (PDFVerify Class)

Sets the stream to write the processed document to.

Syntax

ANSI (Cross Platform)
int SetOutputStream(SecurePDFStream* sOutputStream);

Unicode (Windows)
INT SetOutputStream(SecurePDFStream* sOutputStream);
int securepdf_pdfverify_setoutputstream(void* lpObj, SecurePDFStream* sOutputStream);
int SetOutputStream(SecurePDFStream* sOutputStream);

Remarks

This method is used to set the stream to which the class will write the resulting PDF document. If an output stream is set before the class attempts to perform operations on the document, the class will write the data to the output stream instead of writing to OutputFile or populating OutputData.

Note: It may be useful to additionally set the CloseOutputStreamAfterProcessing configuration setting to true when using output streams.

Error Handling (C++)

This method returns a result code; 0 indicates success, while a non-zero error code indicates that this method encountered an error during its execution. If an error occurs, the GetLastError() method can be called to retrieve the associated error message. (Note: This method's result code can also be obtained by calling the GetLastErrorCode() method after it returns.)

Signed Method (PDFVerify Class)

Checks whether a PDF document is signed.

Syntax

ANSI (Cross Platform)
bool Signed();

Unicode (Windows)
bool Signed();
bool securepdf_pdfverify_signed(void* lpObj);
bool Signed();

Remarks

This method is used to determine whether or not the document specified in InputFile, InputData, or SetInputStream is signed. It will return false if the document contains only empty signature fields.

Example: pdfverify.InputFile = "input.pdf"; if (pdfverify.Signed()) { // Configure validation-related properties as desired pdfverify.Verify(); } Note: If the document is not already opened, this method will open it, perform the operation, then close it.

Error Handling (C++)

This method returns a Boolean value; after it returns, call the GetLastErrorCode() method to obtain its result code; 0 indicates success, while a non-zero error code indicates that this method encountered an error during its execution. If an error occurs, the GetLastError() method can be called to retrieve the associated error message.

Unsign Method (PDFVerify Class)

Removes a signature from a PDF document.

Syntax

ANSI (Cross Platform)
int Unsign(int iSignatureIndex, int iUnsignKind);

Unicode (Windows)
INT Unsign(INT iSignatureIndex, INT iUnsignKind);
int securepdf_pdfverify_unsign(void* lpObj, int iSignatureIndex, int iUnsignKind);
int Unsign(int iSignatureIndex, int iUnsignKind);

Remarks

This method is used to remove an existing signature specified by SignatureIndex from the document specified in InputFile, InputData, or SetInputStream. The document with the removed signature will be saved to OutputFile, OutputData, or the stream set in SetOutputStream.

The SignatureIndex parameter is the index of the signature in the Signatures properties to be removed.

The UnsignKind parameter specifies the kind of unsign to perform. Possible values are:

0 (uskFull) Remove the signature fully.
1 (uskKeepField) Remove the signature, but keep the form field it is in.
2 (uskKeepAppearance) Remove the signature, but keep the form field and its widget.

Example: pdfverify.InputFile = "signed.pdf"; pdfverify.OutputFile = "unsigned.pdf"; pdfverify.Open(); int idx = pdfverify.Signatures.Count - 1; pdfverify.Unsign(idx, 0); // uskFull pdfverify.Close(); Note that unsigning is different from GetSignedVersion. The latter returns the revision of the document including the mentioned signature (thus removing anything after that signature was created). Unsign removes the signature completely by carving it out of the document.

Note: SignatureIndex set to -1 removes all signatures in the document.

Note: If the document is not already opened, this method will open it, perform the operation, then close it.

Error Handling (C++)

This method returns a result code; 0 indicates success, while a non-zero error code indicates that this method encountered an error during its execution. If an error occurs, the GetLastError() method can be called to retrieve the associated error message. (Note: This method's result code can also be obtained by calling the GetLastErrorCode() method after it returns.)

Verify Method (PDFVerify Class)

Verifies a signed PDF document.

Syntax

ANSI (Cross Platform)
int Verify();

Unicode (Windows)
INT Verify();
int securepdf_pdfverify_verify(void* lpObj);
int Verify();

Remarks

This method is used to validate all signatures in the document specified in InputFile, InputData, or SetInputStream.

This method walks through the signed document and reports every signature via the SignatureInfo event. Subscribe to the event to be notified about the signatures and adjust validation settings on the fly.

Upon completion of this method, the signature details will be published in the Signatures property.

Example: pdfverify.InputFile = "signed.pdf"; pdfverify.Verify(); PDFSignature signature = pdfverify.Signatures[0]; if (signature.ValidationResult == SignatureValidationResults.svrValid) Console.WriteLine("Signature is good"); if (signature.ChainValidationResult == ChainValidationResults.cvrValid) Console.WriteLine("Chain is good"); This method only validates the signatures and does not check their coverage. It is a good idea to use mechanisms such as GetSignedVersion or CoverageEndsAt to ensure that the signature covers the expected document revision.

To control individual signature validation, subscribe to the SignatureInfo event and set the ValidateSignature and ValidateChain parameters accordingly. The results are reported via the SignatureProcessed event.

Use the following properties to adjust chain validation parameters:

Note: If the document is not already opened, this method will open it, perform the operation, then close it.

Error Handling (C++)

This method returns a result code; 0 indicates success, while a non-zero error code indicates that this method encountered an error during its execution. If an error occurs, the GetLastError() method can be called to retrieve the associated error message. (Note: This method's result code can also be obtained by calling the GetLastErrorCode() method after it returns.)

ChainCert Event (PDFVerify Class)

Fired when the class encounters a chain certificate.

Syntax

ANSI (Cross Platform)
virtual int FireChainCert(PDFVerifyChainCertEventParams *e);
typedef struct {
const char *CertEncoded; int lenCertEncoded;
const char *CertSubject;
const char *CertIssuer;
const char *ValidationTime;
int ValidationResult;
int ValidationDetails; int reserved; } PDFVerifyChainCertEventParams;
Unicode (Windows) virtual INT FireChainCert(PDFVerifyChainCertEventParams *e);
typedef struct {
LPCSTR CertEncoded; INT lenCertEncoded;
LPCWSTR CertSubject;
LPCWSTR CertIssuer;
LPCWSTR ValidationTime;
INT ValidationResult;
INT ValidationDetails; INT reserved; } PDFVerifyChainCertEventParams;
#define EID_PDFVERIFY_CHAINCERT 1

virtual INT SECUREPDF_CALL FireChainCert(LPSTR &lpCertEncoded, INT &lenCertEncoded, LPSTR &lpszCertSubject, LPSTR &lpszCertIssuer, LPSTR &lpszValidationTime, INT &iValidationResult, INT &iValidationDetails);
class PDFVerifyChainCertEventParams {
public:
  const QByteArray &CertEncoded();

  const QString &CertSubject();

  const QString &CertIssuer();

  const QString &ValidationTime();

  int ValidationResult();
  void SetValidationResult(int iValidationResult);

  int ValidationDetails();
  void SetValidationDetails(int iValidationDetails);

  int EventRetVal();
  void SetEventRetVal(int iRetVal);
};
// To handle, connect one or more slots to this signal. void ChainCert(PDFVerifyChainCertEventParams *e);
// Or, subclass PDFVerify and override this emitter function. virtual int FireChainCert(PDFVerifyChainCertEventParams *e) {...}

Remarks

This event is fired once for each certificate encountered during chain validation to report that it is about to be processed. The class will try to retrieve all required chain certificates automatically.

The CertEncoded parameter specifies the PEM (Base64-encoded) public certificate.

The CertSubject and CertIssuer parameters specify the distinguished names of the certificate owner and issuer respectively.

The ValidationTime parameter specifies the time point (in UTC) at which the certificate validity was established.

The ValidationResult parameter reports the outcome of the individual certificate validation and can be one of the following values:

0 (cvrUnknown - default) Certificate validity is unknown.
1 (cvrValid) The certificate is valid.
2 (cvrValidButUntrusted) The certificate is valid but not trusted.
3 (cvrInvalid) The certificate is not valid (it is revoked, expired, or contains an invalid signature).
4 (cvrCantBeEstablished) The validity of the certificate cannot be established because of missing or unavailable validation information (certificates, CRLs, or OCSP responses).

In the case of a failure, the ValidationDetails parameter provides more details on its reasons. Its value is a bitmask of the following flags:

0x001 (cvdRevoked) The certificate is revoked.
0x002 (cvdExpiredOrNotYetValid) The certificate is expired or not yet valid.
0x004 (cvdUnknownCA) A CA certificate for the certificate has not been found, is not trusted, or has a wrong public key (chain incomplete).
0x008 (cvdPolicyViolated) One of the CA certificates is not authorized to act as a CA, a mandatory key usage is not enabled, or a weak algorithm is used in the certificate.
0x010 (cvdRevocationCheckFailed) One or more CRLs or OCSP responses could not be verified.
0x020 (cvdBlocked) The certificate is blocked.
0x040 (cvdFailure) General validation failure.

Overridable Chain Validation

While the class will follow the validation rules defined by the X.509 standard to the best of its ability, minor technical issues may arise when validating the chain. The ValidationResult and ValidationDetails parameters can be overridden to relax such requirements on a per-certificate basis.

For example, set ValidationResult to cvrValid and ValidationDetails to 0 in order to:

  • Ignore CA or TLS key usage requirements
  • Ignore the AuthorityKeyId extension in certificate-issuing CAs (helps with incorrectly renewed certificates)
  • Ignore the Basic Constraints or Name Constraints extensions of CA certificates
  • Tolerate some weaker algorithms
  • Implicitly trust self-signed certificates
  • Skip validity period checks for trusted certificates (helps with older devices that have expired root certificates)
  • Ignore chain loops (helps with buggy CAs that include subchains that sign themselves)
Based on the adjusted validity of the certificate that is currently being processed, the class will continue or abort the chain validation procedure accordingly as if it had arrived at the chosen validation result itself.

Note: The user code is ultimately responsible for certificate validity decisions made via these two parameters. If their values are modified within this event, the resulting chain validation procedure may deviate from the standard.

DocumentInfo Event (PDFVerify Class)

Fired when the document has been loaded into memory.

Syntax

ANSI (Cross Platform)
virtual int FireDocumentInfo(PDFVerifyDocumentInfoEventParams *e);
typedef struct {
int PageCount;
int SignatureCount; int reserved; } PDFVerifyDocumentInfoEventParams;
Unicode (Windows) virtual INT FireDocumentInfo(PDFVerifyDocumentInfoEventParams *e);
typedef struct {
INT PageCount;
INT SignatureCount; INT reserved; } PDFVerifyDocumentInfoEventParams;
#define EID_PDFVERIFY_DOCUMENTINFO 2

virtual INT SECUREPDF_CALL FireDocumentInfo(INT &iPageCount, INT &iSignatureCount);
class PDFVerifyDocumentInfoEventParams {
public:
  int PageCount();

  int SignatureCount();

  int EventRetVal();
  void SetEventRetVal(int iRetVal);
};
// To handle, connect one or more slots to this signal. void DocumentInfo(PDFVerifyDocumentInfoEventParams *e);
// Or, subclass PDFVerify and override this emitter function. virtual int FireDocumentInfo(PDFVerifyDocumentInfoEventParams *e) {...}

Remarks

This event is fired once per document processing routine to report that the document has been processed and loaded into memory.

The handler for this event is a good place to check the document structure and access document-related information such as page number and document file details. These may be useful when preparing the signature. For example, the GetPageProperty method can be used to find the optimal position for the signature widget.

The PageCount parameter reports the number of pages in the document.

The SignatureCount parameter reports the number of signatures in the document.

This event is fired when the Open method is called, but only after Password or RecipientInfo is fired (if applicable) and the document has been decrypted.

Error Event (PDFVerify Class)

Fired when information is available about errors during data delivery.

Syntax

ANSI (Cross Platform)
virtual int FireError(PDFVerifyErrorEventParams *e);
typedef struct {
int ErrorCode;
const char *Description; int reserved; } PDFVerifyErrorEventParams;
Unicode (Windows) virtual INT FireError(PDFVerifyErrorEventParams *e);
typedef struct {
INT ErrorCode;
LPCWSTR Description; INT reserved; } PDFVerifyErrorEventParams;
#define EID_PDFVERIFY_ERROR 3

virtual INT SECUREPDF_CALL FireError(INT &iErrorCode, LPSTR &lpszDescription);
class PDFVerifyErrorEventParams {
public:
  int ErrorCode();

  const QString &Description();

  int EventRetVal();
  void SetEventRetVal(int iRetVal);
};
// To handle, connect one or more slots to this signal. void Error(PDFVerifyErrorEventParams *e);
// Or, subclass PDFVerify and override this emitter function. virtual int FireError(PDFVerifyErrorEventParams *e) {...}

Remarks

The Error event is fired in case of exceptional conditions during message processing. Normally the class fails with an error.

The ErrorCode parameter contains an error code, and the Description parameter contains a textual description of the error. For a list of valid error codes and their descriptions, please refer to the Error Codes section.

Log Event (PDFVerify Class)

Fired once for each log message.

Syntax

ANSI (Cross Platform)
virtual int FireLog(PDFVerifyLogEventParams *e);
typedef struct {
int LogLevel;
const char *Message;
const char *LogType; int reserved; } PDFVerifyLogEventParams;
Unicode (Windows) virtual INT FireLog(PDFVerifyLogEventParams *e);
typedef struct {
INT LogLevel;
LPCWSTR Message;
LPCWSTR LogType; INT reserved; } PDFVerifyLogEventParams;
#define EID_PDFVERIFY_LOG 4

virtual INT SECUREPDF_CALL FireLog(INT &iLogLevel, LPSTR &lpszMessage, LPSTR &lpszLogType);
class PDFVerifyLogEventParams {
public:
  int LogLevel();

  const QString &Message();

  const QString &LogType();

  int EventRetVal();
  void SetEventRetVal(int iRetVal);
};
// To handle, connect one or more slots to this signal. void Log(PDFVerifyLogEventParams *e);
// Or, subclass PDFVerify and override this emitter function. virtual int FireLog(PDFVerifyLogEventParams *e) {...}

Remarks

This event is fired once for each log message generated by the class. The verbosity is controlled by the LogLevel configuration setting.

The LogLevel parameter indicates the detail level of the message. Possible values are:

0 (None) No messages are logged.
1 (Info - default) Informational events such as the basics of the chain validation procedure are logged.
2 (Verbose) Detailed data such as HTTP requests are logged.
3 (Debug) Debug data including the full chain validation procedure are logged.

The Message parameter is the log message.

The LogType parameter identifies the type of log entry. Possible values are:

  • CertValidator
  • Font
  • HTTP
  • PDFInvalidSignature
  • PDFRevocationInfo
  • Timestamp
  • TSL

Password Event (PDFVerify Class)

Fired when the class detects that the PDF document is encrypted with a password.

Syntax

ANSI (Cross Platform)
virtual int FirePassword(PDFVerifyPasswordEventParams *e);
typedef struct {
int Available;
int Cancel; int reserved; } PDFVerifyPasswordEventParams;
Unicode (Windows) virtual INT FirePassword(PDFVerifyPasswordEventParams *e);
typedef struct {
BOOL Available;
BOOL Cancel; INT reserved; } PDFVerifyPasswordEventParams;
#define EID_PDFVERIFY_PASSWORD 5

virtual INT SECUREPDF_CALL FirePassword(BOOL &bAvailable, BOOL &bCancel);
class PDFVerifyPasswordEventParams {
public:
  bool Available();

  bool Cancel();
  void SetCancel(bool bCancel);

  int EventRetVal();
  void SetEventRetVal(int iRetVal);
};
// To handle, connect one or more slots to this signal. void Password(PDFVerifyPasswordEventParams *e);
// Or, subclass PDFVerify and override this emitter function. virtual int FirePassword(PDFVerifyPasswordEventParams *e) {...}

Remarks

This event is fired during document processing to report that the document is encrypted with a password. It may be used to supply the correct decryption password to the Password property.

The Available parameter indicates whether the decryption password is already available to the class or still needs to be set. If this parameter is set to false, the correct password must be provided for the decryption attempt to succeed.

The Cancel parameter determines whether the class will stop firing this event to request a password.

RecipientInfo Event (PDFVerify Class)

Fired for each recipient certificate of the encrypted PDF document.

Syntax

ANSI (Cross Platform)
virtual int FireRecipientInfo(PDFVerifyRecipientInfoEventParams *e);
typedef struct {
const char *Issuer;
const char *SerialNumber;
const char *SubjectKeyIdentifier;
int Available;
int Cancel; int reserved; } PDFVerifyRecipientInfoEventParams;
Unicode (Windows) virtual INT FireRecipientInfo(PDFVerifyRecipientInfoEventParams *e);
typedef struct {
LPCWSTR Issuer;
LPCWSTR SerialNumber;
LPCWSTR SubjectKeyIdentifier;
BOOL Available;
BOOL Cancel; INT reserved; } PDFVerifyRecipientInfoEventParams;
#define EID_PDFVERIFY_RECIPIENTINFO 6

virtual INT SECUREPDF_CALL FireRecipientInfo(LPSTR &lpszIssuer, LPSTR &lpszSerialNumber, LPSTR &lpszSubjectKeyIdentifier, BOOL &bAvailable, BOOL &bCancel);
class PDFVerifyRecipientInfoEventParams {
public:
  const QString &Issuer();

  const QString &SerialNumber();

  const QString &SubjectKeyIdentifier();

  bool Available();

  bool Cancel();
  void SetCancel(bool bCancel);

  int EventRetVal();
  void SetEventRetVal(int iRetVal);
};
// To handle, connect one or more slots to this signal. void RecipientInfo(PDFVerifyRecipientInfoEventParams *e);
// Or, subclass PDFVerify and override this emitter function. virtual int FireRecipientInfo(PDFVerifyRecipientInfoEventParams *e) {...}

Remarks

This event is fired during document processing for each recipient certificate that the document has been encrypted for (if applicable). It may be used to identify the certificate(s) to load and supply to the DecryptionCert property.

The Issuer parameter specifies the subject of the issuer certificate.

The SerialNumber parameter specifies the serial number of the encryption certificate.

The SubjectKeyIdentifier parameter specifies the X.509 subjectKeyIdentifier extension value of the encryption certificate, encoded as a hex string.

The Available parameter indicates whether the decryption certificate is already available to the class or still needs to be set. If this parameter is set to false, the correct certificate must be provided for the decryption attempt to succeed.

The Cancel parameter determines whether the class will stop firing this event to request a certificate.

Note: The document may be encrypted with more than one certificate (or have "more than one recipient"), in which case each certificate will cause its own invocation of this event.

SignatureInfo Event (PDFVerify Class)

Fired when the class finds a signature in the document.

Syntax

ANSI (Cross Platform)
virtual int FireSignatureInfo(PDFVerifySignatureInfoEventParams *e);
typedef struct {
int SignatureIndex;
int ValidateSignature;
int ValidateChain; int reserved; } PDFVerifySignatureInfoEventParams;
Unicode (Windows) virtual INT FireSignatureInfo(PDFVerifySignatureInfoEventParams *e);
typedef struct {
INT SignatureIndex;
BOOL ValidateSignature;
BOOL ValidateChain; INT reserved; } PDFVerifySignatureInfoEventParams;
#define EID_PDFVERIFY_SIGNATUREINFO 7

virtual INT SECUREPDF_CALL FireSignatureInfo(INT &iSignatureIndex, BOOL &bValidateSignature, BOOL &bValidateChain);
class PDFVerifySignatureInfoEventParams {
public:
  int SignatureIndex();

  bool ValidateSignature();
  void SetValidateSignature(bool bValidateSignature);

  bool ValidateChain();
  void SetValidateChain(bool bValidateChain);

  int EventRetVal();
  void SetEventRetVal(int iRetVal);
};
// To handle, connect one or more slots to this signal. void SignatureInfo(PDFVerifySignatureInfoEventParams *e);
// Or, subclass PDFVerify and override this emitter function. virtual int FireSignatureInfo(PDFVerifySignatureInfoEventParams *e) {...}

Remarks

This event is fired once for each signature found in the document to report that the signature specified by SignatureIndex is about to be validated.

The SignatureIndex parameter is the index of the signature in the Signatures properties.

Signature validation consists of two independent stages: cryptographic signature validation and chain validation. The ValidateSignature and ValidateChain parameters determine whether each stage should be included in the validation. They can be overridden to modify the validation policy on a per-signature basis, allowing signatures to be verified individually instead of all at once (via Verify). To skip validation entirely, set both parameters to false.

Use the following properties to adjust chain validation parameters:

SignatureProcessed Event (PDFVerify Class)

Fired after a signature has been processed.

Syntax

ANSI (Cross Platform)
virtual int FireSignatureProcessed(PDFVerifySignatureProcessedEventParams *e);
typedef struct {
int SignatureIndex;
int SignatureValidationResult;
int ChainValidationResult;
int ChainValidationDetails; int reserved; } PDFVerifySignatureProcessedEventParams;
Unicode (Windows) virtual INT FireSignatureProcessed(PDFVerifySignatureProcessedEventParams *e);
typedef struct {
INT SignatureIndex;
INT SignatureValidationResult;
INT ChainValidationResult;
INT ChainValidationDetails; INT reserved; } PDFVerifySignatureProcessedEventParams;
#define EID_PDFVERIFY_SIGNATUREPROCESSED 8

virtual INT SECUREPDF_CALL FireSignatureProcessed(INT &iSignatureIndex, INT &iSignatureValidationResult, INT &iChainValidationResult, INT &iChainValidationDetails);
class PDFVerifySignatureProcessedEventParams {
public:
  int SignatureIndex();

  int SignatureValidationResult();

  int ChainValidationResult();

  int ChainValidationDetails();

  int EventRetVal();
  void SetEventRetVal(int iRetVal);
};
// To handle, connect one or more slots to this signal. void SignatureProcessed(PDFVerifySignatureProcessedEventParams *e);
// Or, subclass PDFVerify and override this emitter function. virtual int FireSignatureProcessed(PDFVerifySignatureProcessedEventParams *e) {...}

Remarks

This event is fired once for each signature found in the document to report that the signature specified by SignatureIndex has completed validation. It is fired after SignatureInfo if that event's ValidateSignature parameter is set to true.

The SignatureIndex parameter is the index of the signature in the Signatures properties.

Signature validation consists of two independent stages: cryptographic signature validation and chain validation. Separate validation results are reported for each in the SignatureValidationResult and ChainValidationResult parameters.

The former reports the validity of the signature and can be one of the following values:

0 (svrUnknown - default) Signature validity is unknown.
1 (svrValid) The signature is valid.
2 (svrCorrupted) The signature is corrupted.
3 (svrSignerNotFound) Failed to acquire the signing certificate. The signature cannot be validated.
4 (svrFailure) General failure.

The latter reports the validity of the chain and can be one of the following values:

0 (cvrUnknown - default) Chain validity is unknown.
1 (cvrValid) The chain is valid.
2 (cvrValidButUntrusted) The chain is valid, but the root certificate is not trusted.
3 (cvrInvalid) The chain is not valid (some of the certificates are revoked, expired, or contain an invalid signature).
4 (cvrCantBeEstablished) The validity of the chain cannot be established because of missing or unavailable validation information (certificates, CRLs, or OCSP responses).

In the case of a failure, the ChainValidationDetails parameter provides more details on its reasons. Its value is a bitmask of the following flags:

0x001 (cvdRevoked) One or more certificates are revoked.
0x002 (cvdExpiredOrNotYetValid) One or more certificates are expired or not yet valid.
0x004 (cvdUnknownCA) A CA certificate for one or more certificates has not been found, is not trusted, or has a wrong public key (chain incomplete).
0x008 (cvdPolicyViolated) One of the CA certificates is not authorized to act as a CA, a mandatory key usage is not enabled in one of the chain certificates, or a weak algorithm is used in one of the certificates or revocation elements.
0x010 (cvdRevocationCheckFailed) One or more CRLs or OCSP responses could not be verified.
0x020 (cvdBlocked) One or more certificates are blocked.
0x040 (cvdFailure) General validation failure.

Note: SignatureValidationResult, ChainValidationResult, and ChainValidationDetails are also available as fields in the PDFSignature type.

SSLServerAuthentication Event (PDFVerify Class)

Fired after the server presents its certificate to the client.

Syntax

ANSI (Cross Platform)
virtual int FireSSLServerAuthentication(PDFVerifySSLServerAuthenticationEventParams *e);
typedef struct {
const char *CertEncoded; int lenCertEncoded;
const char *CertSubject;
const char *CertIssuer;
const char *Status;
int Accept; int reserved; } PDFVerifySSLServerAuthenticationEventParams;
Unicode (Windows) virtual INT FireSSLServerAuthentication(PDFVerifySSLServerAuthenticationEventParams *e);
typedef struct {
LPCSTR CertEncoded; INT lenCertEncoded;
LPCWSTR CertSubject;
LPCWSTR CertIssuer;
LPCWSTR Status;
BOOL Accept; INT reserved; } PDFVerifySSLServerAuthenticationEventParams;
#define EID_PDFVERIFY_SSLSERVERAUTHENTICATION 9

virtual INT SECUREPDF_CALL FireSSLServerAuthentication(LPSTR &lpCertEncoded, INT &lenCertEncoded, LPSTR &lpszCertSubject, LPSTR &lpszCertIssuer, LPSTR &lpszStatus, BOOL &bAccept);
class PDFVerifySSLServerAuthenticationEventParams {
public:
  const QByteArray &CertEncoded();

  const QString &CertSubject();

  const QString &CertIssuer();

  const QString &Status();

  bool Accept();
  void SetAccept(bool bAccept);

  int EventRetVal();
  void SetEventRetVal(int iRetVal);
};
// To handle, connect one or more slots to this signal. void SSLServerAuthentication(PDFVerifySSLServerAuthenticationEventParams *e);
// Or, subclass PDFVerify and override this emitter function. virtual int FireSSLServerAuthentication(PDFVerifySSLServerAuthenticationEventParams *e) {...}

Remarks

This event is fired during timestamping or chain validation after the server presents its SSL/TLS certificate to the class. It only applies if the TSA, CRL, OCSP, or Trusted List endpoint operates over HTTPS.

During this event, the client can decide whether or not to continue with the connection process. The Accept parameter is a recommendation on whether to continue or close the connection. This is just a suggestion: application software must use its own logic to determine whether or not to continue.

When the Accept parameter is false, the Status parameter shows why the verification failed (otherwise, Status contains the string OK). If it is decided to continue, you can override and accept the certificate by setting the Accept parameter to true.

SSLStatus Event (PDFVerify Class)

Fired when secure connection progress messages are available.

Syntax

ANSI (Cross Platform)
virtual int FireSSLStatus(PDFVerifySSLStatusEventParams *e);
typedef struct {
const char *Message; int reserved; } PDFVerifySSLStatusEventParams;
Unicode (Windows) virtual INT FireSSLStatus(PDFVerifySSLStatusEventParams *e);
typedef struct {
LPCWSTR Message; INT reserved; } PDFVerifySSLStatusEventParams;
#define EID_PDFVERIFY_SSLSTATUS 10

virtual INT SECUREPDF_CALL FireSSLStatus(LPSTR &lpszMessage);
class PDFVerifySSLStatusEventParams {
public:
  const QString &Message();

  int EventRetVal();
  void SetEventRetVal(int iRetVal);
};
// To handle, connect one or more slots to this signal. void SSLStatus(PDFVerifySSLStatusEventParams *e);
// Or, subclass PDFVerify and override this emitter function. virtual int FireSSLStatus(PDFVerifySSLStatusEventParams *e) {...}

Remarks

This event is fired during timestamping or chain validation for informational and logging purposes only. This event tracks the progress of the SSL/TLS connection. It only applies if the TSA, CRL, OCSP, or Trusted List endpoint operates over HTTPS.

Certificate Type

This is the digital certificate being used.

Syntax

SecurePDFCertificate (declared in securepdf.h)

Remarks

This type describes the current digital certificate. The certificate may be a public or private key. The fields are used to identify or select certificates.

The following fields are available:

Fields

EffectiveDate
char* (read-only)

Default Value: ""

The date on which this certificate becomes valid. Before this date, it is not valid. The date is localized to the system's time zone. The following example illustrates the format of an encoded date:

23-Jan-2000 15:00:00.

ExpirationDate
char* (read-only)

Default Value: ""

The date on which the certificate expires. After this date, the certificate will no longer be valid. The date is localized to the system's time zone. The following example illustrates the format of an encoded date:

23-Jan-2001 15:00:00.

ExtendedKeyUsage
char* (read-only)

Default Value: ""

A comma-delimited list of extended key usage identifiers. These are the same as ASN.1 object identifiers (OIDs).

Fingerprint
char* (read-only)

Default Value: ""

The hex-encoded, 16-byte MD5 fingerprint of the certificate. This property is primarily used for keys which do not have a corresponding X.509 public certificate, such as PEM keys that only contain a private key. It is commonly used for SSH keys.

The following example illustrates the format: bc:2a:72:af:fe:58:17:43:7a:5f:ba:5a:7c:90:f7:02

FingerprintSHA1
char* (read-only)

Default Value: ""

The hex-encoded, 20-byte SHA-1 fingerprint of the certificate. This property is primarily used for keys which do not have a corresponding X.509 public certificate, such as PEM keys that only contain a private key. It is commonly used for SSH keys.

The following example illustrates the format: 30:7b:fa:38:65:83:ff:da:b4:4e:07:3f:17:b8:a4:ed:80:be:ff:84

FingerprintSHA256
char* (read-only)

Default Value: ""

The hex-encoded, 32-byte SHA-256 fingerprint of the certificate. This property is primarily used for keys which do not have a corresponding X.509 public certificate, such as PEM keys that only contain a private key. It is commonly used for SSH keys.

The following example illustrates the format: 6a:80:5c:33:a9:43:ea:b0:96:12:8a:64:96:30:ef:4a:8a:96:86:ce:f4:c7:be:10:24:8e:2b:60:9e:f3:59:53

Issuer
char* (read-only)

Default Value: ""

The issuer of the certificate. This field contains a string representation of the name of the issuing authority for the certificate.

PrivateKey
char* (read-only)

Default Value: ""

The private key of the certificate (if available). The key is provided as PEM/Base64-encoded data.

Note: The PrivateKey may be available but not exportable. In this case, PrivateKey returns an empty string.

PrivateKeyAvailable
int (read-only)

Default Value: FALSE

Whether a PrivateKey is available for the selected certificate. If PrivateKeyAvailable is True, the certificate may be used for authentication purposes (e.g., server authentication).

PrivateKeyContainer
char* (read-only)

Default Value: ""

The name of the PrivateKey container for the certificate (if available). This functionality is available only on Windows platforms.

PublicKey
char* (read-only)

Default Value: ""

The public key of the certificate. The key is provided as PEM/Base64-encoded data.

PublicKeyAlgorithm
char* (read-only)

Default Value: ""

The textual description of the certificate's public key algorithm. The property contains either the name of the algorithm (e.g., "RSA" or "RSA_DH") or an object identifier (OID) string representing the algorithm.

PublicKeyLength
int (read-only)

Default Value: 0

The length of the certificate's public key (in bits). Common values are 512, 1024, and 2048.

SerialNumber
char* (read-only)

Default Value: ""

The serial number of the certificate encoded as a string. The number is encoded as a series of hexadecimal digits, with each pair representing a byte of the serial number.

SignatureAlgorithm
char* (read-only)

Default Value: ""

The text description of the certificate's signature algorithm. The property contains either the name of the algorithm (e.g., "RSA" or "RSA_MD5RSA") or an object identifier (OID) string representing the algorithm.

Store
char*

Default Value: "MY"

The name of the certificate store for the client certificate.

The StoreType field denotes the type of the certificate store specified by Store. If the store is password-protected, specify the password in StorePassword.

Store is used in conjunction with the Subject field to specify client certificates. If Store has a value, and Subject or Encoded is set, a search for a certificate is initiated. Please see the Subject field for details.

Designations of certificate stores are platform dependent.

The following designations are the most common User and Machine certificate stores in Windows:

MYA certificate store holding personal certificates with their associated private keys.
CACertifying authority certificates.
ROOTRoot certificates.

When the certificate store type is cstPFXFile, this property must be set to the name of the file. When the type is cstPFXBlob, the property must be set to the binary contents of a PFX file (i.e., PKCS#12 certificate store).

StorePassword
char*

Default Value: ""

If the type of certificate store requires a password, this field is used to specify the password needed to open the certificate store.

StoreType
int

Default Value: 0

The type of certificate store for this certificate.

The class supports both public and private keys in a variety of formats. When the cstAuto value is used, the class will automatically determine the type. This field can take one of the following values:

0 (cstUser - default)For Windows, this specifies that the certificate store is a certificate store owned by the current user.

Note: This store type is not available in Java.

1 (cstMachine)For Windows, this specifies that the certificate store is a machine store.

Note: This store type is not available in Java.

2 (cstPFXFile)The certificate store is the name of a PFX (PKCS#12) file containing certificates.
3 (cstPFXBlob)The certificate store is a string (binary or Base64-encoded) representing a certificate store in PFX (PKCS#12) format.
4 (cstJKSFile)The certificate store is the name of a Java Key Store (JKS) file containing certificates.

Note: This store type is only available in Java.

5 (cstJKSBlob)The certificate store is a string (binary or Base64-encoded) representing a certificate store in Java Key Store (JKS) format.

Note: This store type is only available in Java.

6 (cstPEMKeyFile)The certificate store is the name of a PEM-encoded file that contains a private key and an optional certificate.
7 (cstPEMKeyBlob)The certificate store is a string (binary or Base64-encoded) that contains a private key and an optional certificate.
8 (cstPublicKeyFile)The certificate store is the name of a file that contains a PEM- or DER-encoded public key certificate.
9 (cstPublicKeyBlob)The certificate store is a string (binary or Base64-encoded) that contains a PEM- or DER-encoded public key certificate.
10 (cstSSHPublicKeyBlob)The certificate store is a string (binary or Base64-encoded) that contains an SSH-style public key.
11 (cstP7BFile)The certificate store is the name of a PKCS#7 file containing certificates.
12 (cstP7BBlob)The certificate store is a string (binary) representing a certificate store in PKCS#7 format.
13 (cstSSHPublicKeyFile)The certificate store is the name of a file that contains an SSH-style public key.
14 (cstPPKFile)The certificate store is the name of a file that contains a PPK (PuTTY Private Key).
15 (cstPPKBlob)The certificate store is a string (binary) that contains a PPK (PuTTY Private Key).
16 (cstXMLFile)The certificate store is the name of a file that contains a certificate in XML format.
17 (cstXMLBlob)The certificate store is a string that contains a certificate in XML format.
18 (cstJWKFile)The certificate store is the name of a file that contains a JWK (JSON Web Key).
19 (cstJWKBlob)The certificate store is a string that contains a JWK (JSON Web Key).
21 (cstBCFKSFile)The certificate store is the name of a file that contains a BCFKS (Bouncy Castle FIPS Key Store).

Note: This store type is only available in Java and .NET.

22 (cstBCFKSBlob)The certificate store is a string (binary or Base64-encoded) representing a certificate store in BCFKS (Bouncy Castle FIPS Key Store) format.

Note: This store type is only available in Java and .NET.

23 (cstPKCS11)The certificate is present on a physical security key accessible via a PKCS#11 interface.

To use a security key, the necessary data must first be collected using the CertMgr class. The ListStoreCertificates method may be called after setting CertStoreType to cstPKCS11, CertStorePassword to the PIN, and CertStore to the full path of the PKCS#11 DLL. The certificate information returned in the CertList event's CertEncoded parameter may be saved for later use.

When using a certificate, pass the previously saved security key information as the Store and set StorePassword to the PIN.

Code Example. SSH Authentication with Security Key: certmgr.CertStoreType = CertStoreTypes.cstPKCS11; certmgr.OnCertList += (s, e) => { secKeyBlob = e.CertEncoded; }; certmgr.CertStore = @"C:\Program Files\OpenSC Project\OpenSC\pkcs11\opensc-pkcs11.dll"; certmgr.CertStorePassword = "123456"; //PIN certmgr.ListStoreCertificates(); sftp.SSHCert = new Certificate(CertStoreTypes.cstPKCS11, secKeyBlob, "123456", "*"); sftp.SSHUser = "test"; sftp.SSHLogon("myhost", 22);

99 (cstAuto)The store type is automatically detected from the input data. This setting may be used with both public and private keys and can detect any of the supported formats automatically.

SubjectAltNames
char* (read-only)

Default Value: ""

Comma-separated lists of alternative subject names for the certificate.

ThumbprintMD5
char* (read-only)

Default Value: ""

The MD5 hash of the certificate. It is primarily used for X.509 certificates. If the hash does not already exist, it is automatically computed.

ThumbprintSHA1
char* (read-only)

Default Value: ""

The SHA-1 hash of the certificate. It is primarily used for X.509 certificates. If the hash does not already exist, it is automatically computed.

ThumbprintSHA256
char* (read-only)

Default Value: ""

The SHA-256 hash of the certificate. It is primarily used for X.509 certificates. If the hash does not already exist, it is automatically computed.

Usage
char* (read-only)

Default Value: ""

The text description of UsageFlags.

This value will be one or more of the following strings and will be separated by commas:

  • Digital Signature
  • Non-Repudiation
  • Key Encipherment
  • Data Encipherment
  • Key Agreement
  • Certificate Signing
  • CRL Signing
  • Encipher Only

If the provider is OpenSSL, the value is a comma-separated list of X.509 certificate extension names.

UsageFlags
int (read-only)

Default Value: 0

The flags that show intended use for the certificate. The value of UsageFlags is a combination of the following flags:

0x80Digital Signature
0x40Non-Repudiation
0x20Key Encipherment
0x10Data Encipherment
0x08Key Agreement
0x04Certificate Signing
0x02CRL Signing
0x01Encipher Only

Please see the Usage field for a text representation of UsageFlags.

This functionality currently is not available when the provider is OpenSSL.

Version
char* (read-only)

Default Value: ""

The certificate's version number. The possible values are the strings "V1", "V2", and "V3".

Subject
char*

Default Value: ""

The subject of the certificate used for client authentication.

This property must be set after all other certificate properties are set. When this property is set, a search is performed in the current certificate store to locate a certificate with a matching subject.

If a matching certificate is found, the field is set to the full subject of the matching certificate.

If an exact match is not found, the store is searched for subjects containing the value of the property.

If a match is still not found, the property is set to an empty string, and no certificate is selected.

The special value "*" picks a random certificate in the certificate store.

The certificate subject is a comma-separated list of distinguished name fields and values. For instance, "CN=www.server.com, OU=test, C=US, E=support@nsoftware.com". Common fields and their meanings are as follows:

FieldMeaning
CNCommon Name. This is commonly a hostname like www.server.com.
OOrganization
OUOrganizational Unit
LLocality
SState
CCountry
EEmail Address

If a field value contains a comma, it must be quoted.

Encoded
char*

Default Value: ""

The certificate (PEM/Base64 encoded). This field is used to assign a specific certificate. The Store and Subject fields also may be used to specify a certificate.

When Encoded is set, a search is initiated in the current Store for the private key of the certificate. If the key is found, Subject is updated to reflect the full subject of the selected certificate; otherwise, Subject is set to an empty string.

Constructors

Certificate()

Creates a instance whose properties can be set. This is useful for use with when generating new certificates.

Certificate(const char* lpEncoded, int lenEncoded)

Parses Encoded as an X.509 public key.

Certificate(int iStoreType, const char* lpStore, int lenStore, const char* lpszStorePassword, const char* lpszSubject)

StoreType identifies the type of certificate store to use. See for descriptions of the different certificate stores. Store is a byte array containing the certificate data. StorePassword is the password used to protect the store.

After the store has been successfully opened, the component will attempt to find the certificate identified by Subject . This can be either a complete or a substring match of the X.509 certificate's subject Distinguished Name (DN). The Subject parameter can also take an MD5, SHA-1, or SHA-256 thumbprint of the certificate to load in a "Thumbprint=value" format.

Firewall Type

The firewall the component will connect through.

Syntax

SecurePDFFirewall (declared in securepdf.h)

Remarks

When connecting through a firewall, this type is used to specify different properties of the firewall, such as the firewall Host and the FirewallType.

The following fields are available:

Fields

AutoDetect
int

Default Value: FALSE

Whether to automatically detect and use firewall system settings, if available.

FirewallType
int

Default Value: 0

The type of firewall to connect through. The applicable values are as follows:

fwNone (0)No firewall (default setting).
fwTunnel (1)Connect through a tunneling proxy. Port is set to 80.
fwSOCKS4 (2)Connect through a SOCKS4 Proxy. Port is set to 1080.
fwSOCKS5 (3)Connect through a SOCKS5 Proxy. Port is set to 1080.
fwSOCKS4A (10)Connect through a SOCKS4A Proxy. Port is set to 1080.

Host
char*

Default Value: ""

The name or IP address of the firewall (optional). If a Host is given, the requested connections will be authenticated through the specified firewall when connecting.

If this field is set to a Domain Name, a DNS request is initiated. Upon successful termination of the request, this field is set to the corresponding address. If the search is not successful, the class fails with an error.

Password
char*

Default Value: ""

A password if authentication is to be used when connecting through the firewall. If Host is specified, the User and Password fields are used to connect and authenticate to the given firewall. If the authentication fails, the class fails with an error.

Port
int

Default Value: 0

The Transmission Control Protocol (TCP) port for the firewall Host. See the description of the Host field for details.

Note: This field is set automatically when FirewallType is set to a valid value. See the description of the FirewallType field for details.

User
char*

Default Value: ""

A username if authentication is to be used when connecting through a firewall. If Host is specified, this field and the Password field are used to connect and authenticate to the given Firewall. If the authentication fails, the class fails with an error.

Constructors

Firewall()

PDFAttachment Type

This describes the file being attached to the PDF document.

Syntax

SecurePDFPDFAttachment (declared in securepdf.h)

Remarks

This type contains information about the file that is being attached to the document.

The following fields are available:

Fields

ContentType
char*

Default Value: ""

The content type of the attachment.

CreationDate
char*

Default Value: ""

The creation date of the attachment.

Data
char*

Default Value: ""

The raw data of the attachment.

If OutputStream is not set to a valid stream, the class will write to this field when an empty string is passed to the SaveAttachment method.

Description
char*

Default Value: ""

A textual description of the attachment.

FileName
char*

Default Value: ""

The path and filename of the attachment.

ModificationDate
char*

Default Value: ""

The date and time of the file's last modification.

Name
char*

Default Value: ""

The name of the attachment.

Size
int64 (read-only)

Default Value: 0

The attachment's size in bytes.

Constructors

PDFAttachment()
PDFAttachment(const char* lpszFileName)
PDFAttachment(const char* lpszFileName, const char* lpszDescription)
PDFAttachment(const char* lpData, int lenData, const char* lpszName, const char* lpszDescription)

PDFSignature Type

A container for PDF signature details.

Syntax

SecurePDFPDFSignature (declared in securepdf.h)

Remarks

This type contains details about the signature. Use it to read information about the signature when processing it.

The following fields are available:

Fields

AuthorName
char* (read-only)

Default Value: ""

The human-readable name of the signer.

ChainValidationDetails
int (read-only)

Default Value: 0

The details of the certificate chain validation outcome. They may often suggest the reasons that contributed to the overall validation result in ChainValidationResult.

The value of this field is a bitmask of the following flags:

0x001 (cvdRevoked) One or more certificates are revoked.
0x002 (cvdExpiredOrNotYetValid) One or more certificates are expired or not yet valid.
0x004 (cvdUnknownCA) A CA certificate for one or more certificates has not been found, is not trusted, or has a wrong public key (chain incomplete).
0x008 (cvdPolicyViolated) One of the CA certificates is not authorized to act as a CA, a mandatory key usage is not enabled in one of the chain certificates, or a weak algorithm is used in one of the certificates or revocation elements.
0x010 (cvdRevocationCheckFailed) One or more CRLs or OCSP responses could not be verified.
0x020 (cvdBlocked) One or more certificates are blocked.
0x040 (cvdFailure) General validation failure.

Subscribe to the Log event to access the detailed validation log. This field is also available as a parameter of the SignatureProcessed event.

ChainValidationResult
int (read-only)

Default Value: 0

The outcome of the certificate chain validation routine.

Possible values are:

0 (cvrUnknown - default) Chain validity is unknown.
1 (cvrValid) The chain is valid.
2 (cvrValidButUntrusted) The chain is valid, but the root certificate is not trusted.
3 (cvrInvalid) The chain is not valid (some of the certificates are revoked, expired, or contain an invalid signature).
4 (cvrCantBeEstablished) The validity of the chain cannot be established because of missing or unavailable validation information (certificates, CRLs, or OCSP responses).

Subscribe to the Log event to access the detailed validation log. This field is also available as a parameter of the SignatureProcessed event.

ClaimedSigningTime
char* (read-only)

Default Value: ""

The signature's creation time in UTC.

Use this field to get the signature creation time from the signer's computer. Note that the claimed time, unlike ValidatedSigningTime, does not originate from a trusted TSA and may be forfeited or wrong.

CoverageEndsAt
int (read-only)

Default Value: 0

The offset in the PDF file where the signature coverage ends.

PDF generators often use incremental updates to make changes in documents. This may result in the signature only covering a part of the document (one of the past revisions), but not the subsequent changes.

Use this field to identify the offset where the signature coverage ends. One option is to compare it to the length of the whole document to ensure that the signature covers the entire document. Alternatively, use the GetSignedVersion method to extract the exact revision that was signed.

HashAlgorithm
char* (read-only)

Default Value: "SHA256"

The hash algorithm that was used for signing.

Possible values are:

  • SHA1
  • SHA224
  • SHA256
  • SHA384
  • SHA512
  • MD5

Profile
int (read-only)

Default Value: 0

The pre-defined PAdES profile that was applied when creating the signature, as defined by ETSI.

Advanced signatures come in many variants, and they are often defined by parties that need to process them or by local standards. Profiles are sets of pre-defined configurations that correspond to particular signature variants.

Possible values are:

0 (pfNone - default) No profile
1 (pfBaselineB) PAdES B-B profile
2 (pfBaselineT) PAdES B-T profile
3 (pfBaselineLT) PAdES B-LT profile
4 (pfBaselineLTA) PAdES B-LTA profile

Note that when verifying a signature, the LTV modifier may be affected by the validation settings. These include OfflineMode (set it to true to obtain the clean LTV capability) and CacheRevocationInfo (set it to false to prevent earlier validations from affecting the current validation).

Reason
char* (read-only)

Default Value: ""

The reason for signing.

SignatureType
int (read-only)

Default Value: 0

The type of the signature that was created.

Possible values are:

0 (stLegacy - default) Legacy Adobe signature (adbe.pkcs7.detached)
1 (stAdvanced) PAdES-compliant signature (ETSI.CAdES.detached)
2 (stDTS) Document timestamp (ETSI.RFC3161)
3 (stEmptyField) Empty signature field (signature placeholder)

SignerCertIndex
int (read-only)

Default Value: -1

The index of the signer certificate in the DocumentCerts properties.

TimestampCertIndex
int (read-only)

Default Value: -1

The index of the timestamping certificate in the DocumentCerts properties (if applicable).

Timestamped
int (read-only)

Default Value: FALSE

Whether the signature contains an embedded timestamp.

ValidatedSigningTime
char* (read-only)

Default Value: ""

The certified signing time in UTC.

Use this field to obtain the signing time as certified by a timestamp from a trusted timestamping authority. This field is only nonempty if there is a valid timestamp included in the signature.

Note that the validated time, unlike ClaimedSigningTime, is the trusted signing time.

ValidationResult
int (read-only)

Default Value: 0

The outcome of the cryptographic signature validation.

Possible values are:

0 (svrUnknown - default) Signature validity is unknown.
1 (svrValid) The signature is valid.
2 (svrCorrupted) The signature is corrupted.
3 (svrSignerNotFound) Failed to acquire the signing certificate. The signature cannot be validated.
4 (svrFailure) General failure.

This field is also available as the SignatureValidationResult parameter of the SignatureProcessed event.

WidgetHeight
char* (read-only)

Default Value: "70"

The height of the signature widget in points. Both integer and decimal values are supported.

WidgetOffsetX
char* (read-only)

Default Value: "0"

The signature widget offset from the left-hand page border in points. Both integer and decimal values are supported.

WidgetOffsetY
char* (read-only)

Default Value: "0"

The signature widget offset from the bottom page border in points. Both integer and decimal values are supported.

WidgetPages
char* (read-only)

Default Value: ""

The pages that the signature and its widget are placed on.

WidgetWidth
char* (read-only)

Default Value: "70"

The width of the signature widget in points. Both integer and decimal values are supported.

Constructors

PDFSignature()

Proxy Type

The proxy the component will connect to.

Syntax

SecurePDFProxy (declared in securepdf.h)

Remarks

When connecting through a proxy, this type is used to specify different properties of the proxy, such as the Server and the AuthScheme.

The following fields are available:

Fields

AuthScheme
int

Default Value: 0

The type of authorization to perform when connecting to the proxy. This is used only when the User and Password fields are set.

AuthScheme should be set to authNone (3) when no authentication is expected.

By default, AuthScheme is authBasic (0), and if the User and Password fields are set, the class will attempt basic authentication.

If AuthScheme is set to authDigest (1), digest authentication will be attempted instead.

If AuthScheme is set to authProprietary (2), then the authorization token will not be generated by the class. Look at the configuration file for the class being used to find more information about manually setting this token.

If AuthScheme is set to authNtlm (4), NTLM authentication will be used.

For security reasons, setting this field will clear the values of User and Password.

AutoDetect
int

Default Value: FALSE

Whether to automatically detect and use proxy system settings, if available. The default value is false.

Password
char*

Default Value: ""

A password if authentication is to be used for the proxy.

If AuthScheme is set to Basic Authentication, the User and Password fields are Base64 encoded and the proxy authentication token will be generated in the form Basic [encoded-user-password].

If AuthScheme is set to Digest Authentication, the User and Password fields are used to respond to the Digest Authentication challenge from the server.

If AuthScheme is set to NTLM Authentication, the User and Password fields are used to authenticate through NTLM negotiation.

Port
int

Default Value: 80

The Transmission Control Protocol (TCP) port for the proxy Server (default 80). See the description of the Server field for details.

Server
char*

Default Value: ""

If a proxy Server is given, then the HTTP request is sent to the proxy instead of the server otherwise specified.

If the Server field is set to a domain name, a DNS request is initiated. Upon successful termination of the request, the Server field is set to the corresponding address. If the search is not successful, an error is returned.

SSL
int

Default Value: 0

When to use a Secure Sockets Layer (SSL) for the connection to the proxy. The applicable values are as follows:

psAutomatic (0)Default setting. If the URL is an https URL, the class will use the psTunnel option. If the URL is an http URL, the class will use the psNever option.
psAlways (1)The connection is always SSL-enabled.
psNever (2)The connection is not SSL-enabled.
psTunnel (3)The connection is made through a tunneling (HTTP) proxy.

User
char*

Default Value: ""

A username if authentication is to be used for the proxy.

If AuthScheme is set to Basic Authentication, the User and Password fields are Base64 encoded and the proxy authentication token will be generated in the form Basic [encoded-user-password].

If AuthScheme is set to Digest Authentication, the User and Password fields are used to respond to the Digest Authentication challenge from the server.

If AuthScheme is set to NTLM Authentication, the User and Password fields are used to authenticate through NTLM negotiation.

Constructors

Proxy()
Proxy(const char* lpszServer, int iPort)
Proxy(const char* lpszServer, int iPort, const char* lpszUser, const char* lpszPassword)

SecurePDFList Type

Syntax

SecurePDFList<T> (declared in securepdf.h)

Remarks

SecurePDFList is a generic class that is used to hold a collection of objects of type T, where T is one of the custom types supported by the PDFVerify class.

Methods

GetCount This method returns the current size of the collection.

int GetCount() {}

SetCount This method sets the size of the collection. This method returns 0 if setting the size was successful; or -1 if the collection is ReadOnly. When adding additional objects to a collection call this method to specify the new size. Increasing the size of the collection preserves existing objects in the collection.

int SetCount(int count) {}

Get This method gets the item at the specified position. The index parameter specifies the index of the item in the collection. This method returns NULL if an invalid index is specified.

T* Get(int index) {}

Set This method sets the item at the specified position. The index parameter specifies the index of the item in the collection that is being set. This method returns -1 if an invalid index is specified. Note: Objects created using the new operator must be freed using the delete operator; they will not be automatically freed by the class.

T* Set(int index, T* value) {}

SecurePDFStream Type

Syntax

SecurePDFStream (declared in securepdf.h)

Remarks

The PDFVerify class includes one or more API members that take a stream object as a parameter. To use such API members, create a concrete class that implements the SecurePDFStream interface and pass the PDFVerify class an instance of that concrete class.

When implementing the SecurePDFStream interface's properties and methods, they must behave as described below. If the concrete class's implementation does not behave as expected, undefined behavior may occur.

Properties

CanRead Whether the stream supports reading.

bool CanRead() { return true; }
CanSeek Whether the stream supports seeking.

bool CanSeek() { return true; }
CanWrite Whether the stream supports writing.

bool CanWrite() { return true; }
Length Gets the length of the stream, in bytes.

int64 GetLength() = 0;

Methods

Close Closes the stream, releasing all resources currently allocated for it.

void Close() {}

This method is called automatically when a SecurePDFStream object is deleted.

Flush Forces all data held by the stream's buffers to be written out to storage.

int Flush() { return 0; }

Must return 0 if flushing is successful; or -1 if an error occurs or the stream is closed. If the stream does not support writing, this method must do nothing and return 0.

Read Reads a sequence of bytes from the stream and advances the current position within the stream by the number of bytes read.

int Read(void* buffer, int count) = 0;

Buffer specifies the buffer to populate with data from the stream. Count specifies the number of bytes that should be read from the stream.

Must return the total number of bytes read into Buffer; this may be less than Count if that many bytes are not currently available, or 0 if the end of the stream has been reached. Must return -1 if an error occurs, if reading is not supported, or if the stream is closed.

Seek Sets the current position within the stream based on a particular point of origin.

int64 Seek(int64 offset, int seekOrigin) = 0;

Offset specifies the offset in the stream to seek to, relative to SeekOrigin. Valid values for SeekOrigin are:

  • 0: Seek from beginning.
  • 1: Seek from current position.
  • 2: Seek from end.

Must return the new position within the stream; or -1 if an error occurs, if seeking is not supported, or if the stream is closed (however, see note below). If -1 is returned, the current position within the stream must remain unchanged.

Note: If the stream is not closed, it must always be possible to call this method with an Offset of 0 and a SeekOrigin of 1 to obtain the current position within the stream, even if seeking is not otherwise supported.

Write Writes a sequence of bytes to the stream and advances the current position within the stream by the number of bytes written.

int Write(const void* buffer, int count) = 0;

Buffer specifies the buffer with data to write to the stream. Count specifies the number of bytes that should be written to the stream.

Must return the total number of bytes written to the stream; this may be less than Count if that many bytes could not be written. Must return -1 if an error occurs, if writing is not supported, or if the stream is closed.

Config Settings (PDFVerify Class)

The class accepts one or more of the following configuration settings. Configuration settings are similar in functionality to properties, but they are rarely used. In order to avoid "polluting" the property namespace of the class, access to these internal properties is provided through the Config method.

PDFVerify Config Settings

CacheRevocationInfo:   Whether to cache revocation information.

This setting specifies whether the class will cache revocation information. If set to true, the class will preserve downloaded CRLs and OCSP responses in memory and reuse them in subsequent chain validations. If set to false, the class will always collect revocation information from scratch (when applicable). The default value is true.

CloseInputStreamAfterProcessing:   Whether to close the input stream after processing.

This setting determines whether the input stream specified in SetInputStream will be closed after processing is complete. The default value is true.

CloseOutputStreamAfterProcessing:   Whether to close the output stream after processing.

This setting determines whether the output stream specified in SetOutputStream will be closed after processing is complete. The default value is true.

ContactInfo[Index]:   The signer's contact information.

This indexed setting returns the signer's contact information for a signature. Index is the index of the signature in the Signatures properties. This setting is read-only.

FilterName[Index]:   The signature filter name.

This indexed setting specifies the signature filter name. Index is the index of the signature in the Signatures properties. This setting is read-only.

FullSignatureName[Index]:   The full name of the signature field.

This indexed setting specifies the full name of the signature field. It is an internal identifier of a signature (such as Signature1) and is not meant to be human-readable.

Index is the index of the signature in the Signatures properties. This setting is read-only.

HTTPRetryCount:   The number of HTTP request retries.

This setting specifies the number of times to retry an HTTP request. It can be useful in the case of timestamping or CRL/OCSP retrieval failures.

HTTPRetryInterval:   A time interval to apply between HTTP request retries.

This setting specifies the time interval (in seconds) to apply between successive HTTP request retries. It can be useful in the case of timestamping or CRL/OCSP retrieval failures.

LogLevel:   The level of detail that is logged.

This setting controls the level of detail that is logged through the Log event. Possible values are:

0 (None) No messages are logged.
1 (Info - default) Informational events such as the basics of the chain validation procedure are logged.
2 (Verbose) Detailed data such as HTTP requests are logged.
3 (Debug) Debug data including the full chain validation procedure are logged.
OwnerPassword:   The owner password to decrypt the document with.

This setting is used to provide the document owner password for decryption. Though it may be different from Password, most implementations use the same value for both.

Permissions:   The document permissions associated with the encryption.

This setting returns the permissions protected by this encryption. The PDF specification expects applications to comply with these permissions when handling encrypted documents, but note that it is a policy-like requirement rather than an enforcement.

This setting is read-only. Its value is a bitmask of the following flags:

0x001 (pepAnnotations) Annotating is allowed.
0x002 (pepAssemble) Assembling a new document on the basis of the processed one is allowed.
0x004 (pepExtract) Extraction/copying of the pictures and text from the document is allowed.
0x008 (pepExtractAcc) Content extraction is allowed for accessibility purposes only.
0x010 (pepFillInForms) Filling in forms is allowed.
0x020 (pepHighQualityPrint) High quality printing is allowed.
0x040 (pepLowQualityPrint) Low quality printing is allowed.
0x080 (pepModify) Modifications are allowed.

PreferEmbeddedRevocationInfo:   Whether to prioritize revocation information that is embedded into the document.

This setting specifies whether the class will use revocation information that is embedded into the document when checking revocation status. If set to true, the class will not download CRLs or OCSP responses from online sources unnecessarily. If set to false or no embedded revocation information is present, the class will retrieve it as normal based on the value of RevocationCheck. The default value is true.

SaveChanges:   Whether to save changes made to the PDF document.

This setting specifies whether and how changes made to the PDF document will be saved when the Close method is called. Possible values are:

0 Discard all changes.
1 Save the document to OutputFile, OutputData, or the stream set in SetOutputStream, even if it has not been modified.
2 (default) Save the document to OutputFile, OutputData, or the stream set in SetOutputStream, but only if it has been modified.
SignatureData[Index]:   The hex-encoded representation of the underlying PKCS#7 signature blob.

This indexed setting returns the hex-encoded representation of the underlying PKCS#7 signature blob. Index is the index of the signature in the Signatures properties. This setting is read-only.

TempPath:   The location where temporary files are stored.

This setting specifies an absolute path to the location on disk where temporary files are stored. It can be useful to reduce memory usage.

Base Config Settings

BuildInfo:   Information about the product's build.

When queried, this setting will return a string containing information about the product's build.

CodePage:   The system code page used for Unicode to Multibyte translations.

The default code page is Unicode UTF-8 (65001).

The following is a list of valid code page identifiers:

IdentifierName
037IBM EBCDIC - U.S./Canada
437OEM - United States
500IBM EBCDIC - International
708Arabic - ASMO 708
709Arabic - ASMO 449+, BCON V4
710Arabic - Transparent Arabic
720Arabic - Transparent ASMO
737OEM - Greek (formerly 437G)
775OEM - Baltic
850OEM - Multilingual Latin I
852OEM - Latin II
855OEM - Cyrillic (primarily Russian)
857OEM - Turkish
858OEM - Multilingual Latin I + Euro symbol
860OEM - Portuguese
861OEM - Icelandic
862OEM - Hebrew
863OEM - Canadian-French
864OEM - Arabic
865OEM - Nordic
866OEM - Russian
869OEM - Modern Greek
870IBM EBCDIC - Multilingual/ROECE (Latin-2)
874ANSI/OEM - Thai (same as 28605, ISO 8859-15)
875IBM EBCDIC - Modern Greek
932ANSI/OEM - Japanese, Shift-JIS
936ANSI/OEM - Simplified Chinese (PRC, Singapore)
949ANSI/OEM - Korean (Unified Hangul Code)
950ANSI/OEM - Traditional Chinese (Taiwan; Hong Kong SAR, PRC)
1026IBM EBCDIC - Turkish (Latin-5)
1047IBM EBCDIC - Latin 1/Open System
1140IBM EBCDIC - U.S./Canada (037 + Euro symbol)
1141IBM EBCDIC - Germany (20273 + Euro symbol)
1142IBM EBCDIC - Denmark/Norway (20277 + Euro symbol)
1143IBM EBCDIC - Finland/Sweden (20278 + Euro symbol)
1144IBM EBCDIC - Italy (20280 + Euro symbol)
1145IBM EBCDIC - Latin America/Spain (20284 + Euro symbol)
1146IBM EBCDIC - United Kingdom (20285 + Euro symbol)
1147IBM EBCDIC - France (20297 + Euro symbol)
1148IBM EBCDIC - International (500 + Euro symbol)
1149IBM EBCDIC - Icelandic (20871 + Euro symbol)
1200Unicode UCS-2 Little-Endian (BMP of ISO 10646)
1201Unicode UCS-2 Big-Endian
1250ANSI - Central European
1251ANSI - Cyrillic
1252ANSI - Latin I
1253ANSI - Greek
1254ANSI - Turkish
1255ANSI - Hebrew
1256ANSI - Arabic
1257ANSI - Baltic
1258ANSI/OEM - Vietnamese
1361Korean (Johab)
10000MAC - Roman
10001MAC - Japanese
10002MAC - Traditional Chinese (Big5)
10003MAC - Korean
10004MAC - Arabic
10005MAC - Hebrew
10006MAC - Greek I
10007MAC - Cyrillic
10008MAC - Simplified Chinese (GB 2312)
10010MAC - Romania
10017MAC - Ukraine
10021MAC - Thai
10029MAC - Latin II
10079MAC - Icelandic
10081MAC - Turkish
10082MAC - Croatia
12000Unicode UCS-4 Little-Endian
12001Unicode UCS-4 Big-Endian
20000CNS - Taiwan
20001TCA - Taiwan
20002Eten - Taiwan
20003IBM5550 - Taiwan
20004TeleText - Taiwan
20005Wang - Taiwan
20105IA5 IRV International Alphabet No. 5 (7-bit)
20106IA5 German (7-bit)
20107IA5 Swedish (7-bit)
20108IA5 Norwegian (7-bit)
20127US-ASCII (7-bit)
20261T.61
20269ISO 6937 Non-Spacing Accent
20273IBM EBCDIC - Germany
20277IBM EBCDIC - Denmark/Norway
20278IBM EBCDIC - Finland/Sweden
20280IBM EBCDIC - Italy
20284IBM EBCDIC - Latin America/Spain
20285IBM EBCDIC - United Kingdom
20290IBM EBCDIC - Japanese Katakana Extended
20297IBM EBCDIC - France
20420IBM EBCDIC - Arabic
20423IBM EBCDIC - Greek
20424IBM EBCDIC - Hebrew
20833IBM EBCDIC - Korean Extended
20838IBM EBCDIC - Thai
20866Russian - KOI8-R
20871IBM EBCDIC - Icelandic
20880IBM EBCDIC - Cyrillic (Russian)
20905IBM EBCDIC - Turkish
20924IBM EBCDIC - Latin-1/Open System (1047 + Euro symbol)
20932JIS X 0208-1990 & 0121-1990
20936Simplified Chinese (GB2312)
21025IBM EBCDIC - Cyrillic (Serbian, Bulgarian)
21027Extended Alpha Lowercase
21866Ukrainian (KOI8-U)
28591ISO 8859-1 Latin I
28592ISO 8859-2 Central Europe
28593ISO 8859-3 Latin 3
28594ISO 8859-4 Baltic
28595ISO 8859-5 Cyrillic
28596ISO 8859-6 Arabic
28597ISO 8859-7 Greek
28598ISO 8859-8 Hebrew
28599ISO 8859-9 Latin 5
28605ISO 8859-15 Latin 9
29001Europa 3
38598ISO 8859-8 Hebrew
50220ISO 2022 Japanese with no halfwidth Katakana
50221ISO 2022 Japanese with halfwidth Katakana
50222ISO 2022 Japanese JIS X 0201-1989
50225ISO 2022 Korean
50227ISO 2022 Simplified Chinese
50229ISO 2022 Traditional Chinese
50930Japanese (Katakana) Extended
50931US/Canada and Japanese
50933Korean Extended and Korean
50935Simplified Chinese Extended and Simplified Chinese
50936Simplified Chinese
50937US/Canada and Traditional Chinese
50939Japanese (Latin) Extended and Japanese
51932EUC - Japanese
51936EUC - Simplified Chinese
51949EUC - Korean
51950EUC - Traditional Chinese
52936HZ-GB2312 Simplified Chinese
54936Windows XP: GB18030 Simplified Chinese (4 Byte)
57002ISCII Devanagari
57003ISCII Bengali
57004ISCII Tamil
57005ISCII Telugu
57006ISCII Assamese
57007ISCII Oriya
57008ISCII Kannada
57009ISCII Malayalam
57010ISCII Gujarati
57011ISCII Punjabi
65000Unicode UTF-7
65001Unicode UTF-8
The following is a list of valid code page identifiers for Mac OS only:
IdentifierName
1ASCII
2NEXTSTEP
3JapaneseEUC
4UTF8
5ISOLatin1
6Symbol
7NonLossyASCII
8ShiftJIS
9ISOLatin2
10Unicode
11WindowsCP1251
12WindowsCP1252
13WindowsCP1253
14WindowsCP1254
15WindowsCP1250
21ISO2022JP
30MacOSRoman
10UTF16String
0x90000100UTF16BigEndian
0x94000100UTF16LittleEndian
0x8c000100UTF32String
0x98000100UTF32BigEndian
0x9c000100UTF32LittleEndian
65536Proprietary

LicenseInfo:   Information about the current license.

When queried, this setting will return a string containing information about the license this instance of a class is using. It will return the following information:

  • Product: The product the license is for.
  • Product Key: The key the license was generated from.
  • License Source: Where the license was found (e.g., RuntimeLicense, License File).
  • License Type: The type of license installed (e.g., Royalty Free, Single Server).
  • Last Valid Build: The last valid build number for which the license will work.
MaskSensitiveData:   Whether sensitive data is masked in log messages.

In certain circumstances it may be beneficial to mask sensitive data, like passwords, in log messages. Set this to true to mask sensitive data. The default is true.

This setting only works on these classes: AS3Receiver, AS3Sender, Atom, Client(3DS), FTP, FTPServer, IMAP, OFTPClient, SSHClient, SCP, Server(3DS), Sexec, SFTP, SFTPServer, SSHServer, TCPClient, TCPServer.

ProcessIdleEvents:   Whether the class uses its internal event loop to process events when the main thread is idle.

If set to False, the class will not fire internal idle events. Set this to False to use the class in a background thread on Mac OS. By default, this setting is True.

SelectWaitMillis:   The length of time in milliseconds the class will wait when DoEvents is called if there are no events to process.

If there are no events to process when DoEvents is called, the class will wait for the amount of time specified here before returning. The default value is 20.

UseInternalSecurityAPI:   Whether or not to use the system security libraries or an internal implementation.

When set to false, the class will use the system security libraries by default to perform cryptographic functions where applicable.

Setting this configuration setting to true tells the class to use the internal implementation instead of using the system security libraries.

On Windows, this setting is set to false by default. On Linux/macOS, this setting is set to true by default.

To use the system security libraries for Linux, OpenSSL support must be enabled. For more information on how to enable OpenSSL, please refer to the OpenSSL Notes section.

Trappable Errors (PDFVerify Class)

Error Handling (C++)

Call the GetLastErrorCode() method to obtain the last called method's result code; 0 indicates success, while a non-zero error code indicates that this method encountered an error during its execution. Known error codes are listed below. If an error occurs, the GetLastError() method can be called to retrieve the associated error message.

PDFVerify Errors

802   HTTP download failed. The error description contains the detailed message.
803   The document is not signed.
816   Invalid signature. The error description contains the detailed message.
827   Invalid timestamp data. The error description contains the detailed message.
829   Bad signing certificate attribute.
830   Chain validation failed. The error description contains the detailed message.
833   Trusted List processing error. The error description contains the detailed message.
834   Cannot parse Trusted List data.
837   Invalid revocation information.
839   Failed to process Trusted List. The error description contains the detailed message.
844   No signer certificate found.
845   Invalid signing certificate chain. The error description contains the detailed message.
851   Unsupported hash algorithm.
853   Invalid digest.
854   Invalid signature reference.
855   Invalid signature contents.
856   Invalid signature byte range.
857   Byte range does not cover the entire document.

PDF Errors

804   PDF decompression failed.
805   Cannot add entry to cross-reference table.
806   Unsupported field size.
807   Unsupported Encoding filter.
808   Unsupported predictor algorithm.
809   Unsupported document version.
812   Cannot read PDF file stream.
813   Cannot write to PDF file stream.
814   OutputFile already exists and Overwrite is false.
815   Invalid parameter.
817   Bad cross-reference entry.
818   Invalid object or generation number.
819   Invalid object stream.
820   Invalid stream dictionary.
821   Invalid AcroForm entry.
822   Invalid Root entry.
823   Invalid annotation.
824   The input document is empty.
826   OpenType font error. The error description contains the detailed message.
828   Invalid CMS data. The error description contains the detailed message.
835   Cannot change decryption mode for opened document.
836   Unsupported Date string.
838   Cryptographic error. The error description contains the detailed message.
840   No decryption key found.
841   Encryption failed. The error description contains the detailed message.
842   No proper certificate for encryption found.
846   Unsupported revision.
847   Unsupported security handler SubFilter.
848   Failed to verify permissions.
849   Invalid password.
850   Invalid password information.
852   Unsupported encryption algorithm.
859   Cannot encrypt encrypted document.
864   Cannot modify document after signature update.
868   Cannot encrypt or decrypt object.
869   Invalid security handler information.
870   Invalid encrypted data.
871   Invalid block cipher padding.
872   Failed to reload signature.
873   Object is not encrypted.
874   Unexpected cipher information.
877   Invalid document. Bad document catalog.
878   Invalid document Id.
880   Invalid document. Invalid requirements dictionary.
881   Invalid linearization dictionary.
882   Invalid signature information.
883   Unsupported document format.
890   Unsupported feature.
891   Internal error. The error description contains the detailed message.

Parsing Errors

1001   Bad object.
1002   Bad document trailer.
1003   Illegal stream dictionary.
1004   Illegal string.
1005   Indirect object expected.
1007   Invalid reference.
1008   Invalid reference table.
1009   Invalid stream data.
1010   Unexpected character.
1011   Unexpected EOF.
1012   Unexpected indirect object in cross-reference table.
1021   Invalid type in Root object list.

The class may also return one of the following error codes, which are inherited from other classes.

HTTP Errors

118   Firewall error. The error description contains the detailed message.
143   Busy executing current method.
151   HTTP protocol error. The error message has the server response.
152   No server specified in URL.
153   Specified URLScheme is invalid.
155   Range operation is not supported by server.
156   Invalid cookie index (out of range).
301   Interrupted.
302   Cannot open AttachedFile.

The class may also return one of the following error codes, which are inherited from other classes.

TCPClient Errors

100   You cannot change the RemotePort at this time. A connection is in progress.
101   You cannot change the RemoteHost (Server) at this time. A connection is in progress.
102   The RemoteHost address is invalid (0.0.0.0).
104   Already connected. If you want to reconnect, close the current connection first.
106   You cannot change the LocalPort at this time. A connection is in progress.
107   You cannot change the LocalHost at this time. A connection is in progress.
112   You cannot change MaxLineLength at this time. A connection is in progress.
116   RemotePort cannot be zero. Please specify a valid service port number.
117   You cannot change the UseConnection option while the class is active.
135   Operation would block.
201   Timeout.
211   Action impossible in control's present state.
212   Action impossible while not connected.
213   Action impossible while listening.
301   Timeout.
302   Could not open file.
434   Unable to convert string to selected CodePage.
1105   Already connecting. If you want to reconnect, close the current connection first.
1117   You need to connect first.
1119   You cannot change the LocalHost at this time. A connection is in progress.
1120   Connection dropped by remote host.

SSL Errors

270   Cannot load specified security library.
271   Cannot open certificate store.
272   Cannot find specified certificate.
273   Cannot acquire security credentials.
274   Cannot find certificate chain.
275   Cannot verify certificate chain.
276   Error during handshake.
280   Error verifying certificate.
281   Could not find client certificate.
282   Could not find server certificate.
283   Error encrypting data.
284   Error decrypting data.

TCP/IP Errors

10004   [10004] Interrupted system call.
10009   [10009] Bad file number.
10013   [10013] Access denied.
10014   [10014] Bad address.
10022   [10022] Invalid argument.
10024   [10024] Too many open files.
10035   [10035] Operation would block.
10036   [10036] Operation now in progress.
10037   [10037] Operation already in progress.
10038   [10038] Socket operation on nonsocket.
10039   [10039] Destination address required.
10040   [10040] Message is too long.
10041   [10041] Protocol wrong type for socket.
10042   [10042] Bad protocol option.
10043   [10043] Protocol is not supported.
10044   [10044] Socket type is not supported.
10045   [10045] Operation is not supported on socket.
10046   [10046] Protocol family is not supported.
10047   [10047] Address family is not supported by protocol family.
10048   [10048] Address already in use.
10049   [10049] Cannot assign requested address.
10050   [10050] Network is down.
10051   [10051] Network is unreachable.
10052   [10052] Net dropped connection or reset.
10053   [10053] Software caused connection abort.
10054   [10054] Connection reset by peer.
10055   [10055] No buffer space available.
10056   [10056] Socket is already connected.
10057   [10057] Socket is not connected.
10058   [10058] Cannot send after socket shutdown.
10059   [10059] Too many references, cannot splice.
10060   [10060] Connection timed out.
10061   [10061] Connection refused.
10062   [10062] Too many levels of symbolic links.
10063   [10063] File name is too long.
10064   [10064] Host is down.
10065   [10065] No route to host.
10066   [10066] Directory is not empty
10067   [10067] Too many processes.
10068   [10068] Too many users.
10069   [10069] Disc Quota Exceeded.
10070   [10070] Stale NFS file handle.
10071   [10071] Too many levels of remote in path.
10091   [10091] Network subsystem is unavailable.
10092   [10092] WINSOCK DLL Version out of range.
10093   [10093] Winsock is not loaded yet.
11001   [11001] Host not found.
11002   [11002] Nonauthoritative 'Host not found' (try again or check DNS setup).
11003   [11003] Nonrecoverable errors: FORMERR, REFUSED, NOTIMP.
11004   [11004] Valid name, no data record (check DNS setup).